WiMAX System Simulation and Performance Analysis under the Influence of Jamming
Rakesh Jha, Hardik Patel, Upena D. Dalal, Wankhede A. Vishal
.
DOI: 10.4236/wet.2010.11004   PDF    HTML     10,595 Downloads   20,276 Views   Citations

Abstract

This paper presents simulation of WiMAX based system under jamming. The performance of the system was found out to greatly differ with the use of different jamming signals, allowing central areas to be identified, where system devel-opment should be focused on. In addition, from the basic theory point of view, rather surprising results were also found. This work should give a clear picture of how the studied WiMAX system performs under jamming as well as without jamming. The results show that some forms of interference degrade the performance of the system rapidly, thus the form of incoming jamming should be known and considered before deploying the system. Single carrier jamming and multi–carrier jamming are discussed here. The issues related to jamming and jamming reduction techniques are also covered. Jamming can destroy communication in the targeted area. Multi–carrier jamming is challenge in WiMAX because WiMAX is having OFDM based physical layer. Simulation is the main approach in this paper. OPNET MODELER 14.5 is the software used for the simulation purpose.

Share and Cite:

R. Jha, H. Patel, U. Dalal and W. Vishal, "WiMAX System Simulation and Performance Analysis under the Influence of Jamming," Wireless Engineering and Technology, Vol. 1 No. 1, 2010, pp. 20-26. doi: 10.4236/wet.2010.11004.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] J. G. Andrews, A. Ghosh and R. Muhamed, “Fundamen-tals of WiMAX Understanding Broadband Wireless Networking,” Prentice-Hall, Upper Saddle River, 2007.
[2] S. Haykin and M. Moher, “Modern Wireless Communi-cation,” Prentice-Hall, Upper Saddle River, 2005.
[3] S. Ahson, M. Ilyas, S. Ahson and M. Ilyas, “WiMAX Standards and Security,” CRC Press, Boca Raton, 2008.
[4] T. Shon and W. Choi, “An Analysis of Mobile WiMAX security: Vulnerabilities and Solutions,” Lecture Notes in Computer Science, Springer Berlin, Vol. 4658, 2007, pp. 88-97.
[5] C. L. Luo, “A Simple Encryption Scheme Based on WiMAX,” Department of Electronics Jiangxi University of Finance and Economics Nanchang, China, 2009.
[6] B. Makarevitch, “Jamming Resistant Architecture for WiMAX Mesh Network,” Communications Laboratory, Helsinki University of Technology, Helsinki, June 2006.
[7] J. Li and S.-G. H?ggman, “Performance of IEEE 802.16 Based System in Jamming Enviornment and its Im-provement with Link Adaption,” The 17th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’06), 2006, Helsinki, pp. 1-5.
[8] M. Nasreldin, H. Aslan, M. El-Hennawy and A. El-Hen- nawy, “WiMAX Security,” 22nd International Conference on Advanced Information Networking and applica-tions, Ginowan, 2008, pp. 1335-1340.
[9] White Paper by Motorola, “WiMAX Security for Real– World Network Service Provider Deployments,” 2007.
[10] IEEE 802.16 Working Group, “IEEE 802.16–2004 Local and Metropolitan Area Networks – Part 16: Air Interface for Fixed Broadband Wireless Access Systems IEEE Standard for Local and Metropolitan Area Networks,” IEEE Computer Society Press, 2004.
[11] IEEE 802.16 Working Group, “IEEE 802.16e–2005 IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed and Mobile Broadband Wire-less Access Systems Amendment for Physical and Me-dium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands,” IEEE Computer Society Press, 2005.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.