Advanced Communication Systems
Advanced Communication Systems
M � Scheme
e-TEXTBOOK
on
for
V Semester DECE
Dr.M.JeganMohan,M.E.,MBA.,Ph.D.,(Management).,Ph.D.,(Engg).,M.I.S.T.E.,
Principal,
Uthappanaickanoor,
1.Mr.A.Sudakar,BE.,M.E.,
2.Mr.J.Ramakrishnan,BE.,PGDCA.,M.E
Erode
3. Mr.N.R.Sivakumar,BE.,M.E.,
Perunthurai, Erode
Validated by
Professor/ECE department
M � Scheme
e-TEXTBOOK
on
for
V Semester DECE
Dr.M.JeganMohan,M.E.,MBA.,Ph.D.,(Management).,Ph.D.,(Engg).,M.I.S.T.E.,
Principal,
Uthappanaickanoor,
vellore.
2. Mr.J.Ramakrishnan,BE.,PGDCA.,M.E
Erode
3. Mr.N.R.Sivakumar,BE.,M.E.,
Perunthurai,Erode
Validated by
Dr. S.J.Thiruvengadam,M.E.,Ph.D
Professor/ECE department
SYLLABUS
UNIT � I
UNIT � II
UNIT � III
UNIT � IV
UNIT � IV
Introduction
Radar is a device used to monitor objects present far away with the help of radio
waves. It is used to check whether any object is present in the area under search,
the
distance from the radar to the object and the velocity of the object, based on
need.
Navigational aids are the devices used to help the vehicles moving in sea or air
where no
sign boards could be used.
Radar- fundamentals
The term RADAR refers to RAdio Detection And Ranging. It contains a transmitter
and a
receiver, each connected to a directional antenna. The transmitter sends a Ultra
High
Frequency (UHF) or Microwave signal and the reflected echo signal from the target
is
measured at the receiver. If pulsed signal used in the transmitter, the distance
between the
transmitter and the target will be calculated by calculating the time taken by the
signal to
reach receiver. If Continuous wave is used in the transmitter, the speed and
direction of
movement of the target will be calculated by measuring the difference in frequency
of the
signal as per Doppler effect.
fig 1.1.jpg
The block diagram of pulsed radar shown in fig.1.1 consists of a transmitter and
receiver, each connected to a directional antenna. The transmitter is capable of
sending out
a large UHF or microwave power through the antenna.
The receiver collects as much energy as possible from the echoes reflected in its
direction by the target, and process the received signal and displays this
information in a
suitable way.
Applications
The major applications of Radars include but not limited to searching a target in
free
space or sea, tracking a target to follow the trajectory of the target, altitude
measurement of
a aircraft.
Radar can be employed as navigational aid in several ways. It has numerous military
uses. Radar equipment in an aircraft can provide useful information for navigation.
Radar
equipment on a ship gives the information about the land masses, other ships etc .
In military services radar is used for aiming guns at ship, aircraft, directing
guided
missiles etc. In addition radar finds important uses in aiding the landing of
aircraft, in
monitoring air traffic, in the airports and in enabling the height of the aircraft
above ground.
As the distance between the RADAR Transmitter and the target increases, the
reflected signal power that reaches the RADAR Receiver decreases. There will be a
minimum identifiable power that the RADAR Receiver can handle properly. This
minimum
power decides the maximum distance between the RADAR and the target, which is
commonly known as Maximum Range of the RADAR. The maximum range Rmax is
obtained when the received power is equal to the minimum received power of the
receiver
Pmin. The maximum range Rmax is given by
........= {
.... ..02
..
4....2........
}
14
-----------------------------------------------
S = Effective cross section area of the Target (Commonly known as Radar cross
section)
........= {
.... ..02
..
4....2........
}
14
---------------------------------------------------------------
1. From the above equation the maximum range is proportional to the fourth root of
the
peak transmitted pulse power. The peak power must be increased 16 times to double
the maximum range, keeping all the other parameters in the equation constant. Such
a power increase obviously becomes very expensive.
2. A decrease in minimum receivable power will have the same effect as raising the
transmitting power and is thus very attractive alternate to it.
3. Radar range equation also shows that maximum range proportional to the square
root of the capture area of the antenna and therefore directly proportional to its
diameter. Hence doubling a given maximum radar range is to be double the effective
diameter of the antenna.
4. Also the Rmax can be increased by increasing frequency. Increasing the frequency
has a limit. The beam width of an antenna is proportional to the ratio of the
wavelength to the diameter of the antenna. Hence any increase in diameter to
wavelength ratio will reduce beam width.
5. Finally, the radar equation shows that the maximum radar range depends on the
target area.
The block diagram of fig 1.2 shows a typical high power pulsed radar set. The
trigger
source provides pulses for the modulator provides rectangular voltage pulses. This
voltage
pulses is used as the supply voltage for the output tube; thus switching it ON and
OFF.
fig 1.2.jpg
This tube may be a magnetron oscillator, or an amplifier such as the klystron,
travelling wave tube or cross field. The transmitter portion of the radar is
terminated with the
duplexer, which passes the output pulses to the antenna for transmission.
The IF amplifiers are tuned to the same frequency and having identical bandpass
characteristics. Finally the detector is a schottky-barrier diode, whose output is
amplified by
a video amplifier having the same bandwidth as the IF amplifier. Its output is then
fed to a
display unit. The display unit is very often a cathode ray tube.
Display methods
They are
i) A scope
displays.
A Scope display
The operation of the display device is similar to a Cathode Ray Oscilloscope. A
sweep
waveform is applied to the horizontal deflection plates of a Cathode Ray Tube(CRT).
The
beam moves slowly from left to right across the screen of CRT and then back to the
starting
point .
In the absence of any received signal, the display is a horizontal line in the A
scope
display. The demodulated receiver output is applied to the vertical deflection
plates and
causes the beam to move vertical direction in the display as shown in the fig. 1.3
fig 1.3.jpg
Displacement from the left hand side of the CRT corresponds to the range of the
target. The first �blip� is due to the transmitted pulse. The other blips
correspond to reflections
from the nearby objects, followed by noise. The various targets then show up as
large blips.
The height of each blip corresponds to the strength of the returned echo, While the
distance
from the reference blips is a measure of the it�s range.
A scope presentation is suitable for tracking since the echoes returned from one
direction only are displayed.
� Plan position indicator is the most widely used for form of intensity modulation.
� In this case a sawtooth timing wave deflects a cathode ray spot radially outward
from the centre. It is synchronized with the transmitted pulse.
� The distance outward from the centre of the display is proportional to the
distance
of the echo-producing target from the radar transmitter.
� The angular direction of the sawtooth ray spot indicates the direction in which
the
antenna beam is directed.
The signals from the receiver output are applied to the control electrode of the
cathode
ray tube. The bias on the control electrode is adjusted to slightly greater than
cutoff.
Thus a signal of significant amplitude causes the spot to be turned on. The result
is
that the echoes from the target are presented as bright spots which give range and
azimuth
of the target in polar co-ordinates. The PPI display is used in search radars and
is very
particularly suitable when conical scanning is used.
Automatic target detection
The manual radar performance may be erratic or inaccurate. Hence the output of
radar receiver is processed in a computer system prior to display on the radar
screen.
Analog computers may also be used for the reception and interpretation of the
received data
together with automatic tracking and missile pointing. Based on the reflected
signals, the
distance of the objects from the radar and the velocity of the object will be
calculated by the
computer and displayed in the monitor, without any need for human intervention.
Since
these systems work without human intervention they are called as automatic target
detection
systems.
Navigational aids
In military services radar is used for aiming guns at ship, aircraft, directing
guided
missiles etc. In addition radar finds important uses in aiding the landing of
aircraft, in
monitoring air traffic, in the airports and in enabling the height of the aircraft
above ground.
The ability to land an aircraft under conditions of low or zero visibility is one
of the most
important factors determining the reliability of air travel. Two electronic systems
are used
primarily for aircraft landing system. They are the
Both of these arrangements are fundamentally blind approach systems. The final
landing is normally carried out visually after the electronics system has brought
the aircraft
out of the overcast in the correct position to complete a landing.
The runway localizer provides the lateral guidance that enables the airplane to
approach the runway from the proper direction. They consist of special form of two-
course
horizontally polarized very high-frequency radio range. With this radio range an
equisignal
course is obtained as shown in fig. 1.5. The runway localizer range differs from
the long-
wave radio range.
fig 1.4 temp3.jpg
Fig. 1.4. Instrument Landing System
In the runway localizer the radiated wave consists of a single carrier wave. The
carrier wave is simultaneously amplitude modulated with modulation frequencies of
90 and
150 Hertz.
The two patterns of fig.1.5. then correspond to the relative strengths of the 90
and
150 Hertz sidebands, respectively, as a function of direction. Thus the equisignal
course
directions are indicated by equality in the strengths of the two modulations. The
two
modulated signals are separated by suitable filters in the receiver output, and
then
separately rectified, and then applied with opposite polarity to a zero-center
meter. Equal
tone amplitudes hence produce no meter deflection. If there is any difference in
the tone
strength of the two signal, then the stronger signal will deflect the pointer in a
way that
indicates the direction to be taken by the aircraft to �correct� its flight.
fig 1.5.jpg
Fig 1.5 Directional Pattern of Localizer and Glide Path in ILS.
Marker beacons are used to indicate position along the localizer path as shown in
fig.1.4. They consist of low-power very high-frequency transmitters exciting
antenna
systems. This antenna system produce fan- shaped beams. The beams are so oriented
that
the broad dimension of the fan is at right angles to the localizer path. The
different markers
are identified by means of tone modulations, and by dot-and- dash keying.
The receiver for the glide path signals separates the two modulation tones, which
are
then rectified and applied with opposite polarity to a zero-center meter.
This indication is normally combined with the localizer indication by housing the
two
meter movements in a common case in such a manner that localizer and glide-path
pointers
are, respectively, vertical and horizontal when not deflected. Thus any flight
corrections
required to follow the prescribed courses in both vertical and horizontal planes
can be
obtained by a quick glance at one meter face.
The ground-controlled approach system employs two radars. The first is for general
surveillance, and for control of the traffic pattern of aircraft in the vicinity of
the landing field.
The second is a high-resolution short-range set that is used to conduct the actual
landing.
This second radar has two displays: one arranged to present elevation as a vertical
An aircraft to be landed with this system is first brought into the proper position
for
starting its descent by means of the surveillance radar. A controller at the
indicators of the
high-resolution radar set then takes over, and from moment to moment issues
instructions to
the pilot as to what must be done to keep the plane on the desired glidepath. Thus
the
aircraft is �talked� down a path corresponding to a proper landing, so that when
its breaks
through the overcast, it should be in the proper position to permit the landing to
be
completed visually.
If for any reason the aircraft cannot be talked into the proper glide path, it is
instructed to discontinue the landing and turn back for a second attempt.
Advantage of GCA
Dis-advantage of GCA
The disadvantages are that there are a number of human links in the chain.
Telephone System
Telephone system were originally developed for conveying human speech (voice).
They
are also used for data transport also. Data transport is obtained using modems. The
telephone networks which connects the two subscriber are called public telephone
network(PTN). Because PTN interconnects the subscribers through one or more
switches it
is also called public switched telephone network(PSTN).
In public switch telephone network the switching centers are organized into five
classes as shown in Fig 1.6. They are
fig 1.6.jpg
Fig. 1.6. PSTN Hierarchy
Subscriber telephone are connected through local loops to end office(or central
offices). End offices are connected to one toll office. Several toll offices are
connected to a
primary office. Several primary offices are connected to a sectional office.
Several sectional
offices are connected to one regional office.
In the past, telephones used rotary or pulse dialing. In that system the digital
signals
were sent to the end office for each number dialed. This type of dialing gives
errors during
the dialing process because of human errors.
Today dialing is done through the touch tone technique. In this method instead of
sending a digital signal, the user sends two small bursts of analog signal the
frequency of
the signals sent depends on the row and column of the pressed pad. Fig.1.7. shows a
12
tone touch tone dialing system. When a user dials for example, the number 5, two
bursts of
analog signals with frequencies 770 and 1336Hz are sent to the end office.
1209 Hz
1336 Hz
1477 Hz
1663 Hz
697 Hz
770 Hz
852 Hz
941 Hz
#
D
When the calling party�s telephone set goes off hook (i.e. lifting the handset off
the
cradle), the switch hook in the telephone set is released, completing a dc path
between tip
and the ring of the loop through the microphone. The ESS machine senses a dc
current in
the loop and recognizes this as an off-hook condition. The procedure is referred to
as loop
start operation since the loop is completed through the telephone set.
Completing a local telephone call between two subscribers connected to the same
telephone switch is accomplished through a standard set of procedures that is given
below.
Step 3 The caller dials the destination telephone number using one of two methods:
Step 4 when the switching machine detects the first dialed number, it removes the
dial
tone
Step 5 The switch interprets the telephone number and then locates the local loop
for the
destination telephone number.
Step 6 Before ringing the destination telephone, the switching machine tests the
destination Loop for dc current to see if it is idle(on hook) or in use(off hook).
At the same
time the Switching machine locates the signal path through the switch between the
two local
Loops.
Step 7 If the destination telephone is off hook, the switching machine sends a
station busy
signal back to the calling station.
Step 9 When the destination answers the telephone, it completes the loop, causing
dc
current to flow.
Step 10 The switch recognizes the dc current as the station answering the
telephone. At
this
time, the switch removes the ringing and ring-back signals and completes the path
through
the switch, allowing the calling and called parties to begin their conversation.
Step 11 When either end goes on hook, the switching machine detects an open circuit
on
that loop and then drops the connections through the switch.
The data and telephone communication industry is continually changing to meets the
demands of telephone, video, and computer communication systems. Today more and
more
people have a need to communicate with each other then ever before. In order to
meet
these needs, old standards are being updated and new standards developed and
implemented almost on a daily basis.
The integrated services digital network (ISDN) is a proposed network designed by
the
major telephone companies for providing worldwide telecommunications support of
voice,
data, video, and facsimile information within the same network. ISDN is the
integration of a
wide range of services into a single multipurpose network. ISDN is a network that
proposes
to interconnect an unlimited number of independent users through a common
communication network.
Principles of ISDN
The main feature of the ISDN concept is to support a wide range of voice
(telephone)
and non-voice(digital data) applications in the same network using a limited number
of
standardized facilities. ISDNs support a wide variety of applications, including
both switched
and non-switched (dedicated) connections. The 64-kbps digital connection is the
basic
building block of ISDN.
Customers gain access to the ISDN system through a local interface connected to a
digital transmission medium called a digital pipe. There are several sizes of pipe
available
with varying capacities (i.e bit rates), depending on customer need. For example, a
residential customer may require only small capacity to accommodate a telephone and
a
personal computer. However, an office complex may require a pipe with sufficient
capacity to
handle a large number of digital telephones interconnected through an on-premise
private
branch exchange (PBX) or a large number of computer on a local area network(LAN).
ISDN Architecture
Fig 1.9 shows a block diagram of the architecture for ISDN functions. The ISDN
network is designed to support an entirely new physical connection for the
customer. Various
protocols are provide that allow the exchange of control information between the
customer�s
device and the ISDN network. There are three basic types of ISDN channels
1) B channel:64 Kbps
2) D channel:16 Kbps or 64 Kbps
3) H channel:384 Kbps
1536 Kbps
1920 Kbps
fig 1.9.jpg
Fig. 1.9 ISDN Architecture
In ISDN standards, the residential users of the network are provided a basic access
consisting of three full duplex, time division multiplexed digital channels, two
operating at 64
Kbps (designated B channels, for bearer)and one at 16 Kbps (designated as D
channel, for
data). The D channel is used for carrying signaling information and for exchanging
network
control information. One B channel is used for digitally encoded voice and the
other for data
transmission.
The 2B+D service is called basic rate interface(BRI). BRI system requires
bandwidth
that can accommodate two 64 Kbps B channels and one 16 Kbps D channel and other
special bits. Hence total BRI bit rate is 192 Kbps.
Features of ISDN
introduced into the ISDN should be compatible with 64 Kbps switched digital
connections.
5) Standards developed for OSI (open system interconnection) can be used for ISDN.
6) ISDN can be implemented in a variety of configurations according to national
conditions.
Video phones
location of picture and sound carrier frequencies remains the same as conventional
TV
system. If the channel bandwidth is from a to b MHz, then the picture carrier =
(a+1.25)MHz
and the sound carrier = (b-0.25)MHz. Solid state image sensors are used for picking
up the
figure/scene. LCD screen is used for display.
fig 1.10.jpg
Fig. 1.10. Video Phone
acknowledgement signal is sent back using the 2150Hz tone back to the caller
control
terminal.
However upon receipt of the acknowledgement signal the video, voice combining
network at both ends are switched on and the amplitude modulated picture is
combined with
the frequency modulated voice and transmitted through co-axial line.
Thus an audio-cum video path is established between the calling person and called
person. At the receiving end the picture, voice are separated at the video detector
at the end
of the call, when the call is closed, the combining networks will be switched OFF.
Uses
Facsimile sender
i) A single page, which is usually wrapped around a cylindrical drum in the sender
to permit scanning to take place.
ii) Narrow continuous tape.
iii) Continuous sheet paper which may be thought of as broad tape.
Cylindrical scanning
In this method, the message is first fixed around the drum by means of clips. The
drum
is then rotated simultaneously about its axis and traverses along it under a fixed
scanning
spot. The light reflected from the scanning area is focused on to a photocell. The
electrical
output of the photocell represents the signal.
fig 1.11.jpg
Fig.1.11 Cylindrical Scanning
Fig 1.11 illustrates the arrangement of this system. The chopper disk converts the
signal into a modulated wave and the carrier frequency is determined by the speed
of the
disk. the modulated signal is easier to amplify then a direct signal from the
photocell.
The area of the message illumination is comparatively large, and mask with small
aperture forms the spot which illuminates the photocell. In the usual scanning
arrangements
the spot follows a spiraled path around the drum. An alternate arrangement is to
scan in a
series of closed rings. The spot moving from one ring to the next as the fixing
clips pass
under it. But this method is not commonly used.
Facsimile receiver
The mechanical aspects of scanning in the receiver are very similar to those in the
sender and very often identical equipment is used at both ends. Scanning in the
receiver
produces an optical output from the electrical input. This process is reverse to
what happens
in the transmitter. In order for the received signal to have the correct
relationship to the
transmitted signal, it is necessary for the signals to be synchronized, to be
passed correctly
and to have the same height/breath ratio.
Synchronization
Phasing
Correct phasing is necessary to ensure that the image of the clips holding the
paper
to the drum does not intersect the transmitted picture pulley phasing adjustment
for each
picture transmitted is carried out as follows.
The operator at the receiver first adjusts the speed to correct value by means of
the
synchronizing signal and then sets the drum in the correct starts position. This is
held in
position by a switch. At the sender, a pulsed signal is send to indicate the start
of the
transmission and the pulse releases the switch holding the receiver drum. The
effect of
incorrect phasing is shown in fig. 1.12(C)
Index of co-operation
The ratio height/breadth must be the same for both the transmitted and received
pictures and this in turn depends on the scanning pitch and the diameters on the
drums used
in the sender and the receiver. Index of Cooperation is defined as the product of
total line
length and the number of lines per unit length divided by p.
fig 1.13.jpg
Fig. 1.13 Sender and Receiver Correlation in FAX.
Let
nP is the breadth of the transmitted picture, and the breadth of the received
picture is
np. the height of the transmitted picture is proportional to D, and that of the
received picture
to �d�. hence for the correct height /breadth ratio to be maintained.
fig 1.14.jpg
Fig. 1.14. Effect of Index of Cooperation.
IOC has fixed value of 352 as per CCITT. The fig 1.14 gives effects of facsimile
pictures received with different values of IOC.
In this method a highly absorbent chemically treated paper is used. The electrolyte
held by the paper dissociates when a voltage is applied to the paper via a metal
stylus, and
one of the dissociation products react with the stylus to form a metallic salt.
This in turn, reacts with a colour chemical in the paper which produces a mark on
the
paper. The intensity of the mark depends on the amount of dissociation i.e.on the
signal
voltage. A steel stylus is very often used, since the produces black colouration.
The paper
used must be kept in sealed containers. It has a life time about one month after
opening.
PART �A
1. Define RADAR.
2. Define the maximum range of RADAR.
3. State the different types of display method used in RADAR.
4. Expand PSTN?
5. Mention the types of aircraft landing system.
6. What is telephone?
7. Define video phone.
8. What is ISDN?
9. What is FAX?
10. What is IOC?
PART-B
PART-C
3. With the block diagram explain the working of pulsed radar system.
4. Explain the working of Instrument Landing System with necessary diagrams.
5. (A) Explain Ground Controlled Approach.
6. With the block diagram explain the working of public telephone network.
7. Explain the working of electronic switching system with necessary block diagram.
DIGITAL COMMUNICATION
Introduction
The digital communication is basically divided into two types. They are
� On-line system
The on-line system may be either real time or on-real time system. If the
system requires rapid response then it is a real time system. In on-real
system the data transmission speed is much delayed.
� Off-line system
The digital communication is basically divided into three types based upon
transmission as:
1. Simplex
3. Full-Duplex
A full-duplexer is the one in which the data can be sent in both directions
simultaneously.
2.1.1 BASIC ELEMENTS OF DIGITAL COMMUNICATION SYSTEM
An electronic digital communication system usually has voltages and currents that
have digital signals.
may be transmitted by using a sine wave of 1000 Hz , and a sine wave of 500 Hz is
transmitted to represent a binary 0. Thus the digital information is transmitted by
use of
analog waveforms derived from an analog source.
INFORMATION SOURCE
intervals. A speech signal, a television signal, and a signal location are examples
of
analog signals.
. In a digital signal, both amplitude and tome take discrete values. Computer data
and
telegraph signals are examples of digital signals.
. An analog signal can always be converted into digital form by combining three
basic
operations: sampling, quantizing, and encoding as shown in the block diagram.
. In the sampling operation, only sample values of the analog signal at uniformly
spaced discrete instants of time are retained.
. In the quantizing operations, each sample value is approximated by the nearest
level
in a finite set of discrete levels. In the encoding operation, the selected level
is
represented by a code word that consists of a prescribed number of code elements.
SOURCE ENCODER
The symbols provided by the information source are given to the source encoder.
These symbols cannot be transmitted directly. They are first converted into digital
form by
the source encoder.
The source encoder assigns code words to the symbols. For every distinct symbol
there is unique code word. They assign a set of code to a particular data by
choosing a
unique value in the data set. Typical source encoders are pulse code modulators,
delta
modulators, vector quantizer etc.
In source coding, the encode maps the digital signal generated at the source output
into another signals in digital form. The mapping is one-to-one and used to
eliminate or
reduce redundancy. So as to provide an efficient representation of the source
output
CHANNEL ENCODER
The channel encoder converts the message or information signal in the form of
binary sequence in a transmittable form. During signal communication, noise and
interference may be added with signal. To avoid these errors, channel encoding is
done.
The channel encoder adds some redundant binary bits to the input sequence. These
redundant bits are added with some properly defined logic.
. In channel coding the objective is for the encoder to map the incoming digital
signal
into a channel input and for the decoder to map the channel output into an output
digital signal so that the effect of channel encoder and decoder enables reliable
communication over a noisy channel.
. This is done by introducing redundancy ina prscribed fashion in the channel
encoder
and using it in the decoder to reconstruct the original encoder input as accurately
as
possible.
. In source coding, we remove redundancy, whereas in channel coding we introduce
controlled redundancy to overcome channel noise effect.
. we may perform source coding alone, channel coding alone, or the two together. In
the latter case, naturally, the source encoding is performed as shown in fig.
. in the receiver, we produce in the reverse order: channel decoding is performed
first,
followed by channel encoding in the transmitter as shown in fig.
. in the receiver, we produce in the reverse order channel decoding is performed
first,
followed by source decoding for any combination is used, the result is and
improvement in system performance achieved at the cost of increased circuit
complexity.
CHANNEL
The communication channel is a physical medium used for transmitting signals from
a Transmitter to a distant Receiver .It forms the information backbone of any
digital
communication system. Higher data rate is also possible using Optical Fiber Cables.
In wireless system this channel consists of atmosphere. A multi hop system may
integrate coaxial cables, fiber optic cables ,microwave links to complete the
link . Global
communication is very easily possible due to satellite channel.
DIGITAL DEMODULATOR
The digital demodulator converts the input modulated signal obtained through the
communication channel to a sequence of binary bits.
The digital modulator maps the input binary sequence to analog signal waveform so
that it can be transmitted un distorted over along communication channel.
The following modulators are used ,where the digital on �off signals are used to
key- in
generating equivalent modulated analog signals suitable for transmission over a
band width
limited analog transmission line of short haul or long haul systems.
CHANNEL DECODER
The channel decoder reconstructs error free accurate bit sequence and reduces the
effects
of channel noise and distortion.
SOURCE DECODER
The source decoder performs reverse operation of source encoder. It converts the
binary
output of channel encoder into a symbol sequence. Both variable length and fixed
length
decoders are possible. Some decoders use memory to store the code words.
as in analog systems.
� Errors detected are small, even when there is a large amount of noise on the
received signal, ie. S/N Ratio is high in Digital Systems.
� Errors are often corrected by the use of error correction coding.
Data in most systems use pulse type of energy. The data stream is similar to a
square-wave
signal with rapid transitions from one voltage level to another. The repetition
rate of the data
word depends on the binary representation of the data word.
Fig 2.Bit rate compared to frequency with return to Zero/RZ and non return to
Zero/NRZ
output(Courtesy :pgno 267 Electronic communications- Robert Schoenbeck)
For instance, if an 8-bit word has the value 01010101, the resulting voltage graph
represents a series of four square waves with each negative half cycle equal to
each positive
half cycle. If however the data word has the form 00001111, the voltage graph would
appear
as a single square wave with equal negative and positive half cycles, but longer
than firs
one.
Figure 2.2 shows the voltage graphs for these and other binary words. The data
circuits must provide a bandwidth for the data transmission.
When data is sent over telephone channels the speed must be limited to ensure
that the required bandwidth of the data transmission should not exceed telephone
channel
bandwidth. If the data is transmitted with greater speed, it requires larger
bandwidth to
accommodate it.
The rate of data transfer depends upon several aspects of transmission channel. The
In a system in which all pulses have equal duration, the speed in bauds expresses
the numbers of pulses transfer per second. One cycle of transmission must contain a
maximum of 2 bauds. The maximum signaling speed in bauds is equal to twice the
bandwidth of the channel. It should be achieved only in an ideal channel which had
no noise
or distortion.
The information can be transferred at a rate equal to or different from the baud
rate.
Multilevel and encoded data elements can be used to provide information transfer
rates as
speeds greater than the baud rate.
For example; a data stream is converted into a 2-bit pair pattern. The 2-bit
pattern
has maximum values of 4, as 00, 01, 10 and 11. Each of the 2-bit pairs is converted
to a
phase values in the data set, 00 is being represented by 90, 01 by 180, 10 by 270
and 11 by
0 (=360). Each of the 2-bit elements is called a �dibit�. This is therefore, a four
level code.
Dibit-encoded data can be transmitted by using half the numbers of bauds required
for non-
encoded data.
The data rates of common system are limited to a maximum rate about 10,800bps for
a voice graded channel. Faster data rates are prevented by noise other than random
in a
channel and other channel limitations.
2.1.3.3 BAUD RATE in data transmission circuits
For example, if the data streams are converted to 2-bit pairs, each 2 bit pair can
have only
one o four values 00, 01, 10 and 11. Each of the 2 bit pair is converted to a phase
value in
the data set. The value 00 being represented by 90, 01 by 180, 10 by 270 and 11 by
360
(0). Each of the 2 bit elements is called a dibit. Dibit-encoded data can be
transmitted by
using half the number of bauds for the non-encoded data.
In a system in which all pulses have equal duration, the speed in bauds is equal
to the
maximum rate at which signal pulses are transmitted. The maximum signaling speed in
The sampling theorem status that all amplitude values of a signal can be determined
by sampling the signal at a rate equal to at least twice the bandwidth. Noise may
affect this
sampling process because the noise pulse will be interpreted as a data bit. This is
shown in
fig.. if the noise occurs at the sampling time, mark will be developed only if the
amplitude of
the noise is greater than the sampling level.
Fig Data Stream with Noise Pulse (Courtesy:pg no 532 Electronic communication
systems, George Kennedy ,Bernard DavisTata Mc Graw Hill)
The effect of the noise on the data channel can be reduced by increasing the signal
to noise
ratio. For an ideal 3-KHZ channel, the NYQUIST RATE (Twice the bandwidth) would be
6000 bps. A binary system using this channel would require a minimum signal-to-
noise ratio
of 3.1 or 4.8dB
It can be shown that a system using three-level code must have a signal-to-noise
ratio of 8.5 db or 3.7 db greater, for equal performance in the channel.
Improvement in the
signal to noise ratio makes use of multilevel encoding feasible.
Any transmission system which conveys more than one signal simultaneously ca
experience
cross talk. Cross talk is the reception of portions of a signal from one channel to
another
channel.
Fig. A balanced transmission circuit using transformers and twisted pair cable.
Solid arrows indicate in-phase signals, dashed lines depict out of phase noise or
cross talk
In modern transmission systems which convey many channels of voice and data
simultaneously, the systems will become loaded, o heavily utilized. So that the
control of
levels become very important in order to preclude cross talk. This can be avoided
by
developing specific level-setting parameters.
Cross talk can occur through electromagnetic interaction between adjacent wires.
If the
wires of two signal-carrying circuits run parallel with each other, it is possible
for the signal
from one circuit to be induced by electromagnetic radiation into the second
circuit. This type
of cross talk is reduced b using twisted pair cables and balanced circuits along
with
shielding.
As shown in the figure 2.4, twisted pair cables are used for the transmission
circuit hence
noise or signals from other circuits will be induced into both wires at equal
levels.
When the cross talk or noise reaches the transformer, it enters as out of phase
signals from
the two wires and cancels out in the transformer in phase. Each side of the
transformer
forms a circuit with ground and the signal transfers through the transformer
intact. The cross
talk and noise are reduced, but the signal is unaffected.
Another way to reduce cross talk is to use shielded cables. If the twisted pairs
are placed
inside a braided or metal foil shield, the induction between pairs cannot take
place easily.
The shields are grounded to drain off the induced signals and noise.
Different types of equipments are in computer systems to send and receive data
through he
devices like keyboards, video terminals, printers, paper tape punches and readers,
and
magnetic storage devices. Each of these types of equipment generates and receives
data in
the form of codes. The fact that all use encoded data, however does not mean that
all use
the same code. Several common codes are used in digital data systems as below:
Some codes are advantageous when used in different applications. Modern computers
can
be easily deal with different codes by simply converting them to the code used by
the
computer. The common codes used are Baudot code, binary code, ASCII code, EBCDIC
code, Hollerith code etc.
Some bit stuffing is done often to detect the transmission errors using error codes
like parity
bit codes.
Similarly redundantly bits are added as additional bits to detect and correct the
error bits
received at a distant receiver.. Hagel Berger Code, Hamming Codes are some examples
of
these types of Error Correcting Codes.
It is a seven bit code. the seven bits are formed, based on a standard
progression. The first
three MSB bits represent whether a number, letter or character is coded. The last
four bits
represent the actual code of number, letter or character.
Fig American Standard Code for Information Interchange (ASCII) .Three most
Significant
bits at the top of the chart.;four least Significant bits at the left side of the
chart. (Courtesy:
pg no 535 Electronic communication systems George Kennedy ,Bernard Davis,Tata
Mc Graw Hill)
The number 6 is represented as 011 from the top of the chart ,from the MSB group
and
followed by 0110 from the left from the LSB group
In both cases the first 3 bits are same. But the remaining four bits change
according to a
standard progressive value, i.e. it varies from 0000 to 1111 respectively.
Similarly the first three bits also follow a standard progression from 000 to 111.
Number �2� is
coded as 011 0010 and the letter B is coded as 100 0010. The representation of
ASCII code
is shown in the table..
ADVANTAGES
EBCDIC code stands Extended Binary Coded DECIMAL Inter Change Code.
It is an 8 bit fixed length code. Here all the 8 bits are used for representing
the information.
This code is developed in 1962 by the International Business Machines Corporation
(IBM).
This code is used almost exclusively with IBM mainframe computers and peripheral
equipments. It is also based on the binary coded decimal format. The name binary
coded
decimal was selected because the second hexa character for all letter and digit
codes
contains only the hexa values from 0 to 9, which has the same binary sequence as
BCD
codes.
This code also follows a standard binary progression for coding. This code has
totally 256
combinations. Some alphabets and some numerals of EBCDIC code is shown in the
tablebelow.
Fig.2, Extended Binary Coded Decimal Interchange Code (EBCDIC) (Courtesy: pg no 540
In this code A is represented as 1100 0001 and B is represented as 1100 0010. Here
the
MSB two bits are same (11), but the LSB 4 bits change progressively from 0000 to
1001 in
BCD.
Similarly �a� is represented as 1000 0001 and b is represented as 1000 0010. Here
the MSB
two bits are also same (10) but the LSB 4 bits change progressively from 0000 to
1001 in
BCD.
In this Code �0� is represented as 1111 0000 and �9� is represented as 1111 1001.
Here the
MSB 4 bits are same, but the lower 4 bits are progressively varying from 0000 to
1001 in
BCD.
ADVANTAGES:
DISADVANTAGES:
. Here all the 8--bits are used for data encoding. There is no
provision for parity bi. Here error correction is not possible.
During transmission of the data signal, error may be produced by noise and
transmission system impairment. The error correction at the receiver section is
more
complicated. So it is necessary for data users to determine the importance of the
transmitted data and to decide what level of error detection and correction is
suitable for that
data.
The 5-bit Baudot code provides no error detection at all, because it uses all 5-
bits to
represent characters. If only one bit is translated (by error) to its opposite
value, a totally
different character will be received. This change is not detected by the receiver.
Hence to
find out the error, other codes are provided for error control adding additional
bits.
The most widely used approach, for detecting errors that arise in storing and
moving
word , is the use of a parity check bit added to each character code group. Codes
of this
type are called parity check codes. A parity bit( 0 or 1) is added to the end of
the character
code block according to some logical process. There are two types of parity codes,
namely
1) EVEN PARITY and
2) ODD PARITY
Fig Vertical and Horizontal Parity used with paper tape code (Courtesy: pg no 543
Electronic communication systems George Kennedy ,Bernard Davis,Tata Mc Graw
Hill )
Even parity means adding an extra bit to the group of bits to make the whole number
of
1's as even. for instance, consider a word 0111.this word contains three 1's.so we
add one
more 1 at the end of this word to make the whole word as 01111, having even number
of 1's
.this new word can be moved and stored by the computer, and can be checked for even
parity at different points to assure that no errors have crept into the word.
similarly, in case of
odd parity, add one more bit on the end of character, to make the whole word as odd
number of 1's.
At the receiver, the block addition is accomplished with the parity bit intact, and
appropriate addition is made. if the sum provides the wrong parity, an error during
Parity bit added to each character block provides what is called vertical parity.
Parity bit can also be added to rows of code bits. This is called horizontal
parity.
The code bits are associated into blocks of specific length with the horizontal
parity
bits following each block. By using the two parity schemes concurrently, it becomes
possible
to determine which bit is an error. this is explained in fig. Here even parity is
expected for
both horizontal parity and vertical parity.
Note, here one column and one row each display improper parity. By finding the
intersection of the row and column, the bit in error can be identified, by simply
changing the
bit to the opposite value. it will restore proper parity both horizontally and
vertically. These
types of parity arrangements are sometimes called geometric codes.
Most error-detection systems use some form of redundancy to check whether the
received data contains errors. That means, additional data is sent with the basic
data. The
redundancy takes the form of transmitting the information twice and comparing the
two sets
of data to see that they are the same. If a discrepancy is noted between the two
sets of data,
an error is assumed and the data is caused to be retransmitted. When the two sets
of data
are same, error free transmission is assumed.
When a code word Zi is transmitted via a noisy channel and Z is received the
transmission
error corresponds to e=Z-Zi.
The algebraic coding adds algebraic structure to the code words set so that the
error is easily expressed.
The procedures which permit error correction at the receiver location are
complicated. so it is necessary for data users to determine the importance of the
transmitted data and to decide what level of detection and correction is suitable
for that data.
Some types of error correction methods are explained below.
2.2.3.1 Retransmission
The parity of each block is checked at the receiving level. if no error is noted, a
positive acknowledge(ACK)is sent to the transmit station, and the next block is
transmitted.
The parity check is again made and transmission continues according to be the
result
of the parity check.
Types of Retransmission:
1 Discrete ARQ
2 Continuous ARQ
A forward error correcting code uses the matrix sum as shown in the figure. It
illustrates the use of a three level matrix sum system.
Here the sum of rows is equal to the sum of columns.. The transmitted message
consists of the information bits and the letters representing the sum of each
column and row
and the total. when the signal is received, the matrix is reconstructed and the
sums are
checked to determine whether they agree with original sums this is important for
the
encoding scheme's ability to find and correct errors
Fig Forward Error Correction Code �Three level matrix sum forward error correcting
code
a) Message in triplets b) triplets as numbers with check sums c)Received data with
error d)Error check and correction
If they agree, then error free transmission is assumed, but if they disagree ,error
As shown in figure , the row and column discrepancies are identified in the matrix
cell and that is corrected by replacing the incorrect number with the value which
agrees with
the check sums. Thus the message can be restored to the correct form.
some kind. This correction is particularly well suited to applications which place
a high value
on the timeliness of data reception.
A three level matrix sum code will provide for approximately 90 percent error
correction confidence level. Larger matrices will increase this confidence level
significantly.
The larger matrix has the additional benefit of increasing the ratio of information
bits to error
check bits. As the result of increase in the level of matrix , transmission
efficiency
increased to, 81% for the nine-level matrix versus 56% for the three-level matrix.
In the Hamming code several parity-check bits are added to a data word. Consider
the data word 1101, in the hamming code three parity bits are added to the data
bits as
shown below:
1 2 3 4 5 6 7 [Bit Location]
p1 p2 D p3 D D D [D-Data bit]
The first parity bit,p1 provides even parity from a check of bit locations 3,5 and
7,which
are 1,1 and 1 respectively.p1 will therefore be 1 to achieve the data as even
parity.p2 checks
the location of bits 3,6 and 7,to make even parity and is therefore 0 in this case.
Finally, p3
checks the locations 5,6 and7 to make even parity and is 0 here. Hence resulting in
a 7 bit
word called Hamming Code .
If the data word is altered during transmission, so that the location six changes
from a '0'
to a '1' the parity will no longer be correct. The hamming encoding permits
evaluation of the
parity bits to determine where error occurs. This is accomplished by assigning a 1
to any
parity bit which is incorrect and 0 to one which is correct. if the three parity
bits are all
correct,000 results and no errors can be assumed. In the case of the above
described error,
the code has the form,
p1(which checks location 3,5 and 7) should now be a 1 and is therefore correct. It
will
be given a '0'.p2 checks 3,6 and 7 and is therefore incorrect. It receives the
value of '1'. p3
checks 5,6 and 7 and should be a 1,but it is wrong here, and so it receives a value
of 1.The
three values result in the binary word 110(p3 p2 p1),which has the decimal value of
6.this
means that the location containing the error is six,
The number of Hamming code bits are determined by the following expression:
2n == m+n+1
Where n= the number of parity bits and m=the number of bits in each data character
The hamming code is therefore capable of locating a single error and the receiver
is able to
pin point the error without retransmission of data.
But the Hamming code fails if multiple errors occur in a single data block..
Computers talk with each other over analog Public telephone lines as they are
deployed
globally and used by more population
There would be more degradation of data streams sent over the lines due to higher
harmonic content of the digital signala and limited frequency response of the lines
So a system called MODEM is used to convert digital input train of pulses into
analog signals
at one end of the transmission line of a network by a modulator present in the
unit. Similarly
the demodulator unit converts back the presented to its input back in to the
digital data.
Modems are also called as Data Sets or the Data Communication Equipment(DCE).
Both analog and digital modulation systems use analog carriers to transport the
information.
In analog modulation the information signal is analog ,where as in digital
modulation the
information signal is discrete, random, digital signal, which can be a computer
generated
data or a digitally encoded analog signal.
When the Phase . of the carrier is varied according to the instantaneous value of a
digital modulating signal the digitally modulated PSK ( Phase Shift Keying ) is
produced.
When both the Amplitude ,V and Phase . of the carrier is varied according to the
instantaneous value of a digital modulating signal the digitally modulated QAM
(Quadrature
Amplitude Modulation ) is produced.
When a Digital data is modulated on to a carrier wave carrier it shifts the digital
data from
the baseband region into a pass band region of the frequency spectrum.
The block diagram of ASK modulator is shown in the fig.2.9.The carrier oscillator
produces
sine wave signal with carrier frequency.
The digital controlled switch operates in accordance with the digital binary input
signal. The switch is closed when the digital binary input is high (1). conversely
the switch is
opened when the digital binary input is low(O).
During the switch closure period, the carrier signal is passed to its out put.
similarly
during the switch open period, no signal is passed to its output. So the output of
switch is a
amplitude shift keying signal. the waveforms of binary amplitude shift keying is
shown in the
fig.2.10.
ASK demodulator
The block diagram of ASK demodulator is shown in the fig.2.11. this demodulator
requires a carrier recovery circuit which is used to generate a local carrier
signal exactly
synchronized to the transmitted carrier. The carrier frequency produced in the
recovery
circuit is used to lock the VCO in PLL. the local generated carrier signal and the
received
modulated signal, both are applied to the multiplier circuit directly.
The multiplier produces a 1 (high) level signal at its output when the carrier
signal is
come to its input, otherwise it produces a 0 (low) level signal at its output. The
unwanted
signal produced at its output is removed by the LPF net work.
The block diagram of FSK modulator is shown in the fig 2.12. The stream of digital
signal is given to the mark switch and the inverter. The mark oscillator produces a
sine wave
signal with the carrier frequency of f1. Similarly the space oscillator produces
the another
sins wave signal with the carrier frequency of f2.
The binary digital input signal and the signal from the mark oscillator are
applied to
the mark switch. Similarly the inverted binary digital input signal and the signal
from the
space oscillator are applied to the space switch directly
If the input binary signal is 1 (high), the mark switch will be closed. Now the
signal
from the mark oscillator with frequency f1 is passed to the summing amplifier
through the
mark switch. The mark signal which is a high voltage signal is inverted by the
inverter and
becomes low voltage signal. So the space switch is open. As a result the signal
from the
space oscillator does not reach the summing amplifier.
If the signal is a space signal, the mark switch will be opened. So the signal
from the
mark oscillator does not reach the summing amplifier. Since the signal is inverted
and given
as the input to the space switch, the space switch will be closed. So the signal
from the
space oscillator will reach the summing amplifier.
If the digital input signal is 1 (high), the output of summing amplifier will be
the signal
with the frequency of f1. Conversely if the digital input signal is 0 (low) then
the output of the
digital input digital signal different frequencies are transmitted through the
summing
amplifier. The waveforms of FSK modulator is shown in the fig.2.13.
FSK demodulator
The block diagram of FSK demodulator is shown in the fig.2.14. the modulated FSK
signal is applied to the input of demodulator. The mark signal with the frequency
f1 is passed
through the mark band pass filter and detected by the mark detector.
Similarly the space signal with the frequency f2 is passed by the space band pass
filter and detected by the space band pass filter and detected by the space
detector. This
demodulated signal is given as input to the inverting input of the difference
amplifier.
The output of the difference amplifier will be the signal with positive voltage,
if the
signal with frequency f1 reach the input of the difference amplifier. This
represents the digital
signal '1' . Conversely the output of difference amplifier will be the signal with
the negative
voltage, if the signal with frequency f2 reach the input of the difference
amplifier. This
represents the digital signal 0.
The block diagram of PSK modulator is shown in the fig.2.15. In this system the
phase of the carrier signal is varied in accordance with the level of digital
signal. The input
digital signal is applied to the mark switch directly.
Similarly the input digital signal is applied to the space switch through an
inverter.
The inverter inverts the digital input signal. The oscillator produces sine wave
carrier signal
with the frequency of "f". This signal is applied to the mark switch directly, and
applied to the
space switch through 180 phase shifter.
The carrier signal is applied to both switches are with same frequency but out of
phase.
If the input digital is 1 (high) the mark switch is closed, the oscillator is
directly
applied to the summing amplifier. Similarly if the digital input signal is low, the
space switch
is closed, now the 180 phase shifted carrier signal with same frequency is applied
to the
summing amplifier. The summing amplifier combine the two signals. The signals
produce at
the output of summing amplifier has phase differences. The phase difference
occurred when
the input digital signal varying from 0 to 1 or 1 to 0.
PSK demodulator
The block diagram of PSK demodulator is shown in fig2.17. The modulated PSK
signal is applied to the synchronous local oscillator. The synchronous local
oscillator is a
carrier recovery oscillator. The synchronous local oscillator works with the
principle of PLL.
When the PLL goes to the lock state, the signal from the output of synchronous
local
oscillator is in original carrier frequency. The signal from the output of
synchronous local
oscillator is applied to the non-inverting input of difference amplifier. The PSK
signal is
applied to the inverting input of same difference amplifier.
The difference amplifier compares the two input signals, and its output is applied
to
the detector circuit. The detector produces original digital output signal.
In general, multiple PSK system has more advantages than single bit binary PSK
system. The speed of this system is varied in accordance with the number of phase
changes. The PSK system is very much used becaus noise could not affected this
system.
QPSK is called a quaternary phase shift keying or quadrature phase shift keying.
With QPSK, four output phases are possible for a single carrier frequency. Because
of there are four output phases, there must be four different input conditions.
Because the digital input to a QPSK modulator is a binary signal, to produce four
different input combinations, the modulator requires more than a single input bit
to determine
the input condition.
With two bits, there are four possible conditions exists as: 00,01,10 and 11.
Therefore with QPSK, the binary input data are combined into group of two bits,
called dibits.
In the modulator, each di bit code generates one of the four possible output phases
(+450,+1350, -450, and -1350 ).Therefore, for each two dibit clocked into the
modulator, a
single output change occurs, and the rate of change at the output is equal to one
half the
input bit rate (i.e., two input bits produce one output phase change).
QPSK modulator
The block diagram of a QPSK transmitter is shown in the fig.2.18. Two bits (a di
bit)
are clocked into the bit splitter. After both bits have been serially fed they are
simultaneously
parallelly outputted. One bit is directed to the "l" channel and the other to the
"Q" channel.
QPSK Modulator BLOCK DIAGRAM(Courtesy:PG NO 66 Wayne Tomasi- Advanced
Electronic Communication Systems)
The I bit modulates a carrier that is in phase with the reference oscillator
(hence the
name I for "in phase" channel) and the Q bit modulates a carrier that is 90 out of
phase (or�
in quadrature�) with the reference carrier (hence the name Q for "quadrature"
channel).
It can be seen that a dibit has been split into the I and Q channels as Shown
Below:
Binary Input
QPSK output
. phase
-135 o
-45o
+135 o
+45 o
With QPSK each of the four possible output phasor has exactly the same amplitude.
Therefore the binary information must be encoded entirely in the phase of the
output signal.
The angular separation between any two adjacent phases in QPSK is 90 . Therefore
a QPSK signal can undergo almost a + 45 or -45 shift in phase during transmission
and still
retain the correct encoded information when demodulated at the receiver. The truth
table of
QPSK modulator is shown below.
The output phase versus time relationship for a QPSK modulator is shown in the
fig.
2.19.
QPSK Reception (Demodulator)
The block diagram of a QPSK receiver is shown in fig 2.20. The power splitter
directs the input QPSK signal to the I and Q product detectors and the carrier
recovery
circuit reproduces the original transmit carrier oscillator signal.
The recovered carrier must be frequency and phase coherent with the transmited
reference carrier. The QPSK signal is demodulated in the I and Q product detectors,
which
generates the original I and Q data bits.
The output of the product detectors are fed to the bit combining circuit, where
they
are converted from parallel I and Q data channels to a single binary output data
stream.
Review Questions
Part �A 2 Marks
2 What is an ADC ?
3 What is Noise ?
4 What is a Channel ?
7 What is OOK ?
10 What an ARQ ?
Part �B 3 Marks
8 Explain FSK
Part �C 10 Marks
Optical Communications
Basic Principle:
The LASER, IR light emitting diodes are used to produce light rays. Hence they are
called as source. We use OFC optical fiber cable as a channel between transmitter
and
receiver. Similarly at receiver end, we use light detectors such as photo diode or
PIN diode
to convert light energy into electrical energy.
1) Transmitter
2) Channel (or) OFC
3) Receiver
Source
Light
Source
Source-to-fiber
interface
Voltage-to-Current
Converter
Signal
Regenerator
Signal
Regenerator
Current-to-Voltage
Converter
Light
Detector
Fiber-to-light
detector
interface
Analog (or) Digital
Interface
Destination
Transmitter:
defined by drive current. Amount of light emitted by light source is varied with
respect to
input digital (or) analog data. Hence it is called light intensity modulation. The
source to
fiber coupler is a mechanical interface. It is used to couple light limited by
light source
into the OFC.
Channel or OFC:
Optical Fiber Cable is used as a channel. OFC is made up of glass or plastic core
surrounded by cladding which is also glass. The whole structure is covered with
plastic
jacket or insulator. Based on the distance within the channel we are providing one
or more
regenerator or repeater which is used to reconstruct input signal.
Receiver:
Receiver consists of
wave guide)
3. The advantages of fiber are low loss, very wideband, flexible and light weight.
4. Unlike co-axial cables and microwave links, the optical systems are immune to
5. The diameter of the fiber cable is less than the diameter of the coaxial cable.
6. For large capacity of utilities, fiber optic systems are cheaper than the
coaxial
n1 >n2
.1
Fig.3.2 (a)
Optical fiber cable will transfer light energy from one end to another end.
Whenever a light enters from denser medium (refractive index is higher) to a rarer
medium
(refractive index is lower) light ray bend towards the normal.
.2=angle of refraction
Medium (2)
(n2)
900
�c Medium (1)
(n1)
Fig.3.2 (b)
Critical angle:
Critical angle is defined as that angle of incidence for which angle of refraction
is 90.
When angle of incidence higher than critical angle, total internal reflection takes
place.
Total internal reflection:
Cladding
Core
Fig.3.2 (c)
Total internal reflection is propagation of light ray within the optical fiber by
means of
successive reflection in between core and cladding area.
Total internal reflection occurs in the fiber when the following condition
satisfies.
1. The fiber core has a refractive index n1, which is greater than the refractive
index of
cladding material.
2. The angle of incidence is greater than critical angle oc.
sin....=n2/n1
OFC
Uses of cladding:
Refractive index of the core is uniform. Only single light ray will pass through
the
core. There are two types:
1. Single mode step index fiber with air cladding.
2. Single mode step index fiber with glass cladding.
Here core diameter is smaller one. Refractive index of the core is 1.5.
Uses:
Source to fiber
Aperture
Advantages:
� Minimum dispersion.
� Is wider external accepting leangle.
� Wider bandwidth and higher transmission rate or higher bit rate.
Disadvantages:
Refractive index of the core is uniform. Here core diameter is larger. More number
of
light rays is allowed to pass inside the core.
Advantages:
� Easier to manufacture.
� Since core diameter is larger, coupling of light ray into the fiber or taking out
is
easier.
Disadvantages:
� More dispersion occurs light ray get distortion due to difference in propagation
time.
� Lesser bandwidth, lesser bit rate.
Core has a non uniform refractive index. Center of the core has higher density
(high
refractive index value). Refractive index decreases gradually from centre to the
outer
surface.
Fig.3.4
Light ray travelling at the center will be with less speed and will travel lesser
distance.
But light ray travelling in the outer surface will travel with larger speed and
long distance.
So at the end both rays will reach receiver end at the same time.
When light ray propagate within optical fiber cable, it gets or under goes
attenuation
or loss which reduce the power.
Absorption losses:
Example:
1. Missing molecule.
2. Large number of atoms.
3. Presence of impurity in fiber material with change energy level.
Scattering losses:
Bending loss:
This is one type of radiative loss. It occurs when we make a bend in optical fiber
while laying.
1. Macroscopic bending
2. Microscopic bending
Macroscopic bending:
Macroscopic bends having radii that are large compared with fiber diameter. Large
curvature radiation losses are known as bending losses. When slight bend occur,
loss is
very small. When radius of curvature gets decreased, loss will increase.
Another form of radiation loss occurs due to small micro bends in the cladding
surface of the optical fiber. This occurs due to manufacturing defect as shown in
the figure.
Fig. 3.6 (a)
Due to variation in lateral pressure applied over the cladding area will also
produce
radiation loss. To reduce bending loss we use a compressible external jacket. So
external
pressure is applied the compressible jacket gets deformation, whereas optical fiber
cable is
protected.
Core and cladding will have different refractive index due to variation in
manufacturing component. Core and cladding will have different attenuation
constants .1
and .2.
. = .1 P core / P + .2 P clad / P
In optical communication system, at the transmitter end we are using two types of
light sources.
Advantages of LED:
LED types:
Characteristics of LED:
Basic principle:
When a voltage is applied to the leads of the source, electrons are able to
recombine
with electron holes within the device, releasing energy in the form of photons.
Surface Emitter LED:
In surface emitter LED Light emitting region is perpendicular to the fiber axis.
The well
like structure is created in the substrate by means of etching process. In this
well, fiber is
fixed using cement .Active region diameter is 50 um, 2.5 um thickness. Etched well
structure is used to concentrate or focus emitted light into optical fiber cable.
Light emitting active region is placed between two guiding layers. This guiding
layer will
focus emitter carriers into active region once again. Light ray will be emitted
along the axis or
parallel to the axis. Hence it produce light ray with more directional pattern.
Mostly surface
emitter LED�s are used, Because they emit more light.
Fig. 3.8 (Edge Emitter LED)
1. Photon absorption
2. Spontaneous emission
3. Stimulated emission
Photon absorption:
Spontaneous emission:
For longer time no photon will exist in higher energy state. Since higher energy
state
is unstable state, so it changes to ground state (lower energy state) by realizing
hv12.This is
called Spontaneous emission.
Stimulated emission:
Using external photons electrons in existed state can be made to jump over ground
state
and this process is called stimulated emission. Now we get twice the amount of
energy
levels which is shown in the diagram.
C:\Users\ra\Desktop\annai\diode-laser.gif
Fig. 3.10 (Construction and Working Diagram Of LASER)
The construction of LASER is similar to semiconductor LED but ends of junctions are
highly polished.
Lasing:
Since the end walls are highly polished, released carriers one again reflected and
focused to the active region. Next, they make free electron to recombine with free
holes and
in turn release photons with high energy level. This process is called lasing. This
process is
repeated giving high coherent and high quantum output light energy. Lasing will
occur after a
particular current level which is called threshed current.
Characteristics:
Fig. 3.11
Advantages of ILD (Injection LASER Diode) over LED:
� ILD coherent (orderly) light, where as LEDs emit incoherent (disorderly) light.
The light emitted from LED can be easily coupled into optical fiber cable. This
reduces coupling losses and allows smaller fibers to be used.
� The radiant Output power from an ILD is greater than that at higher bit rates
those LEDs.
� ILDs can be used at higher bit rates that LEDs.
� Reduced wavelength dispersion.
Disadvantage of ILDs:
Construction:
Principle:
When incident photon energy is higher than band gap energy of semiconductor, than
the photon releases it energy and make an electron to jump from valance band to
conduction band. This releases electron pairs. These released carriers are called
photo
carriers. Here intrinsic region thickness is large enough so that the carriers will
absorb more
light.
Fig. 3.13
Basic principle:
In avalanche photo diode the current get internally multiply before it enters
Input
circuit of the amplifier. This process is called carrier multiplication. For
carrier multiplication
takes place photo generated carrier should pass through high electric field region.
In
high electric field region photo carriers get high energy. Due to this high energy
carrier�s
ionization. Generated carries one second collides with bounded electrons by collide
on them.
This cause is known as impact ionization. Generated carriers one second collide
with
bounded electrons and lad to impact ionization. This effect is known as avalanche
effect.
Construction:
Again less concerted p type layer are diffusion is made this is followed by ....
layer
(heavily doped).
Layer construction:
.. Layer is intrinsic material layer. At ordinary or low reveres bias voltage most
through I layer or .. layer. Light enter the diode through .... region and get
absorbed in the ..
region.
When light is absorbed photon gives up the energy and creates new hole electron
pair. This electron hole pairs are separated in .. region.Then photo generated
electron drift
through high electric field. In high electric field region carrier multiplication
takes place.
Connectors or optical fiber connectors:
Connectors are used for making temporary joint between two optical fiber cables.
Connector Types
Channel
Butt joint connector uses metal or ceramic or mudded plastic ferrule for each
fiber.
Alignment of fiber is made by alignment sleeve.
Types:
Fig. 3.15
Fig. 3.16
In both connectors length of sleeve and guide ring on ferrule determine the
separation of
fiber.
Fig. 3.17
In this type we use two lenses on each end of the fiber. Lenses are used to focus
expanded beam on to the core of the receiver fiber or collimate the light coming
out of the
transmitting fiber. Distance between lenses fiber equal to focal length of lenses:
Advantage:
Permanent joint format between two individual optical fibers in the field or
factory is
known as fiber splices.
Types:
1. Fusion splice
Fig. 3.18
Fig. 3.19
3. Elastic tube splice
Fig. 3.20
Fiber couplers:
Fiber couplers are branching devices that split all the light from main fiber into
two or
more fiber and vice versa.
Combiner Splitter
Types:
Types:
In this method optical signals with different wave length are transmitted in
single
fiber. Using splitter or combiner method:
Fig. 3.22(a) Fig. 3.22(b)
Here we take either digital or analog signal (data).This signal will modulate the
light
source. Voltage to current converter act as electrical interface between input act
and the light
source. In transmitter we use light source either as LED or LASER.
Source
Source-to-fiber
interface
Light
Source
Voltage-to-Current
Converter
Signal
Regenerator
Signal
Regenerator
Fig. 3.23
Output emitted light of the light source is made proportional to Input signal
voltage by
means of varying the intensity of light. This is called light intensity modulation.
Fig. 3.24
Then optical fiber is glass or silica, core and cladding covered with plastic
jacket or
sheath. In between the channel at frequent distance we use regenerative repeater or
signal
regenerator for remove the noise and regenerate the original signal.
We use optical detectors as i) PIN photo diode or ii) APD. Photo detector is used
to
convert received optical energy into equivalent electric current (energy).Initial
amplification is
performed using pre amplifier circuit. Here noise level gets removed. Main
amplifier circuit
used to provide additional low noise amplification for the next blocks. During
transmission
received signal get distorted. This is may occur due to various factors.
1. Networking
2. Industrial Application
3. Military Application
Network Topologies:
Optical fibers are used for connecting computers which are called network
topologies.
Ring Topology:
Consecutive nodes are connected by point to point links. Data packets along with
address are transmit from one node to another node around the ring. Interface or
coupler will
read the address and suppose belong to that station it accept or otherwise pass to
the next
node.
Star Topology:
All the nodes are connected to central node or hub. It is either active or passive
device. It is a control node which controls all routing message within the network.
Mesh Topology:
If suppose there are n number of nodes, there will be 2n number of optical links.
Based on the application, the connection between nodes will vary. It provides
various link
path or multipath incase if there is any link or node failures.
Industrial Applications:
Optical fibers are used in situation where explosive and corrosive gases are used.
Here single mode fiber optical phase sensors are used for measurement of pressure
or temperature in industry. Initially light from laser source is passed through
reference fiber
and also through a optical fiber connected in measuring environment.
When any pressure or temperature changes will change optical fiber length, core
diameter and refractive index with respect to reference fiber. This gives change in
optical
light phase. There is a phase difference between two light races. This change will
provide
temperature or pressure measurement.
Image result for Pressure or temperature measurement of optical fiber
Fig. 3.26
Here we use optical flow sensor meter. In this apparatus multimode optical fiber is
inserted across the pipe. From which liquid flows it will stretch the fiber.
Turbulence over the
fiber across light ray to oscillate. The frequency of oscillation is made
proportional to flow
rate.
Here intensity modulated light ray is transmitted and mean while made reflected by
target and received by the detector. Function of time difference between starting
and end
time will be equated or given. The distance between fiber and target. Now it any
displacement occurs that displacement of the target is measured using optical
detector.
Short distance optical fibers systems are utilized to connect closely spaced items
of
electronic equipment. These operate over distances from several centimeters to a
few
hundred meters at transmission rates between 50 bauds and 4.8 kbits/s.
Long distance applications include torpedo and missile guidance, information links
between military vessels and maritime.
UNIT-III
PART- A
PART-B
PART- C
3. (a) Explain the principles of lights transmissions in a fiber using ray theory
(b) With the diagrams explain any two applications of optical fiber
5. (a) Explain single mode step index fiber and graded index fiber
(b) Draw the block diagram of optical receiver and explain its operation
SATELLITE COMMUNICATION
Satellite communication
1. Active Satellite.
2. Passive Satellite
Active satellite:
Kepler�s orbital law states that satellite will follow elliptical orbital path in
its orbit
around the primary body (earth). Ellipse will have two focal points (or foci) f1
and f2 shown
below.
Centre of ellipse
a a
Fig.4.2
In two bodies system (earth, satellite) centre of the mass is called barycentre and
lies
on any one of the foci. The foci which coincide with the centre of the earth is
selected as
reference foci.
..=
v..2-b2
..
------------------ (1.1)
Kepler�s second law:
Kepler�s second law states that for equal time intervals the satellite sweeps out
equal
areas in the orbital plane, focused at the barycentre.
Earth
S2 S2
sS
Fig.4.3
A1=A2
The velocity is greatest at the point of closer to the earth (perigee) and the
speed is
least at the farthest point from earth (termed as apogee).
Kepler�s third law state that square of the periodic time of the orbit is
proportional to
cube of mean distance between two bodies.
..38..02
a= mean distance
1. Atmospheric drag
2. Earth magnetic field etc
`Similarly for distance satellite main disturbing force will be gravitational pull
between
sun and moon.
Satellite orbits:
Most of the satellites are called orbital satellites which are non synchronous.
These
non synchronous satellites will follow either elliptical or circular pattern. The
direction will be
either clockwise or counter clockwise.
Circular Orbit:
Direction of Rotation
CCW CW
CCW Rotation
Satellite (ws)
Fig.4.4
Elliptical Orbit:
Direction of Rotation
CCW CW
Fig.4.5
Prograde orbit:
Retrograde orbit:
Advantages:
Propulsion rocket are not required on board the 10 keep satellite on this
respective orbits.
1. Polar orbit.
2. Inclined elliptical orbit
3. The equatorial geosynchronous orbit.
polor
Equator
geocenter
Equatorial
Fig.4.6
Polar orbit:
Rotate over the north and south poles of the earth. It is low altitude and closer
to
earth. It can cover 100 percent over earth surface. Angle of inclination of
satellite is90�.
Advantages:
Periodic time is the time required for one complete orbital rotation. In
synchronous
orbit, periodic time is integer multiple or sub multiple of earth rotational
period. So
geostationary orbit is a synchronous orbit. This orbit is widely used. The
satellite rotation
period is same of earth (23 hours and 56 minutes).
C:\Users\amman\Downloads\images.jpg
Fig.4.7
Global coverage:
Advantages:
� The satellite remains almost stationary relative to the earth antennas. Hence
computer controlled tracking is not required. A fixed antenna is satisfactory.
� There is no break in transmission, since geosynchronous satellite is
permanently in view from earth station.
� A geosynchronous satellite can cover 42.5% of the earth�s surface. A large
number of earth stations may thus intercommunicate.
� Three satellites will give global coverage.
� There is no Doppler shift frequency.
Disadvantages:
Orbital Terms:
C:\Users\amman\Downloads\satellite-orbit-elliptical-01.gif
Fig.4.8
Apogee:
Active satellite
Passive satellite
Example: Moon.
When the satellite longitude is east of the earth station, satellite enters eclipse
during
day light (and early evening) hours for the earth station as shown in fig.4.9. When
the
satellite longitude is west of the earth station, eclipse does not occur until
earth station is in
darkness. Thus satellite longitude which are west, rather than east of earth
station are
desirable.
C:\Users\amman\Downloads\images (1).jpg
Fig.4.9
Parabolic reflector:
Two basic kinds of antennas are used in the earth stations. They are
To Low Noise
OMT
C:\Users\amman\Downloads\parabolic-reflector-antenna-fig2.jpg
Amplifier
Fig.4.10
has a focal point fy where feed phase centre is located. Here feed is connected to
HPA (High
Power Amplifier) and LNA (Low Noised Amplifier) through an OMT (Orthogonal Mode
Transducer).It is a three port network.
Transmitting mode
When the antenna is transmitting the signal, energy from the output of HPA is
radiated at focal point by the feed and illuminates the reflector. The reflector
reflects and
focuses the signal energy into a narrow beam.
Receiver mode
When the parabolic is in the receiver mode it captures the signal energy and
converges it
on the focal point which is then received by the feed and routed to input of LNA.
Advantages:
Cassegrain antenna:
Main parabolid reflectors focal point is coincident with the virtual focal point
of the
Hyperboloid sub reflector. Feed horn or phase centre of the feed horn is located at
original
focal point of sub reflector.
To LNA
Fig.4.11
Transmit mode:
When the antenna is in transmitting mode firstly the signal energy from output of
HPA
is radiated at the real focal point of the sub reflector by the feed that
illuminate the convex
surface of the sub-reflector.
The sub reflector reflects the signal energy back to the parabolic main reflector
through hyperboloid sub reflector. The reflected energy is then reflected by the
main reflector
and it forms antenna beam.
Receive mode:
Advantages:
Space segment:
In communication satellites, there are many sub system. These sub system are
mainly classified into two groups.
1) Communication subsystem:
These includes
� Power stabilization
� Propulsion
� Station keeping
� Altitude control and
� Telemetry Tracking and Command (TTC)
Transponder:
Supporting subsystem:
Power supply
Electric power is needed for the satellite system to run space craft and
communication subsystem. Electric power is obtained from solar cells when satellite
is
stationary. But during satellite launching period electromechanical accumulator
will provide
electric power or power supply.
Solar cell:
These are photo voltaic cell convert solar energy into electrical energy. Solar
cell
generates 1 to 2 kW power. They are made up of aluminium and gallium arsenide. When
solar power failure occurs, (during solar eclipse) storage power is needed. So we
use
nickel cadmium batteries. Battery voltage is 20 to 40V with 20 to 50 ampere/ hour
rating.
Altitude control:
Altitude control is keeping the satellite in its orbital height on the space. For
this
satellite has number of equipment for controlling the altitude. Altitude control is
necessary
because we use highly directional antenna. Reasons for change in the altitude are,
So orientation of the satellite changes. So now altitude control detects the change
Horizon detector uses 4 sensors. It detect rim of the earth and convert earth into
4
segment. Each sensor is responsible for each quadrant. Centre of earth is taken as
reference point. When there is any change in the orientation particular sensor (one
or two)
will generate control signal. This control signal produce restoring torque which
brings
satellite into correct position.
Example:
� Spin stabilization.
� Gravity gradient stabilization.
1. Momentum wheel
2. Electromagnetic body
Here satellite altitude is defined by three axis roll, pitch, & yaw (RPY) axis.
Pitch Rotation
Fig.4.12
The entire three axes pass through centre of gravity of the satellite. Yaw axis is
directed towards earth centre. Pitch axis is normal to orbital plane. Roll axis is
perpendicular to other two axis.
Station keeping:
Sometimes due to certain factors satellite is drifted from its orbital paths.
So we need counteraction for this drift and once again satellite placed in its
original
orbital path. This process is called station keeping. This counteraction is
provided by firing
small jet rockets. These jets will produce pulses once for every 2 or 3 weeks. So
satellite will
drift back to its original position.
Due to gravitational pull between sun and moon satellite also drift in latitude
position.
This makes the satellite to inclined up to certain degree. So as usual
counteraction is
produce at the appropriate time provided by jets and the inclination is made zero,
this is
called North South station keeping
Transponder:
Duplexer
Satellite
Antenna
Front End
Carrier
Processing
Power
Amolifier
Fig.4.13
1. Duplexer
2. Front end converter
3. Carrier processing unit
4. Power amplifier.
1. Front end receive the signal in uplink frequency and remove noise and give free
amplification
2. Frequency transaction from uplink to downlink is done by carrier processing
unit.
3. Finally power amplifier increases the gain or power level. So that signal can be
retransmitted to earth.
Duplexer
Duplexer is a switching unit which uses for single antenna for transmission and
reception.
Equalizer
Low Noise
Amplifier
RF
Filter
From
Antenna
RF Front End
Fig.4.14
Front end converter includes following section
� RF filter
� Equalizer
� Low noise amplifier
RF filter is removing the RF noise. Equalizer cancels the delay distortion. Low
noise
amplifier has high power gain with low noise contribution.
From To diplexer&
Power
Amolifier
RF Front
End
Frequency
Mult.
Stable Oscillator
Fig.4.15
Carrier processing unit is used for frequency translation from uplink frequency to
downlink frequency. There are four different methods for frequency translation.
1. RF to RF conversion or translation.
2. RF to IF conversion or translation.
3. IF Remodulation.
4. IF modulation and RF Remodulation.
shown above.
Power amplifier:
TTC will carry out all of the control signals to make the satellite in working.
Main
functions are
Receiving the command signals from the ground control station to initiate stations
keeping & operation of the onboard equipments. Telemetry system provides data�s to
the
ground. This data�s gives status or condition of the satellite system. The data�s
are
obtained from large no.of sensors mounted on satellite. For command operation,
satellite
contains a receiver. This receiver is used only to get command signal from TTC
control from
earth station.
Tracking
Thermal control
Satellite receive thermal radiation from sun, earth etc. Satellite equipments also
produce heat. But for proper operation of satellite equipments are free from
variation in
temperature.
Antenna subsystem
1. Dipole antenna
2. Helical antenna
3. Horn antenna
4. Antenna arrays
5. Parabolic reflector.
Mostly parabolic reflectors are used because of highly directional pattern. The
gain of
the reflector antenna can be increased and beam width made narrower by increasing
the
diameter of the reflector and decreasing the wavelength. Large reflector antennas
are also
user for communication satellite.
The earth segment consist of transmit and receive earth station for effective
satellite
communication. It consists of
1. Ground terminal that control and monitor satellite.
2. Communication between various earth stations that operate via satellite.
Base Band
Equipment
Down
Converter
Demodulator
Para Amp
Diplexer
Low Noise
Amplifier
High Power
Amplifier
Modulator
Up Converter
Fig.4.16
1. Type of mount
2. Steerability
3. Gain
4. Beam width
5. Side lobe levels
6. Pointing accuracy
7. Wind speed
Types of mount:
To get high gain of the antenna, beam is aligned or pointed towards the satellite.
Antenna has to keep track of the satellite. There are four types of tracking.
1. Manual tracking.
2. Auto tracking.
3. Programme tracking.
4. Step tracking.
Manual tracking
This is used for station for larger bandwidth. In auto tracking method, feedback
control
system is used to get the error signal & generate counter signal to nullify the
error. In
programme tracking method, control action is generated using computer.
Pre amplifier or low noise amplifier section is used to amplify received signal
with
very low gain or weak. Usually FET amplifiers are used.
Transmitter power required range is between few watts for telephone and upto
3kwatt for television signal. Power requirement mainly depends on antenna gain.
Power
amplifier gets input in few milliwatt and amplify them to few kilowatt. We use
either klystron
or travelling wave tube (TWT) amplifier.
Up converter are used to convert 70MHZ carrier to uplink frequency of 6 GHZ range.
This is done in two states.
Power supply system should provide uninterrupted power supply for proper earth
station working. It consists of
1. Rectifier unit
2. Inverter
3. Battery backup
4. Diesel generators
5. Associated switching arrangement
Mobile services of small earth station is portable. The portable earth station will
move
within specific coverage area. The antenna system will move in all direction. Main
application
is global shipping. Mainly there are two types of earth station.
1. Standard A
2. Standard C
Standard A
ADE consists of
1. Parabolic antenna.
2. Diplexer unit.
3. High power amplifier for transmission.
4. LNA for reception.
5. Power supply unit.
Standard C
Standard c uses ground earth station (GES).They provide link between terrestrial
system and satellite network. They operate in c-band. Main parts are
1. 12 metre antenna
2. RF to IF conversion equipment.
3. Access and signal equipments.
GPS (Global Positioning System)
� Ships
� Aircrafts and in surveying
Features
Satellite 1 Satellite 2
Satellite 3
R1 R2 R3
. GPS Receiver
Fig.4.17
Three satellite provide distance information i.e. range .... from receiver to node
points.
These .... is assumed to the radius of sphere from with particular satellite at its
centre.
Receiver will be lies at the intersection of three spheres. So the receiver will
locate the
position latitude, longitude of a place.
GPS Receiver
Receiving Antenna
A/D
Converter
Down
Converter
LNA IF AMP
Local
Oscillator
Digital Signal
Processor
Clock Navigation
Message
Clock
Microprocessor
Display
Fig.4.18
The antenna is circularly polarized antenna with an LNA connected to it. For down
conversion we use superhetrodyne receiver which will generate IF signal with
bandwidth
2MHZ. This IF is sampled and processed using I and Q sampling techniques by means
of
A/D converter and DSP (digital signal processing) .Microprocessor carries out the
timing
measurements and calculates the receiver�s position.
There are two frequency bands L1 and L2 used by GPS satellite. The L2 signal is
modulated with 10.23 Mbps bit sequence called the p code. This is used by military
positioning systems. The L1 frequency carrier is modulated by 1.023Mbps that is
used for
public use.
Microwave communication
Microwave transmitter
Microwave Transmitter
Baseband input
RF
Amplifiers
and band
pass filter
Mixer/
Converter
IF Amplifiers and
band pass filter
Modulator
Pre-emphasis
network
Microwave
generator
Fig.4.19
Pre-emphasis network
Modulation
Lower baseband signal is frequency modulated and upper baseband signal is phase
modulated. For modulation we use 70MHZ IF as carrier frequency. Output of modulater
will
be FM narrowband signal. This is first conversion.
Mixer/converter
IF frequency is up-converted to microwave frequency using mixer, microwave
oscillator and band pass filter. By this conversion IF frequency converted to RF
frequency
using heterodyne process. Instead of mixer if multiplier is used frequency
bandwidth will be
larger or higher.
Microwave generator
Power amplifier is used to increase gain of RF signal and transmit via antenna.
Microwave receiver
Microwave Receiver
RF
Amplifiers
and band
pass filter
Mixer/
Converter
IF Amplifiers and
band pass filter
Demodulator
De-emphasis
network
Baseband OUTPUT
Microwave
generator
Fig.4.20
Down conversion
Band pass filter, mixer and microwave oscillator down convert RF microwave
frequency into IF frequency.
Demodulator
IF frequency is fed to FM demodulator. Output of FM detector or demodulator will be
De-emphasis
Advantages
� Because of their high operating frequencies, micro wave radio system carry
larger information.
� Short wavelength hence small antennas are used.
� Minimum delay times.
� Minimum crosstalk between voice channels.
Microwave devices
1. Multicavity klystron.
2. Reflex klystron.
3. Magnetron.
4. Travelling wave tube (TWT).
5. Cross field amplifier.
6. Backward wave oscillator.
7. Gunn diode.
8. PIN diode.
When the distance between microwave transmitter and receiver lies between 15
miles to 40 miles, there is no need for repeater. If suppose distance above 40
miles then
microwave repeaters are needed.
Definition
Block diagram
Microwave
Receiver
Microwave
Transmitter
Receiver Transmitter
Microwave Repeater
Fig.4.21
Types
1. IF
2. Baseband
3. RF
Microwave repeater circuit diagram (IF band or IF repeater)
IF amp and
filter
IF amp and
filter
Rx Antenna
IF IF
Mixer
Mixer
RF RF
RF Amplifier
circuit
BPF
BPF
Microwave Generator
Fig.4.22
Parametric amplifier
Basic principle:
Working principle:
Consider an LC tank or tuning circuit. When capacitor plates are moved apart then
voltage between them is positive maximum and some work is done on the capacitor.
This
work (or) energy will increase the previous voltage across the capacitor
(amplification).When
capacitor plates are moved closer together then the voltage between them will be
zero.
Again when plates are moved apart, voltage across will be negative maximum. Now
also
some work is done which will increase the voltage across the capacitor
(amplification).This
amplification process is done at regular interval.
When we apply some signal as source signal to the parametric amplifier and another
signal as input signal, then input signal get amplified by taking the energy from
source
signal.
Amplification mechanism
C:\Users\amman\Downloads\images.png
a. Signal input voltage
b. Pumping voltage
Fig.4.23
Parametric amplifier circuit
C:\Users\amman\Downloads\mwm0032a.jpg
Fig.4.24
Principle
Circuit explanation
Here small input signal (.... ) & a pumping signal ( ....) are applied to varactor
diode.
The input signal .... is amplified with respect to variation in capacitance of
varactor diode.
Energy used to vary the capacitance is obtained from pumping signal.
Travelling wave tube uses a helical path. Electron gun is used to produce very
narrow electron beam. This electron beam is send through centre of the helical
path. Helix is
made positive with respect to cathode and collector. Thus the beam is attracted by
the
collector with the high velocity. The beam is also made narrow using a focusing
electron and
it does not touch the helix. Input signal is applied to input end of the helix.
The electric field due to this signal propagate around the helix with the speed
different from speed of light. Speed of the electric field is equal to velocity of
light multiply by
ratio of helical pitch to the helix circumference. Hence electric field velocity is
made slow and
equal to electron beam velocity. Now electron beam and the helical RF field
interact. This
lead to electron bunching.
Electron bunching
Electron beam get focused at every helical path giving energy to the input RF
electric
field, which gives or produce amplification of the signal is called electron
bunching.
C:\Users\amman\Downloads\images (2).jpg
Fig.4.25
Amplification mechanism
Initially RF field will be lesser in amplitude. Electron beam will be emitted from
cathode at intervals. When electron beam pass through gap of the helix, velocity
modulation
takes place. At adjacent turns of helix, electron bunching takes place. When the
initial bunch
of electron reaches next turn of the helix, the variation in phase of the input
signal will
change the electron bunch. This results some more or additional bunching of
electron. So
once again input signal get amplified. This process continues till the input signal
reaches the
output end and reaches with maximum value at the end.
UNIT- IV
PART-A
PART- B
(b) With a block diagram explain the operation of microwaves link repeater
(b) With the block diagram explain transmit receive earth station
5.1.1. Introduction
The cellular radio mobile telephone services is the latest development in modern
communication systems. It plays an important role in providing safety measures and
warning
to traffic jams, road accidents, breakdown cases etc., for assistance to ambulance,
police
and fire-brigades for immediate help and assistance to the scene of occurrence of
disasters
During the second world war, the mobile radio transmitter were used by the allied
forces from the front lines to give pre-warnings to the base stations for quick
necessary
actions. The first commercial mobile radio telephone services were developed by
M/SBell @
Co. in the USA in 1964 in six channels in 150 MHz band
In cellular telephone system, the same channel frequency may be used several times
in the same city for which the given area is divided in to a number of regions or
cells. Each
being served by a specific band of frequencies, and none of the cells surrounding a
given
cell, employing the same frequency.
i. The system should provide service to hand-held portable phones as also to mobile
With the cellular concept, each area is further divided into hexagonal-shaped
cells
that fit together to form a honey comb pattern as shown in the fig.5.1 (a).
Fig 5.2
The figure shows the Hexagonal cell grid is superimposed over a metropolitan area
The physical size of a cell varies, depending on user density and calling
patterns. For
example, large cells (called macro cells ) typically have a radius between 1 mile
and 15
miles, with base station transmit power between 1W and 6W. The smallest cells
(called
microcells) typically have a radius of 1500 feet or less, with base station
transmit powers
between 0.1W and 1W.
Microcells are used most often in high-density areas such as found in large cities
and inside
buildings. Macro cells may overlay clusters of microcells with slow moving mobile
unit using
the microcells and faster moving units using the macro cells. The mobile unit is
able to
identify itself as either fast or slow moving.
In hexagonal shaped cells, the base station transmitter can be located in three
places. They are
i. Center excited cells - Here the base station transmitter is located in the
center of a
cell, as shown in the fig.5.2 (a).
ii. Edge excited cells - Here the base station transmitter is located in the
vertices of a
cell, as shown in the fig.5.2 (b).
iii. Corner excited cells - Here the base station transmitter is located in the
corner of a
cell, as shown in the fig.5.2 (c).
Fig 5.4
Omni directional antennas are normally used in center excited cells, and sectored
directional antennas are used in edge and corner excited cells.
Cells are grouped into cluster. Each cluster utilizes the entire available radio
spectrum.
The reason for clustering is that adjacent cells cannot use the same frequency
spectrum because of interference. So the frequency bands have to be split in to
chunks and
distributed among the cells of a cluster. The number of cells in a cluster is
cluster size or
frequency reuse factor.
The cells that use the same set of frequencies or channels are called co-channel
cells.
The allocation of channels within the cluster and between cluster must be done so
as
to minimize both of these.
5.1.3. Simplified cellular telephone system
Fig 5.5
mobile station is a simple mobile phone ,while base stations consists of several
transmitters
and receivers which simultaneously handles full duplex communications and consists
of
several towers which carries transmitting and receiving antennas.
A number of base stations are connected with mscs through microwave link or using
telephone cables or through leased lines depending on the distance of separation
and
number of users.
The base station acts as a bridge between , mobile station and mobile switching
centre .
Fig.5.3 shows a basic cellular system, which consists of mobile stations, base
station
and a mobile switching center (MSC). The mobile switching center is sometimes
called
mobile telephone switching office (MTSO), since it is responsible for connecting
all mobiles
to the PSTN in a cellular system. Each mobile communication via radio with one of
the base
station and may be handed-off to any number of base station throughout the duration
of a
cell.
Fig 5.6
The cell transmitting antenna is a single driven Omni directional element mounted
on
top of the transmitting tower
The cell receiving antenna system is kept on third of the way down the transmitting
tower consists of six half wave vertical dipole antennas each with 900 corner
reflector. the
position of the dipole w rt the corner reflector gives each assembly a 600 beam
width
radiation pattern(6X60=3600)
The MSC co-ordinates the activities of all of the base stations and connects the
entire cellular system to the PSTN. A typical MSC handles 10000 cellular
subscribers and
5000 simultaneous conversations at a time.
The channels used for voice transmission from the base station to mobile are called
The channels used for voice transmission from mobiles to the base stations are
called reverse voice channels (RVC). The two channels responsible for initiating
mobile
calls are the Forward Control Channels (FCC) and Reverse Control Channels
(RCC).Control
channels are often called set up channels because they are only involved in setting
up a call
and moving it to an unused voice channel.
When a cellular phone is turned ON, but it is not get engaged in a call, it first
scans
the group of forward control channels to determine the one with the strongest
signal and
then monitors that control channel until the signal drops below a unable level. At
this point it
again scans the control channels in search of the strongest base station signal.
The 5% of the total number of channels are control channels, and 95% are dedicated
to voice and data traffic for the end users. The controls channels are standardized
over the
entire geographic area.
When a telephone call is placed to a mobile user, the MSC dispatches the request to
all base stations in the cellular system. The mobile identification number (MIN)
which is the
subscriber�s telephone number, is then broadcast as a paging message over all of
the
forward control channels throughout the cellular system. The mobile receives the
paying
message sent by the base station which it monitors, and responds by identifying
itself over
the reverse control channel. The base station relays the acknowledgement sent by
the
mobile and informs the MSC of the handshake. Then the MSC instructs the base
station to
move the call to an unused voice channel within the cell. Typically, between 10 to
60 voice
channels and just one control channel are used in each cell�s base station. The
base station
signals the mobile to change frequencies to an unused forward and reverse voice
channels
to instruct the mobile telephone to ring, thereby instructing the mobile user to
answer the
phone.
Once a call is on progress, the MSC adjust the transmitted power of the mobile and
changes the channels of the mobile unit and base stations in order to maintain call
quality as
the subscriber moves in and out of range of each base station. This is called a
hand-off.
When a mobile originates a call, a call initiation request is sent on the reverse
control
channel. With this request the mobile unit transmits its telephone number (MIN),
electronic
serial number (ESN), and the telephone number of the called parity. The mobile also
transmit a station class mark (SCM) which indicates what the maximum transmitter
power
level is for the particular user. The cell base station receives this data and
sends it to the
called party through the PSTN, and instructs the base station and mobile user to
move to an
forward and reverse voice channel pair to allow the conversation to begin
Fig 5.7
All cellular systems provide a service called roaming. This allows subscribers to
operate in service areas other than the one from which service is subscribed.
The same spectrum can support multiple users separated by a distance is the
primary approach for efficiently using the spectrum. The reusing of available
spectrum is
called �frequency reuse�.
Fig 5.8
To understand the frequency reuse concept, consider a cellular system which has a
total of S duplex channels available for use. If each cell is allocated a group of
K channels
(K<S), and if the S channels are divided among N cells in to unique and disjoint
channel
groups, which each have the same number of channels.
Fig 5.9
S=KN
The N cells which collectively use the complex set of available frequencies is
called a
�cluster�. If a cluster replicated M times within the system, the total number of
duplex
channels C, can be used as a measure of capacity and is given by
C=MKN=MS
A larger cluster size causes the ratio between the cell radius and the distance
between co-channel cells to decrease, leading to weaker co-channel interference.
Conversely, a smaller cluster size indicates that co-channel cells are located much
closer
together.
The frequency reuse factor of a cellular system is given by 1/N, since each cell
within
a cluster is only assigned 1/N of the total available channels in the system.
5.1.5. Interference
iv. Any non cellular system which inadvertently leaks energy in to the cellular
frequency
band.
Interference on voice channels causes cross talk, where the subscriber hears
interference in the background due to an undesired transmission. On controls
channels, interference leads to missed and blocked calls due to errors in the
digital
signaling. Interference is more severe in urban areas, due to greater RF noise
floor
and the large number of base stations and mobiles. The two major types of system
generated cellular interference are co-channel interference and adjacent channel
interference.
Frequency reuse implies that in a given coverage area there are several cells that
use the same set of frequencies. These cells are called co-channel cells. The
interference
between signals from these cells is called co-channel interference. Co-channel
interference
can be produced by simply increasing the carrier power of the transmitter. This is
because
an increase in carrier transmit power increases the interference to neighboring co-
channel
cells. To reduce co-channel interference, co-channel cells must be physically
separated by a
minimum distance to provide sufficient isolation due to propagation.
Fig 5.10
When the size of each cell is approximately the same and the base stations
transmit
the same power, the co-channel interference ratio is independent of the transmitted
power
and becomes a function of the cell (R) and the distance between centers of the
nearest co-
channel cells (D).
By increasing the ratio of D/R, the spatial separation between co-channel cells
relative to the coverage distance of a cell is increased. The parameter Q, called
the co-
channel reuse ratio, is related to the cluster size.
A small value of Q provides larger capacity, since the cluster size N is small,
whereas
a large value of Q improves the transmission quality, due to a smaller level of co-
channel
interference.
Interference resulting from signals which are adjacent in frequency to the desired
Fig 5.11
Mobile unit 1 is located very close to the base station, and F2 is located next to
F1 in
the frequency spectrum (i.e., the adjacent channel). Therefore mobile unit 1 is
receiving F2 at
a much higher power level than F1. Because of the high power level, the filters in
mobile unit
1 cannot block all the energy from F2, and the signal intended for mobile unit 2
interfere with
mobile unit 1�s reception of F1. The F1 does not interfere with mobile unit 2�s
reception
because F1 is received at a much lower power level than F2.
By keeping the frequency separation between each channel in a given cell as large
as possible, the adjacent channel interference may be reduced considerably. If the
frequency reuse factor is large (eg. Small N) the separation between adjacent
channels at
the base station may not be sufficient to keep the adjacent channels interference
level within
tolerable limits.
As the demand for wireless service increases, the number of channels assigned to a
cell becomes insufficient to support the required number of users. At this point
cellular
design technique are needed to provide more channels per unit coverage area. The
technique such as cell splitting, sectoring and coverage zone approaches are used
to
expand the capacity of cellular systems.
The purpose of cell splitting is to increase the channel capacity and improve the
availability and reliability of a cellular telephone network. When a cell reaches
maximum
capacity, that means when the number of subscribers wishing to place a call at any
given
time equals the number of channels in the cell, this is called the maximum traffic
load of the
cell. If a new cell is initiated in an area where all the channels are in use, a
condition called
blocking occurs. A high occurrence of blocking indicates that a system is
overloaded.
Fig 5.12
Splitting cell areas create new cells, providing an increase in the degree of
frequency
reuse, thus increasing the channels capacity of a cellular network. Cell splitting
provides for
orderly growth in a cellular system. The major drawback of cell splitting is that
it results in
more base station transfer (hand offs) per call and a higher processing load per
subscriber.
The concept of cell splitting is shown in the fig.5.7. Macro cells are divided
into mini
cells, which are then further divided in to microcells as traffic density
increases. Each time a
cell is split, its transmit power is reduced. Cell splitting increases the channel
capacity of a
cellular telephone system by rescaling the system the system and increasing the
number of
channels per unit area (channels capacity). Hence cell splitting decreases the
radius while
maintaining the same co-channel reuse ratio (D/R).
The cell splitting merely scales the geometry of the cluster. In this case the
radius of
each new microcell is half that of the original cell.
5.1.6.2. Sectoring
In cell splitting method the cell radius is decreased and keeping the co-channel
reuse
ratio D/R unchanged, which will increase the number of channels per unit area. In
another
way to increase capacity is to capacity is to keep the cell radius unchanged and
decrease
the D/R ratio; called sectoring. The sectoring increases SIR (Signal to
Interference ratio) so
that the cluster size may be reduced. In this method, first the SIR is improved
using
directional antennas, then improve capacity by reduced the number of cells in a
cluster, thus
increasing the frequency reuse. To do this method successfully, it is necessary to
reduce the
relative interference without decreasing the transmit power.
Fig 5.13
The technique for decreasing co-channel interference and thus increasing system
performance by using directional antennas is called sectoring. The factor by co-
channel
interference is reduced depends on the amount of sectoring used. A cell is normally
partitioned into three 1200 sectors or six 600 sectors as shown in the fig.5.8.
When a mobile unit moves from its own service area to another service area is
called
roaming. This allows subscribers to operate in service areas other than the one
which
service is subscribed .When a mobile enters a city or geographic area that is
different from
its home service area, it is registered as a roamer in the new service area . This
is
accomplished over the FCC , since each roamer is camped on to an FCC at all times.
Every several minutes , the MSC issues a global command over each FCC in the
system, asking for all mobiles Which are previously unregistered to report their
MIN and
ESN over the RCC.
New unregistered mobiles in the system periodically report back their subscriber
information upon receiving the registration request, and the MSC then uses the
MIN/ESN
data to request billing status authorization for billing purposes, the MSC
registers the
subscriber as a valid roamer. Once registered, roaming mobiles are allowed to
receive and
place calls from that area, and billing is routed automatically to the subscriber�s
home
service provider.
received signals to the MTSO, which estimates the quality of two signals and
determines
when the transfer should occur. A soft hand off requires that the two base stations
operate
synchronously with one another. Fig.5.9 shows how a base station transfer is
accomplished
when a mobile unit moves from one cell in to another. The mobile unit is moving
away from
base station 1. (ie, Towards base station 2). When the mobile unit is at positions
W and X, it
is well with in the range of base stations 1 and very distant from base station 2.
However
then the mobile unit reaches position Y, it receives signals from base stations 1
and base
station 2 approximately at same power level, and the two base stations should be
setting up
for a hand off. When the mobile unit crosses from cell 1 into cell 2, the hand off
should be
executed and completed.
The computers use hand off decision algorithms based an variations in signal
strength and signal quality. When a call in progress, the switching center monitors
the
received signal strength of each user channels .Hand offs can be initiated when the
signal
strength measured by either the base stations or the mobiles unit�s receiver falls
below a
predetermined threshold level. During hand off, information about the user stored
in the first
base stations is transferred to the new base stations.
Blue tooth is a new technology standard using short range radio links ,that are
replacing
connecting cables. It is a standard protocol for wireless connectivity with a
minimum user
effort with a diverse range of devices ranginf from PDA, Mobiles, Laptops to
cooking oven,
scanners to printers .
fig 5.14
The name blue tooth comes from the Dutch ruler � herald Blue tooth� . Choosing the
name
for the standard indicates how important the companies from Baltic region, Denmark,
Fig 5.15
Blutooth is a global wireless communication standard that connects devices together
over a
certain range.it was invented by telecom vendor ericsson in 1994.it is a
standarizad protocol
for sendind and receiving data via a 2.4GHZ wireless link.the blutooth devices can
communicate at ranges of upto 10metres.
A blutooth device user radio waves instead of wires or cables to connect to a phone
or
computer. A blutooth product,like a cell or watch contains a tiny computer chip
with a
blutooth radio and software that makes it easy to connec.when two blutooth devices
want to
communicate to each other , they need to pair.communication between blutooth
devices
happens over short rande,adhoc networks known as piconts.piconet is a network of
device
connected using blutooth.
The sharing may be based on frequency or time or code. The wireless telephony
applies
duplexing technique ,which enables talking and listening at the same time like FDD
frequency Division Duplexing which offeres two bands of frequencies for every
user.The
simples channel consists of a forward and a reverse channel and so each duplex
channel
consists of one simplex channel.
These forward and reverse channels are separated with a frequency band in the
entire
system. The time division duplesxing known as TDD makes use of time instead of
frequency to have the same forward and reverse channels.
Both FDD and TDD have advantages and dis advantages. These multiple access schemes
with any one of these techniques is used in wire less communication systems
Several users share the time slots of the entire available time.Each duplex channel
(TDD)has individual time slots for forward and reverse time slots to have
bidirectional
communication. A TDD time slot on the same frequency is shown in the diagram:
Fig 5.16
In TDMA digital data transmission and digital modulation are allowed. Many users
can
access their channel in their respective time slots. The transmission from several
users are
interlaced into a single frame as shown
Fig 5.17
In this format the preamble field contains the synchronization information and
address
informations.The guard bits use allow synchronization of different receivers
between various
frames and time slots.
It is assumed that there are N number of time slots for N number of users so that
each user
access the channel in their allowed time slot.
Some TDMA features: 1)Each user of tdma multiple access scheme shares same carrier
frequency but with non over lapping time slots
Fig 5.18
In FDMA, all users share the satellite at the same time, but each transmits in its
own
unique frequency band. This is most commonly employed with analog modulation, where
signals are present all the time. The available transponder bandwidth is divided
among the
users the all can transmit simultaneously, as illustrated in the fig.5.10.
In FDD,the duplex channel contains dual simplex channels namely forward and
reverse channel as in figure. The forward frequency band provides radio traffic
from base
station BTS TO THE MOBILE UNIT where as the reverse frequency radio band provodes
radio traffic from mobile unit TO THE BASBASE STATION. A duplexdevice is kept in
mobile
unit and base station for enabling simultaneous conversion.
2) In FDMA scheme ,if a channel is not in use it will be idle and it will not be
used by some
other uses.Hence there is a chance of resourse wastage
Types:
In this system, a number of users occupy all of a transponder band width all of
the time. The signals from different users are encoded, so that information from an
individual
transmitter can be detected and recovered only by a properly synchronized receiving
stations that knows the code being used . That is each receiving station has its
own code,
called its address and a transmitting station simply modulates its transmission
with the
address of the intended receiver whenever it wishes to send a message to that
receiver.
the proper address. These addresses are usually in the form of periodic binary
sequence
that either modulate the carrier directly or change the frequency state of the
carrier. Address
identification is accomplished by carrier correlation operation. Digital address is
obtained for
code generators.
A station address generator continually cycles through its address sequence,
which are superimposed on the carrier along with the data.
Fig 5.19
Since same channel is shared by several users, there may be a problem of near far
effect. In CDMA, the main advantage when compared to oter multiple access schems is
receiving end the receiver selectively tunes to receive the intented signal of the
users.
Proper power control measures are done in CDMA to avoid near far problems.
1)If the spreading sequences are not exactly orthogonal from one user and to
another users may be a chance of self jamming problem in CDMA. Hense this
spreading sequence or pseudo random noise code has to be carefully planned and
then it should be multiplied with the message signal.
2)CDMA has better soft capacity limit than TDMA and FDMA methods.
3)Radio signal strength indicator RSSI is being used in CDMA to have better power
control.
Types
Cellular systems which use digital modulation technique are called digital
cellular systems. Digital systems offer large improvement in capacity and system
performance. In the late 1980�s the United States Digital cellular system (USDC)
was
developed to support more users in a fixed spectrum allocation. USDC is a time
division
multiple access (TDMA) system. USDC offer as much as six times the capacity of
AMPS.
The USDC standard uses the same 45MHZ FDD scheme as AMPS. The dual
mode USDC/AMPS system was standardized as interim standard 54 ( IS-54) by the
electronic industries north American Digital cellular (NADC) , as it had been
installed in
Canada and Mexico. The USDC system was designed to share the same frequencies reuse
plan, and base stations as AMPS , so that base stations and subscriber unit could
be
equipped with both AMPS and USDC channels , within in the same piece of equipment .
To
maintain compatibility with AMPS phones, USDC forward and reverse control channels
use
exactly the same signaling technique as AMPS.
Global system for mobile (GSM) is a second standard. it was developed to solve the
fragmentation problems of the first cellular system in Europe . GSM was the world�s
first
cellular system to specify digital modulation and network level architecture and
services. It is
the world�s most popular 2G ( second generation) technology.
GSM was originally developed to serve as the pan European cellular service
and promised a wide range of network services through the use of ISDN ,now GSM is
the
world�s most popular standard for new cellular radio and personal communication
equipment
throughout the world . As of 2001 , there were over 350 millions GSM subscribers
worldwide.
4
GSM was first introduced into European market in 1991. In 1992, GSM changed
its name to the global system for mobile communications for marketing reasons. By
the end
of 1993 several non-European countries in south America, Asia and Australia had
adopted GSM, which support personal communication service (PCS) in the 1.8GHZ to
2.0GHZ radio bands recently created by government throughout the world.
GSM service follows ISDN guidelines and are classified as either tele service
or data services. Tele services include standard mobile telephony and mobile
originated
traffic. Data service includes computer-to-computer communication and packet
switched
traffic. User services may be divided into three categories.
Telephone Services � This service include emergency calling and facsimiles. GSM
also
support Videotex and teletex , though they are not integral parts of the GSM
standard.
Bearer services or data services - This service includes packet switched protocols
and
data rates from 300 bps to 9.6 kbps. Data may be transmitted using either a
transparent
mode ( where GSM provides standard channel coding for the user data ) or non
transparent mode ( where GSM offers special coding efficiencies based on the
particular
data services ).
Supplementary ISDN services � This services are digital in nature, and include all
diversions, closed users groups, and caller identifications. These services are not
available
in analog mobile networks. Supplementary services also include short messaging
services
(SMS), which allows GSM subscribers and base stations to transmit alphanumeric
pages of
limited length.
SMS may be used for safety and advisory applications, such as the broadcast of
highway or weather information to all GSM subscribers within reception range.
user specific information. A subscriber uses the SIM with a four digit personal ID
number to
activate services from any GSM phone.
SMS available as smart card (credit card sized cards that may be inserted into to
any GSM
phone) or plug-in modules . Without a SIM installed, all GSM mobiles are identical
and non
operational. Subscriber may plug their SIM into any suitable such as hotel phone,
public
phone or any portable or mobile phone and then able to have all incoming GSM calls
routed
to that terminal and have all outgoing calls billed to their home phones , no
matter where
they are in the world.
A second remarkable feature of GSM is the air privacy which is provided by the
system.
Unlike analog FM cellular phone systems which can be readily monitored, it is
virtually
impossible to eavesdrop on a GSM radio transmission. The privacy is made possible
by
encrypting the digital bit stream sent by a GSM transmitter, according to a
specific secret
cryptographic key that is known only the cellular carrier . This key changes with
time for
each user. Every carrier and GSM equipment manufacture must sign memorandum of
understanding ( MOU) before developing GSM equipment or developing a GSM system
.the MOU is an international agreement which allows the sharing of cryptographic
algorithms
and other proprietary information between countries and carriers.
5.2.4.3GSMSsystemArchitecture
The GSM system architecture consists of three major interconnected subsystems. They
are
1) Base station subsystem (BSS) , 2) Network and switching subsystems , 3)
Operation
support subsystem ( OSS ).The subsystems interlaced between themselves and with the
The mobile station (MS) is also a subsystem, but is usually considered to be part
of the
BSS for architecture purpose. The BSS, also known as the radio subsystem, provides
and
manages radio transmission paths between the mobile switching center (MSC). The BSS
also manages the radio interface between the mobile stations and all over
subsystems of
GSM. Each BSS consists of many base station controllers (BSCs) which connects the
MS to
the NSS via MSCs
The NSS manages the switching functions of the systems and allows the MSCs to
communicate with other networks such as PSTN and ISDN.
Fig 5.20
The OSS supports the operation and maintenance of GSM and allows system engineers
to
monitor, diagnose and trouble shoot all aspects of the GSM system . This subsystem
interacts with the other GSM subsystems.
The block diagram of GSM architecture is shown in the fig.5.14. The mobile
stations
(MSs) communicate with the base station subsystem (BSS) over the radio air
interface. The
BSS consists of many BSCs which connect to a signal MSC. Each BSC can controls up
to
several hundred Base Transceiver stations (BTSs) . Some of the BTSs may be co-
located at
the BSC, and others may be remotely distributed and physically connected to the BSC
by
microwave link or dedicated leased lines.
The various interfaces used in GSM are illustrated in the fig .5.15 The interface
which
connects a BTS to a BSC is called AbIS interface . The abis interface carriers
traffic and
maintenance data , and is specified by GSM to be standardized for all
manufactures .
practically same manufacture BTS and BSC equipments may be used for avoiding subtle
differences.
The BSCs are physically connected to the MSC through dedicated/leased lines or
microwave link. The interface between a BSC and a MSC is called the A interface ,
which is
standardized within GSM . The A interface uses an SS7 protocol called the signaling
correction control part (SCCP) . It supports communication between the MSC and the
BSS
as well as network messages between the individual subscribers and the MSC. An
interface
allows a service provider to use base stations and switching equipment made by
different
manufactures.
The NSS handles the switching of GSM call between external networks and the
BSCs in the radio subsystem. The MSC is the central unit in the NSS and controls
the traffic
among all of the BSCs.
There are three different data bases in NSS. They are 1) Home location
registers ( HLR) , 2) Visitor location register ( VLR ) , and 3) Authentication
center (AUC )
. The HLR is a data base which contains subscriber information and location
information for
each user who resides in the same city as the MSC. Each subscriber in a particular
GSM
market is assigned a unique international mobile subscriber Identify (IMSI) . This
number is
used to identify each home user.
The VLR is a database which temporarily stores the IMSI and customer
information for each roaming subscriber who is visiting the coverage area of a
particular
MSC. The VLR is linked between several adjoining MSCs in a particular region and
contains
subscription information of every visiting user in the area.
Once a roaming mobile is logged in the VLR, the MSC sends the necessary
information to the visiting subscriber�s HLR, so that calls to the roaming mobile
can be
appropriately routed over the PSTN by the roaming user�s HLR.
With the GPRS network, several channels are occupied at the same time for data
transmission whenever data needs to be transmitted. Whenever a GPRS device is not
receiving or sending data, the channels are available for other services and other
GPRS
subscribers. By way of this dynamic allotment of resources the utilization of the
existing radio
infrastructure is clearly optimized. A drawback of the system is that the available
bandwidth
may drop when many users try to access the GPRS network at the same time. In
addition,
the data is also compressed by means of special coding process ( CS-1�.CS-4 ),so as
to
ensure further data rate enhancement. The maximum transmission speed in the GPRS
network is theoretically 172,2 Kbit/sec. The devices available on the market offer
a maximum
transmission speed of 85,6 Kbit/sec.
The dynamic allotment of resources permits a method of billing. The billing is not
based on connect time, but rather on the volume, block size and billing period of
the data to
be transmitted. 8 times slots and 4 coding schemes (CS) with different data
transmission
rates are available, CS1 with 9,05kbit/s, cs2 with 13,4kbit/s ,CS3 with
15,6kbit/s,CS4 with
21,4kbit/s.
This results a theoretical total data rate of 171,2kbit/s when bundling all eight
time
slots with coding scheme. The adjustment of the transmission speed is made
dynamically
depending on the HF transmission characteristics by switching between the coding
schemes.
UNIT- V
Review question
PART �A -2 MARKS
8 What is a MSC
PART �B -3 MARKS
5 Explain hand-off.
8 Define Interference
3 Explain Roaming