Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
DEPARTMENT OF ECE
Em
Ec , where E m = peak amplitude of modulating signal voltage
DEPARTMENT OF ECE
DEPARTMENT OF ECE
DEPARTMENT OF ECE
25. What is the main difference b/w frequency modulation and phase modulation?
Frequency modulation: It is the form of angle modulation in which instantaneous
frequency fI(t) is varied linearly with the base band signal m(t)
Where,fI (t)=fc+kf m(t) fc unmodulated carrier
kf Frequency sensitivity of the modulator
m(t)-Base band signal
Integrating above equation with respect to time and multiplying with 2
i(t)= 2fc t+2Kf m(t) dt
s(t)=Ac cos i (t)
s(t)= Ac cos(2fc t+2Kf m(t) dt)
Phase modulation:
It is that form of Angle modulation in which angle i(t) is varied linearly with
the base band signal m(t) as as shown by
i(t)= 2fc t+Kpm(t)
s(t)=Ac cos i (t)
s(t)= Ac cos(2fc t+Kpm(t)
26. Determine the modulation depth of FM system with a maximum frequency
deviation of 75 KHz and the maximum modulating frequency of 10 KHz
=f /fM
3
3
=75 x10 /10 x10
=7.5
27. Write down the expression for FM signal with sinusoidal modulation
Frequency modulation: It is the form of angle modulation in which instantaneous
frequency fI(t) is varied linearly with the base band signal m(t)
Where,fI (t)=fc+kf m(t) fc unmodulated carrier
kf Frequency sensitivity of the modulator
m(t)-Base band signal
Integrating above equation with respect to time and multiplying with 2
i(t)= 2fc t+2Kf m(t) dt
s(t)=Ac cos i (t)
s(t)= Ac cos(2fc t+2Kf m(t) dt)
28. Define instantaneous frequency deviation.
The instantaneous frequency deviation is the instantaneous change in the frequency of the
carrier and is defined as the first derivative of the instantaneous phase deviation.
DEPARTMENT OF ECE
PART B:
1. Obtain AM wave equation and explain each term with the help of frequency
spectrum and also obtain an expression for its bandwidth?
In amplitude modulation, amplitude of the carrier wave is changed according to the
amplitude of the signal. The technique is very much used in the transmission of radio
signals.
4 shows the process of amplitude modulation.
Note that
Only amplitude of the carrier is varied while its frequency and phase remain unchanged.
Whenthere is no signal, the amplitude of the carrier is equal to the unmodulated
amplitude. When signal is present, the amplitude of the carrier changes in accordance
with the instantaneous value of the signal.
During positive cycle of the signal, the amplitude of the carrier increases to the sum of
the amplitudes of the carrier and the signal (E + Em)
(iv) During negative cycle of the signal, the amplitude of the carrier decreases and
becomes equal to the difference of the amplitudes of the carrier and the signal.
DEPARTMENT OF ECE
DEPARTMENT OF ECE
Figure 6 shows frequency spectrum of an A.M. wave which is equivalent to three sine
waves as shown. Bandwidth (B.W.) of an A.M. wave
7
DEPARTMENT OF ECE
DEPARTMENT OF ECE
Hence m depends on the amplitude of both the signal and the carrier.
The value of m decides the strength of the modulated wave and hence that of the signal.
When rn = 1(100%) the signal will be strongest, perfect and clear. In the case of
overmodulation (m = 150%) the modulated wave will be clipped..off arid huge distortion
will occur in the reception. Hence, the ideal value of modulation is I or 100%.
3) Derive AM power and obtain current relation between amplitude modulated and
unmodulated wave.
Ans. We know that the power contained in a voltage wave is proportional to the square of
its amplitude (V2). Note that an A.M. wave is a voltage wave.
The total power contained in an A.M. wave will be the sum of the powers contained in
the three parts of the wave.
Considering root mean square (R.M.S) values
10
DEPARTMENT OF ECE
DEPARTMENT OF ECE
Note that power in both the sidebands is equal and at m = 1, the sidebands contain
1/3rd (33%) power and the carrier contains 66% of the total power. Hence bands
carry half the carrier power of the wave. (d) Total power contained in two side bands = 1/3 = 33%
Total power contained in each side band = 1/6 = 16.5%. V
As the signal is contained only in the sidebands, useful power is contained in
sidebands. This is the reason, that we are interested only in the sidebands. The power
in the sidebands go on increasing with the increase in the modulating index (m).
CURRENT RELATION:
Let l = Unmodulated current (carrier current)
1T = Modulated current of an A.M. wave (both in R.M.S. values) and R = Resistance
through which current flows. Assume it to be the same in both the cases.
11
DEPARTMENT OF ECE
double sideband with supressed carrier (DSBSC) and (c) shows single
sideband transmission with supressed carrier (SSBSC). It can be noted that (c) requires
only half the bandwidth (BW) as required to (a) and (b).
(b) Evolution of SSBAM : The evolution of SSB amplitude modulation may be done in
following steps:
(i) The carrier contains no power and all the power is contained in the sidebands.
(ii) Therefore there is no need to transmit carrier. V.
(iii) The modulated wave contains three frequencies f f + f fc - fm
(iv) Two sidebands are exact images of each other; since each is affected by changes in
the modulating voltage via the exponent m EJ2. Recall that m is the
modulation index and E the carrier voltage.
(v) Therefore all the information may be transmitted by the use of one sideband only, as
the carrier is superfluous and the other sideband is redundant.
(vi) If the carrier is supressed only the two sidebands power remains and which is
equal to = Pc.m2/4 about 66% saving will be done. Recall that is the carrier
power.
(vii) It one of the sidebands is also supressed, the remaining power is Pc. m2/4 a
further saving of 50% power will be achieved.
5) Write down the expression for FM and PM waves and draw their
DEPARTMENT OF ECE
DEPARTMENT OF ECE
rather than absolute phase .It combines two basic operations namely ,differential
encoding and phase shift keying.
4. Define QPSK
.
QPSK: The two successive bits in a bit stream ar combined together to form a message
and each message is represented by a distinct value of phase shift of the carrier. Each
symbol or message contains two bits so the symbol duration Ts =2Tb.These symbols are
transmitted by the same carrier at four different phase shifts as shown below.
Symbol
Phase
00
-135
01
-45
10
135
11
45
5. What is a constellation diagram? Draw the constellation diagram and phasor
diagram for BPSK.
Constellation diagram is used to show the relative positions of the peaks of the
phasors.
Phasor diagram:
6. Draw the phasor diagram of QPSK signal.
14
constellation diagram
DEPARTMENT OF ECE
15
fb / 3
fb / 3
fb / 4
DEPARTMENT OF ECE
3.33 MHz
3.33 MHz
2.5 MHz
For a given energy per bit to noise power density ratio, probability of error for
non-coherent FSK is greater than that of coherent FSK.
16
DEPARTMENT OF ECE
17
DEPARTMENT OF ECE
18
DEPARTMENT OF ECE
Here, it may be noted that unlike ASK transmission, the P5K transmission is polar.
Polarity changes in the binary signal b(t) are used to produce 1800 changes in the carrier
phase. This may be achieved by using double sideband, suppressed carrier modulation
(DSBSC), with binary signal as a polar NRZ waveform. The carrier amplitude is
multiplied by 1, pulsed waveform. When the binary signal b(t) is + 1, the carrier
sinusoid is unchanged, and when b(t) is -1, the carrier sinusoid is changed in phase by
180. Binary phase shift keying is also known as Phase reversal keying (PRK).
DEPARTMENT OF ECE
transmission of binary data as shown in figure 34. These two frequency tones are well
within the 300 to 3400 Hz band width associated with telephone system.
Another set of frequencies are required to permit simultaneous transmit and receive
operation with a modem, known as full duplex operation. A frequency 2025 Hz is used to
represent a binary 0 or space and frequency 2225 Hz used to represent binary 1 or
mark. These two frequency tones are spaced far enough from the other frequencies (1070
Hz and 1270 Hz) as shown in Fig. 35. To distinguish between these
two sets of frequencies selective filters are used. The frequency set consists of 1070 and
1270 Hz tones is used for transmitting and frequency set of 2025 and 2225 Hz tones used
for receiving purposes.
4) Compare the difference between ASK, FSK, PSK.
20
DEPARTMENT OF ECE
21
DEPARTMENT OF ECE
The number of amplitude shifts is fewer than the number of the phase shifts.
Because amplitude changes are susceptible to noise and require greater shift
difference than do phase changes, the number of phase changes used by
QAM system is always large the number of amplitude shifts.
The Quadrature Amplitude Modulation (QAM) is called Quadrature
Carrier
Multiplexing
(QCM).
Further, this scheme enables two DSBSC (Double side band with supressed
carrier) modulated signals topy the same B.W. and therefore it allows the
two signals separation at the receiver; therefore, it is also known as Band
width
conservation
Scheme
(BCS).
(i) QAM Modulator Transmitter. It consists of two separate balanced
modulators, which are supplied with two carrier waves of the sme
frequency
and
differing
by
quadrature
(i.e.
by
900).
The output of the balanced modulators is given to an circuit, and we get the
output (multiplexed) signal, which is transmitted. This signal consists of in
phase
and
the
quadrature
phase
components.
QAM detector/Receiver. The transmitted (multiplexed) signal is applied
simultaneously to two separate coherent detectors, which are supplied with
two local carriers of same frequency but differing in phase by 900. The
outputs of the detectors are given to low pass filters (LPF) which gives the
two
original
massage
signals.
22
DEPARTMENT OF ECE
For satisfactory operation of the receiver, the phase and frequency of the
local oscillators at transmission and reception should be coherent (or
aligned)
to
each
other.
(b) Application. The QAM system is used exclusively for digital modulation
of analog carriers in data modems (modulation-demodulation) to convey
data through public telephone network (PTN). The QAM is also used for
digital satellite communication systems and in colour televisions.
DEPARTMENT OF ECE
2. Natural Sampling
3. Flat-top Sampling
3. What is Aliasing or Foldover?
When the continuous time signal g(t) is sampled at the rate less than Nyquist rate,
frequencies higher than W takes on the identity of the low frequencies in sampled signal
spectrum . This is called aliasing.
The use of a low pass reconstruction filter, with its pass band extending from W
to W will not yield an undistorted version of the original signal. Aliasing can be reduced
by sampling at a rate higher than Nyquist rate.
In other words, Aliasing occurs when the signal is sampled at a rate less than Nyguist
rate (2W samples/ sec). It is prevented by using
Guard Bands
Pre-alias Filter
4. Define Nyquist rate and Nyquist interval.
According to sampling theorem, a continuous time signal can be completely
represented in its samples and recovered back if the sampling frequency is fS 2W. Here
fS is sampling frequency and W is the highest frequency component of the signal.
Nyquist rate: The minimum sampling rate of 2W samples per second is called Nyquist
rate.
i.e., fS = 2W Nyquist rate
Nyquist interval: Reciprocal of 2W is called the Nyquist interval.
Nyquist interval = 1/2W
5. Give the practical procedure for the sampling of a signal whose spectrum is not
strictly band limited.
i) Prior to sampling, a low pass pre-alias filter ( anti-alias filter) of high enough
order is used to attenuate those frequency components of the signal that do not contribute
significantly to the information content of the signal.
ii) The filtered signal is sampled at a rate slightly higher than the Nyquist rate 2W,
where W is the cutoff frequency of the pre-alias filter.
6. Define aliasing error. Give the upper bound for the aliasing error.
Let {g(n/fS)} denote the sequence obtained by sampling an arbitrary signal g(t) at
the rate fS samples per second. Let gi(t) denote the signal reconstructed from this
sequence by interpolation;
That is, gi(t)= g( ) sinc ( fSt - n)
The absolute error = | g(t) gi(t) | is called the aliasing error.
The aliasing error is bounded as
2 | G(f) | df
7. Given the signal m(t)=10 cos (2000 t) cos (8000 t ) , what is the minimum
sampling rate based on the low pass uniform sampling theorem?
The equation shows that m(t) is generated by multiplication of two signals. We
know that cosAcosB = [cos (A-B)+cos (A+B)]
There fore, m(t) = (10/2) [ cos (6000 t) + cos (10000 t)]
The two frequencies in m(t) are 3000 Hz and 5000 Hz and the highest frequency present
in m(t) is 5000 Hz.
Minimum sampling rate is 2 (5000) = 10000 samples per second.
8. What is Inter symbol Interference (ISI) ?
24
DEPARTMENT OF ECE
DEPARTMENT OF ECE
| H(f)| = T 1 sinc(fT)
15. What is PPM?
It is the process in which the position of a pulse relative to its unmodulated time of
occurrence is varied in accordance with message signals.
16. What is PWM?
It is the process in which the samples of message signal are used to vary the duration
of individual pulses in the carrier.
17. What is Quantization and sampling?
Quantization: It is the process in which the analog sample of the original signal is
converted into a digital form.
Sampling: It is the process in which the original analog signal is converted into a
discrete time and continuous amplitude signal
18. Classify Quantizers.
Uniform Quanatizer Representation levels are uniformly spaced
Non-Uniform Quanatizer Representation levels are non-uniformly spaced
19. What is Quantization Noise?
The difference between the output analog sample and the discrete output quantized
signal gives raise to an error called Quantization Noise.
20. What are the limitations of delta modulation?
The major limitations of delta modulation are:
a) Slope overload error
b) Granular noise
21. What is Slope- Overload Distortion?
When the message signal varies steeply, the quantized approximation cannot follow
the message signal and this results in slope-overload distortion. It can be reduced by
increasing the step-size. To minimize the distortion, we need to have
/ Ts max | d(x(t)) / dt |
22. What is Granular Noise?
When the input waveform has a flat segment, then the step-size is larger
when compared to the input. Therefore the approximation hunts around the segment
resulting in Granular noise. This noise can be reduced by decreasing the step-size.
23. What is meant by hunting with reference to delta modulation?
The up & down movement of the approximated signal m (t) above & below the input
signal m (t) because of the step-wise approach during delta modulation is called hunting.
24. What is the principle of adaptive delta modulation?
The principle underlying ADM:
If successive errors are of opposite polarity, then the delta modulator is operating
in its granular mode. In this case the step size is reduced.
If successive errors are of same polarity, then the delta modulator is operating in
its slope overload mode. In this case the step size is increased.
25.State the difference between DPCM and DM.
Parameter
26
DPCM
DM
DEPARTMENT OF ECE
Number of Bits
Bandwidth
of Bandwidth
required
transmission channel.
lesser than PCM.
is Lower
required.
bandwidth
is
PART B
1) State and prove Nyquisit theorem of sampling for low pass signals.
27
DEPARTMENT OF ECE
Ans. (a) Sampling theorem (Nyquist Theorem) : If more no. of samples are taken, the
information can be reproduced correctly. The other side is also correct, i.e., if fewer
samples of one information are taken in between other information can also be sent. This
is similar as in our example in which one person is reading temperature of several
thermometers lesser the time the person spends reading one thermometer, more time he
has left to read other thermometers, or we can say to get other information.
Here, Nyquist theorem is to help, it says : In order to convey an information completely.
The minimum sampling frequency of a pulse modulated system, should be equal to (or
more than twice) the highest signal frequency. Mathematically.
(b) Proof: The Fig. 6 (a) shows continuous time signal x(t). The fig (b) shows its
frequency spectrum. The fig (c) shows impulse train. The sampling of x(t) at the rate of
f5 Hz (samples) per second can be done by multiplying it with the impulse train. The
impulse train consists of impulses repeating periodically every T (sampling time)
seconds, where T5 = 1/f5. The Fig. (d) shows the resulted sampled signal. The fig. (e)
shows spectrum of the sampled signal.
28
29
DEPARTMENT OF ECE
DEPARTMENT OF ECE
It shows that a signal where spectrum is band limited to fm Hz (i.e. the signal has
no frequency components beyond fm or it has maximum frequency fm) can be
reconstructed from its samples taken at the rate off5> 2fm Hz.
This proves the sampling theorem.
2) What are various pulse modulation techniques. Compare them.
Ans. There are 3 pulse modulation techniques:
(1) Pulse amplitude modulation (PAM)
(2) Pulse width modulation (PWM)
(3) Pulse modulation
30
DEPARTMENT OF ECE
.
4. Explain various methods of analog and digital companding techniques.
(a) Analog Companding.
(b) Digital Companding
(i) It is the combined process of compressing and Expanding used for
improving the dynamic range of signal and also to increase the SNR of low level
signals.
(ii) Analog companding and description
A law and law companding
(iii) Digital companding with one example
. 5.Explain the procedure of PCM generation and detection with its block diagram.
31
DEPARTMENT OF ECE
The binary digits are then transformed to a digital signal by using one of the
line coding techniques. Fig shows the result of the pulse code modulation of
the original signal encoded finally into a unipolar signal. Only the first three
sampled values are shown.
PCM is made up of four separate processes
- PAM
- Quantization
- Binary encoding
- Line coding.
32
DEPARTMENT OF ECE
DEPARTMENT OF ECE
DEPARTMENT OF ECE
PART B
1) What is X.21? What are the various signals provided by it?
Ans. X.21 OverviewX.21 is a state-driven protocol running full duplex at
9600 bps to 64 Kbps with subscriber networks. It is a circuit-switching
Protocol using Synchronous ASCII with odd parity to connect and
disconnect a subscriber to the public- switching network.
The data-transfer phase is transparent to the network. Any data can be
transferred through the network after Call Establishment is made
successfully via the X. 21 protocol. The call control phases which are used
were defined in the CCITT (now ITU) 1988 Blue Book Recommendations
X.l-X.32.
Signals provided: The signals of the X.21 interface are presented on a
15pin connector defined by ISO Document 4903. The electrical
characteristics are defined in CCITT Recommendations X.26 and X.27,
which refer to CCITT Recommendations V.10 and V.11.
X.21 provides eight signals
Signal Ground (G): This provides reference for the logic states against the
other circuits. This signal may be connected to the protective ground (earth)
DTE Common Return (Ga): Used only in unbalanced-type configurations
(X.26), this signal provides reference ground for receiver in the DCL
interface.
Transmit (T): This carries the binary signals which carry data from the DTE
to the I)CL. this circuit can be used in data-transfer phases or in call-control
phases from the DIE to DCL (during Call Connect or Call Disconnect).
Receive (R): This carries the binary signals from DCE to DTE. It is used
during the data transfer or Call Connect/Call Disconnect phases.
35
DEPARTMENT OF ECE
Control (C): Controlled by the DTE to indicate to the DCE the meaning of
the data sent on the transmit circuit. This circuit must be ON during datatransfer phase and can be ON or OFF during call-control phases, as defined
by the protocol.
Indication (I): The DCE controls this circuit to indicate to the DIE the type
of data sent on the Receive line. During data phase, this circuit must be ON
and it can be ON or OFF during call control, as defined by the protocol.
Signal Element Timing (S): This provides the DTE or DCE with timing
information for sampling the Receive line or Transmit line. The DTE
samples at the correct instant to determine if a binary I or 0 is being sent by
the DCL. The DCE samples to accurately recover signals at the correct
instant. This signal is always ON.
Byte Timing (B): This circuit is normally ON and provides the DTE with 8
bit byte element timing. The circuit transitions to OFF when the Signals
Element Timing circuit samples the last bit of an 8-bit byte. Call-control
characters must align with the 13 lead during call-control phases. During
data-transfer phase, the communicating devices bilaterally agree to use the B
lead to define the end of each transmitted or received byte. The C and I leads
then only monitor and record changes in this condition when the 13 lead
changes from OFF to ON, although the C and I leads may be altered by the
transitions on the S lead. This lead is frequently not used.
2) What is a modem? Explain the types.
Ans. A modem provides the communication interface. It transports device
protocols transparently over the network through a serial interface. A modem
adapts the machine to communicate over various networks in order to gain
access to the machine including
1. PSTN-a wire line dial-up network
2. GSM-.a wireless dial-up network
3. GPRS a wireless always on network.
Moderns are traditionally associated with PCs in the form of box/PC
modems,
However this technology is not suited to non-PC equipment or machines,
which have specialized needs
1. Sizethere is little space within many embedded devices for a modem
box
36
DEPARTMENT OF ECE
2. Power consumption- some devices are battery powered and need low
power modems
3. Environmentmachines can be deployed and need wide temperature
range.
4. Integration modems need to be integrated within the machine and not
external Modems provide remote access to machines in the field to eliminate
unnecessary site visits and provide fast access to information in the machine.
However, integrating moderns.
1. Moderns are black art products, surrounded by complex compliance and
regulatory issues. Designing your own modem solutions requires specialized
skills. Using off-the-shelf modems enables designers to focus on their core
application strengths and not be drawn into solving issues that are not related
to core competency yielding potentially unreliable products.
M2M moderns are embedded with the machine and transport higher level
protocols between the machine and central location via the network.
2. Point to Point polled networks where proprietary or industry specific
protocols to communicate with central servers.
3. TCP/IP enabled remote machines such as Embedded PCs, where modems
provide the physical network connectivity.
M2M Modems are Al-command compatible at the serial
interface to the machine and common between many modems.
4. Driven and controlled by the remote machine processor using industry
standard Commands.
5. Fast time to market.
37
DEPARTMENT OF ECE
Ans.
DEPARTMENT OF ECE
The byte to be transmitted is first stored in a shift register. Then these bits
are shifted from MSB to LSB bit by bit in synchronization with the clock.
Bits are shifted right by one position per clock cycle. The bit which falls out
of the shift register is transmitted. Hence LSB is transmitted first. For serial
transmission only one wire is needed between the transmitter and the
receiver. Hence serial transmission is preferred for long distance data
communication. In serial transmission only one bit is transmitted per clock
cycle. It requires a time corresponding to 8 clock cycles to transmit one byte.
The time can be reduced by increasing the clock frequency. It is used for
computer to computer communication specially long distance.
Advantages of serial transmissionCommunication.
I. Only one wire is required
2. Reduction in cost due to less number of conductors.
Disadvantages
1. The speed of data transfer is low.
2. To increase the speed of data transfer, it is necessary to increase the clock
frequency
4) Explain with pin diagrams of EIA-449 interface.
Ans. EIA 449 interface Standard in case of EIA 232 the data rate is
restricted to 20kbps and the cable length to 50 feet. The EIA and ITU-T have
introduced the EIA 449 standard for users who require speed and distance.
Mechanical Specifications
1. The mechanical specification of EIA-449 defines a combination of two
connectors, one with 37 pins and with 9 pins, for a combined 46 pins as
shown in Fig.
39
DEPARTMENT OF ECE
2. The functions related to secondary channel have been removed from the
DB 37 connector since they are very rarely used.
3. The EIA separates the secondary functions out and has puts them in the
second 9 pin connector (DB-9). In this way a second channel is available to
systems that need it.
4. To maintain compatibility with EIA-232, EIA-449 defines two categories
of pins to be used in exchanging data, control and timing information.
5. The category I pins are those pins whose functions are compatible with
those of
EIA-232. Category II pins are those that have no equivalent in
EIA-232 as shown in Table 1.
40
DEPARTMENT OF ECE
DEPARTMENT OF ECE
technique is called redundancy because the extra bits are redundant to the
information. They are discarded as soon as the accuracy of transmission has
been determined.
The following fig. shows the process of using redundant bits to check the
accuracy of data unit.
Once the data stream has been generated. It passes through a device that
analyzes it and adds on appropriately coded redundancy check. The receiver
puts the entire stream through a checking function. If the received bit stream
passes the checking criteria, the data portion of the data unit is accepted and
redundant bits are discarded.
The most common and least expensive mechanism for error detection is the
parity check.
Parity checking can be simple or two-dimensional.
DEPARTMENT OF ECE
Transmission Mode
Adding the no. of is giving us 3 an odd number. Before transmitting we pass
the data unit through a parity generator. The parity generator counts the is
and appends the parity bit to the end. The total no. of is now 4, an even
number. The system now transmits the entire expanded unit across the
network link. When it reaches its destination, the receiver puts all 8 bits
through an even parity checking function. If the receiver sees 11000011, it
counts four is, an even number and the data unit passes. But, if instead of
11000011, the receiver sees 11001011 then when the parity checker counts
the Is it gets 5 an odd number. The receiver knows that an error has been
introduced into the data somewhere and therefore rejects the whole unit.
Two Dimensional Parity Check
A better approach is the two dimensional parity check in this method, a
block of bits is organised in a table (rows and columns). First we calculate
the parity bit for each data unit. Then we organise them into table. Shows in
fig we have four data units shown in four rows and eight columns. We then
calculate the parity hit for each column and create a new row of 8 bits. They
are the parity bits for the whole block. The first parity bit in the fifth row is
calculated based on all first bits, the second parity bit is calculated based on
all second bits, and so on. We then attach the 8 parity bits to the original data
and sent them to the receiver.
43
DEPARTMENT OF ECE
Cyclic Redundancy
check method is most powerful mechanism of error detecting. Unlike the
parity check which is based on addition, CRC is based on binary division.
In CRC, instead of adding bits to achieve a desired parity, a sequence of
redundant bits, called the CRC or the CRC remainder, is appended to the end
of a data unit so that the resulting data unit becomes exactly divisible by a
second predetermined binary number. At its destination the incoming data
unit is divided by the same number. If at this step there is no remainder, the
data unit is assumed to be intact and is therefore accepted. A remainder
indicates that the data unit has been damaged in transit and therefore must be
rejected.
The redundancy bits used by CRC are derived by dividing the data unit by a
predetermined divisor, the remainder is the CRC. A CRC must have two
qualities. It must have exactly one less bit than the divisor, and appending it
to the end of the data string must make the resulting bit sequence exactly
divisible by the divisor.
CRC generator and checker
First, a string of n 0s is appended to the data unit. The number n is less than
the number of bits in the predetermined divisor, which are n + 1 bits.
Second, the newly formed data unit is divided by the divisor, using a process
called binary division the remainder resulting from this division is the CRC.
44
DEPARTMENT OF ECE
Third, the CRC of n bits derived in step 2 replaces the appended Os at the
end of the data unit. The data unit arrives at the receiver data first followed
by the CRC. The receiver treats the whole string as a unit and divides it by
the same divisor that was used to find the CRC remainder.
If the string arrives without error, the CRC checker yields a remainder of
zero and the data unit passes. If the string has been changed in transit the
division yields a non zero remainder and the data unit does not pass.
CHECK SUM:
Checksum is the third mechanism for error detection which is also based on
the concept of redundancy.
Check sum Generator
In the sender, the check sum generator subdivides the data unit into equal
segments of n bits. These segments are added using ones complement
arithmetic in such a way
that the total is also n bits long. That total is then complemented and
appended to the and o the original data unit as redundancy bits called the
45
DEPARTMENT OF ECE
check sum field. The extended data unit is transmitted across the network.
So if the some of data segment is T, the checksum will be T.
Check sum Checker
The receiver subdivides the data unit as above and adds all segments and
complements the result. If the extended data unit is intact, the total value
found by adding the data segments and the check sum field should be zero If
the result is not zero, the packet contains an error and the receiver rejects it.
46
DEPARTMENT OF ECE
There is the practical solution for this method that is Hamming Code.
The hamming code can be applied to data units of any length and uses the
relationship between data and redundancy bits.
Suppose there are 7 bits ASCII codes which requires 4 redundancy bits that
can be added to the end of the data unit or interspersed with the original data
bits. These units are position in 1, 2, 4, arid 8 (the position is in an 11 bit
sequence that are powers of 2). We prefer these bits are r1, r2, r4 and r8.
47
DEPARTMENT OF ECE
PART-A
1. What is meant by spread spectrum?
Spread spectrum is a means of transmission in which the data of interest occupies a
bandwidth in excess of the minimum bandwidth necessary to send the data
2. What are the applications of spread spectrum?
It is used in military communications systems.
It allows the transmitter to transmit a message to a receiver without the message
being detected by a receiver for which it is not intended.
It decreases the transmitted power spectral density so that it lies well below the
thermal noise level of any unfriendly receiver.
It turns out not to be possible to conceal the transmission.
3. What is the primary advantage of spread spectrum communication?
The primary advantage of spread spectrum communication system is its ability to
reject interference whether it is the unintentional interference of another user
simultaneously attempting to transmit through the channel or the intentional interference
of a hostile transmitter attempting to jam the transmission.
4. Define Pseudo Noise sequence.
A Pseudo Noise (PN) sequence is coded sequence of 1s and 0s with
certain autocorrelation properties.
It is periodic a sequence of 1s and 0s repeats itself exactly with a known
period
PN sequence is a noise like high frequency signal. The sequence is not
truly random but it is generated by a well defined logic.
This is used in spread spectrum communication.
5. What are the properties of maximum length PN sequence?
Balance property: In each period of a maximum length sequence, the
number of 1s is always one more than the number of 0s.
Run property: Among the runs of 1s and 0s in each period of a
maximum length sequence, one half the runs are of length one, one
fourth are of length two, one eighth are of length three and so on.. as
long as these fractions represent meaningful number of runs
Correlation property: The auto correlation function of a maximum length
sequence is periodic and binary valued.
6. Define processing gain. What is the processing gain for DSSS?
It is defined as the ratio of spreaded signal bandwidth to unspreaded signal
bandwidth.
7. Define jamming margin.
It is the ratio of average interference power J and the signal power Ps.It is expressed in
dB as (jamming margin) dB=(processing gain)dB-10 log[Eb/No]min
where [Eb/No]min is the minimum bit energy to noise density ratio.
48
DEPARTMENT OF ECE
TDMA shares a single carrier frequency with several users where each user makes
use of non overlapping time slots.
DEPARTMENT OF ECE
TDMA uses different time slots for transmission and reception, thus duplexers are
not required.
16. What is DS spread spectrum?
DS spread spectrum is one in which the amplitude of an already modulated signal is AM
modulated by a very high rate NRZ binary stream of digits.
17. Define FH spread spectrum.
FH spread spectrum is an FM or FSK technique while DS is a AM or PSK technique. The
signal to be FH is usually a BFSK signal although M-ary FSK, MSK or TFM can be
employed.
18. What is meant by pseudo random noise?
The pseudo random noise is the nose which presents in the DS spread spectrum, if the DS
spread spectrum signal is V(t)=g(t)S(t)=2Psd(t)cosot. Here g(t) is a pseudo random
noise binary sequence having the values 1.
19. Write the advantages of FH over direct sequence spread spectrum.
Processing gain is more
Spread of the transmitted signal is spread sequentially rather than instantaneously
Greater transmission bandwidth and more chips per bit.
20.Compare SFH and FFH.
Slow frequency hopping -SFH
Fast frequency hopping- FFH
More than
transmitted
one
symbols
Symbol rate is higher than the hop Hop rate is higher than the symbol
rate
rate
Same carrier frequency is used to One symbol is transmitted over
transmit one or more symbols
multiple carriers in different hops
PART B
DEPARTMENT OF ECE
Note that an information bit of one inverts the spreading code bits in the
combination, while information bit of zero causes the spreading code bits to
be transmitted without inversion. The combination bit stream has the death
rate of the original spreading code sequence, so it has a wider bandwidth
than the information stream. In this example, the spreading code bit stream
is clocked t four times the information rate.
DSSS using BPSK:
Rather than represent binary data with 1 and 0, it is more convenient for our
purpose to use + I and - 1 to represent the two binary digits. In that case, a
BPSK signal can be represented as:
51
DEPARTMENT OF ECE
DEPARTMENT OF ECE
53
DEPARTMENT OF ECE
54
DEPARTMENT OF ECE
4) Explain CDMA system with its features and list out various problems
in CDMA systems.
CDMA refers to the Code Division Multiple Access. It is an alternative to
the FDMA and TDMA. Some times it is, also known as SSMA i.e. spread
spectrum multiple Access.
In CDMA more than one user is allowed to share a channel or sub channel
with the help of direct-sequence spread spectrum signals.
In CDMA, each user is given a unique code sequence or signature sequence.
This sequence allows the user to spread the information signal across the
assigned frequency band.
2. In CDMA, the users access the channel in random manner.
3 CDMA signals are spread in frequency.
CDMA works differently in the l)SSS environment. Following fig. shows
the working of CDBA in DSSS environment.
Above fig. shows a configuration in which there are n users, each user, the
data stream to be transmitted, d (t), is BPSK modulated to produce a signal
with a bandwidth of w, and then multiplied by the spreading code for that
user, c. (t). All of the signals, plus noise, are received at the receivers
55
DEPARTMENT OF ECE
antenna. Suppose that the receiver is attempting to recover the data of user 1.
The incoming signal is multiplied by the spreading code of user 1 and then
demodulated. The effect of this is to narrow the bandwidth of that portion of
the incoming signal corresponding to user 1 to the original bandwidth of the
unspread signal, which is proportional to the data rate. Because the
remainder of the incoming signal is orthogonal to the spreading code of user
1, that remainder still has the bandwidth w. Thus the unwanted signal energy
remains spread over a large bandwidth and the wanted signal is concentrated
in a narrow bandwidth. The band pass filter at the demodulator can therefore
recover the desired signal.
5.How pseudo noise sequence is generated? Explain the properties.
CELP(4 marks):
56
(8)
DEPARTMENT OF ECE
57
DEPARTMENT OF ECE
The channel bandwidth required is equal to the bit rate on the channel, if
QPSK is employed and which is equal to B = Kfb Hz.
Fig. 4 (a) TDMA system (b) Timing patterns. The higher level of each
Waveform marks the dwell time of the commutator on each switch
position.
If the K user has a continous need to transmit, TDMA systems at that stage
are very efficient. TDMA will become inefficient when the users need varies
58
DEPARTMENT OF ECE
from time to time due to the type of communication employed. Since a user
pays for the times-lot even when he fails to transmit it, since the time-slot is
wasted, an additional user could have been admitted to the network during
this wasted time.
***********************
59