ImageVerifierCode 换一换
格式:DOCX , 页数:11 ,大小:123.74KB ,
资源ID:3773545      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/3773545.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ofdm实现文档.docx)为本站会员(b****4)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

ofdm实现文档.docx

1、ofdm实现文档Design overviewThe OFDM technique (Orthogonal Frequency Division Multiplexing) has been used in the last years in applications that require a huge transmission rate like ADSL modem, wireless network (Wi-Fi 802.11), DVB (Digital Video Broadcasting) and DAB (Digital Audio Broadcasting). In all

2、 these cases, one needs to implement an integrated circuit (IC) that performs the necessary chip functions. For prototyping circuits FPGA is better choice than using ASIC (application Specific Integrated Circuit), CUSTOM or SEMICUSTOM. FPGA implementations because avoid the: Initial costs; Great dev

3、elopment time and the inherent risks of conventional ASIC. So, in this way, the development of high advanced techniques of digital data transmission and the actual FPGA stage of integration make possible the building all the circuits that compounds a digital communication systems in an unique chip.

4、To make use of this modern technologies of data transmission, it is necessary the development efficient techniques of digital modulation. The OFDM is the biggest utilized recently, principally, because of it use the efficient FFT to do the modulation.This work describes how implement an OFDM modem o

5、n FPGA using VHDL for a 31 subcarrier (channels) OFDM system using 64 points radix-4 FFT time decimation, a CORDIC implementation to perform the butterfly calculus, and each channel modulation will use a 4-QAM constellation. The system is divided in a transmission section and a reception section. Bl

6、ock diagramDetailed descriptionIntroductionBasically, OFDM technique consists of dividing the flow of entrance data over orthogonal channels. In this way, and based on the orthogonality principle, the interference between each transmission channel is minimal. Another advantage that comes from this a

7、pproach is related to the assumptions about the noise in each channel. Over a large and unique passband channel it is difficult (impossible in fact, in many situations) to assume that the model noise is AWGN (Additive Noise Gaussian Noise). That is important because if the model is know, and it is c

8、orrect, one can select the best way of frequency equalization. But, in large passband channels (tenths of Mhz) the noise model is unknown and unpredictable. The solution of dividing a unique channel in subchannels simplifies the assumptions of the noise over each subchannel and, of course, one can s

9、uppose it approximately AWGN. In each one of these subchannels, a digital modulation is made, each one with a subcarrier that presents different frequency, in a such form that a channel does not intervene with another one, thus keeping the orthogonallity.The way of implementation and the orthogonall

10、ity property of a system of this type can vary sufficiently: since band pass filters each frequency until sophisticated techniques as the use of the FFT with guard interval, which is the used one for the OFDM.In literature, this technique has been called for some designations as orthogonally multipl

11、exed QAM (O-QAM), parallel quadrature AM, and so one. However, OFDM for wireless and DMT for systems wired (like DSL) are the most common designations that one can find in literature. As all the above techniques basically use the same principle, it is common to refer to them by means of a generic na

12、me: MCM (to Multi-Carrier Modulation). In that way, MCM is the technique in the general direction, and OFDM is related to the implementation of technique MCM using the FFT.ImplementationMapping the constellationThe encoder of the constellation maps the m bits of the channel in a point a + jb in the

13、constellation of the modulator. Decoding receives that point and the remap as the m transmitted bits.Encoder of the constellationIt is important to notice that in that mapping it is just made a conversion of bits for the fasor that acts, however it is not made any modulation, as in the case of QAM,

14、because that as shown, it is done by IFFT.It is necessary to specify how the constellation will be to be mapped, to implement that block. However, independently of the format of the constellation, the block encoder can be made through a consultation at a conversion table, implemented by LUT that exi

15、sts in LCs of FPGAs.For instance, for a 4-QAM constellation in such a way that a and b are binary numbers of 3 bits, and are converted to complement two.Attempt that the entrance of the encoder a binary number of m bits, and that the exit generates two binary numbers, one in phase, the, and other in

16、 quadrature, b, whose size is defined by IFFT.Decoder of the constellationIn the receiver, the point of the constellation transmitted it can have changed due to the noises of the transmission channel, mistake in the time of sampling of the receiver and several other causes.Therefore it is necessary

17、to define a threshold so that it can be made the decision on which point in the constellation the received sign is acting. That is the function of the decoder.For the system exemplified above the bit 0 is converted for 010b and the bit 1 for 110b. In that case, the decoder is implemented in a simple

18、 way, sticks to the most significant (that indicates the sign) bit to do the decoding, and generating a binary number of m bits again.For systems in that the constellation diagram is larger than 4-PSK it will be necessary the implementation of more advanced methods, like a neural network.The Hemetia

19、n symmetryAfter having mapped the N channels it is applied the Hermetian symmetry so that the modulation can be made by an IFFT. It is generated 2N+2 channels in symmetry.In the receiver, to the end of the processing of FFT, they are sent to the decoder only N channels, being eliminated the channels

20、 generated due to Hermetian symmetry.The Hermetian symmetry is implemented in agreement withfor k = 1, 2., N - 1, where N = N +1.For instance, to transmit N = 3 channels (d1, d2, d3) N = 4, 2N = 8 and k = 1, 2, 3. Applying in the above equation it is obtained the result shown in the following table.

21、Knowing that X0 = XN=4 = 0 + j0, is obtained in agreement with the Table 2 the result shown in the following equation:In that way, it can stay X0 and XN always in zero. While it is made XN+1 even X2n - i same to the conjugated of Xn-1.Being it conjugated of Z = a+jb the same of Z* = a- jb, then to d

22、o the operation of having conjugated he should move the sign of the imaginary part, in other words, to do a sign inversion. In hardware, the inversion of sign of a binary number in complement two.The (I)FFTThe modulation OFDM can be made through an IDFT. The fast implementation of IDFT, IFFT, can be

23、 used reducing the time of processing and the used hardware. The demodulation, in the same way, can be made by DFT, or better, by FFT, that is it efficient implementation.FFT calculates DFT with a great reduction in the amount of operations, leaving several existent redundancies in the direct calcul

24、ation of DFT. That efficiency is gotten at the cost of an additional step to reverse-order the data in order to be determined the final result. That additional step, since implemented efficiently, they wont increase in a significant way the complexity computational of the calculation. As result, FFT

25、 is an extremely efficient algorithm that provides a good implementation in hardware.For great values of N, the computational efficiency is gotten being broken DFT successively in smaller calculations. That can be made so much in the domain of the time, as in the domain of the frequency, as discusse

26、d ahead.Decimation in time and in frequencyAs mentioned, it is possible to divide the entrance of FFT successively generating small sequence in the domain of the time, for that the name decimation in the time, TD. It is also possible to become separated the sequence of exit of FFT successively, inst

27、ead of dividing the entrance. That implementation is called of decimation in the frequency, FD. The decimation can be used so much for FFT as for IFFT.It is possible to repeat the process until reaching the possible maximum level of division. In that point the basic block decimation is generated so

28、it will be used in the whole FFT (called butterfly). An example of the butterfly of the FFT radix-2 TD is in the following illustration.An example of a FFT radix-2 DT, for N = 8 are shown below. It is noticed that is necessary an alteration in the entrance of data, because he/she has to separate the

29、 equal part of the odd part.In the same way that the decimation in the time generates a butterfly, the decimation in the frequency generates a corresponding butterfly. However the alteration in the flow of data will have to be done in the exit, and no more in the entrance.Implementation of Butterfly

30、The sum used in the butterfly possesses the same algorithm, so much for FFT as for IFFT. To avoid overflow danger due to sum in complement two, it is made the extension of the sign in the binary number, repeating the most significant bit, like this to the if it adds 2 binary numbers of 10 bits, we w

31、ill have of first to do the extension of the sign, obtaining like this, two numbers of 11 bits, to do the sum, where the result will also be of 11 bits. That procedure has to be done every time that will add or to subtract a number.Already for the multiplication, the exit has to be of the size of th

32、e sum of the number of bits of the two multiplicands. In that way, to do the multiplication of two numbers of 10 bits, we will have to an exit of 20 bits. That procedure has to be done to each multiplication.If there is not impediment, it can be made a rotation for right (divisions for two) in the numbers and to reduce its size, since in the end of the procedure a corresponding multiplier is applied.The order as it will be made the butterfly is defined by the decimation of the radix. If it goes TD, first it is made multiplication and later the sum. If it goes FD, first it

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1