WC Lab Manual For Student
WC Lab Manual For Student
NAME
ENROLLMENT NUMBER
BATCH
YEAR
Page | 1
DEPARTMENT OF INFORMATION TECHNOLOGY
VISION
“To impart quality education and research in Information Technology to
produce a competent, committed and goal oriented workforce to fulfill the
needs of the local and global IT Industry.”
Page | 2
PROGRAM OUTCOMES (POs)
Engineering Graduates will be able to:
1. Engineering knowledge: Apply the knowledge of mathematics, science,
engineering fundamentals, and an engineering specialization to the solution of
complex engineering problems.
2. Problem analysis: Identify, formulate, review research literature, and
analyze complex engineering problems reaching substantiated conclusions
using first principles of mathematics, natural sciences, and engineering
sciences.
3. Design/development of solutions: Design solutions for complex engineering
problems and design system components or processes that meet the specified
needs with appropriate consideration for the public health and safety, and the
cultural, societal, and environmental considerations.
4. Conduct investigations of complex problems: Use research-based
knowledge and research methods including design of experiments, analysis
and interpretation of data, and synthesis of the information to provide valid
conclusions.
5. Modern tool usage: Create, select, and apply appropriate techniques,
resources, and modern engineering and IT tools including prediction and
modeling to complex engineering activities with an understanding of the
limitations.
6. The engineer and society: Apply reasoning informed by the contextual
knowledge to assess societal, health, safety, legal and cultural issues and the
consequent responsibilities relevant to the professional engineering practice.
7. Environment and sustainability: Understand the impact of the professional
engineering solutions in societal and environmental contexts, and
demonstrate the knowledge of, and need for sustainable development.
8. Ethics: Apply ethical principles and commit to professional ethics and
responsibilities and norms of the engineering practice.
9. Individual and team work: Function effectively as an individual, and as a
member or leader in diverse teams, and in multidisciplinary settings.
10. Communication: Communicate effectively on complex engineering
activities with the engineering community and with society at large, such as,
being able to comprehend and write effective reports and design
documentation, make effective presentations, and give and receive clear
instructions.
11. Project management and finance: Demonstrate knowledge and
understanding of the engineering and management principles and apply these
to one’s own work, as a member and leader in a team, to manage projects and
in multidisciplinary environments.
12. Life-long learning: Recognize the need for, and have the preparation and
ability to engage in independent and life-long learning in the broadest context
of technological change.
Page | 3
WIRELESS COMMUNICATION PRACTICAL BOOK
DEPARTMENT OF INFORMATION TECHNOLOGY
PREFACE
It gives us immense pleasure to present the first edition of Wireless
Communication Practical Book for the B.E. 3 rd year students of Ahmedabad
Institute of Technology.
This manual is intended where connectivity drives innovation and societal
progress, wireless communication stands at the forefront of technological
advancement. This text aims to provide a comprehensive overview of the
principles, technologies, and applications that underpin wireless
communication systems.
From the early days of radio waves to the sophisticated networks that enable
our smartphones and IoT devices, wireless communication has
revolutionized the way we interact with the world. This journey not only
highlights the technological milestones but also explores the challenges and
solutions that have shaped the industry.
As we delve into topics such as modulation techniques, signal propagation,
and network architectures, we will also address the impact of emerging
technologies like 5G and beyond. The importance of security, spectrum
management, and the future of wireless communication will be examined,
providing a holistic view of the field.
Whether you are a student, professional, or enthusiast, this text serves as both
a foundational resource and a springboard for deeper exploration into the
dynamic world of wireless communication. Let us embark on this journey to
understand how wireless technologies continue to transform our lives and
connect us in unprecedented ways.
Page | 4
1. Be punctual in arriving at the laboratory with your lab manual and always
wear your ID card.
3. Students have to maintain discipline in the lab and should not create any
unnecessary chaos.
4. Students are supposed to occupy the systems allotted to them and are not
supposed to talk or make noise in the lab.
5. Students are required to carry their observation book and lab records with
completed exercises while entering the lab.
8. All the observations have to be neatly recorded in the Practical Book and
verified by the instructor before leaving the laboratory.
Page | 5
WIRELESS COMMUNICATION PRACTICAL BOOK
DEPARTMENT OF INFORMATION TECHNOLOGY
Do’s:
Page | 6
WIRELESS COMMUNICATION PRACTICAL BOOK
DEPARTMENT OF INFORMATION TECHNOLOGY
Don’ts:
Page | 7
Ahmedabad Institute of Technology
Information Technology Department
CERTIFICATE
This is to certify that Mr. /
Ms._________________________________ of Enrolment No
___________________________has satisfactorily completed the
course in ____________________________________as by the
Gujarat Technological University for ____ Year (B.E.) semester___ of
Information Technology in the Academic year ______.
Date of Submission:-
Page | 8
INDEX
Page No.
Sr. Experiment Date Marks Signature
No. From To
Page | 9
7. To study and write a MATLAB
program to find the cluster size for
different values of i and j and also
find the Q - factor
Page | 10
EXPERIMENT NO: 1 DATE: / /
Aim:
To study and discuss the mobile communication standards and usefulness of MATLAB
for wireless communication.
Theory:
● Wireless engineers use MATLAB to reduce development time, eliminate design
problems early, and streamline testing and verification.
MATLAB provides all these functionalities to analyze and compute wireless system
parameters:
● Prove algorithm and system design concepts with simulation and over-the-air
signals.
● Create models using digital, RF, and antenna elements to explore and optimize
system behavior.
● Automate analysis of large-scale field test data and visualize your simulation
results.
● Wireless researchers and engineers worldwide rely on MATLAB to explore and
prove new technology concepts and create intellectual property.
Page | 11
● The apps and customizable code in MATLAB toolboxes help you quickly
explore design alternatives, test with live data, and analyze simulation results
and measurements.
● You can use the MATLAB algorithms you create to build standard-compliant
systems, model RF and antenna components, and automate hardware
prototyping and implementation.
GSM standards:
● A set of standards and protocols for mobile telecommunication
● A global system for mobile (GSM) was
● developed by the Groupe Spéciale
● Mobile (GSM)
● Founded in Europe in 1982
● Support cellular network
GSM 900
● GMSK modulation
● FDMA for 124 up channels and 124 down channels
● 890-915 MHz for uplink and 935-960 MHz for downlink
● Channel of bandwidth 200 kHz
● 8 radio-carrier analog-signals TDMA for user access in each deployed channel
● Users time-slices of 577 μs each
● Maximum 14.4 kbps
Page | 12
GPRS (general packet radio service): GSM 2G+ (2.5G)
● General Packet Radio Service (GPRS) is a new bearer service for GSM that
greatly improves and simplifies wireless access to packet data networks
● GPRS applies packet radio principal to transfer user data packets in an efficient
way between MS & external packet data network
● Packet-oriented service for data communication of mobile devices
● Utilises the unused channels in the TDMA mode in a GSM network
● New Data Services
● High Speed (Data Rate 14.4 – 115 kbps)
● Efficient use of radio bandwidth (Statistical Multiplexing)
● Circuit switching & Packet Switching can be used in parallel
● Constant connectivity
● GPRS uses radio channel i.e. 200 kHz wide
● Radio channel carries digital data stream of 271 kbps
● This rate is divided into 8 time slots each carrying 34 kbps per time slot
● Data rate 14 kbps per time slot achieved after corrections
● GPRS can combine up to 8 time slots giving data rate of 114 kbps
CDMA
● Evolution of CDMA from 2.5G in 1991 as cdmaOne (IS-95)
● CDMA supports high data rates 3G.
● Voice as well as data and multimedia streams.
● CDMA 2000, IMT-2000, WCDMA and UMTS
● Support cellular networks
● Higher capacity
● Improved performance in multipath by diversity
● Lower mobile transmit power = longer battery life
● Power control
● Variable transmission rate with voice activity detection
Page | 13
● Allows soft handoff
● Sectorization gain
● High peak data rates can be accommodated
● Combats other-user interference = lower reuse factors
CDMA-One
● Founded in 1991
● QUALCOM, USA
● Belongs to 2G+
● IS-95 (interim standards 95)
● Operates at 824–849 MHz and 869–894 MHz.
● CDMA channel transmits analog signals from multiple sources and users
WCDMA
● Supports asynchronous operations
● 10 ms frame length with 15 slices.
● Smaller end-to-end delay in the 10 ms frame as compared to 20, 40, or 80 ms
frames
● Each frame length is modulated by QPSK- both for uplink and downlink
● Supports a 3.84 Mbps chipping rate
● Both short and long scrambling code are supported, but for uplink only
● 3G partnership project (3GPP)
CDMA2000
● For voice communication
● Circuit as well as packet switched communication
● Internet protocol (IP) packet transmission
● Multimedia and real time multimedia applications
● 3G partnership project 2
● Chipping rates are in multiples of fs =1.2288 Mbps
● 3G IMT 2000 carrier frequency fc0 = 2 GHz
Page | 14
● Included in UMTS
● CDMA 2000 1x fs = 1.2288 Mbps
● Also backward compatible to 2.5G cdmaOne IS-95
CONCLUSION:
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
Page | 15
EXPERIMENT NO: 2 DATE: / /
Aim:
To study and analyse Friss Free Space Propagation Model using MATLAB program.
Theory:
● Radio propagation models are broadly classified into large-scale and small scale
models. Large scale effects typically occur in the order of hundreds to thousands
of meters in distance.
● Small scale effects are localized and occur temporally (in the order of a few
seconds) or spatially (in the order of a few meters).
● The important questions in large-scale modeling are - how the signal from a
transmitter reaches the receiver in the first place and what is the relative power
of the received signal with respect to the transmitted power level.
● The Free-space propagation model is the simplest large-scale model, quite
useful in satellite and microwave link modeling. It models a single unobstructed
path between the transmitter and the receiver.
● Applying the fact that the strength of a radiation field decreases as 1=d in the far
field, we arrive at the Friis free space equation that can tell us about the amount
of power received relative to the power transmitted.
● Friis free space propagation model is used to model the LOS path loss incurred
in a free space environment, devoid of any objects that create absorption,
diffraction, reflections, or any other characteristic-altering phenomenonto a
radiated wave.
● It is valid only in the far field region of the transmitting antenna and is based on
the inverse square law of distance which states that the received power at a
Page | 16
particular distance from the transmitter decays by a factor of square of the
distance.
● The Friis equation for received power is given by -
where,
Pr(d) is the received signal power in Watts expressed as a function of separation
distance (d meters) between the transmitter and the receiver,
Pt is the power of the transmitted signal’s Watts,
Gt and Gr are the gains of transmitter and receiver antennas when compared to an
isotropic radiator with unit gain 1,
λ is the wavelength of carrier in meters and
L represents other losses that is not associated with the propagation loss.
The parameter L may include system losses like loss at the antenna, transmission line
attenuation, loss at various filters etc. The factor L is usually greater than or equal to 1
with L = 1 for no such system losses.
● Usually, the transmitted power and the receiver power are specified in terms of dBm
(power in decibels with respect to 1 mW) and the antenna gains in dBi (gain in
decibels with respect to an isotropic antenna).
● Therefore, it is often convenient to work in log scale instead of linear scale. The
alternative form of Friis equation in log scale is given by -
● Following function, implements a generic Friis equation that includes the path loss
exponent, n, whose possible values are listed in the given table -
Page | 17
PROGRAM:
We have to create user defined function first in MATLAB file editor -
Creation of file named as - FrissModel.m
function [Pr_dBm,PL_dB] =
FrissModel(Pt_dBm,Gt_dBi,Gr_dBi,f,d,L,n)
%Pt_dBm = Transmitted power in dBm
%Gt_dBi = Gain of the Transmitted antenna in dBi
%Gr_dBi = Gain of the Receiver antenna in dBi
%f = frequency of transmitted signal in Hertz
%d = array of distances at which the loss needs to be
calculated
%L = Other System Losses, No Loss case L=1
%n = path loss exponent (n=2 for free space)
%Pr_dBm = Received power in dBm
%PL_dB = constant path loss factor (including antenna gains)
lambda=3*10^8/f; %Wavelength in meters
PL_dB = Gt_dBi + Gr_dBi + 20*log10(lambda/(4*pi))-
10*n*log10(d)-10*log10(L);%
Pr_dBm = Pt_dBm + PL_dB; %Receieved power in dBm at d meters
end
Example:
For example, consider a WiFi (IEEE 802.11n standard) transmission-reception system
operating at f =2.4 GHz or f =5 GHz band with 0 dBm (1 mW) output power from the
Page | 18
transmitter. The gain of the transmitter antenna is 1 dBi and that of receiving antenna is
1 dBi. It is assumed that there is no system loss, therefore L = 1.
The following Matlab code uses the Friis equation and plots the received power in dBm
for a range of distances -
[Pr1_dBm,PL1_dB] = FrissModel(Pt_dBm,Gt_dBi,Gr_dBi,f,d,L,n);
semilogx(d,Pr1_dBm,'b-o');
hold on;
f=5e9; %Transmitted signal frequency in Hertz (5G WiFi)
[Pr2_dBm,PL2_dB] = FrissModel(Pt_dBm,Gt_dBi,Gr_dBi,f,d,L,n);
semilogx(d,Pr2_dBm,'r-o');
grid on;
title('Free space path loss');
xlabel('Distance (m)');
ylabel('Received power (dBm)')
legend('Wifi : f = 2.4GHz', 'Wifi : f = 5GHz');
Page | 19
RESULT:
● From the plot, the received power decreases by a factor of 6 dB for every
doubling of the distance.
[Figure-1- Received power using Friss Model for Wifi transmission at f = 2.4GHz and f =
5GHz]
CONCLUSION:
Page | 20
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Aim:
To study and analyse Log Distance Path Loss Model using MATLAB program.
Theory:
● Log distance path loss model is an extension to the Friis free space model. It is
used to predict the propagation loss for a wide range of environments, whereas,
the Friis free space model is restricted to unobstructed clear path between the
transmitter and the receiver.
● The model encompasses random shadowing effects due to signal blockage by
hills, trees, buildings etc. It is also referred as log normal shadowing model.
● In the far field region of the transmitter, for distances beyond df , if P L(d0) is the
path loss at a distance d0 meters from the transmitter, then the path loss at an
arbitrary distance d > d0 is given by -
where,
PL(d) is the path loss at an arbitrary distance d meters,
n is the path loss exponent that depends on the type of environment, as given in Table.
Page | 21
● Also, χ is a zero-mean Gaussian distributed random variable with standard
deviation σ expressed in dB, used only when there is a shadowing effect.
● The reference path loss PL(d0), also called close-in reference distance, is
obtained by using Friis path loss equation or by field measurements at d 0.
Typically, d0 = 1m to 10m for microcell and d0 = 1 Km for a large cell.
PROGRAM:
● We have to create user defined function first in MATLAB file editor -
Page | 22
K = 20*log10(lambda/(4*pi)) - 10*n*log10(d0) - 10*log10(L);
%path-loss factor
X = sigma*randn(1,numel(d)); %normal random variable
PL = Gt_dBi + Gr_dBi + K -10*n*log10(d/d0) - X ;%PL(d)
including antennas gains
Pr_dBm = Pt_dBm + PL; %Receieved power in dBm at d meters
end
Page | 23
grid on;
xlabel('Distance (m)');
ylabel('P_r (dBm)');
title('Log Normal Shadowing Model');
legend('Log normal shadowing','Friss model');
RESULT:
[Figure- 1-
Simulated result for log normal shadowing path loss model]
Conclusion:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Page | 24
EXPERIMENT NO: 4 DATE: / /
Aim:
Theory:
● Outdoor propagation models involve estimation of propagation loss over
irregular terrains such as mountainous regions, simple curved earth profile, etc.,
with obstacles like trees and buildings. All such models predict the received
signal strength at a particular distance or on a small sector.
● These models vary in approach, accuracy and complexity. Hata-Okumura model
is one such model.
● Okumura model can be adopted for computer simulations by digitizing those
curves provided by Okumura and using them in the form of look-up-tables.
● Since it is based on empirical studies, the validity of parameters is limited in
range. The parameter values outside the range can be obtained by extrapolating
the curves.
● There are also concerns related to the calculation of effective antenna height.
Thus every RF modeling tool incorporates its own interpretations and
adjustments when it comes to implementing Okumura model.
Page | 25
● The generic closed form expression for path loss (PL) in dB, is given by -
where, the Tx-Rx separation distance (d) is specified in kilometers (valid range 1
km to 20 Km). The factors A, B, C depend on the frequency of transmission,
antenna heights and the type of environment, as given next
where,
fc = frequency of transmission in MHz, valid range = 150 MHz to 1500 MHz
hb= effective height of transmitting base station antenna in meters, valid range 30m to
200m
hm=effective receiving mobile device antenna height in meters, valid range 1m to 10 m
a(hm) = mobile antenna height correction factor that depends on the environment (Refer
Table) and C = a factor used to correct the formulas for open rural and suburban areas
PROGRAM:
● We have to create user defined function first in MATLAB file editor -
Page | 26
% d - array of distances (in Km) to simulate
% hb - effective base station height in meters
% hm - effective mobile height in meters
% envType - 'metro','smallcity','suburban' or 'open'
% returns the path loss (PL) in dB
%Warning: Hata model is valid only if the model parameters
%falls within certain range of values(see text). This function
%has not implemented those range checks.
envType=lower(envType);
switch envType
case 'metro',
C=0;
if fc<=200, aHm=8.29*(log10(1.54*hm))^2-1.1;
else aHm=3.2*(log10(11.75*hm))^2-4.97;
end
case 'smallcity',
C=0; aHm = (1.1*log10(fc)-0.7)*hm-(1.56*log10(fc)-0.8);
case 'suburban',
aHm = (1.1*log10(fc)-0.7)*hm-(1.56*log10(fc)-0.8);
C=-2*(log10(fc/28)).^2-5.4;
case 'open',
aHm = (1.1*log10(fc)-0.7)*hm-(1.56*log10(fc)-0.8);
C=-4.78*(log10(fc)).^2+18.33*log10(fc)-40.98;
otherwise , error('Invalid model selection');
end
A = 69.55 + 26.16*log10(fc) - 13.82*log10(hb)-aHm;
B = 44.9 - 6.55*log10(hb);
PL=A+B*log10(d)+C;
end
Page | 27
Program:
% Simulate Hata model
envType = 'metro';
fc = 1500;
d = (1:0.2:100);
hb = 70;
hm = 1.5;
PL = Hata_model(fc,d,hb,hm,envType);
semilogx(d,PL,'b-','LineWidth',1.3);
hold on;
envType = 'suburban';
fc = 1500;
d = (1:0.2:100);
hb = 70;
hm = 1.5;
PL = Hata_model(fc,d,hb,hm,envType);
semilogx(d,PL,'r-','LineWidth',1.3);
hold on;
envType = 'open';
fc = 1500;
d = (1:0.2:100);
hb = 70;
hm = 1.5;
PL = Hata_model(fc,d,hb,hm,envType);
semilogx(d,PL,'k-','LineWidth',1.3);
hold on;
grid on;
title('Hata-Okumura Path Loss Model');
xlabel('Distance (km)');
ylabel('Propagation Path Loss(dB)')
legend('Metropolitan Area','Suburban Area','Open rural Area');
Page | 28
RESULT:
Conclusion:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Page | 29
____________________________________________________________________________
____________________________________________________________________________
Aim:
To study and analyse Two-ray ground reflection Model using MATLAB program.
Theory:
● Friis propagation model considers the line-of-sight (LOS) path between the
transmitter and the receiver. The expression for the received power becomes
complicated if the effect of reflections from the earth surface has to be
incorporated in the modeling.
● In addition to the line-of-sight path, a single reflected path is added in the two-
ray ground reflection model.
● This model takes into account the phenomenon of reflection from the ground and
the antenna heights above the ground. The ground surface is characterized by
reflection coefficient - R which depends on the material properties of the surface
and the type of wave polarization.
● The transmitter and receiver antennas are of heights h t and hr respectively and
are separated by the distance of d meters.
Page | 30
[Figure.1 - Two ray ground reflection model]
● The received signal consists of two components: LOS ray that travels the free
space from the transmitter and a reflected ray from the ground surface.
● The distances traveled by the LOS ray and the reflected ray are given by -
● Depending on the phase difference (ϕ) between the LOS ray and reflected ray,
the received signal may suffer constructive or destructive interference. Hence,
this model is also called as two ray interference model.
where, λ is the wavelength of the radiating wave that can be calculated from the
transmission frequency. Under large-scale assumption, the power of the received
signal can be expressed as -
Example:
● The following piece of code implements all the equations and plots the received
power (Pr) against the separation distance (d).
● The resulting plot for f = 900 MHz, R = -1, ht = 50 m, hr = 2 m, Glos = Gref = 1
● In this plot, the transmitter power is normalized such that the plot starts at 0
dBm.
Page | 31
● The plot also contains approximations of the received power over three regions.
MATLAB Code:
f=900e6; %frequency of transmission (Hz)
R = -1; %reflection coefficient
Pt = 1; %Transmitted power in mW
Glos=1;%product of tx,rx antenna patterns in LOS direction
Gref=1;%product of tx,rx antenna patterns in reflection
direction
ht = 50;%height of tx antenna (m)
hr = 2;%height of rx antenna (m)
d=1:0.1:10^5;%separation distance between the tx-rx antennas(m)
L = 1; %no system losses
%Two ray ground reflection model
d_los= sqrt((ht-hr)^2+d.^2);%distance along LOS path
d_ref= sqrt((ht+hr)^2+d.^2);%distance along reflected path
lambda = 3*10^8/f; %wavelength of the propagating wave
phi = 2*pi*(d_ref-d_los)/lambda;%phase difference between the
paths
s = lambda/(4*pi)*(sqrt(Glos)./d_los +
R*sqrt(Gref)./d_ref.*exp(1i*phi));
Pr = Pt*abs(s).^2;%received power
Pr_norm = Pr/Pr(1);%normalized received power to start from 0
dBm
semilogx(d,10*log10(Pr)); hold on; ylim([-160 -55]);
title('Two ray ground reflection model');
xlabel('log_{10}(d)');
ylabel('Normalized Received power (in dB)');
%Approximate models in three difference regions
dc=4*ht*hr/lambda; %critical distance
d1 = 1:0.1:ht; %region 1 -- d<=ht
d2 = ht:0.1:dc; %region 2 -- ht<=d<=dc
d3 = dc:0.1:10^5; %region 3 -- d>=dc
K_fps = Glos*Gref*lambda^2/((4*pi)^2*L);
K_2ray = Glos*Gref*ht^2*hr^2/L;
Page | 32
Pr1 = Pt*K_fps./(d1.^2 + ht^2);%received power in region 1
Pr2 = Pt*K_fps./d2.^2;%received power in region 2
Pr3 = Pt*K_2ray./d3.^4;%received power in region 3
semilogx(d1,10*log10(Pr1),'k-.'); %Pr in region 1
semilogx(d2,10*log10(Pr2),'r-.'); %Pr in region 2
semilogx(d3,10*log10(Pr3),'g-.');%Pr in region 3
grid on
h=line([ht ht],[-160 -55]);set(h,'Color','m');
h=line([dc dc],[-160 -55]);set(h,'Color','m');
RESULT:
● The distance that is denoted as dc in the plot, is called the critical distance. It is
calculated dc = 4hthr / λ.
Page | 33
● For the region beyond the critical distance, the received power falls-off at -40
dB/decade rate.
Conclusion:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Aim:
To study and analyse single knife-edge diffraction Model using MATLAB program.
Theory:
● The model depicted in Figure.1 considers two idealized cases where a sharp
obstacle is placed between the transmitter and the receiver. Using all the
geometric parameters as indicated in the figure, the diffraction loss can be
estimated with the help of a single, dimension-less quantity called Fresnel-
Krichhoff diffraction parameter - ‘v’.
Page | 34
[Figure.1 - Diffracting single knife edfe obstacle having (a) Positive Height and (b)
negative height]
● Based on the availability of information, any of the following equation can be
used to calculate this parameter -
where, C(n) and S(n) are respectively the real and imaginary part of the the
complex Fresnel integral F(n) given by -
● The diffraction gain/loss in the equation of G(v) can be obtained using numerical
methods which are quite involved in computation. However, for the case where
v > -0.7, the following approximation can be used -
RESULT:
Page | 36
● Finally, the single knife-edge diffraction model can be coded into a function as
follows. It also incorporates equation 10.16 that help us find the n th Fresnel zone
obstructed by the given obstacle.
Page | 37
n = 2*delta/lambda; %Fresnel zone at the tip of obstruction
Example:
As an example, using the sample script below, we can determine the diffraction loss
incurred for d1 = 10 Km, d2 =5 Km and h=20 m at frequency 10 GHz. The computed
diffraction loss will be LdB =21.969 dB.
Conclusion:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Aim:
To study and write a MATLAB program to find the custer size for different values of i
and j and also find the Q - factor.
Page | 38
Theory:
● Cellular radio systems rely on an intelligent allocation and reuse of channels
throughout a coverage region. Each cellular base station is allocated a group of
radio channels to be used within a small geographic area called a cell.
● Base stations in adjacent cells are assigned channel groups which contain
completely different channels than neighbouring cells. The base station antennas
are designed to achieve the desired coverage within the particular cell.
● The design process of selecting and allocating channel groups for all of the
cellular base stations within a system is called frequency reuse or frequency
planning.
● The capacity of a cellular system is directly proportional to the number of times
a cluster is replicated in a fixed service area. The factor N is called the cluster
size.
● In order to connect without gaps between adjacent cells—the geometry of
hexagons is such that the number of cells per cluster N, can only have values
which satisfy Equation:
MATLAB Program:
Page | 39
clc;
clear all;
close all;
i=0;j=0;k=1;
for i=0:10
for j=1:10
N(k)=(i^2)+(j^2)+(i*j); k=k+1;
if k==26 break
end
end
if k==26
break
end
end
N=sort(N)
Q=(3*N).^0.5
plot(N,Q)
xlabel('Number of cells per cluster');
ylabel('Co-channel Reuse Ratio');
grid on
RESULT:
N=
Columns 1 through 20
1 3 4 7 7 9 12 13 16 19 21 25 28 31 36 39 43 49
57 64
Columns 21 through 25
73 81 91 100 111
Q=
Columns 1 through 12
1.7321 3.0000 3.4641 4.5826 4.5826 5.1962 6.0000 6.2450 6.9282
7.5498 7.9373 8.6603
Columns 13 through 24
Page | 40
9.1652 9.6437 10.3923 10.8167 11.3578 12.1244 13.0767 13.8564
14.7986 15.5885 16.5227 17.3205
Column 25
18.2483
Conclusion:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Aim:
Theory:
Page | 41
● Diversity is a powerful communication recierver technique that provides
wireless link improvement at relatively low cost.diversity reiqires no
training overhead since a training sequence is not required by the
transmmitter.there are a wide range of diversity implementation with little
added cost.
● The diversity concept can be explained simply if one radio path undergoes
a deep fade, another independent path may have a strong signal.by having
more than one path to select from both the instaneous and average SNRs at
the reciever may be improved,often by as much as 20 dB to 30 dB.
Diversity Techniques:
● Combining the multiple signals in such a fashion so as to reduce the effects
of excessive deep fades.
Diversity
Macro Micros
Macroscopic Diversity:
Page | 42
● Prevent large scale fading
● Large scale fading is caused by shadowing due to variation in both the
terrain profile and the nature of the surrounding. Large scale fading is log
normally distributed signal.
● This fading is prevented by selecting an antenna which is not shadowed
when others are, this allows increase in signal to noise ratio.
Microscopic Diversity:
● Prevents small scale fading
● This fading is prevented by selecting an antenna which gives strong signal that
mitigates this small signal fading effect.
Space Diversity:
Page | 43
● The space diversity method is also called as the antenna diversity technique. In
the conventional methods of wireless communication the availability of direct
path between transmitter and receiver is not assured.
● Hence, the occurrence of Rayleigh fading will br present. The antenna space
diversity can achieve independent fading changes by applying spatially
separated antennas.
● In the space diversity method the receiver configuration is simple. Several
number of diversity branches are selectable.
● For producing diversity reception at each and every cell site, multiple base
station receiving antennas are effectively used. Generally the space diversity
technique can be used at the base station or mobile or at both the ends.
● A method of transmission or reception, or both, in which the effects of fading are
minimized by the simultaneous use of two or more physically separated
antennas, ideally separated by one half or more wavelengths
Selection Diversity
● In selective diversity combining the branches having the strongest received
signal will be selected. Selecting the best signal among all the signals received
from different braches at the receiving end.
● In selective diversity technique ‘n’ number of demodulator are used and their
gains can be adjusted to give mean signal to noise ratio for every diversity
branches. Then antenna signals will be sampled. Finally the best signal that
possesses good signal strength will be sent to the demodulators
Feedback Diversity
● The feedback diversity is called as scanning diversity. In this method the ‘n’
signals are scanned in proper sequence and monitored to pick a signal in the
sequence that is above the threshold value. The scanning process will be initiated
Page | 44
for received signals. But the drawback of this method is that the fading level
reduction is less than the other diversity methods.
● The advantage of feedback diversity is easier implementation than other
diversity technique. It needs only one receiver.
Polarization Diversity
● Polarization diversity relies on the decorrelation of the two receive ports to
achieve diversity gain. The two receiver ports must remain cross-polarized.
Effective Diversity is obtained with a Correlation Coefficient below 0.7In order
to keep the correlation at this level space diversity at a base station requires
antenna spacing of up to 20 wavelengths for the broadside case, and even more
for the inline case. Polarization diversity at a base station does not require
antenna spacing. At the base station, space diversity is considerably less
Page | 45
practical than at the mobile because the narrow angle of incident fields requires
large antenna spacing. The comparatively high cost of using space diversity at
the base station prompts the consideration of using orthogonal polarization.
Polarization diversity provides two diversity branches and allows the antenna
elements to be considered.
Frequency Diversity
● The same information signal is transmitted and received simultaneously on two
or more independent fading carrier frequencies. The rationale behind this
technique is that frequencies separated by more than the coherence bandwidth of
the channel will not experience the same fade. The probability of simultaneous
fade will be the product of the individual fading probabilities. This is often
employed in microwave LOS links which carry several channels in a frequency
division multiplex mode (FDM).
● This technique not only requires spare bandwidth, but also requires that there be
as many receivers as there are channels used for the frequency diversity.
However, for critical traffic, the expense may be justified.
Time Diversity
● The signals representing the same information are sent over the same channel at
different times. Time Diversity repeatedly transmits information at time spacing
that exceeds the coherence time of the channel.
● Multiple repetitions of the signal will be received with multiple fading
conditions, thereby providing for diversity. A modern implementation of time
diversity involves the use of RAKE receiver for spread spectrum CDMA, where
multipath channel provides redundancy in the transmitted message.
Directional Diversity
● The received signal will arrive from different incidents angles because of one of
the propagation methods reflection diffraction or scattering around the mobile
terminals.
Page | 46
● By using selective directive antennas the independent faded signals can be
received. Directional diversity is suitable to apply in mobile terminal end where
limited directional of signals at base station is linked.
Path Diversity
● In path diversity technique, the signals are coherently combined, that is both the
directed and delayed signals component are combined together. Thus the
diversity branches are generated only after signal reception.
● This method is called as implicit diversity. This method is sensitive to Rayleigh
fading conditions. Hence the propagation path conditions need to be given more
attention. The diversity gain will depend on the delay status.
Conclusion:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
___________________________________________________________________________
Page | 47
Aim:
To study about mobile trainer system
Apparatus:
Mobile trainer
Theory:
● We are rapidly moving towards the establishment of a Global Village. Soon, no place
will be considered in accessible and data will be available in any corner of the world,
probably at of a button. The key growth of these proportions has been “Networking”.
● The Mobile Trainer system provides a platform to understand the hardware and software
requirements to implement a GSM Mobile Communication protocols.
● The Mobile trainer is an easy medium of learning the fundamental concept in Mobile
Communication. The main focus of Mobile Trainer system is in opening up a whole new
world for you, some advanced mobile computing/ networking concepts like SMS,
dialing, voice calls
● Standards and other Mobile Network protocols also are experimented on vis-à-vis the
existing environment.
Page | 48
Hardware Specifications
Dual band 900 / 1800 MHz GSM / GPRS Modem. Data, SMS, Voice.
Remote control by AT commands (according to GSM 07.07 and GSM 07.05).
Maximum output power 2W for GSM 900: 1W for GSM 1800.
Input voltage 5.5v to 12 v DC.
Current 1.8A peak at 5.5v, 330mA average at 5.5v
Onboard Details:
1. Antenna connection port
2. TP for Antenna Signal GMSK_Mode
3. TP for Battery Voltage(Output Charging Voltage)
4. Battery Power key
5. TP Charging Voltage
6. JTAG Downloader port
7. Jumper setting for Module power
8. TP for Vibrator PWM signal
9. TP for Buzzer PWM signal
10. RS- 232 Port using PC and GSM Module connection
11. RS- 232 Port using CPU and GSM Module connection(Mobile trainer works like
Standalone)
12. Vibrator ON/OFF Switch
13. Battery charger unit
14. CPU Section
15. GSM Module(SIM300C)
16. HandFree Unit(Include Mike and Speaker I/O Signals)
17. SIM Signals Section
18. Audio Output signal
19. Audio input signal
20. SD Section
21. Power supply
22. Power Switch
23. power supply Different Voltages
24. General Purpose area
25. RESET
26. LCD Power ON/OFF switch
27. 4*4 matrix Keyboard Signals section
28. Microcontroller ports
29. LCD Signals Section
30. LCD Display(LAMPEX_LG128642_Dispaly)
31. 4*4 Matrix Keyboard
Page | 49
Introduction to Cellular Telephone Basics:
● Cellular radio provides mobile telephone service by employing a network of cell sites
distributed over a wide area.
● A cell site contains a radio transceiver and a base station controller which manages,
sends, and receives traffic from the mobiles in its geographical area to a cellular
telephone switch. It also employs a tower and its antennas, and provides a link to the
distant cellular switch called a mobile telecommunications switching office.
● This MTSO places calls from land based telephones to wireless customers, switches
calls between cells as mobiles travel across cell boundaries, and authenticates wireless
customers before they make calls. Cellular uses a principle called frequency reuse to
greatly increase customers served.
● Low powered mobiles and radio equipment at each cell site permit the same radio
frequencies to be reused in different cells, multiplying calling capacity without
creating interference.
● This spectrum efficient method contrasts sharply with earlier mobile systems that used
a high powered, centrally located transmitter, to communicate with high powered car
mounted mobiles on a small number of frequencies, channels which were then
monopolized and not re- used over a wide area.
● Cellular uses a principle called frequency reuse to greatly increase customers served.
Low powered mobiles and radio equipment at each cell site permit the same radio
frequencies to be reused in different cells, multiplying calling capacity without
creating interference.
● This spectrum efficient method contrasts sharply with earlier mobile systems that used
a high powered, centrally located transmitter, to communicate with high powered car
mounted mobiles on a small number of frequencies, channels which were then
monopolized and not re- used over a wide area.
Page | 50
● Complex signaling routines handle call placements, call requests, handovers, or
call transfers from one cell to another, and roaming, moving from one carrier's
area to another. Different cellular radio systems use frequency division
multiplexing (analog), time division multiplexing (TDMA), and spread spectrum
(CDMA) techniques.
● Despite different operating methods, AMPS, PCS, GSM, E-TACS, and NMT are
all cellular radio. That's because they all rely on a distributed network of cell sites
employing frequency re-use. Is your head spinning yet? Let's ease into this
cellular discussion by discussing some history first. improve on the results of
TDMA.
GSM
● GSM (Global System for Mobile communication) is a digital mobiletelephone
system that is widely used in the world. GSM uses a variation of Time Division
Multiple Access (TDMA) and is the most widely used of the three digital wireless
telephone technologies (TDMA, GSM, and CDMA). GSM digitizes and
compresses data, then sends it down a channel with two other streams of user data,
each in its own time slot. It operates at either the 90 MHz or 1,800 MHz frequency
band.
Page | 51
Mobile Frequency Rx: 925-960; Tx: 880-915
Range
Our GSM Modem makes integration as simple as possible, it is a stand-alone device, and can
able to fitted with standard interfaces, for a power supply, an antenna, a buzzer, a PC, and a
Microcontroller based system, with its plug & play technology making it very easy to put
into operation.
The Mobile Trainer has 2-modes of operations, One is to control the GSM Module by
GSM software present in the PC, and second way of controlling the GSM Module is through
Microcontroller.
Page | 52
The Mobile Trainer system provides the student a platform to understand the hardware
and software requirements to implement an GSM Mobile Communication protocols.
The Mobile trainer is an easy medium of learning the fundamental concept in Mobile
Communication. The main focus of Mobile Trainer system is in opening up a whole new
world for you, some advanced mobile computing/ networking concepts like SMS, dialing,
voice calls standards and other Mobile Network protocols also are experimented on vis-à-vis
the existing environment.
SIM cards are available in two standard sizes. The first is the size of a credit card (85.60 mm
× 53.98 mm x 0.76 mm). The newer, more popular miniature-version has a width of 25
mm, a height of 15 mm, and a thickness of 0.76 mm. However most SIM cards are supplied
as a full- sized card with the smaller card held in place by a few plastic links and can be
easily broken off to be used in a phone that uses the smaller SIM.
Each SIM is Internationally identified by its ICC-ID (Integrated Circuit Card ID). ICCID’s
Page | 53
are stored in the SIM card and are also engraved or printed on the SIM card body during a
process called personalization. The ICCID is defined by the ITU-T recommendation E.118.
The number is up to 18 digits long and in addition is often associated with a single check
digit calculated using the Luhn algorithm.
SIM cards are identified on their individual operator networks by holding a unique
International Mobile Subscriber Identity. Mobile operators connect mobile phone calls and
communicate withtheir market SIM cards using their IMSI.
Authentication key (Ki) - The Ki is a 128-bit value used in authenticating the SIM’s on the
mobile network. Each SIM holds a unique Ki assigned to it by the operator during the
personalization process.
The Ki is also stored on a database (known as Authentication Center or AuC) on the carrier’s
network.
C. SD Card Holder
Secured Digital Card of capacity 1GB
AT Command Syntax
The “AT” or "at” prefix must be set at the beginning of each command line. To terminate a
command line enter <CR>.
The AT command set implemented by SIM300 is a combination of GSM07.05,
GSM07.07 and ITU-T recommendation V.25ter and the AT commands developed by
SIMCOM.tax
Page | 54
AT Commands
Page | 55
Page | 56
Conclusion:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
__________________________________________________________________________
Page | 57
EXPERIMENT NO: 10 DATE: / /
Aim:
To understand and read the content of SIM Card
Prior Concepts:
Knowledge of mobile handset
● SIM (Subscriber Identification Module): It is a removable unit that can be
inserted in the handset by user. Any GSM terminal capable of receiving a
detachable SIM card can become the user's Mobile Station- (MS) with the SIM
card is inserted into it.
AT +CIMI
It is a command that is used to to read and identify the IMSI (International Mobile
Subscriber Identity) of the SIM card.
Command Syntax: AT +CIMI
Possible response: 208200120320599 (IMSI is a 15-digit number.)
AT +CCID
It is a command that orders the handset to read card 10 i.e. EF-CCIO file on the SIM
card. Command Syntax: AT +CCIO
Possible response: +CCIOD123456789AB111121314D
Command AT+CCID
Response = +CCID0123456789AB1111213140 I
AT +CPBS
AT +CPBR
This command is used to read a special entry or range of entries from phone book
memory storage.
Command syntax
AT +CPBR = <index1> [,<index2>]
<index1>,<index2>: Integer type values in the range of location numbers of
Phone book memory.
Note: This command is used only after AT +CPBS command.
For example:
AT +CPBF
This command is used to find a phone book entry using a search string.
Command syntax:
AT +CPBF = <find text>
For example:
AT+CPBF AT+CPBF=? AT+CPBF=”Anant”
AT +CPBW
Page | 59
This command is used to write a phone book entry to a special place in the phone book
memory storage.
Command syntax:
AAT+CPBW=5,”9480452631”,161,”Anant”
Conclusion:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
__________________________________________________________________________
Page | 60
3171004 Wireless Communication
Aim:
To observe and understand the process of call connection and call release of
mobile system.
Proposition: Making a call from landline phone to mobile unit. The call can
be made from landline phone to mobile unit as below:
Lift up the receiver or put the phone in speaker mode and dial the number after
you hear the dial tone.
ATD
This command is used to establish a voice call
ATD9986708608; Call any number (Dial
Number
Directly)
Command
AT D< nu mb e r>;
Response
OK / BUSY / NO ANSWER
• AT DL
This command is used to redial the last dialed number.
ATDL; Redials the last dialed
number
• AT A
This command is used to accept an incoming call.
Page | 61
3171004 Wireless Communication
Response
OK if voice Call / ERROR
• ATH
This command is used to end the call
• AT+CCFC
This command is used to set the call forwarding service.
• AT +CLlP
This command is used to set and request the status of calling line identification
service .
• AT+ CL CK
This command is used to set network facilities. Special calls could be barred
and passwords could be changed.
• AT+CPAS
This command is used to request the phone activity status.
Conclusion:
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
Page | 62