SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 05 Issue: 01 June 2016, Page No. 55- 58
ISSN: 2278-2397
55
High Speed Low-Power Viterbi Decoder Using
Trellis Code Modulation
K. Neelaveni1
, G.Saravanakumar2
1
Student, ME-VLSI Design, ,Sri Ramanujar Engineering College, Vandalur, Kolappakkam,Chennai
2
Assistant Professor (OG), ,Dept of ECE,Sri Ramanujar Engineering College,Vandalur,Kolappakkam, Chennai
Email: kneelaveni92@gmail.com, gskumar2981980@gmail.com
Abstract - High speed low power viterbi decoders for trellis
code modulation is well known for the delay consumption in
underwater communication. In transmission system wireless
communication is the transfer of information between two or
more points that are not connected by an electrical conductor.
WiMAX is the wireless communication standard designed to
provide 30 to 40 Mega bits per second data rates. WiMAX as a
standards based technology enabling the delivery of last mile
wireless broadband access as an alternative to cable and DSL.
WiMAX can provide at home or mobile internet access across
whole cities or countries. The address generation of WiMAX is
carried out by interleaver and deinterleaver. Interleaving is
used to overcome correlated channel noise such as burst error
or fading. The interleaver/deinterleaver rearranges input data
such that consecutive data are spaced apart. The interleaved
memory is to improve the speed of access to memory. The
viterbi technique reduces the bit error rate and delay using
wimax.
Keywords-WiMAX, Interleaver, Deinterleaver, Viterbi
encoding/decoding
I. INTRODUCTION
Broadband wireless access is continuously becoming a more
challenging competitor to the conventional wired last mile
access technologies. WiMAX stands for Worldwide
Interoperability for Microwave Access, it is used as an
alternative to cable and DSL.WLAN and WiMAX are
emerging standards for wireless broadband communication
system. In WiMAX transreceiver the channel interleaver is
present which is used to minimize the effect of burst error. The
interleaver rearranges the input data such that consecutive data
are spaced apart. The deinterleaver in receiver side arranges the
interleaved data into original sequence. The direct
implementation of interleaver/deinterleaver functions in
WiMAX is not hardware efficient due to the presence of
complex function. In WiMAX application the address
generation for deinterleaver using the modulation technique
such as QPSK,16QAM and 64QAM. The 2-D transformation
of WiMAX channel interleaver/deinterleaver functions reduces
the overall hardware complexity to compute the deinterleaver
address and also it eliminate the requirement of floor function.
Compare to configurable logic block based multiplier the use
of FPGA based embedded multiplier provides better
performance. It reduces interconnection delay, efficient
resource utilization and lower power consumption.
II. RELATED WORK
A few work related to the hardware implementation of
interleaver/deinterleaver function in WiMAX system is
available in the literature. The work shows the grouping of
incoming data streams in to block to reduce the frequency of
memory access in a deinterleaver using conventional look up
table based address generator in WiMAX system. The work
also shows that, it is finite state machine based technique is
used to generate the address for interleaver/deinterleaver in
WiMAX system. The modulation technique is used to
eliminate the requirement of floor function while generating
the write address. The 2D translation is made to claim efficient
hardware architecture but not clearly explain the design,
particularly for 64 quadrature amplitude modulation (QAM).
Conventional LUT based technique is found to be unattractive
from many aspects such as slowness in operation, consumption
of large logic resources leading to inefficiency in resource
utilization.
III.DESCRIPTION
The overview of WiMAX transreceiver is shown in figure 1.
The input is given to the source and the output of the source is
randomized before being encoded by two Forward Error
Correction (FEC) techniques such as Reed Solomon 1398 (RS)
and Convolutional Coding (CC). The channel interleaver
allows the encoded bit stream to reduce the effect of burst
error. The channel interleaver is not required when
Convolutional turbo code is used for Forward Error
Correction. The resulting data symbols are used to mapping
and construct the orthogonal frequency division multiplexing is
performed by two blocks namely mapper and inverse fast
fourier transform. In receiver the blocks are arranged in the
reverse order to restore the original data sequence at the output.
Fig 1: Overview of WiMAX Transreceiver
Reed Solomon code is a linear cyclic systematic non binary
block code. A generator polynomial is used to generate the
redundant symbols and it is appended to the message symbols,
in the encoder. The same generator polynomial is used to
calculate the error location and magnitude in decoder. Then the
correction is applied on the received code. Instead of reed
solomon code the viterbi algorithm is used in WiMAX
transreceiver. The viterbi algorithm is the optimum algorithm
that reduces the probability of error.
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 05 Issue: 01 June 2016, Page No. 55- 58
ISSN: 2278-2397
56
IV WiMAX CHANNEL INTERLEAVER
The interleaver memory block has two memory modules are
M1, M2 and also has three mux and an inverter. In block
interleaving when one memory block is being written and other
is read and vice versa.
Fig 2: Interleaver/deinterleaver structure
The MUX connected to the address input and sel line are used
to perform either read or write operation in each memory
modules. When sel line = 1, the write enable signal in M1 is
active and it generate write address, simultaneously M2
generate read address. After the read/write operation, it is
stored in derived location and then the status of the sel signal is
changed to exchange the read/write operation. The data stream
obtained from the RS-CC encoder is permuted by using the
two step processes described by (1) and (2). Thus
TABLE I
Permitted Interleaver/Deinterleaver Depth for All Code Rates
and Modulation Type
First Four Rows And Five Columns of Deinterleaver Sample
Addresses For Three Code Rates and Modulation Schemes
TABLE II
V WiMAX CHANNEL DEINTERLEAVER
The deinterleaver performs the inverse operation, is also
permuted by two step process. Let mj and kj define the first
and level of permutation for the deinterleaver, where j is the
received bit index within a block of Ncbps bits.
mj = s. [j/s] + (j + [d.j / Ncbps]) %s (3)
It ensures the adjacent coded bits are mapped on to
nonadjacent carriers.
kj = d.mj – (Ncbps - 1) . [d.mj / Ncbps] (4)
Eqns (3) and (4) perform inverse operation of (2) and (1)
respectively.
Where j = 0,1,…..,d-1 and i = 0,1,….,(Ncbps/d)-1 represent the
row and column numbers and kn represents the deinterleaver
addresses. The equation (5)-(7) represents the correlation
between addresses of table III has been proven using algebraic
analysis. The mathematical representation of (5)-(7) follows
three algorithms for three modulation techniques. These
algorithms eliminate the requirement of floor function while
generating write addresses.
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 05 Issue: 01 June 2016, Page No. 55- 58
ISSN: 2278-2397
57
TABLE III
Determination of Correlation Between Addresses
Fig 3: Complete deinterleaver address generator
VI Architecture of The Deinterleaver Address Generator
The complete deinterleaver address generator is shown in fig 1.
Here QPSK block, 16 QAM block and 64 QAM block are
presented. The common logic circuits such as multiplier, adder,
row counter and column counter are shared while generating
for any modulation technique. The design also shares the
incrementer and decrementer required in 16 QAM ad 64 QAM
blocks.
VII VITERBI TECHNIQUE
The viterbi algorithm is the maximum likelihood decoding
procedure for Convolutional codes. The viterbi algorithm is
used to find the sequence of hidden state as viterbi path. The
algorithm can be applied to a host of problems encountered in
the design of communication system. The operation of viterbi
algorithm is through trellis diagram. By using trellis diagram
the viterbi path determine the shortest path. The viterbi decoder
begins after a certain number of encoded symbols have been
received. A viterbi decoder uses the viterbi algorithm for
decoding a bitstream. The viterbi decoding algorithm provides
both maximum likelihood and maximum posterior algorithm.
The Convolutional code is used to encode the bitstream. The
major blocks of viterbi decoder are branch metric unit, path
metric unit and trace back unit. There are hard decision and
soft decision in viterbi decoder. A hard decision viterbi
decoder receives a single bitstream on its input. A soft decision
viterbi decoder receives a bitstream containing information
about the reliability of each received signal. The viterbi
decoding reduces the bit error rate.
VIII SIMULATION RESULT
The proposed hardware of the address generator is
implemented using HDL VHDL using the Xilinx ISE.
Simulation result is obtained for viterbi encoding/decoding and
interleaver/deinterleaver using Modelsim 6.2c.
Fig 4: Simulation of Interleaver/deinterleaver
Fig 5: Viterbi technique
IX CONCLUSION
This paper has proposed an address generation for WiMAX
deinterleaver. The WiMAX channel deinterleaver support all
possible code rates. The proposed algorithm is converted into
an optimized digital hardware circuit. The hardware is
implemented on the Xilinx FPGA using VHDL.Compare to
Reed Solomon technique, the viterbi technique reduces the
error rate and time consumption.
References
[1] S. Mohanraj"Design of Efficient Viterbi Technique for
Interleaving and Deinterleaving"IEEE Sponsored 2nd
International Conference (Icecs 2015)
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 05 Issue: 01 June 2016, Page No. 55- 58
ISSN: 2278-2397
58
[2] B. Li, Y. Qin, C. P. Low, and C. L. Gwee, "A survey on
mobile WiMAX," IEEE Commusn. Mag., vol, 45, no. 12,
pp. 70-75, Dec 2007.
[3] Y. N. Chang and Y. C. Ding, "A low-cost dual mode
deinterleaverdesign," in Proc Int. Conf. Consum.
Electron., 2007 , pp. 1-2.
[4] A. A. Khater, M. M. Khairy, and S. E.D.Habib, "Efficient
FPGA implementation for the IEEE 802.16e interleaver,"
in Proc. Int. Conf. Microelectron.,Marrakech, Morocco,
2009, pp. 181-184.
[5] B. K. Upadhyaya, I. S. Misra, and S. K. Sanyal, "Novel
design of address generator for WiMAX multimode
interleaver using FPGA based finite state machine," in
Proc. 13th Int. Conf. Comput. Inf. Technol., Dhaka,
Bangladesh, 2010, pp. 153-158.
[6] R. Asghar and D. Liu, "2D realization of WiMAX channel
interleaver for efficient hardware implementation," in
Proc. World Acad. Sci. Eng.Technol.,Hong Kong, 2009,
vol. 51, pp. 25-29.
[7] W. Konhauser, "Broadband wireless access solutions-
Progressive challenges and potential value of next
generation," Wireless pers. Communication., vol. 37, no.
3/4, pp. 243-259, May 2006.

Weitere ähnliche Inhalte

Ähnlich wie High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation

Fpga based low power and high performance address generator for wimax deinter...
Fpga based low power and high performance address generator for wimax deinter...Fpga based low power and high performance address generator for wimax deinter...
Fpga based low power and high performance address generator for wimax deinter...eSAT Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلاییmorteza zilaie bouri
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Journals
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Publishing House
 
Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...journalBEEI
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct_journal
 
IRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their SignificanceIRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their SignificanceIRJET Journal
 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
 
Arithmetic Operations in Multi-Valued Logic
Arithmetic Operations in Multi-Valued Logic   Arithmetic Operations in Multi-Valued Logic
Arithmetic Operations in Multi-Valued Logic VLSICS Design
 
Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...
Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...
Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...ijsrd.com
 

Ähnlich wie High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation (20)

Fpga based low power and high performance address generator for wimax deinter...
Fpga based low power and high performance address generator for wimax deinter...Fpga based low power and high performance address generator for wimax deinter...
Fpga based low power and high performance address generator for wimax deinter...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
THROUGHPUT ANALYSIS OF MOBILE WIMAX NETWORK UNDER MULTIPATH RICIAN FADING CHA...
THROUGHPUT ANALYSIS OF MOBILE WIMAX NETWORK UNDER MULTIPATH RICIAN FADING CHA...THROUGHPUT ANALYSIS OF MOBILE WIMAX NETWORK UNDER MULTIPATH RICIAN FADING CHA...
THROUGHPUT ANALYSIS OF MOBILE WIMAX NETWORK UNDER MULTIPATH RICIAN FADING CHA...
 
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
 
477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
E010224043
E010224043E010224043
E010224043
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
 
Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
 
IRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their SignificanceIRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their Significance
 
Hv3414491454
Hv3414491454Hv3414491454
Hv3414491454
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
 
Arithmetic Operations in Multi-Valued Logic
Arithmetic Operations in Multi-Valued Logic   Arithmetic Operations in Multi-Valued Logic
Arithmetic Operations in Multi-Valued Logic
 
K0216571
K0216571K0216571
K0216571
 
72
7272
72
 
Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...
Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...
Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...
 

Mehr von MangaiK4

Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...MangaiK4
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...MangaiK4
 
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmRelation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmMangaiK4
 
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicSaturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicMangaiK4
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmMangaiK4
 
A Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationA Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationMangaiK4
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingMangaiK4
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachMangaiK4
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMangaiK4
 
Encroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyEncroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyMangaiK4
 
Performance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesPerformance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesMangaiK4
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
 
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmModeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmMangaiK4
 
quasi-uniform theta graph
quasi-uniform theta graphquasi-uniform theta graph
quasi-uniform theta graphMangaiK4
 
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...MangaiK4
 
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...MangaiK4
 
Marine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMarine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMangaiK4
 
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...MangaiK4
 
Detection of Nutrient Deficiencies in Plant Leaves using Image Processing
Detection of Nutrient Deficiencies in Plant Leaves using Image ProcessingDetection of Nutrient Deficiencies in Plant Leaves using Image Processing
Detection of Nutrient Deficiencies in Plant Leaves using Image ProcessingMangaiK4
 
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...MangaiK4
 

Mehr von MangaiK4 (20)

Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
 
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmRelation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
 
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicSaturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA Algorithm
 
A Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationA Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for Education
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud Computing
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS Technique
 
Encroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyEncroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data Technology
 
Performance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesPerformance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing Images
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and Steganography
 
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmModeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
 
quasi-uniform theta graph
quasi-uniform theta graphquasi-uniform theta graph
quasi-uniform theta graph
 
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
 
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
 
Marine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMarine Object Recognition using Blob Analysis
Marine Object Recognition using Blob Analysis
 
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
 
Detection of Nutrient Deficiencies in Plant Leaves using Image Processing
Detection of Nutrient Deficiencies in Plant Leaves using Image ProcessingDetection of Nutrient Deficiencies in Plant Leaves using Image Processing
Detection of Nutrient Deficiencies in Plant Leaves using Image Processing
 
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
 

Kürzlich hochgeladen

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 

Kürzlich hochgeladen (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation

  • 1. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 05 Issue: 01 June 2016, Page No. 55- 58 ISSN: 2278-2397 55 High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation K. Neelaveni1 , G.Saravanakumar2 1 Student, ME-VLSI Design, ,Sri Ramanujar Engineering College, Vandalur, Kolappakkam,Chennai 2 Assistant Professor (OG), ,Dept of ECE,Sri Ramanujar Engineering College,Vandalur,Kolappakkam, Chennai Email: kneelaveni92@gmail.com, gskumar2981980@gmail.com Abstract - High speed low power viterbi decoders for trellis code modulation is well known for the delay consumption in underwater communication. In transmission system wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. WiMAX is the wireless communication standard designed to provide 30 to 40 Mega bits per second data rates. WiMAX as a standards based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. WiMAX can provide at home or mobile internet access across whole cities or countries. The address generation of WiMAX is carried out by interleaver and deinterleaver. Interleaving is used to overcome correlated channel noise such as burst error or fading. The interleaver/deinterleaver rearranges input data such that consecutive data are spaced apart. The interleaved memory is to improve the speed of access to memory. The viterbi technique reduces the bit error rate and delay using wimax. Keywords-WiMAX, Interleaver, Deinterleaver, Viterbi encoding/decoding I. INTRODUCTION Broadband wireless access is continuously becoming a more challenging competitor to the conventional wired last mile access technologies. WiMAX stands for Worldwide Interoperability for Microwave Access, it is used as an alternative to cable and DSL.WLAN and WiMAX are emerging standards for wireless broadband communication system. In WiMAX transreceiver the channel interleaver is present which is used to minimize the effect of burst error. The interleaver rearranges the input data such that consecutive data are spaced apart. The deinterleaver in receiver side arranges the interleaved data into original sequence. The direct implementation of interleaver/deinterleaver functions in WiMAX is not hardware efficient due to the presence of complex function. In WiMAX application the address generation for deinterleaver using the modulation technique such as QPSK,16QAM and 64QAM. The 2-D transformation of WiMAX channel interleaver/deinterleaver functions reduces the overall hardware complexity to compute the deinterleaver address and also it eliminate the requirement of floor function. Compare to configurable logic block based multiplier the use of FPGA based embedded multiplier provides better performance. It reduces interconnection delay, efficient resource utilization and lower power consumption. II. RELATED WORK A few work related to the hardware implementation of interleaver/deinterleaver function in WiMAX system is available in the literature. The work shows the grouping of incoming data streams in to block to reduce the frequency of memory access in a deinterleaver using conventional look up table based address generator in WiMAX system. The work also shows that, it is finite state machine based technique is used to generate the address for interleaver/deinterleaver in WiMAX system. The modulation technique is used to eliminate the requirement of floor function while generating the write address. The 2D translation is made to claim efficient hardware architecture but not clearly explain the design, particularly for 64 quadrature amplitude modulation (QAM). Conventional LUT based technique is found to be unattractive from many aspects such as slowness in operation, consumption of large logic resources leading to inefficiency in resource utilization. III.DESCRIPTION The overview of WiMAX transreceiver is shown in figure 1. The input is given to the source and the output of the source is randomized before being encoded by two Forward Error Correction (FEC) techniques such as Reed Solomon 1398 (RS) and Convolutional Coding (CC). The channel interleaver allows the encoded bit stream to reduce the effect of burst error. The channel interleaver is not required when Convolutional turbo code is used for Forward Error Correction. The resulting data symbols are used to mapping and construct the orthogonal frequency division multiplexing is performed by two blocks namely mapper and inverse fast fourier transform. In receiver the blocks are arranged in the reverse order to restore the original data sequence at the output. Fig 1: Overview of WiMAX Transreceiver Reed Solomon code is a linear cyclic systematic non binary block code. A generator polynomial is used to generate the redundant symbols and it is appended to the message symbols, in the encoder. The same generator polynomial is used to calculate the error location and magnitude in decoder. Then the correction is applied on the received code. Instead of reed solomon code the viterbi algorithm is used in WiMAX transreceiver. The viterbi algorithm is the optimum algorithm that reduces the probability of error.
  • 2. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 05 Issue: 01 June 2016, Page No. 55- 58 ISSN: 2278-2397 56 IV WiMAX CHANNEL INTERLEAVER The interleaver memory block has two memory modules are M1, M2 and also has three mux and an inverter. In block interleaving when one memory block is being written and other is read and vice versa. Fig 2: Interleaver/deinterleaver structure The MUX connected to the address input and sel line are used to perform either read or write operation in each memory modules. When sel line = 1, the write enable signal in M1 is active and it generate write address, simultaneously M2 generate read address. After the read/write operation, it is stored in derived location and then the status of the sel signal is changed to exchange the read/write operation. The data stream obtained from the RS-CC encoder is permuted by using the two step processes described by (1) and (2). Thus TABLE I Permitted Interleaver/Deinterleaver Depth for All Code Rates and Modulation Type First Four Rows And Five Columns of Deinterleaver Sample Addresses For Three Code Rates and Modulation Schemes TABLE II V WiMAX CHANNEL DEINTERLEAVER The deinterleaver performs the inverse operation, is also permuted by two step process. Let mj and kj define the first and level of permutation for the deinterleaver, where j is the received bit index within a block of Ncbps bits. mj = s. [j/s] + (j + [d.j / Ncbps]) %s (3) It ensures the adjacent coded bits are mapped on to nonadjacent carriers. kj = d.mj – (Ncbps - 1) . [d.mj / Ncbps] (4) Eqns (3) and (4) perform inverse operation of (2) and (1) respectively. Where j = 0,1,…..,d-1 and i = 0,1,….,(Ncbps/d)-1 represent the row and column numbers and kn represents the deinterleaver addresses. The equation (5)-(7) represents the correlation between addresses of table III has been proven using algebraic analysis. The mathematical representation of (5)-(7) follows three algorithms for three modulation techniques. These algorithms eliminate the requirement of floor function while generating write addresses.
  • 3. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 05 Issue: 01 June 2016, Page No. 55- 58 ISSN: 2278-2397 57 TABLE III Determination of Correlation Between Addresses Fig 3: Complete deinterleaver address generator VI Architecture of The Deinterleaver Address Generator The complete deinterleaver address generator is shown in fig 1. Here QPSK block, 16 QAM block and 64 QAM block are presented. The common logic circuits such as multiplier, adder, row counter and column counter are shared while generating for any modulation technique. The design also shares the incrementer and decrementer required in 16 QAM ad 64 QAM blocks. VII VITERBI TECHNIQUE The viterbi algorithm is the maximum likelihood decoding procedure for Convolutional codes. The viterbi algorithm is used to find the sequence of hidden state as viterbi path. The algorithm can be applied to a host of problems encountered in the design of communication system. The operation of viterbi algorithm is through trellis diagram. By using trellis diagram the viterbi path determine the shortest path. The viterbi decoder begins after a certain number of encoded symbols have been received. A viterbi decoder uses the viterbi algorithm for decoding a bitstream. The viterbi decoding algorithm provides both maximum likelihood and maximum posterior algorithm. The Convolutional code is used to encode the bitstream. The major blocks of viterbi decoder are branch metric unit, path metric unit and trace back unit. There are hard decision and soft decision in viterbi decoder. A hard decision viterbi decoder receives a single bitstream on its input. A soft decision viterbi decoder receives a bitstream containing information about the reliability of each received signal. The viterbi decoding reduces the bit error rate. VIII SIMULATION RESULT The proposed hardware of the address generator is implemented using HDL VHDL using the Xilinx ISE. Simulation result is obtained for viterbi encoding/decoding and interleaver/deinterleaver using Modelsim 6.2c. Fig 4: Simulation of Interleaver/deinterleaver Fig 5: Viterbi technique IX CONCLUSION This paper has proposed an address generation for WiMAX deinterleaver. The WiMAX channel deinterleaver support all possible code rates. The proposed algorithm is converted into an optimized digital hardware circuit. The hardware is implemented on the Xilinx FPGA using VHDL.Compare to Reed Solomon technique, the viterbi technique reduces the error rate and time consumption. References [1] S. Mohanraj"Design of Efficient Viterbi Technique for Interleaving and Deinterleaving"IEEE Sponsored 2nd International Conference (Icecs 2015)
  • 4. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 05 Issue: 01 June 2016, Page No. 55- 58 ISSN: 2278-2397 58 [2] B. Li, Y. Qin, C. P. Low, and C. L. Gwee, "A survey on mobile WiMAX," IEEE Commusn. Mag., vol, 45, no. 12, pp. 70-75, Dec 2007. [3] Y. N. Chang and Y. C. Ding, "A low-cost dual mode deinterleaverdesign," in Proc Int. Conf. Consum. Electron., 2007 , pp. 1-2. [4] A. A. Khater, M. M. Khairy, and S. E.D.Habib, "Efficient FPGA implementation for the IEEE 802.16e interleaver," in Proc. Int. Conf. Microelectron.,Marrakech, Morocco, 2009, pp. 181-184. [5] B. K. Upadhyaya, I. S. Misra, and S. K. Sanyal, "Novel design of address generator for WiMAX multimode interleaver using FPGA based finite state machine," in Proc. 13th Int. Conf. Comput. Inf. Technol., Dhaka, Bangladesh, 2010, pp. 153-158. [6] R. Asghar and D. Liu, "2D realization of WiMAX channel interleaver for efficient hardware implementation," in Proc. World Acad. Sci. Eng.Technol.,Hong Kong, 2009, vol. 51, pp. 25-29. [7] W. Konhauser, "Broadband wireless access solutions- Progressive challenges and potential value of next generation," Wireless pers. Communication., vol. 37, no. 3/4, pp. 243-259, May 2006.