EC8501 Notes PZ - by WWW - Easyengineering.net 4
EC8501 Notes PZ - by WWW - Easyengineering.net 4
net
UNIT II
ww
w.E
asy
En
gi nee
rin
g.n
e t
Let mn m(nTs ) , n 0,1,2,
w hereTs is the sampling period and m(nTs ) is a sample of m(t ).
The error signal is en
mn mq n 1 eq (3.52)
ww
w.E
asy
En
gi nee
rin
g.n
e t
Two types of quantization errors :
Page 19
www.EasyEngineering.net
Download From: www.EasyEngineering.net
(3.56)
(slope)
w.E
To avoid slope - overload distortion , w erequire
max
dm(t )
(3.58)
Ts asy
dt
En
On the other hand, granular noise oc c ursw henstep size
is too large relative to the loc al slope of m(t ).
gi
Delta-Sigma modulation (sigma-delta modulation):
nee
The modulation which has an integrator can
relieve the draw back of delta modulation (differentiator) rin
Beneficial effects of using integrator: g.n
1. Pre-emphasize the low-frequency content
2. Increase correlation between adjacent samples
(reduce the variance of the error signal at the quantizer input)
e t
3. Simplify receiver design
Because the transmitter has an integrator , the receiver
consists simply of a low-pass filter.
(The differentiator in the conventional DM receiver is cancelled
by the integrator )
Page 20
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
The filter output (The linear predition of the input ) is rin
p
x̂n wk x(n k ) (3.59) g.n
The predic tion error is
k 1
e t
en xn x̂n
(3.60)
Let the index of performance be
p
J E x n 2 w E
2
k xn xn k
k 1
Page 21
p p
w j wk E xn j xn k (3.62)
j 1 k 1
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww J
wk
2R X
p
k 2w j RX k j 0
w
p
w.E j 1
RX k j RX k RX k , k 1,2, ,p (3.64)
asy
j
j 1
nee
RX 0 RX 1 RX p 1 rin
R 1
RX X RX 0 RX p 2
g.n
X
R
p 1 R X
p 2 R X
0
e t
RX 0 , RX 1 ,, RX p
Substituting (3.64)into (3.63) yields
p p
J m in 2wk RX k wk RX k
2
X
k 1 k 1
p
wk RX k
2
X
SCAD Engkin1eering College Page 22
2 2
r w0 r R r
X
T
X X
T
X
1
X X (3.67)
r T R 1r 0, J is alw ays less than 2 www.EasyEngineering.net
Download From: www.EasyEngineering.net
X X X m in X
ww
w.E
asy
En
gi nee
rin
g.n
e t
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww kg
J
wk
, k 1,2, ,p (3.68)
w.E
wk ndenotes the value at iteration n . Then update wk n 1
1
asy
wk n 1 wk n gk , k 1,2, ,p (3.69)
2
1 En
w here is a step - size parameter and is for c onvenience
of presentation.
2
gi nee
J
rin
g.n
P
g 2R X k 2 w j R X k j
k
wk j 1
p
2Exn xn k 2 w j E xn j xn k , k 1,2,, p
j 1
(3.70) e t
To simplify the computing w euse xnxn k for E[x[n]x[n- k]]
(ignore the expectation)
p
ĝ n 2xnxn k 2 w j nxn j xn k , k 1,2,, p
k
(3.71)
j 1
p
ŵk n 1 ŵk n xn k xn ŵ j nxn j
j 1
SCADEwn̂kginneerixnng Coklleenge , k 1,2,, p (3.72) Page 23
p
w hereen xn ŵ j nxn j by (3.59) (3.60) (3.73)
j 1 www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
Figure 3.27
w.E
Block diagram illustrating the linear adaptive prediction process
asy
Differential Pulse-Code Modulation (DPCM):
En
Usually PCM has the sampling rate higher than the Nyquist rate
gi
.The encode signal contains redundant information. DPCM can
efficiently remove this redundancy.
nee
rin
g.n
e t
Page 24
www.EasyEngineering.net
Download From: www.EasyEngineering.net
(3.74)
m̂ n is a predic tion value.
wTwhe quantizer output is
e nw en qn
(3.75)
q
. E
w hereqn a issquantization error.
yfilter input is
T he predic tion E
n ginn (3.77)
m n m̂ n en q
From (3.74)
e eri
mn
ng.
m n
q m n q n
n e (3.78) t
Page 25
www.EasyEngineering.net
Download From: www.EasyEngineering.net
Processing Gain:
Page 26
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
Figure 3.29 Adaptive quantization with backward estimation
(AQB).
En
gi nee
rin
g.n
e t
Figure 3.30 Adaptive prediction with backward estimation (APB).
Page 27
www.EasyEngineering.net
Download From: www.EasyEngineering.net
UNIT III
1 if symbol bk is 1 ck ak ak 1
ak
1 if symbol bk is 0
Page 28
www.EasyEngineering.net
Download From: www.EasyEngineering.net
1, | f | 1/ 2Tb
H Nyquist ( f )
0, otherwise
ww H I ( f )
0, otherwise
w.E hI (t )
sin(t / Tb ) sin[(t Tb ) / Tb ]
t / Tb
(t Tb ) / Tb
asy
Tb2 sin(t / Tb )
t (Tb t )
En
gi nee
The tails of hI(t) decay as 1/|t|2, which is a faster rate of
decay than 1/|t| encountered in the ideal Nyquist channel.
Let represent the estimate of the original pulse ak as rin
conceived by the receiver at time t=kTb
Decision feedback : technique of using a stored estimate of g.n
the previous symbol
Propagate : drawback, once error are made, they tend to
propagate through the output
e t
Precoding : practical means of avoiding the error propagation
phenomenon before the duobinary coding
d k bk d k 1
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ck ak ak 1
Page 30
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ck ak ak 1
H IV ( f ) H Nyquist ( f )[1 exp( j4 fTb )]
2 jH Nyquist ( f ) sin(2 fTb ) exp( j2 fTb )
ww 2 j sin(2 fTb ) exp( j2 fTb ), | f | 1/ 2Tb
w.E
HIV ( f )
0, elsewhere
h IV (t )
asy
sin( t / Tb ) sin[(t 2Tb ) / Tb ]
t / Tb
2T b2 sin( t / T b )
En
(t 2Tb ) / Tb
t (2Tb t ) gi nee
rin
g.n
e t
precoding
dk bk d k 2
symbol 1 if either symbol bk or d k 2 is 1
symbol 0 otherwise
Page 31
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
|ck|=1 : random guess in favor of symbol 1 or 0 g.n
If | ck | 1, say symbol bk is 1
e t
If | ck | 1, say symbol bk is 0
Page 32
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee N 1
t
h(t) wn sin c n
rin n Tb
g.n
e t
Page 33
www.EasyEngineering.net
Download From: www.EasyEngineering.net
Baseband M-ary PAM Transmission:
ww
w.E
asy
En
gi nee
rin
Produce one of M possible amplitude level
g.n
T : symbol duration
1/T: signaling rate, symbol per second, bauds
e t
– Equal to log2M bit per second
Tb : bit duration of equivalent binary PAM :
To realize the same average probability of symbol error,
transmitted power must be increased by a factor of
M2/log2M compared to binary PAM
Page 34
www.EasyEngineering.net
Download From: www.EasyEngineering.net
Tapped-delay-line equalization :
Page 35
www.EasyEngineering.net
Download From: www.EasyEngineering.net
N
h(t ) w (t kT )
k N
k
w.E N
p(nT ) wk c((n k )T )
asy
k N
En
Nyquist criterion for distortionless transmission, with T used
in place of Tb, normalized condition p(0)=1
gi nee
1, n 0 1, n0
p(nT )
0, n 0 0, n 1, 2,....., N rin
Zero-forcing equalizer
– Optimum in the sense that it minimizes the peak
g.n
distortion(ISI) – worst case
– Simple implementation
e t
– The longer equalizer, the more the ideal condition for
distortionless transmission
Adaptive Equalizer :
www.EasyEngineering.net
Download From: www.EasyEngineering.net
Adaptive equalization
– Adjust itself by operating on the the input signal
Training sequence
– Precall equalization
– Channel changes little during an average data call
Prechannel equalization
– Require the feedback channel
Postchannel equalization
synchronous
– Tap spacing is the same as the symbol duration of
ww transmitted signal
w.E
Least-Mean-Square Algorithm:
asy
Adaptation may be achieved
– By observing the error b/w desired pulse shape and
actual pulse shape En
tap-weight should be changed
Mean-square error criterion
gi
– Using this error to estimate the direction in which the
nee
– More general in application
– Less sensitive to timing perturbations rin
: desired response, : error signal, : actual response
Mean-square error is defined by cost fuction
g.n
E en2
e t
Ensemble-averaged cross-correlation
e y
2E en n 2E en n 2E en xnk 2Rex (k )
wk wk wk
www.EasyEngineering.net
Download From: www.EasyEngineering.net
0 for k 0, 1,...., N
wk
Mean-square error is a second-order and a parabolic function
of tap weights as a multidimentional bowl-shaped surface
Adaptive process is a successive adjustments of tap-weight
ww seeking the bottom of the bowl(minimum value
Steepest descent algorithm
)
w.E
– The successive adjustments to the tap-weight in
direction opposite to the vector of gradient )
asy
– Recursive formular ( : step size parameter)
wk (n 1) wk (n)
En
1
, k 0, 1,...., N
2 wk
gi nee
wk (n) Rex (k ), k 0, 1,...., N
Page 38
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
Operation of the equalizer:
Page 39
www.EasyEngineering.net
Download From: www.EasyEngineering.net
Implementation Approaches:
ww Analog
– CCD, Tap-weight is stored in digital memory, analog
w.E
sample and multiplication
– Symbol rate is too high
Digital
asy
– Sample is quantized and stored in shift register
En
– Tap weight is stored in shift register, digital
multiplication
Programmable digital
– Microprocessor
gi nee
– Flexibility
– Same H/W may be time shared rin
Decision-Feed back equalization: g.n
e t
Page 40
www.EasyEngineering.net
Download From: www.EasyEngineering.net
yn hk xn k
k
h0 xn hk xnk hk xnk
Using data decisk i0ons madek o0 n the basis of precursor to take
care of the postcursors
– The decision would obviously have to be correct
ww
w.E
asy
En
Feedforward section : tapped-delay-line equalizer
Page 41
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
In the case of an M-ary system, the eye pattern contains (M-
1) eye opening, where M is the number of discreteamplitude
w.E
levels
asy
En
gi nee
rin
g.n
e t
Page 42
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
g.n
e t
Page 43
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
g.n
e t
Page 44
www.EasyEngineering.net
Download From: www.EasyEngineering.net
UNIT IV
ww
w.E
asy
En
gi nee
rin
g.n
e t
Page 45
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
g.n
e t
Page 46
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
g.n
e t
Page 47
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
g.n
e t
ASK, OOK, MASK:
Page 48
www.EasyEngineering.net
Download From: www.EasyEngineering.net
Page 49
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
Frequency Shift Keying:
En
gi
• One frequency encodes a 0 while another frequency encodes
a 1 (a form of frequency modulation)
nee
rin
g.n
e t
Page 50
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
s t En
A cos2f 2t binary1
A cos2f 2t binary 0
FSK Bandwidth:
gi nee
rin
• Limiting factor: Physical capabilities of the carrier
• Not susceptible to noise as much as ASK g.n
e t
Page 51
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
• Applications
– On voice-grade lines, used up to 1200bps
– Used for high-frequency (3 to 30 MHz) radio
asy
transmission
En
– used at higher frequencies on LANs that use coaxial
cable
gi nee
rin
g.n
DBPSK: e t
• Differential BPSK
– 0 = same phase as last signal element
– 1 = 180º shift from last signal element
Page 52
www.EasyEngineering.net
Download From: www.EasyEngineering.net
A co s 2f c t
3 11
4
01
w.E
A co s 2 f ct
3
4
00
asy
A cos 2 f ct
4
10
Concept of a constellation : En
gi nee
rin
g.n
e t
Page 53
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
M-ary PSK:
rin
Using multiple phase angles with each angle having more than one
amplitude, multiple signals elements can be achieved g.n
D
R
L
R
log 2 M
e t
– D = modulation rate, baud
– R = data rate, bps
– M = number of different signal elements = 2L
– L = number of bits per signal element
Page 54
www.EasyEngineering.net
Download From: www.EasyEngineering.net
QAM:
– As an example of QAM, 12 different phases are
combined with two different amplitudes
– Since only 4 phase angles have 2 different amplitudes,
there are a total of 16 combinations
– With 16 signal combinations, each baud equals 4 bits of
information (2 ^ 4 = 16)
– Combine ASK and PSK such that each signal
corresponds to multiple bits
ww – More phases than amplitudes
– Minimum bandwidth requirement same as ASK or PSK
w.E
asy
En
gi nee
rin
g.n
e t
Page 55
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
QAM and QPR:
w.E
• QAM is a combination of ASK and PSK
– Two different signals sent simultaneously on the same
asy
carrier frequency
En
– M=4, 16, 32, 64, 128, 256
• Quadrature Partial Response (QPR)
gi
– 3 levels (+1, 0, -1), so 9QPR, 49QPR
nee
rin
g.n
e t
Page 56
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
g.n
e t
Page 57
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
g.n
e t
Figure 6.26 Block diagrams for (a) binary FSK transmitter and
(b) coherent binary FSK receiver.
Page 58
www.EasyEngineering.net
Download From: www.EasyEngineering.net
Fig. 6.28
ww
w.E
asy
En
gi nee
rin
Figure 6.30 (a) Input binary sequence. (b) Waveform of scaled
timefunction s1f1(t). (c) Waveform of scaled time function s2f2(t).
g.n
(d) Waveform of the MSK signal s(t) obtained by adding s1f1(t) and
e t
Page 59
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
g.n
e t
Figure 6.29 Signal-space diagram for MSK system.
Page 60
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
g.n
e t
Figure 6.31 Block diagrams for (a) MSK transmitter and (b)
coherent MSK receiver.
Page 61
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
g.n
e t
Page 62
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
g.n
e t
Page 63
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
Block Codes:
w.E
• We will consider only binary data
• Data is grouped into blocks of length k bits (dataword)
asy
• Each dataword is coded into blocks of length n bits
(codeword), where in general n>k
En
• This is known as an (n,k) block code
gi
• A vector notation is used for the datawords and codewords,
– Dataword d = (d1 d2….dk)
– Codeword c = (c1 c2……..cn) nee
• The redundancy introduced by the code is quantified by the
code rate, rin
– Code rate = k/n g.n
– i.e., the higher the redundancy, the lower the code rate
Hamming Distance: e t
• Error control capability is determined by the Hamming
distance
• The Hamming distance between two codewords is equal to
the number of differences between them, e.g.,
10011011
11010010 have a Hamming distance = 3
• Alternatively, can compute by adding codewords (mod 2)
=01001001 (now count up the ones)
Page 64
www.EasyEngineering.net
Download From: www.EasyEngineering.net
d m in 1
• That is the maximum number of correctable errors is given
by,
d m in 1
t
2
where dmin is the minimum Hamming distance between 2
codewords and means the smallest integer
ww
Linear Block Codes:
w.E
• As seen from the second Parity Code example, it is possible
asy
to use a table to hold all the codewords for a code and to
look-up the appropriate codeword based on the supplied
dataword En
gi
• Alternatively, it is possible to create codewords by addition
of other codewords. This has the advantage that there is now
nee
no longer the need to held every possible codeword in the
table.
rin
• If there are k data bits, all that is required is to hold k linearly
independent codewords, i.e., a set of k codewords none of
which can be produced by linear combinations of 2 or more
g.n
codewords in the set.
• The easiest way to find k linearly independent codewords is
e t
to choose those which have „1‟ in just one of the first k
positions and „0‟ in the other k-1 of the first k positions.
www.EasyEngineering.net
Download From: www.EasyEngineering.net
• So, to obtain the codeword for dataword 1011, the first, third
and fourth codewords in the list are added together, giving
1011010
• This process will now be described in more detail
ak1 asy
ak 2
... akn a k
• Thus, En
k
c dia i
i 1
gi nee
• ai must be linearly independent, i.e.,
Since codewords are given by summations of the ai vectors, rin
then to avoid 2 datawords having the same codeword the ai vectors
must be linearly independent.
g.n
• Sum (mod 2) of any 2 codewords is also a codeword, i.e.,
Since for datawords d1 and d2 we have;
e t
d 3 d1 d 2
So,
k k k k
c3 d 3i a i (d1i d 2i )a i d1i a i d 2i a i
i 1 i 1 i 1 i 1
c3 c1 c 2
Page 66
www.EasyEngineering.net
Download From: www.EasyEngineering.net
•
w.E
codewords.
asy
Linear Block Codes – example 1:
En
• For example a (4,2) code, suppose;
G
1 0 1 1
gi nee
0 1 0 1
a1 = [1011] rin
a2 = [0101]
• For d = [1 1], then; g.n
1
0
0
1
1
0
1
1
e t
c
1 1 1 0
www.EasyEngineering.net
Download From: www.EasyEngineering.net
• Is an even single parity code
Systematic Codes:
0 .. 0
1 p11 p12 .. p1R
ww 0
G
..
1 .. 0
.. .. ..
p21
..
p22
..
.. p2 R
.. ..
I | P
R=n-k
0
w.E
0 .. 1 pk1 pk 2 .. pkR
asy
• P is often referred to as parity bits
En
I is k*k identity matrix. Ensures data word appears as beginning of
codeword P is k*R matrix.
Page 68
www.EasyEngineering.net
Download From: www.EasyEngineering.net
gi nee
• S null can be represented by its basis vectors. In this case the
generator basis vectors (or „generator matrix‟ H) denote the
generator matrix for S null - of dimension n-k = R
• This matrix is called the parity check matrix of the code rin
defined by G, where G is obviously the generator matrix for
S sub - of dimension k
g.n
• Note that the number of vectors in the basis defines the
dimension of the subspace
e t
• So the dimension of H is n-k (= R) and all vectors in the null
space are orthogonal to all the vectors of the code
• Since the rows of H, namely the vectors bi are members of
the null space they are orthogonal to any code vector
• So a vector y is a codeword only if yHT=0
• Note that a linear block code can be specified by either G or
H
Page 69
www.EasyEngineering.net
Download From: www.EasyEngineering.net
This is so since,
asy
c dia i
k
En
and so,
k
i 1
k
gi nee
b j .c b j . d i a i d i (a i .b j ) 0
i 1 i 1
rin
• This means that a codeword is valid (but not necessarily
correct) only if cHT = 0. To ensure this it is required that the
g.n
rows of H are independent and are orthogonal to the rows of
G
e t
• That is the bi span the remaining R (= n - k) dimensions of
the codespace
Page 70
www.EasyEngineering.net
Download From: www.EasyEngineering.net
• In this example the H matrix has only one row, namely b1.
This vector is orthogonal to the plane containing the rows of
the G matrix, i.e., a1 and a2
• Any received codeword which is not in the plane containing
a1 and a2 (i.e., an invalid codeword) will thus have a
component in the direction of b1 yielding a non- zero dot
product between itself and b1.
Error Syndrome:
Page 71
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
Error Syndrome – Example:
w.E
• For a correct received codeword cr = [1101001]
In this case,
asy
En
0
1 gi 1 1
0 1
nee
1
1 0
rin
s c r H T 1 1 0 1 0 0 11 1 1 0 0 0 g.n
1
0 0
1 0
e t
0
0 0 1
Page 72
www.EasyEngineering.net
Download From: www.EasyEngineering.net
Standard Array:
c1 (all zero) c2 …… cM s0
e1 c2+e1 …… cM+e1 s1
e2 c2+e2 …… cM+e2 s2
e3 c2+e3 …… cM+e3 s3
ww … …… …… …… …
eN w.E c2+eN …… cM+eN sN
asy
En
• The array has 2k columns (i.e., equal to the number of valid
codewords) and 2R rows (i.e., the number of syndromes)
Hamming Codes:
gi nee
• We will consider a special class of SEC codes (i.e., Hamming rin
distance = 3) where,
– Number of parity bits R = n – k and n = 2R – 1 g.n
– Syndrome has R bits
– 0 value implies zero errors
– 2R – 1 other syndrome values, i.e., one for each bit that
e t
might need to be corrected
– This is achieved if each column of H is a different
binary word – remember s = eHT
• Systematic form of (7,4) Hamming code is,
1 0 0 0 0 1 1
0 1 1 1 1 0 0
0 1 0 0 1 0 1
G I | P
0 0 1 0 1 1 0
1 0 1 1 0 1 0
H - P | I
T
1 1 0 1 0 0 1
0 0 0 1 1 1 1
Page 73
www.EasyEngineering.net
Download From: www.EasyEngineering.net
• The original form is non-systematic,
1 1 1 0 0 0 0
1 0 0 0 1 1 1 1
0 0 1 1 0 0
G H 0 1 1 0 0 1 1
0 1 0 1 0 1 0
1 0 1 0 1 0 1
1 1 0 1 0 0 1
Page 74
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
• Convolutional encoder, k = 1, n = 2, L=2
w.E
– Convolutional encoder is a finite state machine (FSM)
processing information bits in a serial manner
asy
– Thus the generated code is a function of input and the
state of the FSM
En
– In this (n,k,L) = (2,1,2) encoder each message bit
influences a span of C= n(L+1)=6 successive output
gi
bits = constraint length C
nee
– Thus, for generation of n-bit output, we require n shift
registers in k = 1 convolutional encoders
rin
g.n
e t
Page 75
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
x ' j m j3 m j2
E
m ng
i j
nee
x '' m m m
j j 3 j 1 j
rin
x ''' j m j2 m j g.n
Here each message bit influences
e t
a span of C = n(L+1)=3(1+1)=6
successive output bits
Page 76
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
g.n
e t
Page 77
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
g.n
Example: Using generator matrix e t
Page 78
www.EasyEngineering.net
Download From: www.EasyEngineering.net
g [1 0 1 1]
(1)
g ( 2 ) [1 1 1 1]
ww
w.E
asy
En
Representing convolutional codes: Code tree:
gi nee
rin
g.n
e t
(n,k,L) = (2,1,2) encoder
x ' j m j 2 m j 1 m j
x '' j m j 2 m j
x x ' x '' x ' x '' x ' x '' ...
out 1 1 2 2 3 3
Page 79
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
g.n
e t
Page 80
www.EasyEngineering.net
Download From: www.EasyEngineering.net
State diagram
ww
w.E
asy
En
gi nee
rin
g.n
e t
Inspecting state diagram: Structural properties of
convolutional codes:
Page 81
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
- encoder state diagram for (n,k,L)=(2,1,2) code rin
- note that the number of states is 2L+1 = 8
g.n
Distance for some convolutional codes: e t
Page 82
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
THE VITERBI ALGORITHEM:
w.E
• Problem of optimum decoding is to find the minimum
asy
distance path from the initial state back to initial state (below
from S0 to S0). The minimum distance is the sum of all path
metrics En
g
ln p(y, x ) ln p( y |ixn)
m j 0
eer
• that is maximized by the correct path
j mj
Page 83
www.EasyEngineering.net
Download From: www.EasyEngineering.net
Page 84
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
g.n
e t
The maximum likelihood path:
Page 85
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
The decoded ML code sequence is 11 10 10 11 00 00 00 whose
Hamming En
gi
distance to the received sequence is 4 and the respective decoded
nee
sequence is 1 1 0 0 0 0 0 (why?). Note that this is the minimum
distance path.
rin
(Black circles denote the deleted branches, dashed lines: '1' was
applied)
g.n
How to end-up decoding?
Page 86
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
J 5L stages of the trellis rin
g.n
Hamming Code Example:
e t
• H(7,4)
• Generator matrix G: first 4-by-4 identical matrix
Page 87
www.EasyEngineering.net
Download From: www.EasyEngineering.net
• Transmission vector x
• Received vector r
and error vector e
• Parity check matrix H
ww
w.E
asy
En
gi nee
rin
g.n
Error Correction:
e t
• If there is no error, syndrome vector z=zeros
Page 88
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
Example of CRC:
g.n
e t
Page 89
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
Example: Using generator matrix:
En g [1 0 1 1]
(1)
gi nee g ( 2 ) [1 1 1 1]
11
r i ng 01
00 11 01
11 .ne 10
t
01
Page 90
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
gi nee
rin
g.n
e t
correct:1+1+2+2+2=8;8 (0.11) 0.88
false:1+1+0+0+0=2;2 (2.30) 4.6
total path metric: 5.48
Page 91
www.EasyEngineering.net
Download From: www.EasyEngineering.net
ww
w.E
asy
En
Turbo Codes:
gi nee
• Backgound rin
– Turbo codes were proposed by Berrou and Glavieux in
the 1993 International Conference in Communications.
g.n
– Performance within 0.5 dB of the channel capacity limit
for BPSK was demonstrated.
e t
• Features of turbo codes
– Parallel concatenated coding
– Recursive convolutional encoders
– Pseudo-random interleaving
– Iterative decoding
Page 92
www.EasyEngineering.net
Download From: www.EasyEngineering.net
• Comparison:
– Rate 1/2 Codes.
– K=5 turbo code.
– K=14 convolutional code.
• Plot is from:
– L. Perez, “Turbo Codes”, chapter 8 of Trellis Coding by
C. Schlegel. IEEE Press, 1997
ww
w.E
asy
En
gi nee
rin
g.n
Pseudo-random Interleaving:
Page 93
www.EasyEngineering.net
Download From: www.EasyEngineering.net
• Solution:
– Make the code appear random, while maintaining
enough structure to permit decoding.
– This is the purpose of the pseudo-random interleaver.
– Turbo codes possess random-like properties.
– However, since the interleaving pattern is known,
decoding is possible.
Page 94
www.EasyEngineering.net