Ft2510561062

IJERA Editor
IJERA EditorInternational Journal of Engineering Research and Applications (IJERA) en www.ijera.com

IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com

Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/
              International Journal of Engineering Research and Applications
                   (IJERA)            ISSN: 2248-9622     www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1056-1062
    Performance Analysis of Cyclic Redundancy Check(CRC)
  encoded Fixed WiMAX Wireless Communication System under
        Implementation of M-ary Quadrature Amplitude
                 Modulation(QAM) Technique
       Md. Abdul Halim1, Md. Ashraful Islam2, Tonima Islam3, Halida
                     Homyara4 and Mustari Zaman5
  1(Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.)
  2 (Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.)
  3 (Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.)
  4 (Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.)
  5(Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.)



ABSTRACT
         IEEE802.16     known     as    WiMAX           started its first deployment in developed countries
technology is a promised broadband wireless             replacing both commonly used Wi-Fi on one hand
technology that promises high-speed data                and traditional cellular standards such as 3G.
services up to the costumer end. The aim of this        WiMAX technology is broadband wireless
paper is the performance evaluation of Cyclic           technology, which transmitted on the line-of-sight
Redundancy Check (CRC) encoded fixed                    (LOS) and non line-of-sight (NLOS) transmission,
WiMAX system under different combinations of            operating in the 2 GHz to 11 GHz range and 10 GHz
M-ary quadrature amplitude modulation                   to 66 GHz range respectively. Furthermore,
techniques (QAM, 16-QAM and 64-QAM) and                 WiMAX systems, that support air interfaces access
different communication channels AWGN and               for fixed, nomadic, and mobile wireless
fading channels (Rayleigh and Rician). It offers        communications. The operation is wildly coverage
both line of sight and non-line of sight wireless       area LOS: 2-5 km and NLOS : 5-50 km [1-3]. IEEE
communication. In our research work, we                 802.16 is the standard to state the radio frequency of
investigated the physical layer performance on          fixed Broadband Wireless Access. WiMAX is the
the basis of bit error rate (BER) and signal to         trade name of ―IEEE 802.16 Standard‖. IEEE
noise ratio (SNR). This research work                   802.16 was first planned offer the last mile for
demonstrates that QAM modulations is better             Wireless Metropolitan Area Network (WMAN) with
than the 16-QAM and 64-QAM modulations                  the line of sight (LOS) of 30 – 50 km.
schemes of AWGN channels as it has the lowest
bit error rate (BER).                                   Basically the goal of WIMAX is to provide high
                                                        speed internet access to home and business
Keywords – AWGN, CRC, Fixed WiMAX,                      subscribers without wires. It supports legacy voice
Fading Channel, M-ary QAM                               systems, voice over IP, TCP/IP, and Application
                                                        with different QoS requirements. 802.16 consist of
                                                        the access point, base station and subscriber station.
I. INTRODUCTION                                         During a communication, all the information
Worldwide Interoperability for Microwave Access,
                                                        coming from a subscriber station go to the base
or WiMAX for short, is a next generation open
                                                        station and retransmitted back to subscriber station.
standard that seeks to serve users' increasing
                                                        Base station can handle multiple of subscriber
demands for high data throughput (broadband)
                                                        station. Two types of links are defined in this:-
services such as streaming media on the internet,
                                                         The downlink: From base station to the subscriber
live video conferencing, and mobile TV on
                                                        station.
computers as well as handsets and PDAs. WiMAX
                                                        The uplink: From subscriber station to the base
is expected to be integrated into the next generation
                                                        station. [4] In this paper, we focus on the physical
mass market consumer devices and to offer
                                                        layer of WiMAX system simulating on IEEE802.16
something that does not exist today – speeds similar
                                                        standards, which data transmitted on the
to cable and metropolitan area coverage while on
                                                        transmission channel. The transmission channel
the move, all for a much lower cost than we are used
                                                        component of AWGN(Additive white Gaussian
to today. WiMAX already offers broadband services
                                                        Noise) channel and Rician fading channel with
in many emerging and rural markets which are not
                                                        concatenated
supported by wireline-based technologies and

                                                                                             1056 | P a g e
Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/
               International Journal of Engineering Research and Applications
                    (IJERA)            ISSN: 2248-9622       www.ijera.com
                    Vol. 2, Issue 5, September- October 2012, pp.1056-1062
II. SIMULATION MODEL                               on the rising edge of the data clock. A cyclic
          The transmitter and receiver sections of the    redundancy check (CRC) is an error-detecting code
WiMAX Physical layer are shown in the block               commonly used in digital networks and storage
diagram of Figure-a. In this setup, we have just          devices to detect accidental changes to raw data.
implemented the mandatory features of the                 Blocks of data entering these systems get a short
specification, while leaving the implementation of        check value attached, based on the remainder of a
optional features for future work. The channel            polynomial division of their contents; on retrieval the
coding part is composed of coding techniques of the       calculation is repeated, and corrective action can be
Cyclic     Redundancy         Check     (CRC).     The    taken against presumed data corruption if the check
complementary operations are applied in the reverse       values do not match. CRCs are based on the theory
order at channel decoding in the receiver end. We         of cyclic error-correcting codes. The use of
do not explain each block in details. Here we only        systematic cyclic codes, which encode messages by
give the emphasis on M-ary quadrature amplitude           adding a fixed-length check value, for the purpose of
modulation Cyclic Redundancy Check (CRC)                  error detection in communication networks. Cyclic
coding techniques.                                        codes are not only simple to implement but have the
In this section, the WiMAX PHY layer simulation           benefit of being particularly well suited for the
model with Cyclic Redundancy check(CRC)                   detection of burst errors, contiguous sequences of
encoded to be implemented has been discussed              erroneous data symbols in messages. This is
thoroughly and all related assumptions have been          important because burst errors are common
stated clearly and justified. The implemented model       transmission errors in many communication
needs to be realistic as possible in order to get         channels, including magnetic and optical storage
reliable results. It is ought to be mentioned here that   devices. Typically an n-bit CRC applied to a data
the real communication systems are very much              block of arbitrary length will detect any single error
complicated and due to non availability of the            burst not longer than n bits and will detect a fraction
algorithms to simulate the performance evaluation         1−2−n of all longer error bursts.[6] Specification of a
of their various sections, generally, simulations are     CRC code requires definition of a so-called generator
made on the basis of some assumptions to simplify         polynomial. This polynomial resembles the divisor
the     communication system(s)          concerned. It    in a polynomial long division, which takes the
consists of various sections. A brief description of      message as the dividend and in which the quotient is
the simulated model is given below [5]                    discarded and the remainder becomes the result, with
                                                          the important distinction that the polynomial
The block diagram of the simulated system model is        coefficients are calculated according to the carry-less
shown in Figure-a. The synthetically generated input      arithmetic of a finite field. The length of the
binary bit stream is ensured against transmission         remainder is always less than the length of the
errors with a Cyclic Redundancy Check (CRC). In           generator polynomial, which therefore determines
CRC channel coding scheme, a Cyclic Redundancy            how long the result can be. In practice, all commonly
Check (CRC) is applied to the input binary data.          used CRCs employ the finite field GF(2). This is the
The Cyclic Redundancy Check (CRC) encoded bits            field of two elements, usually called 0 and 1,
are prior to convert into each of the either complex      comfortably matching computer architecture. The
digital modulation symbols in QAM, 16-QAM, 64-            rest of this article will discuss only these binary
QAM modulations and fed to an OFDM modulator              CRCs, but the principles are more general. The
for transmission. The simulated coding and                simplest error-detection system, the parity bit, is in
modulation schemes used in the present study are          fact a trivial 1-bit CRC: it uses the generator
shown in Table-1.In OFDM modulator, the digitally         polynomial x+1. A CRC-enabled device calculates a
modulated information symbols are transmitted in          short, fixed-length binary sequence,known as the
parallel on sub carriers through implementation as        check value or improperly the CRC, for each block
an inverse First Fourier transform (IFFT) on a block      of data to be sent or stored and appends it to the data,
of information symbols followed by an analog-to-          forming a codeword. When a codeword is received
digital converter (ADC). To mitigate the effects of       or read, the device either compares its check value
inter-symbol interference (ISI) caused by channel         with one freshly calculated from the data block, or
time spread, each block of IFFT coefficients is           equivalently, performs a CRC on the whole
typically preceded by a cyclic prefix. At the             codeword and compares the resulting check value
receiver side, the received signal is OFDM                with an expected residue constant. If the check
demodulated, de-mapped, and then decoded in order         values do not match, then the block contains a data
to recover the data transmitted.                          error. The device may take corrective action, such as
                                                          rereading the block or requesting that it be sent
The default use of the Cyclic Redundancy Check            again. Otherwise, the data is assumed to be error-
(CRC) component is to compute CRC from a serial           free (though, with some small probability, it may
bit stream of any length. The input data is sampled       contain undetected errors; this is the fundamental

                                                                                                1057 | P a g e
Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/
               International Journal of Engineering Research and Applications
                    (IJERA)            ISSN: 2248-9622     www.ijera.com
                    Vol. 2, Issue 5, September- October 2012, pp.1056-1062
nature of error-checking). The CRC value is reset to
0 before starting or can optionally be seeded with an
initial value. On completion of the bit stream, the
computed CRC value may be read out.[7] Cyclic
redundancy codes add bits to the end of a message
transaction for the purpose of error detection. The
message information is divided by a generator
polynomial. The remainder is then appended to the
message and transmitted. The receiver divides the
message and remainder by the same generator
polynomial. If no errors have occurred, the
remainder is zero. The process is as follows:
          1. The original message polynomial is
               shifted to the left by the order of the
               generator polynomial
          2. The shifted message is divided by the
               generator polynomial, producing a
               remainder
          3. The remainder is appended to the
               message and transmitted.
          4. The receiver divides the transmitted
               message by the generator polynomial
          5. If a remainder occurs, the message is
               deemed in error and retransmission is
               requested
          6. If no remainder exists, the message is
               shifted to the right by the order of the
               generator polynomial


In the case of QAM (quadrature amplitude
modulation), a finite number of at least two phases,
and at least two amplitudes are used. QAM is both
an analog and a digital modulation scheme. It
conveys two analog message signals, or two digital
bit streams, by changing (modulating) the
amplitudes of two carrier waves, using the
amplitude-shift keying (ASK) digital modulation
scheme or amplitude modulation (AM) analog
modulation scheme. The two carrier waves, usually
sinusoids, are out of phase with each other by 90°
and are thus called quadrature carriers or quadrature
components — hence the name of the scheme. In
the case of QAM, the amplitude of two waves, 90
degrees out-of-phase with each other




                                                                           1058 | P a g e
Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/
              International Journal of Engineering Research and Applications
                   (IJERA)            ISSN: 2248-9622     www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1056-1062




                                                         Digital
                                                      Modulation M-
       Data                     Cyclic
                                                       ary (QAM)
      Source                 Redundancy
                             Check (CRC)




    Parallel to                 Cyclic                 Multi carrier               Serial to
      Serial                  Prefix (CP)               Modulator                  Parallel
    Converter                  Incertion                 (IFFT)                   Converter




  Channel                      Serial to                  Cyclic                 Multi carrier
  (AWGN &                      Parallel                   Prefix                 Demodulator
   Fading)                    Converter                  Removal                   (FFT)




                                Cyclic
                                                         Digital                  Parallel to
       Data                  Redundancy
                             check(CRC)                Demodulation                 Serial
     Retrieved                                                                    Converter
                               Decoder




Figure-a: A block diagram of Cyclic Redundancy Check (CRC) encoded WiMAX communication system




                                                                                    1059 | P a g e
Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/
                         International Journal of Engineering Research and Applications
                              (IJERA)            ISSN: 2248-9622     www.ijera.com
                              Vol. 2, Issue 5, September- October 2012, pp.1056-1062
        (in quadrature) are changed (modulated or keyed)
                                                                                                      Where L= M . For a 16-QAM with signal
       to represent the data signalMany modern fixed
                                                                                                     constellation as shown in figure 3, the L by L matrix
       microwave communication systems are based on
                                                                                                     is
       quadrature amplitude modulation (QAM). These
                                                                                                                  (3,3)     (-1,3) (1,3) (3,3) 
       systems have various levels of complexity. Even                                                            (-3,1)    (-1,1) (1,1) (3,1)             (v)
       though QPSK uses no state changes in amplitude, it                                            ai , bi                                  
       is sometimes referred to as 4-QAM. When four                                                               (-3,-1)   (-1,-1) (1,-1) (3,-1)
                                                                                                                                                 
       levels of amplitude are combined with the four                                                             (-3,-3)   (-1,-3) (1,-3) (3,-3)
       levels of phase, we get 16-QAM. In 16 QAM, 2 bits
       are encoded on phase changes, and 2 bits are                                                  Table-1: Summary of Model Parameters
       encoded on amplitude changes, yielding a total of 4                                            Parameters                 values
       bits per symbol. The general form of an M-ary
                                                                                                      Number Of Bits                          44000
       QAM signal can be defined as
                                                                                                      Number Of Subscribers                   200
               2 E min                                   2 E min
S i (t )                  ai cos(2f c t )                     bi sin(2f c t )                     FFT Size                                256
                  Ts                                       Ts                                         CP                                      1/4
      0t T ;                          i 1,2,….M                              (i)                    Coding                                  Cyclic Redundancy
                                                                                                                                              Check (CRC)
       Where Emin is the energy of the signal with the                                                Code rate                               2/3
       lowest amplitude, a and b are a pair of independent                                            Constraint length                       7
       integers chosen according to the location of the
                                                                                                      K-factor                                3
       particular signal point. It is to be noted here that M-
       ary QAM does not have constant energy per symbol,                                              Maximum Doppler shift                   100/40Hz
       nor does it have constant distance between possible                                            SNR                                     0-20
       symbol states. It reasons that particular values of (t)
                                                                                                      Modulation                              QAM, 16-QAM,
       will be detected with higher probability than others.
                                                                                                                                              64-QAM
                                                                                                      Noise Channels                          AWGN, Rayleigh
       If rectangular pulse shapes are assumed, the signal
                                                                                                                                              and Rician
       Si(t) may be expanded in of pair of basis functions
       defined as
                                                                                                     At the receiving section we have just reversed the
                       cos2f c t  0  t  Ts
                    2                                                                                procedures that we have performed at the
          1 (t )                                                                     (ii)          transmission section. After ensuring that the
                    Ts
                                                                                                     WiMAX PHY layer simulator is working properly
                                                                                                     we started to evaluate the performance of our
                               sin 2f c t  0  t  Ts (iii)
                            2
         2 (t )                                                                                    developed system. For this purpose we have varied
                            Ts                                                                       encoding techniques and digital modulation schemes
                                                                                                     under AWGN and frequency-flat fading (Rayleigh/
                                                                                                     Rician) channels. Bit Error Rate (BER) calculation
                                                                                                     against different Signal-to-Noise ratio (SNR) was
                                                                                                     adopted to evaluate the performance.

                                                                                                     III. SIMULATION RESULT
                                                                                                              This section presents and discusses all of
                                                                                                     the results obtained by the computer simulation
                                                                                                     program written in Matlab following the analytical
       Figure-b: Constellation diagram of an M-ary QAM                                               approach of a wireless communication system
       (M=16) signal set [8].                                                                        considering AWGN, Rayleigh Fading and Rician
        The co-ordinate of the i th message point are                                                Fading channel. A test case is considered with the
        ai Emin and bi Emin                                  where (a i ,b i ) is an                 synthetically generated data. The results are
                                                                                                     represented in terms of signal to noise ratio (SNR)
       element of the L by L matrix given by
                                                                                                     and the bit error rate (BER) for practical values of
                    ( L  1, L  1)      (-L  3, L - 1) .... (L - 1, L - 1)     
                                                                                                     system parameters.
                    ( L  1, L  3)                                                        (iv)
                                          ( - L  3, L - 3) .....(L - 1, L - 3)   
        ai, bi    .                          .                   .                              From figure-c we can see that, the bit error
                                                                                  
                     .                          .                    .                             rate(BER) performance of QAM modulation scheme
                    (-L  1,-L  1)
                                        (-L  3,-L  1)         (L - 1,-L  1)    
                                                                                                    has lower than 16-QAM and 64-QAM modulation
                                                                                                     scheme under the AWGN channel. For an example,


                                                                                                                                                      1060 | P a g e
Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/
              International Journal of Engineering Research and Applications
                   (IJERA)            ISSN: 2248-9622     www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1056-1062
while using the, for SNR value 13dB, BER for QAM
modulation remains 0, where BER for 16-QAM and
64-QAM modulation remains 0.00256 and 0.00519
respectively. After SNR value 13dB, BER for QAM
remains zero for the rest of the SNR values. But 16-
QAM and 64-QAM modulation has more non-zero
BER values than that of QAM modulation.




                                                       Figure-e: BER simulation of an Cyclic Redundancy
                                                       Check (CRC) encoded in QAM,16-QAM and 64-
                                                       QAM modulation schemes in an Rician channel.

                                                       From figure-e we can see that, the bit error
                                                       rate(BER) performance of QAM modulation scheme
                                                       has lower than 16-QAM and 64-QAM modulation
                                                       scheme under the Rician fading channels channel.
Figure-c: BER simulation of an Cyclic Redundancy       For an example, while using the, for SNR value
Check (CRC) encoded in QAM,16-QAM and 64-              19dB, BER for QAM modulation remains 0, where
QAM modulation schemes in an AWGN channel              BER for 16-QAM and 64-QAM modulation remains
                                                       0.00262 and 0.01289 respectively. After SNR value
From figure-d we can see that, the bit error rate      19dB, BER for QAM remains zero for the rest of the
(BER) performance of QAM modulation scheme has         SNR values. But 16-QAM and 64-QAM modulation
lower than 16-QAM and 64-QAM modulation                has more non-zero BER values than that of QAM
scheme under the Rayleigh fading channel. For an       modulation.
example, while using the, for SNR value 15dB, BER
for QAM modulation remains 0, where BER for 16-        IV. CONCLUSION
QAM and 64-QAM modulation remains 0.00311                       In this research work, it has been studied
and 0.01218 respectively. After SNR value 15dB,        the performance of an OFDM based wireless
BER for QAM remains zero for the rest of the SNR       WiMAX communication system adopting the Cyclic
values. But 16-QAM and 64-QAM modulation has           Redundancy Check (CRC) channel coding and
more non-zero BER values than that of QAM              different digital modulation schemes. A range of
modulation.                                            system performance results highlights the impact of
                                                       digital modulations under Cyclic Redundancy
                                                       Check (CRC) coding in AWGN and fading channels
                                                       (Rayleigh and Rician ).

                                                       The research work focuses on the performance
                                                       investigation by BER against Eb/No of coded
                                                       and uncoded WiMAX system under AWGN,
                                                       Rayleigh and Rician fading channels using different
                                                       digital modulations namely QAM ,16-QAM and
                                                       64-QAM. The BER values are always in between 0
                                                       to 0.02433. The BER curves were used to compare
                                                       the performance of different modulation techniques
                                                       and coding scheme. The effects of the Cyclic
                                                       Redundancy Check (CRC) coding and different
                                                       communication channels were also evaluated in the
Figure-d: BER simulation of an Cyclic Redundancy       form of BER. The effects of the Cyclic Redundancy
Check (CRC) encoded in QAM,16-QAM and 64-              Check (CRC) coding were also evaluated in the
QAM modulation schemes in an Rayleigh channel          form of BER and we conclude that the performance
                                                       three modulation order are better performance to



                                                                                          1061 | P a g e
Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/
                 International Journal of Engineering Research and Applications
                      (IJERA)            ISSN: 2248-9622     www.ijera.com
                      Vol. 2, Issue 5, September- October 2012, pp.1056-1062
given that QAM modulation with respect to 16-
QAM and 64-QAM modulation schemes.

REFERENCES
[1]      IEEE Standard 802.16™ -2004: Air Interface
         for Fixed and Mobie Broadband Wireless
         Access Systems. IEEE, 2004.

[2]      IEEE Standard 802.16™ -2005: Air Interface
         for Fixed and Mobie Wireless Access
         Systems. IEEE, 2006.

[3]      Loutfi Nuaymi: ―WiMAX: Technology for
         Broadband Wireless access‖, Wiley, 2007.

[4]      K. Fazel and S. Kaiser ―Multi-Carrier and
         Spread Spectrum Systems: From OFDM and
         MC- CDMA to LTE and WiMAX‖, 2nd
         Edition, John Wiley & Sons, 2008

[5]      A Thesis Submitted in partial fulfillment of
         the requirements for the M.Sc Degree in
         Applied      Physics    and       Electronic
         Engineering,Faculty of Science, University
         of Rajshahi, Bangladesh

[6]      http://en.wikipedia.org/wiki/Cyclic_redundan
         cy_check

[7]      M. A Mokhtar and S.C. Gupta, ―Power
         Control Considerations for DS/CDMA
         Personal Communication Systems,‖ IEEE
         Transactions on Vehicular Technology, vol.
         41, pp. 479–487, November 1992.

[8]      Theodore       S.     Rapaport,     ―Wireless
         Communications Principles and Practice,‖
         Prentice-Hall of India Private Limited,2004




                                                                             1062 | P a g e

Recomendados

N010328691 por
N010328691N010328691
N010328691IOSR Journals
122 vistas6 diapositivas
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F... por
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...CSCJournals
213 vistas21 diapositivas
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn por
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd Iaetsd
135 vistas6 diapositivas
Proptotype radio network por
Proptotype radio networkProptotype radio network
Proptotype radio networkfdr1975
247 vistas8 diapositivas
EC8004 - Wireless Networks Question Bank por
EC8004 - Wireless Networks Question BankEC8004 - Wireless Networks Question Bank
EC8004 - Wireless Networks Question BankKannanKrishnana
2.5K vistas5 diapositivas
27 122-1-pb por
27 122-1-pb27 122-1-pb
27 122-1-pbMahendra Sisodia
599 vistas6 diapositivas

Más contenido relacionado

La actualidad más candente

A simulation study of wi max based communication system using deliberately cl... por
A simulation study of wi max based communication system using deliberately cl...A simulation study of wi max based communication system using deliberately cl...
A simulation study of wi max based communication system using deliberately cl...eSAT Journals
103 vistas9 diapositivas
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN) por
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
41 vistas5 diapositivas
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks por
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksPanimalar Engineering College
158 vistas65 diapositivas
WiMAX II (IEEE 802.16m) as 4G Mobile Candidate por
WiMAX II (IEEE 802.16m) as 4G Mobile CandidateWiMAX II (IEEE 802.16m) as 4G Mobile Candidate
WiMAX II (IEEE 802.16m) as 4G Mobile CandidateKuncoro Wastuwibowo
1.8K vistas70 diapositivas
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and... por
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...ijcnac
1.9K vistas10 diapositivas
International Journal of Computational Engineering Research(IJCER) por
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
220 vistas7 diapositivas

La actualidad más candente(19)

A simulation study of wi max based communication system using deliberately cl... por eSAT Journals
A simulation study of wi max based communication system using deliberately cl...A simulation study of wi max based communication system using deliberately cl...
A simulation study of wi max based communication system using deliberately cl...
eSAT Journals103 vistas
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN) por IRJET Journal
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
IRJET Journal41 vistas
WiMAX II (IEEE 802.16m) as 4G Mobile Candidate por Kuncoro Wastuwibowo
WiMAX II (IEEE 802.16m) as 4G Mobile CandidateWiMAX II (IEEE 802.16m) as 4G Mobile Candidate
WiMAX II (IEEE 802.16m) as 4G Mobile Candidate
Kuncoro Wastuwibowo1.8K vistas
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and... por ijcnac
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
ijcnac1.9K vistas
International Journal of Computational Engineering Research(IJCER) por ijceronline
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline220 vistas
Design and analysis 5G mobile network model to enhancement high-density subsc... por journalBEEI
Design and analysis 5G mobile network model to enhancement high-density subsc...Design and analysis 5G mobile network model to enhancement high-density subsc...
Design and analysis 5G mobile network model to enhancement high-density subsc...
journalBEEI48 vistas
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks por IDES Editor
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksA Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
IDES Editor397 vistas
VHDL Implementation of FPGA Based OFDM Modem for Wireless Applications por Editor IJCATR
VHDL Implementation of FPGA Based OFDM Modem for Wireless ApplicationsVHDL Implementation of FPGA Based OFDM Modem for Wireless Applications
VHDL Implementation of FPGA Based OFDM Modem for Wireless Applications
Editor IJCATR729 vistas
01 01 bss signaling fundamental por Ericsson Saudi
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamental
Ericsson Saudi3.3K vistas
Wi MAX Deinter leaver’s Address Generation Unit through FPGA Implementation por ijceronline
Wi MAX Deinter leaver’s Address Generation Unit through FPGA ImplementationWi MAX Deinter leaver’s Address Generation Unit through FPGA Implementation
Wi MAX Deinter leaver’s Address Generation Unit through FPGA Implementation
ijceronline24 vistas
Smart communication system scs por HughCab
Smart communication system scsSmart communication system scs
Smart communication system scs
HughCab876 vistas
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS por ijistjournal
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
ijistjournal1K vistas
BSS training 2012 - for students por zhiar ahmad
BSS training 2012 - for studentsBSS training 2012 - for students
BSS training 2012 - for students
zhiar ahmad344 vistas
Performance Improvement of IEEE 802.22 WRAN Physical Layer por IOSR Journals
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical Layer
IOSR Journals423 vistas

Similar a Ft2510561062

Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W... por
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...IJMER
1.4K vistas8 diapositivas
4G technology por
4G technology4G technology
4G technologyAtul Kumar
287 vistas81 diapositivas
4G Mobile Communications por
4G Mobile Communications4G Mobile Communications
4G Mobile CommunicationsMd. Mashiur Rahman
1.7K vistas81 diapositivas
Data Processing And Processing Of Data por
Data Processing And Processing Of DataData Processing And Processing Of Data
Data Processing And Processing Of DataMegan Moore
4 vistas37 diapositivas
A countermeasure for flooding por
A countermeasure for floodingA countermeasure for flooding
A countermeasure for floodingijcsa
290 vistas14 diapositivas
Ew31992997 por
Ew31992997Ew31992997
Ew31992997IJERA Editor
241 vistas6 diapositivas

Similar a Ft2510561062(20)

Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W... por IJMER
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
IJMER1.4K vistas
4G technology por Atul Kumar
4G technology4G technology
4G technology
Atul Kumar287 vistas
Data Processing And Processing Of Data por Megan Moore
Data Processing And Processing Of DataData Processing And Processing Of Data
Data Processing And Processing Of Data
Megan Moore4 vistas
A countermeasure for flooding por ijcsa
A countermeasure for floodingA countermeasure for flooding
A countermeasure for flooding
ijcsa290 vistas
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG... por ijistjournal
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
ijistjournal16 vistas
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L... por ijngnjournal
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ijngnjournal62 vistas
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS por ijistjournal
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
ijistjournal74 vistas
WiMAX Features, Characteristics and Application in Wireless Technology Computing por ijtsrd
WiMAX Features, Characteristics and Application in Wireless Technology ComputingWiMAX Features, Characteristics and Application in Wireless Technology Computing
WiMAX Features, Characteristics and Application in Wireless Technology Computing
ijtsrd54 vistas
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS por ijwmn
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
ijwmn9 vistas
Frontiers of Wireless and Mobile Communications por Sai Varrshini
Frontiers of Wireless and Mobile CommunicationsFrontiers of Wireless and Mobile Communications
Frontiers of Wireless and Mobile Communications
Sai Varrshini434 vistas
CDMA Based Secure Cellular Communication via Satellite Link por IRJET Journal
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite Link
IRJET Journal35 vistas
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ... por IOSR Journals
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
IOSR Journals472 vistas
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ... por IOSR Journals
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
IOSR Journals247 vistas

Último

Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdf por
Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdfAdopting Karpenter for Cost and Simplicity at Grafana Labs.pdf
Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdfMichaelOLeary82
13 vistas74 diapositivas
Cocktail of Environments. How to Mix Test and Development Environments and St... por
Cocktail of Environments. How to Mix Test and Development Environments and St...Cocktail of Environments. How to Mix Test and Development Environments and St...
Cocktail of Environments. How to Mix Test and Development Environments and St...Aleksandr Tarasov
23 vistas135 diapositivas
Digital Personal Data Protection (DPDP) Practical Approach For CISOs por
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
162 vistas59 diapositivas
NTGapps NTG LowCode Platform por
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform Mustafa Kuğu
437 vistas30 diapositivas
AI + Memoori = AIM por
AI + Memoori = AIMAI + Memoori = AIM
AI + Memoori = AIMMemoori
14 vistas9 diapositivas
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」 por
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」PC Cluster Consortium
27 vistas68 diapositivas

Último(20)

Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdf por MichaelOLeary82
Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdfAdopting Karpenter for Cost and Simplicity at Grafana Labs.pdf
Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdf
MichaelOLeary8213 vistas
Cocktail of Environments. How to Mix Test and Development Environments and St... por Aleksandr Tarasov
Cocktail of Environments. How to Mix Test and Development Environments and St...Cocktail of Environments. How to Mix Test and Development Environments and St...
Cocktail of Environments. How to Mix Test and Development Environments and St...
Aleksandr Tarasov23 vistas
Digital Personal Data Protection (DPDP) Practical Approach For CISOs por Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash162 vistas
NTGapps NTG LowCode Platform por Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu437 vistas
AI + Memoori = AIM por Memoori
AI + Memoori = AIMAI + Memoori = AIM
AI + Memoori = AIM
Memoori14 vistas
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」 por PC Cluster Consortium
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」
"Package management in monorepos", Zoltan Kochan por Fwdays
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan Kochan
Fwdays34 vistas
"Running students' code in isolation. The hard way", Yurii Holiuk por Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays36 vistas
The Role of Patterns in the Era of Large Language Models por Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li91 vistas
LLMs in Production: Tooling, Process, and Team Structure por Aggregage
LLMs in Production: Tooling, Process, and Team StructureLLMs in Production: Tooling, Process, and Team Structure
LLMs in Production: Tooling, Process, and Team Structure
Aggregage57 vistas
Initiating and Advancing Your Strategic GIS Governance Strategy por Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software184 vistas
Measurecamp Brussels - Synthetic data.pdf por Human37
Measurecamp Brussels - Synthetic data.pdfMeasurecamp Brussels - Synthetic data.pdf
Measurecamp Brussels - Synthetic data.pdf
Human37 26 vistas
Discover Aura Workshop (12.5.23).pdf por Neo4j
Discover Aura Workshop (12.5.23).pdfDiscover Aura Workshop (12.5.23).pdf
Discover Aura Workshop (12.5.23).pdf
Neo4j15 vistas
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... por ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue199 vistas

Ft2510561062

  • 1. Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1056-1062 Performance Analysis of Cyclic Redundancy Check(CRC) encoded Fixed WiMAX Wireless Communication System under Implementation of M-ary Quadrature Amplitude Modulation(QAM) Technique Md. Abdul Halim1, Md. Ashraful Islam2, Tonima Islam3, Halida Homyara4 and Mustari Zaman5 1(Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.) 2 (Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.) 3 (Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.) 4 (Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.) 5(Department of Information & Communication Engineering, Rajshahi University, Rajshahi, Bangladesh.) ABSTRACT IEEE802.16 known as WiMAX started its first deployment in developed countries technology is a promised broadband wireless replacing both commonly used Wi-Fi on one hand technology that promises high-speed data and traditional cellular standards such as 3G. services up to the costumer end. The aim of this WiMAX technology is broadband wireless paper is the performance evaluation of Cyclic technology, which transmitted on the line-of-sight Redundancy Check (CRC) encoded fixed (LOS) and non line-of-sight (NLOS) transmission, WiMAX system under different combinations of operating in the 2 GHz to 11 GHz range and 10 GHz M-ary quadrature amplitude modulation to 66 GHz range respectively. Furthermore, techniques (QAM, 16-QAM and 64-QAM) and WiMAX systems, that support air interfaces access different communication channels AWGN and for fixed, nomadic, and mobile wireless fading channels (Rayleigh and Rician). It offers communications. The operation is wildly coverage both line of sight and non-line of sight wireless area LOS: 2-5 km and NLOS : 5-50 km [1-3]. IEEE communication. In our research work, we 802.16 is the standard to state the radio frequency of investigated the physical layer performance on fixed Broadband Wireless Access. WiMAX is the the basis of bit error rate (BER) and signal to trade name of ―IEEE 802.16 Standard‖. IEEE noise ratio (SNR). This research work 802.16 was first planned offer the last mile for demonstrates that QAM modulations is better Wireless Metropolitan Area Network (WMAN) with than the 16-QAM and 64-QAM modulations the line of sight (LOS) of 30 – 50 km. schemes of AWGN channels as it has the lowest bit error rate (BER). Basically the goal of WIMAX is to provide high speed internet access to home and business Keywords – AWGN, CRC, Fixed WiMAX, subscribers without wires. It supports legacy voice Fading Channel, M-ary QAM systems, voice over IP, TCP/IP, and Application with different QoS requirements. 802.16 consist of the access point, base station and subscriber station. I. INTRODUCTION During a communication, all the information Worldwide Interoperability for Microwave Access, coming from a subscriber station go to the base or WiMAX for short, is a next generation open station and retransmitted back to subscriber station. standard that seeks to serve users' increasing Base station can handle multiple of subscriber demands for high data throughput (broadband) station. Two types of links are defined in this:- services such as streaming media on the internet, The downlink: From base station to the subscriber live video conferencing, and mobile TV on station. computers as well as handsets and PDAs. WiMAX The uplink: From subscriber station to the base is expected to be integrated into the next generation station. [4] In this paper, we focus on the physical mass market consumer devices and to offer layer of WiMAX system simulating on IEEE802.16 something that does not exist today – speeds similar standards, which data transmitted on the to cable and metropolitan area coverage while on transmission channel. The transmission channel the move, all for a much lower cost than we are used component of AWGN(Additive white Gaussian to today. WiMAX already offers broadband services Noise) channel and Rician fading channel with in many emerging and rural markets which are not concatenated supported by wireline-based technologies and 1056 | P a g e
  • 2. Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1056-1062 II. SIMULATION MODEL on the rising edge of the data clock. A cyclic The transmitter and receiver sections of the redundancy check (CRC) is an error-detecting code WiMAX Physical layer are shown in the block commonly used in digital networks and storage diagram of Figure-a. In this setup, we have just devices to detect accidental changes to raw data. implemented the mandatory features of the Blocks of data entering these systems get a short specification, while leaving the implementation of check value attached, based on the remainder of a optional features for future work. The channel polynomial division of their contents; on retrieval the coding part is composed of coding techniques of the calculation is repeated, and corrective action can be Cyclic Redundancy Check (CRC). The taken against presumed data corruption if the check complementary operations are applied in the reverse values do not match. CRCs are based on the theory order at channel decoding in the receiver end. We of cyclic error-correcting codes. The use of do not explain each block in details. Here we only systematic cyclic codes, which encode messages by give the emphasis on M-ary quadrature amplitude adding a fixed-length check value, for the purpose of modulation Cyclic Redundancy Check (CRC) error detection in communication networks. Cyclic coding techniques. codes are not only simple to implement but have the In this section, the WiMAX PHY layer simulation benefit of being particularly well suited for the model with Cyclic Redundancy check(CRC) detection of burst errors, contiguous sequences of encoded to be implemented has been discussed erroneous data symbols in messages. This is thoroughly and all related assumptions have been important because burst errors are common stated clearly and justified. The implemented model transmission errors in many communication needs to be realistic as possible in order to get channels, including magnetic and optical storage reliable results. It is ought to be mentioned here that devices. Typically an n-bit CRC applied to a data the real communication systems are very much block of arbitrary length will detect any single error complicated and due to non availability of the burst not longer than n bits and will detect a fraction algorithms to simulate the performance evaluation 1−2−n of all longer error bursts.[6] Specification of a of their various sections, generally, simulations are CRC code requires definition of a so-called generator made on the basis of some assumptions to simplify polynomial. This polynomial resembles the divisor the communication system(s) concerned. It in a polynomial long division, which takes the consists of various sections. A brief description of message as the dividend and in which the quotient is the simulated model is given below [5] discarded and the remainder becomes the result, with the important distinction that the polynomial The block diagram of the simulated system model is coefficients are calculated according to the carry-less shown in Figure-a. The synthetically generated input arithmetic of a finite field. The length of the binary bit stream is ensured against transmission remainder is always less than the length of the errors with a Cyclic Redundancy Check (CRC). In generator polynomial, which therefore determines CRC channel coding scheme, a Cyclic Redundancy how long the result can be. In practice, all commonly Check (CRC) is applied to the input binary data. used CRCs employ the finite field GF(2). This is the The Cyclic Redundancy Check (CRC) encoded bits field of two elements, usually called 0 and 1, are prior to convert into each of the either complex comfortably matching computer architecture. The digital modulation symbols in QAM, 16-QAM, 64- rest of this article will discuss only these binary QAM modulations and fed to an OFDM modulator CRCs, but the principles are more general. The for transmission. The simulated coding and simplest error-detection system, the parity bit, is in modulation schemes used in the present study are fact a trivial 1-bit CRC: it uses the generator shown in Table-1.In OFDM modulator, the digitally polynomial x+1. A CRC-enabled device calculates a modulated information symbols are transmitted in short, fixed-length binary sequence,known as the parallel on sub carriers through implementation as check value or improperly the CRC, for each block an inverse First Fourier transform (IFFT) on a block of data to be sent or stored and appends it to the data, of information symbols followed by an analog-to- forming a codeword. When a codeword is received digital converter (ADC). To mitigate the effects of or read, the device either compares its check value inter-symbol interference (ISI) caused by channel with one freshly calculated from the data block, or time spread, each block of IFFT coefficients is equivalently, performs a CRC on the whole typically preceded by a cyclic prefix. At the codeword and compares the resulting check value receiver side, the received signal is OFDM with an expected residue constant. If the check demodulated, de-mapped, and then decoded in order values do not match, then the block contains a data to recover the data transmitted. error. The device may take corrective action, such as rereading the block or requesting that it be sent The default use of the Cyclic Redundancy Check again. Otherwise, the data is assumed to be error- (CRC) component is to compute CRC from a serial free (though, with some small probability, it may bit stream of any length. The input data is sampled contain undetected errors; this is the fundamental 1057 | P a g e
  • 3. Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1056-1062 nature of error-checking). The CRC value is reset to 0 before starting or can optionally be seeded with an initial value. On completion of the bit stream, the computed CRC value may be read out.[7] Cyclic redundancy codes add bits to the end of a message transaction for the purpose of error detection. The message information is divided by a generator polynomial. The remainder is then appended to the message and transmitted. The receiver divides the message and remainder by the same generator polynomial. If no errors have occurred, the remainder is zero. The process is as follows: 1. The original message polynomial is shifted to the left by the order of the generator polynomial 2. The shifted message is divided by the generator polynomial, producing a remainder 3. The remainder is appended to the message and transmitted. 4. The receiver divides the transmitted message by the generator polynomial 5. If a remainder occurs, the message is deemed in error and retransmission is requested 6. If no remainder exists, the message is shifted to the right by the order of the generator polynomial In the case of QAM (quadrature amplitude modulation), a finite number of at least two phases, and at least two amplitudes are used. QAM is both an analog and a digital modulation scheme. It conveys two analog message signals, or two digital bit streams, by changing (modulating) the amplitudes of two carrier waves, using the amplitude-shift keying (ASK) digital modulation scheme or amplitude modulation (AM) analog modulation scheme. The two carrier waves, usually sinusoids, are out of phase with each other by 90° and are thus called quadrature carriers or quadrature components — hence the name of the scheme. In the case of QAM, the amplitude of two waves, 90 degrees out-of-phase with each other 1058 | P a g e
  • 4. Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1056-1062 Digital Modulation M- Data Cyclic ary (QAM) Source Redundancy Check (CRC) Parallel to Cyclic Multi carrier Serial to Serial Prefix (CP) Modulator Parallel Converter Incertion (IFFT) Converter Channel Serial to Cyclic Multi carrier (AWGN & Parallel Prefix Demodulator Fading) Converter Removal (FFT) Cyclic Digital Parallel to Data Redundancy check(CRC) Demodulation Serial Retrieved Converter Decoder Figure-a: A block diagram of Cyclic Redundancy Check (CRC) encoded WiMAX communication system 1059 | P a g e
  • 5. Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1056-1062 (in quadrature) are changed (modulated or keyed) Where L= M . For a 16-QAM with signal to represent the data signalMany modern fixed constellation as shown in figure 3, the L by L matrix microwave communication systems are based on is quadrature amplitude modulation (QAM). These (3,3) (-1,3) (1,3) (3,3)  systems have various levels of complexity. Even (-3,1) (-1,1) (1,1) (3,1)  (v) though QPSK uses no state changes in amplitude, it ai , bi     is sometimes referred to as 4-QAM. When four (-3,-1) (-1,-1) (1,-1) (3,-1)   levels of amplitude are combined with the four (-3,-3) (-1,-3) (1,-3) (3,-3) levels of phase, we get 16-QAM. In 16 QAM, 2 bits are encoded on phase changes, and 2 bits are Table-1: Summary of Model Parameters encoded on amplitude changes, yielding a total of 4 Parameters values bits per symbol. The general form of an M-ary Number Of Bits 44000 QAM signal can be defined as Number Of Subscribers 200 2 E min 2 E min S i (t )  ai cos(2f c t )  bi sin(2f c t ) FFT Size 256 Ts Ts CP 1/4 0t T ; i 1,2,….M (i) Coding Cyclic Redundancy Check (CRC) Where Emin is the energy of the signal with the Code rate 2/3 lowest amplitude, a and b are a pair of independent Constraint length 7 integers chosen according to the location of the K-factor 3 particular signal point. It is to be noted here that M- ary QAM does not have constant energy per symbol, Maximum Doppler shift 100/40Hz nor does it have constant distance between possible SNR 0-20 symbol states. It reasons that particular values of (t) Modulation QAM, 16-QAM, will be detected with higher probability than others. 64-QAM Noise Channels AWGN, Rayleigh If rectangular pulse shapes are assumed, the signal and Rician Si(t) may be expanded in of pair of basis functions defined as At the receiving section we have just reversed the cos2f c t  0  t  Ts 2 procedures that we have performed at the 1 (t )  (ii) transmission section. After ensuring that the Ts WiMAX PHY layer simulator is working properly we started to evaluate the performance of our sin 2f c t  0  t  Ts (iii) 2  2 (t )  developed system. For this purpose we have varied Ts encoding techniques and digital modulation schemes under AWGN and frequency-flat fading (Rayleigh/ Rician) channels. Bit Error Rate (BER) calculation against different Signal-to-Noise ratio (SNR) was adopted to evaluate the performance. III. SIMULATION RESULT This section presents and discusses all of the results obtained by the computer simulation program written in Matlab following the analytical Figure-b: Constellation diagram of an M-ary QAM approach of a wireless communication system (M=16) signal set [8]. considering AWGN, Rayleigh Fading and Rician The co-ordinate of the i th message point are Fading channel. A test case is considered with the ai Emin and bi Emin where (a i ,b i ) is an synthetically generated data. The results are represented in terms of signal to noise ratio (SNR) element of the L by L matrix given by and the bit error rate (BER) for practical values of ( L  1, L  1) (-L  3, L - 1) .... (L - 1, L - 1)  system parameters. ( L  1, L  3)  (iv)  ( - L  3, L - 3) .....(L - 1, L - 3)  ai, bi    . . .  From figure-c we can see that, the bit error    . . .  rate(BER) performance of QAM modulation scheme (-L  1,-L  1)  (-L  3,-L  1) (L - 1,-L  1)   has lower than 16-QAM and 64-QAM modulation scheme under the AWGN channel. For an example, 1060 | P a g e
  • 6. Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1056-1062 while using the, for SNR value 13dB, BER for QAM modulation remains 0, where BER for 16-QAM and 64-QAM modulation remains 0.00256 and 0.00519 respectively. After SNR value 13dB, BER for QAM remains zero for the rest of the SNR values. But 16- QAM and 64-QAM modulation has more non-zero BER values than that of QAM modulation. Figure-e: BER simulation of an Cyclic Redundancy Check (CRC) encoded in QAM,16-QAM and 64- QAM modulation schemes in an Rician channel. From figure-e we can see that, the bit error rate(BER) performance of QAM modulation scheme has lower than 16-QAM and 64-QAM modulation scheme under the Rician fading channels channel. Figure-c: BER simulation of an Cyclic Redundancy For an example, while using the, for SNR value Check (CRC) encoded in QAM,16-QAM and 64- 19dB, BER for QAM modulation remains 0, where QAM modulation schemes in an AWGN channel BER for 16-QAM and 64-QAM modulation remains 0.00262 and 0.01289 respectively. After SNR value From figure-d we can see that, the bit error rate 19dB, BER for QAM remains zero for the rest of the (BER) performance of QAM modulation scheme has SNR values. But 16-QAM and 64-QAM modulation lower than 16-QAM and 64-QAM modulation has more non-zero BER values than that of QAM scheme under the Rayleigh fading channel. For an modulation. example, while using the, for SNR value 15dB, BER for QAM modulation remains 0, where BER for 16- IV. CONCLUSION QAM and 64-QAM modulation remains 0.00311 In this research work, it has been studied and 0.01218 respectively. After SNR value 15dB, the performance of an OFDM based wireless BER for QAM remains zero for the rest of the SNR WiMAX communication system adopting the Cyclic values. But 16-QAM and 64-QAM modulation has Redundancy Check (CRC) channel coding and more non-zero BER values than that of QAM different digital modulation schemes. A range of modulation. system performance results highlights the impact of digital modulations under Cyclic Redundancy Check (CRC) coding in AWGN and fading channels (Rayleigh and Rician ). The research work focuses on the performance investigation by BER against Eb/No of coded and uncoded WiMAX system under AWGN, Rayleigh and Rician fading channels using different digital modulations namely QAM ,16-QAM and 64-QAM. The BER values are always in between 0 to 0.02433. The BER curves were used to compare the performance of different modulation techniques and coding scheme. The effects of the Cyclic Redundancy Check (CRC) coding and different communication channels were also evaluated in the Figure-d: BER simulation of an Cyclic Redundancy form of BER. The effects of the Cyclic Redundancy Check (CRC) encoded in QAM,16-QAM and 64- Check (CRC) coding were also evaluated in the QAM modulation schemes in an Rayleigh channel form of BER and we conclude that the performance three modulation order are better performance to 1061 | P a g e
  • 7. Md. Abdul Halim, Md. Ashraful Islam, Tonima Islam, Halida Homyara, Mustari Zaman/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1056-1062 given that QAM modulation with respect to 16- QAM and 64-QAM modulation schemes. REFERENCES [1] IEEE Standard 802.16™ -2004: Air Interface for Fixed and Mobie Broadband Wireless Access Systems. IEEE, 2004. [2] IEEE Standard 802.16™ -2005: Air Interface for Fixed and Mobie Wireless Access Systems. IEEE, 2006. [3] Loutfi Nuaymi: ―WiMAX: Technology for Broadband Wireless access‖, Wiley, 2007. [4] K. Fazel and S. Kaiser ―Multi-Carrier and Spread Spectrum Systems: From OFDM and MC- CDMA to LTE and WiMAX‖, 2nd Edition, John Wiley & Sons, 2008 [5] A Thesis Submitted in partial fulfillment of the requirements for the M.Sc Degree in Applied Physics and Electronic Engineering,Faculty of Science, University of Rajshahi, Bangladesh [6] http://en.wikipedia.org/wiki/Cyclic_redundan cy_check [7] M. A Mokhtar and S.C. Gupta, ―Power Control Considerations for DS/CDMA Personal Communication Systems,‖ IEEE Transactions on Vehicular Technology, vol. 41, pp. 479–487, November 1992. [8] Theodore S. Rapaport, ―Wireless Communications Principles and Practice,‖ Prentice-Hall of India Private Limited,2004 1062 | P a g e