Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Digital Communications
CME 624
May 2016
x (t )
Sampler
x (n)
Quantizer
x(n)
fs 2 B
xk
L 2k
x k
BPSK
QAM, QPSK
OQPSK
MSK
CPFSK - optimal detection
QPR
M-ary PSK
APK
Low
High
Complexity
DQPSK
DPSK
CPFSK -discriminator detection
FSK - noncoherent detection
OOK - envelope detection
Equalization
Module 1
Introduction and Overview
Controling ISI
Lecture Guide
Note:
Some of the material contained in Module 1 is a review
of prerequisite materials covered in undergraduate
classes such as:
Signals and Systems
Communications and Signal Processing
Random Signals and Processes
Introductions
Course Outline/Syllabus
Course Calendar
Course Overview
Prof. Okey Ugweje
Signals - 1
Signals - 2
Signals - 3
x(t) = 10t
x(t) = 5t2
s(x,y) = 3x + 2xy + 10y2
s (t ) Ai (t ) sin 2 Fi (t ) i (t )
n
i 1
s (t ) Ai (t ) sin 2 Fi (t ) i (t )
n
i 1
Signals - 4
Signals - 5
Continuous-valued x(t)
Discrete-valued x(nts)
Quantized xQ(t), and
Digital x[n]
10
11
12
Systems - 1
Systems - 2
13
Systems - 3
Systems - 4
or descriptively as in
Terminology of Systems
State:
Examples of Systems
Electronic systems: resistors, inductors, Radio/TV,
phone networks, sonar and radar, guidance &
navigation, satellite, lab instrumentation, biomedical
instrumentation, etc.
Mechanical systems: loudspeakers, microphones,
vibration analyzers, springs, dampers
Prof. Okey Ugweje
14
Initial Conditions
The initial conditions or initial state is the state of the
system before an input is applied
15
16
Systems - 5
Systems - 6
SYSTEMS
Distributed
Parameters
We are
interested only
on the systems
that intersect the
dotted path.
Lumped Parameters
Stochastic
Deterministic
Linear
Time
Varying
Nonlinear
Time
Invariant
Principle of Superposition
Superposition implies both additive & homogeneous rules
k p
k p
Time
Invariant
17
18
LTI
x(t)
h(t)
y(t)
x[n]
h[n]
y[n]
x(ejw)
H(ejw)
Y(ejw)
X(f)
H(f)
Y(f)
H(z)
Y(z)
Time Function
Frequency Function
Difference Equation
Pole-Zero Plot
H - Function
X(z)
T x(t ) y(t )
T Kx(t ) KT x(t )
Linear
Time
Varying
p k p k p
Homogeneous
Discrete Time
Continuous Time
Nonlinear
T x1(t ) x2 (t ) T x1(t ) T x2 (t )
19
20
Size of a Signal - 1
Size of a Signal - 2
1. Signal Energy
21
Eg g (t ) dt
T /2
lim
T T / 2
g (t ) dt G ( f ) df
(unit)2s
Size of a Signal - 3
22
2. Signal Power
x(t ) x(t T0 ), t
23
24
PxT
1
T
ExT
1
T
Others
Even and Odd Signals
Real and Complex Signals
Causal and Noncausal
.5T
2
.5T x (t )dt
with waveform
EX
Px
.5T
lim .5T
1
T T
lim
x 2 (t )dt x 2 (t )dt
1
2
2
.5T x (t )dt T x (t )dt
.5T
(t )dt 1,
(t ) 0 for t 0
x(t ) ( to )d x(t0 )
Prof. Okey Ugweje
25
Examples
Spectral Density
1. Example 1
Signal Power
26
X ( f )
2. Example 2
Signal Energy
2 0 X ( f )df
3. Example 3
Signal Energy
1
2
Cn power
x (t )dt n
T
For periodic signals, the PSD is given by
PX
T
2
T
2
GX ( f )
Prof. Okey Ugweje
Cn f nf 0
27
28
Operations on Signals
Amplitude Scaling
Amplitude Shifting
Time Shifting
Displaces a signal in time without changing its
shape
y (t ) x(t )
"+"shifts the signal left by
"-" shifts the signal right by (delayed)
29
30
Time Scaling
Continuous/Discrete Convolution
Parsevals theorem
Hilbert Transform
Reflection or Folding
DC Value
Is the time average of a signal or the time average
over a finite interval [t1, t2]
Operations in Combinations
x(t) delay (shift right) by x(t-)
compress by x(t-)
x(t) compress by x(t)
delay (shift right) by / x(t-)
Prof. Okey Ugweje
Average Power
The ensemble average
RMS Value
31
32
Examples
4. Example 4
Periodicity of Signal
g (t ) g t T0
5. Example 5
Even and Odd Signals
6. Example 6
Even and Odd Signals
Prof. Okey Ugweje
33
Examples
34
7. Example 7 : Convolution
Convolution is a technique of finding the zero state
response of LTI system
x(t)
y (t ) x(t ) h(t )
h(t)
y(t)
8. Example 8: Convolution
35
36
Examples
z x(t)e j2ft dt
z X ( f )e j2ftdf
37
38
14. Example 14
Random Signals
15. Example 15
Random Processes
39
40
Module 2
Source Encoding & Decoding
Elements of Digital
Communication System
41
42
Digital
input
lm q
i
Format
Source
Encoder
Source
bits
Channel
bits
Channel
Encoder
From other
sources
Multiplex
Modulate
Spread
Multiple
Access
Tx
Pe
Performance
Measure
Bits or
Symbol
Waveforms
Rx
n s
m$i
Format
Source
Decoder
Digital
output
Channel
Decoder
Source
bits
Demultiplex
Channel
bits
Demodulate
&
Detect
To other
destinations
Despread
Multiple
Access
43
44
1. Advantages
Low cost
Easy to regenerate the distorted signal
45
46
2. Disadvantages
In most practical
applications tradeoffs are necessary
47
Pe
Cx Eb/No
48
Information Source
Discrete output values, e.g. Keyboard (1~26 (A~Z) symbols)
Symbol
Digital Message
Messages constructed from a finite # of symbols (26 letters, 10
numbers, space and punctuation marks).
How are you? I am ok, thank you; I feel like a million dollars!
Character
Member of an alphanumeric/symbol (A ~ Z, 0 ~ 9)
Characters can be mapped into a sequence of binary digits
using one of the standardized codes such as
ASCII: American Standard Code for Information
Interchange
Others: EBCDIC, Hollerith, Baudot, Murray, Morse, etc.
Prof. Okey Ugweje
50
51
Data file
JPEG image
MPEG file
Real-time voice
Streaming video
52
Transmission Delay
Type
Method
Format
Original
Compressed
(Ratio)
Text
Zip,
compress
ASCII
KbytesMbytes
(2-6)
Fax
CCITT
Group 3
A4 page
200x100
pixels/in2
256
kbytes
5-54 kbytes
(5-50)
JPEG
in2
38.4
Mbytes
Color
Image
8x10
photo
2
400 pixels/in2
L
R bps
L/R
tprop
d
c
1-8 Mbytes
(5-30)
54
Bit Rate
Baud Rate
The rate at which bits are transmitted, i.e. # of signaling elements per
second
Higher accuracy
smaller spacing between approximation values
more bits per sample
The probability that one bit is in error, Pb, or simply the probability of
error, Pe
Data Rate
The rate at which info is transferred in bits per second
If binary symbols are independent & equiprobable, the bit rate = baud
rate
Character Rate
Characters transmitted per second
Prof. Okey Ugweje
55
56
Stream Information
x1(t)
10 10 1 0 1 0
...
x2(t)
11 1 1 0 000
...
...
...
1 ms
1 ms
Th e s p ee
ch s i g n al l e v el
v a r ie s w i th
m(e)
57
speech
(noisy )
Analog
|p
(air stopped)
| ee
(periodic)
| t (stopped) | sh (noisy)
Digital
Older technology
Newer technology
Lower speeds
Higher speeds
High overhead
Low overhead
Ws
Discrete-level information
Performance measured with SNR
58
59
60
Bandwidth Dilemma
Distortion
Attenuation Received
Sent
Distortion
Attenuation
Received
sin ( f f c )T
Gx ( f ) T
( f f c )T
Simple Receiver:
Was original pulse
positive or
negative?
61
(1.73)
62
(a) Half-power
bandwidth.
(b) Equivalent
rectangular or noise
equivalent bandwidth.
(c) Null-to-null bandwidth.
(d) Fractional power
containment
bandwidth.
(e) Bounded power
spectral density.
(f) Absolute bandwidth.
63
64
(Baseband Systems)
Source bits
Formatting of Analog
Signal
lm q
i
Pe
Baseband Systems
Formatting Textual Data (messages, character, symbols)
Formatting Analog Information
Sampling (see prerequisite section)
Quantization
Line Coding
Prof. Okey Ugweje
65
Source
Encoder
Format
From other
sources
Channel bits
Channel
Encoder
Multiplex
Pulse
Modulation
Modulate
Spread
Multiple
Access
Digital
input
Performance
Measure
lm q
i
Bits or
Symbol
Waveforms
Digital
output
Format
Source
Decoder
Channel
Decoder
Source bits
Demultiplex
Demodulate &
Detect
Multiple
Access
Channel bits
To other
destinations
Despread
66
Source
Textual
Information
Analog
Information
Analog
Information
Sink
Sampler
Quantizer
Waveform
Encoder
(Modulator)
Coder
Channel
Format
LPF
Decoder
Textual
Information
Transmitter
Waveform
Detector
Receiver
Digital Information
67
68
Encoder
Group of k bits
M=2k
M_ary
Waveform
Encoder
(Modulator)
M 2k
69
70
Example 16:
In ASCII alphabets, numbers, and symbols are encoded
using a 7-bit code
7-bit ASCII
Most significant
b8
b7
b6
b5
b4
b3
b2
Parity
b1
Least significant
16_ary digits
1
(symbols)
71
S
1
0
C
72
Sampling
Interface
(A/D)
Digital
Signal
73
Sampling
Quantization
Digital
Modulation
Transmitted
Signal
Transmitter
xa(t)
Analog signal
74
75
x[n]
Sampler
Quantizer
Discrete-time
signal
xq(n)
Quantized
Output Signal
Quantized
signal
76
Sampling - 1
Sampling - 2
Illustration of sampling:
Sampling
Discrete-time
continuous-valued
signal
Quantization
Converts DT continuous valued signal to DT discrete valued
signal
Prof. Okey Ugweje
77
Sampling - 3
Sampling - 4
78
79
80
Sampling - 5
Sampling - 6
Covered in 4400:341
Communications and
Signal Processing
81
Sampling - 7
82
Sampling - 8
x (t ) x(t ) x (t )
Sample-and-Hold
x (t ) x '(t ) p(t )
s
x(t ) (t nT s) p(t )
n
83
84
Please Note
Examples
17.Example 17
Consider the analog signal x(t) given by
x (t ) 3cos 50 t 100sin 300 t cos 100 t
What is the Nyquist rate for this signal?
Can this signal be reconstructed at the receiver at
the Nyquist rate?
18.Examples 18
Sampling
19.Examples 19
Sampling
Prof. Okey Ugweje
85
86
Speech:
Telephone quality speech has a bandwidth of 4 kHz
Most digital telephone systems are sampled at 8000
samples/sec
Audio:
The highest frequency the human ear can hear is
approximately 15 kHz
CD quality audio are sampled at rate of 44,000
samples/sec
Video:
The human eye requires samples at a rate of at least
20 frames/sec to achieve smooth motion
Prof. Okey Ugweje
87
88
Quantization - 1
Quantization - 2
A/D Converter
Analog
Input
signal
x(t)
Sampler
x[n]
Quantizer
Discrete-time signal
Analog signal
xq(n)
Quantized
output signal
Quantized signal
89
Quantization - 3
90
Definition:
Quantization is the process of approximating
continuous-valued samples with a finite number of
bits
Quantizer
device that operates on a discrete-time signal to
produce finite # of amplitudes by approximating the
sampled values
maps each sampled value to one of pre-assigned
output levels
the process of rounding off a sample according to
some rule
Quantizer
X[nT]
Xq(nT)
random process
Definition
number, size, location of its quantizing cell
boundaries, and step size of the quantization process
Quantization Resolution
# of bits, n, used to represent each sample
n log 2 L
92
93
input
signal
LPF
Sampler
Quantizer
Encoder
Binary
codes
Operational Description
Process of approximating DT continuous valued samples
with a finite # of bits
the process of rounding off a sample according to some
rule maps each sampled value to one of pre-assigned
output levels, L
quantized samples xq(n) are discrete in time and discrete
in amplitude
the approximation introduces errors
Prof. Okey Ugweje
94
Vmax
Vmin
Vmax
k
Vmax / L L 2
95
96
Mathematically
Xq ( kTs ) mi , if x k 1 x ( kTs ) x k
Xq (t ) Xq ( kTs ), if kTs t ( k 1)Ts
x f ( x ) x e(t )
e(t ) x x
Prof. Okey Ugweje
97
e(t ) x x
98
X f ( X )
If a quantizer has L quantization levels
X x1 , x 2 , x3 ,, x L
kx , x , x ,, x p,
0
where x 0 , x L
xk
3
2
1
0
1
2
3
xk
3.5
2.5
15
.
0.5
0.5
15
.
2.5
3.5
X f ( X ) X k
99
100
Transfer Functions
a f
xq nTs
output
(odd # of levels)
Zero assigned
to a quantization
level
Graphical representation
of the input and output
characteristics of the
quantizer
MIDRISER
MIDTREAD
y7
output
y6
(even # of levels)
x2
input
x4
y3
Zero assigned
to a decision level
y6
y5
y5
x3
x1
a f
xq nTs
x5
x6
a f
x1
x2 x
3
x nTs
input
y3 x4
x5
a f
x nTs
y2
y2
y1
y1
Biased
(Truncation)
Nonuniform
Prof. Okey Ugweje
101
Classification of Quantizers - 1
Biased
102
Classification of Quantizers - 2
103
104
Classification of Quantizers - 3
Delta modulation
1-bit DPCM
1
q
q
2
q
2
105
106
Output
signal
Characterized by:
Xq(t)
4
2
Input signal
-2
-8 -6 -4
8 X(t)
-2
2V p
-4
-6
107
108
Advantages:
NQ yields a higher average SNR than UQ when the
pdf is nonuniform which is usually the case in
practice
X
XX X X X X X X
Output signal
Xq(t)
Practically, NQ is realized by
Input signal
X(t)
109
110
Quantizer
+
x t f ( x) x t e(t )
( x x ) 2 f X ( x)dx
2 E x x 2
e(t ) x t x t
2
( x x) 2 f X ( x)dx ( x x ) 2 f X ( x)dx
111
112
We have assumed
1. e(t) is uniformly distributed
2. {e(t)} is a stationary white noise process, i.e. e(j)
and e(k) are uncorrelated for j = k
3. e(t) is uncorrelated with the input signal x(t), and
4. signal sample xs(t) is zero mean and stationary
Signal Power
S
Noise Power
N avg
E {x 2 }
E e(t )
2
E {x 2 }
E {x 2 }
x f X ( x)dx
2
2
D
E x x ( x x ) f X ( x)dx
113
Given
1 N 1 2
PS
xs [ n ]
N n 0
N 1
Signal power
1 N 1 2
PN
e [ n]
N n 0
Noise power
x [ n]
PS n
0
SNR
PN N1 e 2 [n]
L 1
V pp
L
Signal-to-noise ratio
q
3 2
q2
1e
q 3 q 12
2
n 0
V pp
2
s
114
115
Equation 13.12
L 1 level
L 2 intervals
Given
FH S IK E{x 2}2
N avg
E l x x q
q = step size
max quantization error is
V pp
L 1
V pp
L
Paverage q V pp2 4
N avg
2n
Ppeak signal
D = 2 = MSE
3L
Paverage
V pp
q2
2
12 L 12
117
V pp
118
Ppeak q
Ppeak signal
2
q V pp
2 2L
FH S IK
N
e NS j a6n f dB RST04,.77,
c h
10 log10 2 2 n 6n dB
dB
dB
average SNR
peak SNR
120
Non-uniform Quantization - 1
Non-uniform Quantization - 2
121
Non-uniform Quantization - 3
122
Non-uniform Quantization - 4
q2 E x q ( x) 2
2 0 e 2 ( x) p ( x)dx
2 x n1 e 2 ( x) p ( x)dx
x
n 0
2
2
Lin
sat
L
1
2
e 2 ( x) p ( x)dx
E
2
Lin
123
2
Lin
L
1
2
3
2 x
n 0 3
qn
2
qn
2
1 2
2
qn3
q
p ( xn ) 2 n p ( xn )qn
n 0 12
n 0 12
L
1
2
p ( xn ) 2
124
Non-uniform Quantization - 5
Let
L 1
2
2 qn2 p ( xn )qn
12 n0
L 1
2
1
2
2
q
q
12 n0 n qn L 2 n
D 0.1188, E[ x 2 ] 1
F SI
H NK
10 log10
avg
F 1 I 9.25dB
H 01188
K
.
1
q
L
2 1 q 2
q
12 2 q L 2
12
2
1 x2
e
2
weighted by p(xn)qn
2
Lin
f X ( x)
FH S IK 12.0 dB
N avg
NQ can give better performance for most signals than UQ
125
Reading Assignment:
Differential Quantization
Differeence
Value
Actual data
(k+3)T
kT
(k+2)T
Timing Jitter
Error caused by a shift in the sampler position
Easily isolated with stable clock reference and power
supply isolation
Oversampling
Predictor
more samples/sec
Prof. Okey Ugweje
126
127
Differential
fewer samples/sec
128
x (t )
Sampler
fs 2 B
Quantizer x( n )
x ( n)
xk
20.Example 20
Quantization
2q
3q
xk
7
2
5
2
3
2
1
2
011
010
001
000
21.Example 21
Uniform Qantrizer
x k
L 2n
111
110
101
100
2q
12 q
3q
xk
32 q
52 q
72 q
Uniform Quantizer
129
130
Example - Quantization
Department of Communications Engineering
f ( x)
8
x (t )
RS ,
T 0,
x
32
0 x8
else
Companding
131
132
Companding - 1
Companding - 2
This distortion (quantizing noise) is greater for lowamplitude signals than for high-amplitude signals.
A technique called companding is used to correct this
problem
a method that compresses and divides the loweramplitude signals into more voltage levels and
provides more signal detail at the lower-voltage
amplitudes
133
134
Companding - 4
Companding - 3
Department of Communications Engineering
Why Compand?
improve resolution (enhance SQNR) of weak
signals by
enlarging the signal, or
decreasing quantization step size
improves resolution of strong signals by
reducing the signal or
increasing the required quantization step size
reducing the # of bits required in the ADC & DAC
while reducing the dynamic range or improving the
SQNR
Transmitter Side
Signal
Input
Compressor
LPF
law
S/H +
ADC
Transmitter
ADC
Regenerative
Repeater
Receiver Side
Signal
Output
Expander
LPF
law
Signal
Out
DAC
Receiver
Signal
In
DAC
135
136
Companding - 5
Companding - 6
137
Input/Output Relationship
Types of Companding - 1
1.0
1.0
y(t )
ymax
y(t )
ymax
x(t )
xmax
y( x) ymax
R|
L
O
F
I
x
log 1 x
MN H K PQ sgn(x) |Sy
log a1 f
||
|Ty
e
max
1.0
x(t )
xmax
FH IK
FH x x IK 1
log LF x x I O
NM H K PQ , FH x x IK 1
log
xx
max
,
max
loge
max
-1.0
138
max
max
max
where
x and y represent the input and output voltages
is a constant number determined by
experiment
log e 1 x x if x 0
Prof. Okey Ugweje
139
140
Types of Companding - 2
Types of Companding - 3
R| A x x
|y 1 A sgn(x),
S| L1 log F A x I O
H x K PQ sgn(x),
||y MN 1 log
A
T
max
y( x )
max
max
max
x
1
xmax A
1
1
A xmax
x
where
x and y represent the input and output voltages
A is a constant number determined by experiment, A = 87.6
141
dx
y( x )
x0
142
Encoding - 1
A/D Converter
xa(t)
Analog
signal
Sampler
x[n]
Quantizer
Discrete-Time
signal
xq[n]
Line
Coder
an
Quantized
signal
Encoding
143
144
Encoding - 2
145
146
Two Types:
Pulse Amplitude Modulation (PAM)
The amplitude of the periodic pulse train is varied in
proportion to the sample values of the analog signal
Pulse Time Modulation
Encodes the sample values into the time axis of the digital
signal
Pulse Width Modulation (PWM)
Constant amplitude, width varied in proportion to the
signal
Pulse Duration Modulation (PDM)
sample values of the analog waveform are used in
determining the width of the pulse signal
Prof. Okey Ugweje
147
148
Analog
PCM
Sample
Quantize
Assign Code #
Convert to Binary #s
149
150
151
152
153
154
Advantages of PCM
Relatively inexpensive
Easily multiplexed
PCM waveforms from different sources can be
transmitted over a common digital channel (TDM)
Easily regenerated:
useful for long-distance communication e.g., telephone
Better noise performance than analog system
Modem is all digital, thus affording reliability, stability and is
readily adaptable to integrated circuits
Signals may be stored and time-scaled efficiently (e.g.,
satellite communication)
Efficient codes are readily available
Disadvantage
Requires wider bandwidth than analog signals
Prof. Okey Ugweje
155
A/D Converter
xa(t)
Analog signal
x[n]
Sampler
Quantizer
Discrete-Time signal
xq[n]
Coder
Quantized signal
Digital signal
Quantizer
ADC
x f ( x )
SIO
n b its
156
Speech Coding
157
Speech Coding - 1
158
Speech Coding - 2
159
160
Speech Coding - 3
1. Nonuniform probability
2.
3.
4.
5.
161
6.
162
Speech Coders
Waveform Coders
163
Vocoders
Frequency
Domain
Time
Domain
PCM
Source Coders
Nondifferential
Power spectrum
Differential
Delta
ADPCM
CVSDM
APC
Subband Coding
164
166
Sampler
Prediction
Filter
Quantizer
DPCM
Signal
DAC
Analog
Input
Signal
Prediction
Filter
Analog
Input
Signal
Waveform Coding
A) Time Domain
Designed to represent the time domain characteristics of
speech signal
For high bit rates (16 - 64 kbps) it is sufficient to just sample
and quantize the time domain voice waveform, e.g., Differential
Pulse Code Modulation (DPCM)
Differential Pulse Code Modulation (DPCM)
167
168
DPCM Issues
Linear prediction filter is usually just a feed forward finiteduration impulse response (FIR) filter
The filter coefficients must be periodically transmitted
While DPCM works well on speech, it does not work well
for modem signals
Prof. Okey Ugweje
169
170
171
172
173
174
Subband Coding
Human ear cannot detect quantization distortion at
all frequency equally well
Human perceptions of speech quality depend on
the frequency band
Subband coders filter the speech signal into
multiple bands using Quadrature Mirror Filters
(QMF) or Discrete Fourier Transform (DFT)
That is, the speech is divided into many smaller
bands and then encode each subband separately
according to some perception criteria
Prof. Okey Ugweje
B) Frequency Domain
Spectral Waveform Coders manipulates the spectral
characteristics of speech waveform
Frequency domain samples are represented
according to their perceptual criteria
Subband Coding (SBC) is an example of spectral
waveform coding
175
176
177
Excitted
Sequence
Prediction Filter
Filter Coefficients
Filter Gain
Output Speech
Power level
Whether voiced (vowels) or unvoiced (consonants)
178
This is where big savings (in terms of bit rate) comes from
179
180
181
Type
PCM
ADPCM
Subband
VSELP
Theory
Some bits (like filter gain) are much more important for
perpetual quality than others. These are protected by
error correction coding
RPE-LTP
Regular Pulse Excited Long Term Prediction
Used in GSM (European Digital Cellular) 13 kbps
QCELP
Qualcomm Code Excited Linear Predictive Coder
Used in IS-95. (US Spread Spectrum Cellular)
Variable bit rate (full, half, quarter, eighth)
Original full rate was 9.6 kbps
Revised standard (QCELP-13) uses 14.4 kbps
Prof. Okey Ugweje
182
Rate Complexity
(kb/s)
(MIPS)
64
32
16
8
~1
0.01
0.1
1
~100
?
Delay
(ms)
0
0
25
35
?
Quality
Perceived
Speech
Quality
Excellent (5)
Toll quality
Good (4)
High
High
High
Fair
High
Fair (3)
Communications
quality
Poor (2)
Vocoders
Unsatisfactory (1)
1.2
2.4
Waveform coders
4.8
9.6
16
Bit Rate (kbps)
24
32
64
184
Digital-To-Digital Conversion
(Line Coding)
Reference:
P. H. Ang, et. al., Video Compression Makes Big
Gains, IEEE Spectrum, October 1990
Prof. Okey Ugweje
185
Digital-To-Digital Conversion
186
Line Coding - 1
187
188
Line Coding - 2
Line Coding - 3
189
Line Coding - 4
190
Example
191
192
Line Coding - 5
Example
We can solve for the maximum data rate if the bandwidth of the
channel is given.
193
Transmitter - 1
Transmitter - 2
f(t)
-1
1
T
194
195
Modulation-demodulation requirements
Bandwidth requirement
Synchronization requirement
Receiver complexity, etc.,
Prof. Okey Ugweje
196
Baseline Wandering
In decoding a digital signal, the receiver calculates a running
average of the received signal power. This average is called
the baseline.
The incoming signal power is evaluated against this baseline
to determine the value of the data element.
A long string of 0s or 1s can cause a drift in the baseline
(baseline wandering) and make it difficult for the receiver to
decode correctly.
A good line coding scheme needs to prevent baseline
wandering.
DC Components
When the voltage level in a digital signal is constant for a
while, the spectrum creates very low frequencies.
These frequencies around zero, called DC (direct-current)
components, present problems for a system that cannot
pass low frequencies or a system that uses electrical
coupling (via a transformer).
For example, a telephone line cannot pass frequencies
below 200 Hz. Also a long-distance link may use one or
more transformers to isolate different parts of the line
electrically.
For these systems, we need a scheme with no DC
component.
197
Self-synchronization
Transparency
198
200
Transmission bandwidth
Should be as small as possible
4. HS ( Half Sine)
Prof. Okey Ugweje
201
202
Bipolar RZ
Alternate between positive and negative pulses to send a 1
This alternation eliminates the DC component
Polar NRZ
Wireless, radio, satellite applications (bandwidth efficient)
Unipolar NRZ
Turn the pulse ON for a 1, leave the pulse OFF for a 0 in
entire bit period
For noncoherent communication where receiver cant decide
the sign of a pulse
fiber optic communication often use this signaling format
Unipolar RZ
RZ signaling has both a rising and falling edge of the pulse
This can be useful for timing and synchronization purposes
There are many other variations of line codes (see Fig. 2.22,
page 87 for more)
203
Generalized Grouping
Non-Return-to-Zero:
Return-to-Zero:
Phase-Coded:
Multilevel Binary:
204
Line Coder
Line Coder
Xn
s( t )
Output is given by
where
205
1. Unipolar NRZ
Unipolar NRZ is defined by unipolar mapping
Unipolar NRZ
RS A,
T 0,
FG t IJ ,
HT K
206
when X n 1
when X n 0
an
NRZ = Non-Return-to-Zero
RZ = Return-to-Zero
AMI = Alternate Mark Inversion
Prof. Okey Ugweje
s(t ) an f (t nTb )
Tb
2Tb
3Tb
4Tb
5Tb
207
208
an
RS A,
T A,
when Xn 1
when Xn 0
Tb
0
1
nonreturn to zero- level; nonreturn to zero- invert
4Tb
2Tb
3Tb
2Tb
3Tb
5Tb
Polar NRZ
In NRZ-L the level of the voltage determines the value of the bit.
In NRZ-I the inversion or the lack of inversion determines the value of the bit.
-A
A
4Tb
Tb
0
-A
Prof. Okey Ugweje
5Tb
Polar RZ
NRZ-L and NRZ-I both have an average signal rate of N/2 Bd.
NRZ-L and NRZ-I both have a DC component problem.
209
210
R|
S|
T
2Tb
0
3Tb
Tb
5Tb
4Tb
Bipolar
RZ
-A
Prof. Okey Ugweje
211
212
Ft T I Ft T I
f (t) G T 4 J G T 4 J
GH JK GH JK
b
21
-A
213
214
The Manchester scheme overcomes several problems associated with NRZ-L, and
differential Manchester overcomes several problems associated with NRZ-I.
First, there is no baseline wandering. There is no DC component because each bit
has a positive and negative voltage contribution.
The only drawback is the signal rate. The signal rate for Manchester and differential
Manchester is double that for NRZ. The reason is that there is always one transition
at the middle of the bit and maybe one transition at the end of each bit.
215
216
217
218
219
220
221
+V
1
NRZ level (or change)
"1" represented by one level
"0" represented by other level
-V
+V
Bipolar
RZ
RZ-AMI
Bi-o-L
-V
+V
NRZ Space
"1" represented by no change in level
"0" represented by a change in level
-V
+V
0
+V
Bipolar RZ
"0's" & "1's" represented by opposite level polar
pulses that are half-bit wide
-V
+V
-V
+V
+V
Bi-phase Space
A transition at beginning of every bit period
"1" represented by a no 2nd transition
"0" represented by a 2nd transition one-half bit period
later
-V
+V
Delay
Modulation -V
+V
Decode
NRZ
-V
Decode
RZ
Decode NRZ
A "1" to "0" or "0" to "1" transition produces a half
duration polarity change; otherwise a zero is sent.
-V
0
Prof. Okey Ugweje
2T
3T
4T
5T
6T
7T
8T
9T
10T
11T
s(t )
an f t nTs
X(f )
R (k )e j 2 fkTs
Ts k
Delay Modulation
A "1" to "0" or "0" to "1" changes polarity;
otherwise a zero is sent.
+V
s( t )
Gs ( f )
+V
Line Coder
RZ AMI
"0" represented by no signal; successive "1's"
represented by equal amplitude alternating pulses
-V
Bi-o-S
222
Unipolar RZ
"1" represented by a 1/2-bit wide pulse
"0" represented by no pulse condition
-V
Bi-o-M
Xn
NRZ Mark
"1" represented by a change in level
"0" represented by no change in level
NRZ-S
Unipolar
RZ
NRZ-L
Decode RZ
A "1" represented by a transition at the midpoint of a
bit interval; a "0" is represented by no transition
unless it is followed by another zero; In this case, a
transition is placed at the end of the bit period.
224
RXX t1 , t2 E X t1 X * t2
x1 x2 f x1 , x2 ; t1 , t2 dx1dx2
It follows that
a f
an an* k i Pi
i 1
where
af af
RXX t1, t2 E X t2 X t1
*
a f
RXX t, t E X 2 t 0
Reading Assignment: Section 1.4
Prof. Okey Ugweje
225
226
Brute-force Method
Model s(t) as a Wide Sense Stationary (WSS) random
process
Find Autocorrelation Function (ACF) of s(t)
Gs ( f )
Gs ( f )
A2
2
X ( f ) sin 2 fTb
Tb
A2
1
n
2
X ( f ) 1
f
4Tb
Tb
Tb n
227
228
Example 24
Example 24 Solution
For k 0:
4
R(k ) an ank i pi
i 1
2Tb
Tb
3Tb
4Tb
5Tb
x1 (t ) A, 0 t Tb binary 1
0 0 14 0 A 14 A 0 14 A A 14
x0 (t ) 0, 0 t Tb binary 0
A2
Possible levels = A, 0
Assume that values are equally likely to occur with probability Pi = 0.5
For k=0:
k=0
k0
anan
anan+k
00
00
11
01
Hence,
A2
2 , k 0
R(k ) 2
A , k 0
4
R(0) an an i pi
i 1
an an 1 p1 an an 2 p2
10
0 0 12 A A 12
11
Prof. Okey Ugweje
A2
2
229
Example 24 Solution
4 fTb
sin fTb
t
Tb
fTb
Tb
j 2 fkTb
sin fTb
j 2 fkTb
Tb
R (k )e
k
fTb
A Tb sin fTb
4 fTb
4 fTb
1
e j 2 fkTb
k
1
f Tkb Fourier Series
Tb k
we can write
230
Example 24 Solution
But
A2
2
A42
Since
2 e j 2 fkTb
k ,k 0
f Tkb
1 T k
b
sin fTb
0 @ f Tkb , k 0
fTb
we have
4 fTb
2
e j 2 fkTb e j 2 fkTb
k
k 0
4 fTb
231
1 T f
b
232
Example 25
Example 26
0
1
0
1
A
0,
0
Tb
2Tb
3Tb
0 t T2b
binary 1
Tb
2 t Tb
4Tb
x 3 (t )
A 1
x0 (t ) 0, 0 t Tb binary 0
-A
2 f T2b
Gs f
16 f T2b
1 1
f Tnb
Tb n
233
Self-synchronization (SS)
Error probability
Polar codes perform better (more energy efficient) than
Unipolar or Bipolar codes
Requires PSD of the line codes to determine channel
matching characteristics
Federal University of Technology, Minna
Channel characteristics
234
235
236
237
DC Components
Summary
238
239
Timing
Error
Detection
Average
Power
Peak
Power
First Null
Bandwidth
AC
coupled
Transparent
Unipolar NRZ
Difficult
No
f0
No
No
Unipolar RZ
Simple
No
2f0
No
No
Polar NRZ
Difficult
No
f0
No
No
Polar RZ
Rectify
No
1/2
2f0
No
No
Bipolar NRZ
Difficult
No
2f0
Yes
No
Bipolar RZ
Simple
No
2f0
Yes
Yes
Dipolar NRZ
Rectify
Yes
f0
Yes
No
Dipolar RZ
Difficult
Yes
f0/2
Yes
No
HDB3
Rectify
Yes
f0
Yes
Yes
CMI
Simple
Yes
2f0
Yes
Yes
240
Transmitter:
1
N
2N
ROM
0
1
3N
an
-1
+1
4N
binary
bits
Make
Impulse
5N
an [n]
2N
3N
4N
5N
anp[n]
h[n] = p[n]
s[n]
Pulse Shaping
Inter-symbol Interference
241
Input
A/D
Converter
an
Line
Coder
s(t )
Channel
Decoder
Transmiter
A/D
Converter
Output
an
Line
Coder
s(t )
Channel
Receiver
A/D
Converter
242
To Receiver
Transmiter
s(t ) an g (t nTb )
n
243
244
Illustration of ISI
245
Tb
Tb
Tb
output
Tb
2Tb
3Tb
4Tb
5Tb
Tb
2Tb
3Tb
4Tb
5Tb
246
2Tb
Tb
4Tb
3Tb
5Tb
Tb
2Tb
3Tb
4Tb
5Tb
Tb
Tb
Tb
Tb
input
Tb
Filter Classifications
Ideal Filter:
A
X(f)
-B
248
H( f )
LPF
-f1
f1
Ideal Filters
H( f )
HPF
f1
-f1
H ( f ) H ( f ) e j ( f )
(1.58)
H( f )
Where
BPF
-f2
-f1
f1
f2
f2
1
H( f )
0
H( f )
BSF
-f2
-f1
f1
for | f | fu
for | f | f u
(1.59)
j ( f )
j 2 ft0
249
Ideal Filters
h ( t ) 1 { H ( f )}
250
Ideal Filters
(1.60)
H ( f ) e j 2 ft df
fu
e j 2 ft0 e j 2 ft df
fu
fu
e j 2 f ( t t0 ) df
fu
2 fu
sin 2 f u ( t t 0 )
2 f u ( t t 0 )
2 f u sin nc 2 f u ( t t 0 )
Prof. Okey Ugweje
251
252
Realizable Filters
H( f )
H(f)
1 j 2 f
1 (2 f ) 2
H ( f ) max
j ( f )
0.707 H ( f ) max
1/2-power
bandwidth, B
Stop Band
Transition
Band
f1
f2
Passband
f
Transition
Band
Stop Band
2.Stopband:
the freqs in this band are completely rejected
253
Realizable Filters
Realizable Filters
characteristic of RC filter
Hn ( f )
1 ( f / fu )2 n
254
Phase
255
n 1
256
Avoiding ISI
Attn
Point of symmetry
Frequency
1 1
fs
2 Ts
x(t)
Transmitter s(t)
HT(f)
258
Channel
HC(f)
r(t)
Receiver y(t)
HR(f)
t = kT
n(t)
y (kT ) an he kT nT ne (kT )
n
T = k/Tb
yk an hk n nk ho a k
r (t ) an gT t nT n(t ) h(t ),
where g (t )=hT (t ) hC (t ), Ts
y ( t ) an he t nT ne (t )
1
fs
an hk n nk
n ,n k
h0 is an arbitrary constant
where he (t ) hT ( t ) hC (t ) hR (t ), ne (t ) n( t ) hR ( t ) hC ( t )
Federal University of Technology, Minna
noise term
or equivalently
259
260
Zero ISI
y (kT ) h a
o k
n ,n k
a h kT nT n (kT )
n e
e
ho h 2 (t )dt
HR (f ) df HC (f ) HT (f ) df
RS
T
1, n 0
h (nT )
e
0, n 0
h (t ) 0 at t kT k 0
e
261
262
RS
T
1, n 0
h (nT )
e
0, n 0
H( f )
IK
n
H( f ) H f
T
e
n
T
2 fs
I
K
FH
F
H
1
1
or 2 B
2B
T
263
fs
B
B fs
fs
B fs
2 fs
264
FH
IK
1
1
or 2 B
2B
T
In this case, the pulses touch and almost begin to overlap
T
H( f )
2 fs
fs
2 fs
fs
e
e
2B
T
2B
0,
f B
R|
S|
T
FH IK
FH IK
signal is not sampled at exactly the bit instant, then ISI will occur
FH IK
265
T
T2
T2
The Fourier Transform of this pulse shape is
F
H
1
1
or 2 B
2B
T
I
K
e j e j
fs
fs
2 fs
266
R|T ,
|T L T 1 I O,
H ( f ) S M1 cos F f
e
|| 2 N H 2T K PQ
|T0,
FH IK e j
1
2T
1
1
f
2T
2T
1
f
2T
0 f
267
268
R|1,
1L
F a f f fIJ OP,
H ( f ) S M1 cosG
e
||T02,N H 2 f K Q
1
R|1,
F a f W 2W fIJ ,
H ( f ) Scos G
|T0, H 4 W W K
2
W - Wo
269
f1 f B
f1 2 f 0 B
f B f0
f B
f 2W0 W
2W0 W f W
f W
270
Rs
1
theoretical minimum BW
2 2T
W - Wo
= excess bandwidth, r =
rolloff factor, 0 r 1
Wo
absolute bandwidth, Wo
f1 2W0 W ,
f B f 0 , B f 0 f f 0 1 f 0 ( 1)
f
0
f W W0
Rb
1.0
0.5
He ( f )
f B f0 , f1 f0 f
Also see Fig. 3.17
f1
fo
B
Federal University of Technology, Minna
2B
1
f1
f f1
Comparatively
fo
B
Prof. Okey Ugweje
Rb
1
2 2T
where W
where f0
B Bmin 1
f LMN a f OPQ
cos(2f t )
h (t ) 2 f0 Sa 2f0 t
e
1 4 f t 2
271
272
273
274
275
276
EYE Diagram - 1
EYE Diagram - 2
ISI causes:
the eye to close thereby reducing the margin of error
distorts the position of the zero crossing, thereby causing the
system to be more sensitive to synchronization error
The addition of noise affects the timing recovery circuitry and also causes a
general closing of the eye
Noise may occasionally causes full 'eye-closure'
277
EYE Diagram - 3
278
With no
bandwidth
limitation
Small :
As is reduced, the eye opening narrows, requiring the
accuracy of symbol timing to be even more exact
overshoot caused by filtering is greater for small
With
bandwidth
limitation
279
280
Large :
Simpler filter
fewer stages (or taps), hence easier to implement with
less processing delay
281
Controlled ISI
Controlling ISI
Partial Response Signaling
Duobinary Signaling
282
283
284
Digital
Precoding
ak
a' k
Impulse
Generator
x(t )
H(f)
y(t )
Regenerator
ak
FH
x (t ) ak t kT
and
RS
T
x(t )
C0
C1
T
Cn-2
FH
N
t
y(t ) a c sin c n k
k k n0 n
T
where
Cn
Cn-1
a k co ak c1ak 1 c N ak N cn ak n
N
n0
+
LPF @
B = R/2
IK
N
t
h(t ) c sin c n
n
n 0
T
y(t )
285
286
Duobinary Signaling - 1
lx k q
yk
+
Delay
T
xk
He ( f )
H1
RS1,
T0,
xk 1
1
2T
1
2T
t kT
H2
1
2T
1
2T
if symbol a k = 1
if symbol a k = 0
yk xk xk 1
Prof. Okey Ugweje
287
288
Duobinary Signaling - 2
Duobinary Signaling - 3
RST,
T0,
RS
T
289
290
Duobinary Signaling - 5
Department of Communications Engineering
arg H e ( f )
1
2T
Amplitude Response
1
2T
1
2T
Duobinary Decoding:
yk
yk
2
xk
a A, 0, Af
+
xk1 -
Delay
T
Duobinary Decoder
Phase Response
Decision
Circuit
t kT
e j
Duobinary Signaling - 4
ej
1
2T
he (t )
From
f 21T
otherwise
t / T
(t T ) / T
t / T
(t T ) / T
t
t T T 2 sin(t / T )
sin c
sin c
T
T
t(T t)
H1 ( f ) 1 e j 2fT
H2 ( f )
291
292
Duobinary Signaling - 6
Duobinary Signaling - 7
R|2 A,
y S0,
k
|T2 A,
H1
lx k q
+
Delay
T
Decision
Circuit
xk 1
xk
xk 1
Delay
T
Duobinary Decoder
293
Duobinary Signaling - 8
294
Duobinary Signaling - 9
Advantage:
Duobinary signaling permits transmission at the
Nyquist rate without the need for linear phase,
rectangular shaped LPF
Disadvantages:
There is no one-to-one mapping between the
original binary digits and detected ternary symbol
(2 3)
Require more power
Ternary nature of duobinary signal requires about
3 dB greater SNR compared to ideal signaling
(i.e, binary) for a given PB
Prof. Okey Ugweje
y k
yk
t kT
Duobinary Encoder
LPF
295
296
Duobinary Signaling - 10
Duobinary Signaling - 11
Note:
Problem 3 can be solved with a technique known
as precoding
Problem 4 can be solved with a technique known
as modified duobinary
Duobinary Transfer
Function and pulse
shape
(a) Cosine Filter
(b) Impulse
response of the
cosine filter
297
Duobinary Signaling - 12
298
Duobinary Signaling - 13
300
Duobinary Precoding - 1
Duobinary Precoding - 2
wk
xk
wk1
Duo-binary
Encoder
yk
wk xk wk 1
Delay
T
1, if either xk or wk 1 is 1
w
k 0, otherwise
Conversion
rule
xk
wk-1
wk
wk+wk-1
RS
T
ak 1, if wk 0
y
ak 2 w k 1
k
ak 1,
if wk 1
wk
Delay
T
yk wk wk 1
x w
wk1
k 1
0, decide that xk 1
yk
2, decide that xk 0
0, if yk 2
i.e, x
xk 1 yk 1 mod 2
k 1, if yk 0
2
hw
k 1
301
+
Delay
T
LPF
y k
yk
Decision
Circuit
xk 1
Duobinary Encoder
Delay
T
Duobinary Decoder
k 1
Decision rules is
302
xk
t kT
xk 1
R|2 A,
y S0,
k
|T2 A,
H1
lx k q
303
RS 0,
T2,
decide that xk 0
decide that xk 1
304
lxk q
Delay
2T
+
-
1
2T
xk2
From
|ST ,
|T 0,
j 2fT
j 2fT
1
2T
t / T
(t 2 T ) / T
sin(t / T )
sin(t / T )
t / T
(t 2 T ) / T
he (t )
H2
H2 ( f )
j 2fT
j 4fT
j 2fT
yk xk xk 2
1
2T
2T
otherwise
2T 2 sin(t / T )
t (2T t )
305
306
xk
wk 2
Delay
2T
wk
xk
xk
H1
yk
Delay
2T
wk
yk
duo
Mod.duo
wk
y k
x k
xk
1
2T
1
2T
xk 2
yk
wk
1, Duobinary
2, Modified Duobinary
H2
T , Duobinary
D
2T , Modified Duobinary
307
308
Duobinary:
Modified Duobinary:
yk xk xk 1
Decode : xk y k xk 1
Code :
1,
Output sequence : xk
0,
b) With Precoding:
Code : wk xk wk 1
Code : wk xk wk 2
yk wk wk 2 xk wk 2 wk 2
1, if y k 0
Decode xk
0, if y k 2
Federal University of Technology, Minna
y k 1
else
b) With Precoding:
yk wk wk 1 xk wk 1 wk 1
yk xk xk 2
xk yk xk 2
Code :
Decode :
Decode :
309
1, if y k 2
xk
0, if y k 0
Examples
310
Multipath Channels - 1
Antenna
Gain Pattern
Transmitter
Direct Ray
Difused
Component
Specular
Component
Receiver
hc (t) (t 1 ) (t 2 )
311
312
Multipath Channels - 2
H c ( f ) F (t 1 ) (t 2 ) e j 2 f 1 e j 2 f 2
The channels frequency response
Equalization
313
Equalization - 1
314
Equalization - 2
Transmiter
hT(t)
Channel
hC(t)
Receiver
hR(t)
Equalizer
hEQ(t)
Noise
n(t)
315
316
Equalization - 3
H c ( f ) H eq ( f ) 1 H eq ( f )
with amplitude
H eq ( f )
1
j ( f )
e c
Hc ( f )
1
Hc ( f )
and phase
eq ( f ) c ( f )
Prof. Okey Ugweje
317
318
k 1
C-N
C-N+1
CN-2
CN-1
CN
319
yk
Algorithm for
coefficient adjustment
320
yk cn xk n ,
yk
k 2 N , , 2 N
yk
RS1,
T0,
k0
k 1, 2,, N
321
322
Preset Equalizer:
Transmits a training sequence that is compared at the
receiver with a locally generated sequence
Requires an initial training sequence
Differences between sequences are used to update the
coefficient cn
Time varying channel can change the sequence, since
the coefficients are fixed
Adaptive Equalizer:
Equalizer adjust itself periodically during transmission of
data
The tap weights constitute the adaptive filter coefficient
Prof. Okey Ugweje
k0
k0
n N
RS1,
T0,
323
324
heq (t ) cn (t n )
N
1, k 0
cn x kT n
n N
0, k 1, 2, , N
n N
H eq ( f ) cn e j 2 fn
N
n N
X ( f ) = HT ( f ) HC ( f ) H R ( f )
y xc
where
y(t ) c x (t n )
n N n
Survey of Equalizers
Equalizer
Types
327
Linear
Nonlinear
ML Symbol
Detector
DFE
Structures
Algorithms
326
Transversal
Lattice
Zero Forcing
LMS
RLS
Fast RLS
Square Root RLS
Transversal
Gradient RLS
Lattice
LMS
Gradient RLS
RLS
Fast RLS
Square Root RLS
MLSE
Transversal
Channel Estimator
LMS
RLS
Fast RLS
Square Root RLS
328
Examples: (Equalizer/Equalization)
Example: Equalization
Problem
Example: Equalizer/Equalization
Input from
matched
filter
Example: Equalization
Feedforward
Filter
zm
+
-
Feedback
Filter
Example: Equalizer/Equalization
Problem
output
data
Detector
z m
The filters are usually fractionally spaced FIR with adjustable tap coefficients
The detector is a symbol-by-symbol detector
Note
self study
329
330
This technique provides an algorithm for searching through the trellis for the
ML signal path
A trellis is a schematic used to represent signal waveforms with memory,
e.g., the trellis for duobinary PRS is given by
1/2
-1
1/2
1
t0
0
1
tT
1/2
new data bit/received signal level
Module 3
0
1
t 2T
t 3T
For binary, this trellis contains 2 states corresponding to 2 possible input values
Since the duobinary have memory of length L = 1, the number of states is S = 2L
In general, for M-ary, the number of trellis states is S = ML
Maximum Likelihood Sequence Detector selects the most probable path through
the trellis upon observing the received sequence y(kT)
In general each node in the trellis will have M incoming paths and M metrics
Search through the trellis for the minimum distance may be performed sequentially
using Viterbi algorithm - beyond the scope of this class!
331
332
yi(t)
s(t)
Transmitter
input
m(t)
PT
Channel
y0(t)
Receiver
Si, Ni
output
S0, N0
333
Noise Modeling - 1
334
Noise Modeling - 2
Transmitter
Channel
Receiver
r(t) (received signal )
n(t)
(noise)
335
336
N0
2
-fc
337
338
y0 (t ) s0 (t ) no (t )
Assume that:
n(t)
x(t)
yi(t)
s(t)
Transmitter
PT
Channel
Si, Ni
y0(t)
Receiver
output
S0, N0
fc
m(t)
input
N0
2
339
E s 2 (t )
S0 S
02
N 0 N 0 E n0 (t )
Federal University of Technology, Minna
340
Assumes:
x0 t x0 t td
m(t)
ST
Hp(f )
input
Channel
HC ( f )
Si
LPF
So
Ni
Hd ( f )
N0
n(t ) Noise
limits m(t)
Si PT N , where N 2 0 Gn ( f )df
B
y D (t )
S
S
SNR i
N b N 0 B b
341
With Gain - 1
Department of Communications Engineering
S 0 Si
n(t )
gT
ST
SX
Channel
L
xR (t )
SR
gR
LPF
x0 (t ) n0 (t )
S0 N 0
Receiver
ST gT x 2 gT S X
S R xR2
ST
L
S0 x02 g R S R
N 0 output g R N 0 B
S SR
N o N 0 B
Therefore
S S 0 Si
N 0 N 0 B
S ST
N o LN 0 B
Prof. Okey Ugweje
342
With Gain - 2
x(t )
This is used as a
standard for making
comparisons of the
various analog
modulation schemes
343
344
345
346
si (t )
r (t )
n(t )
h(t)
z(t )
z(T )
t T
H1
si (t )
H0
(AWGN)
z (T )
H
1
H
0
347
348
349
350
S&H
8-level 3-bit
quantization
soft decision
hard decision
S&H
Binary
quantization
Error control
hard decision
Digital 1
s (t ), 0 t T for a binary 0
s (t ) 0
s1 (t ), 0 t T for a binary 1
soft decision
hard decision
351
352
Region 0
Likelihood of s0
Decision
Line
P[z|s0 sent]
p(z| s0 )
353
P[z|s1 sent]
a0
Pe(s0)
L F IO
expM 1 G z a J P
2
N 2H K Q
2
p(z| s1)
a0
Region 1
Likelihood of s1
0 a0 a1 0
354
Definitions of Probabilities:
P[s0], P[s1] a priori probabilities
These probabilities are known before transmission
P[z]
probability of the received sample
p(z|s0), p(z|s1)
conditional pdf of received signal z, conditioned on the class si
P[s1|s0], P[s0|s1]
wrong decision (error)
P[s1|s1], P[s0|s0]
Federal University of Technology, Minna
IJ OP
KQ
LM F
N GH
1 exp 1 z a1
1 2
2 1
355
correct decision
356
Decision Rule:
H1
z(T )
H0
zi (t )
357
358
359
360
4. Min-max criterion
Also in this criterion, the a priori probability is not
known
Since P(H1) is unknown, the rule maximizes the risk
with respect to P(H1) and minimizes the risk with
respect to P(H0)
where
P[ z | si ]P[ si ]
, i 0, 2, , M 1
P[ z ]
M
P[ z ] P[ z | si ]P[ si ]
i 1
P[ si | z ]P[ z ] p ( z | si ) P[ si ]
361
That is,
si denote the ith transmitted signal class from a set
of M classes
zj denotes the jth sample of the received signal
Hence, we can write the Bayes equation in terms of
the pdf
P[ si | z ]
362
p ( z | si ) P[ si ]
, i 0, 2, , M 1
p( z )
where
M
p ( z ) p ( z | si ) P[ si ]
i 1
363
364
L( z )
P[ s1 | z ] P[ s0 | z ] decision rule
p ( z | s1 ) P[ s1 ] p ( z | s0 ) P[ s0 ]
p ( z | s1 ) P[ s1 ] p ( z | s0 ) P[ s0 ]
p( z )
p( z )
L( z )
p ( z | s1 ) P[ s0 ]
likelihood ratio test (LRT)
p ( z | s0 ) P[ s1 ]
L( z )
365
366
1 z a
0
exp
0 2
2 0
1 z a 2
1
1
H1 : p ( z | s1 )
exp
1 2
2
1
1
1
2
exp 2 ( z a1 )
p ( z | s1 )
2
2 1
L( z )
1 1
1
1
p ( z | s0 )
1 ( z a )2
exp 2 0
0 2
2 0
ln{L( z )}
2 02
02
2 02
2 (a a )(a a )
z 0 12 0 1 0
2 0 (a1 a0 )
(a1 a0 )
z
0
z (a a ) (a 2 a 2 )
exp 1 2 0 1 2 0 1
2 0
0
Federal University of Technology, Minna
2 02
02
Hence
02 12
H 0 : p ( z | s0 )
p ( z | s1 )
1
p ( z | s0 )
p ( z | s1 ) P[ s0 ]
likelihood ratio test (LRT)
p ( z | s0 ) P[ s1 ]
368
Probability of Error - 1
z 0
ao
P[H0|s1] = P[e|s1]
a1
P[e | s1 ] 0 p ( z | s1 ) dz
s0 is sent s1 is received
ao
a1
P[H1|s0] = P[e|s0]
P[e | s0 ] p ( z | s0 )dz
0
P[ H 0 | s1 ]P[ s1 ] P[ H1 | s0 ]P[ s0 ]
Prof. Okey Ugweje
369
Probability of Error - 2
1 z a 2
0
exp
PB
dz
0
2
0
0
( z a0 )
u
, 0 du dz
P[ H 0 | s1 ] P[ H1 | s0 ]
by symmetry
PB 12 P[ H 0 | s1 ] P[ H1 | s0 ] P[ H1 | s0 ]
( a a ) / 2
Prof. Okey Ugweje
a a
PB Q 1 0
2 0
1 z a 2
0
exp
dz
2
2
0
Federal University of Technology, Minna
1
2
exp u du A *
2
2
PB p ( H1 | s0 )dz p ( z | s0 )dz
PB P[ H 0 | s1 ]P[ s1 ] P[ H1 | s0 ]P[ s0 ]
1
2
370
Probability of Error - 3
371
372
Probability of Error - 4
Department of Communications Engineering
Correlator
1
x
e rfc
2
2
e rfc x 2Q x 2
Q( x)
1
2
exp x
x 2
2
373
Correlator-Type Receiver - 1
374
Correlator-Type Receiver - 2
z ()dt
T
r (t )
z0 (t )
tT
z0 ( T )
Threshold
Detector
s0 ( t )
z ()dt
T
z1(t )
si ( t )
z1 ( T )
s1 ( t )
E x 0 zero mean
z1 (T ) 0 r (t ) s1 (t ) dt
T
375
0, orthogonal
E x E n0 n1 E n E n 2 E n0 n1
N N
Noise Variance
2 E n 2 (t ) 2 0 0 n2
4 2
2
2
0
2
1
376
Correlator-Type Receiver - 3
Correlator-Type Receiver - 4
Hence PB is
x
1
exp 2 dx
P
E
B 2
2 x
x
2
Form 1:
x
x2
1
exp
dx
E
2
2
E
Q
N0
z ()dt
T
s0 ( t )
r (t )
z0 (t )
z ()dt
T
z(T )
si ( t )
tT
z1 (t )
s1 ( t )
Form 2:
r (t )
z () dt
si (t )
s1(t ) s0 (t )
t T
377
Correlator-Type Receiver - 5
378
z ()dt
T
tT
z0 ( T )
s0 ( t )
r (t )
z ()dt
T
s1 ( t )
z1 ( T )
z ()dt
T
Selects
si(t) with
the
max zi(t)
Matched Filter
si ( t )
z (T )
M 1
s (t )
M 1
379
380
s(t )
r (t )
h(t ) s(Tb t )
z(T )
z(t )
si (t )
t T
n(t )
Tb
signal
h(t ) s(Tb t )
s(t )
381
Tb
image
Tb
signal delayed by Tb
382
convolution
0 r ( ) s (Tb t )d
t
z (Tb ) z (t ) t T 0 b r ( ) s ( )d
T
383
384
But
r(t)
2
E yn2 (T ) E 0T n( )h(T )d
y(t)
y (t ) 0 r ( )h(t )d
t
h (T t )dt
2 0
T T
0 s ( )h(t )d 0 n( )h(t )d
t
sample at t T
0 s ( )h(T )d 0 n( )h(T )d
ys (T ) yn (T )
T
2
S ys (T )
N T E yn2 (T )
noise variance
385
386
T
T
S 0 s ( )h(T )d 0 h( ) s (T )d
N0 T 2
N0 T 2
N T
0 h (T t )dt
h (T t )dt
2
2 0
x(t ) y (t )dt x(t ) dt y (t ) dt
387
s (t )dt
N0 T 2 2
N0 0
N T
k
s
(
T
t
)
dt
2 0
2E
N0
388
Substituting
H ( f )Y ( f )df
S a (t )
N T E n 2 (t )
E n (t ) Rn (0) Gny ( f ) df
N0
2
Gny ( f ) H ( f ) Gnx ( f )
H ( f ) df
H ( f )Y ( f )df
H ( f ) Gnx ( f )df
eqn. 1.53
389
max at 0
390
j 2 ft
df
S 2 H ( f ) S ( f )e
2
N T N 0
H ( f ) df
Parsavals theorem
S 2 S ( f ) 2 df 2 E
N0
N T N 0
2 H ( f ) df S ( f ) df
N0
H ( f ) df
2
2
S ( f ) df
N0
Hence
H ( f ) df Y ( f ) df
H ( f ) df S ( f ) df
eqn. 1.42
But
ai (t ) FT 1 H ( f ) Si ( f ) H ( f ) Si ( f )e j 2 ft df
Therefore
j 2 ft
dt
S H ( f ) S ( f )e
N
2
0
N T
H ( f ) df
H 0 ( f ) H ( f ) kS ( f )e j 2 fT
391
392
h(t ) F 1 H ( f ) kS ( f )e j 2 fT e j 2 ft df
kS ( f ) e j 2 f (T t ) df
h(t ) s0 (Tb t )
z0 (t )
z0 ( T )
kS ( f )e j 2 f (T t ) df
h(t ) s1(Tb t )
z1(t )
z1 ( T )
r (t )
ks T t ks T t
M 1
tT
hk (t ) ksk (Tb t ), o t T
h(t ) ks T t
si ( t )
z (T )
M 1
M 1
ks T t ks T t
Thus
h(t ) s (Tb t ) z (t )
Selects
si(t)
with
the
max zi(t)
393
394
s(t )
r (t )
h(t ) s(Tb t )
r (t )
si (t )
h(t ) s0 (Tb t )
z0 (t )
z0 ( T )
h(t ) s1(Tb t )
z1(t )
z1 ( T )
h(t ) s (Tb t ) z (t )
M 1
M 1
z () dt
T
t T
n(t )
r (t )
z(T )
z(t )
Selects
si(t)
with
the
max zi(t)
r (t )
t T
h(t ) s(Tb t )
n(t )
si ( t )
si (t )
(a)
s(t )
s(t )
z(t )
z(T )
z(t )
si (t )
t T
(b)
z (T )
z (t ) 0 r (t ) s (t )dt
M 1
tT
z (t ) t T z (T ) 0 s ( )r ( )d
T
395
396
Examples
From (b):
z' (t) r(t)h(t)
But
r( )h(t )d 0 r( )h(t )d
t
z r( )s( T t)d
t
z(T ) z' (T )
397
-A
2
2
Eavg A A A2
2
s1
0
398
M=2
+A
so
s1
0
-A
2
2
Eavg A A A2
2
+A
M=4
so
s1
-3A
-A
s2
s3
+A
+3A
2
+A s1
s0
Eavg 9 A A A 9 A 5 A2
4
M=8
Eavg
Prof. Okey Ugweje
so
s1
s2
s3
-7A
-5A
-3A
-A
+A
2
2
Eavg A A A2
2
s4
s5
s6
s7
+A
+3A
+5A
+7A
An example:
2
2
2
2
2
2
2
2
49 A 25 A 9 A A A 9 A 25 A 49 A 21A2
8
Federal University of Technology, Minna
1 (t )
2 (t )
1
T
1
T
T
2
399
T
2
1
T
400
M=4
M=8
TimeDomain
s0 (t ) A1(t )
s1(t ) A 2 (t )
s2 (t ) A 3(t )
s3(t ) A 4 (t )
TimeDomain
s0 (t ) A1(t )
s1(t ) A 2 (t )
s2 (t ) A 3(t )
s3(t ) A 4 (t )
s4 (t ) A 5(t )
s5(t ) A 6 (t )
s6 (t ) A 7(t )
s7(t ) A 8(t )
Signal Space
s0 ( A, 0, 0, 0)
s1 (0, A, 0, 0)
s2 (0, 0, A, 0)
s3 (0, 0, 0, A)
Signal Space
s0 ( A, 0, 0, 0, 0, 0, 0, 0)
s1 (0, A, 0, 0, 0, 0, 0, 0)
s2 (0, 0, A, 0, 0, 0, 0, 0)
s3 (0, 0, 0, A, 0, 0, 0, 0)
s4 (0, 0, 0, 0, A, 0, 0, 0)
s5 (0, 0, 0, 0, 0, A, 0, 0)
s6 (0, 0, 0, 0, 0, 0, A, 0)
s7 (0, 0, 0, 0, 0, 0, 0, A)
General M
(M is a power of 2)
401
s2 (t ) A3 (t )
s2 (0, 0, A, 0, 0, 0, 0, 0)
s3 (t ) A4 (t )
s3 (0, 0, 0, A, 0, 0, 0, 0)
sM 1 (t ) A M (t )
sM 1 (0, 0, 0, 0, 0, 0, 0, , A)
402
s1 (0, A, 0, 0, 0, 0, 0, 0)
s1
0
s1 (t ) A2 (t )
Signal Space
s0 ( A, 0, 0, 0, 0, 0, 0, 0)
where {1(t), 2(t), 3(t) M-1(t)} are a set of orthonormal basis functions
so
Time Domain
s0 (t ) A1 (t )
Eavg E E E
2
403
s1
0
Eavg 0 E E
2
2
404
Orthogonal
E so
s1
0
Eavg E E E
2
405
406
1 0 0 1 1
T
s0 (t ) 0, 0 t T , for binary 0
r (t )
z () dt
T
z(t )
t T
z(T )
z(T ) o
3T
5T
si (t )
s1(t ) s0 (t )
Probability of Error
For s1(t):
a1 (T ) E z (T ) | s1 (t ) E 0 r ( ) s1 ( )d 0 r ( ) s0 ( )d
T
E 0 s1 ( ) n s1 ( )d 0 s1 ( ) n s0 ( )d
T
T
E 0 s12 ( ) d 0 0 0
A2T
Prof. Okey Ugweje
407
408
For s0(t):
Also:
a0 (T ) E z (T ) | s0 (t )
Ed 0 s1 (t ) s0 (t ) dt A2T
E 0 r ( ) s1 ( )d 0 r ( ) s0 ( )d
T
A2T
P Q 0 Q
B
N0
2 N0
E 0 s0 ( ) n s1 ( )d 0 s0 ( ) n s0 ( )d
T
T
T
E 0 s0 ( ) s1 ( ) d 0 0 s02 ( ) d 0
0
Ed
P Q
B
2 N0
a1 a0 A T
2
2
2
409
z ()dt
T
s0 ( t )
x
-A
3T
5T
FG E IJ
H NK
Pb Q
z(T )
tT
z1 (t )
z(T ) o
IJ FG
K H
FG
H
Pb Q
Ed
10
si ( t )
T
0
A A dt 2 A T
z (t ) z1 (t ) z0 (t ) a1 a0 0 0 0
Ed
Q
2 No
Bipolar (antipodal)
s1 ( t )
F
P QG
H
410
2 Eb
No
IJ
K
z0 (t )
z ()dt
Unipolar (orthogonal)
1 0 0 1 1
T
s0 (t ) A, 0 t T , for binary 0
r (t )
s1 (t ) A,
Eb
P Q
B
N0
IJ FG
K H
4 A2T Q
2 No
2 Eb
No
IJ
K
411
Othogonal
Antipodal
10
FG E IJ
H NK
-2
Q
P robability of Bit Error
10
10
10
10
-4
-6
FG
H
-8
2 Eb
No
IJ
K
3-dB
-10
10
12
Eb/No (dB)
14
16
18
20
412
Examples
Example
Probability of Error
10
Othogonal
Antipodal
7.810
For Eb/No = 10 dB
Pb,orthogonal = 9.2x10-2
-2
10
9.2 10
-4
10
Example
Probability of Error
-6
10
-8
10
-10
10
10
12
Eb/No (dB)
14
16
18
20
413
414
Digital Baseband
Communication System
A/D
Converter
an
Line
Coder
s(t )
Channel
To Receiver
Transmiter
415
416
Problems:
Higher frequencies allow for the use of smaller antennas size versus
417
418
Analog
Input
-fc
fc
an
Line
Coder
m(t )
Modulator
s(t )
Channel
To
Receiver
Transmiter
A/D
Converter
419
420
421
422
R (t ) x 2 (t ) y 2 (t )
(t) tan 1
LM y(t)OP
N x(t)Q
1T
x(t ) y (t ) sin ct ct sin ct ct dt
20
1T
x(t ) y (t ) sin 0 sin 2 ct dt 0
20
423
424
s (t ) Re g (t ) exp( j c t )
where g(t) = complex envelope - complex-valued signal
S(t) is convenient in many instances for analysis. Why?
Compact
Easy to manipulate without recourse to trig. identities
g(t) = R(t)ej(t)
Prof. Okey Ugweje
425
426
Gs ( f ) 1 Gg ( f fc ) Gg ( f fc )
4
Relationship: Power and Envelope of Bandpass
Power of bandpass signal is one half of power in
complex envelope:
Source
bits
lm q
i
Pe
Performance
Measure
Gs Rs (0)
Source
Encoder
Format
Channel
Encoder
Modulate
Spread
Multiple
Access
Bits or
Symbol
Waveforms
Digital
output
lm q
1
1
1
2
g (t ) Rg (0) Gg
2
2
2
Multiplex
Digital
input
Format
Source
Decoder
Channel
Decoder
Source
bits
From other
sources
Channel
bits
427
Demultiplex
Demodulate
&
Detect
Despread
Multiple
Access
Channel
bits
To other
destinations
428
Aspects of Conversion
Transmitter
Message
source
m(t )
Signal
transmission
encoder
si
Receiver
Modulator
si (t )
Channel
x(t )
Decoder
Signal
transmission
decoder
Carrier Wave
r = bits/signal = log2( L )
L = number of levels (signal elements)
N = bps
S = signals/sec (baud)
c = 1 for broadband (WAN digital-to-analog)
c = for baseband (LAN digital-to-digital)
cN
r
429
Digital Modulation
430
431
432
MODEM
(Phase info
required)
COHERENT
BINARY
ASK
(OOK)
M-ary
ASK
NONCOHERENT
HYBRID
APK(QAM)
BINARY
M-ary
ASK
(OOK)
ASK
FSK
FSK
(MSK)
FSK
PSK
(QPSK,
OQPSK)
PSK
DPSK
HYBRID
FSK
DPSK
CPM
CPM
433
434
Detection Processes
Performance of the system
Error Probability
435
436
Modulation Process
Also called ON-OFF Keying (OOK))
In ASK, amplitude of carrier is switched between 2 (or more)
levels according to the digital data
1s & 0s are represented by two amplitude levels A1 & A0
Product modulator or
ON-OFF switch
m(t )
0
s(t )
3T
A cos( ot )
Baseband Data
437
OOK Modulator
438
Analytical Expression:
Ai cos(0t ), 0 t T binary 1
s (t )
0,
0 t T binary 0
V2
2 P cos( t ) P
R
0
2E
T
Hence,
439
cos( t )
0
2 E cos( t ),
0
s (t ) T
0,
0t T , binary 1
0t T , binary 0
440
2 E (t )
i cos( t ),
0
T
0 t T,
i 0,1, 2,..., M 1
s (t ) Ac m(t ) cos c t
where
T
Ei 0 si2 (t )dt , i 0,1, 2, ..., M 1
s0 (t ) 0,
0 t T binary 0
line coder
A2
GM ( f f c ) GM ( f f c )
2
2,
an
0,
m(t )
m(t ) an f (t nT ),
Ac
cos( ct)
Prof. Okey Ugweje
441
442
A 2
(f) c
for binary 1
for binary 0
impulse
4T
T
A2
1
c TSa ( fT ) 1 ( f )
2T
T
F ( f ) 2 1 ( fc )
2
A
c ( f ) TSa 2 ( fT )
2
Tb
Note:
fc 2 Rb
fc Rb
443
444
Bandwidth of ASK
Bandwidth B, of ASK can be found from its power spectral
density
B is twice that of unipolar NRZ line code used to create it, i.e.,
B 2 Rb 2
Tb
This is the null-to-null bandwidth of ASK
If raised cosine rolloff pulse shaping is used, then
LPF
z(T )
si (t )
cos(t )
B (1 r)Rb W 1 (1 r)Rb
2
445
446
Coherent Receiver - 2
Coherent Receiver - 3
2) Matched Filter Receiver
r (t )
h(t ) s(Tb t )
z(T )
z(t )
si (t )
t T
447
448
Coherent Receiver - 3
3) Correlator Receiver
r (t )
z(t )
() dt
t T
si (t )
z(T )
s1(t ) s0 (t )
r (t )
( )2
z () dt
T
z(t )
449
t T
z(t )
z(T )
si (t )
si (t )
450
2) Square-law Detector:
T (n 1/ 2)
T (n 1/ 2) ()dt
z(T )
LPF
t T
si (t )
z(T )
r (t )
Rectifier
z(t )
Envelope Detector
t T
BPF
@ fo
r (t ) s (t ) n(t )
452
Derivation
453
454
455
456
Modulation Process:
The instantaneous carrier freq is switched b/w 2 or
more levels according to the baseband digital data
data bits select a carrier at one or more freqs
the data is encoded in the freq
FSK conveys the data using distinct carrier freqs to
represent symbol states
Important property = amplitude of the modulated
wave is constant
457
458
Analytical Expression
s (t )
i
2E
cos
T
i t ,
i 0,1, , M 1
t
i (t ) 0t d
m( )d )
fi
d
i (t ) f 0 f d m(t )
dt
where
Analog form
E1 oT si (t ) s j (t )dt
ij
freq offset
2E
cos 2 f 0t 2 ift , i 0,1, , M 1
T
f fi fi 1 ,
fi f o if
Prof. Okey Ugweje
459
s
1 T 2 Es
cos 2 f ot 2 ift cos 2 f o t 2 j ft
E o T
s
1 T
1 T
cos 2 (i j )ft dt o cos 4 f o t 2 (i
T o
T
sin 2 (i j )fT
2 (i j )fT
dt
j )ft dt
460
Binary FSK - 1
ij
sin 2 (i j )fT
2 (i j )fT
ij
f1
so (t ) Ac cos( 1t 1)
0.715
Tb
1
2Tb
1
Tb
-0.217
3
2Tb
2
Tb
2E
cos(2 f 0t 0 ), 0 t T
T
2E
cos(2 f1t 1 ), 0 t T
s1 (t )
T
s0 (t )
461
Binary FSK - 2
s1
so 0
0
1(t )
1 (t )
2E
cos( t 1 )
T
2 (t )
2E
cos( 2t 2 )
T
1 (t )2 (t )dt
ij
2E
cos(1 t 1 ) cos( 2t 2 )dt
T
sin 2Tb Tb 1 2 sin Tb 1 2
ij
2sin Tb
1 (t )2 (t )
462
Binary FSK - 3
2 (t )
s1(t ) Ac cos( 2t 2 )
Note:
f2
463
464
Binary FSK - 5
Binary FSK - 4
Department of Communications Engineering
1 2
Phase Discontinuities
465
Binary FSK - 6
Binary FSK - 7
Implementation of BFSK
466
0 1
No Phase Discontinuities
m(t)
BFSK
Frequency Modulator @ fo
1(t )
2
Tb
cos 2f1t
m(t)
ON-OFF Level
Encoder
+
x
2 (t)
BFSK
2 cos 2f t
2
Tb
467
468
Binary FSK - 8
Binary FSK - 9
Thus:
Ac cos( ot D f m( )d )
Df
469
f1 f c f , f 2 f c f , f1 f 2 2f
Modulation Index
h
2f
2 fT
R
470
Binary FSK - 11
Binary FSK - 10
Department of Communications Engineering
t
m( )d
(t ) D f
471
Quadrature Notation
t
m( )d )
x(t ) Ac cos( D f m( )d )
t
y (t ) Ac sin( D f m( )d )
t
472
Binary FSK - 12
Binary FSK - 13
PSD of CPFSK
Because complex envelope g(t) is a nonlinear function of
m(t), an exact expression for the PSD is difficult to obtain
A good approximation for s(t) can be found by considering
FSK to be the sum of 2 OOK signals
d (t )
d (t )
s (t ) R (t ) cos c
t R (t ) cos 2 f c
t
dt
2 dt
and
dt
D f m(t )
1 m(t )
cos(2 ( f c f )t )
2
1 m(t )
Ac
cos(2 ( f c f )t )
2
s (t ) Ac
D m(t )
f
t A cos(2 f t )
s (t ) Ac cos 2 f c
c
i
2 dt
, when m(t ) 1
f1 f c
2
fi
f f D f , when m(t ) 1
c
2
2
Prof. Okey Ugweje
B 2 f 1 r
473
Binary FSK - 14
2Tb
474
Binary FSK - 15
Sunde's FSK
475
476
Binary FSK - 16
Binary FSK - 17
3
B r Rb
Detection of FSK:
Coherent
Coherent detection of FSK is similar to that for ASK but in this
case there are 2 detectors tuned to the 2 carrier frequencies
Recovery of fc in receiver
is made simple if the
frequency spacing
between symbols is made
equal to the symbol rate
(Sundes FSK)
Drawback of using Sunde's FSK
The bandwidth of the FSK signal is approximately 1.5 to 2
times that of an optimally filtered ASK or PSK binary signal
477
Binary FSK - 18
Department of Communications Engineering
z () dt
z(t )
z ()dt
z0 (t )
t T
si (t )
z(T )
r (t )
tT
BPF/Envelope Detector:
z0 ( T )
Threshold
Detector
s0 ( t )
x
Noncoherent
Pass the signal through 2 BPF tuned to the 2 frequencies
and detect which has the larger output averaged over a Ts
s1(t ) s0 (t )
x
z ()dt z (t)
T
si ( t )
z1 ( T )
s1 ( t )
h(t) = s(Tb-t)
t T
h(t) = s(Tb-t)
BPF
Tuned @ f1
z (T )
y (t )
r (t )
r(t)
si (t )
z (T )
y (t )
Envelope
Detector
BPF
Tuned @ f2
Envelope
Detector
t T
Prof. Okey Ugweje
478
Binary FSK - 19
r (t )
479
Sampler
Time
Sync
480
Binary FSK - 20
Binary FSK - 21
FG E IJ
H NK
Pb Q
Zero-Crossing:
One simple digital method involves counting the zerocrossings of the carrier during a symbol and hence
directly estimating the frequency on a symbol-by-symbol
basis
Noncoherent
F
H
E
Pb 1 exp b
2
2 No
I
K
Quadrature Receiver
482
Derivation
483
484
Waveform:
485
486
si (t ) Ag (t ) cos ot i , 0 t T , i 1, 2,..., M
where
g(t) = transmitting signal pulse shape
A = amplitude of the signal
= carrier phase
2 (i 1)
2 i
or i
M
M
487
2
, 0 t T ; and assume A E
T
Federal University of Technology, Minna
488
si (t )
2 Es
cos
T
0t
2 i 1
,
M
s (t )
i
0 t T , i 1, 2,..., M
Constant envelope
180-phase
shift
0-phase
shift
-90-phase
shift
2T
3T
4T
489
490
01
00
11
M_ary Constellations
01
00
11
10
011
3 5 7
4
01
491
M 2k
MPSK
BPSK
4
8
QPSK
8 PSK
16
16 PSK
001
010
E
11
100
110
111
10
M=4
01
010
M=8
00
10
001
M=4
110
111
101
011
11
000
00
10
3
0, , ,
2
2
2 i 1
M
2 (i 1)
2 (i 1)
2E
cos
cos c t sin
sin c t
M
M
T
cos c t
2E
T
000
100
101
M=8
492
s0 (t )
s1 (t )
v(t ) Re g (t )e
cos c t
2 Es
T
493
where g(t )
RS 1,
T1,
binary 1
binary 0
494
si (t ) R(t ) cos( 0t i (t ))
where R (t ) 1, constant envelope
0,
binary1
(t )
, binary 0
1, binary1
x(t )
1, binary 0
j c t
cos 2 f c t c
2 Es
T
2 Es
T
495
496
Product modulators
Differential encoding
Switching modulators
Coherent Receiver
Maximum Likelihood Detector
Square Law Detector
Correlator Detector or Costas Loop
Noncoherent Receiver
497
Differential PSK
Modulation/Transmitter Process
s (t )
i
2 Es
T
cos
c t 2 Mi 1
498
P f Eb
2
2 (i 1)
2 (i 1)
2 Es
cos
cos c t sin
sin c t
M
M
T
or
P( f )
A2 T
b
2
Bandwidth 2 R
Product modulators
2
T
Switching modulators
Differential encoding
499
500
r (t )
z(T )
si (t )
cos(t )
501
502
2. Matched Filter
Noncoherent Receiver
h(t ) s(Tb t )
z(T )
z(t )
si (t )
t T
3. Correlator receiver
r (t )
LPF
r (t )
z () dt
T
z(t )
t T
si (t )
z(T )
s1(t ) s0 (t )
( )2
z () dt
T
z(t )
t T
z(T )
si (t )
503
504
Examples
Example
Suppose that the binary PSK is used in transmitting info over
AWGN channel with power spectral density of N0/2 = 10-10
watts/Hz and Eb=A2T/2. Determine the signal amplitude
required to achieve an error probability of 10-6 if the data rate is
(a) 10 kbps, (b) 1Mbps
N0
Example
Find the expected number of bit errors made in one day by the
following continuously operating coherent BPSK receiver. The
data rate is 5000 bits/s. The input digital waveforms are s1(t) =
Acos(w0t) and s2(t) = -Acos(w0t) where A = 1 mV and the singlesided noise power spectral density is N0 = 10-11 W/Hz. Assume
that signal power and energy per bit are normalized relative to a
1 ohm resistive load.
Prof. Okey Ugweje
505
506
D-BPSK
BPSK
Differential BPSK looks just like BPSK except that the phase shift are in
a different place
Prof. Okey Ugweje
507
508
dk1
dk
dk
RSd
Td
k 1,
k 1,
ak 0
ak 1
ak
0
0
1
1
Delay
Ts
ak
dk
dk 1 dk
0
1
1
0
0
0
1
1
D-BPSK
The 1-bit delay can be realized very simply using a clocked shift register
Prof. Okey Ugweje
509
510
dk
Delay
Ts
EX-NOR
ak
01101100
ak
dk1
dk1
dk
Delay
Ts
01111100
dk
Delay
Ts
EX-NOR
ak
dk1
511
512
DPSK Modulation:
DPSK combines two basic operations at the
transmitter
Differential encoding of the binary data, and
modulation
Demodulation of DPSK
r (t )
r
k
z () dt
T
x
Delay
T
r
k 1
t T
z(t )
si (t )
z(T )
Suboptimum Detector
z(t )
z0T ()dt
t T
r (t )
cos 0t
x
z(t )
z0T ()dt
z(T )
si (t )
x
T
sin 0t
Optimum Detector
Exercise:
Draw a matched filter implementation of the optimum
detector
Prof. Okey Ugweje
513
x
Delay
T
x(t )
LPF
y(t )
t T
z(T )
si (t )
r
k 1
y(t ) const A nc (t ) A nc (t Tb ) ns ns (t Tb )
514
PB Pr Z(Tb ) 0
1
E
PB exp b
2
N0
Theoretical performance for CPSK & DPSK is shown for an AWGN channel
2 Eb
PB 2Q
N0
2 Eb
1 Q
N0
BER for CPSK is exactly the same as that derived for bipolar baseband
transmission
Prof. Okey Ugweje
515
516
Example 43 - DPSK
M-ary Modulation
517
518
Abbreviation
MASK
MQAM
MFSK
MPSK
M=4
QPSK
/4 QPSK
OQPSK
DQPSK
/4 DQPSK
M>4
DMPSK
MSK
DMSK (GMSK)
MAPK
519
Descriptive Names
M-ary Amplitude Shift Keying
M-ary Quadrature Amplitude Modulation
M-ary Frequency Shift Keying
M-ary Phase Shift Keying
Quadrature Phase Shift Keying
/4 Quadrature Phase Shift Keying
Offset Quadrature Phase Shift Keying
Differential QPSK
/4 Differential QPSK
MPSK (e.g, 8-PSK, 16-PSK, 64-PSK, etc., )
Differential MPSK
Minimum Shift Keying
Differential MSK (Gaussian MSK)
M-ary Amplitude Phase Keying
Federal University of Technology, Minna
520
Modulation Type
Applications
FM (analog) AMPS
MSK
CT2
GMSK
GSM, DCS 1800, CT3, DECT, HIPERLAN-1
QPSK
NADC (CDMA) - base transmitter
OQPSK
NADC (CDMA) - mobile transmitter
4-DQPSK
NADC (TDMA), PDC, PHP (Japan)
/4-DQPSK
N. A. TDMA, PHS
QPSK/OQPSK CDMA One
QAM
IEEE 802.11 (5.7 GHz), HIPERLAN-2
GFSK
Bluetooth, IEEE 802.11-FHSS)
DPSK
IEEE 802.11-DSSS
CCK
IEEE 802.11-DSSS
521
M 2k k log 2 M
Rb bits
k log 2 M
Ts
Ts
log 2 M s
Tb
1 Ts
1
Rb k kRs
Rb log 2 M
1
bits / s / Hz
B
BTs
BTb
Any digital system will become bandwidth efficient if its BTb is
increase
522
523
524
2-bit
information
00
01
/2
10
11
3/2
Each symbol
corresponds to two bits
General expression:
sQPSK (t )
2E
s
T
s
cos 2 f ot
2 (i 1)
,
M
i 1, 2,3, 4
0 t Ts
2 Eb
Tb
2 (i 1)
2 (i 1)
sin c t sin
cos c t cos M
M
525
s1
2 Es
Ts
cos c t
s2
2 Es
Ts
cos c t
s3
2 Es
Ts
cos c t
s4
2 Es
Ts
cos c t
2E
sin c t
2 Es
Ts
cos c t
s
T
s
3
2
s1,3 (t )
2 Es
Ts
cos 2 f ot ,
s2,4 (t )
2 Es
Ts
sin 2 f ot ,
2 Es
Ts
sin c t
526
2
Ts
cos 2 f o t
and 1 (t )
2
Ts
sin 2 f ot
11
s2
sQPSK (t )
00
s0
s3
Es
cos
2 (i 1)
(t ) Es
M 1
sin
2 (i 1)
(t )
M 2
10
00
10
00
11
01
11
0,
Prof. Okey Ugweje
527
01
, ,
3
2
2 Es
3 5 7
, , ,
4 4 4 4
528
QPSK Modulator:
I
A
2
RS
T
1
m2
1
A
2
R
Rs b
2
m2 (t )cos ot
cos ot
~ A cos ot
Serial-toParrallel
Converter
m(t)
Rb T1
b
R
Rs b
2
90
R
Rs b
2
m1
RS11
T
A sin t
o
2
A
2
SystemView
m1(t )sin ot
529
2.5e-3
5.e-3
7.5e-3
10.e-3
12.5e-3
2.5e-3
5.e-3
7.5e-3
10.e-3
12.5e-3
1.5
Amplitude
Source data is first split into 2 data streams (often by allocating alternate bits
to the upper and lower modulator)
with each data stream runs at half the rate of the input data stream
Think of m1 & m2 as bit stream that modulates the quadrature carriers
In QPSK the Tx is 2 BPSK Transmitters arranged in phase-quadrature, each
operating at half the bit rate of the original bit stream
Prof. Okey Ugweje
500.e-3
-500.e-3
-1.5
Time in Seconds
530
QPSK Demodulator:
QPSK receiver is composed of 2 BPSK receivers
one that locks on to the sine carrier and
the other that locks onto the cosine carrier
x
z ()dt
T
z1(t ) t T z1(T )
1(t)
r (t )
1 (t ) A cos o t
()dt
z0 (t )
z0 (T )
si ( t )
Compare
Z1 and Z0
2 (t ) A sin o t
2 (t)
z1(t )
zo ( t )
s (t ) 2 (t )dt
Ts
0 1
Ts
0
Lo
531
532
Implementation of QPSK
533
534
Phase Diagrams:
s
45o
s3
Offset QPSK
535
536
Offset QPSK - 1
Offset QPSK - 2
537
Offset QPSK - 3
538
OQPSK
539
540
/4 QPSK - 1
450
Symbol 2
Symbol 3
Time
541
542
/4 QPSK - 3
/4 QPSK - 2
Department of Communications Engineering
Qk
Ik
Data bits
mI, mQ
Phase shift
T=2mTs
Phase shift
T=(2m+1)Ts
00
-3/4
01
3/4
/2
10
-/4
-/2
11
/4
543
Modulation
Max pahsechange
OQPSK
180o
90o
/ 4 QPSK
135o
QPSK
544
FG
H
PE ( M ) 2Q
2 Es
sin
No
2M
IJ
K
FG
H
PE ( M ) 2Q
Prof. Okey Ugweje
2 Es
sin
No
M
IJ
K
545
M-ary ASK
s
T
s
cos 2 f o t 2 ift , i 1, 2, , M , 0 t Ts
i i 1
Ts
or f i fi 1
1
, where Ts Tb log 2 M
2Ts
2E
f f i fi 1 , fi f o if
546
547
548
PE ( M ) M 1 Q
E
N
M 1 Q
o
kE
b
N
o
(eqn.
3.122)
coherent
k 1
549
FH
M 1
kEs
exp
k
k 1
(k 1) No
M
E M
E
1 exp s (1)k
exp s
k
M
No k 2
(k ) No
E
M 1 exp s
2
2 No
PE ( M )
noncoherent
IK F
I
H
K
FH IK F
F I
I
H K
H
K
F I
H K
M 1 (1)k 1
550
Quadrature Amplitude
Modulation
The Eb/N0 required for error-free transmission will thus
approach the Shannon-Hartley limit of -1.6 dB
M-ary FSK is a very effective modulation technique in
applications where the optimum performance in noise is
required
for example in deep space missions where the path loss is so great
Prof. Okey Ugweje
551
552
where
2E
[ai cos ot bi sin ot ]
T
Rb
m n
Rs
M 1 2m , M 2 2n , m n log 2 M 1M 2 ,
2E
Vi cos[ ot j ], i 1, 2, , M 1 , j 1, 2, , M 2
T
553
554
Using the vector representation, we can realize an Lby-L matrix representing the coordinates of (ai, bi)
( L 3, L 1)
( L 1, L 1)
( L 1, L 3) ( L 3, L 3)
{a , b }
i i
( L 1, L 1) ( L 3, L 1)
si (t ) Ai1 (t ) Bi2 (t )
where
1 (t )
2
T
s
cos[ ot ], 2 (t )
2
T
s
sin[ ot ]
where
L M
In vector notation:
si si1 , si 2 Ai E , Bi E
Prof. Okey Ugweje
( L 1, L 1)
( L 1, L 3)
( L 1, L 1)
ai , bi
555
556
16-QAM constellations
557
558
MQAM Modulator:
A serial-to-parallel
converter divides the
incoming data stream
into two bit stream each
at one-half the rate
fb
2
fb
fb
2
Q
559
Premod
LPF
DSB-SC
AM Mod
X
0o
fb 1
2 log2 L
Data
Slicer
2-to-L-level
converter
LO
Phase
split
BPF
IF AMP
90o
2-to-L-level
converter
Premod
LPF
DSB-SC
AM Mod
560
r (t )
z0T ()dt
2
cos o t
T
Threshold
and
Decision
Logic
2
sin o t
T
z0T ()dt
si ( t )
tT
561
16-QAM Constellations
562
563
Type I
Type II
Type III
16 QAM (8, 8)
16 QAM (4, 8, 4)
564
565
566
567
568
In a special case where amplitudes take discrete values (2i-1M)d, constellation is rectangular
nb
g b
dij si s j 1 E ai a j 2 bi bj
2
s1
d min d 2 E
gs
1 (t )
s2
569
1b
a
IK
570
where P M 2 1
1
M
3 Eav
( M 1) N
o
PE ( M ) 1 PC ( M ) 1 1 P M
I
d
3 Eav
3 kEb
PE ( M ) 1 1 2Q
4Q
( M 1) N o
( M 1) N o
FH
2 (t ) Q
571
, k 1
572
Variants of QAM - 1
2-to-L-level
converter
Premod
LPF
fb
2
fb
PB ( M )
Data
Slicer
573
Phase
split
LO
2-to-L-level
converter
Premod
LPF
Data
input
QPSK
Modulator
Serial-to-2x2 bit
paralel converter
574
Variants of QAM - 3
Department of Communications Engineering
BPSK
BPF
IF AMP
Variants of QAM - 2
BPF
DSB-SC
AM Mod
LO
90o
DSB-SC
AM Mod
0o
fb
2
2(1 M 1 ) 3log 2 M 2 Eb
Q
2 1) N
log M
M
(
2
o
Half
Symbol
Delay
QPSK
2-level QPSK
32-level Star
QAM
16 Star QAM
Type 1
IF AMP
64-level Star
QAM
QPSK
Modulator
575
576
Trellis-Coded Modulation - 1
Trellis-Coded Modulation - 2
577
578
Federal University
of Technology,
Minna
Part 5: Digial Bandpass
Communication
579
580
Power Efficiency - 1
Definition:
Power Efficiency (), is a measure of how much received
power is needed to achieve a specified bit error rate
Power efficient modulation schemes requires less power for
satisfactory BER
is a function of signal-to-noise ratio (SNR)
In the computation of , it is assumed that:
All modulation levels occur with equal probability, 1/M
Gray encoding is used to map the information bits into levels
Differential encoding may be employed
Power efficient modems are not bandwidth efficient (next 2
slides)
Power efficient schemes are more appropriate for satellite &
mobile communications
581
Power Efficiency - 2
Power Efficiency - 3
582
583
584
Bandwidth Efficiency - 1
Bandwidth Efficiency - 2
Definition:
Bandwidth efficiency () is the ratio of the bit rate to
channel bandwidth expressed in bit per second per
hertz (b/s/Hz)
It is also called Spectral Efficiency
The primary objective of spectrally efficient modulation
is to maximize the bandwidth efficiency
With data rate denoted as R, and the channel
bandwidth by B, then Bandwidth Efficiency is given
as
Rb
1
log 2 M 2 bits / s / Hz
B BTb
C
S bps
log 2 1
B
N Hz
Bandwidth Efficiency - 3
586
Bandwidth Efficiency - 4
M-ary QAM
In theory, = 4, 6, & 8 b/s/Hz for 16-, 64-, and 256QAM, respectively
But in practice we have, 2.5-3.5, 4.5-5, & 5-6, respectively
587
588
Raised Cosine
ASK
2/T
(1+r)/T
FSK
4/T
2(1+r)/T
PSK
2/T
(1+r)/T
589
Immunity to
Nonlinearity
Implementation
Complexity
0.5
D (worst)
a (simple)
2.0
1.0
9.6 dB
2.0
1.0
9.6 dB
N/A
2/3
A (best)
d (complex)
EbNo
(dB)
Nyquist
Null-to-Null
BPSK
9.6 dB
1.0
QPSK
9.6 dB
PSK, QAM
Coherent FSK
Noncoherent FSK
Prof. Okey Ugweje
Required
CNR
BPSK
10.6 dB
Rb
10.6 dB
QPSK
10.6 dB
0.5Rb
13.6 dB
8-PSK
14.0 dB
0.33Rb
18.8 dB
16-PSK
18.3 dB
0.25Rb
24.3 dB
Pb = 10-6
Pb = 10-5
590
16
32
64
(bits/s/Hz)
0.5
1.0
1.5
2.0
2.5
3.0
M-ary System
Max
(bits/s/Hz)
Modulation
Scheme
MSK
OQPSK
Required
Eb/No
16
32
64
(bits/s/Hz)
1.0
1.0
0.75
0.5
0.3125
0.1875
1 log M
2 2
2log 2 M
M 3
log M
2
2M
591
592
Assuming PB 10
Modulation
Scheme
Bandwidth,
B
Eb/No
(dB)
Equipment
Complexity
coh. ASK
2Rb
14.45
Moderate
noncoh. ASK
2Rb
18.33
Major
Rarely used;
o A/2
o A2Tb / 4
Peo Pe1
coh. FSK
2Rb
10.60
Minor
Seldom used
Performance does not justify complexity
0 0
noncoh. FSK
2Rb
15.33
Minor
coh. PSK
2Rb
8.45
Major
Differential
PSK
2Rb
9.30
Major
BPSK
QAM, QPSK
OQPSK
MSK
CPFSK - optimal detection
QPR
M-ary PSK
APK
Comments
Low
High
Complexity
DQPSK
DPSK
CPFSK -discriminator detection
FSK - noncoherent detection
OOK - envelope detection
IEEE 1979
593
594
2
Eb A2Tb
A2
A
No
No
No (1 / Tb ) NoW
e j
e j
Eb STb
S SW S W S W
No No RNo RNoW NoW R
N R
595
596
Bit rate is R
P( sm )
1
M
Bit Rate
RT log2 M
Symbol Rate
, m 1, 2,, M
1
M
Em , ( Es if Em equalfor all m)
Average Power
m1
Average power
Pav
Eav
,
T
1
where the symbol rate is
T
Es
No
Eb av
N0
597
598
Error Probability:
Probability of bit error is Pb
Probability of symbol error is Pe or PM or P(M)
We can compare modulation schemes in terms of the
Eb/No required to achieve a specified or Pe or Pb
Generally,
1
Pe ( M )
log 2 M
Relation between Pe and Pb for Orthogonal Signals
2 M 1
Pb
Eav
E
Es
( b
if Em is equal for all m)
log 2 M N o
N o log 2 M N o
599
M
Pe
2( M 1)
600
Modulation
PM
c z
y
1
2
x2
2
M 1
exp 21 y
2 Es
No
FG
H
Es
No
PM
n 1
( )
n 1
Orthogonal
IJ
K
Bandpass Systems
Es
Q
BASK (OOK)
N0
FG M 1IJ 1 expFG nE IJ
H n K n 1 H (n 1) N K
s
BFSK
All Cases
1
Pb
PM
2( M 1)
Prof. Okey Ugweje
BPSK
Es
Eb
log 2 M
Federal University of Technology, Minna
601
Pb (noncoherent)
2 Eb
Q
No
dy
Noncoherent Exact
M 1
Pb (coherent)
Baseband Systems
Antipodal
PM (coherent)
Es
N0
2Es
No
Eb
N 0
Eb
N 0
Eb
N 0
2
1 exp A
2
8N0
1 exp Eb
2
2 N0
2 Eb
N 0
1 exp Eb
N
2
0
602
Modulation
QPSK
OQPSK
PM (coherent)
2 Es
2Q
N0
2 Es
2Q
sin
M
N0
DPSK
2Q
F
H
6 log2 MEb
( M 2 1) No
MASK
2( M 1)
M Q
MFSK
( M 1)Q
MPSK
Prof. Okey Ugweje
2Q
I
K
kEb
N0
2 Eb log 2 M
N0
Modulation
Pb (coherent) Pb (noncoherent)
sin M
2 Eb
N0
2Es
Q
N0
1 Q
2( M 1)
M
1 exp Eb
No
2
2 Eb
N0
Eb
N0
Eb
( M 2 1) No
Q 2Q
kEb
N0
( M 1)Q
2 Eb
N0
Eb
M 1 e 2 No
2
4 Es
N0
sin M
603
2 Es
N0
Es
N0
3kEs
( M 1) N0
MDPSK
2Q
/4QPSK
2Q
MQAM
PM (coherent)
4Q
sin M
sin
MSK
2 Es
N0
GMSK
0.68
2 Eb
N0
Pb (coherent) Pb (noncoherent)
2M
j
1
FH
1 M )
2(log
M Q
2
2 Eb
N0
3 log2 M 2 Eb
( M 2 1) N0
IK
604
Digital Communications
Module 5
Multiplexing & Multiple Access
Resource Sharing Techniques
Duplexing
Multiplexing Techniques
Frequency Division Multiplexing
(FDM)
Time Division Multiplexing (TDM)
Code Division Multiplexing (CDM)
Wavelength Division Multiplexing
(WDM)
605
606
Duplexing Techniques - 1
Digital
input
lm q
i
Forma
t
Source
Encoder
Source
bits
Channel
bits
Channel
Encoder
From other
sources
Multiplex
Modulate
Spread
Multiple
Access
Tx
Pe
Performance
Measure
Bits or
Symbol
Waveforms
Rx
lm q
Format
Source
Decoder
Channel
Decoder
Demultiplex
Digital
output
Source
bits
Channel
bits
Demodulate
&
Detect
To other
destinations
Despread
Multiple
Access
607
608
Duplexing Techniques - 2
Duplexing Techniques - 3
609
Multiplexing Techniques
Amplitude
Time
610
611
fN-1
fN-2
Frequency
f3
f2
f1
Frequency Band N
Frequency Band 2
Frequency Band 1
f0
Time
612
Digitized info from several sources are multiplexed in time and transmitted
over a single communication channel
The communication channel is divided into frames of length Tf
Each frame is further segmented into N subinterval called slots, each with
duration Ts = Tf/N, where N is the number of users
...
Slot
N
s1
s2
...
Sync word
sk
Slot
1
Slot
2
Slot
N
...
s1
s2
...
Each user is assigned a slot (or channel) within each time frame
TDM is used to combine several low bit rate signals to form a high-rate
signal to be transmitted over a high bit rate medium
Individual message signals need not have the same rate, or same type of
signal since each channel is independent of one another
TDM is usually used for digital communication and cannot be used in analog
communication
Different combining techniques are shown below
Prof. Okey Ugweje
613
Frequency
Band 3
Signal 3
Signal 1
Signal 3
Band 2
Signal 2
Signal 3
Signal 2
Band 1
Signal 1
Signal 2
Signal 1
Slot 1
Slot 2
Slot 3
Definition:
Multiple Access (MA) techniques
are multiplexing protocols that allow
more than a pair of transceivers
to share a common medium
i.e., the simultaneous use of a
channel by more than one user
Allocation of resources
not defined a priori
not necessarily fixed
Each users signal must be kept
uniquely distinguishable from other
users signals, to allow private
communications on demand
Users can be separated many ways:
physically: on separate wires by
arbitrarily defined channels
established in frequency, time, or
any other variable imaginable
614
Time
615
616
Contentionless
(Scheduling Access)
Contention
(Random Access)
CDMA
617
Fixed
Assigned
Demand
Assigned
Repeated Random
Access
Random Access
w/reservation
FDMA
TDMA
Polling
Token Passing
ALOHA
Slotted ALOHA
Implicit
Explicit
Access (DAMA)
Uses dynamic
assignment protocol
(allocates resources on
request)
Random Access Multiple
Access (RAMA)
Hybrid Multiple
Accesses
FDMA - 2
FDMA - 1
Department of Communications Engineering
B
FRAME
619
620
FDMA - 3
FDMA - 4
Channel
2
MHz
Bs
Let
Ndata = number of data channel
Nctl = number of control channel
Total Bandwidth
Bs N data Bc N ctl Bc 2 Bg
N s , or N N data N ctl
N Ns
N data Bc Bs
Bs 2 Bg
621
N ch / cluster
t number of calls per hour
N
N user
number of calls/hour/cell
average # of calls/user/hour
1
Bs
sytem bandwidth
N data / cluster
# of data channel/cluster
chls/MHz/km 2
Bs N Acell
sytem BW Acluster
Guard Bands
Bg
Bs
N s Bc Bg
Channel
1
622
FDMA
FDMA Capacity
TDMA - 1
FDMA - 5
Department of Communications Engineering
Average number of
users per hour per cell
Spectral Efficiency
N data / cell
N calls
Bc
Bs 2 Bg
N data / cluster
N
We can also determine the # of control channels per cluster of
cell in a similar manner
Bs N s Bc 2 Bg
Number of Channels
N ch / cluster
Bc
N
Number of channels/cell
N ch / cell ch / cluster
N
Number of data channels/cluster N data / cluster N ch / cluster N ctl / cluster
Channel
Ns
......
Bc
Bg
Number of channels/cluster
Channel
2
......
Bc
Bs
Channel
Ns
MHz
623
624
TDMA - 2
TDMA - 3
TDMA/FDD
Control Bits
Information Data
Trail Bits
Sync. Bits
Trail Bits
Slot N
Information Data
Guard Bits
Forward and Reverse channels are duplexed within time domain (TDD) or
frequency domain (FDD)
Slots contain data, error check, guard, synchronization training, and control
bits
TDMA transmits data in a buffer-and-burst technique and hence
transmission is not continuous
low battery consumption is achieved, and simplification of handoff
process is achievable
Transmission from users are interlaced into cyclic time structure
TDMA requires very high data rate compared to FDMA and hence
equalization is not required
Prof. Okey Ugweje
625
TDMA - 4
626
TDMA - 5
TDMA Operation
TDMA Systems
TDMA can operate in wideband or narrowband
Wideband TDMA (W-TDMA)
entire freq spectrum is available to any individual user
627
628
TDMA - 6
TDMA - 7
N u Bs 2 Bg
, for N-TDMA
B
c
Tf
Preamble
T1
T2
......
(N-1)slot
Nslot
TNslot
sec
N cell
N u N slot
N
N N slot
u
sf N
N cell
Trailer
629
TDMA - 8
630
TDMA - 9
bOH N r br N t bp N t bg N r bg
where
Tf
100%
p t
Tf
p t
Tf
Ld
,
Ls
Ld Bs 2 Bg
, for N-TDMA
Ls
Bs
for W-TDMA
TDMA Capacity
Frame efficiency
b
f 1 OH
bT
T frame
Rb
Tslot
631
Ttraffic
T
R
f frame f b
Tslot
Tslot
Rb
Federal University of Technology, Minna
632
TDMA - 10
TDMA - 11
Advantages:
No inter-modulation impairment
Since TDMA uses one carrier at a time
No interference from other simultaneous transmissions
TDMAs technology separates users in time ensuring that they will not
experience interference from other simultaneous transmissions
Flexibility
TDMA can be easily adapted for the transmission of data or voice
Variable rates
TDMA offers the ability to carry data rates of 64 kbps to 120 Mbps
(expandable in multiples of 64 kbps)
This enables operators to offer PCS (fax, voice-band data, and SMS,
etc.), as well as bandwidth-intensive applications multimedia and
videoconferencing
Bandwidth efficient protocol
TDMA uses bandwidth more effectively because no frequency guard
bands are required between channels
Low power consumption
since transmission is bursty and non-continuous
i.e, TDMA provides the user with extended battery life and talk time since
the mobile is only transmitting a portion of the time (from 1/3 to 1/10)
during conversations
Guard time between time slots may be used to accommodate
clock instability
delay spread
transmission (or propagation) delays and pulse spreading
633
TDMA - 12
Department of Communications Engineering
Disadvantage
In TDMA, each user has a predefined time slot. However, users roaming
from one cell to another are not allotted a time slot
Thus, if all the time slots in the next cell are already occupied, a call
might well be disconnected
Likewise, if all the time slots in the cell in which a user happens to be in are
already occupied, a user will not receive a dial tone
TDMA is subjected to multipath distortion because of its sensitivity to timing
Even at thousandths of seconds, these multipath signals cause problems
Overall TDMA is more complex and costly compared to FDMA
Prof. Okey Ugweje
634
635
636
CDMA
Department of Communications Engineering
637
638
Principles
English
OF
CDMA
Arabic
English
Major
Hindu
639
640
Characteristic of DS/CDMA
641
Characteristic of DS/CDMA
642
In Summary
643
644
Advantages of CDMA
Advantages of CDMA
Advantages of CDMA
646
Disadvantages of CDMA
9.Enhanced privacy
CDMA signals resistant to interception or jamming
10.Soft Capacity
Because in CDMA all the traffic channels share a single radio channel,
we can add one additional user so the voice quality is just slightly
degraded
11.Coexistence
Both systems, analog and CDMA can operate in two different spectra,
with no interference at all
12.Simplified system planning through the use of the same frequency in
every sector of every cell
Improved coverage characteristics, allowing for the possibility of fewer
cell sites
13.Increased talk time for portables
14.Bandwidth on demand
647
648
Disadvantages of CDMA
Although the cross-correlation between codes A and B is low, the correlation between
the received signal from the interfering Rx and code A can be higher than the
correlation between the received signal from the intended Rx and code A
In CDMA, stronger received signal levels raise the noise floor at the base station
demodulators for the weaker signals, thereby decreasing the probability that weaker
signals will be received
The result is that proper data detection is not possible
IS-95 (cdmaOne)
649
CDMA2000
Prof. Okey Ugweje
CDMA Performance - 1
CDMA Performance - 2
CDMA Transmitter
Data signal
dk(t)
t iTb
d k t ski
ski PTb t iTb
i
Tb i
ak(t)dk(t)
Baseband
BPF
Modulator
Transmitted Signal
xk(t)
PN Code
Generator
Acos ct
Chip Clock
t lTc
ak t akl
akl PTc t lTc
l
Tc l
Tc
Tc
ak(t)
K = number of users
dk = kth users baseband data sequence with amplitude 1
ak = kth users spreading code sequence with amplitude 1
650
651
t iTb lTc
sk (t ) Ac ski akl
cos 2 f c t
Tc
l
i
Prof. Okey Ugweje
652
CDMA Performance - 3
CDMA Performance - 4
yk (t ) h s t k d
2 Pk kl ak t - k d k t - k cos c t k t - kl e j kl d
L
l 1
L
2 Pk kl ak t - kl d k t - kl cos c t kl
2E
or Pk s
Ts
l 1
where
kl k kl c kl Asynchronism
Let L be the number of resolvable paths which is
assumed to satisfy the condition
T
L m 1
Tc
hk (t ) kl t kl e j kl
L
channel output is
l 1
653
CDMA Performance - 5
CDMA Performance - 6
CDMA Receiver
Channel
Transmitter
dk t
ak t
Acos (c t+ k )
n (t)
PN signal
Generator
r(t)
T
X
()dt
a k (t-)
rt
s kl (t)
Acos (c t+ k )
Receiver
Demodulator
y t
2 Pk cos ( c t k )
Prof. Okey Ugweje
654
T
0 b dt
Decision
Device
skl
ak (t Td )
655
656
CDMA Performance - 7
CDMA Performance - 8
( i 1)Tb
z1 iT
n( t )
d K (t)
a K (t) cos (c t+ K )
+
n( t )
r (t )
T
X
()dt
sk (t)
z1 0 b r t a1 t cos 2 f c t dt
a (t-)
A c cos (c t+ k )
Substituting
K
k 1 l 1
rk (t ) yk t n(t )
0 b n t a1 t cos c t dt
k 1
K
r t a1 t cos 2 f c t dt
2 Pk kl ak t - kl d k t - kl cos 2 f c t kl n(t )
k 1 l 1
657
658
Module 6
Spread Spectrum (SS)
What is Spread Spectrum?
Significance of Spreading
Basic Characteristics of SS System
Classifications/ Benefits/Applications of Spread Spectrum
Direct Sequence Spread Spectrum
Summary of Direct Sequence Techniques
Frequency Hopped Spread Spectrum
Direct Sequence vs. Frequency Hopping
659
660
Spreading Action
At the transmitter, the baseband signal m(t), is usually
spread by a pseudo-noise (PN) code sequence p(t)
Spreading is achieved by modulating the original
signal with a pseudo-random code sequence p(t)
The code sequence p(t) is independent of the data
sequence m(t)
661
Significance of Spreading - 1
Despreading
At the receiver, the received signal r(t) is despread by the
same amount
C B log 2 1
N
B
Spread Bandwidth
ss
Information Bandwidth B
662
663
664
Significance of Spreading - 2
665
666
667
668
Multiple-access capability
SS systems are used for random and multiple
access systems
Users can start their transmission at an arbitrary
time without worrying about channel saturation
Multipath protection
SS implies a reduction of multipath effects, hence a
reduction in fading
i.e., high time resolution is attained by the correlation
detection of wide-band signals
669
670
Secure communications
SS systems achieves privacy due to unknown
random codes
Since code is unknown to a hostile user,
detection is difficult
Cryptographic capabilities result when the data
cannot be distinguished from the carrier to an
unauthorized observer
In this case, SS carrier is like a key in a cipher
system
A system using indistinguishable data and SS
carrier modulation is a form of privacy system
671
672
Definition:
K = number of users, k = 1, 2, , K
m(t) = user data signal with bit duration, Tb
p(t) = spreading code sequence (pulse or symbol of the PN
code) or chip with duration Tc
Note that Tc << Tb
DS-SS Transmitter
Narrowband
Data In
DS-SS
Modulation
Multipath
Channel
Narrowband
Data Out
m(t)
Spreading
Process
Data Bits
m(t)
Spreading
Process
Data Bits
m(t)
Tb
+1
Spread Signal
s(t)
-1
p(t)
+1
Spread Signal
s(t)
chip
-1
PN Code Sequence
p(t)
1 1 0 1 1 0 1 0 0 0 1 0 1 0 0 1 0
m(t) x p(t)
+1
Gp
Diversity
Receiver
673
Tb Rc Bss
Tc Rb 2 Rb
-1
1 1 0 1 1 0 1 0 1 1 0 1 0 1 1 0 0
674
m(t)
-V
+1
Tc
0 0
m(t) x p(t)
1
1 0
Code Length
+V
-V
Baseband
BPF
Sss(t)
Transmitted
Signal
PN Code
Generator
IS-95
LO @ fc
Chip Clock
T 12288
106
.
Gp b =
Tc
9.6x103
128
Tc
Message
Processing Gain
chip
p(t)
-1
Tb
+V
Tb
Gp
sss (t )
675
2 Es
m(t ) p (t ) cos 2 f c t
Ts
Tb G pTc
f c
1
;
Tc
Tb
Tc
676
DS-SS Receiver
y t
2 P cos (c t )
Tb
0 dt
Decision
Device
p(t Td )
677
678
m(t )
679
p( t )
2 P cos( c t )
680
r (t )
m t
681
682
683
684
Processing Gain
FH does not spread the signal no processing gain from spreading
Power Usage
FH requires more power to achieve same SNR compared to DS
Synchronization
Communication in FH is more difficult to synchronize compared to the DS
since both time and fc need to be in tune
In DS, only the timing of the chips needs to be synchronized since the
carrier fc is fixed
Latency Time
FH spend more time to search the signal to lock to it (longer latency time)
DS radio can lock-in the chip sequence in just a few bits
Usually, to make the initial synchronization possible, the hopper will park
at a fixed fc before hopping. If the jammer happens to locate at the same fc
as the parking fc, the hopper will not be able to hop at all!
And once it hops, it will be very difficult, if not impossible to re-synchronize
if the Rx ever lost sync
685
Potable Comparison
Direct Sequence
Easy and Simple
Use Lower Power
Short Latency Time
Quick Lock-In
Short Indoor Range
Low Data Rate
Frequency Hopper
Complicated
Use Higher Power
Long Latency Time
Slow Lock-In
Long Indoor Range
High Data Rate
Better for multipath channel
Less susceptible to
jamming
687
686