Digital communication systems Vemu Institute of technology

rgaula07 105 views 192 slides May 08, 2024
Slide 1
Slide 1 of 192
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99
Slide 100
100
Slide 101
101
Slide 102
102
Slide 103
103
Slide 104
104
Slide 105
105
Slide 106
106
Slide 107
107
Slide 108
108
Slide 109
109
Slide 110
110
Slide 111
111
Slide 112
112
Slide 113
113
Slide 114
114
Slide 115
115
Slide 116
116
Slide 117
117
Slide 118
118
Slide 119
119
Slide 120
120
Slide 121
121
Slide 122
122
Slide 123
123
Slide 124
124
Slide 125
125
Slide 126
126
Slide 127
127
Slide 128
128
Slide 129
129
Slide 130
130
Slide 131
131
Slide 132
132
Slide 133
133
Slide 134
134
Slide 135
135
Slide 136
136
Slide 137
137
Slide 138
138
Slide 139
139
Slide 140
140
Slide 141
141
Slide 142
142
Slide 143
143
Slide 144
144
Slide 145
145
Slide 146
146
Slide 147
147
Slide 148
148
Slide 149
149
Slide 150
150
Slide 151
151
Slide 152
152
Slide 153
153
Slide 154
154
Slide 155
155
Slide 156
156
Slide 157
157
Slide 158
158
Slide 159
159
Slide 160
160
Slide 161
161
Slide 162
162
Slide 163
163
Slide 164
164
Slide 165
165
Slide 166
166
Slide 167
167
Slide 168
168
Slide 169
169
Slide 170
170
Slide 171
171
Slide 172
172
Slide 173
173
Slide 174
174
Slide 175
175
Slide 176
176
Slide 177
177
Slide 178
178
Slide 179
179
Slide 180
180
Slide 181
181
Slide 182
182
Slide 183
183
Slide 184
184
Slide 185
185
Slide 186
186
Slide 187
187
Slide 188
188
Slide 189
189
Slide 190
190
Slide 191
191
Slide 192
192

About This Presentation

Digital communication


Slide Content

VEMU INSTITUTE OF TECHNOLOGY
(Approved by AICTE, New Delhi & Affiliated to JNTUA, Ananthapuramu)
P.Kothakota, Puthalapattu (M), Chittoor Dist –517 112AP, India
Unit-1
Source Coding Systems
By
B SAROJA
Associate Professor
Dept. of . ECE
Department of Electronics and Communication Engineering
Digital Communication Systems

Contents
Introduction, sampling process.
Quantization, quantization noise, conditions for optimality of
quantizer, encoding.
Pulse-Code Modulation (PCM),Line codes, Differential encoding,
Regeneration, Decoding & Filtering.
Noise considerations in PCM systems.
Time-Division Multiplexing (TDM), Synchronization.
Delta modulation (DM).
Differential PCM (DPCM), Processing gain
Adaptive DPCM (ADPCM)
Comparison of the above systems.

Introduction
➢Source:analogordigital
➢Transmitter:transducer,amplifier,modulator,oscillator,
poweramp.,antenna
➢Channel:e.g.cable,opticalfibre,freespace
➢Receiver:antenna,amplifier,demodulator,oscillator,
poweramplifier,transducer
➢Recipient:e.g.person,(loud)speaker,computer
3

➢Types of information:
Voice, data, video, music, email etc.
➢Types of communication systems:
Public Switched Telephone Network
(voice,fax,modem)
Satellite systems
Radio,TV broadcasting
Cellular phones
Computer networks (LANs, WANs, WLANs)
4

Information Representation
➢Communicationsystemconvertsinformationintoelectrical
electromagnetic/opticalsignalsappropriateforthe
transmissionmedium.
➢Analogsystemsconvertanalogmessageintosignalsthatcan
propagatethroughthechannel.
➢Digitalsystemsconvertbits(digits,symbols)intosignals
•Computersnaturallygenerateinformationascharacters/bits
•Mostinformationcanbeconvertedintobits
•Analogsignalsconvertedtobitsbysamplingandquantizing(A/D
conversion)
5

WHY DIGITAL?
➢Digitaltechniquesneedtodistinguishbetweendiscrete
symbolsallowingregenerationversusamplification
➢Goodprocessingtechniquesareavailablefordigital
signals,suchasmedium.
•Datacompression(orsourcecoding)
•ErrorCorrection(orchannelcoding)(A/Dconversion)
•Equalization
•Security
➢Easytomixsignalsanddatausingdigitaltechniques
6

7

8

Information Source and Sinks
Information Source and Input Transducer:
▪The source of information can be analog or digital,
▪Analog: audio or video signal,
▪Digital: like teletype signal.
▪In digital communication the signal produced by this source is
converted into digital signal consists of 1′s and 0′s.
Output Transducer:
▪The signal in desired format analog or digital at the output
9

Channel
▪Thecommunicationchannelisthephysicalmediumthatisused
fortransmittingsignalsfromtransmittertoreceiver
•Wirelesschannels:WirelessSystems
•WiredChannels:Telephony
▪Channeldiscriminationonthebasisoftheirpropertyand
characteristics,likeAWGNchanneletc.
10

Source Encoder And Decoder
SourceEncoder
▪Indigitalcommunicationweconvertthesignalfromsource
intodigitalsignal.
▪SourceEncodingorDataCompression:theprocessof
efficientlyconvertingtheoutputofwitheranalogordigital
sourceintoasequenceofbinarydigitsisknownassource
encoding.
SourceDecoder
▪Attheend,ifananalogsignalisdesiredthensourcedecoder
triestodecodethesequencefromtheknowledgeofthe
encodingalgorithm.
11

Channel Encoder And Decoder
ChannelEncoder:
▪Theinformationsequenceispassedthroughthechannel
encoder.Thepurposeofthechannelencoderistointroduce,in
controlledmanner,someredundancyinthebinaryinformation
sequencethatcanbeusedatthereceivertoovercometheeffects
ofnoiseandinterferenceencounteredinthetransmissiononthe
signalthroughthechannel.
ChannelDecoder:
▪Channeldecoderattemptstoreconstructtheoriginal
informationsequencefromtheknowledgeofthecodeusedby
thechannelencoderandtheredundancycontainedinthe
receiveddata
12

Digital Modulator And Demodulator
DigitalModulator:
▪Thebinarysequenceispassedtodigitalmodulatorwhich
inturnsconvertthesequenceintoelectricsignalssothat
wecantransmitthemonchannel.Thedigitalmodulator
mapsthebinarysequencesintosignalwaveforms.
DigitalDemodulator:
▪Thedigitaldemodulatorprocessesthechannelcorrupted
transmittedwaveformandreducesthewaveformtothe
sequenceofnumbersthatrepresentsestimatesofthe
transmitteddatasymbols.
13

Why Digital Communications?
➢Easytoregeneratethedistortedsignal
➢Regenerativerepeatersalongthetransmissionpathcandetecta
digitalsignalandretransmitanew,clean(noisefree)signal
➢Theserepeaterspreventaccumulationofnoisealongthepath
Thisisnotpossiblewithanalogcommunicationsystems
➢Two-statesignalrepresentation
Theinputtoadigitalsystemisintheformofasequenceof
bits(binaryorM-ary)
➢Immunitytodistortionandinterference
➢Digitalcommunicationisruggedinthesensethatitismore
immunetochannelnoiseanddistortion
14

➢Hardware is more flexible
➢Digital hardware implementation is flexible and permits the
use of microprocessors, mini-processors, digital switching
and VLSI
Shorter design and production cycle
➢Low cost
The use of LSI and VLSI in the design of components and
systems have resulted in lower cost
➢Easier and more efficient to multiplex several digital
signals
➢Digital multiplexing techniques –Time & Code Division
Multiple Access -are easier to implement than analog
techniques such as Frequency Division Multiple Access
15

➢Can combine different signal types –data, voice, text, etc.
➢Data communication in computers is digital in nature
whereas voice communication between people is analog in
nature
➢Using digital techniques, it is possible to combine both
format for transmission through a common medium
➢Encryption and privacy techniques are easier to
implement
➢Better overall performance
➢Digital communication is inherently more efficient than
analog in realizing the exchange of SNR for bandwidth.
➢Digital signals can be coded to yield extremely low rates
and high fidelity as well as privacy.
16

Disadvantages:
➢Requiresreliable“synchronization”
➢RequiresA/Dconversionsathighrate
➢Requireslargerbandwidth
➢Nongracefuldegradation
➢PerformanceCriteria
➢ProbabilityoferrororBitErrorRate
17

Sampling Process
Sampling is converting a
continuous time signal into a
discrete time signal.
There three types of sampling
➢Impulse (ideal) sampling
➢Natural Sampling
➢Sample and Hold operation
18

Quantization
Quantization is a non linear transformation which maps
elements from a continuous set to a finite set.
19

Quantization Noise
20

Uniform & Non-Uniform Quantization
Non uniform Quantization Used to reduce quantization error
and increase the dynamic range when input signal is not
uniformly distributed over its allowed range of values.
21
Uniform quantization
Non-Uniform
quantization

22

23

Encoding
24

Pulse Code Modulation
➢PulseCodeModulation(PCM)isaspecialformofA/D
conversion.
➢Itconsistsofsampling,quantizing,andencodingsteps.
1.Usedforlongtimeintelephonesystems
2.Errorscanbecorrectedduringlonghaultransmission
3.Canusetimedivisionmultiplexing
4.Inexpensive
25

PCM Transmitter
26

PCM Transmission Path
27

PCM Receiver
28
rReconstructed waveform

Bandwidth ofPCM
Assume w(t)is band limited to Bhertz.
Minimum sampling rate = 2Bsamples / second
A/D output = nbits per sample (quantization level M=2
n
)
Assume a simple PCM without redundancy.
Minimum channel bandwidth = bit rate /2
➢Bandwidth of PCM signals:
B
PCMnB(with sincfunctions as orthogonal basis)
B
PCM2nB (with rectangular pulses as orthogonal basis)
➢For any reasonable quantization level M, PCM requires
much higher bandwidth than the original w(t).
29

Advantages of PCM
Relatively inexpensive.
Easily multiplexed.
Easily regenerated.
Better noise performance than analog system.
Signals may be stored and time-scaled efficiently.
Efficient codes are readily available.
Disadvantage
Requires wider bandwidth than analog signals
30

Line Codes
31

Categories of Line Codes
▪Polar -Send pulse or negative of pulse
▪Unipolar -Send pulse or a 0
▪Bipolar -Represent 1 by alternating signed pulses
Generalized Pulse Shapes
▪NRZ -Pulse lasts entire bit period
▪Polar NRZ
▪Bipolar NRZ
▪RZ -Return to Zero -pulse lasts just half of bit period
▪Polar RZ
▪Bipolar RZ
▪Manchester Line Code
▪Send a 2-pulse for either 1 (high→low) or 0 (low→high)
▪Includes rising and falling edge in each pulse
▪No DC component
32

Differential Encoding
33

34

35

Noise Considerations In PCM
36

Time Division Multiplexing(TDM)
37

38
Synchronization

Delta Modulation
39
Types of noise
➢Quantization noise: step
size takes place of smallest
quantization level.
➢too small: slope overload
noise
too large: quantization noise
and granular noise

Delta Modulator Transmitter & Receiver
40

ADM
41

ADM Transmitter & Receiver
42

DPCM
43
Often voice and video signals do not
change much from one
sample to next.
-Such signals has energy concentrated
in lower frequency.
-Sampling faster than necessary
generates redundant information.
Can save bandwidth by not sending all
samples.
* Send true samples occasionally.
* In between, send only change
from previous value.
* Change values can be sent using
a fewer number of bits
than true samples.

DPCM Transmitter
44

DPCM Receiver
45

Processing Gain
In aspread-spectrumsystem, theprocess gain(or
"processing gain") is the ratio of the spread (or RF)
bandwidth to the unspread(or baseband) bandwidth.
It is usually expressed indecibels(dB).
For example, if a 1kHz signal is spread to 100kHz, the
process gain expressed as a numerical ratio would
be100000/1000= 100. Or in decibels, 10 log
10(100) =
20dB.
46

AdaptiveDPCM
47

Comparisons
48

VEMU INSTITUTE OF TECHNOLOGY
(Approved by AICTE, New Delhi & Affiliated to JNTUA, Ananthapuramu)
P.Kothakota, Puthalapattu (M), Chittoor Dist –517 112AP, India
Unit-2
Baseband Pulse Transmission
By
B SAROJA
Associate Professor
Dept. of . ECE
Department of Electronics and Communication Engineering
Digital Communication Systems

Contents
Introduction
Matched filter, Properties of Matched filter,Matched filter for
rectangular pulse, Error rate due to noise
Inter-symbol Interference(ISI)
Nyquist‟s criterion for distortion less baseband binary transmission
Ideal Nyquis tchannel
Raised cosine filter & its spectrum
Correlative coding–Duo binary & Modified duo binary signaling
schemes, Partial response signaling
Baseband M-array PAM transmission
Eye diagrams

3

Matched Filter
Itpassesallthesignalfrequencycomponentswhile
suppressinganyfrequencycomponentswherethereis
onlynoiseandallowstopassthemaximumamountof
signalpower.
Thepurposeofthematchedfilteristomaximizethesignal
tonoiseratioatthesamplingpointofabitstreamandto
minimizetheprobabilityofundetectederrorsreceived
fromasignal.
ToachievethemaximumSNR,wewanttoallowthroughall
thesignalfrequencycomponents.
4

Matched Filter:
Consider the received signal as a vector r, and the transmitted signal vector as s
Matched filter “projects” the r onto signal space spanned by s (“matches” it)
5
Filtered signal can now be safely sampled by the receiver at the correct sampling instants,
resulting in a correct interpretation of the binary message
Matched filter is the filter that maximizes the signal-to-noise ratioit can be shown that it
also minimizes the BER: it is a simple projection operation

Example Of Matched Filter (Real Signals)
6
T t T t T t0 2T)()()( thtsty
opti
= 2
A )(ts
i )(th
opt
T t T t T t0 2T)()()( thtsty
opti
= 2
A )(ts
i )(th
opt T/2 3T/2T/2 TT/22
2
A
− T
A T
A T
A T
A− T
A− T
A

Properties of the Matched Filter
1.TheFouriertransformofamatchedfilteroutputwiththematchedsignalas
inputis,exceptforatimedelayfactor,proportionaltotheESDoftheinput
signal.
2.Theoutputsignalofamatchedfilterisproportionaltoashiftedversionofthe
autocorrelationfunctionoftheinputsignaltowhichthefilterismatched.
3.TheoutputSNRofamatchedfilterdependsonlyontheratioofthesignal
energytothePSDofthewhitenoiseatthefilterinput.
7)2exp(|)(|)(
2
fTjfSfZ −= sss ERTzTtRtz ==−= )0()()()( 2/
max
0
N
E
N
S
s
T
=




Matched Filter: Frequency domain View
Simple Bandpass Filter:
excludes noise, but misses some signal power
8

Multi-Bandpass Filter:includes more signal power, but adds more noise also!
Matched Filter:includes more signal power, weighted according to size
=> maximal noise rejection!
Matched Filter: Frequency Domain View (Contd)
9

Matched Filter For Rectangular Pulse
Matched filter for causal rectangular pulse has an impulse
response that is a causal rectangular pulse
Convolve input with rectangular pulse of duration Tsec and
sample result at Tsec is same as to
First, integrate for Tsec
Second, sample at symbol period Tsec
Third, reset integration for next time period
Integrate and dump circuit
10
T
Sample and dump

11

Inter-symbolInterference (ISI)
ISI in the detection process due to the filtering effects of
the system
Overall equivalent system transfer function
▪creates echoes and hence time dispersion
▪causes ISI at sampling time
ISI effect
12)()()()( f
r
Hf
c
Hf
t
HfH= i
ki
ikkk snsz 

++= 

Inter-symbol Interference (ISI): MODEL
Baseband system model
Equivalent model
13
Tx filter Channel)(tn )(tr Rx. filter
Detectorkz kTt= 
kxˆ 
kx 1x 2x 3x T T )(
)(
fH
th
t
t )(
)(
fH
th
r
r )(
)(
fH
th
c
c
Equivalent system)(ˆtn )(tz
Detectorkz kTt= 
kxˆ 
kx 1x 2x 3x T T )(
)(
fH
th
filtered noise)()()()( fHfHfHfH
rct=

14

15

16

17

EquivSystem: Ideal NyquistPulse
(FILTER)
18T2
1 T2
1− T )(fH f t )/sinc()( Ttth= 1 0 T T2 T− T2− 0 T
W
2
1
=
Ideal Nyquist filter Ideal Nyquist pulse

NyquistPulses (FILTERS)
Nyquistpulses(filters):
▪Pulses(filters)whichresultinnoISIatthesamplingtime.
Nyquistfilter:
▪Itstransferfunctioninfrequencydomainisobtainedby
convolvingarectangularfunctionwithanyrealeven-
symmetricfrequencyfunction
Nyquistpulse:
▪Itsshapecanberepresentedbyasinc(t/T)functionmultiply
byanothertimefunction.
ExampleofNyquistfilters:Raised-Cosinefilter
19

RaisedCosine Filter & Its Spectrum
202
)1( Baseband
sSB
sR
rW += |)(||)(| fHfH
RC= 0=r 5.0=r 1=r 1=r 5.0=r 0=r )()( thth
RC= T2
1 T4
3 T
1 T4
3− T2
1− T
1−
1
0.5
0
1
0.5
0T T2 T3 T− T2− T3− sRrW )1( Passband
DSB+=

RAISED COSINE FILTER & ITS SPECTRUM
Raised-Cosine Filter
▪A Nyquist pulse (No ISI at the sampling time)
21







−







−+
−
=
Wf
WfWW
WW
WWf
WWf
fH
||for 0
||2for
2||
4
cos
2||for 1
)(
0
0
02
0

Excess bandwidth:0WW− Roll-off factor0
0
W
WW
r

= 10r 2
0
0
00
])(4[1
])(2cos[
))2(sinc(2)(
tWW
tWW
tWWth
−−

=

Correlative Coding –DUO BINARY
SIGNALING

Impulse Response of DuobinaryEncoder

Encoding Process
1) a
n= binary input bit; a
n∈{0,1}.
2) b
n= NRZ polar output of Level converter in the
precoder and is given by,
bn={−d,if an=0+d,if an=1
3) y
ncan be represented as
The duobinary encoding correlates present sample a
nand the
previous input sample a
n-1.

Decoding Process
Thereceiverconsistsofaduobinarydecoderanda
postcoder.
b^n=yn−b^n−1
Thisequationindicatesthatthedecodingprocessisprone
toerrorpropagationastheestimateofpresentsample
reliesontheestimateofprevioussample.
Thiserrorpropagationisavoidedbyusingaprecoder
beforeduobinaryencoderatthetransmitteranda
postcoderaftertheduobinarydecoder.
Theprecodertiesthepresentsampleandprevioussample
andthepostcoderdoesthereverseprocess.

Correlative Coding –Modified Duobinary
Signaling

ModifiedDuobinarySignalingisanextensionofduobinary
signaling.
ModifiedDuobinarysignalinghastheadvantageofzeroPSDat
lowfrequencieswhichissuitableforchannelswithpoorDC
response.
Itcorrelatestwosymbolsthatare2Ttimeinstantsapart,
whereasinduobinarysignaling,symbolsthatare1Tapart
arecorrelated.
ThegeneralconditiontoachievezeroISIisgivenby
p(nT)={1,n=00,n≠0

Inthecaseofmodifiedduobinarysignaling,theabove
equationismodifiedas
p(nT)={1,n=0,20,otherwise
whichstatesthattheISIislimitedtotwoalternate
samples.
Hereacontrolledor“deterministic”amountofISIis
introducedandhenceitseffectcanberemovedupon
signaldetectionatthereceiver.

Impulse Response Of A Modified Duobinary
Encoder

Partial Response Signalling
31

32

Eye Pattern
Eye pattern:Display on an oscilloscope which sweeps the system
response to a baseband signal at the rate 1/T(Tsymbol
duration)
33time scale
amplitude scale
Noise margin
Sensitivity to
timing error
Distortion
due to ISI
Timing jitter

Example Of Eye Pattern:
BINARY-PAM, SRRC PULSE
Perfect channel (no noise and no ISI)
34

Eye Diagram For 4-PAM
35

VEMU INSTITUTE OF TECHNOLOGY
(Approved by AICTE, New Delhi & Affiliated to JNTUA, Ananthapuramu)
P.Kothakota, Puthalapattu(M), ChittoorDist–517 112AP, India
Unit-3
Signal Space Analysis
By
B SAROJA
Associate Professor
Dept. of . ECE
Department of Electronics and Communication Engineering
Digital Communication Systems

Contents
Introduction
Geometric representation of signals
Gram-Schmidt orthogonalization procedure
Conversion of the Continuous AWGN channel into a vector channel
Coherent detection of signals in noise
Correlation receiver
Equivalence of correlation and Matched filter receivers
Probability of error
Signal constellation diagram

Introduction:signalSpace
What is a signal space?
Vector representations of signals in an N-dimensional orthogonal
space
Why do we need a signal space?
It is a means to convert signals to vectors and vice versa.
It is a means to calculate signals energy and Euclidean distances
between signals.
Why are we interested in Euclidean distances between signals?
For detection purposes: The received signal is transformed to a
received vectors.
The signal which has the minimum distance to the received signal
is estimated as the transmitted signal.

Transmitter takes the symbol (data) m
i(digital
message source output) and encodes it into a
distinct signals
i(t).
The signal s
i(t)occupies the whole slot Tallotted to
symbol m
i.
s
i(t) is a real valued energy signal (???)2
i
0
E ( ) , i=1,2,....,M (5.2)
T
i
s t dt
4

Transmitter takes the symbol (data) m
i(digital message
source output) and encodes it into a distinct signals
i(t).
The signal s
i(t)occupies the whole slot Tallotted to symbol
m
i.
s
i(t) is a real valued energy signal (signal with finite energy)2
i
0
E ( ) , i=1,2,....,M (5.2)
T
i
s t dt
5

Geometric Representation of Signals
Objective: To represent any set of Menergy signals
{s
i(t)}as linear combinations of Northogonal
basis functions, where N ≤M
Real value energy signals s
1(t), s
2(t),..s
M(t),each of
duration T sec1
0 t T
( ) ( ), (5.5)
i==1,2,....,M
N
i ij j
j
s t s t


 


6
Orthogonal basis
function
coefficient
Energy signal

Coefficients:
Real-valued basis functions:0
i=1,2,....,M
( ) ( ) , (5.6)
j=1,2,....,M
T
ij i j
s s t t dt

 

 T
i
0
1 if
( ) ( ) (5.7)
0 if
j ij
ij
t t dt
ij
  




7

A)SYNTHESIZER FOR GENERATING THE SIGNAL S
I(T).
B) ANALYZER FOR GENERATING THE SET OF SIGNAL
VECTORS S
I.
8

Each signal in the set s
i(t) is completely determined by the
vector of its coefficients1
2
i
.
s , 1,2,....,M (5.8)
.
.
i
i
iN
s
s
i
s









9

The signal vector s
iconcept can be extended to 2D, 3D etc. N-
dimensional Euclidian space
Provides mathematical basis for the geometric representation
of energy signals that is used in noise analysis
Allows definition of
Length of vectors (absolute value)
Angles between vectors
Squared value (inner product of s
iwith itself)2
ii
2
1
ss
= , 1,2,....,M (5.9)
T
i
N
ij
j
s
si



10
Matrix
Transposition

ILLUSTRATING THE
GEOMETRIC
REPRESENTATION OF
SIGNALS FOR THE CASE
WHEN N2 AND M3.
(TWO DIMENSIONAL
SPACE, THREE SIGNALS)
11

…start with the definition of
average energy in a
signal…(5.10)
Where s
i(t) is as in (5.5):2
i
0
E ( ) (5.10)
T
i
s t dt 1
( ) ( ), (5.5)
N
i ij j
j
s t s t


12
What is the relation between the vector representationof a
signal and its energy value?

After substitution:
After regrouping:
Φ
j(t) is orthogonal, so
finally we have:i
110
E ( ) ( )
TNN
ij j ik k
jk
s t s t dt

 
 

 T
ij
11 0
E ( ) ( ) (5.11)
NN
ij ik k
jk
s s t t dt

 
132
2
ii
1
E = s (5.12)
N
ij
j
s


The energy of a signal
is equal to the squared
length of its vector

Formulas for Two Signals
Assume we have a pair of signals: s
i(t) and
s
j(t), each represented by its vector,
Then:k
0
( ) ( ) s (5.13)
T
T
ij i k i
s s t s t dt s
14
Inner product of the signals
is equal to the inner product
of their vector
representations [0,T]
Inner product is invariant
to the selection of basis
functions

Euclidian Distance
The Euclidean distance between two points represented by
vectors (signal vectors) is equal to
||s
i-s
k|| and the squared value is given by:2
2
i
1
2
0
s s = ( - ) (5.14)
= ( ( ) ( ))
N
k ij kj
j
T
ik
ss
s t s t dt





15

ANGLE BETWEEN TWO SIGNALS
The cosine of the angle Θ
ikbetween two signal vectors s
iand
s
kis equal to the inner product of these two vectors,
divided by the product of their norms:
So the two signal vectors are orthogonalif their inner
product s
i
T
s
kis zero (cosΘ
ik= 0)k
ik
s
cos (5.15)
T
i
ik
s
ss

16

Schwartz Inequality
Defined as:
accept without proof…   
2
22
1 2 1 2
( ) ( ) ( ) ( ) (5.16)s t s t dt s t dt s t dt
  
  
  
17

Gram-schmidtOrthogonalizationProcedure
1.Define the first basis
function starting with s
1 as:
(where E is the energy of the
signal) (based on 5.12)
2.Then express s
1(t) using the
basis function and an energy
related coefficient s
11 as:
3.Later using s
2define the
coefficient s
21 as:1
1
1
()
( ) (5.19)
st
t
E
 1 1 1 11 1
( ) ( )=s ( ) (5.20) s t E t t
1821 2 1
0
( ) ( ) (5.21)
T
s s t t dt
Assume a set of M energy signals denoted by s
1(t), s
2(t), .. , s
M(t).

4.If we introduce the
intermediate function g
2
as:
5.We can define the second
basis function φ
2(t) as:
6.Which after substitution of
g
2(t) using s
1(t) and s
2(t) it
becomes:
Note that φ
1(t) and φ
2(t) are
orthogonal that means: 2
2
2
2
0
()
( ) (5.23)
( )
T
gt
t
g t dt

 2 21 1
2
2
2 21
( ) ( )
( ) (5.24)
s t s t
t
Es





1912
0
( ) ( ) 0
T
t t dt  2
2
0
( ) 1
T
t dt  2 2 21 1
g ( ) ( ) ( ) (5.22)t s t s t
Orthogonal to φ
1(t)
(Look at 5.23)

AND SO ON FOR N DIMENSIONAL
SPACE…,
In general a basis function can be defined using the following
formula:0
( ) ( ) , 1,2,....., 1 (5.26)
T
ij i j
s s t t dt j i   1
i
1
g ( ) ( ) - (t) (5.25)
i
i ij j
j
t s t s 



20
•where the coefficients can be defined using:

Special Case:
For the special case of i= 1 g
i(t)reduces to s
i(t).i
2
0
()
( ) , i 1,2,....., (5.27)
( )
i
T
i
gt
tN
g t dt


21
General case:
•Given a function g
i(t) we can define a set of basis functions,
which form an orthogonal set, as:

22

Additive White Gaussian Noise (AWGN)
23
Thermal noise is described by a zero-mean Gaussianrandom process,
n(t) that ADDS on to the signal => “additive”
Probability density function
(gaussian)
[w/Hz]
Power spectral
Density
(flat => “white”)
Autocorrelation
Function
(uncorrelated)
Its PSD is flat, hence, it is called whitenoise.
Autocorrelation is a spike at 0: uncorrelated at any non-zero lag

24

CoherantDetection of Signals in Noise:
25
Assuming both symbols equally likely: u
Ais chosen if
“likelihoods”
Log-Likelihood =>
A simple distance criterion!

Effect of Noise In Signal Space
The cloud falls off exponentially (gaussian).
Vector viewpoint can be used in signal space, with a random noise vector w
26

CorrelatorReceiver
Thematchedfilteroutputatthesamplingtime,canbe
realizedasthecorrelatoroutput.
Matchedfiltering,i.e.convolutionwiths
i
*
(T-)simplifiesto
integrationw/s
i
*
(),i.e.correlationorinnerproduct!


)(),()()(
)()()(
*
0
tstrdsr
TrThTz
i
T
opt

Recall: correlation operation is the projection of the received
signal onto the signal space!
Key idea: Reject the noise (N) outside this space as irrelevant:
=> maximize S/N

A Correlation Receiver
Threshold
device
(A\D)
integrator
integrator
-
+
Sample
every Tb
seconds
b
T
0 
b
T
0 )(
1
tS )(
2
tS  







)()(
)()(
)(
2
1
tntS
or
tntS
tV
28

29

Probability Of Error
30

Signal Constellation Diagram
Aconstellationdiagramisarepresentationofasignalmodulated
byadigitalmodulationschemesuchasquadratureamplitude
modulationorphase-shiftkeying.
Itdisplaysthesignalasatwo-dimensionalxy-plane
scatterdiagraminthecomplexplaneatsymbolsampling
instants.
31

32

VEMU INSTITUTE OF TECHNOLOGY
(Approved by AICTE, New Delhi & Affiliated to JNTUA, Ananthapuramu)
P.Kothakota, Puthalapattu (M), Chittoor Dist –517 112AP, India
Unit-4
Passband Transmission Model
By
B SAROJA
Associate Professor
Dept. of . ECE
Department of Electronics and Communication Engineering
Digital Communication Systems

Contents
Introduction, Pass band transmission model
Coherent phase-shift keying –BPSK, QPSK
Binary Frequency shift keying (BFSK)
Error probabilities of BPSK, QPSK, BFSK
Generation and detection of Coherent PSK, QPSK, & BFSK
Power spectra of above mentioned modulated signals
M-array PSK, M-array QAM
Non-coherent orthogonal modulation schemes -DPSK, BFSK,
Generation and detection of non-coherent BFSK, DPSK
Comparison of power bandwidth requirements for all the above
schemes.

Introduction:
Baseband VsBandpass
Bandpassmodelofdetectionprocessisequivalenttobaseband
modelbecause:
Thereceivedbandpasswaveformisfirsttransformedtoa
basebandwaveform.
Equivalencetheorem:
Performingbandpasslinearsignalprocessingfollowedby
heterodyingthesignaltothebaseband,…
…yieldsthesameresultsas…
…heterodyingthebandpasssignaltothebaseband,followedbya
basebandlinearsignalprocessing.
3

PASSBANDTRANSMISSION MODEL
4

Types Of Digital Modulation
Amplitude Shift Keying (ASK)
The most basic (binary) form of ASK involves the process of switching
the carrier either on or off, in correspondence to a sequence of digital
pulses that constitute the information signal. One binary digit is
represented by the presence of a carrier, the other binary digit is
represented by the absence of a carrier. Frequency remains fixed
Frequency Shift Keying (FSK)
The most basic (binary) form of FSK involves the process of varying the
frequency of a carrier wave by choosing one of two frequencies (binary
FSK) in correspondence to a sequence of digital pulses that constitute
the information signal. Two binary digits are represented by two
frequencies around the carrier frequency. Amplitude remains fixed
Phase Shift Keying (PSK)
Another form of digital modulation technique which we will not discuss
5

BINARY PHASE SHIFT KEYING (PSK)
6
Major drawback –rapid amplitude change between symbols due to phase
discontinuity, which requires infinite bandwidth. Binary Phase Shift Keying
(BPSK) demonstrates better performance than ASK and BFSK
BPSK can be expanded to a M-ary scheme, employing multiple phases and
amplitudes as different states
Baseband
Data
BPSK
modulated
signal
1 10 0
where s
0 =-Acos(
ct) and s
1=Acos(
ct)
s
0 s
0s
1
s
1

BPSK TRANSMITTER
7

BINARY TO BIPOLAR
CONVERSION
8

COHERENT BPSK RECEIVER
9

BPSK WAVEFORM
10

11

QPSK
Quadrature Phase Shift Keying (QPSK) can be interpreted
as two independent BPSK systems (one on the I-channel
and one on Q-channel), and thus the same performance
but twice the bandwidth (spectrum) efficiency.
Quadrature Phase Shift Keying has twice the bandwidth
efficiency of BPSKsince 2 bits are transmitted in a single
modulation symbol
Quadrature Phase Shift Keying (QPSK) has twice the
bandwidth efficiency of BPSK, since 2 bits are transmitted
in a single modulation symbol.
12

13
Symbol and corresponding phase shifts in QPSK

QPSK
QPSK → Quadrature Phase Shift Keying
Four different phase states in one symbol period
Two bits of information in each symbol
Phase: 0 π/2 π 3π/2 → possible phase values
Symbol: 00 01 11 10
Note that we choose binary representations so an error between two adjacent
points in the constellation only results in a single bit error
For example, decoding a phase to be π instead of π/2 will result in a "11"
when it should have been "01", only one bit in error.
14

15

Now we have two basis functions
E
s= 2 E
bsince 2 bits are transmitted per symbol
I = in-phase component from s
I(t).
Q = quadrature component that is s
Q(t).
16

QPSK Transmitter
17
AN OFFSET QPSK TRANSMITTER

QPSK Waveforms
18

QPSK Receiver
19

Types of QPSK
Conventional QPSK has transitions through zero (i.e. 180
0
phase transition). Highly linear
amplifiers required.
In Offset QPSK, the phase transitions are limited to 90
0
, thetransitions on the I and Q
channels are staggered.
In /4 QPSK the set of constellation points are toggled each symbol, so transitions through
zero cannot occur. This scheme produces the lowest envelope variations.
All QPSK schemes require linear power amplifiers
20
I
Q
I
Q
I
Q
Conventional QPSK /4 QPSKOffset QPSK

Frequency Shift Keying (FSK)
21
Example: The ITU-T V.21 modem standard uses FSK
FSK can be expanded to a M-ary scheme, employing multiple frequencies
as different states
Baseband
Data
BFSK
modulated
signal
1 10 0
where f
0 =Acos(
c-)t and f
1=Acos(
c+)t
f
0 f
0f
1
f
1

Generation & Detection of FSK
22

Amplitude Shift Keying (ASK)
Pulse shaping can be employed to remove spectral spreading
ASK demonstrates poor performance, as it is heavily affected by noise,
fading, and interference
23
Baseband
Data
ASK
modulated
signal
1 10 0 0
Acos(t) Acos(t)

Error Probabilities of PSK,QPSK,BFSK
24

Power Spectral Density (PSD)
In practical, pulse shaping should be considered for a precise bandwidth
measurement and considered in the spectral efficiency calculations.
Power spectral density (PSD) describes the distribution of signal power in the
frequency domain. If the baseband equivalent of the transmitted signal sequence
is given as   

k
sk kTtpatg ka
: Baseband modulation symbolsT
: Signal intervaltp : Pulse shape ffP
T
f
a
s
g

21
then the PSD of g(t) is given asR
an()=
1
2
Ea
ka
k+n

ë
ù
û  tpFfP  
sfnTj
n
aa enRf
2



where

M-ARY Phase Shift Keying (MPSK)
In M-ary PSK, the carrier phase takes on one of the M
possible values, namely 
i
= 2 * (i -1)/ M
where i = 1, 2, 3, …..M.
The modulated waveform can be expressed as
where E
sis energy per symbol = (log
2M) E
b
T
sis symbol period = (log
2M) T
b.
26

The above equation in the Quadrature form is
By choosing orthogonal basis signals
defined over the interval 0 t T
s
27

M-ary signal set can be expressed as
Since there are only two basis signals, the constellation
of M-ary PSK is two dimensional.
The M-ary message points are equally spaced on a
circle of radius E
s, centered at the origin.
The constellation diagram of an 8-ary PSK signal set is
shown in fig.
28

M-ARY PSK Transmitter
29

Coherent M-ARY PSK Receiver
30

M-ARY Quadrature Amplitude
Modulation(QAM)
It’s a Hybrid modulation
As we allow the amplitude to also vary with the phase, a
new modulation scheme called quadrature amplitude
modulation (QAM) is obtained.
The constellation diagram of 16-ary QAM consists of a
square lattice of signal points.
Combines amplitude and phase modulation
One symbol is used to represent n bits using one symbol
BER increases with n,
31

The general form of an M-ary QAM signal can be
defined as
where
E
minis the energy of the signal with the lowest
amplitude and
a
iand b
iare a pair of independent integers chosen
according to the location of the particular signal point.
In M-ary QAM energy per symbol and also distance
between possible symbol states is not a constant.
32

M-PSK AND M-QAM
33
M-PSK (Circular Constellations)
16-PSK
an
bn
4-PSK
M-QAM (Square Constellations)
16-QAM
4-PSK
an
bn
Tradeoffs
–Higher-order modulations (M large) are more spectrally
efficientbut less power efficient (i.e. BER higher).
–M-QAM is more spectrally efficient than M-PSK but
also more sensitive to system nonlinearities.

QAM Constellation Diagram
34

Differential Phase Shift Keying (DPSK)
•DPSK is a non coherentform of phase shift keying which
avoids the need for a coherent reference signal at the
receiver.
Advantage:
•Non coherent receivers are easy and cheap to build,
hence widely used in wireless communications.
•DPSK eliminates the need for a coherent reference signal
at the receiver by combining two basic operations at the
transmitter:
35

DPSK Waveforms
36

Transmitter/Generatorof DPSK Signal
37

Non-coherent Detection
38

Non-coherent DPSK Receiver
39
DPSKReceiver
Dpsk receiver using
correlator

Non-coherentBFSK Receiver
40

Comparisons Between Modulation Techniques
41

VEMU INSTITUTE OF TECHNOLOGY
(Approved by AICTE, New Delhi & Affiliated to JNTUA, Ananthapuramu)
P.Kothakota, Puthalapattu(M), ChittoorDist–517 112AP, India
Unit-5
Channel Coding
By
B SAROJA
Associate Professor
Dept. of . ECE
Department of Electronics and Communication Engineering
Digital Communication Systems

Contents
Error Detection & Correction
Repetition & Parity Check Codes, Interleaving
Code Vectors and Hamming Distance
Forward Error Correction (FEC) Systems
Automatic Retransmission Query (ARQ) Systems
Linear Block Codes –Matrix Representation of Block Codes
Convolutional Codes –Convolutional Encoding, Decoding
Methods.

Introduction:
Types of Errors
3

Single bit errors are the least likely type of errors in serial data transmission because
the noise must have a very short duration which is very rare. However this kind of
errors can happen in parallel transmission.
Example:
If data is sent at 1Mbps then each bit lasts only 1/1,000,000 sec. or 1 μs.
For a single-bit error to occur, the noise must have a duration of only 1 μs, which is
very rare.
4

Burst Error
5

6

The term burst errormeans that two or more bits in the data unit have changed from
1 to 0 or from 0 to 1.
Burst errors does not necessarilymean that the errors occur in consecutive
bits, the length of the burst is measured from the first corrupted bit to the last
corrupted bit. Some bits in between may not have been corrupted.
7

Burst error is most likely to happen in serial transmission since the duration of noise is
normally longer than the duration of a bit.
The number of bits affected depends on the data rate and duration of noise.
Example:
If data is sent at rate = 1Kbps then a noise of 1/100
sec can affect 10 bits.(1/100*1000)
If same data is sent at rate = 1Mbps then a noise of
1/100 sec can affect 10,000 bits.(1/100*10
6
)
8

Error Detection
Error detection means to decide whether the received data is correct or not without having a
copy of the original message.
Error detection uses the concept of redundancy, which means adding extra bits for detecting
errors at the destination.
9

Error Correction
It can be handled in two ways:
1) receiver can have the sender retransmit the entire data unit.
2) The receiver can use an error-correcting code, which automatically corrects
certain errors.
10

Single-bit Error Correction
To correct an error, the receiver reverses the
value of the altered bit. To do so, it must know
which bit is in error.
Number of redundancy bits needed
Let data bits = m
Redundancy bits =r
Total message sent =m+r
The value of r must satisfy the following relation:
2
r
≥ m+r+1
11

Error Correction
12

Repetetion
Retransmissionis a very simple concept. Whenever one
party sends something to the other party, it retains a
copy of the data it sent until the recipient has
acknowledged that it received it. In a variety of
circumstances the sender automatically retransmits
the data using the retained copy.
13

Parity Check Codes
information bits transmitted = k
bits actually transmitted = n = k+1
Code Rate R = k/n = k/(k+1)
Error detecting capability = 1
Error correcting capability = 0
14

Parity Codes –Example 1
Even parity
(i) d=(10110) so,
c=(101101)
(ii)d=(11011) so,
c=(110110)
15

Parity Codes –Example 2
Coding table for (4,3) even parity code
16
Dataword Codeword111
011
101
001
110
010
100
000 1111
0011
0101
1001
0110
1010
1100
0000

Parity Codes
To decode
Calculate sum of received bits in block (mod 2)
If sum is 0 (1) for even (odd) parity then the datawordis the first kbits of the received
codeword
Otherwise error
Code can detectsingle errors
But cannot correcterror since the error could be in any
bit
For example, if the received datawordis (100000) the
transmitted datawordcould have been (000000) or
(110000) with the error being in the first or second
place respectively
Note error could also lie in other positions including the
parity bit.
17

Interleaving
Interleaving is a process or methodology to make a system more efficient, fast and
reliable by arrangingdatain a non contiguous manner. There are many uses for
interleaving at the system level, including:
Storage: As hard disks and other storage devices are used to store user and system
data, there is always a need to arrange the stored data in an appropriate way.
Error Correction: Errors in data communication and memory can be corrected
through interleaving.
18

Code Vectors
In practice, we have a message (consisting of words,
numbers, or symbols) that we wish to transmit. We
begin by encoding each “word” of the message as a
binaryvector.
A binary code is a set of binary vectors (of the same
length) called code vectors.
The process of converting a message into code vectors is
called encoding, and the reverse process is called
decoding.
19

Hamming Distance
Hamming distance is a metric for comparing two binary data strings.
While comparing two binary strings of equal length, Hamming distance
is the number of bit positions in which the two bits are different.
The Hamming distance between two strings, a and b is denoted as d(a,b).
It is used for error detection or error correction when data is transmitted
over computer networks. It is also using in coding theory for comparing
equal length data words.
Example :
Suppose there are two strings 1101 1001 and 1001 1101.
11011001 ⊕10011101 = 01000100. Since, this contains two 1s, the
Hamming distance, d(11011001, 10011101) = 2.
20

FEC System
21

Forwarderrorcorrection(FEC)orchannelcodingisa
techniqueusedforcontrollingerrorsindata
transmissionoverunreliableornoisycommunication
channels.
Thecentralideaisthesenderencodesthemessagein
aredundantwaybyusinganerror-correctingcode(ECC).
FECgivesthereceivertheabilitytocorrecterrorswithout
needingareversechanneltorequestretransmissionof
data,butatthecostofafixed,higherforwardchannel
bandwidth.
FECisthereforeappliedinsituationswhereretransmissions
arecostlyorimpossible,suchasone-waycommunication
linksandwhentransmittingtomultiplereceivers
inmulticast.
22

Automatic Repeat Request (ARQ)
Automatic Repeat reQuest(ARQ), also known asAutomatic Repeat
Query, is anerror-controlmethod fordata transmissionthat
usesacknowledgementsandtimeoutsto achieve reliable data
transmission over an unreliable service.
If the sender does not receive an acknowledgment before the
timeout, it usuallyre-transmitsthe frame/packet until the sender
receives an acknowledgment or exceeds a predefined number of
re-transmissions.
The types of ARQ protocols include
Stop-and-wait ARQ
Go-Back-N ARQ
Selective Repeat ARQ
All three protocols usually use some form ofsliding window
protocolto tell the transmitter to determine which (if any)
packets need to be retransmitted.
23

ARQ System
24

Block Codes
Data is grouped Into Blocks Of Length kbits
(dataword)
Each datawordis coded into blocks of length nbits
(codeword), where in general n>k
This is known as an (n,k) block code
A vector notation is used for the datawordsand
codewords,
Datawordd = (d
1d
2….d
k)
Codeword c = (c
1c
2……..c
n)
The redundancy introduced by the code is
quantified by the code rate,
Code rate = k/n
i.e., the higher the redundancy, the lower the code rate
25

Block Code -Example
Data word length k = 4
Codeword length n = 7
This is a (7,4) block code with code rate = 4/7
For example, d = (1101), c = (1101001)
26

Linear Block Codes:Matrix
Representation
parity bits n-k (=1 for Parity Check)
Message m = {m
1 m
2… m
k}
Transmitted Codewordc = {c
1c
2… c
n}
A generator matrix G
kxnmGc
27

Linear Block Codes
Linearity
Example : 4/7 Hamming Code
k = 4, n = 7
4 message bits at (3,5,6,7)
3 parity bits at (1,2,4)
Error correcting capability =1
Error detecting capability = 2,
11
Gmc Gmmcc )(
2121

28Gmc
22

Linear Block Codes
Iftherearekdatabits,allthatisrequiredistoholdklinearly
independentcodewords,i.e.,asetofkcodewordsnoneof
whichcanbeproducedbylinearcombinationsof2ormore
codewordsintheset.
Theeasiestwaytofindklinearlyindependentcodewordsisto
choosethosewhichhave‘1’injustoneofthefirstk
positionsand‘0’intheotherk-1ofthefirstkpositions.
29

Linear Block Codes
For example for a (7,4) code, only four codewords are
required, e.g.,
301111000
1100100
1010010
0110001
•So, to obtain the codeword for dataword1011, the first, third
and fourth codewords in the list are added together, giving
1011010
•This process will now be described in more detail

An (n,k) block code has code vectors
d=(d
1d
2….d
k) and
c=(c
1c
2……..c
n)
The block coding process can be written as c=dG
where G is the Generator Matrix
31

























k
2
1
21
22221
11211
a
.
a
a
...
......
...
...
G
knkk
n
n
aaa
aaa
aaa

Thus,
32


k
i
iid
1
ac
•a
imust be linearly independent, i.e., Since codewords
are given by summations of the a
ivectors, then to avoid
2 datawordshaving the same codeword the a
ivectors
must be linearly independent.
•Sum (mod 2) of any 2 codewords is also a codeword,
i.e.,
Since for datawordsd
1and d
2we have;213
d d d 




k
i
ii
k
i
ii
k
i
iii
k
i
ii ddddd
1
2
1
1
1
21
1
33 aa)a(ac So,213
c c c 
0 is always a codeword, i.e.,
Since all zeros is a datawordthen,0a 0c
1


k
i
i
33

Decoding Linear Codes
One possibility is a ROM look-up table
In this case received codeword is used as an address
Example –Even single parity check code;
Address Data
000000 0
000001 1
000010 1
000011 0
……… .
Data output is the error flag, i.e., 0 –codeword ok,
If no error, datawordis first kbits of codeword
For an error correcting code the ROM can also store
datawords.
34

Convolutional Codes
Block codes require a buffer
Example
k = 1
n = 2
Rate R = ½
35

Convolutional Codes:Decoding
Encoder consists of shift registers forming a finite state machine
Decoding is also simple –Viterbi Decoder which works by tracking these states
First used by NASA in the voyager space programme
Extensively used in coding speech data in mobile phones
36