Course Code & Title - 19ECC10/Digital Communication Systems
Course Code & Title - 19ECC10/Digital Communication Systems
RASIPURAM-637408
3
Types of information:
Voice, data, video, music, email etc.
4
Information Representation
Communication system converts information into electrical
electromagnetic/optical signals appropriate for the
transmission medium.
Analog systems convert analog message into signals that can
propagate through the channel.
Digital systems convert bits(digits, symbols) into signals
5
WHY DIGITAL?
Digital techniques
need to distinguish between discrete
symbols allowing regeneration versus amplification
Good processing techniques are
available for digital signals, such
as medium.
• Data compression (or source coding)
• Error Correction (or channel coding)(A/D conversion)
• Equalization
• Security
Easy to mix signals and data using digital techniques
6
7
8
Information Source and
Sinksand Input Transducer:
Information Source
The source of information can be analog or digital,
Analog: audio or video signal,
Digital: like teletype signal.
In digital communication the signal produced by this source
is converted into digital signal consists of 1′s and 0′s.
Output Transducer:
The signal in desired format analog or digital at the output
9
Channel
11
Channel Encoder And Decoder
Channel Encoder:
The information sequence is passed through channel
the
encoder. The purpose of the channel encoder is to introduce, in
controlled manner, some redundancy in the binary information
sequence that can be used at the receiver to overcome the effects
of noise and interference encountered in the transmission on the
signal through the channel.
Channel Decoder:
Channel decoder attempts to reconstruct the original
information sequence from the knowledge of the code used by
the channel encoder and the redundancy contained in the
received data
12
Digital Modulator And Demodulator
Digital Modulator:
The binary sequence is passed to digital modulator which
in turns convert the sequence into electric signals so that
we can transmit them on channel. The digital modulator
maps the binary sequences into signal wave forms.
Digital Demodulator:
The digital demodulator processes the channel corrupted
transmitted waveform and reduces the waveform to the
sequence of numbers that represents estimates of the
transmitted data symbols.
13
Why Digital Communications?
Easy to regenerate the distorted signal
Regenerative repeaters along the transmission path can detect
a
digital signal and retransmit a new, clean (noise free) signal
These repeaters prevent accumulation of noise along the path
This is not possible with analog communication systems
Two-state signal representation
The input to a digital system is in the form of a sequence of
bits (binary or M-ary)
Immunity
Digital to distortion and interferenceis rugged in the
communication more
sense to channel
immune thatnoiseitand distortion
is
14
Hardware is more flexible
Digital hardware implementation is flexible and permits
the use of microprocessors, mini-processors, digital
switching and VLSI
Shorter design and production cycle
Low cost
The use of LSI and VLSI in the design of components and
systems have resulted in lower cost
Easier and more efficient to multiplex several digital
signals
Digital multiplexing techniques – Time & Code Division
Multiple Access - are easier to implement than analog
techniques such as Frequency Division Multiple
Access 15
Can combine different signal types – data, voice, text, etc.
Data communication in computers is digital in nature
whereas voice communication between people is analog
in nature
Using digital techniques, it is possible to combine both
format for transmission through a common medium
Encryption and privacy techniques are easier to
implement
Better overall performance
Digital communication is inherently more efficient than
analog in realizing the exchange of SNR for bandwidth.
Digital signals can be coded to yield extremely low
rates and high fidelity as well as privacy.
16
Disadvantages:
Requires reliable “synchronization”
Nongraceful degradation
Performance Criteria
17
Sampling
Process
Sampling is converting a
continuous time signal into a
discrete time signal.
There three types of
sampling
Impulse (ideal) sampling
Natural Sampling
Sample and Hold
operation
18
Quantization
Quantization is a non linear transformation which maps
elements from a continuous set to a finite set.
19
Quantization Noise
20
Uniform & Non- Uniform Quantization
24
Pulse Code Modulation
Pulse Code Modulation (PCM) is a form of A/D
special conversion.
4. In expensive
25
PCM Transmitter
26
PCM Transmission Path
27
PCM Receiver
Reconstructed waveform
28
Bandwidth of PCM
Assume w(t) is band limited to B hertz.
Minimum sampling rate = 2B samples / second
A/D output = n bits per sample (quantization level M=2n)
Assume a simple PCM without redundancy.
Minimum channel bandwidth = bit rate /2
29
Advantages of PCM
Relatively inexpensive. Easily multiplexed.
Easily regenerated.
Better noise performance than analog system.
Signals may be stored and time-scaled efficiently.
Efficient codes are readily available.
Disadvantage
Requires wider bandwidth than analog signals
30
Line Codes
31
Categories of Line Codes
Polar - Send pulse or negative of pulse
Unipolar - Send pulse or a 0
Bipolar - Represent 1 by alternating signed pulses
Generalized Pulse Shapes
NRZ -Pulse lasts entire bit period
Polar NRZ
Bipolar NRZ
RZ - Return to Zero - pulse lasts just half of bit period
Polar RZ
Bipolar RZ
Manchester Line Code
Send a 2- pulse for either 1 (high low) or 0 (low
high)
Includes rising and falling edge in each pulse
No DC component 32
Differential Encoding
33
34
35
Noise Considerations In PCM
36
Time Division Multiplexing(TDM)
37
Synchronization
38
Delta Modulation
Types of noise
Quantization noise: step
size takes place of smallest
quantization level.
too small: slope
overload noise
too large: quantization noise
and granular noise
39
Delta Modulator Transmitter &
Receiver
40
ADM
41
ADM Transmitter & Receiver
42
DPCM
Often voice and video signals do
not change much from one
sample to next.
-Such signals has energy
concentrated
in lower frequency.
-Sampling faster than necessary
generates redundant information.
Can save bandwidth by not
sending all
samples.
* Send true samples
occasionally.
* In between, send only
change
from previous value.
* Change values can be 43
sent using
DPCM
Transmitter
44
DPCM Receiver
45
Processing Gain
In a spread-spectrum system, the process gain (or
"processing gain") is the ratio of the spread (or RF)
bandwidth to the unspread (or baseband) bandwidth.
It is usually expressed in decibels (dB).
46
Adaptive DPCM
47
Comparisons
48
VEMU INSTITUTE OF TECHNOLOGY
(Approved by AICTE, New Delhi & Affiliated to JNTUA,
Ananthapuramu)
P.Kothakota, Puthalapattu (M), Chittoor Dist – 517 112 AP, India
By
B SAROJA
Associate Professor Dept. of . ECE
Contents
Introduction
Matched filter, Properties of Matched filter,Matched filter for
rectangular pulse, Error rate due to noise
Inter-symbol Interference(ISI)
Nyquist‟s criterion for distortion less baseband binary
transmission Ideal Nyquis tchannel
Raised cosine filter & its spectrum
Correlative coding–Duo binary & Modified duo binary signaling
schemes, Partial response signaling
Baseband M-array PAM transmission Eye diagrams
3
Matched Filter
It passes all the signal frequency components while
suppressing any frequency components where there is
only noise and allows to pass the maximum amount of
signal power.
The purpose of the matched filter is to maximize the signal
to noise ratio at the sampling point of a bit stream and to
minimize the probability of undetected errors received
from a signal.
To achieve the maximum SNR, we want to allow through all
the signal frequency components.
4
Matched Filter:
⦁ Consider the received signal as a vector r, and the transmitted signal vector as
s
⦁ Matched filter “projects” the r onto signal space spanned by s (“matches” it)
Filtered signal can now be safely sampled by the receiver at the correct sampling instants, resulting
in a correct interpretation of the binary message
Matched filter is the filter that maximizes the signal-to-noise ratio it can be shown that it also
minimizes the BER: it is a simple projection operation
5
Example Of Matched Filter (Real Signals)
y(t) si (t) hopt (t)
si (t) h opt (t) A2
A A
T t T t 0 T 2T t
A A
T/2 T t T/2 T t A2
0 T/2 T 3T/2 2T t
A A
2
T T
6
Properties of the Matched Filter
1. The Fourier transform of a matched filter output with the matched signal
as input is, except for a time delay factor, proportional to the ESD of the
input
signal.
Z ( f ) | S( f ) |2 exp( j2fT)
3.The output SNR of a matched filter depends only on the ratio of the signal energy
to the PSD of the white noise at the filter input.
Es
max S N / 2
N T 0
7
Matched Filter: Frequency domain
View
8
Matched Filter: Frequency Domain View (Contd
Multi-Bandpass Filter: includes more signal power, but adds more noise also!
9
Matched Filter For Rectangular
Pulse
Matched filter for causal rectangular pulse has an impulse
response that is a causal rectangular pulse
Convolve input with rectangular pulse of duration T sec and
sample result at T sec is same as to
First, integrate for T sec
Second, sample at symbol period T sec
Sample and
Third, reset integration for next time dump
period
Integrate and dump circuit
10
11
Inter-symbol Interference (ISI)
ISI in the detection process due to the filtering effects
of the system
Overall equivalent system transfer function
H(f)H (f)H
creates echoes and hence time dispersion
causes ISI at sampling time
ISI effect
zk sk nk isi
ik
12
Inter-symbol Interference (ISI): MODEL
Baseband system model
x1 x2
zk
x k
Tx filter Channel r(t) Rx. filter xkˆ
ht (t) hc (t) hr (t)
Hc ( f ) Hr ( f )
t kT
Detector
T Equivale tHm(tofd)e
n x3 T n(t
l
x1 x2
Equivalent system zk
x k
z(t
xkˆ
h(t)
H
t kT
Detector
T x3 T
nˆ(
filtered noise
t
H ( f ) H t ( f )H c ( f )H r ( f )
13
14
15
16
17
Equiv System: Ideal Nyquist Pulse
(FILTER)
Ideal Nyquist filter Ideal Nyquist pulse
H(f)
h(t) sinc( t / T )
T 1
0 f 2T 0 T t
1 1 T 2T
2 2
T T
W 2T
1
18
Nyquist Pulses (FILTERS)
Nyquist pulses (filters):
Pulses (filters) which result in no ISI at the sampling time.
Nyquist filter:
Its transfer function in frequency domain is obtained by
convolving a rectangular function with any real even-
symmetric frequency function
Nyquist pulse:
Its shape can be represented by a sinc(t/T) function multiply
by another time function.
Example of Nyquist filters: Raised-Cosine filter
19
Raised Cosine Filter & Its Spectrum
1 3 1 0 1 3 0 T 2T
3T 2T T 3T
T 4T 1
2T 2T 4T T
20
RAISED COSINE FILTER & ITS SPECTRUM
Raised-Cosine Filter
A Nyquist pulse (No ISI at the sampling
time)
for | f | 2W0 W
1
| f | W 2W0 for 2W0 W | f | W
H ( f ) cos 2
4 W W0
for | f | W
0
cos[2 (W W0 )t]
h(t) 2W0 (sinc( 2W0t))
1[4(W W 0 )t]2
W W
r
Roll-off factor
Excess bandwidth: W W0
0 r 1
21
Correlative Coding – DUO
BINARY
SIGNALING
Impulse Response of Duobinary
Encoder
Encoding Process
1) an = binary input bit; an ∈ {0,1}.
2) bn = NRZ polar output of Level converter in the
precoder
and is given by,
3) yn can be represented as
p(nT)={1,n=00,n≠0
In the case of modified duobinary signaling, the above
equation is modified as
p(nT)={1,n=0,20,otherwise
which states that the ISI is limited to two alternate
samples.
Encoder
Partial Response Signalling
31
32
Eye Pattern
Eye pattern:Display
on an oscilloscope which sweeps the system
response to a baseband signal at the rate 1/T (T symbol
duration)
Sensitivity
to
timing error
Timing jitter
time scale 33
Example Of Eye
BINARY-PAM, SRRC PULSE
Pattern:
Perfect channel (no noise and no ISI)
34
Eye Diagram For 4-PAM
35
VEMU INSTITUTE OF TECHNOLOGY
(Approved by AICTE, New Delhi & Affiliated to JNTUA,
Ananthapuramu)
P.Kothakota, Puthalapattu (M), Chittoor Dist – 517 112 AP, India
By
B SAROJA
Associate Professor
Dept. of . ECE
Contents
Introduction
Geometric representation of signals
Gram-Schmidt orthogonalization procedure
Conversion of the Continuous AWGN channel into a
vector
channel Coherent detection of signals in noise
Correlation receiver
Equivalence of correlation and Matched filter receivers
Probability of error
Signal constellation diagram
Introduction:signal Space
What is a signal space?
Vector representations of signals in an N-dimensional orthogonal
space
Why do we need a signal space?
It is a means to convert signals to vectors and vice versa.
It is a means to calculate signals energy and Euclidean
distances
between signals.
Why are we interested in Euclidean distances between
signals?
For detection purposes: The received signal is transformed to a
received vectors.
The signal which has the minimum distance to the
received signal
is estimated as the transmitted signal.
Transmitter takes the symbol (data) mi (digital
message source output) and encodes it into a
distinct signal si(t).
The signal si(t) occupies the whole slot T
allotted to
symbol mi.
si(t) is a real valued energy signal (???)
T E i si2 (t)dt, i=1,2,....,M (5.2)
0
4
Transmitter takes the symbol (data) mi (digital message
source output) and encodes it into a distinct signal si(t).
The signal si(t) occupies the whole slot T allotted to symbol
mi.
si(t) is a real valued energy signal (signal with finite energy)
T
E i si2 (t)dt, i=1,2,....,M (5.2)
0
5
Geometric Representation of
Signals
Objective: To represent any set of M energy
signals
{si(t)} as linear combinations of N orthogonal
basis functions, where N ≤ M
RedaulrvataioluneTesneecrgy Osrithgognonaal
each
lbsasiss1of
(t), s2(t),..sM(t), function
N
si (t) sij j (t),
0 t T (5.5)
i==1,2,....,M
j
1
coefficient
Energy signal
6
Coefficients:
T
sij si (t) j (t)dt,
i=1,2,....,M (5.6)
0 j=1,2,....,M
Real-valued basis functions:
i j
(t)dt ij 1 if i j
0 if i j
(5.7)
0 (t)
7
A) SYNTHESIZER FOR GENERATING THE SIGNAL SI(T).
B) ANALYZER FOR GENERATING THE SET OF SIGNAL
VECTORS SI.
8
Each signal in the set si(t) is completely determined by the
vector of its coefficients
si1
s
i2
.
si i 1,2,....,M (5.8)
.
, .
siN
9
The signal vector si concept can be extended to 2D, 3D etc. N-
dimensional Euclidian space
Provides mathematical basis for the geometric representation
of energy signals that is used in noise analysis
Allows definition of
Length of vectors (absolute value)
Angles between vectors
Squared value (inner product of si with itself)
Matrix
si 2
si T si Transposition
N
= sij2 , i (5.9)
j 1 1,2,....,M
10
ILLUSTRATING THE
GEOMETRIC
REPRESENTATIO N OF
SIGNALS FOR THE CASE
WHEN N 2 AND M 3.
(TWO DIMENSION AL
SPACE, THREE
SIGNALS)
11
What is the relation between the vector representation of a
signal and its energy value?
N
Where si(t) is as in (5.5): (5.5)
si (t) sijj (t),
j1
12
E i sij (t) sik k (t) dt
T N N
After
substitution: j
k
0 j1
1
N N T
(5.11)
After Ei
j 1
k sij sik 0 j (t)k (t)dt
regrouping: 1
Φj(t) is orthogonal, N
2
E s2 = si (5.12)
so finally we i
j ij
have: 1
2 N
15
ANGLE BETWEEN TWO SIGNALS
The cosine of the angle Θik between two signal vectors
si and sk is equal to the inner product of these two
vectors, divided by the product of their norms:
sT s
cosik i k (5.15)
si sk
(5.16)
2
s1 (t)s 2 (t)dt s 2
1 s22
(t)dt (t)dt
accept without
proof…
17
Gram-schmidt Orthogonalization Procedure
Assume a set of M energy signals denoted by s1(t), s2(t), .. , sM(t).
1. Define the first basis
function starting with s1 as:
1 (t) s1(t) (5.19)
(where E is the energy of the E1
signal) (based on 5.12)
2. Then express s1(t) using the
basis function and an energy s1 (t) E11 (t) =s111 (t)
related coefficient s11 as: (5.20)
T
3. Later using s2 define the s21 s2 (t)1(t)dt (5.21)
coefficient s21 as: 0
18
4. If we introduce the g2 (t) s2 (t) s211(t)
intermediate function g2 as:
(5.22)
g2 (t)
Orthogonal to φ (t)
2 (t) (5.23)
1
20
Special Case:
For the special case of i = 1 gi(t) reduces to si(t).
General case:
21
22
Additive White Gaussian Noise
(AWGN)
Thermal noise is described by a zero-mean Gaussian random
process, n(t) that ADDS on to the signal => “additive”
Its PSD is flat, hence, it is called white noise.
Autocorrelation is a spike at 0: uncorrelated at any non-zero lag
[w/Hz]
Power spectral
Density
(flat => “white”)
Autocorrelation
Function
Probability density function (uncorrelated)
(gaussian)
23
24
Coherant Detection of Signals in
Noise:
“likelihoods”
26
Correlator Receiver
0 r( ) si *
( )d r (t), s (t)
Recall: correlation operation is the projection of the received
signal onto the signal space!
Tb
0
S1 (t) n(t)
or
V (t) -
Threshold device
S 2 (t) n(t) +
(A\D)
Sampl
e every
Tb Tb
seconds
0
S2 (t) integrator
28
29
Probability Of Error
30
Signal Constellation Diagram
A constellation diagram is a representation of a signal modulated
by a digital modulation scheme such as quadrature amplitude
modulation or phase-shift keying.
31
32
VEMU INSTITUTE OF TECHNOLOGY
(Approved by AICTE, New Delhi & Affiliated to JNTUA,
Ananthapuramu)
P.Kothakota, Puthalapattu (M), Chittoor Dist – 517 112 AP, India
By
B SAROJA
Associate Professor Dept. of . ECE
Contents
Equivalence theorem:
Performing bandpass linear signal processing
followed by
heterodying the signal to the baseband, …
… yields the same results as …
… heterodying the bandpass signal to the baseband , followed by a
baseband linear signal processing.
3
PASSBAND TRANSMISSION MODEL
4
Types Of Digital Modulation
Amplitude Shift Keying (ASK)
The most basic (binary) form of ASK involves the process of switching
the carrier either on or off, in correspondence to a sequence of digital
pulses that constitute the information signal. One binary digit is
represented by the presence of a carrier, the other binary digit is
represented by the absence of a carrier. Frequency remains fixed
Frequency Shift Keying (FSK)
The most basic (binary) form of FSK involves the process of varying
the frequency of a carrier wave by choosing one of two frequencies
(binary FSK) in correspondence to a sequence of digital pulses that
constitute the information signal. Two binary digits are represented
by two frequencies around the carrier frequency. Amplitude remains
fixed
Phase Shift Keying (PSK)
Another form of digital modulation technique which we will not
discuss
5
BINARY PHASE SHIFT KEYING (PSK)
Baseband
Data
1 0 0 1
BPSK
modulated
signal
s1 s0 s0 s1 where
s0 =-Acos(ct) and s1 =Acos(ct)
Major drawback – rapid amplitude
change between symbols due to phase
discontinuity, which requires infinite bandwidth.
Binary Phase Shift Keying (BPSK) demonstrates
better performance than ASK and BFSK
BPSK can be expanded to a M-ary 6
scheme,
BPSK TRANSMITTER
7
BINARY TO
BIPOLAR
CONVERSION
8
COHERENT BPSK RECEIVER
9
BPSK WAVEFORM
10
11
QPSK
⚫ Quadrature Phase Shift Keying (QPSK) can be interpreted
as two independent BPSK systems (one on the I-channel
and one on Q-channel), and thus the same performance
but twice the bandwidth (spectrum) efficiency.
⚫ Quadrature Phase Shift Keying has twice the bandwidth
efficiency of BPSK since 2 bits are transmitted in a
single modulation symbol
⚫ Quadrature Phase Shift Keying (QPSK) has twice the
bandwidth efficiency of BPSK, since 2 bits are transmitted
in a single modulation symbol.
12
Symbol and corresponding phase shifts in QPSK
13
QPSK
14
15
Now we have two basis functions
Es = 2 Eb since 2 bits are transmitted per
I = in-phassymbol e component from sI(t).
Q = quadrature component that is sQ(t).
16
QPSK Transmitter
17
QPSK Waveforms
18
QPSK Receiver
19
Types of QPSK
Q Q Q
I I I
Baseband
Data
1 0 0 1
BFSK
modulated
signal
f1 f0
f0
f1
22
Amplitude Shift Keying (ASK)
Baseband
Data
1 0 0 1 0
ASK
mod
signal
ulate
Acos(t) d Acos(t)
24
Power Spectral Density (PSD)
In practical, pulse shaping should be considered for a precise bandwidth
measurement and considered in the spectral efficiency calculations.
Power spectral density (PSD) describes the distribution of signal power in the
frequency domain. If the baseband equivalent of the transmitted signal sequence is
given as
gt ak pt kTs ak : Baseband modulation symbol
k
Ts : Signal interval pt : Pulse shape
then the PSD of g(t) is given as
1
g f P f a f
2
where P f Fpt
Ts
a f Ra ne j
2fnTs 1 n
*
R n 2 E ak
a kn
a
M-ARY Phase Shift Keying
(MPSK)
In M-ary PSK, the carrier phase takes on one of the M
possible values, namely i = 2 * (i - 1) / M
where i = 1, 2, 3, …..M.
The modulated waveform can be expressed as
26
The above equation in the Quadrature form
is
29
Coherent M-ARY PSK Receiver
30
M-ARY Quadrature
Amplitude Modulation
It’s a Hybrid modulation (QAM)
As we allow the amplitude to also vary with the phase, a
new modulation scheme called quadrature amplitude
modulation (QAM) is obtained.
The constellation diagram of 16-ary QAM consists of a
square lattice of signal points.
Combines amplitude and phase modulation
One symbol is used to represent n bits using one symbol
BER increases with n,
31
The general form of an M-ary QAM signal can
be
defined as
where
Emin is the energy of the signal with the lowest
amplitude and
ai and bi are a pair of independent integers chosen
according to the location of the particular signal
point.
32
M-PSK AND M-QAM
an an
Tradeoffs
– Higher-order modulations (M large) are more spectrally
efficient but less power efficient (i.e. BER higher).
– M-QAM is more spectrally efficient than M-PSK
but also more sensitive to system nonlinearities.
33
QAM Constellation Diagram
34
Differential Phase Shift Keying
(DPSK)
35
DPSK Waveforms
36
Transmitter/Generator of DPSK Signal
37
Non-coherent Detection
38
Non-coherent DPSK Receiver
DPSK Receiver
40
Comparisons Between Modulation Techniques
41
VEMU INSTITUTE OF TECHNOLOGY
(Approved by AICTE, New Delhi & Affiliated to JNTUA,
Ananthapuramu)
P.Kothakota, Puthalapattu (M), Chittoor Dist – 517 112 AP, India
By
B SAROJA
Associate Professor
Dept. of . ECE
Contents
Error Detection & Correction
Repetition & Parity Check Codes, Interleaving Code
Vectors and Hamming Distance Forward Error
Correction (FEC) Systems
Automatic Retransmission Query (ARQ)
Systems
Linear Block Codes –Matrix Representation of
Block Codes
Convolutional Codes – Convolutional Encoding,
Decoding Methods.
Introduction
: Types
of
Errors
3
Single bit errors are the least likely type of errors in serial data
transmission because the noise must have a very short duration which
is very rare. However this kind of errors can happen in parallel
transmission.
Example:
If data is sent at 1Mbps then each bit lasts only 1/1,000,000 sec. or 1 μs.
For a single-bit error to occur, the noise must have a duration of only 1
μs, which is very rare.
4
Burst Error
5
6
The term burst error means that two or more bits in the data unit have
changed from 1 to 0 or from 0 to 1.
Burst errors does not necessarily mean that the errors occur in
consecutive bits, the length of the burst is measured from the first
corrupted bit to the last corrupted bit. Some bits in between may not
have been corrupted.
7
Burst error is most likely to happen in serial transmission since the duration of
noise is
normally longer than the duration of a bit.
The number of bits affected depends on the data rate and duration of noise.
Example:
8
Error Detection
Error detection means to decide whether the received data is correct or not
without having a copy of the original message.
Error detection uses the concept of redundancy, which means adding extra bits
for detecting
errors at the destination.
9
Error Correction
It can be handled in two
ways:
1) receiver can have the sender retransmit the entire data unit.
2) The receiver can use an error-correcting code, which
automatically corrects certain errors.
10
Single-bit Error Correction
To correct an error, the receiver reverses
the value of the altered bit. To do so, it
must know which bit is in error.
Number of redundancy bits needed
Let data bits = m
Redundancy bits = r
Total message sent = m+r
The value of r must satisfy the following
relation:
2r ≥ m+r+1
11
Error Correction
12
Repetetion
Retransmission is a very simple concept. Whenever one
party sends something to the other party, it retains a
copy of the data it sent until the recipient has
acknowledged that it received it. In a variety of
circumstances the sender automatically retransmits
the data using the retained copy.
13
Parity Check Codes
information bits transmitted =
k bits actually transmitted = n
= k+1 Code Rate R = k/n =
k/(k+1)
14
Parity Codes – Example 1
Even parity
(i) d=(10110) so,
c=(101101)
(ii) d=(11011) so,
c=(110110)
15
Parity Codes – Example 2
Coding table for (4,3) even parity
code
Dataword Codeword
0 0 0 0 0 0 0
0 0 1 0 0 1 1
0 1 0 0 1 0 1
0 1 1 0 1 1 0
1 0 0 1 0 0 1
1 0 1 1 0 1 0
1 1 0 1 1 0 0
1 1 1 1 1 1 1
16
Parity Codes
To decode
Calculate sum of received bits in block (mod 2)
If sum is 0 (1) for even (odd) parity then the dataword is the first k bits of the received
codeword
Otherwise error
Storage: As hard disks and other storage devices are used to store user and system
data, there is always a need to arrange the stored data in an appropriate way.
18
Code Vectors
In practice, we have a message (consisting of words,
numbers, or symbols) that we wish to transmit. We
begin by encoding each “word” of the message as a
binary vector.
A binary code is a set of binary vectors (of the same
length) called code vectors.
The process of converting a message into code vectors is
called encoding, and the reverse process is called
decoding.
19
Hamming Distance
Hamming distance is a metric for comparing two binary data strings.
While comparing two binary strings of equal length, Hamming distance is
the number of bit positions in which the two bits are different.
The Hamming distance between two strings, a and b is denoted as d(a,b).
It is used for error detection or error correction when data is transmitted
over computer networks. It is also using in coding theory for comparing
equal length data words.
Example :
Suppose there are two strings 1101 1001 and 1001 1101.
11011001 ⊕ 10011101 = 01000100. Since, this contains two 1s, the
Hamming distance, d(11011001, 10011101) = 2.
20
FEC System
21
Forward error correction (FEC) or channel coding is a
techniqueused forcontrollingerrorsin data
transmissionover unreliableornoisycommunication
channels.
The central idea is the sender encodes the message in
a redundant way by using an error-correcting code (ECC).
FEC gives the receiver the ability to correct errors without
needing a reverse channel to request retransmission of
data, but at the cost of a fixed, higher forward channel
bandwidth.
FEC is therefore applied in situations where
retransmissions
linakrse caonstdly owrhiemnpotsrsaibnlsem, siuttcinhgas
otone-wmauyltciopmlemurenciceaivteiorn22
s
Automatic Repeat Request (ARQ)
Automatic Repeat reQuest (ARQ), also known as Automatic Repeat
Query, is an error-control method for data transmission that uses
acknowledgements and timeouts to achieve reliable data
transmission over an unreliable service.
If the sender does not receive an acknowledgment before the
timeout, it usually re-transmits the frame/packet until the sender
receives an acknowledgment or exceeds a predefined number of
re-transmissions.
The types of ARQ protocols include Stop-and-wait ARQ
Go-Back-N ARQ
Selective Repeat ARQ
All three protocols usually use some form of sliding window
protocol to tell the transmitter to determine which (if an
y) packets need to be retransmitted.
23
ARQ System
24
Block Codes
Data is grouped Into Blocks Of Length k bits
(dataword)
Each dataword is coded into blocks of length n bits
(codeword), where in general n>k
This is known as an (n,k) block code
A vector notation is used for the datawords and
codewords,
Dataword d = (d1 d2….dk)
Codeword c = (c1 c2……..cn)
The redundancy introduced by the code is
quantified by the code rate,
Code rate = k/n
i.e., the higher the redundancy, the lower the code rate
25
Block Code - Example
Data word length k = 4 Codeword length
n=7
This is a (7,4) block code with code rate
= 4/7 For example, d = (1101), c =
(1101001)
26
Linear Block Codes:Matrix
Representation
parity bits n-k (=1 for Parity
Check) Message m = {m1 m2 …
mk} Transmitted Codeword c
=
{c1 c2 … cn}
A generator matrix Gkxn
c mG
27
Linear Block Codes
Linearit c1 m1G,
y
c1 c2 (m1 c2 m 2 G
m2 )G
Example : 4/ 7 Hamming
Code
k = 4, n = 7
4 message bits at (3,5,6,7)
3 parity bits at (1,2,4)
Error correcting capability
=1 Error detecting capability
=2
28
Linear Block Codes
If there are k data bits, all that is required is to hold k linearly
independent code words, i.e., a set of k code words none of
which can be produced by linear combinations of 2 or more
code words in the set.
29
Linear Block Codes
For example for a (7,4) code, only four codewords are
required, e.g.,
1 0 0 0 1 1 0
0 1 0 0 1 0 1
0 0 1 0 0 1 1
0 0 0 1 1 1 1
• So, to obtain the codeword for dataword 1011, the first, third
and fourth codewords in the list are added together, giving
1011010
• This process will now be described in more detail
30
An (n,k) block code has code vectors
d=(d1 d2….dk) and c=(c1 c2……..cn)
d3 d1 d2
32
So,
k k k k
c3 d 3i ai d
1i ai d 2i ai
i1 (d 1i d 2 i )a i i1 i1
i1
c3 c1 c2
0 is always a codeword, i.e.,
Since all zeros is a dataword
then,k
c 0 ai
0
i1 33
Decoding Linear Codes
One possibility is a ROM look-up table
In this case received codeword is used as an address
Example – Even single parity check code;
Address Data
000000 0
000001 1
000010 1
000011 0
……… .
Data output is the error flag, i.e., 0 –
codeword ok, If no error, dataword is first k
bits of codeword
For an error correcting code the ROM can
also store datawords. 34
Convolutional Codes
Block codes require a
buffer Example
k=1
n=2
Rate R = ½
35
Convolutional Codes:Decoding
Encoder consists of shift registers forming a finite state machine
Decoding is also simple – Viterbi Decoder which works by tracking
these states First used by NASA in the voyager space programme
Extensively used in coding speech data in mobile phones
36