Unit 2 Wireless
Unit 2 Wireless
Communication (KEC-076)
Unit-2 Lecture : 01
LPC Analysis: Extracts the filter coefficients that describe the vocal
tract.
Pitch Detection: Estimates whether the speech is voiced or unvoiced
and extracts the pitch for voiced speech.
Excitation Signal: For voiced speech, a periodic pulse train is used.
For unvoiced speech, a white noise signal is used as the excitation.
4. Voice Encoding
This reduces the data rate significantly because the speech can
be represented by fewer parameters compared to transmitting the
full waveform.
Speech Quality: At very low bit rates, the vocoder may not
capture all nuances of the speech signal, leading to robotic or
muffled sound quality.
Linear Predictive Coding (LPC) is one of the most fundamental and widely used
vocoder techniques. LPC vocoders analyze the speech signal and model it as a
source-filter system, where the vocal tract is modeled as a digital filter and the
excitation signal represents the airflow from the lungs.
Key Features:
Vocal Tract Model: LPC models the vocal tract with a set of filter coefficients that
represent the shape of the vocal tract.
Prediction of Speech Samples: LPC predicts the next sample of the speech signal
based on a linear combination of previous samples.
Residual Signal: The difference between the actual and predicted speech signal (the
residual) is transmitted along with the filter coefficients.
Low Bit Rate: LPC can compress speech to 2.4 to 4.8 kbps, which makes it suitable
for low-bandwidth applications.
Applications:
Mobile and wireless communications, especially in earlier generation codecs.
Speech compression in voice-over-IP (VoIP) applications.
2. Code-Excited Linear Prediction (CELP) Vocoders
Key Features:
Applications:
Phase vocoders focus on the phase information of the speech signal, analyzing
and synthesizing the phase spectrum along with the amplitude spectrum. While
less common in wireless communications, phase vocoders are often used in
speech manipulation and audio effects.
Key Features:
Phase Spectrum Analysis: Phase vocoders analyze the phase changes of the
signal over time, enabling time-stretching and pitch-shifting without affecting
the speech's speed.
High-Quality Synthesis: The output signal maintains the natural quality of
the original speech, making phase vocoders useful for certain speech processing
applications where naturalness is important.
Applications:
Audio effects and music production.
Speech manipulation in post-production environments.
The Phase Vocoder: Analyzer Block Diagram
The Phase Vocoder: Synthesizer Block Diagram
4. Formant Vocoders
Formant vocoders are designed to model speech based on its formants, which
are the resonant frequencies in the vocal tract. They focus on the formant
structure of the speech signal and attempt to synthesize the speech signal by
manipulating the formant frequencies.
Key Features:
Formant Modeling: The formant vocoder models speech by identifying and
synthesizing the formant frequencies that define the characteristics of vowels
and other speech sounds.
Natural Speech Synthesis: Formant vocoders produce speech that is
intelligible and relatively natural, although they tend to produce a slightly
robotic sound.
Simpler Excitation Model: These vocoders typically use a simpler excitation
model, such as a pulse or noise source.
Applications:
Speech synthesis in voice-based applications such as text-to-speech systems.
Robotic speech effects.
The Formant Vocoder: Analyzer Block Diagram
The Formant Vocoder: Synthesizer Block Diagram
5. Multiband Excitation (MBE) Vocoders
Multiband Excitation (MBE) vocoders divide the speech signal into multiple
frequency bands and determine whether each band is voiced or unvoiced. The
unvoiced and voiced components are then synthesized separately, improving the
overall intelligibility and quality of speech.
Key Features:
Frequency Band Division: MBE divides the speech signal into several
frequency bands and models each band separately as voiced or unvoiced.
Improved Speech Quality: By modeling both voiced and unvoiced
components more accurately, MBE vocoders can deliver higher-quality speech
synthesis at relatively low bitrates.
Bit Rate: MBE vocoders typically operate in the range of 2.4 to 4.8 kbps,
providing a balance between speech quality and bandwidth efficiency.
Applications:
Digital radio systems such as P25 and D-STAR.
Satellite communication systems.
6. Waveform Interpolation (WI) Vocoders
Key Features:
Waveform Interpolation: WI vocoders break the speech into small waveforms
and use interpolation techniques to fill in the gaps between waveforms, ensuring
smooth transitions and high-quality synthesis.
High-Fidelity Speech: These vocoders can reproduce speech with high fidelity,
making them suitable for scenarios where speech quality is paramount.
Bit Rate: WI vocoders typically operate at moderate bit rates, around 4.8 to 16
kbps, depending on the system requirements.
Applications:
High-quality speech coding for applications such as broadcast communications.
VoIP systems that require good speech quality at moderate bitrates.
7. Channel Vocoders
Channel vocoders are among the earliest types of vocoders and were originally
designed for secure communication. They split the speech signal into several
frequency bands, each processed and encoded separately. These vocoders analyze
the envelope of each frequency band and then synthesize the speech signal using
a noise or pulse excitation signal.
Key Features:
Frequency Band Processing: The channel vocoder splits the speech into
different frequency bands, analyzes each band for its amplitude envelope, and
then reconstructs the signal using a fixed excitation model.
Robust but Artificial Speech Quality: The speech quality produced by
channel vocoders tends to be intelligible but robotic.
Historical Significance: Channel vocoders were developed in the mid-20th
century and are less commonly used in modern applications but still form the
foundation for modern vocoder designs.
Applications:
Secure voice communications during World War II.
Early telecommunications research.
The Channel Vocoder: Analyzer Block Diagram
The Channel Vocoder: Synthesizer Block Diagram
8. Pitch-Synchronous Harmonic Vocoders
Key Features:
Pitch Synchronization: The vocoder is synchronized with the pitch of the
speaker's voice, allowing for better reproduction of pitch and harmonic content
in the speech signal.
High Speech Quality: These vocoders are capable of producing speech with
very natural intonation and pitch, making them suitable for high-quality speech
synthesis applications.
Applications:
High-quality speech synthesis in systems such as text-to-speech engines
and voice assistants.
Wireless and Mobile
Communication (KEC-076)
Unit-2 Lecture : 02
Gold Codes:
– Gold codes are generated by combining two different m-sequences.
– They have good cross-correlation properties, which are important in
systems like CDMA, where multiple users share the same frequency
band.
3) Kasami Codes:
4) Barker Codes:
Unit-2 Lecture : 03
The key principle is that the signal is spread across a wide range of
frequencies, but it can still be despread and recovered at the receiver
using the same PN code.
4. Processing Gain:
One of the key advantages of DS-SS is its processing gain, which measures
the ratio of the spread bandwidth to the original bandwidth of the data
signal. This processing gain improves the system’s resistance to noise and
interference.
Steps Involved in DS-SS
1. PN Code Generation: The PN code is a high-rate binary
sequence that modulates the data signal. This code typically has
good autocorrelation and cross-correlation properties to
ensure reliable spreading and despreading.
2. Multiplying Data with PN Code: The data bits are multiplied
with the chipping sequence of the PN code. For example, a
single data bit might be represented by a sequence of many
"chips," where each chip is one bit of the PN code. This
multiplication results in spreading the data across a wide
frequency band.
3. Modulation: The spread signal is then modulated using a
standard modulation technique, such as Binary Phase Shift
Keying (BPSK) or Quadrature Phase Shift Keying (QPSK),
for transmission.
4. Transmission and Reception: The modulated signal is
transmitted over the wireless channel, where it may encounter
noise, interference, or multipath fading. At the receiver, the
signal is multiplied by the same PN code that was used during
transmission, which results in despreading the signal and
recovering the original data.
5. Processing Gain and Improved SNR: PG = 10 LOG 10 (Spread BW/ original BW)
The processing gain achieved by spreading the signal improves the overall
SNR at the receiver. This results in better performance in noisy
environments and makes the system more robust against jamming and
interference.
Applications of DS-SS
1. CDMA in Cellular Networks:
2. Wi-Fi (802.11b):
In early Wi-Fi standards, such as 802.11b, DS-SS was used to spread the
data signal across a wide bandwidth, improving resistance to
interference and providing better performance in environments with
multiple users or noise.
3. GPS (Global Positioning System): In GPS, DS-SS is used to spread
the signals transmitted by satellites over a wide bandwidth. This
allows for precise positioning information to be extracted even in the
presence of interference or multipath effects.
2. Modulation:
The data is modulated using a standard modulation technique such as
Frequency Shift Keying (FSK), Binary Phase Shift Keying (BPSK), or
Quadrature Phase Shift Keying (QPSK).
3. Frequency Hopping:
The carrier frequency of the modulated signal hops according to the
pseudo-random hopping sequence.
The transmitted signal appears as noise to an unauthorized receiver unless
they have access to the hopping pattern.
4. Synchronization:
2. Military Communications:
FHSS was originally developed for secure military
communications due to its inherent resistance to jamming and
interception.
It is still widely used in military systems to ensure secure, reliable
communication in hostile environments.
3. Wireless Local Area Networks (WLANs):
Early 802.11 wireless LAN standards used FHSS for communication
over the 2.4 GHz ISM band. While later standards adopted other
techniques, FHSS provided initial robustness against interference.
4. Satellite Communication:
In satellite communication systems, FHSS provides protection
against interference and jamming, which is critical for reliable
communication over long distances.
5. Cordless Phones:
Some older cordless phones used FHSS to avoid interference with
other wireless devices and ensure privacy of communication.
Unit-2 Lecture : 04
4. Synchronization:
Synchronization in hybrid systems can be more complex
because the receiver must synchronize with both the DSSS
spreading code and the frequency hopping sequence.
However, once synchronized, the receiver can benefit from
both techniques.
Steps in Hybrid Spread Spectrum
1. DSSS Spreading: The data signal is first spread using a pseudo-
noise code, similar to the traditional DSSS process. The signal is
multiplied by the PN code to spread it across a wider bandwidth.
Unit-2 Lecture : 05
This approach divides the data stream into several parallel data
streams, each transmitted over its subcarrier, thus effectively
utilizing the available bandwidth.
Applications of DMT:
This allows for better spectral shaping and eliminates the need
for a cyclic prefix.
Applications of FBMC:
Unit-2 Lecture : 06
Key Features:
The receiver requires a reference signal that is in phase with the
transmitted carrier signal.
Carrier recovery techniques are used to synchronize the
receiver’s reference signal with the incoming signal.
Coherent detection is more accurate than non-coherent detection
but requires phase synchronization.
Common Applications:
PSK, QAM: These modulation schemes rely on coherent detection for
accurate demodulation, especially in high data rate systems like 4G/5G.
OFDM (Orthogonal Frequency Division Multiplexing): Coherent
detection is used in systems like Wi-Fi and LTE, where the phase
information of the subcarriers is known.
Advantages:
High accuracy: Coherent detection allows precise recovery of the phase
and amplitude information, making it suitable for high-performance
systems.
Higher efficiency: It performs better in terms of bit error rate (BER)
compared to non-coherent detection.
Disadvantages:
Complexity: Requires carrier synchronization and phase tracking,
which can be challenging in dynamic environments like mobile
communication.
2. Non-Coherent Detection
In non-coherent detection, the receiver does not need knowledge
of the carrier’s phase. The receiver detects the signal based on the
envelope or magnitude of the received signal, without relying on
the exact phase.
Non-coherent detection is typically used in Frequency Shift
Keying (FSK) and Differential Phase Shift Keying (DPSK).
Key Features:
The receiver detects the amplitude or frequency of the signal
without needing to know the phase information.
It is often used when phase synchronization is difficult or not
feasible.
Commonly used in envelope detection or frequency detection
systems.
Common Applications:
FSK and DPSK: Non-coherent detection is widely used in these
modulation schemes for systems with lower complexity.
Low-power devices: Non-coherent detection is preferred in low-
power devices like wireless sensors, where energy efficiency is
critical.
Advantages:
Lower complexity: Non-coherent detection is simpler to
implement since it does not require phase synchronization.
Lower cost: Ideal for low-cost, low-power systems where
complexity needs to be minimized.
Disadvantages:
Lower performance: Non-coherent detection is generally less
accurate than coherent detection, leading to higher BER in some
scenarios.
Comparison between Coherent Detection &
Non-Coherent Detection
3. Optimal Detection (Maximum
Likelihood Detection)
Maximum Likelihood (ML) Detection is a widely used optimal
detection strategy. In this approach, the receiver evaluates all possible
transmitted signals and chooses the one that is most likely to have been
transmitted, based on the received signal and the noise characteristics of
the channel.
Key Features:
Optimal Performance: ML detection provides the best possible
performance in terms of minimizing errors, but it is computationally
intensive.
Likelihood Calculation: The likelihood of each possible transmitted
symbol is calculated, and the symbol with the highest likelihood is
chosen.
Soft Decision: In some systems, soft decision ML detection is
used, where the likelihood values are passed to the decoder for further
processing.
Common Applications:
MIMO (Multiple-Input Multiple-Output) systems: ML detection
is used in MIMO systems for joint detection of transmitted symbols
from multiple antennas.
High-performance communication systems: Systems requiring
the lowest possible error rates often employ ML detection, such as
satellite communications and space communications.
Advantages:
Best performance: ML detection minimizes the probability of
detection error, achieving the lowest BER.
Theoretical Optimality: It is considered the most accurate
detection method for most communication systems.
Disadvantages:
Advantages:
Lower complexity: Suboptimal detection methods are
computationally less expensive than ML detection.
Practical implementation: These methods are easier to implement in
real-time systems.
Disadvantages:
Reduced performance: Suboptimal detection does not achieve the
same performance as optimal methods and may lead to higher BER.
Comparison between Optimal Detection
(Maximum Likelihood) vs Suboptimal Detection
5. Diversity Reception and Detection
Diversity techniques are used to combat fading and improve the
robustness of wireless communication.
By using multiple copies of the same signal, diversity reception helps
reduce the impact of deep fades in the channel.
Types of Diversity:
Advantages:
Unit-2 Lecture : 07
Working Principle:
Disadvantages:
Suboptimal performance: SC does not use the full potential of all
received signals. In cases where the selected branch has fading, the
performance may suffer.
Limited diversity gain: SC only provides a diversity gain equivalent to
the number of antennas, but the actual gain is smaller compared to
techniques like MRC.
Applications:
Mobile communication systems where simplicity and low power
consumption are required.
Wireless sensor networks, where devices operate with limited energy
resources.
2. Threshold Combining (TC)
Threshold Combining (TC) is a variation of selection
combining that introduces a threshold level to determine
whether a signal branch is strong enough to be selected for
processing.
Working Principle:
Advantages:
Applications:
Working Principle:
In Equal Gain Combining, the signals from each diversity
branch are combined at the receiver with equal amplitude gains
but with their phases aligned.
The receiver compensates for the phase differences between the
received signals and sums them to form a single output signal.
The phases are aligned to ensure that the signals combine
constructively.
Key Characteristics:
Advantages:
Applications:
Working Principle:
In MRC, the received signals from different diversity branches
are combined after being multiplied by optimal weights
proportional to their SNRs.
The signals are also phase-aligned to ensure constructive
combination. The branch with the strongest SNR gets the
highest weight, and the weaker signals contribute less to the
final output.
Key Characteristics:
Advantages:
Applications: