SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/
              International Journal of Engineering Research and Applications
                   (IJERA)            ISSN: 2248-9622     www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1056-1062
    Performance Analysis of Cyclic Redundancy Check(CRC)
  encoded Fixed WiMAX Wireless Communication System under
        Implementation of M-ary Quadrature Amplitude
                 Modulation(QAM) Technique
       Md. Abdul Halim1, Md. Ashraful Islam2, Tonima Islam3, Halida
                     Homyara4 and Mustari Zaman5
  1(Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.)
  2 (Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.)
  3 (Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.)
  4 (Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.)
  5(Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.)



ABSTRACT
         IEEE802.16     known     as    WiMAX           started its first deployment in developed countries
technology is a promised broadband wireless             replacing both commonly used Wi-Fi on one hand
technology that promises high-speed data                and traditional cellular standards such as 3G.
services up to the costumer end. The aim of this        WiMAX technology is broadband wireless
paper is the performance evaluation of Cyclic           technology, which transmitted on the line-of-sight
Redundancy Check (CRC) encoded fixed                    (LOS) and non line-of-sight (NLOS) transmission,
WiMAX system under different combinations of            operating in the 2 GHz to 11 GHz range and 10 GHz
M-ary quadrature amplitude modulation                   to 66 GHz range respectively. Furthermore,
techniques (QAM, 16-QAM and 64-QAM) and                 WiMAX systems, that support air interfaces access
different communication channels AWGN and               for fixed, nomadic, and mobile wireless
fading channels (Rayleigh and Rician). It offers        communications. The operation is wildly coverage
both line of sight and non-line of sight wireless       area LOS: 2-5 km and NLOS : 5-50 km [1-3]. IEEE
communication. In our research work, we                 802.16 is the standard to state the radio frequency of
investigated the physical layer performance on          fixed Broadband Wireless Access. WiMAX is the
the basis of bit error rate (BER) and signal to         trade name of ―IEEE 802.16 Standard‖. IEEE
noise ratio (SNR). This research work                   802.16 was first planned offer the last mile for
demonstrates that QAM modulations is better             Wireless Metropolitan Area Network (WMAN) with
than the 16-QAM and 64-QAM modulations                  the line of sight (LOS) of 30 – 50 km.
schemes of AWGN channels as it has the lowest
bit error rate (BER).                                   Basically the goal of WIMAX is to provide high
                                                        speed internet access to home and business
Keywords – AWGN, CRC, Fixed WiMAX,                      subscribers without wires. It supports legacy voice
Fading Channel, M-ary QAM                               systems, voice over IP, TCP/IP, and Application
                                                        with different QoS requirements. 802.16 consist of
                                                        the access point, base station and subscriber station.
I. INTRODUCTION                                         During a communication, all the information
Worldwide Interoperability for Microwave Access,
                                                        coming from a subscriber station go to the base
or WiMAX for short, is a next generation open
                                                        station and retransmitted back to subscriber station.
standard that seeks to serve users' increasing
                                                        Base station can handle multiple of subscriber
demands for high data throughput (broadband)
                                                        station. Two types of links are defined in this:-
services such as streaming media on the internet,
                                                         The downlink: From base station to the subscriber
live video conferencing, and mobile TV on
                                                        station.
computers as well as handsets and PDAs. WiMAX
                                                        The uplink: From subscriber station to the base
is expected to be integrated into the next generation
                                                        station. [4] In this paper, we focus on the physical
mass market consumer devices and to offer
                                                        layer of WiMAX system simulating on IEEE802.16
something that does not exist today – speeds similar
                                                        standards, which data transmitted on the
to cable and metropolitan area coverage while on
                                                        transmission channel. The transmission channel
the move, all for a much lower cost than we are used
                                                        component of AWGN(Additive white Gaussian
to today. WiMAX already offers broadband services
                                                        Noise) channel and Rician fading channel with
in many emerging and rural markets which are not
                                                        concatenated
supported by wireline-based technologies and

                                                                                             1056 | P a g e
Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/
               International Journal of Engineering Research and Applications
                    (IJERA)            ISSN: 2248-9622       www.ijera.com
                    Vol. 2, Issue 5, September- October 2012, pp.1056-1062
II. SIMULATION MODEL                               on the rising edge of the data clock. A cyclic
          The transmitter and receiver sections of the    redundancy check (CRC) is an error-detecting code
WiMAX Physical layer are shown in the block               commonly used in digital networks and storage
diagram of Figure-a. In this setup, we have just          devices to detect accidental changes to raw data.
implemented the mandatory features of the                 Blocks of data entering these systems get a short
specification, while leaving the implementation of        check value attached, based on the remainder of a
optional features for future work. The channel            polynomial division of their contents; on retrieval the
coding part is composed of coding techniques of the       calculation is repeated, and corrective action can be
Cyclic     Redundancy         Check     (CRC).     The    taken against presumed data corruption if the check
complementary operations are applied in the reverse       values do not match. CRCs are based on the theory
order at channel decoding in the receiver end. We         of cyclic error-correcting codes. The use of
do not explain each block in details. Here we only        systematic cyclic codes, which encode messages by
give the emphasis on M-ary quadrature amplitude           adding a fixed-length check value, for the purpose of
modulation Cyclic Redundancy Check (CRC)                  error detection in communication networks. Cyclic
coding techniques.                                        codes are not only simple to implement but have the
In this section, the WiMAX PHY layer simulation           benefit of being particularly well suited for the
model with Cyclic Redundancy check(CRC)                   detection of burst errors, contiguous sequences of
encoded to be implemented has been discussed              erroneous data symbols in messages. This is
thoroughly and all related assumptions have been          important because burst errors are common
stated clearly and justified. The implemented model       transmission errors in many communication
needs to be realistic as possible in order to get         channels, including magnetic and optical storage
reliable results. It is ought to be mentioned here that   devices. Typically an n-bit CRC applied to a data
the real communication systems are very much              block of arbitrary length will detect any single error
complicated and due to non availability of the            burst not longer than n bits and will detect a fraction
algorithms to simulate the performance evaluation         1−2−n of all longer error bursts.[6] Specification of a
of their various sections, generally, simulations are     CRC code requires definition of a so-called generator
made on the basis of some assumptions to simplify         polynomial. This polynomial resembles the divisor
the     communication system(s)          concerned. It    in a polynomial long division, which takes the
consists of various sections. A brief description of      message as the dividend and in which the quotient is
the simulated model is given below [5]                    discarded and the remainder becomes the result, with
                                                          the important distinction that the polynomial
The block diagram of the simulated system model is        coefficients are calculated according to the carry-less
shown in Figure-a. The synthetically generated input      arithmetic of a finite field. The length of the
binary bit stream is ensured against transmission         remainder is always less than the length of the
errors with a Cyclic Redundancy Check (CRC). In           generator polynomial, which therefore determines
CRC channel coding scheme, a Cyclic Redundancy            how long the result can be. In practice, all commonly
Check (CRC) is applied to the input binary data.          used CRCs employ the finite field GF(2). This is the
The Cyclic Redundancy Check (CRC) encoded bits            field of two elements, usually called 0 and 1,
are prior to convert into each of the either complex      comfortably matching computer architecture. The
digital modulation symbols in QAM, 16-QAM, 64-            rest of this article will discuss only these binary
QAM modulations and fed to an OFDM modulator              CRCs, but the principles are more general. The
for transmission. The simulated coding and                simplest error-detection system, the parity bit, is in
modulation schemes used in the present study are          fact a trivial 1-bit CRC: it uses the generator
shown in Table-1.In OFDM modulator, the digitally         polynomial x+1. A CRC-enabled device calculates a
modulated information symbols are transmitted in          short, fixed-length binary sequence,known as the
parallel on sub carriers through implementation as        check value or improperly the CRC, for each block
an inverse First Fourier transform (IFFT) on a block      of data to be sent or stored and appends it to the data,
of information symbols followed by an analog-to-          forming a codeword. When a codeword is received
digital converter (ADC). To mitigate the effects of       or read, the device either compares its check value
inter-symbol interference (ISI) caused by channel         with one freshly calculated from the data block, or
time spread, each block of IFFT coefficients is           equivalently, performs a CRC on the whole
typically preceded by a cyclic prefix. At the             codeword and compares the resulting check value
receiver side, the received signal is OFDM                with an expected residue constant. If the check
demodulated, de-mapped, and then decoded in order         values do not match, then the block contains a data
to recover the data transmitted.                          error. The device may take corrective action, such as
                                                          rereading the block or requesting that it be sent
The default use of the Cyclic Redundancy Check            again. Otherwise, the data is assumed to be error-
(CRC) component is to compute CRC from a serial           free (though, with some small probability, it may
bit stream of any length. The input data is sampled       contain undetected errors; this is the fundamental

                                                                                                1057 | P a g e
Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/
               International Journal of Engineering Research and Applications
                    (IJERA)            ISSN: 2248-9622     www.ijera.com
                    Vol. 2, Issue 5, September- October 2012, pp.1056-1062
nature of error-checking). The CRC value is reset to
0 before starting or can optionally be seeded with an
initial value. On completion of the bit stream, the
computed CRC value may be read out.[7] Cyclic
redundancy codes add bits to the end of a message
transaction for the purpose of error detection. The
message information is divided by a generator
polynomial. The remainder is then appended to the
message and transmitted. The receiver divides the
message and remainder by the same generator
polynomial. If no errors have occurred, the
remainder is zero. The process is as follows:
          1. The original message polynomial is
               shifted to the left by the order of the
               generator polynomial
          2. The shifted message is divided by the
               generator polynomial, producing a
               remainder
          3. The remainder is appended to the
               message and transmitted.
          4. The receiver divides the transmitted
               message by the generator polynomial
          5. If a remainder occurs, the message is
               deemed in error and retransmission is
               requested
          6. If no remainder exists, the message is
               shifted to the right by the order of the
               generator polynomial


In the case of QAM (quadrature amplitude
modulation), a finite number of at least two phases,
and at least two amplitudes are used. QAM is both
an analog and a digital modulation scheme. It
conveys two analog message signals, or two digital
bit streams, by changing (modulating) the
amplitudes of two carrier waves, using the
amplitude-shift keying (ASK) digital modulation
scheme or amplitude modulation (AM) analog
modulation scheme. The two carrier waves, usually
sinusoids, are out of phase with each other by 90°
and are thus called quadrature carriers or quadrature
components — hence the name of the scheme. In
the case of QAM, the amplitude of two waves, 90
degrees out-of-phase with each other




                                                                           1058 | P a g e
Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/
              International Journal of Engineering Research and Applications
                   (IJERA)            ISSN: 2248-9622     www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1056-1062




                                                         Digital
                                                      Modulation M-
       Data                     Cyclic
                                                       ary (QAM)
      Source                 Redundancy
                             Check (CRC)




    Parallel to                 Cyclic                 Multi carrier               Serial to
      Serial                  Prefix (CP)               Modulator                  Parallel
    Converter                  Incertion                 (IFFT)                   Converter




  Channel                      Serial to                  Cyclic                 Multi carrier
  (AWGN &                      Parallel                   Prefix                 Demodulator
   Fading)                    Converter                  Removal                   (FFT)




                                Cyclic
                                                         Digital                  Parallel to
       Data                  Redundancy
                             check(CRC)                Demodulation                 Serial
     Retrieved                                                                    Converter
                               Decoder




Figure-a: A block diagram of Cyclic Redundancy Check (CRC) encoded WiMAX communication system




                                                                                    1059 | P a g e
Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/
                         International Journal of Engineering Research and Applications
                              (IJERA)            ISSN: 2248-9622     www.ijera.com
                              Vol. 2, Issue 5, September- October 2012, pp.1056-1062
        (in quadrature) are changed (modulated or keyed)
                                                                                                      Where L= M . For a 16-QAM with signal
       to represent the data signalMany modern fixed
                                                                                                     constellation as shown in figure 3, the L by L matrix
       microwave communication systems are based on
                                                                                                     is
       quadrature amplitude modulation (QAM). These
                                                                                                                  (3,3)     (-1,3) (1,3) (3,3) 
       systems have various levels of complexity. Even                                                            (-3,1)    (-1,1) (1,1) (3,1)             (v)
       though QPSK uses no state changes in amplitude, it                                            ai , bi                                  
       is sometimes referred to as 4-QAM. When four                                                               (-3,-1)   (-1,-1) (1,-1) (3,-1)
                                                                                                                                                 
       levels of amplitude are combined with the four                                                             (-3,-3)   (-1,-3) (1,-3) (3,-3)
       levels of phase, we get 16-QAM. In 16 QAM, 2 bits
       are encoded on phase changes, and 2 bits are                                                  Table-1: Summary of Model Parameters
       encoded on amplitude changes, yielding a total of 4                                            Parameters                 values
       bits per symbol. The general form of an M-ary
                                                                                                      Number Of Bits                          44000
       QAM signal can be defined as
                                                                                                      Number Of Subscribers                   200
               2 E min                                   2 E min
S i (t )                  ai cos(2f c t )                     bi sin(2f c t )                     FFT Size                                256
                  Ts                                       Ts                                         CP                                      1/4
      0t T ;                          i 1,2,….M                              (i)                    Coding                                  Cyclic Redundancy
                                                                                                                                              Check (CRC)
       Where Emin is the energy of the signal with the                                                Code rate                               2/3
       lowest amplitude, a and b are a pair of independent                                            Constraint length                       7
       integers chosen according to the location of the
                                                                                                      K-factor                                3
       particular signal point. It is to be noted here that M-
       ary QAM does not have constant energy per symbol,                                              Maximum Doppler shift                   100/40Hz
       nor does it have constant distance between possible                                            SNR                                     0-20
       symbol states. It reasons that particular values of (t)
                                                                                                      Modulation                              QAM, 16-QAM,
       will be detected with higher probability than others.
                                                                                                                                              64-QAM
                                                                                                      Noise Channels                          AWGN, Rayleigh
       If rectangular pulse shapes are assumed, the signal
                                                                                                                                              and Rician
       Si(t) may be expanded in of pair of basis functions
       defined as
                                                                                                     At the receiving section we have just reversed the
                       cos2f c t  0  t  Ts
                    2                                                                                procedures that we have performed at the
          1 (t )                                                                     (ii)          transmission section. After ensuring that the
                    Ts
                                                                                                     WiMAX PHY layer simulator is working properly
                                                                                                     we started to evaluate the performance of our
                               sin 2f c t  0  t  Ts (iii)
                            2
         2 (t )                                                                                    developed system. For this purpose we have varied
                            Ts                                                                       encoding techniques and digital modulation schemes
                                                                                                     under AWGN and frequency-flat fading (Rayleigh/
                                                                                                     Rician) channels. Bit Error Rate (BER) calculation
                                                                                                     against different Signal-to-Noise ratio (SNR) was
                                                                                                     adopted to evaluate the performance.

                                                                                                     III. SIMULATION RESULT
                                                                                                              This section presents and discusses all of
                                                                                                     the results obtained by the computer simulation
                                                                                                     program written in Matlab following the analytical
       Figure-b: Constellation diagram of an M-ary QAM                                               approach of a wireless communication system
       (M=16) signal set [8].                                                                        considering AWGN, Rayleigh Fading and Rician
        The co-ordinate of the i th message point are                                                Fading channel. A test case is considered with the
        ai Emin and bi Emin                                  where (a i ,b i ) is an                 synthetically generated data. The results are
                                                                                                     represented in terms of signal to noise ratio (SNR)
       element of the L by L matrix given by
                                                                                                     and the bit error rate (BER) for practical values of
                    ( L  1, L  1)      (-L  3, L - 1) .... (L - 1, L - 1)     
                                                                                                     system parameters.
                    ( L  1, L  3)                                                        (iv)
                                          ( - L  3, L - 3) .....(L - 1, L - 3)   
        ai, bi    .                          .                   .                              From figure-c we can see that, the bit error
                                                                                  
                     .                          .                    .                             rate(BER) performance of QAM modulation scheme
                    (-L  1,-L  1)
                                        (-L  3,-L  1)         (L - 1,-L  1)    
                                                                                                    has lower than 16-QAM and 64-QAM modulation
                                                                                                     scheme under the AWGN channel. For an example,


                                                                                                                                                      1060 | P a g e
Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/
              International Journal of Engineering Research and Applications
                   (IJERA)            ISSN: 2248-9622     www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1056-1062
while using the, for SNR value 13dB, BER for QAM
modulation remains 0, where BER for 16-QAM and
64-QAM modulation remains 0.00256 and 0.00519
respectively. After SNR value 13dB, BER for QAM
remains zero for the rest of the SNR values. But 16-
QAM and 64-QAM modulation has more non-zero
BER values than that of QAM modulation.




                                                       Figure-e: BER simulation of an Cyclic Redundancy
                                                       Check (CRC) encoded in QAM,16-QAM and 64-
                                                       QAM modulation schemes in an Rician channel.

                                                       From figure-e we can see that, the bit error
                                                       rate(BER) performance of QAM modulation scheme
                                                       has lower than 16-QAM and 64-QAM modulation
                                                       scheme under the Rician fading channels channel.
Figure-c: BER simulation of an Cyclic Redundancy       For an example, while using the, for SNR value
Check (CRC) encoded in QAM,16-QAM and 64-              19dB, BER for QAM modulation remains 0, where
QAM modulation schemes in an AWGN channel              BER for 16-QAM and 64-QAM modulation remains
                                                       0.00262 and 0.01289 respectively. After SNR value
From figure-d we can see that, the bit error rate      19dB, BER for QAM remains zero for the rest of the
(BER) performance of QAM modulation scheme has         SNR values. But 16-QAM and 64-QAM modulation
lower than 16-QAM and 64-QAM modulation                has more non-zero BER values than that of QAM
scheme under the Rayleigh fading channel. For an       modulation.
example, while using the, for SNR value 15dB, BER
for QAM modulation remains 0, where BER for 16-        IV. CONCLUSION
QAM and 64-QAM modulation remains 0.00311                       In this research work, it has been studied
and 0.01218 respectively. After SNR value 15dB,        the performance of an OFDM based wireless
BER for QAM remains zero for the rest of the SNR       WiMAX communication system adopting the Cyclic
values. But 16-QAM and 64-QAM modulation has           Redundancy Check (CRC) channel coding and
more non-zero BER values than that of QAM              different digital modulation schemes. A range of
modulation.                                            system performance results highlights the impact of
                                                       digital modulations under Cyclic Redundancy
                                                       Check (CRC) coding in AWGN and fading channels
                                                       (Rayleigh and Rician ).

                                                       The research work focuses on the performance
                                                       investigation by BER against Eb/No of coded
                                                       and uncoded WiMAX system under AWGN,
                                                       Rayleigh and Rician fading channels using different
                                                       digital modulations namely QAM ,16-QAM and
                                                       64-QAM. The BER values are always in between 0
                                                       to 0.02433. The BER curves were used to compare
                                                       the performance of different modulation techniques
                                                       and coding scheme. The effects of the Cyclic
                                                       Redundancy Check (CRC) coding and different
                                                       communication channels were also evaluated in the
Figure-d: BER simulation of an Cyclic Redundancy       form of BER. The effects of the Cyclic Redundancy
Check (CRC) encoded in QAM,16-QAM and 64-              Check (CRC) coding were also evaluated in the
QAM modulation schemes in an Rayleigh channel          form of BER and we conclude that the performance
                                                       three modulation order are better performance to



                                                                                          1061 | P a g e
Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/
                 International Journal of Engineering Research and Applications
                      (IJERA)            ISSN: 2248-9622     www.ijera.com
                      Vol. 2, Issue 5, September- October 2012, pp.1056-1062
given that QAM modulation with respect to 16-
QAM and 64-QAM modulation schemes.

REFERENCES
[1]      IEEE Standard 802.16™ -2004: Air Interface
         for Fixed and Mobie Broadband Wireless
         Access Systems. IEEE, 2004.

[2]      IEEE Standard 802.16™ -2005: Air Interface
         for Fixed and Mobie Wireless Access
         Systems. IEEE, 2006.

[3]      Loutfi Nuaymi: ―WiMAX: Technology for
         Broadband Wireless access‖, Wiley, 2007.

[4]      K. Fazel and S. Kaiser ―Multi-Carrier and
         Spread Spectrum Systems: From OFDM and
         MC- CDMA to LTE and WiMAX‖, 2nd
         Edition, John Wiley & Sons, 2008

[5]      A Thesis Submitted in partial fulfillment of
         the requirements for the M.Sc Degree in
         Applied      Physics    and       Electronic
         Engineering,Faculty of Science, University
         of Rajshahi, Bangladesh

[6]      http://en.wikipedia.org/wiki/Cyclic_redundan
         cy_check

[7]      M. A Mokhtar and S.C. Gupta, ―Power
         Control Considerations for DS/CDMA
         Personal Communication Systems,‖ IEEE
         Transactions on Vehicular Technology, vol.
         41, pp. 479–487, November 1992.

[8]      Theodore       S.     Rapaport,     ―Wireless
         Communications Principles and Practice,‖
         Prentice-Hall of India Private Limited,2004




                                                                             1062 | P a g e

Contenu connexe

Tendances

A simulation study of wi max based communication system using deliberately cl...
A simulation study of wi max based communication system using deliberately cl...A simulation study of wi max based communication system using deliberately cl...
A simulation study of wi max based communication system using deliberately cl...eSAT Journals
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
 
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksPanimalar Engineering College
 
WiMAX II (IEEE 802.16m) as 4G Mobile Candidate
WiMAX II (IEEE 802.16m) as 4G Mobile CandidateWiMAX II (IEEE 802.16m) as 4G Mobile Candidate
WiMAX II (IEEE 802.16m) as 4G Mobile CandidateKuncoro Wastuwibowo
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...ijcnac
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Design and analysis 5G mobile network model to enhancement high-density subsc...
Design and analysis 5G mobile network model to enhancement high-density subsc...Design and analysis 5G mobile network model to enhancement high-density subsc...
Design and analysis 5G mobile network model to enhancement high-density subsc...journalBEEI
 
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksA Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksIDES Editor
 
VHDL Implementation of FPGA Based OFDM Modem for Wireless Applications
VHDL Implementation of FPGA Based OFDM Modem for Wireless ApplicationsVHDL Implementation of FPGA Based OFDM Modem for Wireless Applications
VHDL Implementation of FPGA Based OFDM Modem for Wireless ApplicationsEditor IJCATR
 
01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamentalEricsson Saudi
 
Wi MAX Deinter leaver’s Address Generation Unit through FPGA Implementation
Wi MAX Deinter leaver’s Address Generation Unit through FPGA ImplementationWi MAX Deinter leaver’s Address Generation Unit through FPGA Implementation
Wi MAX Deinter leaver’s Address Generation Unit through FPGA Implementationijceronline
 
Smart communication system scs
Smart communication system scsSmart communication system scs
Smart communication system scsHughCab
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSijistjournal
 
BSS training 2012 - for students
BSS training 2012 - for studentsBSS training 2012 - for students
BSS training 2012 - for studentszhiar ahmad
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
 

Tendances (19)

A simulation study of wi max based communication system using deliberately cl...
A simulation study of wi max based communication system using deliberately cl...A simulation study of wi max based communication system using deliberately cl...
A simulation study of wi max based communication system using deliberately cl...
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
 
WiMAX II (IEEE 802.16m) as 4G Mobile Candidate
WiMAX II (IEEE 802.16m) as 4G Mobile CandidateWiMAX II (IEEE 802.16m) as 4G Mobile Candidate
WiMAX II (IEEE 802.16m) as 4G Mobile Candidate
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Design and analysis 5G mobile network model to enhancement high-density subsc...
Design and analysis 5G mobile network model to enhancement high-density subsc...Design and analysis 5G mobile network model to enhancement high-density subsc...
Design and analysis 5G mobile network model to enhancement high-density subsc...
 
Wireless LAN
Wireless LANWireless LAN
Wireless LAN
 
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksA Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
 
Cellular Networks
Cellular NetworksCellular Networks
Cellular Networks
 
VHDL Implementation of FPGA Based OFDM Modem for Wireless Applications
VHDL Implementation of FPGA Based OFDM Modem for Wireless ApplicationsVHDL Implementation of FPGA Based OFDM Modem for Wireless Applications
VHDL Implementation of FPGA Based OFDM Modem for Wireless Applications
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamental
 
Wi MAX Deinter leaver’s Address Generation Unit through FPGA Implementation
Wi MAX Deinter leaver’s Address Generation Unit through FPGA ImplementationWi MAX Deinter leaver’s Address Generation Unit through FPGA Implementation
Wi MAX Deinter leaver’s Address Generation Unit through FPGA Implementation
 
Smart communication system scs
Smart communication system scsSmart communication system scs
Smart communication system scs
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
 
IEEE802.16-Anoverview
IEEE802.16-AnoverviewIEEE802.16-Anoverview
IEEE802.16-Anoverview
 
BSS training 2012 - for students
BSS training 2012 - for studentsBSS training 2012 - for students
BSS training 2012 - for students
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical Layer
 

Similaire à Ft2510561062

Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...IJMER
 
A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for floodingijcsa
 
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...ijistjournal
 
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...ijistjournal
 
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdfrohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdfRobinKumar260480
 
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ijngnjournal
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSijistjournal
 
WiMAX Features, Characteristics and Application in Wireless Technology Computing
WiMAX Features, Characteristics and Application in Wireless Technology ComputingWiMAX Features, Characteristics and Application in Wireless Technology Computing
WiMAX Features, Characteristics and Application in Wireless Technology Computingijtsrd
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
 
Frontiers of Wireless and Mobile Communications
Frontiers of Wireless and Mobile CommunicationsFrontiers of Wireless and Mobile Communications
Frontiers of Wireless and Mobile CommunicationsSai Varrshini
 
CDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkIRJET Journal
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
 

Similaire à Ft2510561062 (20)

Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
 
4G technology
4G technology4G technology
4G technology
 
4G Mobile Communications
4G Mobile Communications4G Mobile Communications
4G Mobile Communications
 
A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for flooding
 
Ew31992997
Ew31992997Ew31992997
Ew31992997
 
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
 
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
 
A secure and service oriented
A secure and service orientedA secure and service oriented
A secure and service oriented
 
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdfrohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
 
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
 
Fg24980983
Fg24980983Fg24980983
Fg24980983
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
 
WiMAX Features, Characteristics and Application in Wireless Technology Computing
WiMAX Features, Characteristics and Application in Wireless Technology ComputingWiMAX Features, Characteristics and Application in Wireless Technology Computing
WiMAX Features, Characteristics and Application in Wireless Technology Computing
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
 
WiMax Technology
WiMax TechnologyWiMax Technology
WiMax Technology
 
Frontiers of Wireless and Mobile Communications
Frontiers of Wireless and Mobile CommunicationsFrontiers of Wireless and Mobile Communications
Frontiers of Wireless and Mobile Communications
 
CDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite Link
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 
4g magic communication
4g magic communication4g magic communication
4g magic communication
 

Dernier

MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 

Dernier (20)

MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 

Ft2510561062

  • 1. Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1056-1062 Performance Analysis of Cyclic Redundancy Check(CRC) encoded Fixed WiMAX Wireless Communication System under Implementation of M-ary Quadrature Amplitude Modulation(QAM) Technique Md. Abdul Halim1, Md. Ashraful Islam2, Tonima Islam3, Halida Homyara4 and Mustari Zaman5 1(Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.) 2 (Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.) 3 (Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.) 4 (Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.) 5(Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.) ABSTRACT IEEE802.16 known as WiMAX started its first deployment in developed countries technology is a promised broadband wireless replacing both commonly used Wi-Fi on one hand technology that promises high-speed data and traditional cellular standards such as 3G. services up to the costumer end. The aim of this WiMAX technology is broadband wireless paper is the performance evaluation of Cyclic technology, which transmitted on the line-of-sight Redundancy Check (CRC) encoded fixed (LOS) and non line-of-sight (NLOS) transmission, WiMAX system under different combinations of operating in the 2 GHz to 11 GHz range and 10 GHz M-ary quadrature amplitude modulation to 66 GHz range respectively. Furthermore, techniques (QAM, 16-QAM and 64-QAM) and WiMAX systems, that support air interfaces access different communication channels AWGN and for fixed, nomadic, and mobile wireless fading channels (Rayleigh and Rician). It offers communications. The operation is wildly coverage both line of sight and non-line of sight wireless area LOS: 2-5 km and NLOS : 5-50 km [1-3]. IEEE communication. In our research work, we 802.16 is the standard to state the radio frequency of investigated the physical layer performance on fixed Broadband Wireless Access. WiMAX is the the basis of bit error rate (BER) and signal to trade name of ―IEEE 802.16 Standard‖. IEEE noise ratio (SNR). This research work 802.16 was first planned offer the last mile for demonstrates that QAM modulations is better Wireless Metropolitan Area Network (WMAN) with than the 16-QAM and 64-QAM modulations the line of sight (LOS) of 30 – 50 km. schemes of AWGN channels as it has the lowest bit error rate (BER). Basically the goal of WIMAX is to provide high speed internet access to home and business Keywords – AWGN, CRC, Fixed WiMAX, subscribers without wires. It supports legacy voice Fading Channel, M-ary QAM systems, voice over IP, TCP/IP, and Application with different QoS requirements. 802.16 consist of the access point, base station and subscriber station. I. INTRODUCTION During a communication, all the information Worldwide Interoperability for Microwave Access, coming from a subscriber station go to the base or WiMAX for short, is a next generation open station and retransmitted back to subscriber station. standard that seeks to serve users' increasing Base station can handle multiple of subscriber demands for high data throughput (broadband) station. Two types of links are defined in this:- services such as streaming media on the internet, The downlink: From base station to the subscriber live video conferencing, and mobile TV on station. computers as well as handsets and PDAs. WiMAX The uplink: From subscriber station to the base is expected to be integrated into the next generation station. [4] In this paper, we focus on the physical mass market consumer devices and to offer layer of WiMAX system simulating on IEEE802.16 something that does not exist today – speeds similar standards, which data transmitted on the to cable and metropolitan area coverage while on transmission channel. The transmission channel the move, all for a much lower cost than we are used component of AWGN(Additive white Gaussian to today. WiMAX already offers broadband services Noise) channel and Rician fading channel with in many emerging and rural markets which are not concatenated supported by wireline-based technologies and 1056 | P a g e
  • 2. Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1056-1062 II. SIMULATION MODEL on the rising edge of the data clock. A cyclic The transmitter and receiver sections of the redundancy check (CRC) is an error-detecting code WiMAX Physical layer are shown in the block commonly used in digital networks and storage diagram of Figure-a. In this setup, we have just devices to detect accidental changes to raw data. implemented the mandatory features of the Blocks of data entering these systems get a short specification, while leaving the implementation of check value attached, based on the remainder of a optional features for future work. The channel polynomial division of their contents; on retrieval the coding part is composed of coding techniques of the calculation is repeated, and corrective action can be Cyclic Redundancy Check (CRC). The taken against presumed data corruption if the check complementary operations are applied in the reverse values do not match. CRCs are based on the theory order at channel decoding in the receiver end. We of cyclic error-correcting codes. The use of do not explain each block in details. Here we only systematic cyclic codes, which encode messages by give the emphasis on M-ary quadrature amplitude adding a fixed-length check value, for the purpose of modulation Cyclic Redundancy Check (CRC) error detection in communication networks. Cyclic coding techniques. codes are not only simple to implement but have the In this section, the WiMAX PHY layer simulation benefit of being particularly well suited for the model with Cyclic Redundancy check(CRC) detection of burst errors, contiguous sequences of encoded to be implemented has been discussed erroneous data symbols in messages. This is thoroughly and all related assumptions have been important because burst errors are common stated clearly and justified. The implemented model transmission errors in many communication needs to be realistic as possible in order to get channels, including magnetic and optical storage reliable results. It is ought to be mentioned here that devices. Typically an n-bit CRC applied to a data the real communication systems are very much block of arbitrary length will detect any single error complicated and due to non availability of the burst not longer than n bits and will detect a fraction algorithms to simulate the performance evaluation 1−2−n of all longer error bursts.[6] Specification of a of their various sections, generally, simulations are CRC code requires definition of a so-called generator made on the basis of some assumptions to simplify polynomial. This polynomial resembles the divisor the communication system(s) concerned. It in a polynomial long division, which takes the consists of various sections. A brief description of message as the dividend and in which the quotient is the simulated model is given below [5] discarded and the remainder becomes the result, with the important distinction that the polynomial The block diagram of the simulated system model is coefficients are calculated according to the carry-less shown in Figure-a. The synthetically generated input arithmetic of a finite field. The length of the binary bit stream is ensured against transmission remainder is always less than the length of the errors with a Cyclic Redundancy Check (CRC). In generator polynomial, which therefore determines CRC channel coding scheme, a Cyclic Redundancy how long the result can be. In practice, all commonly Check (CRC) is applied to the input binary data. used CRCs employ the finite field GF(2). This is the The Cyclic Redundancy Check (CRC) encoded bits field of two elements, usually called 0 and 1, are prior to convert into each of the either complex comfortably matching computer architecture. The digital modulation symbols in QAM, 16-QAM, 64- rest of this article will discuss only these binary QAM modulations and fed to an OFDM modulator CRCs, but the principles are more general. The for transmission. The simulated coding and simplest error-detection system, the parity bit, is in modulation schemes used in the present study are fact a trivial 1-bit CRC: it uses the generator shown in Table-1.In OFDM modulator, the digitally polynomial x+1. A CRC-enabled device calculates a modulated information symbols are transmitted in short, fixed-length binary sequence,known as the parallel on sub carriers through implementation as check value or improperly the CRC, for each block an inverse First Fourier transform (IFFT) on a block of data to be sent or stored and appends it to the data, of information symbols followed by an analog-to- forming a codeword. When a codeword is received digital converter (ADC). To mitigate the effects of or read, the device either compares its check value inter-symbol interference (ISI) caused by channel with one freshly calculated from the data block, or time spread, each block of IFFT coefficients is equivalently, performs a CRC on the whole typically preceded by a cyclic prefix. At the codeword and compares the resulting check value receiver side, the received signal is OFDM with an expected residue constant. If the check demodulated, de-mapped, and then decoded in order values do not match, then the block contains a data to recover the data transmitted. error. The device may take corrective action, such as rereading the block or requesting that it be sent The default use of the Cyclic Redundancy Check again. Otherwise, the data is assumed to be error- (CRC) component is to compute CRC from a serial free (though, with some small probability, it may bit stream of any length. The input data is sampled contain undetected errors; this is the fundamental 1057 | P a g e
  • 3. Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1056-1062 nature of error-checking). The CRC value is reset to 0 before starting or can optionally be seeded with an initial value. On completion of the bit stream, the computed CRC value may be read out.[7] Cyclic redundancy codes add bits to the end of a message transaction for the purpose of error detection. The message information is divided by a generator polynomial. The remainder is then appended to the message and transmitted. The receiver divides the message and remainder by the same generator polynomial. If no errors have occurred, the remainder is zero. The process is as follows: 1. The original message polynomial is shifted to the left by the order of the generator polynomial 2. The shifted message is divided by the generator polynomial, producing a remainder 3. The remainder is appended to the message and transmitted. 4. The receiver divides the transmitted message by the generator polynomial 5. If a remainder occurs, the message is deemed in error and retransmission is requested 6. If no remainder exists, the message is shifted to the right by the order of the generator polynomial In the case of QAM (quadrature amplitude modulation), a finite number of at least two phases, and at least two amplitudes are used. QAM is both an analog and a digital modulation scheme. It conveys two analog message signals, or two digital bit streams, by changing (modulating) the amplitudes of two carrier waves, using the amplitude-shift keying (ASK) digital modulation scheme or amplitude modulation (AM) analog modulation scheme. The two carrier waves, usually sinusoids, are out of phase with each other by 90° and are thus called quadrature carriers or quadrature components — hence the name of the scheme. In the case of QAM, the amplitude of two waves, 90 degrees out-of-phase with each other 1058 | P a g e
  • 4. Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1056-1062 Digital Modulation M- Data Cyclic ary (QAM) Source Redundancy Check (CRC) Parallel to Cyclic Multi carrier Serial to Serial Prefix (CP) Modulator Parallel Converter Incertion (IFFT) Converter Channel Serial to Cyclic Multi carrier (AWGN & Parallel Prefix Demodulator Fading) Converter Removal (FFT) Cyclic Digital Parallel to Data Redundancy check(CRC) Demodulation Serial Retrieved Converter Decoder Figure-a: A block diagram of Cyclic Redundancy Check (CRC) encoded WiMAX communication system 1059 | P a g e
  • 5. Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1056-1062 (in quadrature) are changed (modulated or keyed) Where L= M . For a 16-QAM with signal to represent the data signalMany modern fixed constellation as shown in figure 3, the L by L matrix microwave communication systems are based on is quadrature amplitude modulation (QAM). These (3,3) (-1,3) (1,3) (3,3)  systems have various levels of complexity. Even (-3,1) (-1,1) (1,1) (3,1)  (v) though QPSK uses no state changes in amplitude, it ai , bi     is sometimes referred to as 4-QAM. When four (-3,-1) (-1,-1) (1,-1) (3,-1)   levels of amplitude are combined with the four (-3,-3) (-1,-3) (1,-3) (3,-3) levels of phase, we get 16-QAM. In 16 QAM, 2 bits are encoded on phase changes, and 2 bits are Table-1: Summary of Model Parameters encoded on amplitude changes, yielding a total of 4 Parameters values bits per symbol. The general form of an M-ary Number Of Bits 44000 QAM signal can be defined as Number Of Subscribers 200 2 E min 2 E min S i (t )  ai cos(2f c t )  bi sin(2f c t ) FFT Size 256 Ts Ts CP 1/4 0t T ; i 1,2,….M (i) Coding Cyclic Redundancy Check (CRC) Where Emin is the energy of the signal with the Code rate 2/3 lowest amplitude, a and b are a pair of independent Constraint length 7 integers chosen according to the location of the K-factor 3 particular signal point. It is to be noted here that M- ary QAM does not have constant energy per symbol, Maximum Doppler shift 100/40Hz nor does it have constant distance between possible SNR 0-20 symbol states. It reasons that particular values of (t) Modulation QAM, 16-QAM, will be detected with higher probability than others. 64-QAM Noise Channels AWGN, Rayleigh If rectangular pulse shapes are assumed, the signal and Rician Si(t) may be expanded in of pair of basis functions defined as At the receiving section we have just reversed the cos2f c t  0  t  Ts 2 procedures that we have performed at the 1 (t )  (ii) transmission section. After ensuring that the Ts WiMAX PHY layer simulator is working properly we started to evaluate the performance of our sin 2f c t  0  t  Ts (iii) 2  2 (t )  developed system. For this purpose we have varied Ts encoding techniques and digital modulation schemes under AWGN and frequency-flat fading (Rayleigh/ Rician) channels. Bit Error Rate (BER) calculation against different Signal-to-Noise ratio (SNR) was adopted to evaluate the performance. III. SIMULATION RESULT This section presents and discusses all of the results obtained by the computer simulation program written in Matlab following the analytical Figure-b: Constellation diagram of an M-ary QAM approach of a wireless communication system (M=16) signal set [8]. considering AWGN, Rayleigh Fading and Rician The co-ordinate of the i th message point are Fading channel. A test case is considered with the ai Emin and bi Emin where (a i ,b i ) is an synthetically generated data. The results are represented in terms of signal to noise ratio (SNR) element of the L by L matrix given by and the bit error rate (BER) for practical values of ( L  1, L  1) (-L  3, L - 1) .... (L - 1, L - 1)  system parameters. ( L  1, L  3)  (iv)  ( - L  3, L - 3) .....(L - 1, L - 3)  ai, bi    . . .  From figure-c we can see that, the bit error    . . .  rate(BER) performance of QAM modulation scheme (-L  1,-L  1)  (-L  3,-L  1) (L - 1,-L  1)   has lower than 16-QAM and 64-QAM modulation scheme under the AWGN channel. For an example, 1060 | P a g e
  • 6. Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1056-1062 while using the, for SNR value 13dB, BER for QAM modulation remains 0, where BER for 16-QAM and 64-QAM modulation remains 0.00256 and 0.00519 respectively. After SNR value 13dB, BER for QAM remains zero for the rest of the SNR values. But 16- QAM and 64-QAM modulation has more non-zero BER values than that of QAM modulation. Figure-e: BER simulation of an Cyclic Redundancy Check (CRC) encoded in QAM,16-QAM and 64- QAM modulation schemes in an Rician channel. From figure-e we can see that, the bit error rate(BER) performance of QAM modulation scheme has lower than 16-QAM and 64-QAM modulation scheme under the Rician fading channels channel. Figure-c: BER simulation of an Cyclic Redundancy For an example, while using the, for SNR value Check (CRC) encoded in QAM,16-QAM and 64- 19dB, BER for QAM modulation remains 0, where QAM modulation schemes in an AWGN channel BER for 16-QAM and 64-QAM modulation remains 0.00262 and 0.01289 respectively. After SNR value From figure-d we can see that, the bit error rate 19dB, BER for QAM remains zero for the rest of the (BER) performance of QAM modulation scheme has SNR values. But 16-QAM and 64-QAM modulation lower than 16-QAM and 64-QAM modulation has more non-zero BER values than that of QAM scheme under the Rayleigh fading channel. For an modulation. example, while using the, for SNR value 15dB, BER for QAM modulation remains 0, where BER for 16- IV. CONCLUSION QAM and 64-QAM modulation remains 0.00311 In this research work, it has been studied and 0.01218 respectively. After SNR value 15dB, the performance of an OFDM based wireless BER for QAM remains zero for the rest of the SNR WiMAX communication system adopting the Cyclic values. But 16-QAM and 64-QAM modulation has Redundancy Check (CRC) channel coding and more non-zero BER values than that of QAM different digital modulation schemes. A range of modulation. system performance results highlights the impact of digital modulations under Cyclic Redundancy Check (CRC) coding in AWGN and fading channels (Rayleigh and Rician ). The research work focuses on the performance investigation by BER against Eb/No of coded and uncoded WiMAX system under AWGN, Rayleigh and Rician fading channels using different digital modulations namely QAM ,16-QAM and 64-QAM. The BER values are always in between 0 to 0.02433. The BER curves were used to compare the performance of different modulation techniques and coding scheme. The effects of the Cyclic Redundancy Check (CRC) coding and different communication channels were also evaluated in the Figure-d: BER simulation of an Cyclic Redundancy form of BER. The effects of the Cyclic Redundancy Check (CRC) encoded in QAM,16-QAM and 64- Check (CRC) coding were also evaluated in the QAM modulation schemes in an Rayleigh channel form of BER and we conclude that the performance three modulation order are better performance to 1061 | P a g e
  • 7. Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1056-1062 given that QAM modulation with respect to 16- QAM and 64-QAM modulation schemes. REFERENCES [1] IEEE Standard 802.16™ -2004: Air Interface for Fixed and Mobie Broadband Wireless Access Systems. IEEE, 2004. [2] IEEE Standard 802.16™ -2005: Air Interface for Fixed and Mobie Wireless Access Systems. IEEE, 2006. [3] Loutfi Nuaymi: ―WiMAX: Technology for Broadband Wireless access‖, Wiley, 2007. [4] K. Fazel and S. Kaiser ―Multi-Carrier and Spread Spectrum Systems: From OFDM and MC- CDMA to LTE and WiMAX‖, 2nd Edition, John Wiley & Sons, 2008 [5] A Thesis Submitted in partial fulfillment of the requirements for the M.Sc Degree in Applied Physics and Electronic Engineering,Faculty of Science, University of Rajshahi, Bangladesh [6] http://en.wikipedia.org/wiki/Cyclic_redundan cy_check [7] M. A Mokhtar and S.C. Gupta, ―Power Control Considerations for DS/CDMA Personal Communication Systems,‖ IEEE Transactions on Vehicular Technology, vol. 41, pp. 479–487, November 1992. [8] Theodore S. Rapaport, ―Wireless Communications Principles and Practice,‖ Prentice-Hall of India Private Limited,2004 1062 | P a g e