Wi Fi documantation

95
WI-FI TECHNOLOGY CHAPTER 1 1. INTRODUCTION 1.1 Introduction to VLSI The first digital circuit was designed by using electronic components like vacuum tubes and transistors. Later Integrated Circuits (ICs) were invented, where a designer can be able to place digital circuits on a chip consists of less than 10 gates for an IC called SSI (Small Scale Integration) scale. With the advent of new fabrication techniques designer can place more than 100 gates on an IC called MSI (Medium Scale Integration). Using design at this level, one can create digital sub blocks (adders, multiplexes, counters, registers, and etc.) on an IC. This level is LSI (Large Scale Integration), using this scale of integration people succeeded to make digital subsystems (Microprocessor, I/O peripheral devices and etc.) on a chip. At this point design process started getting very complicated. i.e., manually conversion from schematic level to gate level or gate level to layout level was becoming somewhat lengthy process and verifying the functionality of digital circuits at various levels became critical. This created new challenges to digital designers as well as circuit designers. Designers felt need to automate these processes. In this process, Rapid advances in Software Technology and development of new higher level Page 1

Transcript of Wi Fi documantation

Page 1: Wi Fi documantation

WI-FI TECHNOLOGY

CHAPTER 1

1. INTRODUCTION

1.1 Introduction to VLSI

The first digital circuit was designed by using electronic components like vacuum tubes

and transistors. Later Integrated Circuits (ICs) were invented, where a designer can be able to

place digital circuits on a chip consists of less than 10 gates for an IC called SSI (Small Scale

Integration) scale. With the advent of new fabrication techniques designer can place more than

100 gates on an IC called MSI (Medium Scale Integration). Using design at this level, one can

create digital sub blocks (adders, multiplexes, counters, registers, and etc.) on an IC. This level is

LSI (Large Scale Integration), using this scale of integration people succeeded to make digital

subsystems (Microprocessor, I/O peripheral devices and etc.) on a chip.

At this point design process started getting very complicated. i.e., manually conversion from

schematic level to gate level or gate level to layout level was becoming somewhat lengthy

process and verifying the functionality of digital circuits at various levels became critical. This

created new challenges to digital designers as well as circuit designers. Designers felt need to

automate these processes. In this process, Rapid advances in Software Technology and

development of new higher level programming languages taken place. People could able to

develop CAD/CAE (Computer Aided Design/Computer Aided Engineering) tools, for design

electronics circuits with assistance of software programs. Functional verification and Logic

verification of design can be done using CAD simulation tools with greater efficiency. It became

very easy to a designer to verify functionality of design at various levels.

With advent of new technology, i.e., CMOS (Complementary Metal Oxide Semiconductor)

process technology. One can fabricate a chip contains more than Million of gates. At this point

design process still became critical, because of manual converting the design from one level to

other. Using latest CAD tools could solve the problem. Existence of logic synthesis tools design

engineer can easily translate to higher-level design description to lower levels. This way of

designing (using CAD tools) is certainly revolution in electronic industry. This may be leading

to development of sophisticated electronic products for both consumer as well as business

Page 1

Page 2: Wi Fi documantation

WI-FI TECHNOLOGY 1.2 IC Design Flow

Page 2

Specifications

Behavioral Description

RTL Description

Behavioral Simulation

Functional Simulation

BehavioralSynthesis

Logic Synthesis

Gate Level Net list

Constraints

Constraints

Lib

AutomaticP&R

Layout

Logic simulation

Fabrication

Lay Out Management

SPECIFICATION

Behavioral simulation

BehavioralSimulation

RTL Description

Functional simulation

Lib

Gate level netlist

Logic simulation

Layout

Layout

Page 3: Wi Fi documantation

WI-FI TECHNOLOGY

1.3 Introduction to VHDL

VHDL is acronym for VHSIC hardware Description language. VHSIC is acronym for very

high speed Integrated Circuits. It is a hardware description language that can be used to model a

digital system at many levels of abstraction, ranging from the algorithmic level to the gate level.

The VHDL language can be regarded as an integrated amalgamation of the following

languages:

Sequential language

Concurrent language

Net-list language

Timing specifications

Waveform generation language - VHDL

This language not only defines the syntax but also defines very clear simulation

semantics for each language construct. Therefore, models written in this language can be verified

using a VHDL simulator. This subset is usually sufficient to model most applications .The

complete language, however, has sufficient power to capture the descriptions of the most

complex chips to a complete electronic system.

1.3.1 History

The requirements for the language were first generated in 1988 under the VHSIC chips for the

department of Defense (DOD). Reprocurement and reuse was also a

big issue. Thus, a need for a standardized hardware description language for the design,

documentation, and verification of the digital systems was generated. The IEEE in the December

1987 standardized VHDL language; this version of the language is known as the IEEE STD

1076-1987. The official language description appears in the IEEE standard VHDL language

Reference manual, available from IEEE. The language has also been recognized as an American

National Standards Institute (ANSI) standard. According to IEEE rules, an IEEE standard has

to be reballoted every 5 years so that it may remain a standard so that it may remain a standard.

Consequently, the language was upgraded with new features, the syntax of many constructs was

Page 3

Page 4: Wi Fi documantation

WI-FI TECHNOLOGYmade more uniform, and many ambiguities present in the 1987 version of the language were

resolved. This new version of the language is known as the IEEE STD 1076-1993.

1.3.2 Capabilities

The following are the major capabilities that the language provides along with the features that

the language provides along with the features that differentiate it from other hardware languages.

The language can be used as exchange medium between chip vendors and CAD tool users.

Different chip vendors can provide VHDL descriptions of their components to system designers.

The language can be used as a communication medium between different CAD and CAE tools

The language supports hierarchy; that is a digital can be modeled as asset of interconnected

components; each component, in turn, can be modeled as a set of interconnected subcomponents.

The language supports flexible design methodologies: top-down, bottom-up, or mixed. It

supports both synchronous and asynchronous timing models.

Various digital modeling techniques, such as finite –state machine descriptions, and Boolean

equations, can be modeled using the language.

The language is publicly available, human-readable, and machine-readable.

The language supports three basic different styles: Structural, Dataflow, and behavioral.

It supports a wide range of abstraction levels ranging from abstract behavioral descriptions to

very precise gate-level descriptions.

Arbitrarily large designs can be modeled using the language, and there are no limitations

imposed by the language on the size of the design.

1.3.3 Hardware Abstraction

VHDL is used to describe a model for a digital hardware device. This model specifies the

external view of the device and one or more internal views. The internal view of the device

specifies functionality or structure, while the external view specifies the interface of the device

through which it communicates with the other modules in the environment.In VHDL each device

model is treated as a distinct representation of a unique device, called an Entity. The Entity is

thus a hardware abstraction of the actual hardware device. Each Entity is described using one

model, which contains one external view and one or more internal views.

Page 4

Page 5: Wi Fi documantation

WI-FI TECHNOLOGYArchitecture Body

An architecture body using any of the following modeling styles specifies the internal details of

an entity.

As a set of interconnected components (to represent structure)

As a set of concurrent assignment statements (to represent data flow)

As a set of sequential assignment statements (to represent behavior)

As any combination of the above three.

Structural style of modeling

In this one an entity is described as a set of interconnected components. Such a model for the

HALF_ADDER entity, is described in a n architecture body

Architecture ha of ha is

Component Xor2 Port (X, Y in BIT; Z out BIT)

End component

Component And2

Port (L, M in BIT; N outBIT)

End component

Begin

X1 Xor2portmap (A, B, SUM)

A1 AND2portmap (A, B, CARRY)

End ha

The name of the architecture body is ha .the entity declaration for half adder specifies the

interface ports for this architecture body. The architecture body is composed of two parts the

declaration part and the statement part. Two component declarations are present in the

declarative part of the architecture body.

The declared components are instantiated in the statement part of the architecture body using

component instantiation. The signals in the port map of a component instantiation and the port

signals in the component declaration are associated by the position.

Page 5

Page 6: Wi Fi documantation

WI-FI TECHNOLOGY1.3.4 Dataflow Style Of Modeling

In this modeling style, the flow of data through the entity is expressed primarily using concurrent

signal assignment statements. The data flow model for the half adder is described using two

concurrent signal assignment statements .In a signal assignment statement, the symbol <=implies

an assignment of a value to a signal.

1.3.5 Behavioral Style Of Modeling

The behavioral style of modeling specifies the behavior of an entity as a set of statements that are

executed sequentially in the specific order. These sets of sequential statements, which are

specified inside a process statement, do not explicitly specify the structure of the entity but

merely its functionality. A process statement is a concurrent statement that can appear with in an

architecture body.

Page 6

Page 7: Wi Fi documantation

WI-FI TECHNOLOGY

CHAPTER 2

2. INTRODUCTION TO HDL TOOLS

2.1 Simulation Tool

2.1.1 Active HDL Overview

Active-HDL is an integrated environment designed for development of VHDL, Verilog,

and EDIF and mixed VHDL-Verilog-EDIF designs. It comprises three different design entry

tools, VHDL'93 compiler, Verilog compiler, single simulation kernel, several debugging tools,

graphical and textual simulation output viewers, and auxiliary utilities designed for easy

management of resource files, designs, and libraries.

2.1.2 Standards Supported

2.1.2.1 VHDL

The VHDL simulator implemented in Active-HDL supports the IEEE Std. 1076-1993

standard.

2.1.2.2 Verilog

The Verilog simulator implemented in Active-HDL supports the IEEE Std. 1364-1995

standard. Both PLI (Programming Language Interface) and VCD (Value Change Dump) are also

supported in Active-HDL.

2.1.2.3 EDIF

Active-HDL supports Electronic Design Interchange Format version 2 0 0.

2.1.2.4 VITAL

The simulator provides built-in acceleration for VITAL packages version 3.0. The

VITAL-compliant models can be annotated with timing data from SDF files. SDF files must

comply with OVI Standard Delay Format Specification Version 2.1.

2.1.2.5 WAVES

Active-HDL supports automatic generation of test benches compliant with the WAVES

standard. The basis for this implementation is a draft version of the standard dated to May 1997

(IEEE P1029.1/D1.0 May 1997). The WAVES standard (Waveform and Vector Exchange to

Page 7

Page 8: Wi Fi documantation

WI-FI TECHNOLOGYSupport Design and Test Verification) defines a formal notation that supports the verification

and testing of hardware designs, the communication of hardware design and test verification

data, the maintenance, modification and procurement of hardware system.

2.1.3 ACTIVE-HDL Macro Language

All operations in Active-HDL can be performed using Active-HDL macro language. The

language has been designed to enable the user to work with Active-HDL without using the

graphical user interface (GUI).

1.HDL Editor

HDL Editor is a text editor designed for HDL source files. It displays specific syntax

categories in different colors (keyword coloring). The editor is tightly integrated with the

simulator to enable debugging source code. The keyword coloring is also available when HDL

Editor is used for editing macro files, Perl scripts, and Tcl scripts.

2.Block Diagram Editor

Block Diagram Editor is a graphical tool designed to create block diagrams. The

editor automatically translates graphically designed diagrams into VHDL or Verilog code.

3. State Diagram Editor

State Diagram Editor is a graphical tool designed to edit state machine diagrams.

The editor automatically translates graphically designed diagrams into VHDL or Verilog code.

4. Waveform Editor

Waveform Editor displays the results of a simulation run as signal waveforms. It

allows you to graphically edit waveforms so as to create desired test vectors.

5. Design Browser

The Design Browser window displays the contents of the current design, that is:

Resource files attached to the design.

The contents of the default-working library of the design.

The structure of the design unit selected for simulation

VHDL, Verilog, or EDIF objects declared within a selected region of the current

design.

Page 8

Page 9: Wi Fi documantation

WI-FI TECHNOLOGYConsole window

The Console window is an interactive input-output text device providing entry for

Active-HDL macro language commands, macros, and scripts. All Active-HDL tools output their

messages to Console

2.1.4 Compilation

Compilation is a process of analysis of a source file. Analyzed design units contained

within the file are placed into the working library in a format understandable for the simulator. In

Active-HDL, a source file can be on of the following:

VHDL file (.vhd)

Verilog file (.v)

EDIF net list file

State diagram file (.asf)

Block diagram file (.bde)

In the case of a block or state diagram file, the compiler analyzes the intermediate

VHDL, Verilog, or EDIF file containing HDL code (or net list) generated from the diagram.A

net list is a set of statements that specifies the elements of a circuit (for example, transistors or

gates) and their interconnection.

Active-HDL provides three compilers, respectively for VHDL, Verilog, and EDIF. When

you choose a menu command or toolbar button for compilation, Active-HDL automatically

employs the compiler appropriate for the type of the source file being compiled.

2.1.5 Simulation

The purpose of simulation is to verify that the circuit works as desired.The Active-HDL

simulator provides two simulation engines.

Event-Driven Simulation

Cycle-Based Simulation

The simulator supports hybrid simulation – some portions of a design can be simulated in

the event-driven kernel while the others in the cycle-based kernel. Cycle-based simulation is

significantly faster than event-driven.

Page 9

Page 10: Wi Fi documantation

WI-FI TECHNOLOGY

Fig2.1.5: Simulation

2.2SYNTHESISTOOL

2.2.1OVERVIEW OF XILINX ISE

Integrated Software Environment (ISE) is the Xilinx design software suite. This overview

explains the general progression of a design through ISE from start to finish. ISE enables you to

start your design with any of a number of different source types, including:

HDL (VHDL, Verilog HDL, ABEL)

Schematic design files

EDIF

NGC/NGO

State Machines

IP Cores

From your source files, ISE enables you to quickly verify the functionality of these sources using

the integrated simulation capabilities, including ModelSim Xilinx Edition and the HDL Bencher

test bench generator.  HDL sources may be synthesized using the Xilinx Synthesis Technology

(XST) as well as partner synthesis engines used standalone or integrated into ISE.  The Xilinx

implementation tools continue the process into a placed and routed FPGA or fitted CPLD, and

finally produce a bit stream for your device configuration.

Page 10

Page 11: Wi Fi documantation

WI-FI TECHNOLOGY2.2.2Design Entry

ISE Text Editor - The ISE Text Editor is provided in ISE for entering design code and viewing

reports.

Schematic Editor - The Engineering Capture System (ECS) is a graphical user interface (GUI)

that allows you to create, view, and edit schematics and symbols for the Design Entry step of the

Xilinx® design flow.

CORE Generator - The CORE Generator System is a design tool that delivers parameterized

cores optimized for Xilinx FPGAs ranging in complexity from simple arithmetic operators such

as adders, to system-level building blocks such as filters, transforms, FIFOs, and memories.

Constraints Editor - The Constraints Editor allows you to create and modify the most

commonly used timing constraints.

PACE - The Pin out and Area Constraints Editor (PACE) allows you to view and edit I/O,

Global logic, and Area Group constraints.State CAD State Machine Editor - State CAD allows

you to specify states, transitions, and actions in a graphical editor.  The state machine will be

created in HDL.

2.2.3 Implementation

Translate - The Translate process runs NGD Build to merge all of the input net lists as well as

design constraint information into a Xilinx database file. Map - The Map program maps a

logical design to a Xilinx FPGA.

Place and Route (PAR) - The PAR program accepts the mapped design, places and routes the

FPGA, and produces output for the bit stream generator.

Floor planner - The Floor planner allows you to view a graphical representation of the FPGA,

and to view and modify the placed design.

FPGA Editor - The FPGA Editor allows you view and modify the physical implementation,

including routing.

Timing Analyzer - The Timing Analyzer provides a way to perform static timing analysis on

FPGA and CPLD designs. With Timing Analyzer, analysis can be performed immediately after

mapping, placing or routing an FPGA design, and after fitting and routing a CPLD design.

Page 11

Page 12: Wi Fi documantation

WI-FI TECHNOLOGY Fit (CPLD only) - The CPLDFit process maps a net list(s) into specified devices and creates

the JEDEC programming file.Chip Viewer (CPLD only) - The Chip Viewer tool provides a

graphical view of the inputs and outputs, macro cell details, equations, and pin assignments.

2.2.4 Device Download and Program File Formatting

BitGen - The BitGen program receives the placed and routed design and produces a bit stream

for Xilinx device configuration.

IMPACT - The iMPACT tool generates various programming file formats, and subsequently

allows you to configure your device.

XPower - XPower enables you to interactively and automatically analyze power consumption

for Xilinx FPGA and CPLD devices.

Integration with ChipScope Pro.

Page 12

Page 13: Wi Fi documantation

WI-FI TECHNOLOGY

CHAPTER 3

INTRODUCTION TO WIFI

3.1 INTRODUCTION

Wi-Fi  is a popular technology that allows an electronic device to exchange

data wirelessly (using radio waves) over a computer network, including high-

speed Internet connections. The Wi-Fi Alliance defines Wi-Fi as any "wireless

local area network (WLAN) products that are based on the Institute of Electri

cal and Electronics Engineers' (IEEE) 802.11 standards". However, since most

modern WLANs are based on these standards, the term "Wi-Fi" is used in general English as a

synonym for "WLAN".

A device that can use Wi-Fi (such as a personal computer, video game

console, smartphone, tablet, or digital audio player) can connect to a network resource such as

the Internet via a wireless network access point. Such an access point (or hotspot) has a range of

about 20 meters (65 feet) indoors and a greater range outdoors. Hotspot coverage can comprise

an area as small as a single room with walls that block radio waves or as large as many square

miles this is achieved by using multiple overlapping access points.

"Wi-Fi" is a trademark of the Wi-Fi Alliance and the brand name for products using

the IEEE 802.11 family of standards. Only Wi-Fi products that complete Wi-Fi

Alliance interoperability certification testing successfully may use the "Wi-Fi CERTIFIED"

designation and trademark.

Wi-Fi has had a checkered security history. Its earliest encryption system, WEP, proved

easy to break. Much higher quality protocols, WPA and WPA2, were added later. However, an

optional feature added in 2007, called Wi-Fi Protected Setup (WPS), has a flaw that allows a

remote attacker to recover the router's WPA or WPA2 password in a few hours on most

implementations. Some manufacturers have recommended turning off the WPS feature. The Wi-

Fi Alliance has since updated its test plan and certification program to ensure all newly-certified

devices resist brute-force AP PIN attacks.

1.Internet access

A Wi-Fi-enabled device can connect to the Internet when within range of a wireless

network connected to the Internet. The coverage of one or more (interconnected) access points

Page 13

Page 14: Wi Fi documantation

WI-FI TECHNOLOGYcalled hotspots comprises an area as small as a few rooms or as large as many square miles.

Coverage in the larger area may depend on a group of access points with overlapping coverage.

Outdoor public Wi-Fi technology has been used successfully in wireless mesh networks in

London, UK.

Wi-Fi provides service in private homes, high street chains and independent businesses,

as well as in public spaces at Wi-Fi hotspots set up either free-of-charge or commercially.

Organizations and businesses, such as airports, hotels, and restaurants, often provide free-use

hotspots to attract customers. Enthusiasts or authorities who wish to provide services or even to

promote business in selected areas sometimes provide free Wi-Fi access.

2.Advantages

Wi-Fi allows cheaper deployment of local area networks (LANs). Also spaces where

cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs.

Manufacturers are building wireless network adapters into most laptops. The price of chipsets for

Wi-Fi continues to drop, making it an economical networking option included in even more

devices

Different competitive brands of access points and client network-interfaces can inter-operate at a

basic level of service.

Limitations

Spectrum assignments and operational limitations are not consistent worldwide: most of

Europe allows for an additional two channels beyond those permitted in the US for the 2.4 GHz

band (1–13 vs. 1–11), while Japan has one more on top of that (1–14). Europe, as of 2007, was

essentially homogeneous in this respect.

A Wi-Fi signal occupies five channels in the 2.4 GHz band; any two channels whose

channel numbers differ by five or more, such as 2 and 7, do not overlap. The oft-repeated adage

that channels 1, 6, and 11 are the only non-overlapping channels is, therefore, not accurate;

channels 1, 6, and 11 are the only group of three non-overlapping channels in the U.S.

 EIRP in the EU is limited to 20dbm (100 mW).

The current 'fastest' norm, 802.11n, uses double the radio spectrum compared to 802.11a

or 802.11g. This means there can only be one 802.11n network on 2.4 GHz band without

interference to other WLAN traffic.

Page 14

Page 15: Wi Fi documantation

WI-FI TECHNOLOGY1.Range

Wi-Fi networks have limited range. A typical wireless access point using 802.11b

or 802.11g with a stock antenna might have a range of 32 m (120 ft) indoors and 95 m (300 ft)

outdoors IEEE802.11n, however, can exceed that range by more than two times. Range also

varies with frequency band. Wi-Fi in the 2.4 GHz frequency block has slightly better range than

Wi-Fi in the 5 GHz frequency block which is used by 802.11a. On wireless routers with

detachable antennas, it is possible to improve range by fitting upgraded antennas which have

higher gain in particular directions. Outdoor ranges can be improved to many kilometers through

the use of high gain directional antennas at the router and remote device(s). In general, the

maximum amount of power that a Wi-Fi device can transmit is limited by local regulations, such

as FCC part 15 in the US.

3.2 INTRODUCTION TO WIMAX

A WiMAX system consists of two parts:

A WiMAX tower, similar in concept to a cell-phone tower - A single WiMAX (~8,000

square km).

A WiMAX receiver - The receiver and antenna could be a small box or PCMCIA card, or

they could be built into a laptop the way WiFi access is today.

A WiMAX tower station can connect directly to the Internet using a high-bandwidth,

wired connection (for example, a T3 line). It can also connect to another WiMAX tower using a

line-of-sight, microwave link. This connection to a second tower (often referred to as a

backhaul), along with the ability of a single tower to cover up to 3,000 square miles, is what

allows WiMAX to provide coverage to remote rural areas.

3.2.1 Block Diagram

Page 15

Page 16: Wi Fi documantation

WI-FI TECHNOLOGY

Fig: 3.2.1 transmission network

What this points out is that WiMAX actually can provide two forms of wireless service

There is the non-line-of-sight, WiFi sort of service, where a small antenna on your

computer connects to the tower. In this mode, WiMAX uses a lower frequency range --

2 GHz to 11 GHz (similar to WiFi). Lower-wavelength transmissions are not as easily

disrupted by physical obstructions -- they are better able to diffract, or bend, around

obstacles.

There is line-of-sight service, where a fixed dish antenna points straight at the WiMAX

tower from a rooftop or pole. The line-of-sight connection is stronger and more stable, so

it's able to send a lot of data with fewer errors. Line-of-sight transmissions use higher

frequencies, with ranges reaching a possible 66 GHz. At higher frequencies, there is less

interference and lots more bandwidth.

WiFi-style access will be limited to a 4-to-6 mile radius (perhaps 25 square miles or 65

square km of coverage, which is similar in range to a cell-phone zone). Through the

stronger line-of-sight antennas, the WiMAX transmitting station would send data to

WiMAX-enabled computers or routers set up within the transmitter's 30-mile radius

Page 16

Page 17: Wi Fi documantation

WI-FI TECHNOLOGY(2,800 square miles or 9,300 square km of coverage). This is what allows WiMAX to

achieve its maximum range.

3.2.2 Global Area Network

The final step in the area network scale is the global area network (GAN). The proposal

for GAN is IEEE 802.20. A true GAN would work a lot like today's cell phone networks, with

users able to travel across the country and still have access to the network the whole time. This

network would have enough bandwidth to offer Internet access comparable to cable modem

service, but it would be accessible to mobile, always-connected devices like laptops or next-

generation cell phones.

Intel will start making their Centrino laptop processors WiMAX enabled in the next two

to three years. This will go a long way toward making WiMAX a success. If everyone's laptop

already has it (which is predicted by 2008), it will be much less risky for companies to set up

WiMAX base stations.

3.2.3 WHAT CAN WIMAX DO

Intel also announced that it would be partnering with a company called Clearwire to

push WiMAX even further ahead. Clearwire plans to send data from WiMAX base stations to

small wireless modems. See Intel,Clearwire to Accelerate Deployment of WiMAX Networks

Worldwide (Oct. 25, 2004).

WiMAX operates on the same general principles as WiFi -- it sends data from one

computer to another via radio signals. A computer (either a desktop or a laptop) equipped with

WiMAX would receive data from the WiMAX transmitting station, probably using encrypted

data keys to prevent unauthorized users from stealing access.

The fastest WiFi connection can transmit up to 54 megabits per second under optimal

conditions. WiMAX should be able to handle up to 70 megabits per second. Even once that 70

megabits is split up between several dozen businesses or a few hundred home users, it will

provide at least the equivalent of cable-modem transfer rates to each user.

The biggest difference isn't speed; it's distance. WiMAX outdistances WiFi by miles.

WiFi's range is about 100 feet (30 m). WiMAX will blanket a radius of 30 miles (50 km) with

wireless access. The increased range is due to the frequencies used and the power of the

transmitter. Of course, at that distance, terrain, weather and large buildings will act to reduce the

Page 17

Page 18: Wi Fi documantation

WI-FI TECHNOLOGYmaximum range in some circumstances, but the potential is there to cover huge tracts of land.

IEEE 802.16 SpecificationsRange - 30-mile (50-km) radius from base station

Speed - 70 megabits per second Line-of-sight not needed between user and base

station

Frequency bands - 2 to 11 GHz and 10 to 66 GHz (licensed and unlicensed bands)

Defines both the MAC and PHY layers and allows multiple PHY-layer specifications (See How

OSI Works) WiMAX Could Boost Government Security

In an emergency, communication is crucial for government officials as they try to

determine the cause of the problem, find out who may be injured and coordinate rescue

efforts or cleanup operations. A gas-line explosion or terrorist attack could sever the

cables that connect leaders and officials with their vital information networks.

WiMAX could be used to set up a back-up (or even primary) communications system

that would be difficult to destroy with a single, pinpoint attack. A cluster of WiMAX

transmitters would be set up in range of a key command center but as far from each other

as possible. Each transmitter would be in a bunker hardened against bombs

3.2.4 INTRODUCTION TO DATALINK LAYER

The data link layer is layer 2 of the seven-layer OSI model of computer networking. It

corresponds to, or is part of the link layer of the TCP/IP reference model.

The data link layer is the protocol layer that transfers data between adjacent network nodes in

a wide area networkor between nodes on the same local area network segment.[1] The data link

layer provides the functional and procedural means to transfer data between network entities and

might provide the means to detect and possibly correct errors that may occur in the physical

layer. Examples of data link protocols are Ethernet for local area networks (multi-node),

the Point-to-Point Protocol (PPP), HDLC and ADCCP for point-to-point (dual-node)

connections.The data link layer is concerned with local delivery of frames between devices on

the same LAN. Data-link frames, as these protocol data units are called, do not cross the

boundaries of a local network. Inter-network routing and global addressing are higher layer

functions, allowing data-link protocols to focus on local delivery, addressing, and media

arbitration. In this way, the data link layer is analogous to a neighborhood traffic cop; it

endeavors to arbitrate between parties contending for access to a medium.

Page 18

Page 19: Wi Fi documantation

WI-FI TECHNOLOGYWhen devices attempt to use a medium simultaneously, frame collisions occur. Data-link

protocols specify how devices detect and recover from such collisions, and may provide

mechanisms to reduce or prevent them.

Delivery of frames by layer-2 devices is effected through the use of unambiguous

hardware addresses. A frame's header contains source and destination addresses that indicate

which device originated the frame and which device is expected to receive and process it. In

contrast to the hierarchical and routable addresses of the network layer, layer-2 addresses are flat,

meaning that no part of the address can be used to identify the logical or physical group to which

the address belongs.

The data link thus provides data transfer across the physical link. That transfer can be

reliable or unreliable; many data-link protocols do not have acknowledgments of

successful frame reception and acceptance, and some data-link protocols might not even have

any form of checksum to check for transmission errors. In those cases, higher-level protocols

must provide flow control, error checking, and acknowledgments and retransmission.

In some networks, such as IEEE 802 local area networks, the data link layer is described

in more detail with media access control (MAC) and logical link control (LLC) sublayers; this

means that the IEEE 802.2 LLC protocol can be used with all of the IEEE 802 MAC layers, such

as Ethernet, token ring, IEEE 802.11, etc., as well as with some non-802 MAC layers such

as FDDI. Other data-link-layer protocols, such asHDLC, are specified to include both sublayers,

although some other protocols, such as Cisco HDLC, use HDLC's low-level framing as a MAC

layer in combination with a different LLC layer. In the ITU-T G.hn standard, which provides a

way to create a high-speed (up to 1 Gigabit/s)Local area network using existing home wiring

(power lines, phone lines and coaxial cables), the data link layer is divided into three sub-layers

(application protocol convergence, logical link control and medium access control).Within the

semantics of the OSI network architecture, the data-link-layer protocols respond toservice

requests from the network layer and they perform their function by issuing service requests to

the physical layer.

Sub layers of the data link layer

Logical link control sub layer

  Media access control sub layer

Page 19

Page 20: Wi Fi documantation

WI-FI TECHNOLOGY

List of data-link-layer services

Encapsulation of network layer data packets into frames

Frame synchronization

Logical link control (LLC) sublayer

Error control (automatic repeat request,ARQ), in addition to ARQ provided by

some transport-layer protocols, to forward error correction (FEC) techniques provided on

the physical layer, and to error-detection and packet canceling provided at all layers, including

the network layer. Data-link-layer error control (i.e. retransmission of erroneous packets) is

provided in wireless networks andV.42 telephone network modems, but not in LAN protocols

such as Ethernet, since bit errors are so uncommon in short wires. In that case, only error

detection and canceling of erroneous packets are provided.Flow control, in addition to the one

provided on the transport layer. Data-link-layer error control is not used in LAN protocols such

as Ethernet, but in modems and wireless networks.

Media access control (MAC) sublayer:

Multiple access protocols for channel access control,for example CSMA/CD protocols

for collision detection and retransmission inEthernet bus networks and hub networks, or

the CSMA/CA protocol for collision avoidance in wireless networks.

Physical addressing (MAC addressing)

LAN switching (packet switching) including MAC filtering and spanning tree protocol

Data packet queueing or scheduling

Store-and-forward switching or cut-through switching

Quality of Service (QoS) control

Virtual LANs (VLAN)

The MAC sublayer is primarily concerned withrecognising where frames begin and end

in the bit-stream received from the physical layer (when receiving) delimiting the frames (when

sending), i.e. inserting information (e.g. some extra bits) into or among the frames being sent so

that the receiver(s) are able to recognise the beginning and end of the frames detection of

transmission errors by means of e.g. inserting a checksum into every frame sent and recalculating

and comparing them on the receiver side

inserting the source and destination MAC addresses into every frame transmitted

Page 20

Page 21: Wi Fi documantation

WI-FI TECHNOLOGYfiltering out the frames intended for the station by verifying the destination address in the

received frames

the control of access to the physical transmission medium (i.e. which of the stations

attached to the wire or frequency range has the right to transmit?)

wimax datalink layer

Metropolitan Area Networks or (MANs) are large computer networks usually spanning

a campus or a city. They typically use wireless infrastructure or optical fiber connections to link

their sites.For instance a university or college may have a MAN that joins together many of their

local area networks (LANs) situated around site of a fraction of a square kilometer. Then from

their MAN they could have several wide area network (WAN) links to other universities or the

Internet. Some technologies used for this purpose are ATM, FDDI and SMDS. These older

technologies are in the process of being displaced by Ethernet-based MANs (e.g. Metro

Ethernet) in most areas. MAN links between LANs have been built without cables using either

microwave, radio, or infra-red free-space optical communication links.

WiMAX is a wireless metropolitan area network (MAN) technology that can connect

IEEE 802.11 (Wi-Fi) hotspots with each other and to other parts of the Internet and provide a

wireless alternative to cable and DSL for last mile (last km) broadband access. IEEE 802.16

provides up to 50 km (31 miles) of linear service area range and allows connectivity between

users without a direct line of sight. Note that this should not be taken to mean that users 50 km

(31 miles) away without line of sight will have connectivity. Practical limits from real world tests

seem to be around "3 to 5 miles" (5 to8 kilometers). The technology has been claimed to provide

shared data rates up to 70 Mbit/s, which, according to WiMAX proponents, is enough bandwidth

to simultaneously support more than 60 businesses with T1-type connectivity and well over a

thousand homes at 1Mbit/s DSL-level connectivity. Real world tests, however, show practical

maximum data rates between 500kbit/s and 2 Mbit/s, depending on conditions at a given site.

It is also anticipated that WiMAX will allow interpenetration for broadband service

provision of VoIP, video, and Internet access—simultaneously. Most cable and traditional

telephone companies are closely examining or actively trial-testing the potential of WiMAX for

"last mile" connectivity. This should result in better pricepoints for both home and business

customers as competition results from the elimination of the "captive" customer bases both

telephone and cable networks traditionally enjoyed. Even in areas without preexisting physical

Page 21

Page 22: Wi Fi documantation

WI-FI TECHNOLOGYcable or telephone networks, WiMAX could allow access between anyone within range of each

other. Home units the size of a paperback book that provide both phone and network connection

points are already available and easy to install.

There is also interesting potential for interoperability of WiMAX with legacy cellular

networks. WiMAX antennas can "share" a cell tower without compromising the function of

cellular arrays already in place. Companies that already lease cell sites in widespread service

areas have a unique opportunity to diversify, and often already have the necessary spectrum

available to them (i.e. they own the licenses for radio frequencies important to increased speed

and/or range of a WiMAX connection). WiMAX antennae may be even connected to an Internet

backbone via either a light fiber optics cable or a directional microwave link. Some cellular

companies are evaluating WiMAX as a means of increasing bandwidth for a variety of data-

intensive applications. In line with these possible applications is the technology's ability to serve

as a very high bandwidth "backhaul" for Internet or cellular phone traffic from remote areas back

to a backbone. Although the cost-effectiveness of WiMAX in a remote application will be

higher, it is definitely not limited to such applications, and may in fact be an answer to expensive

urban deployments of T1 backhauls as well. Given developing countries' (such as in Africa)

limited wired infrastructure, the costs to install a WiMAX station in conjunction with an existing

cellular tower or even as a solitary hub will be diminutive in comparison to developing a wired

solution. The wide, flat expanses and low population density of such an area lends itself well to

WiMAX and its current diametrical range of 30 miles. For countries that have skipped wired

infrastructure as a result of inhibitive costs and unsympathetic geography, WiMAX can enhance

wireless infrastructure in an inexpensive, decentralized, deployment-friendly and effective

manner

Wimax mac layer

The IEEE 802.16 BWA network standard applies the so-called Open Systems

Interconnection (OSI) network reference seven-layer model, also called the OSI seven-layer

model. This model is very often used to describe the different aspects of a network technology. It

starts from the Application Layer, or Layer 7, on the top and ends with the PHYsical (PHY)

Layer,(or)Layer1.

Page 22

Page 23: Wi Fi documantation

WI-FI TECHNOLOGYThe OSI model separates the functions of different protocols into a series of layers, each layer

using only the functions of the layer below and exporting data to the layer above. For example,

the IP (Internet Protocol) is in Layer 3, or the Routing Layer. Typically, only the lower layers are

implemented in hardware while the higher layers are implemented in software.The two lowest

layers are then the Physical (PHY) Layer, or Layer 1, and the Data Link Layer, or Layer 2. IEEE

802 splits the OSI Data Link Layer into two sublayers named Logical Link Control (LLC) and

Media Access Control (MAC). The PHY layer creates the physical connection between the two

communicating entities (the peer entities), while the MAC layer is responsible for the

establishment and maintenance of the connection (multiple access, scheduling, etc.).

The IEEE 802.16 standard specifies the air interface of a fixed BWA system supporting

multimedia services. The Medium Access Control (MAC) Layer supports a primarily point-to-

multipoint (PMP) architecture, with an optional mesh topology. The MAC Layer is structured to

support many physical layers (PHY) specifi ed in the same standard. In fact, only two of them

The protocol layers architecture defined in WiMAX/802.16 is shown in figure . It can be seen

that the 802.16 standard defines only the two lowest layers, the PHYsical Layer and the MAC

Layer, which is the main part of the Data Link Layer, with the LLC layer very often applying the

IEEE 802.2 standard. The MAC layer is itself made of three sub-layers, the CS (Convergence

Sublayer), the CPS (Common Part Sublayer) and the Security Sublayer. The dialogue between

corresponding protocol layers or entities is made as follows. A Layer X addresses an XPDU

(Layer X Protocol Data Unit) to a corresponding Layer X (Layer X of the peer entity). This

XPDU is received as an (X-

.

Page 23

Page 24: Wi Fi documantation

WI-FI TECHNOLOGY

CHAPTER 4

4. ARCHITECTURE AND MODULES

4.1 ARCHITECTURE

Fig 4.1 ARCHITECTURE

Page 24

Page 25: Wi Fi documantation

WI-FI TECHNOLOGY4.2MODULES

4.2.1 FIFO8X8

Fig 4.2.1 FIFO8X8

I/O Ports Description

S.N0 Port Name Mode Size Port Description

1 Wr,Clk,Rd, In - Entity function synchronized for Rising edge

of the Write Clk and read Clk.

2 Rst In - When asserted Entity is initiliased to default

values

3 FIFO Ena In - Enables of FIFO

4 Data In [7:0] 8 bit data which input to FIFO

5 FIFO Wr In - Write request signal of memory

6 FIFO Rd In - Read request signal of memory

7 Dout Out [7:0] 8 bit data which is output from FIFO

8 Full Out - Signal Status of memory is full

9 Empty Out - Signal Status of memory is ready to read.

Functional Description

FIFO [First in First Out] is a memory that stores information. An information can be

either written into memory or read from memory. Here, we are using a 8X8 bit memory.

Page 25

Page 26: Wi Fi documantation

WI-FI TECHNOLOGYThe depth of the memory is 8 bit [i.e; number of locations] and width of memory is 4 bit. Let’s,

explain this with an example when, uses it according to her requirement. In the similar fashion

the FIFO works, where we store incoming 8bit data in a memory, But to store data in a specific

location we are using write pointer as well as read pointer. These are nothing but house address.

The process consists of two parts, one is write logic and other is read logic. The process starts in

this way, When reset is inserted then the internal register i.e, Wrptr or Rdptr is cleared. Then for

every rising edge of clk whenever fifo enable is one, fifowr and fiford are one and zero

respectively, then we process the right logic. Where data is written into memory and wrptr is

incremented parallel. When fifowr and fiford are zero and one respectively, we read the data

from memory to output (Dout) using read pointer that specifies the location.

But as memory is fixed, more and more data comes that leads to overlap of existing data.

In order to avoid this problem we are using FULL and EMPTY signal, where full shows high

when memory is full by which we stop writing the data to begin reading the data from memory.

In the same way empty signal tells whether memory is empty or not, by which we begin reading

the data from memory.

SIMULATION RESULTS

SYNTHESIS REPORT

Final Report

Final Results

RTL Top Level Output File Name fifo8x8.ngr

Top Level Output File Name fifo8x8

Output Format NGC

Optimization Goal Speed

Keep Hierarchy NO

Design Statistics

# IOs 23

Macro Statistics

# Registers 12

# 1-bit register 1

# 3-bit register 2

# 8-bit register 9

Page 26

Page 27: Wi Fi documantation

WI-FI TECHNOLOGY# Multiplexers 7

# 2-to-1 multiplexer 4

# 8-bit 8-to-1 multiplexer 3

# Tristates 1

# 8-bit tristate buffer 1

# Adders/Subtractors 1

# 3-bit subtractor 1

Cell Usage

# BELS 212

# LUT1 4

# LUT2 5

# LUT3 4

# LUT3_D 9

# LUT3_L 104

# LUT4 6

# LUT4_L 2

# MUXCY 2

# MUXF5 48

# MUXF6 24

# VCC 1

# XORCY 3

# FlipFlops/Latches 93

# FDCE 13

# FDE 80

# Clock Buffers 2

# BUFGP 2

# IO Buffers 21

# IBUF 11

# OBUF 2

# OBUFT 8

Device utilization summary

Page 27

Page 28: Wi Fi documantation

WI-FI TECHNOLOGY

Selected Device 2s15cs144-6

Number of Slices 107 out of 192 55%

Number of Slice Flip Flops 93 out of 384 24%

Number of 4 input LUTs 134 out of 384 34%

Number of bonded IOBs 21 out of 90 23%

Number of GCLKs 2 out of 4 50%

Timing Summary

Speed Grade: -6

Minimum period: 7.437ns (Maximum Frequency: 134.463MHz)

Minimum input arrival time before clock: 7.161ns

Maximum output required time after clock: 12.871ns

Maximum combinational path delay: No path found

Total memory usage is 55024 kilobytes

Page 28

Page 29: Wi Fi documantation

WI-FI TECHNOLOGY

FLOOR PLANING

Fig 4.2.1 FLOOR PLANING

Page 29

Page 30: Wi Fi documantation

WI-FI TECHNOLOGY

4.2.2 DATAMUX

Fig 4.2.2 DATAMUX

I/O Ports Description

s.no Port name Mode Size Port description

1 CRCOUT Input [0:7] 8 bit input signal

2 DOUT Input [0:7] 8bit input signal

3 HEDAER Input [0:7] 8 bit input signal

4 HECOUT Input [0:7] 8 bit input signal

5 SEL Input [0:1] Input select signal

6 Data Output [0:7] Output data signal

Page 30

Page 31: Wi Fi documantation

WI-FI TECHNOLOGYFunctional Description

A multiplexer has n control lines (or select lines) that select which one of 2n inputs is

transferred to the single output

SIMULATION RESULTS

SYNTHESIS REPORT

Final Report

Final Results

RTL Top Level Output File Name Mux4x1.ngr

Top Level Output File Name Mux4x1

Output Format NGC

Optimization Goal Speed

Keep Hierarchy NO

Design Statistics

# IOs 42

Macro Statistics

# Multiplexers 1

# 8-bit 4-to-1 multiplexer 1

Cell Usage

# BELS 24

# LUT3 16

# MUXF5 8

# IO Buffers 42

# IBUF 34

# OBUF 8

Device utilization summary

Selected Device 2v40cs144-4

Number of Slices 8 out of 256 3%

Number of 4 input LUTs 16 out of 512 3%

Page 31

Page 32: Wi Fi documantation

WI-FI TECHNOLOGY Number of bonded IOBs 42 out of 88 47%

===============================

TIMING REPORT

NOTE: THESE TIMING NUMBERS ARE ONLY A SYNTHESIS ESTIMATE.

FOR ACCURATE TIMING INFORMATION PLEASE REFER TO THE TRACE REPORT

GENERATED AFTER PLACE-and-ROUTE.

Clock Information:

------------------

No clock signals found in this design

Timing Summary:

---------------

Speed Grade -4

Minimum period No path found

Minimum input arrival time before clock No path found

Maximum output required time after clock No path found

Maximum combinational path delay 7.579ns

Timing Detail:

--------------

All values displayed in nanoseconds (ns)

-------------------------------------------------------------------------

Timing constraint Default path analysis

Delay 7.579ns (Levels of Logic = 4)

Source sel<0> (PAD)

Page 32

Page 33: Wi Fi documantation

WI-FI TECHNOLOGYDestination Data<7> (PAD)

Data Path sel<0> to Data<7>

Gate Net

Cell:in->out fanout Delay Delay Logical Name (Net Name)

---------------------------------------- ------------

IBUF I->O 16 0.825 1.000 sel_0_IBUF (sel_0_IBUF)

LUT3 I0->O 1 0.439 0.000 Mmux_Data_inst_lut3_21 (Mmux_Data__net3)

MUXF5 I0->O 1 0.436 0.517 Mmux_Data_inst_mux_f5_1 (Data_1_OBUF)

OBUF I->O 4.361 Data_1_OBUF (Data<1>)

----------------------------------------

Total 7.579ns (6.061ns logic, 1.518ns route)

(80.0% logic, 20.0% route)

CPU : 1.19 / 1.42 s | Elapsed : 1.00 / 1.00 s

-->

Total memory usage is 61724 kilobytes

FLOOR PLANING

Page 33

Page 34: Wi Fi documantation

WI-FI TECHNOLOGY

4.2.3 PARLLEL TO SERIAL

Fig 4.2.3 P TO S

I/O Ports Description

s.no Port name Mode Size Port description

1 SerEna Input - Input select signal

2 Clk Input 1 bit Input system clock signal

3 Data_in Input [7:0] Input data signal

4 Rst Input 1 bit On board reset signal

5 Sout Out - Output signal

6 SerLd Input - Input signal

7 SerOvr Out - Output Signal

Functional Description

This is used to convert the data from parallel form to serial form. Here it is used to satisfy the

basic requirement of the vlsi technology (i.e) utilization of less power and area with high speed.

When bits are delivered to the system serially the power and area utilization reduces and speed of

operation increases. Hence parallel to serial converter is incorporated in this project to deliver

serialized data to the system .

Page 34

Page 35: Wi Fi documantation

WI-FI TECHNOLOGY

SIMULATION RESULTS

SYNTHESIS REPORT

* Final Report *

=====================================================================

====

Final Results

RTL Top Level Output File Name PtoS.ngr

Top Level Output File Name PtoS

Output Format NGC

Optimization Goal Speed

Keep Hierarchy NO

Design Statistics

# IOs 14

Macro Statistics

# Registers 4

# 1-bit register 2

# 3-bit register 1

# 8-bit register 1

# Multiplexers 2

# 2-to-1 multiplexer 2

# Tristates 1

# 1-bit tristate buffer 1

Cell Usage

# BELS 16

Page 35

Page 36: Wi Fi documantation

WI-FI TECHNOLOGY# LUT1 2

# LUT2 3

# LUT2_L 1

# LUT3 1

# LUT3_L 8

# LUT4_L 1

# FlipFlops/Latches 13

# FDCE 11

# FDE 2

# Clock Buffers 1

# BUFGP 1

# IO Buffers 13

# IBUF 11

# OBUF 1

# OBUFT 1

=====================================================================

====

Device utilization summary

---------------------------

Selected Device 2v40cs144-4

Number of Slices 9 out of 256 3%

Number of Slice Flip Flops 13 out of 512 2%

Number of 4 input LUTs 16 out of 512 3%

Number of bonded IOBs 13 out of 88 14%

Number of GCLKs 1 out of 16 6%

=====================================================================

====

Page 36

Page 37: Wi Fi documantation

WI-FI TECHNOLOGYTIMING REPORT

NOTE: THESE TIMING NUMBERS ARE ONLY A SYNTHESIS ESTIMATE.

FOR ACCURATE TIMING INFORMATION PLEASE REFER TO THE TRACE REPORT

GENERATED AFTER PLACE-and-ROUTE.

Clock Information

------------------

-----------------------------------+------------------------+-------+

Clock Signal | Clock buffer(FF name) | Load |

-----------------------------------+------------------------+-------+

Clk | BUFGP | 13 |

-----------------------------------+------------------------+-------+

Timing Summary

---------------

Speed Grade -4

Minimum period 2.125ns (Maximum Frequency: 470.699MHz)

Minimum input arrival time before clock 3.367ns

Maximum output required time after clock 6.633ns

Maximum combinational path delay No path found

Timing Detail

--------------

All values displayed in nanoseconds (ns)

-------------------------------------------------------------------------

Timing constraint Default period analysis for Clock 'Clk'

Delay 2.125ns (Levels of Logic = 1

Source cnt_0 (FF)

Destination cnt_2 (FF)

Page 37

Page 38: Wi Fi documantation

WI-FI TECHNOLOGYSource Clock Clk rising

Destination Clock Clk rising

Data Path cnt_0 to cnt_2

Gate Net

Cell in->out fanout Delay Delay Logical Name (Net Name)

---------------------------------------- ------------

FDCE C->Q 4 0.568 0.747 cnt_0 (cnt_0)

LUT4_L I3->LO 1 0.439 0.000 cnt_Mmux__n0001_Result<2>1 (cnt__n0001<2>)

FDCE D 0.370 cnt_2

----------------------------------------

Total 2.125ns (1.377ns logic, 0.747ns route)

(64.8% logic, 35.2% route)

-------------------------------------------------------------------------

Timing constraint Default OFFSET IN BEFORE for Clock 'Clk'

Offset 3.367ns (Levels of Logic = 2)

Source Ld (PAD)

Destination Dreg_6 (FF)

Destination Clock Clk rising

Data Path Ld to Dreg_6

Gate Net

Cell in->out fanout Delay Delay Logical Name (Net Name)

---------------------------------------- ------------

IBUF I->O 13 0.825 0.954 Ld_IBUF (Ld_IBUF)

LUT2 I1->O 11 0.439 0.908 _n00081 (_n0008)

FDCE CE 0.240 Dreg_1

----------------------------------------

Total 3.367ns (1.504ns logic, 1.863ns route)

(44.7% logic, 55.3% route)

-------------------------------------------------------------------------

Page 38

Page 39: Wi Fi documantation

WI-FI TECHNOLOGYTiming constraint Default OFFSET OUT AFTER for Clock 'Clk'

Offset 6.633ns (Levels of Logic = 2)

Source cnt_0 (FF)

Destination Sover (PAD)

Source Clock: Clk rising

Data Path: cnt_0 to Sover

Gate Net

Cell:in->out fanout Delay Delay Logical Name (Net Name)

---------------------------------------- ------------

FDCE:C->Q 4 0.568 0.747 cnt_0 (cnt_0)

LUT3:I2->O 1 0.439 0.517 _n00041 (Sover_OBUF)

OBUF:I->O 4.361 Sover_OBUF (Sover)

----------------------------------------

Total 6.633ns (5.368ns logic, 1.265ns route)

(80.9% logic, 19.1% route)

=====================================================================

====

CPU : 1.08 / 1.33 s | Elapsed : 2.00 / 2.00 s

-->

Total memory usage is 60700 kilobytes

Page 39

Page 40: Wi Fi documantation

WI-FI TECHNOLOGY

Page 40

Page 41: Wi Fi documantation

WI-FI TECHNOLOGYFLOOR PLANING

Page 41

Page 42: Wi Fi documantation

WI-FI TECHNOLOGY

4.2.4 CRC( LINEAR FEEDBACK SHIFT REGISTERS)

I/O Ports Description

S.N0 Port Name Mode Size Port Description

1 Clk In - Entity function synchronized for Rising edge

of the Clk

2 Rst In - When asserted Entity is initiliased to default

values

3 Ena In - Enables of scrambler

4 Cin In [7:0] 8 bit data which input to crc

5 Cout OUT [7,0] 8 bit data which output to crc

Functional Description

A linear feedback shift register can be formed by performing exclusive-OR on the

outputs of two or more of the flip-flops together and feeding those outputs back into the input of

one of the flip-flops. A maximal-length LFSR produces the maximum number of PRPG patterns

possible and has a pattern count equal to 2n – 1. After verifying that the LFSR result generate the

Fault grading.

Page 42

Page 43: Wi Fi documantation

WI-FI TECHNOLOGYFault grading enables the customer to ensure that the test vector set supplied for the

design will catch manufacturing defects. LFSR for built-in test (BIT) of an ASIC, it should be

noted that the LFSR logic incorporated in an ASIC can also be used to drive external logic.

LFSR created some problems, these problems can be solved by a variety of techniques,

including using longer LFSRs to generate virtually every possible input, holding key control

signals to a fixed value during the test stage, and augmenting the patterns with hand-generated

patterns to improve fault grading. LFSR of any significant length will generate a large number of

patterns.

For example:

Figure 4.3 a diagram of a LFSR implementing division by polynomial x5+x3+x2+1

Clock Input x0 x1 x2 x3 x4

0 N/A 0 0 0 0 0

1 1 1 0 0 0 0

2 1 1 1 0 0 0

3 0 0 1 1 0 0

4 0 0 0 1 1 0

5 1 1 0 0 1 1

6 1 0 1 1 1 1

7 1 0 0 0 0 1

8 0 1 0 1 1 0

Page 43

Page 44: Wi Fi documantation

WI-FI TECHNOLOGYTable 4.1: LFSR states for LFSR described in figure 4.8 during division of P=11001110

Simulation Results

SYNTHESIS REPORT

=====================================================================

====

* Final Report *

=====================================================================

====

Final Results

RTL Top Level Output File Name : CRC.ngr

Top Level Output File Name : CRC

Output Format : NGC

Optimization Goal : Speed

Keep Hierarchy : NO

Design Statistics

# IOs : 12

Macro Statistics :

# Registers : 8

# 1-bit register : 8

Cell Usage :

# BELS : 4

# LUT1 : 1

# LUT2_L : 1

# LUT3_L : 2

# FlipFlops/Latches : 8

Page 44

Page 45: Wi Fi documantation

WI-FI TECHNOLOGY# FDCE : 4

# FDPE : 4

# Clock Buffers : 1

# BUFGP : 1

# IO Buffers : 11

# IBUF : 3

# OBUF : 8

=====================================================================

====

Device utilization summary:

---------------------------

Selected Device : 3s400pq208-4

Number of Slices: 5 out of 3584 0%

Number of Slice Flip Flops: 8 out of 7168 0%

Number of 4 input LUTs: 4 out of 7168 0%

Number of bonded IOBs: 11 out of 141 7%

Number of GCLKs: 1 out of 8 12%

=====================================================================

====

TIMING REPORT

NOTE: THESE TIMING NUMBERS ARE ONLY A SYNTHESIS ESTIMATE.

FOR ACCURATE TIMING INFORMATION PLEASE REFER TO THE TRACE REPORT

GENERATED AFTER PLACE-and-ROUTE.

Clock Information:

Page 45

Page 46: Wi Fi documantation

WI-FI TECHNOLOGY------------------

-----------------------------------+------------------------+-------+

Clock Signal | Clock buffer(FF name) | Load |

-----------------------------------+------------------------+-------+

Clk | BUFGP | 8 |

-----------------------------------+------------------------+-------+

Timing Summary:

---------------

Speed Grade: -4

Minimum period: 2.470ns (Maximum Frequency: 404.858MHz)

Minimum input arrival time before clock: 3.291ns

Maximum output required time after clock: 6.660ns

Maximum combinational path delay: No path found

Timing Detail:

--------------

All values displayed in nanoseconds (ns)

-------------------------------------------------------------------------

Timing constraint: Default period analysis for Clock 'Clk'

Delay: 2.470ns (Levels of Logic = 1)

Source: Dreg_7 (FF)

Destination: Dreg_0 (FF)

Source Clock: Clk rising

Destination Clock: Clk rising

Data Path: Dreg_7 to Dreg_0

Gate Net

Cell:in->out fanout Delay Delay Logical Name (Net Name)

Page 46

Page 47: Wi Fi documantation

WI-FI TECHNOLOGY ---------------------------------------- ------------

FDCE:C->Q 4 0.619 0.629 Dreg_7 (Dreg_7)

LUT3_L:I2->LO 1 0.720 0.000 Mxor__n0000_Result1 (_n0000)

FDPE:D 0.502 Dreg_4

----------------------------------------

Total 2.470ns (1.841ns logic, 0.629ns route)

(74.5% logic, 25.5% route)

-------------------------------------------------------------------------

Timing constraint: Default OFFSET IN BEFORE for Clock 'Clk'

Offset: 3.291ns (Levels of Logic = 2)

Source: Cin (PAD)

Destination: Dreg_0 (FF)

Destination Clock: Clk rising

Data Path: Cin to Dreg_0

Gate Net

Cell:in->out fanout Delay Delay Logical Name (Net Name)

---------------------------------------- ------------

IBUF:I->O 3 1.492 0.577 Cin_IBUF (Cin_IBUF)

LUT3_L:I1->LO 1 0.720 0.000 Mxor__n0000_Result1 (_n0000)

FDPE:D 0.502 Dreg_4

----------------------------------------

Total 3.291ns (2.714ns logic, 0.577ns route)

(82.5% logic, 17.5% route)

-------------------------------------------------------------------------

Timing constraint: Default OFFSET OUT AFTER for Clock 'Clk'

Offset: 6.660ns (Levels of Logic = 1)

Source: Dreg_7 (FF)

Destination: Cout<7> (PAD)

Page 47

Page 48: Wi Fi documantation

WI-FI TECHNOLOGY Source Clock: Clk rising

Data Path: Dreg_7 to Cout<7>

Gate Net

Cell:in->out fanout Delay Delay Logical Name (Net Name)

---------------------------------------- ------------

FDCE:C->Q 4 0.619 0.629 Dreg_7 (Dreg_7)

OBUF:I->O 5.412 Cout_7_OBUF (Cout<7>)

----------------------------------------

Total 6.660ns (6.031ns logic, 0.629ns route)

(90.6% logic, 9.4% route)

=====================================================================

====

CPU : 1.45 / 1.73 s | Elapsed : 1.00 / 1.00 s

-->

Total memory usage is 68080 kilobytes

Page 48

Page 49: Wi Fi documantation

WI-FI TECHNOLOGY

Page 49

Page 50: Wi Fi documantation

WI-FI TECHNOLOGY

.

.

Page 50

Page 51: Wi Fi documantation

WI-FI TECHNOLOGY4.2.5 SERIALIZER

I/O Ports Description

S.N0 Port Name Mode Size Port Description

1 Clk In Entity function synchronized for Rising edge of the Clk

2 Rst In When asserted Entity is initiliased to default values

3 SIPOEna In Enable of sipo

4 Sin In Entity function synchronized for Rising edge of the Clk

5 Pout Out [7:0] Entity function synchronized for Rising edge of the Clk

FUNCTIONAL DESCRIPTION

Entity function synchronized for Rising edge of the Clk Entity function synchronized for Rising

edge of the Clk Entity function synchronized for Rising edge of the Clk Entity function

synchronized for Rising edge of the Clk Entity function synchronized for Rising edge of the Clk

Entity function synchronized for Rising edge of the Clk Entity function synchronized for Rising

edge of the Clk.

Page 51

ClkRstlk Serializer

SIPOEna

Sin

Pout[7:0]

Page 52: Wi Fi documantation

WI-FI TECHNOLOGY

SIMULATION RESULT

SYNTHESIS REPORT

=====================================================================

====

* Final Report *

=====================================================================

====

Final Results

RTL Top Level Output File Name : serializer.ngr

Top Level Output File Name : serializer

Output Format : NGC

Optimization Goal : Speed

Keep Hierarchy : NO

Design Statistics

# IOs : 21

Macro Statistics :

# Registers : 10

# 1-bit register : 10

Page 52

Page 53: Wi Fi documantation

WI-FI TECHNOLOGY

Cell Usage :

# BELS : 26

# LUT1 : 1

# LUT2 : 3

# LUT3 : 3

# LUT4 : 19

# FlipFlops/Latches : 10

# FDC : 9

# FDE : 1

# Clock Buffers : 1

# BUFGP : 1

# IO Buffers : 20

# IBUF : 10

# OBUF : 10

Device utilization summary:

---------------------------

Selected Device : 2s15cs144-6

Number of Slices: 15 out of 192 7%

Number of Slice Flip Flops: 10 out of 384 2%

Number of 4 input LUTs: 26 out of 384 6%

Number of bonded IOBs: 20 out of 90 22%

Number of GCLKs: 1 out of 4 25% Timing Summary:

---------------

Speed Grade: -6

Minimum period: No path found

Page 53

Page 54: Wi Fi documantation

WI-FI TECHNOLOGY Minimum input arrival time before clock: 8.946ns

Maximum output required time after clock: 6.788ns

Maximum combinational path delay: No path found

Total memory usage is 54000 kilobytes.

Page 54

Page 55: Wi Fi documantation

WI-FI TECHNOLOGY

TRANSLATE

NGDBUILD Design Results Summary:

Number of errors: 0

Number of warnings: 0

Total memory usage is 37296 kilobytes

Writing NGD file "txshiftregister.ngd" ...

Writing NGDBUILD log file "txshiftregister.bld"...

MAPPING

Design Summary

--------------

Number of errors: 0

Number of warnings: 0

Logic Utilization:

Number of Slice Flip Flops: 42 out of 1,536 2%

Number of 4 input LUTs: 55 out of 1,536 3%

Logic Distribution:

Number of occupied Slices: 33 out of 768 4%

Number of Slices containing only related logic: 33 out of 33 100%

Number of Slices containing unrelated logic: 0 out of 33 0%

*See NOTES below for an explanation of the effects of unrelated logic

Total Number 4 input LUTs: 57 out of 1,536 3%

Number used as logic: 55

Number used as a route-thru: 2

Number of bonded IOBs: 16 out of 124 12%

IOB Flip Flops: 1

Number of GCLKs: 1 out of 8 12%

Page 55

Page 56: Wi Fi documantation

WI-FI TECHNOLOGY

Total equivalent gate count for design: 869

Additional JTAG gate count for IOBs: 768

Peak Memory Usage: 65 MB

PLACE AND ROUTE

Device utilization summary:

Number of External IOBs 16 out of 124 12%

Number of LOCed External IOBs 0 out of 16 0%

Number of SLICELs 33 out of 768 4%

Number of BUFGMUXs 1 out of 8 12%

Overall effort level (-ol): Standard (set by user)

Placer effort level (-pl): Standard (set by user)

Placer cost table entry (-t): 1

Router effort level (-rl): Standard (set by user)

Writing design to file txshiftregister.ncd.

Total REAL time to Placer completion: 0 secs

Total CPU time to Placer completion: 1 secs

Generating "par" statistics.

**************************

Generating Clock Report

Page 56

Page 57: Wi Fi documantation

WI-FI TECHNOLOGY**************************

+-------------------------+----------+------+------+------------+-------------+

| Clock Net | Resource |Locked|Fanout|Net Skew(ns)|Max Delay(ns)|

+-------------------------+----------+------+------+------------+-------------+

| Clk_BUFGP | BUFGMUX0| No | 23 | 0.107 | 0.349 |

+-------------------------+----------+------+------+------------+-------------+

The Delay Summary Report

The SCORE FOR THIS DESIGN is: 83

The NUMBER OF SIGNALS NOT COMPLETELY ROUTED for this design is: 0

The AVERAGE CONNECTION DELAY for this design is: 0.636

The MAXIMUM PIN DELAY IS: 2.237

The AVERAGE CONNECTION DELAY on the 10 WORST NETS is: 0.970

Listing Pin Delays by value: (nsec)

d < 1.00 < d < 2.00 < d < 3.00 < d < 4.00 < d < 5.00 d >= 5.00

--------- --------- --------- --------- --------- ---------

177 52 2 0 0 0

Generating Pad Report.

All signals are completely routed.

Total REAL time to PAR completion: 2 secs

Total CPU time to PAR completion: 2 secs

Page 57

Page 58: Wi Fi documantation

WI-FI TECHNOLOGYPeak Memory Usage: 52 MB

Placement: Completed - No errors found.

Routing: Completed - No errors found.

Writing design to file txshiftregister.ncd.

PAR done.

FLOOR PLANING

Page 58

Page 59: Wi Fi documantation

WI-FI TECHNOLOGY

4.2.6 SMC

FUNCTIONAL DESCRIPTION

State machine control controls all the modulesof architecture by clk,enable and rst signal

on it.whens rst is ‘0’ it is in idle state and for every rising edge of clock all modules are

enableded and controls fifo,data mux,byte striping logic ,scrambler,lanes,8b/10b encoder and

parallel to serial converter.

Page 59

Page 60: Wi Fi documantation

WI-FI TECHNOLOGY

SIMULATION RESULT

SYNTHESIS REPORT

====================================================================

* Final Report *

====================================================================

Final Results

Page 60

Page 61: Wi Fi documantation

WI-FI TECHNOLOGYRTL Top Level Output File Name : smc.ngr

Top Level Output File Name : smc

Output Format : NGC

Optimization Goal : Speed

Keep Hierarchy : NO

Design Statistics

# IOs : 14

Cell Usage :

# BELS : 12

# LUT1 : 1

# LUT2 : 1

# LUT2_L : 1

# LUT3 : 1

# LUT3_L : 2

# LUT4_L : 6

# FlipFlops/Latches : 6

# FDCE : 5

# FDPE : 1

# Clock Buffers : 1

# BUFGP : 1

# IO Buffers : 13

# IBUF : 5

# OBUF : 8

====================================================================

Device utilization summary:

---------------------------

Selected Device : 2s15cs144-6

Number of Slices: 6 out of 192 3%

Number of Slice Flip Flops: 6 out of 384 1%

Number of 4 input LUTs: 12 out of 384 3%

Number of bonded IOBs: 13 out of 90 14%

Page 61

Page 62: Wi Fi documantation

WI-FI TECHNOLOGY Number of GCLKs: 1 out of 4 25%

Timing Summary:

---------------

Speed Grade: -6

Minimum period: 4.657ns (Maximum Frequency: 214.731MHz)

Minimum input arrival time before clock: 5.121ns

Maximum output required time after clock: 9.002ns

Maximum combinational path delay: No path found

Total memory usage is 51952 kilobytes.

TRANSLATE

NGDBUILD Design Results Summary:

Number of errors: 0

Number of warnings: 8

Total memory usage is 37296 kilobytes

Writing NGD file "txstatemachine.ngd" ...

Page 62

Page 63: Wi Fi documantation

WI-FI TECHNOLOGYWriting NGDBUILD log file "txstatemachine.bld"...

MAPPING

Design Summary

--------------

Number of errors: 0

Number of warnings: 0

Logic Utilization:

Number of Slice Flip Flops: 8 out of 1,536 1%

Number of 4 input LUTs: 10 out of 1,536 1%

Logic Distribution:

Number of occupied Slices: 8 out of 768 1%

Number of Slices containing only related logic: 8 out of 8 100%

Number of Slices containing unrelated logic: 0 out of 8 0%

*See NOTES below for an explanation of the effects of unrelated logic

Total Number of 4 input LUTs: 10 out of 1,536 1%

Number of bonded IOBs: 15 out of 124 12%

Number of GCLKs: 1 out of 8 12%

Total equivalent gate count for design: 127

Additional JTAG gate count for IOBs: 720

Peak Memory Usage: 64 MB

PLACE AND ROUTE

Device utilization summary:

Number of External IOBs 15 out of 124 12%

Number of LOCed External IOBs 0 out of 15 0%

Number of SLICELs 8 out of 768 1%

Number of BUFGMUXs 1 out of 8 12%

Page 63

Page 64: Wi Fi documantation

WI-FI TECHNOLOGY

Overall effort level (-ol): Standard (set by user)

Placer effort level (-pl): Standard (set by user)

Placer cost table entry (-t): 1

Router effort level (-rl): Standard (set by user)

Generating "par" statistics.

**************************

Generating Clock Report

**************************

+-------------------------+----------+------+------+------------+-------------+

| Clock Net | Resource |Locked|Fanout|Net Skew(ns)|Max Delay(ns)|

+-------------------------+----------+------+------+------------+-------------+

| Clk_BUFGP | BUFGMUX0| No | 5 | 0.007 | 0.318 |

+-------------------------+----------+------+------+------------+-------------+

The Delay Summary Report

The SCORE FOR THIS DESIGN is: 72

The NUMBER OF SIGNALS NOT COMPLETELY ROUTED for this design is: 0

The AVERAGE CONNECTION DELAY for this design is: 0.554

The MAXIMUM PIN DELAY IS: 1.771

The AVERAGE CONNECTION DELAY on the 10 WORST NETS is: 0.831

Page 64

Page 65: Wi Fi documantation

WI-FI TECHNOLOGY Listing Pin Delays by value: (nsec)

d < 1.00 < d < 2.00 < d < 3.00 < d < 4.00 < d < 5.00 d >= 5.00

--------- --------- --------- --------- --------- ---------

55 3 0 0 0 0

Generating Pad Report.

All signals are completely routed.

Total REAL time to PAR completion: 2 secs

Total CPU time to PAR completion: 2 secs

Peak Memory Usage: 51 MB

Placement: Completed - No errors found.

Routing: Completed - No errors found.

Writing design to file txstatemachine.ncd.

PAR done.

FLOOR PLANING

Page 65

Page 66: Wi Fi documantation

WI-FI TECHNOLOGY

CONCLUSION

Various individual modules of WIMAX Transmitter have been designed, verified functionally

using VHDL-simulator, synthesized by the synthesis tool, and a final net list has been created.

This design of the WIMAX Transmitter is capable of transmitting all token, handshake and data

packets.

The Functional-simulation has been successfully carried out with the results matching with the

expected ones

The design has been synthesized using FPGA technology from Xilinx. This design has targeted

the device familyà spartan2, deviceà xc2s30, packageà cs144 and speed gradeà -5. This

device belongs to the Virtex–E group of FPGAs from Xilinx.

Page 66

Page 67: Wi Fi documantation

WI-FI TECHNOLOGY

Applications

1.To provide universal internet access signal with better coverage area.

2.Faster communication among broad band and WIFI technologies

3.Used to set up back up communication system and difficult to destroy.

Page 67

Page 68: Wi Fi documantation

WI-FI TECHNOLOGY

Appendix-I

7.1 Bibliography

Reference books

Basic VLSI design, 3rd Edition Douglas A. Pucknell,

Kamran Eshraghian

Page 68

Page 69: Wi Fi documantation

WI-FI TECHNOLOGYA VHDL Primer J. Bhaskar

Digital Design Morris Mano

Data and Computer Communications William Stalling

Computer Networks Andrew S. Tannenbaum

Applications of specific Integrated circuits Michael John Sebastian Smith,

Addison Wesley

7.2 Reference Websites:

www.Deeps.org

www.usb.org

www.opencores.org

www.digitalcoredesign.org

www.EFY.com

Page 69