Complete Project Report
Complete Project Report
GSM INTRODUCTION
GSM
INTRODUCTION -----
1. Global System for Mobile communications (GSM: originally from Groupe Spcial Mobile) is the most popular standard for mobile phones in the world. 2. GSM is used by over 2 billion people across more than 212 countries and territories.
3. GSM uses a variation of time division multiple access (TDMA) and is the most widely used of the three digital wireless telephony technologies (TDMA, GSM, and CDMA). 4. GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. It operates at either the 900 MHz or 1800 MHz frequency band. 4. GSM differs from its predecessors in that both signaling and speech channels are digital call quality, and so is considered a second generation (2G) mobile phone system. 5. GSM standard is advantageous to both consumers (who benefit from the ability to roam and switch carriers without switching phones) and also to network operators (who can choose equipment from any of the many vendors implementing GSM). 6. Newer version of GSM is Release97 which has packet data capabilities , by means of GPRS (General Packet Radio Services ). Release 97 introduced higher speed data transmission using Enhanced Data Rates for GSM Evolution (EDGE).
7. GSM, together with other technologies, is part of the evolution of wireless mobile telemmunications that includes High-Speed Circuit-Switched Data (HCSD), General Packet Radio System (GPRS), Enhanced Data GSM Environment (EDGE), and Universal Mobile Telecommunications Service (UMTS).
GSM OBJECTIVES--------In June 1982, the European Conference of Postal and Telecommunications Administrations (CEPT), created the Groupe Spcial Mobile (GSM) to develop a standard for a mobile telephone system that could be used across Europe.Developing the GSM has mainly two objectives ---1. Pan -European roaming ,which offers compatibility throughout the European continent & 2. Interaction with the integrated service digital network (ISDN), which offers the capability to extend the single subscriber-line system to a multiservice system with various services which are currently offered only through diverse telecommunications networks.
CHAPTER ---- 2
Comparison of mobile phone standards
Global System for Mobile Communications (AKA GSM, around 8085 % market share) and IS-95 (AKA cdmaOne, around 1015 % market share[1]) are the two most prevalent mobile communication technologies. Both technologies have to solve the same problem: to divide the finite RF spectrum among multiple users. TDMA (Time Division Multiple Accessunderlying technology used in GSM's 2G) does it by chopping up the channel into sequential time slices. Each user of the channel takes turns to transmit and receive signals. In reality, only one person is actually using the channel at a specific moment. This is analogous to time-sharing on a large computer server. CDMA (Code Division Multiple Accessunderlying technology used in GSM's 3G and IS-95's 2G) on the other hand, uses a special type of digital modulation called spread spectrum which spreads the voice data over a very wide channel in pseudorandom fashion. The receiver undoes the randomization to collect the bits together and produce the sound. For comparison, imagine a cocktail party, where couples are talking to each other in a single room. The room represents the available bandwidth. In GSM, a speaker takes turns
talking to a listener. The speaker talks for a short time and then stops to let another pair talk. There is never more than one speaker talking in the room, no one has to worry about two conversations mixing. In CDMA, any speaker can talk at any time; however each uses a different language. Each listener can only understand the language of their partner. As more and more couples talk, the background noise (representing the noise floor) gets louder, but because of the difference in languages, conversations do not mix.
Comparison table
Feature Technology Generation Digital Age Worldwide market share[2] Roaming Handset interoperability NMT FDMA 1G No 1981 0% Scandinavia None GSM TDMA 2G Yes 1991 80% UMTS W-CDMA 3G Yes 2001 4% IS-95 CDMA 2G Yes 1995 0.6% Limited None CDMA2000 CDMA 3G Yes 2000 12% Limited RUIM (not commonly implemented)
Interferes with some None electronics, None None None such as amplifiers Good Good Smaller cells Unlimited Unlimited coverage coverage and lower cell size, cell size, low due to low indoors on indoors low transmitter frequencies 850/900 coverage due transmitter power MHz. to 2100 MHz power permits large Repeaters frequency permits cells possible. 35 large cells
km hard limit. 5 MHz = 2 0.2 MHz = 8 Mbps. Each timeslots. call uses 1.8Frequency Each 12 kbit/s ? ? Very low utilization/Call timeslot can depending on Comparable Comparable density density hold up to 2 chosen to UMTS to UMTS calls through quality and interleaving. audio complexity. Very good Lower due to due to simple high Lower due Lower due to Low, due to protocol, demands of to high high demands high good WCDMA demands of of CDMA Battery life transmitter coverage and power CDMA power control power (1 mature, control and power and young watt) poweryoung control. chipsets. efficient chipsets. chipsets. Handoff Hard Hard Soft Soft Soft Breathing No No Yes Yes Yes Concentrated Concentrated among a few among a few Intellectual property ? Qualcomm Qualcomm industry industry participants participants
CHAPTER ----3
Advantages
And
Disadvantages of 2G GSM
Advantages of 2G GSM
GSM is mature; this maturity means a more stable network with robust features. Less signal deterioration inside buildings. Ability to use repeaters. Talktime is generally higher in GSM phones due to the pulse nature of transmission. The availability of Subscriber Identity Modules allows users to switch networks and handsets at will, aside from a subsidy lock. GSM covers virtually all parts of the world so international roaming is not a problem. The much bigger number of subscribers globally creates a better network effect for GSM handset makers, carriers and end users.
Disadvantages of 2G GSM
Pulse nature of TDMA transmission used in 2G interferes with some electronics, especially certain audio amplifiers. 3G uses W-CDMA now. Intellectual property is concentrated among a few industry participants, creating barriers to entry for new entrants and limiting competition among phone manufacturers.[citation needed]
GSM has a fixed maximum cell site range of 35 km, which is imposed by technical limitations.
CHAPTER------4
GSM ARCHITECTURE
GSM ARCHITECTURE
------------
1. The Mobile Station(MS) 2. Base Station subsystem(BSS) 3. Network and Swiching subsystem(NSS)
. 4 Operation subsystem(OSS)
GSM
NSS
MS
BSS
OSS
1.The Mobile Station(MS)--- It may be a stand alone piece of equipment for certain services or support the connection of external terminals.
MS includes mobile equipment(ME) and a subscriber identity module (SIM) . SIM a subscriber module which stores all subscriber related information. ME can not be personali assigned to one subscriber . When a subscribers SIM is inserted in ME of an MS , that MS belongs to subscriber and call is deliver to that MS .
.
2. Base Station Subsystem(BSS)
-------------
The Base Station Subsystem (BSS) is the section of a traditional cellular telephone network which is responsible for handling traffic and signaling between a mobile phone and the Network Switching Subsystem.
The BSS carries out transcoding The BSS carries out transcoding of speech channels, allocation of radio channels to mobile phones, paging, quality management of transmission and reception over the Air interface and many other tasks related to the radio network.
BSS consists of a base transceiver station (BTS)and a base station controller (BSC) which may cotrol several BTSs .
BTS contains an equipment of transmitting and receiving radio signals similar to ME of an MS.
NSS includes main swiching of GSM. It manages the communication between GSM users and other telecommunications users.
It is owned and deployed by mobile phone operators and allows mobile phones to communicate with each other and telephones in the wider telecommunications network.
The architecture closely resembles a telephone exchange The Network Switching Subsystem, also referred to as the GSM core network, usually refers to the circuit-switched core network, used for traditional GSM services such as voice calls, SMS, and Circuit Switched Data calls.
ii)Interworking Function(IWF) iii)Home Location Register(HLR)--- The 'Home Location Register' or HLR is a central database that contains details of each mobile phone subscriber that is authorized to use the GSM core network. The HLR stores details of every SIM card issued by the mobile phone operator
iv) Visitor Location Register (VLR)---- The Visitor Location Register or VLR is a temporary database of the subscribers who have roamed into the particular area which it serves. Each Base Station in the network is served by exactly one VLR, hence a subscriber cannot be present in more than one VLR at a time.
4.Operation subsystem-------There are areas of OSS i)Network operation and maintance functions ii)Subscription management, including charging and billing iii)Mobile equipment management
HL R
A-Interface Radio
MSC
BSC
BTS
VLR
MS
OAM
CHAPTER-----5
Layer modeling (OSI model )
Layer modeling (OSI model)--The Open system Interconnection(OSI) of GSM consists of five layers-- Transmisson(TR) Radio recorce management(RR) Mobility management(MM) Communition management(CM) and Opertion, administration, and maintenance(OAM)
Users
Operators
CM OAM MM
RR Transmission
the NSS is the significant element in the CM layer. The following are the functions are the parts of the CM layer ---1. Call controlthe CM layer sets up calls , maintains calls, and releases calls. The CM layer interacts among MSC/VLR, GMSC, IWF , AND HLR for managing circuit-oriented services, including speech and circuit data. 2. Supplementary services management-- Allows users to have some control of their calls in the network, and has specific variations from the basic services . 3. Short message service(SMS)---related to the point-to point SMS .A SMS
service center (SMS -SC) may connect to several GSM networks. Short message transmission requires setting up a signaling connection between the mobile station and the MSC . The two functions of SMS are ---i) Mobile-originated short message ii) Mobile-terminated short message
CHAPTER ----6
Transmission
Transmission ---A 4-kHz analog speech signal converts to a 64 kbps digital signal , then down converts to 13 kbps before modulation. Using a rate of 13-kbps instead of 64 kbps allows the 13-kbps data rate transmission to occur over a narrowband channel . Since the radio spectrum is a precious and li8mited resource, using less bandwidth per channel provides more channels within a given radio spectrum. Digital speech uses. 1. regular pulse excitation (RPE)---Generates the impulse noise to simulate the nature of speech. 2. Linear prediction coding(LPC)----- Generates speech waveform by using a filter with eight transmitted coefficients with a speech frame of 20 ms ; 260 bits represent a 20ms speech frame .
There are two modes of transmission in GSM , continuous (normal mode ) and discontinuous . The discontinuous transmission decreases the effective radio transmission encoding of speech at 13 kbps from a bit rate around 500 bps without speech.
CHAPTER ---7
GSM Channels and channel modes------Channel structure---The services offered to users have four different modes, three data modes, and one speech mode. The radio transmission uses the physical channels.
Personal computer
PSTN
Fig:(a)
ISDN
Personal computer
Personal computer
Fig:(b)
GSM
ISDN
Personal computer
3. TCH/(one-eighth rate)Used for low-rate signaling channels, common channels, and data channels. Logical channels ---Common channels. all the common channels are embedded in different traffic channels They are grouped by the same cycles(51.8 BP) where BP is burst period i.e. time slot which is 577micro sec. Downlink common channels ----There are five downlink unidirectional channels, shared or grouped by a TCH. Frequency correction channels (FCCH) Synchronization channels (SCH) Broadcast control channels (BCCH Paging and access grant channel(PAGCH) Call broadcast channel (CBCH)
Uplink common channels -----The random access channel (RACH) is the only common uplink channel RACH is the channel that the mobile station chooses to access the calls . Signaling channels Slow associated control channel (SACCH)
CHAPTER ----8
TECHNICAL VIEW
TECHNICAL VIEW------- GSM is a cellular network, which means that mobile phones connect to it by searching for cells in the immediate vicinity. GSM networks operate in four different frequency ranges. Most GSM networks operate in the 900 MHz or 1800 MHz bands. There are two types of frequency bands used in GSM. In the 900 MHz band the uplink frequency band is 890915 MHz, and the downlink frequency band is 935960 MHz. This 25 MHz bandwidth is subdivided into 124 carrier frequency channels, each spaced 200 kHz apart. Time division multiplexing is used to allow eight full-rate or sixteen half-rate speech channels per radio frequency channel. There are eight radio timeslots (giving eight burst periods) grouped into what is called a TDMA frame. Half rate channels use alternate frames in the same timeslot. The channel data rate is 270.833 kbit/s, and the frame duration is 4.615 ms. The transmission power in the handset is limited to a maximum of 2 watts in GSM850/900 and 1 watt in GSM1800/1900. GSM has used a variety of voice codices to squeeze 3.1 kHz audio into between 5.6 and 13 kbit/s.
Originally, two codecs, named after the types of data channel they were allocated, were used, called Half Rate (5.6 kbit/s) and Full Rate (13 kbit/s). These used a system based upon linear predictive coding (LPC).
In addition to being efficient with bitrates, these codecs also made it easier to identify more important parts of the audio, allowing the air interface layer to prioritize and better protect these parts of the signal
GSM was further enhanced in 1997 with the Enhanced Full Rate (EFR) codec, a 12.2 kbit/s codec that uses a full rate channel.
Finally, with the development of UMTS, EFR was refactored into a variable-rate codec called AMR-Narrowband, which is high quality and robust against interference when used on full rate channels, and less robust but still relatively high quality when used in good radio conditions on half-rate channels.
Modulation Scheme---------The modulation used in GSM is Gaussian minimum-shift keying (GMSK), a kind of continuous-phase frequency shift keying. In GMSK, the signal to be modulated onto the carrier is first smoothed with a Gaussian low-pass filter prior to being fed to a frequency modulator, which greatly reduces the interference to neighboring channels (adjacent channel interference). Bandwidth time product BT= 0.3
Minimum means the minimum tone separation. GMSK utilizes A small spectrum bandwidth to send a GSM carrier channel. The modulation rate of a GSM carrier channel is 270 kbps.
MSK
Frequency Hopping
In frequency hopping systems, the transmitter changes the carrier frequency according to a certain "hopping" pattern . The advantage is that the signal sees a different channel and a different set of interfering signals during each hop. This avoids the problem of failing communication at a particular frequency, because of a fade or a particular interferer.
Slow Frequency Hopping (SFH) In this case one or more data bits are transmitted within one hop. An advantage is that coherent data detection is possible. Often, systems using slow hopping also employ (burst) error control coding to restore loss of (multiple) bits in one hop.
Fast Frequency Hopping (FFH) One data bit is divided over multiple hops. In fast hopping, coherent signal detection is difficult, and seldom used. Mostly, FSK or MFSK modulation is used.
Slow frequency hopping is a popular technique for wireless LANs. In GSM telephony, slow frequency hopping can be used, at the discretion of the network control software. It avoids that a stationary terminal that happens to be located in a fade looses its link to the base station. As nearby hopping interferers are unlikely to continuously transmit in the same frequency slot as the reference user, the near-far problem is less severe than in direct sequence (DS) CDMA. Particularly for wireless LANs, where terminals can be located anywhere, this advantage made SFH popular.
Time division multiple access------- Time division multiple access (TDMA) is a channel access method for shared medium (usually radio) networks. It allows several users to share the same frequency channel by dividing the signal into different timeslots. The users transmit in rapid succession, one after the other, each using his own timeslot. This allows multiple stations to share the same transmission medium (e.g. radio frequency channel) while using only the part of its bandwidth they require. TDMA is used in the digital 2G cellular systems such as Global System for Mobile Communications (GSM), IS-136, Personal Digital Cellular (PDC) and iDEN, and in the Digital Enhanced Cordless Telecommunications (DECT) standard for portable phones. It is also used extensively in satellite systems, and combat-net radio systems. TDMA frame structure showing a data stream divided into frames and those frames divided into timeslots. TDMA is a type of Time-division multiplexing, with the special point that instead of having one transmitter connected to one receiver, there are multiple transmitters. In the case of the uplink from a mobile phone to a base station this becomes particularly difficult because the mobile phone can move around and vary the timing advance required to make its transmission match the gap in transmission from its peers.
TDMA features
Shares single carrier frequency with multiple users Non-continuous transmission makes handoff simpler Slots can be assigned on demand in dynamic TDMA Less stringent power control than CDMA due to reduced intra cell interference Higher synchronization overhead than CDMA Advanced equalization is necessary for high data rates Cell breathing (borrowing resources from adjacent cells) is more complicated than in CDMA Frequency/slot allocation complexity Pulsating power envelop: Interference with other devices
Burst and training sequences-------In TDMA signal transmits in bursts. The time interval of the burst brings the amplitude of a transmitted signal up from a starting value of 0 to its normal value . Then a packet of bits is transmitted by a modulated signal Afterward, the amplitude decreases to zero . These burst occur only at the mobile station transmission or at the base station if the adjacent burst is not transmitted. There are trail bits and training sequence bits within a burst. The tail bits are three 0 bits added at the beginning and at the end of each burst ,which provide the guard time.
The training sequence is a sequence known by the receiver which trains an equalizer, a device which reduces the intersymbol interference. The training sequence bits are inserted in the middle of a time slot some time is called a midamble , for the same purpose as a preamble , so that the equalizer can minimize its maximum distance with any useful bit. There are eight different training sequences , with little between any distinguish the received signal from the interference signal . two sequences to
41
35
38
64
38
3. The F and S bursts ,used in FCCH and has the simplest format
Handover---The GSM handover is not specified as a standard . It is a feature of mobile assistance handover (MAHO) and is carried out within the unit.The mobile station scans for another radio carrier under direction of a base station .It moniters those time slots which are not its own assigned time slots for receiving the signal . In this case , on the request of a base station, the signal strength of a specified radio carrier is measured in one time frame , and is called MAHO . on request , the measurements are forwarded to the base station to asset in the handover process. This
The MSC uses two sets of information to decide whether a handover should be initiated and which BTS is the candidate BTS for the handover . The two sets are ---1. the signal strengths of the MS as received at the neighboring BTSs and 2. the strengths of neighboring BTSs received at the MS . The latter information is from MAHO.
GSM provides handover processes for the following: Quality (uplink/downlink). Interference (uplink/downlink). RF level (uplink/downlink). MS distance. Power budget. More handover algorithms have been developed for specific applications, such as microcellular, and are currently being implemented.
Mobile and wireless Communication Support for voice and data services
Total mobility International access, chip-card enables use of access points of different providers Worldwide connectivity One number, the network handles localization
High capacity
High transmission quality High audio quality and reliability for wireless, uninterrupted phone calls at higher speeds (e.g., from cars, trains) Security functions Access control, authentication via chip-card and PIN
CHAPTER----9
Cell Size in GSM
Cell Size in GSM ------ There are four different cell sizes in a GSM networkmacro, micro, pico and umbrella cells The coverage area of each cell varies according to the implementation environment. Macro cells can be regarded as cells where the base station antenna is installed on a mast or a building above average roof top level. Micro cells are cells whose antenna height is under average roof top level; they are typically used in urban areas. Picocells are small cells whose coverage diameter is a few dozen meters; they are mainly used indoors. Umbrella cells are used to cover shadowed regions of smaller cells and fill in gaps in coverage between those cells. Cell horizontal radius varies depending on antenna height, antenna gain and propagation conditions from a couple of hundred meters to several tens of kilometers. The longest distance the GSM specification supports in practical use is 35 kilometres (22 mi). There are also several implementations of the concept of an extended cell, where the cell radius could be double or even more, depending on the antenna system, the type of terrain and the timing advance.
Indoor coverage is also supported by GSM and may be achieved by using an indoor picocell base station, or an indoor repeater with distributed indoor antennas fed through power splitters, to deliver the radio signals from an antenna outdoors to the separate indoor distributed antenna system.
These are typically deployed when a lot of call capacity is needed indoors, for example in shopping centers or airports. However, this is not a prerequisite, since indoor coverage is also provided by in-building penetration of the radio signals from nearby cells.
CHAPTER ------10
Services Provided by GSM
1.
when there is actually data to transmit Telecommunication services can be classified into 1. Bearer Services, 2. Teleservices, and 3. Supplementary Services.
4. Call diversion, caller identification, encrypted speech, fax and error protected data are a few examples of current and new services provided by the GSM. Supplementary services ,allowos users to have some comtrol of their calles in the network and has variations from basic services . Supplementary services are provided on top of teleservices or bearer services, and include features such as caller identification, call forwarding, call waiting, multiparty conversations, and barring of outgoing (international) calls, among others.
SMSservice center (SMS-SC ) may connect to several GSM networks . Short message transmission requires setting up a signaling connection between the mobile station and the MSC . The tqo functions of SMS are i)Mobile originating short message ii)Mobile terminating short message
3.. Teleservices:
A Teleservice utilizes the capabilities of a Bearer Service to transport data, defining which capabilities are required and how they should be set up. The most basic Teleservice supported by GSM is telephony. There is an emergency service, where the nearest emergency service provider is notified by dialing three digits (For GSM it is 112). The Telephony, Teleservice and Emergency Teleservice cover normal speech calls. These are both the fundamental services for making ordinary telephone calls, but they are separated because of a special need for Emergency calls.
When a call is made from a GSM Mobile Station, the type of service requested is indicated in the set-up message. This means that the GSM operator has the option to treat emergency calls differently by allowing mobile equipment without a SIM card to make them.
4. Bearer Services:
A bearer service provides the capacity necessary to transmit appropriate signals between two access points providing an interface to the network. In GSM asynchronous and synchronous data transmission rates upto 9.6 kbps are supported.
5. Supplementary Services:
The supplementary services basically consist of call forwarding and call barring.
expected that the roaming subscriber will pay the charges incurred for international rerouting of calls. So, GSM devised some flexible services that enable the subscriber to conditionally bar calls.
2 .Multi-Party:
Multi-Party Service: This service is similar to a conference type service, in that several calls may be connected with all parties talking to each other.
However, there are enough differences, caused by its application in the mobile environment, for it to be known by a different name.
3 .Communication of Interest:
Closer User Group: This service is provided on GSM to enable groups of subscribers to only call each other. In this way, intrusions can be limited only to those members who wish to talk to each other.
4 .Charging:
Advice of Charge: This service was designed to give the subscriber an indication of the cost of the services as they are used. Furthermore, those Service Providers who wish to offer rental services to subscribers without their own Subscriber Identity Module (SIM) can also utilize this service in a slightly different form.
CHAPTER---11
Conclusion
Conclusion:
Thus it seems that probably the potential of GSM is not fully realized till date. The real power of its capabilities is yet to be harnessed and will influence the human life in a big way in the future. The future has a lot to see in terms of the new generation state-of-the -art cellular phones and other devices being used in common.
CHAPTER----12
Overview of GSM
Overview of GSM----------Summary of physical layer parameters---TDMA Structure Time slots Frame interval Radio carrier no. 8 time slots per radio carrier .577 ms 8 time slots =4.615ms 124 radio carrier (935-960mhz uplink
890-915mhz downlink) Modulation Scheme Frequency hopping Gaussian MSK BT=.3 Slow frequency hopping 217hops/s)
GSMs Strenth-------GSM is first to apply the TDMA scheme developed for mobile radio systems . It has several features ---1. Roaming in European countries
2. Use of SIM cards 3. Control of transmission power 4. Discontinuous transmission 5. Mobile assisted handover
Convolution coding
CHAPTER--- 1
Abstract
Abstract
Channel coding refers to the class of signal transformations designed to improve communication performance by enabling the transmitted signals to better withstand the effects of various channel impairments, such as noise , interference, and fading. These signal processing techniques can be thought of as vehicles for accomplishing desirable system trade offs (e.g., error performance vs. bandwidth, power vs. bandwidth). The primary objective of spectrally efficient modulation techniques is to maximize bandwidth efficiency. The increasing demand for digital transmission channels has led to the investigation of spectrally efficient modulation technique to maximize bandwidth efficiency and thus help to ameliorate the spectral congestion problem. The channel coding techniques viz. Linear Block Code, Convolutional Code etc. have generally not been associated with voice grade telephone channels. Recently, however, there has been considerable interest in techniques that can provide coding gain for bandlimited channels. The motivation is to enable the reliable transmission of higher data rate over voice grade channels. In this design, various aspects of information theory are studied and a Convolutional encoder is implemented
CHAPTER----2
AND
For its efficient and reliable operation a digital communication system depends upon different types of encoders and decoders along with some other equipment. Decoders are used to decode the original bit stream from the encoded bit stream. The encoders are used for two purposes: Source coding Channel coding
In this section I will discuss about these two types of coding used in digital communication system, so that we can get a clear concept of coding. Source coding and channel coding play a very important role in design of an efficient and a reliable communication system.
In the present section, first I will discuss some information theoretic terms (in detail), which are frequently used in the coding theoy, then I will discuss about the coding
CHAPTER ----3
Coding theory
Coding theory------
Coding theory is a branch of mathematics and computer science dealing with the errorprone process of transmitting data across noisy channels, via clever means, so that a large number of errors that occur can be corrected. It also deals with the properties of codes, and thus with their fitness for a specific application. There are two classes of codes. 1. Source coding (Data compression) 2. Channel coding (Forward error correction) The first, source encoding, attempts to compress the data from a source in order to transmit it more efficiently. We see this practice every day on the Internet where the common "Zip" data compression is used to reduce the network load and make files smaller. The second, channel encoding adds extra data bits, commonly called redundancy bits, to make the transmission of data more robust to disturbances present on the transmission channel. The ordinary user may not be aware of many applications using channel coding. A typical music CD uses a powerful Reed-Solomon code to correct for scratches and dust. In this application the transmission channel is the CD itself. Cell phones also use powerful coding techniques to correct for the fading and noise of high frequency radio transmission. Data modems, telephone transmissions, and of course NASA all employ powerful channel coding techniques to get the bits through.
CHANNEL ENCODING---- Channel encoding theory is to find codes which transmit quickly, contain many valid code words and can correct or at least detect many errors. While not
mutually exclusive, performance in these areas is a trade off. So, different codes are optimal for different applications. The needed properties of this code mainly depend on the probability of errors happening during transmission. In a typical CD, the impairment is mainly dust or scratches. Thus codes are used in an interleaved manner. The data is spread out over the disk. Although not a very good code, a simple repeat code can serve as an understandable example. Suppose we take a block of data bits (representing sound) and send it three times. At the receiver we will examine the three repetitions bit by bit and take a majority vote. The twist on this is that we don't merely send the bits in order. We interleave them. The block of data bits is first divided into 4 smaller blocks. Then we cycle through the block and send one bit from the first, then the second, etc. This is done three times to spread the data out over the surface of the disk. In the context of the simple repeat code, this may not appear effective. However, there are more powerful codes known which are very effective at correcting the "burst" error of a scratch or a dust spot when this interleaving technique is used. The term algebraic coding theory denotes the sub-field of coding theory where the properties of codes are expressed in algebraic terms and then further researched. Algebraic Coding theory, is basically divided into two major types of codes 1. Linear block codes 2. Convolutional codes It analyzes the following three properties of a code -- mainly:
The channel coding theorem for a DMC is stated as follows: Given a DMS X with entropy H (X) bits/symbol and a DMC with a capacity Cs bits/symbol, if H (X) C, there exist a coding scheme for which the source output can be transmitted over the channel with an arbitrarily small probability error. Conversely, if H (X) > Cs, it is not possible to transmit information over the channel with an arbitrarily small probability error. Note that the channel-coding theorem only asserts the existence of code but it does not tell us how to construct these codes. The block diagram the communication channel is shown in the fig at next page.
CONVOLUTIONAL ENCODING
In telecommunication, a convolutional code is a type of error-correcting code in which (a) each m-bit information symbol (each m-bit string) to be encoded is transformed into an n-bit symbol, where m/n is the code rate (n m) and (b) the transformation is a function of the last k information symbols, where k is the constraint length of the code.
CHAPTER----4
Convolution codes
Convolution codes ---To convolutionally encode data, start with k memory registers, each holding 1 input bit. Unless otherwise specified, all memory registers start with a value of 0. The encoder has
n modulo-2 adders, and n generator polynomials one for each adder (see figure below). An input bit m1 is fed into the leftmost register. Using the generator polynomials and the existing values in the remaining registers, the encoder outputs n bits. Now bit shift all register values to the right (m1 moves to m0, m0 moves to m-1) and wait for the next input bit. If there are no remaining input bits, the encoder continues output until all registers have returned to the zero state. The figure below is a rate 1/3 (m/n) encoder with constraint length (k) of 3. Generator polynomials are G1 = (1,1,1), G2 = (0,1,1), and G3 = (1,0,1). Therefore, output bits are calculated (modulo 2) as follows: n1 = m1 + m0 + m-1 n2 = m0 + m-1
n3 = m1 + m-1.
+ 1
+ 2
+ 3 -----n
n mod-2 adders
The integer m is a parameter known as the constraint length of the convolution code. In practice , n and k are small integers and m is varied to control redundancy. The constraint length represents the no. of k bit shifts over which a single information bit can influence the encoder output. Since there are n code bits for each input group of k message bits, the code rate is k/n message bit per code bit, where k<n.
In present case convolution encoder is for 1/3 rate .the four outputs of shift register are s1,s2 , s3 and s4 . These outputs are inputted in a combinations of ex-or gates to produce a three bit convolved output u1, u2, and u3 as according to the following generator polynomial.
CHAPTER ---5
IMPLEMENTATION AND CIRCUIT DESIGN
Hardware Description:
For the design of encoder n =3, k =1, K = 3, we need data source shift register mod 2 adders Different blocks and components are described as follows:
Data Source:
For this I have used 5V power supply 1 SPDT switch In this 5V Logic State 1 0V Logic State 0 SPDT is such type of switch in which when one pole is one side the ground is connected and logic state 0 is obtained. While when pole is at the other side, supply voltage is connected and logic state 1 is obtained.
Shift Registers:
A group of cascaded flip-flops used to store related bits of information is known as a register. A register that is used to assemble and store information arriving from a serial source is called a shift register. Each flip flop output of a shift register is connected to the input of the following flip flop and a
common pulse is applied to all flip flops clocking them synchronously. The shift register IC74164 is an 8 bit shift register with each flip flop output externally accessible.
DESCRIPTION
The M54/74HC164 is a high speed CMOS 8 BIT SIPO SHIFT of REGISTER combined fabricated with true in silicon low gate power C2MOStechnology. It has the same highspeed performance LSTTL CMOS consumption. The HC164 is an 8 bit shift register with serial data entry and an output from each of the eight stages. Data is entered serially through one of two inputs (A or B), either of these inputs can be used as an active high enable for data entry through the other input. An unused input must be high, or both inputs connected together. Each low-to-high transition on the clock input shifts data one place to the right and enters into QA, the logic NAND of the two data inputs (A V B), the data that existed before the rising clock edge. A low level on the clear input overrides all other inputs and clears the register asynchronously, forcing all Q outputs low. All inputs are equipped with protection circuits against static discharge and transient excess voltage.
Mod 2 Adder:
For this XOR IC 7486 is used. This is a quad 2 input XOR gate.
Clock:
For controlling the operation of the flip flop in the shift register we need clock cycles which have been generated by 555timer. For generation of clock f on time 0.5 secs, we want:
Components:
555timer IC 10 k resistance 100K resistance 0.1 F capacitance 1000 F capacitance 1 2 1 2 1
Unit
inverted
at
the
output.
Our
component
SN7486
is
characterized for operation from 0 0C to 70 0C. Every IC s characterized by its own pin architecture, The architecture for our IC is given as adjacent showing the top view of the IC
These are five equivalent Exclusive-OR symbols valid for an 86 or LS86A gate in positive logic; negation may be shown at any two ports.
COMPONENT USED: A 12-0-12step down transformer-200ma Electrolytic capacitor of 1000F Regulator IC 7805 4 diode IN 4007
LM 7805
Features
Output Current up to 1A Output Voltages of 5, 6, 8, 9, 10, 12, 15, 18, 24V Thermal Overload Protection Short Circuit Protection Output Transistor Safe Operating Area Protection
CHAPTER----6
ABOUT THE CIRCUIT
CIRCUIT DIAGRAM
PCB LAUOUT
GENERATION OF CLOCK
Here IC 7555 is used for generating the clock pulses.Its IC configuration is same as that of IC 555.The circuit diagram for generating he clock pulses is given below Vcc
GND
LM555/NE555/SA555
Single Timer
Features :
High Current Drive Capability (200mA) Adjustable Duty Cycle Temperature Stability of 0.005%/C Timing From Sec to Hours Turn off Time Less Than 2Sec
Applications :
Precision Timing Pulse Generation Time Delay Generation Sequential Timing Internal Block Diagram :
Description :
The LM555/NE555/SA555 is a highly stable controller capable of producing accurate timing pulses. With monostable operation, the time delay is controlled by one external resistor and one capacitor. With astable operation, the frequency and duty cycle are accurately controlled with two external resistors and one capacitor
COMPONENT USED
POWER SUPPLY UNIT
A 9-0-9 step down transformer-200ma Electrolytic capacitor of 1000F Regulator IC 7805 4 diode IN 4007
ASTABLE CIRCUIT
2 , 10 K resistor 1 M resistor
PULSE
GENERATOR
CHAPTER ----7
PCB Designing
PCB Designing
The
heart
of
any
electronic
project
is
the
PCB.
Without a proper PCB the design may end up in total failure. A perfect PCB gives a facelift to the appearance and performance of the circuit and what described below: Materials Required: Copper clay board Enamel Paint or Marker Hand Drill Ferric Chloride Solution is of great importance is its neatness. An easy way to make the PCB is
In design of PCB, firstly we design the circuit with actual size of components on graph in design of PCB; firstly we design the circuit with actual size of components on a graph paper. Then we make the PCB layout by using the PCB Designing/Express PCB software. This finally designed
layout is now screen printed or drawn by hand using marker on the Copper clay board and is required to remove extra copper from the clay board. The screen-printed plate is dipped in the solution of FeCl3 +HCl. The plate is stirred for 1 or 2 hour or till the unpainted copper area is totally dissolved. The unwanted copper is dissolved and finally we get PCB fabricated. This is popularly known as ETCHING. The etched plate is washed with water and soap to remove marker ink.
PCB Testing: The tracks made are checked to be continuous. It is carried with the help of multimeter to get zero resistance.
Circuit Testing:
1. All individual components should be checked previously with multimeter. 2. IC base continuity should be checked after soldering. 3. All the components are soldered and check for the continuity.
Precautions:
1-While using the PCB designer/Express PCB software we must be careful about the proper track selection and also try to reduce the size as much as we can. 2-While etching we must be very careful otherwise the. Tracks can also be etched. The HCL should be used for reducing the speed of etching if needed. 3-While soldering we should avoid dry soldering. 4-After soldering the continuity should be checked.
EXPERIMENT
OBJECT:
To design a convolutional encoder 1\3rate when data bit is 101
OBSERVATION:
Let us assume the generator polynomials : U1(x)= U2(x)= U3(x)= We assume that initial contents of the shift register zero. By pressing the clear switch the contents of all flip flops becomes zero. The input data stream is applied tat serial input port. The clock switch is pressed at different timings and the register contents shifts one block to right direction. The output encoded message is obtained as-
Timing message
T0 T1 T2 T3 T4 T5 T6 T7 T8
CHAPTER----8
DISCUSSION
DISCUSSION
During commencement of any work A man has to face many problems and if he has faced these problems patiently then it is true he will be successful in his object. In my design I have faced many problems and tried to remove them, the result of that is now before us. For hardware implementation of convolutional encoder we have used shift registers. In shift register, the contents of flip flops are shifted to the next flip flop when a clock is applied. The shifting in contents of flip flops is observed when negative edge of clock begins. At a particular instant the output of flip flops are X-ORed and encoded message is displayed by LEDs. If there is any discrepancy in results then this may be due to presence of noise.
CHAPTER----9
References
References
[1] Simon Haykin, Digital Communications (Wiley, 2000) [2] Bernard Sklar, Digital Communications : Fundamentals and Applications (Pearson Education Asia, 2001) [3] John G. Proakis, Digital Communications (McGrawHill, Inc., 1995) [4] Hwei Hsu, Schaums Outlines : Analog and Digital Communications (Tata Mc Graw-Hill Publishing Company Limited, 2004)
APPENDIX