Comparative analysis of OFDM and GFDM

Muhammad Sameen, Adnan A. Khan, Inam Ullah Khan, Nazia Azim, Tahir Zaidi, Naveed Iqbal

Abstract


In recent past there are multiple, multicarrier techniques as an alternate of OFDM like Filter Bank Multi-Carrier (FBMC), Universal Filtered Multi-Carrier (UFMC) and Generalized Frequency Division Multiplexing (GFDM) as upcoming 5th Generation cellular systems. Performance of GFDM and OFDM needs to be investigated, since GFDM is increasing the performance of cellular communication system, so it needs to analyses the waveforms of both the techniques. In this work, we have checked the main characteristics of proposed wave forms and the relevant features. We conducted comparative analysis between GFDM and OFDM Bit error rate (BER) vs. Signal to Noise Ratio (SNR). GFDM is flexible in nature and its orthogonality gives it an edge over OFDM and which make it most suitable for the 5G technology.

 


References


P. W. Baier, “Cdma or tdma? cdma for gsm?”

Steve and Punter, “Cdma vs. tdma,” http://www.arcx.com/sites/ CDMAvsTDMA.htm.

R. Browning, “Cee-dee-m-aae,” http://www.imobile.com.au/buyer/ default.asp?ID=buyersep0201.

D. R. M. Bellanger, D. LeRuyet and M.Terre, FBMC physical layer: a primer, 2010.

L. Mailaneder, “Complexity comparison of ofdm and cdma for wideband communication systems,” 2006, pp. 1–5.

Fida, N., Khan, F., Jan, M. A., & Khan, Z., (2017). Performance Analysis of Vehicular Adhoc Network using different Highway Traffic Scenarios in Cloud Computing. Future5v Conference, Lecture Notes in Computer Science, Springer. In Press.

Khan, F., Khan, M., Iqbal. Z., Rahman, I., &Alam, M. (2017). Secure and Safe Surveillance System using Sensors Networks - Internet of Things. Future5v Conference, Lecture Notes in Computer Science, Springer. In Press.

Khan, F., Rahman, I., Khan, M., Iqbal, N., &Alam, M., (2017). CoAP-based Request-Response Interaction Model for the Internet of Things. Future5v Conference, Lecture Notes in Computer Science, Springer. In Press.

Younas, N., Asghar, Z., Qayyum, M., & Khan. F., (2017). Education and Socio Economic Factors Impact on Earning for Pakistan- A Bigdata Analysis. Future5v Conference, Lecture Notes in Computer Science, Springer. In Press.

Khan, F., & Nakagawa, K. (2013). Comparative study of spectrum sensing techniques in cognitive radio networks. In Computer and Information Technology (WCCIT), 2013 World Congress on (pp. 1-8). IEEE.

Khan, F., Bashir, F., & Nakagawa, K. (2012). Dual head clustering scheme in wireless sensor networks. In Emerging Technologies (ICET), 2012 International Conference on (pp. 1-5). IEEE.

Khan, F., Kamal, S. A., &Arif, F. (2013). Fairness improvement in long chain multihop wireless ad hoc networks. In 2013 International Conference on Connected Vehicles and Expo (ICCVE) (pp. 556-561). IEEE.

Khan, F. (2014). Secure communication and routing architecture in wireless sensor networks. In 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE) (pp. 647-650). IEEE.

Khan, S., & Khan, F. (2015). Delay and Throughput Improvement in Wireless Sensor and Actor Networks. In 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW) (pp. 1-8).

M. Usman, M. A. Jan, and X. He, “Cryptography-based Secure Data Storage and Sharing Using HEVC and Public Clouds,” Elsevier Information sciences, “accepted”, 2016.

Jan, M., Nanda, P., Usman, M. and He, X., 2016. PAWN: a payload‐based mutual authentication scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience.

M. Usman, M. A. Jan, X. He and P. Nanda, “Data Sharing in Secure Multimedia Wireless Sensor Networks,” in 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), “accepted”, 2016.

M.A. Jan, P. Nanda, X. He, R.P. Liu, A Sybil attack detection scheme for a forest wildfire monitoring application, Future Generation Computer Systems (2016), http://dx.doi.org/10.1016/j.future.2016.05.034

Khan, F., Jan, S. R., Tahir, M., Khan, S., &Ullah, F. (2016). Survey: Dealing Non-Functional Requirements at Architecture Level. VFAST Transactions on Software Engineering, 9(2), 7-13.

Khan, F., Khan, S., & Khan, S. A. (2015, October). Performance improvement in wireless sensor and actor networks based on actor repositioning. In 2015 International Conference on Connected Vehicles and Expo (ICCVE) (pp. 134-139). IEEE.

Jabeen, Q., Khan, F., Khan, S., & Jan, M. A. (2016). Performance Improvement in Multihop Wireless Mobile Adhoc Networks. the Journal Applied, Environmental, and Biological Sciences (JAEBS), 6(4S), 82-92.

Khan, F. (2014, May). Fairness and throughput improvement in multihop wireless ad hoc networks. In Electrical and Computer Engineering (CCECE), 2014 IEEE 27th Canadian Conference on (pp. 1-6). IEEE.

Khan, S., Khan, F., Arif, F., Q., Jan, M. A., & Khan, S. A. (2016). Performance Improvement in Wireless Sensor and Actor Networks. Journal of Applied Environmental and Biological Sciences, 6(4S), 191-200.

Khan, F., Jan, S. R., Tahir, M., & Khan, S. (2015, October). Applications, limitations, and improvements in visible light communication systems. In2015 International Conference on Connected Vehicles and Expo (ICCVE)(pp. 259-262). IEEE.

Younas. N, Asghar, Z, Qayyum. M,& Khan. F. Education and Socio Economic Factors Impact on Earning for Pakistan- A Bigdata Analysis

Jabeen, Q., Khan, F., Hayat, M. N., Khan, H., Jan, S. R., &Ullah, F. (2016). A Survey: Embedded Systems Supporting By Different Operating Systems. International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN, 2395-1990.

Tahir, M., Khan, F., Babar, M., Arif, F., Khan, F., (2016) Framework for Better Reusability in Component Based Software Engineering. In the Journal of Applied Environmental and Biological Sciences (JAEBS), 6(4S), 77-81.

Khan, S., Babar, M., Khan, F., Arif, F., Tahir, M. (2016). Collaboration Methodology for Integrating Non-Functional Requirements in Architecture. In the Journal of Applied Environmental and Biological Sciences (JAEBS), 6(4S), 63-67

Shabana, K., Fida, N., Khan, F., Jan, S. R., &Rehman, M. U. (2016). Security issues and attacks in Wireless Sensor Networks. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), 5(7), pp-81.

Zeeshan, M., Khan, F., & Jan, S. R. (2016). Congestion Detection and Mitigation Protocols for Wireless Sensor Networks. International Journal of Scientific Research in Computer Science, Engineering and Information Technology

Hayat, M. N., Khan, F., Khan, H., Khan, M. Y., & Shah, M. (2016). Review of Cluster-based Energy Routing Protocols for WSNs. International Journal of Interdisciplinary Research Centre

Zeeshan, M., Khan, F., & Jan, S. R. (2016). Review of various Congestion Detection and Routing Protocols in Wireless Sensor Networks. International Journal of Interdisciplinary Research Centre

Khan, H., Hayat, F., Khan, M. N., Khan, M. Y., & Shah, M. (2016). A Systematic Overview of Routing Protocols in WSNs. International Journal of Advanced Research in Computer Engineering & Technology, 5(7), pp-2088.

Khan. W., Javeed. D., Khan. M.T., Jan. S.R., Khan, F. (2016). Applications of Wireless Sensor Networks in Food and Agriculture Sectors. International Journal of Advanced Research in Computer Engineering & Technology, 5(6), pp-2048.

M. A. Jan, P. Nanda, X. He, Z. Tan and R. P. Liu, “A robust authentication scheme for observing resources in the internet of things environment” in 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 205-211, 2014, IEEE.

M. A. Jan, P. Nanda and X. He, “Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN,” in Wired/Wireless Internet Communication, Lecture Notes in Computer Science, pp. 154–167, Springer, Berlin, Germany, 2013.

Khan. M.Y, Shah. M, Khan. H, Hayat. M.N, Khan. F. (2016). Amplified Forms of LEACH based Clustering Protocols for WSNs- A Survey, International Journal of Advanced Research in Computer Engineering & Technology, 5(6), pp.2053.

Alam, M., Yang, D., Huq, K., Saghezchi, F., Mumtaz, S., & Rodriguez, J. (2015). Towards 5G: Context Aware Resource Allocation for Energy Saving. Journal of Signal Processing Systems, 83(2), 279–291. doi:10.1007/s11265-015-1061-x

Alam, M., Trapps, P., Mumtaz, S., & Rodriguez, J. (2016). Context-aware cooperative testbed for energy analysis in beyond 4G networks. Telecommunication Systems. doi:10.1007/s11235-016-0171-5

Alam, M., Albano, M., Radwan, A., & Rodriguez, J. (2013). CANDi: context-aware node discovery for short-range cooperation. Transactions on Emerging Telecommunications Technologies, 26(5), 861–875. doi:10.1002/ett.2763

M. A. Jan, P. Nanda, X. He and R. P. Liu, “Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network”, 2013 IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC & EUC), pp. 1400-1407, 2013.

M. A. Jan, P. Nanda, X. He and R. P. Liu, “PASCCC: Priority-based application-specific congestion control clustering protocol” Computer Networks, Vol. 74, PP-92-102, 2014.

M. A. Jan, P. Nanda, X. He and R. P. Liu, “A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network” in Trustcom/BigDataSE/ISPA, Vol.1, PP-318-325, 2015, IEEE.

Alam, M., Mumtaz, S., Saghezchi, F. B., Radwan, A., Rodriguez, J. (2013). Energy and Throughput Analysis of Reservation Protocols of Wi Media MAC. Journal of Green Engineering, 3(4), 363–382. doi:10.13052/jge1904-4720.341


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Creative Commons License
IJACTA is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. Based on a work at www,ijacta.com.