ADC Notes PDF
ADC Notes PDF
PAGE
S.No CONTENTS
NO
UNIT – I ANALOG COMMUNICATION
1
1.1 Noise: Source of Noise.
1
1.2 External Noise, Internal Noise.
2
1.3 Introduction to Communication Systems
m
3
1.4 Modulation, Types, Need for Modulation.
.co
4
1.5 Theory of Amplitude Modulation
17
2.1 Introduction to digital communication.
rtk
17
2.2 Frequency Shift Keying (FSK) Minimum Shift Keying (MSK)
19
2.3 Amplitude Shift Keying (ASK) Phase Shift Keying (PSK)
a
21
Sm
24
2.5 Quadrature Amplitude Modulation (QAM)
25
2.6 Quadrature Phase Shift Keying (QPSK) Techniques and Comparisons
33
3.3 Error Detection and Correction Techniques.
34
3.4 Pulse Communication: PAM, PCM, PTM. and comparison
38
4.1 Source Coding theorem
m
42
4.2 Techniques used for compression of information :Shannon Fano Coding
.co
43
4.3 Huffman coding
44
4.4 Mutual information
47
4.5 Entropy
i
alv
55
4.6 Channel capacity & coding theorem, channel coding theorem
58
4.7 Cyclic codes, Error Control Coding
rtk
64
4.8 Linear block codes
66
4.9 Viterbi decoding algorithm
a
67
Sm
72
5.1 Introduction.
72
5.2 Advanced Mobile Phone System (AMPS).
78
5.5 Satellite Communication
83
5.6 Bluetooth
APPENDICES
84
A Two marks Q & A
m
95
B Question Bank
.co
103
C University Questions
i
alv
a rtk
Sm
OBJECTIVES:
m
Noise: Source of Noise - External Noise- Internal Noise- Noise Calculation. Introduction to
Communication Systems: Modulation – Types - Need for Modulation. Theory of Amplitude
Modulation - Evolution and Description of SSB Techniques - Theory of Frequency and Phase
.co
Modulation – Comparison of various Analog Communication System (AM – FM – PM).
Amplitude Shift Keying (ASK) – Frequency Shift Keying (FSK) Minimum Shift Keying
i
(MSK) –Phase Shift Keying (PSK) – BPSK – QPSK – 8 PSK – 16 PSK - Quadrature
alv
Amplitude Modulation (QAM) – 8 QAM – 16 QAM – Bandwidth Efficiency– Comparison
of various Digital Communication System (ASK – FSK – PSK – QAM).
Entropy, Source encoding theorem, Shannon fano coding, Huffman coding, mutual
information, channel capacity, channel coding theorem, Error Control Coding, linear block
codes, cyclic codes, convolution codes, Viterbi decoding algorithm.
Advanced Mobile Phone System (AMPS) - Global System for Mobile Communications
(GSM) Code division multiple access (CDMA) – Cellular Concept and Frequency Reuse -
Channel Assignment and Hand - Overview of Multiple Access Schemes - Satellite
Communication - Bluetooth.
TEXT BOOK:
REFERENCES:
m
1. Simon Haykin, “Communication Systems”, 4th Edition, John Wiley & Sons, 2004
2. Rappaport T.S, "Wireless Communications: Principles and Practice", 2nd Edition,
.co
Pearson Education, 2007
3. H.Taub, D L Schilling and G Saha, “Principles of Communication”, 3rd Edition,
Pearson Education, 2007.
4. B. P.Lathi, “Modern Analog and Digital Communication Systems”, 3rd Edition,
i
alv
Oxford University Press, 2007.
5. Blake, “Electronic Communication Systems”, Thomson Delmar Publications, 2002.
6. Martin S.Roden, “Analog and Digital Communication System”, 3 rd Edition, Prentice
Hall of India, 2002.
rtk
1.1 NOISE:
Noise is an unwanted electrical signal which gets added on a transmitted signal when it is
travelling towards the receiver. Electrical noise is defined as any undesired electrical energy. For
Example: In audio recording any unwanted electrical signals that fall within the audio frequency
band of 0 khz to 15khz will interface with the music and therefore considered as noise.
Noise figure is a figure of merit and used to indicate how much the signal to noise ratio
m
gets degraded as a signal passes through a series of circuits.
co
(i) Correlated Noise : Implies a relationship between the signal and the noise.
(ii) Uncorrelated Noise : It is present all the time whether there is a signal or not.
.
Uncorrelated Noise:
lvi
Uncorrelated can be divided into two general categories: (i) External noise and (ii) Internal
noise.
tka
External Noise:
ar
It is a Noise generated outside the device or circuit. There are three primary sources of
external noise.
(i) Atmospheric ,
Sm
Extraterrestrial Noise consists of electrical signals that originate from outside earths
atmosphere and is therefore also called as deep space noise. This noise originates from the milky
way , other galaxies and the sun.
Extraterrestrial noise is subdivided into two categories.: (i) Solar and (ii) Cosmic.
Internal Noise: It is the noise caused by electrical interference generated within a device or
circuit.
1
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
Communication is the process of establishing connection (or link) between two points for
information exchange.
m
The Science of Communications involving long distances is called Telecommunication
( the world Tele standing for long distance)
co
The Two basic types of communication systems are
(i) Analog.
(ii) Digital.
.
In Analog Systems: Both the information and the carrier are analog signals.
lvi
In Digital Systems: The digital pulses are transferred between two or more points in a
communication system.
tka
Analog communication:
The modulation systems or techniques in which one of the characteristics of the carrier is
changed in proportion with the instantaneous value of modulating signal is called analog
ar
communication system.
2
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
Noise and
Distortion
m
Drawbacks of Baseband Transmission (without Modulation)
Excessively large antenna heights.
co
Signals get mixed up.
Short range of communication.
Multiplexing is not possible.
.
Poor quality of reception. lvi
The above drawbacks can be overcome by means of modulation techniques:
Modulation is the changing characteristics of the carrier signal with respect to the
instantaneous change in message signal.
ar
Needs for modulation: In order to carry the low frequency message signal to a longer distance,
the high frequency carrier signal is combined with it.
Frequency modulation: Frequency Modulation is the changing frequency of the carrier signal
with respect to the instantaneous change in message signal.
3
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
Phase modulation: Phase Modulation is defined as changing the phase of the carrier
signal with respect to the instantaneous change in message signal.
Deviation ratio:Deviation ratio is the worst case modulation index and is equal to the
maximum peak frequency deviation divided by the maximum modulating signal frequency.
Mathematically the deviation ratio is DR= f (max)/fm(max).
m
transmit an angle modulated wave as twice the sum of the peak frequency deviation and the
highest modulating signal frequency. Mathematically carson‘s rule is B=2( f +fm) Hz.
co
Modulation index: It is defined as ratio of amplitude of the message signal to the
amplitude of the carrier signal. m=Em/Ec.
Percentage modulation: It is the percentage change in the amplitude of the output wave
.
when the carrier is acted on by a modulating signal. M=(Em/Ec)*100
lvi
1.5 THEORY OF AMPLITUDE MODULATION
Amplitude Modulation
tka
Amplitude Modulation is the changing the amplitude of the carrier signal with respect to
the instantaneous change in message signal.
The amplitude modulated wave form, its envelope and its frequency spectrum and
bandwidth. Fig (a) Sinosoidal modulation signal (b)High frequency carrier (c) AM signal.
ar
Sm
4
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
5
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
6
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
7
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
Fig:1.2.3 : Frequency domain Representation of AM Wave
. co
lvi
tka
ar
AM Power Distribution:
8
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
9
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
This equation relates total power of AM wave to carrier power, Maximum Value
of modulation index, m=1 to avoid distortion. At this value of modulation index,
Ptotal = 1.5 Pc. From the above equation we have
m
co
Example Problems:
.
lvi
tka
ar
Sm
10
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
11
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
The values of Bessel functions depend upon modulation index m, They are listed in
Table 2.1.1
tka
ar
Sm
12
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Carson’s Rule:
13
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
14
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
The expression for frequency deviation, phase deviation and modulation index in
tka
angle modulation.
ar
Sm
15
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
-----
16
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
Digital modulation : Digital Modulation is defined as changing the amplitude of the carrier
signal with respect to the binary information or digital signal.
Bit rate is the number of bits transmitted during one second between the transmitter and
receiver.
m
Baud rate is the rate of change of signal on transmission medium after encoding and modulation
have occurred.
co
Bandwidth efficiency : Bandwidth efficiency is the ratio of the transmission bit rate to the
minimum bandwidth required for a particular modulation
.
It has a better noise immunity
lvi
Repeaters can be used between transmitters and receivers
It becomes simpler and cheaper as compared to the analog communication
tka
Disadvantages of Digital communications
Minimum Shift Keying (MSK) : The minimum frequency space that allows the 2 fsk
representing symbols 0s and 1s. Thus CP (Continuous Phase) FSK signal with a deviation ratio if
Sm
Frequency Shift Keying (FSK) : Frequency Shift Keying is the as changing amplitude of the
carrier signal with respect to the binary information or digital signal.
MSK baseband waveform are smoother compared with QPSK MSK signals have
continuous phase It does not have any amplitude variation
17
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
18
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
Amplitude Shift Keying (ASK) : Amplitude Shift Keying is the as changing amplitude of the
carrier signal with respect to the binary information or digital signal.
Define Phase Shift Keying (PSK): Phase Shift Keying is the changing amplitude of the carrier
signal with respect to the binary information or digital signal
19
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
20
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
21
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
22
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
23
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
2.5 QUADRATURE AMPLITUDE MODULATION:
lvi
tka
Quadrature Amplitude modulation (QAM): QAM is a form of digital modulation similar
to PSK except the digital information is contained in both the amplitude and phase of the
transmitted carrier.
ar
QAM is a combination of ASK and PSKTwo different signals sent simultaneously on the
same carrier frequency ie,M=4, 16, 32, 64, 128, 256 As an example of QAM, 12 different
phases are combined with two different amplitudes.
Sm
Since only 4 phase angles have 2 different amplitudes, there are a total of 16
combinations. With 16 signal combinations, each baud equals 4 bits of information (2 ^ 4
= 16).
Combine ASK and PSK such that each signal corresponds to multiple bits.
More phases than amplitudes. Minimum bandwidth requirement same as ASK or PSK.
24
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
co
2.6 QUADRATURE PHASE SHIFT KEYING (QPSK) TECHNIQUES AND ITS BLOCK
.
DIAGRAM: lvi
Advantages of QPSK
25
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
26
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
27
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
BPSK QPSK
m
1. One bit forms a symbol. Two bits form a symbol.
2. Two possible symbols. Four possible symbols.
3. Minimum bandwidth is twice of fb. Minimum bandwidth is equal to fb.
co
4. Symbol duration = Tb. Symbol duration = 2Tb.
9. What are the advantages of M-ary signaling scheme?
.
1. M-ary signaling schemes transmit bits at a time.
lvi
2. Bandwidth requirement of M-ary signaling schemes is reduced.
Correlative coding allows the signaling rate of 2B0 in the channel of bandwidth B0. This
is made physically possible by allowing ISI in the transmitted signal in controlled manner. This
ISI is known to the receiver. Hence effects of ISI are eliminated at the receiver. Correlative
Sm
-------
28
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
two stations A and B ie)., information is transferred between a main frame computer and a
remote computer terminal.
co
A multipoint line configuration is one in which more than two specific devices share a
single link. Morse code is used to send messages. A key which turned the carrier of a transmitter
.
ON and OFF to produce the dots and dashes. These dots and dashes were detected at the receiver
lvi
and it is converter back into letters and numbers makes the original message.
• 1838: Samuel Morse & Alfred Veil Invent Morse CodeTelegraph System
• 1876: Alexander Graham Bell invented Telephone
• 1910:Howard Krum developed Start/Stop Synchronisation
History of Computing
• 1930: Development of ASCII Transmission Code
• 1945: Allied Governments develop the First Large Computer
• 1950: IBM releases its first computer IBM 710
• 1960: IBM releases the First Commercial Computer IBM 360
29
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
The Applications Of Data Communication:
co
Used in Automatic Teller Machine (ATM) Internet
Airline and Hotel reservation system
.
Mass media
lvi
NEWS network
tka
Advantages And Disadvantages Of Parallel Communication:
Advantages:
Parallel transmission is speed
Used for short distance communication
ar
Disadvantages:
Require more lines between source and destination
Sm
More cost
NARROWBAND FM.
When the modulation index is less than 1, the angle modulated systems are called low
index. The bandwidth requirement of low index systems is approximately twice of the
modulating signal frequency. Therefore low index systems are called narrowband FM.
30
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
In narrow band FM, the frequency deviation is very small. Hence the frequency spectrum
consists of two major sidebands like AM. Other sidebands are negligible and hence they can be
neglected. Therefore the bandwidth of narrowband FM is limited only to twice of the highest
modulating frequency.
If the deviation in carrier frequency is large enough so that other sidebands cannot be
m
neglected, then it is called wideband FM. The bandwidth of wideband FM is calculated as per
Carson‟s rule.
co
FM has following advantages over AM.
.
ii) Since amplitude of FM constant, the noise interference is minimum in FM. Any noise
lvi
superimposing amplitude can be removed with the help of amplitude limits. Whereas it is
difficult to remove amplitude variations due to noise in AM.
iii) The depth of modulation has limitation in AM. But in FM the depth of modulation can be
tka
increased to any value by increasing the deviation. This does not cause any distortion in FM
signal.
iv) Since guard bands are provided in FM, there is less possibility of adjacent channel
interference.
v) Since space waves are used for FM, the radius of propagation is limited to line of sight. Hence
ar
Carson‟s rule:
31
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
Coherent (synchronous) detection: In coherent detection, the local carrier generated at the
receiver is phase locked with the carrier at the transmitter. The detection is done by correlating
received noisy signal and locally generated carrier. The coherent detection is a synchronous
detection.
Non coherent (envelope) detection: This type of detection does not need receiver carrier to be
phase locked with transmitter carrier. The advantage of such a system is that the system becomes
m
simple, but the drawback is that error probability increases. The different digital
modulation techniques are used for specific application areas. The choice is made such that the
transmitted power and channel bandwidth are best exploited.
co
ASCII code
.
lvi
Corresponding CCITT recommendation is IA5 (International Alphabet No.5)
– ISO specification is ISO 646
EBCDIC code
It is an 8-bit code with 256symbols
Sm
BAUDOT code
It is a 5-bit code also known asITA2 (International TelegraphAlphabet No. 2).
32 codes are possible. With thehelp of Letter shift & Figure shift key same
code is used torepresent two symbols.
Maximum symbols in this code are58
Used in Telegraphy/Telex
32
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
Antipodal Signals
In BPSK, the two symbols are transmitted with the help of following signals,
Symbol „1‟ s1 (t) = 2P cos (2_ f0 t)
Symbol „0‟ s2 (t) = 2P cos (2_ f0 t + _)Here observe that above two signals differ only in a
relative phase shift of 1800. Such signals are called antipodal signals.
m
Different Types Of Error Detection Techniques:
a. Redundancy
co
b. Echoplex
c. Exact count encoding
.
d. Parity lvi
e. Check sum
f. Vertical Redundancy Check
g. Horizontal Redundancy Check
tka
h. Cyclic Redundancy Check
time. When available channel bandwidth is less, then M-ary schemes are used. M ary schemes
require less bandwidth compared to binary schemes. For example binary PSK requires a
Sm
33
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
PAM Modulator
The amplitude of a carrier pulse is altered in accordance to that of amplitude of message
signal to make it accommodate the information signal.
m
• LPF performs bandlimiting
• Band limited signal is then sampled at the multiplier.
co
• Multiplier samples with the help of pulse train generator
• Pulse train generator produces the pulse train
• The multiplication of message signal and pulse train produces PAM
.
lvi
tka
signal
PAM DEMODULATOR:
PAM SIGNAL
In PWM system, the message signals are used to vary the duration of carrier pulse. The
message signal may vary either the trailing edge or leading edge or both of the carrier pulses n
order to accommodate the intelligence of information system.
PWM Modulator
• It is basically a monostablemultivibrator with message signal applied at the control voltage
input.
34
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
• Externally applied modulating signal changes the control voltage and hence the threshold
voltage level
• The time period required to charge the capacitor upto threshold level changes giving pulse
modulated signal
PWM demodulator
Schmitt
m
trigger
co
Ramp adder Level rectifier
Generator shifter
.
lvi LPF
Synchro
pule genr
tka
Demodulated Output.
PPM Modulator
ar
• When the value of message signal is lower than value of sawtooth ,then the output is high.
PPM demodulator
35
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
Pulse code modulation refers a form of source coding. It is a form of digital modulation
techniques in which the code refers a binary word that represent digital data.With PCM, the
pulses are of fixed length and fixed amplitude.
m
Block Diagram of Receiver
. co
Pulse position modulation
lvi
The position of a carrier pulse is altered in accordance with information contained in
sampled waveform.
tka
Sampling rate
The sampling rate fs must be atleast two times the highest frequency component of the
original signal to be accurately represented fs>=2fm
ar
This reduces the probability of error. The baseband signal receiver is also called optimum
receiver.
Matched filter.
The matched filter is a baseband signal receiver, which works in presence of white
Gaussian noise. The impulse response of the matched filter is matched to the shape of the input
signal.
36
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
Maximum signal to noise ratio of the matched filter is the ratio of energy of the signal to
psd of white noise.
co
Correlator: It is the coherent receiver. It correlates the received noisy signal f (t) with
the locally generated replica of the known signal x (t). Its output is given as,
r (t) = 0_T f (t) x(t) dt
.
lvi
Matched filter and correlator are functionally same.
tka
1. For the same bit error rate, the bandwidth required by QPSK Is reduced to half as
ar
compared to BPSK.
2. Because of reduced bandwidth, the information transmission rate of QPSK is higher.
Sm
3. Variation in QPSK amplitude is not much. Hence carrier power almost remains constant
------
37
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
Mutual information is the amount of information transferred when Xi is transmitted and
Yi is received. It is represented by I(Xi,Yi) .The average mutual information is defined as the
co
amount of source information gain per received symbol.
A block code of length n and 2k code words is calleda linear (n, k) code if and only if its
.
2k code words form a k-dimensional subspace of the vector space of all the n-tuples over the
lvi
field GF(2). The message occurring frequently can be assigned short code words, whereas
message which occur rarely are assigned long code word, such coding is called variable length
tka
coding.
Channel capacity is defined as the maximum of the mutual information that may be transmitted
through the channel.
38
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
The entropy of a source is a measure of the average amount of information per source symbol in
a long message. Channel coding theorem is applied for discrete memory less additive white
gaussian noise channels.
m
The objectives of cyclic codes :
Encoding and syndrome calculations can be easily implemented by using simple shift
co
register with feedback connection It is possible to design codes having useful error correction
properties
.
Source Coding Theorem
lvi
The source coding theorem shows that (in the limit, as the length of a stream of
independent and identically-distributed random variable (data tends to infinity) it is impossible to
tka
compress the data such that the code rate (average number of bits per symbol) is less than the
Shannon entropy of the source, without it being virtually certain that information will be lost.
However it is possible to get the code rate arbitrarily close to the Shannon entropy, with
negligible probability of loss.
ar
discrete-valued case and differential entropy in the continuous-valued case. The Source coding
theorem states that for any ε > 0 for any rate larger than the entropy of the source, there is large
enough n and an encoder that takes n i.i.d. repetition of the source, X1:n, and maps it to n(H(X) +
ε) binary bits such that the source symbols X1:n are recoverable from the binary bits with
probability at least 1 − ε.
39
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
The Asymptotic Equipartition Property (AEP) shows that for large enough n, the probability that
a sequence generated by the source lies in the typical set, Aεn, as defined approaches one. In
m
satisfy:
Note that:
co
The probability of a sequence from X being drawn from Aε
n is greater than 1 − ε.
since the
this set.
The encoding algorithm: The encoder checks if the input sequence lies within the typical
set; if yes, it outputs the index of the input sequence within the typical set; if not, the
Sm
encoder outputs an arbitrary n(H(X) + ε) digit number. As long as the input sequence lies
within the typical set (with probability at least 1 − ε), the encoder doesn't make any error.
So, the probability of error of the encoder is bounded above by ε.
Proof of Converse. The converse is proved by showing that any set of size smaller than
Aε
n (in the sense of exponent) would cover a set of probability bounded away from 1.
Proof: Source coding theorem for symbol codes
40
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
For 1 ≤ i ≤ n let si denote the word length of each possible xi. Define ,
where C is chosen so that q1 + ... + qn = 1. Then
m
. co
lvi
where the second line follows from Gibbs' inequality and the fifth line follows
from Kraft's inequality:
tka
so log C ≤ 0.
For the second inequality we may set
ar
so that
Sm
and so
and
and so by Kraft's inequality there exists a prefix-free code having those word lengths.
Thus the minimal S satisfies
41
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
possible to being equal.All symbols then have the first digits of their codes assigned;
symbols in the first set receive "0" and symbols in the second set receive "1". As long as
co
any sets with more than one member remain, the same process is repeated on those sets,
to determine successive digits of their codes. When a set has been reduced to one symbol,
of course, this means the symbol's code is complete and will not form the prefix of any
other symbol's code.
.
lvi
The algorithm works, and it produces fairly efficient variable-length encodings;
when the two smaller sets produced by a partitioning are in fact of equal probability, the
tka
one bit of information used to distinguish them is used most efficiently. Unfortunately,
Shannon-Fano does not always produce optimal prefix codes; the set of probabilities
{0.35, 0.17, 0.17, 0.16, 0.15} is an example of one that will be assigned
Shannon-Fano Algorithm
ar
42
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
2. The left half of the list is assigned the binary digit 0, and the right half is assigned
the digit 1. This means that the codes for the symbols in the first half will all start
with 0, and the codes in the second half will all start with 1.
3. Recursively apply the steps 3 and 4 to each of the two halves, subdividing groups
and adding bits to the codes until each symbol has become a corresponding code
leaf on the tree.
m
Huffman coding is an entropy encoding algorithm used for lossless data
compression. The term refers to the use of a variable-length code table for encoding a
co
source symbol (such as a character in a file)
Huffman coding uses a specific method for choosing the representation for each
symbol, resulting in a prefix code (sometimes called "prefix-free codes") (that is, the bit
.
string representing some particular symbol is never a prefix of the bit string representing
lvi
any other symbol) that expresses the most common characters using shorter strings of bits
than are used for less common source symbols. Huffman was able to design the most
tka
efficient compression method of this type: no other mapping of individual source symbols
to unique strings of bits will produce a smaller average output size when the actual
symbol frequencies agree with those used to create the code.
Although Huffman coding is optimal for a symbol-by-symbol coding (i.e. a
ar
stream of unrelated symbols) with a known input probability distribution, its optimality
can sometimes accidentally be over-stated. For example, arithmetic coding and LZW
Sm
43
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
Set , which is the set of the (positive) symbol weights (usually proportional to
probabilities), i.e. .
Output.
Code , which is the set of (binary) codewords, where ci is the codeword for .
Goal.
Let be the weighted path length of code C. Condition: for any code .
For any code that is biunique, meaning that the code is uniquely decodable, the sum of
the probability budgets across all symbols is always less than or equal to one. In this
m
example, the sum is strictly equal to one; as a result, the code is termed a complete code.
If this is not the case, you can always derive an equivalent code by adding extra symbols
co
(with associated null probabilities), to make the code complete while keeping it biunique.
In general, a Huffman code need not be unique, but it is always one of the codes
minimizing L(C).
.
4.4 MUTUAL INFORMATION
lvi
tka
On an average we require H(X) bits of information to specify one input symbol.
However, if we are allowed to observe the output symbol produced by that input, we require,
then, only H (X|Y) bits of information to specify the input symbol. Accordingly, we come to the
conclusion, that on an average, observation of a single output provides with [H(X) – H (X|Y)]
ar
Notice that in spite of the variations in the source probabilities, p (xk) (may be due to
noise in the channel), certain probabilistic information regarding the state of the input is
available, once the conditional probability p (xk | yj) is computed at the receiver end. The
difference between the initial uncertainty of the source symbol xk, i.e. log 1/p(xk) and the final
uncertainty about the same source symbol xk, after receiving yj, i.e. log1/p(xk |yj) is the
information gained through the channel. This difference we call as the mutual information
44
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
1 1
m
log
p(xk )
co
p(x k .y j )
.
p(x k ).p(y j )
lvi
p(x k | x k ) 1
tka
I (xk ) = I (x k, xk) = log log
p(x k ) p(xk )
This is the definition with which we started our discussion on informationtheory.Accordingly I
(xk) is also referred to as ‗Self Information‘.
ar
p(xk , y j ) p(y
It is clear from Eq (3.21b) that, as | xk ) ,
Sm
j
p(xk )
p(y j | x k ) 1 1
I (x k ,y j
log = log log
p(y j ) p(y j ) p(y j | x k )
45
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
Averaging Eq. (4.21b) over all admissible characters xk and yj, we obtain the average
information gain of the receiver:
m
p(xk , y j )
=
∑∑ p(xk , y j ).log
co
k j p(xk )p(y j )
1 1
.
.
1) I(X, Y) = ∑∑ p(xk , y j ) log
lvi
log = H(X) – H(X | Y)
p(x ) p(x | y )
k j k k j
tka
1 1
.
2) I(X, Y) = ∑∑ p(xk , y j ) [log log
k j p(y j ) p(y j | xk )
ar
= H(Y) – H(Y | X)
1 1
Sm
∑∑ p(xk , y j ) log
KJ p(xk y j )
Further, we conclude that, ―even though for a particular received symbol, yj, H(X) –
H(X | Yj) may be negative, when all the admissible output symbols are covered, the average
46
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
mutual information is always non- negative‖. That is to say, we cannot loose information on an
average by observing the output of a channel. An easy method, of remembering the various
relationships, is given in Fig 4.2.Althogh the diagram resembles a Venn-diagram, it is not, and
the diagram is only a tool to remember the relationships. That is all. You cannot use this diagram
for proving any result.
The entropy of X is represented by the circle on the left and that of Y by the circle on the right.
The overlap between the two circles (dark gray) is the mutual information so that the remaining
(light gray) portions of H(X) and H(Y) represent respective equivocations. Thus we have
m
H(X | Y) = H(X) – I(X, Y) and H (Y| X) = H(Y) – I(X, Y)
co
The joint entropy H(X,Y) is the sum of H(X) and H(Y) except for the fact that the overlap is
added twice so that
.
lvi
H(X, Y) = H(X) + H(Y) - I(X, Y)
tka
Also observe H(X, Y) = H(X) + H (Y|X)
4.5 ENTROPY:
The different conditional entropies, Joint and Conditional Entropies:
47
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
We define the following entropies, which can be directly computed from the JPM.
1 1 1
H(X, Y) = p(x1 , y1) log + p(x1, y 2) log +…+ p(x1, yn) log
p(x1 , y1 ) p(x1 , y2 ) p(x1 , yn )
1 1 1
+…+ p(x2,yn)
+ p (x2, y1) log + p(x2,y2) log log
p(x2 , y1 ) p(x2 , y2 ) p(x1 , y1 )
m
1 1 1
+
co
… p (xm, y1) log + p(xm,y2) log +… p(xm,yn) log or
p(xm , y1 ) p(xm , y2 ) p(xm , yn )
m n
.
1
lvi
H(X, Y) = ∑∑p(x k , y j ) log
tka
p(x k , y j )
m 1
k 1 p( xk )
Using Eq (4.6) only for the multiplication term, this equation can be re-written as:
mn 1
Sm
H(X) = ∑ ∑ p( xk , y j ) log
k 1
j 1 p( xk )
n m 1
48
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
P{Y yj }
i.e., p(xk | y j ) = p(xk , y j ) ) / p (yj)
m 1 m 1
m
Thus, the set [X | yj] = {x 1 | yj, x 2 | yj… xm | yj}; P [X | yj] = {p(x1 | yj), p(x2 | yj)… p (xm | yj)}, forms a
complete finite scheme and an entropy function may therefore be defined for this scheme as
below:
co
m 1
.
H(X | yj) = ∑ p(xk | y j )log . lvi
k 1 p(xk | y j )
Taking the average of the above entropy function for all admissible characters received,
tka
we have the average ―conditional Entropy” or “Equivocation”:
n
= ∑ p( y j ) H(X | yj)
j 1
Sm
n M 1
= ∑ p( y j ) ∑ p( xk | y j ) log
j 1 k 1 p( xk | y j )
nm
1
49
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
j k
m n 1
m
H(Y | X) = ∑ ∑ p( xk , y j ) log
k 1j 1 p( y j | xk )
co
Observe that the manipulations, ‗ The entropy you want is simply the double summation
of joint probability multiplied by logarithm of the reciprocal of the probability of interest‟ . For
example, if you want joint entropy, then the probability of interest will be joint probability. If
.
you want source entropy, probability of interest will be the source probability. If you want the
lvi
equivocation or conditional entropy, H (X|Y) then probability of interest will be the conditional
probability p (xK |yj) and so on.
tka
All the five entropies so defined are all inter-related. For example, We have
1
ar
1 p(xk )
Since, =
p( y j | x k ) p(xk , y j )
We can straight away write:
1 1
50
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
k j k j
Or H(Y | X) = H(X, Y) – H(X)
1 1
m
H(X) - H(X |Y) = ∑∑p(x k , y j ) log log
p(x ) p(x | y )
k j k k j
co
p(xk , y j )
= ∑∑ p(xk , y j )log
k j p(xk ) . p(y j )
.
lvi
Using the logarithm inequality derived earlier, you can write the above equation as:
p(xk , y j )
H(X) - H(X |Y) =log e ∑∑ p(xk , y j )ln
k j p(xk ) . p(y j )
tka
p(xk ) . p(y j )
≥ log e ∑∑ p(xk , y j ) 1 -
ar
k j p(x ,y )
k j
Sm
51
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
The channel is called a ‗Binary Symmetric Channel‘ or ( BSC). It is one of the most
common and widely used channels. The channel diagram of a BSC is shown in Fig 3.4. Here ‗ p‘
is called the error probability.
m
H (Y | X ) p1 q1
log log H ( p)
co
p q
1 1
H (Y ) [p p q p
.
q)]log [p plvi q)]log
q)] [q p q)]
I(X, Y) = H(Y) – H (Y|X) and the channel capacity is:
tka
C=1 + p log p +q log q
52
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
The observer is a noiseless channel that compares the transmitted and the received
symbols. Whenever there is an error a ‗ 1‘ is sent to the receiver as a correction signal and
co
appropriate correction is effected. When there is no error the observer transmits a ‗ 0‘ indicating
no change. Thus the observer supplies additional information to the receiver, thus compensating
for the noise in the channel. Let us compute this additional information .With P (X=0) = P (X=1)
= 0.5, we have:
.
lvi
Probability of sending a „1‟ = Probability of error in the channel .
tka
–p=q
Sm
p1 q1
log log H(X|Y) H(Y|X)
p q
53
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
Thus the additional information supplied by the observer is exactly equal to the equivocation of
the source. Observe that if ‗ p‘ and ‗ q‘ are interchanged in the channel matrix, the trans -
information of the channel remains unaltered. The variation of the mutual information with the
probability of error is
shown in Fig 3.6(a) for P (X=0) = P (X=1) = 0.5. In Fig 4.6(b) is shown the dependence of the
mutual information on the source probabilities.
m
. co
Binary Erasure Channels (BEC):
lvi
BEC is one of the important types of channels used in digital communications. Observe
tka
that whenever an error occurs, the symbol will be received as ‗ y‘ and no decision will be made
about the information but an immediate request will be made for retransmission, rejecting what
have been received (ARQ techniques), thus ensuring 100% correct data recovery. Notice that this
channel also is a symmetric channel and we have with P(X = 0) = -
ar
H (Y | X ) 1 1
Sm
plog qlog
p q
H ( X ) 1 ( 1 1
)log (1
)
The JPM is obtained by multiplying first row of P (Y|X) by and second row by
(1– We get:
54
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
0
P( X ,Y )
p( 1
0
1
Adding column wise we get: P (Y) = [ – ]
From which the CPM P (X|Y) is computed as:
1 0
m
P( X | Y )
0
(1 1
H(X|Y) 1 (1 1
co
log log (1 (1
)
pH ( X )
.
Max I (X, Y) = q bits / symbol.
lvi
In this particular case, use of the equation I(X, Y) = H(Y) – H(Y | X) will not be correct, as H(Y)
tka
involves ‗ y‘ and the information given by ‗ y‘ is rejected at the receiver.
rate R(=r×I (X,Y),where r is the symbol rate) is less than or equal to a rate ‗ C‘ called ―
channel
capacity‖.
The technique used to achieve this objective is called coding. To put the matter more
formally, the theorem is split into two parts and we have the following statements.
Positive statement:
―Given a source of M equally likely messages, with M>>1, which is generating
information at a rate R, and a channel with a capacity C. If R ≤ C, then there exists a
coding technique such that the output of the source may be transmitted with a probability
of error of receiving the message that can be made arbitrarily small‖.
55
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
This theorem indicates that for R< C transmission may be accomplished without error
even in the presence of noise. The situation is analogous to an electric circuit that comprises of
only pure capacitors and pure inductors. In such a circuit there is no loss of energy at all as the
reactors have the property of storing energy rather than dissipating.
Negative statement:
m
―Given the source of M equally likely messages with M>>1, which is generating
information at a rate R and a channel with capacity C. Then, if R>C, then the probability of
co
error of receiving the message is close to unity for every set of M transmitted symbols‖.
This theorem shows that if the information rate R exceeds a specified value C, the error
.
probability will increase towards unity as M increases. Also, in general, increase in the
lvi
complexity of the coding results in an increase in the probability of error. Notice that the
situation is analogous to an electric network that is made up of pure resistors. In such a circuit,
tka
whatever energy is supplied, it will be dissipated in the form of heat and thus is a ―
lossy
network‖.
You can interpret in this way: Information is poured in to your communication channel.
ar
You should receive this without any loss. Situation is similar to pouring water into a tumbler.
Once the tumbler is full, further pouring results in an over flow. You cannot pour water more
Sm
Shannon defines ―C‖ the channel capacity of a communication channel a s the maximum
value of Transinformation, I(X, Y):
The maximization in Eq (4.28) is with respect to all possible sets of probabilities that could
be assigned to the input symbols. Recall the maximum power transfer theorem: ‗In any network,
56
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
maximum power will be delivered to the load only when the load and the source are properly
matched‘. The device used for this matching purpose, we shall call a ―
transducer ―
. For example,
in a radio receiver, for optimum response, the impedance of the loud speaker will be matched to
the impedance of the output power amplifier, through an output transformer.
m
R ≤ C or rs H(S) ≤ rc I(X,Y)Max or{ H(S)/Ts} ≤{ I(X,Y)Max/Tc}
co
“If a discrete memoryless source with an alphabet ‘S’ has an entropy H(S) and produces
symbols every ‘T s’ seconds; and a discrete memoryless channel has a capacity I(X,Y) Max and is
used once every Tc seconds; then if
.
H(S) I ( X ,Y )Max
lvi
Ts Tc
tka
There exists a coding scheme for which the source output can be transmitted over the
channel and be reconstructed with an arbitrarily small probability of error. The parameter C/T c
is called the critical rate. When this condition is satisfied with the equality sign, the system is
ar
Conversely, if H ( S ) I ( X ,Y )Max
, it is not possible to transmit information over the Ts Tc
57
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
channel with pre-specified noise characteristics (i.e. with a given transition probability matrix,
P (Y|X)) the rate of information transmission depends on the source that drives the channel.
Then, the maximum rate corresponds to a proper matching of the source and the channel. This
ideal characterization of the source depends in turn on the transition probability characteristics
of the given channel.
m
In practical channels, the noise power spectral density N0 is generally constant. If Eb is
the transmitted energy per bit, then we may express the average transmitted power as:
co
S = Eb C
(C/B) is the ―
bandwidth efficiency‖ of the syste m. If C/B = 1, then it follows that Eb = N0.This
.
implies that the signal power equals the noise power. Suppose, B = B0 for which, S = N, then Eq.
(5.59) can be modified as:
lvi
tka
That is, ―the maximum signaling rate for a given S is 1.443 bits/sec/Hz in the bandwidth
over which the signal power can be spread without its falling below the noise level‖.
In coding theory, cyclic codes are linear block error-correcting codes that have
convenient algebraic structures for efficient error detection and correction.
Sm
Let C be a linear code over a finite field GF(q)n of block length n. C is called a cyclic
code, if for every codeword c=(c1,...,cn) from C, the word (cn,c1,...,cn-1) in GF(q)n obtained by a
cyclic right shift of components is again a codeword. Same goes for left shifts. One right shift is
equal to n − 1 left shifts and vice versa. Therefore the linear code C is cyclic precisely when it is
invariant under all cyclic shifts.
Cyclic Codes have some additional structural constraint on the codes. They are based on
Galois fields and because of their structural properties they are very useful for error controls.
Their structure is strongly related to Galois fields because of which the encoding and decoding
algorithms for cyclic codes are computationally efficient.
58
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
in Galois extension field GF(8) at the primitive element , and all codewords satisfy .
C()=0 Cyclic codes can also be used to correct double errors over the field GF(2).
co
Blocklength will be n equal to and primitive elements and as zeros in the GF(2 m)
because we are considering the case of two errors here, so each will represent one error.The
received word is a polynomial of degree n-1 given as
.
lvi
where e(x) can have at most two nonzero coefficients corresponding to 2 errors.
Syndrome Polynomial, S(x) as the remainder of polynomial v(x) when divided by the
tka
generator polynomial g(x) i.e.
S(x)=v(x) mod g(x)= (a(x)g(x)+e(x)) mod g(x)=e(x) mod g(x) as (a(x)g(x)) mod g(x) is
zero
b) For correcting two errors
ar
Let the field elements X1and X2 be the two error location numbers. If only one error occurs then
is equal to zero and if none occurs both are zero.
Sm
Let and .
These field elements are called "syndromes". Now because is zero at primitive elements
and .
And these two can be considered as two pair of equations in with two unknowns and
hence we can write
59
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
and .
Hence if the two pair of nonlinear equations can be solved cyclic codes can used to correct two
errors.
Syndrome Calculator
We know r (X) = q(X)g(X) + S(X).
We can also write r (X) = c(X) + e(X).
Rewrite the expression to:
m
(X) = c(X) + r (X)
= c(X) + q(X)g(X) + S(X)
= (f (X) + q(X))g(X) + S(X)
co
If error polynomial e(X) is divided by generator polynomial g(X), the
remainder is the syndrome polynomial S(X).
.
Error Detection
lvi
r (X) = c(X) + e(X) = q(X)g(X) + S(X)
tka
e(X) = c(X) + q(X)g(X) + S(X) = (f (X) + q(X))g(X) + S(X)
Investigate error detecting capability of cyclic code:
Assuming e(X) is a burst of length n - k or less, i.e., errors are confined to n - k or fewer
consecutive positions;
ar
60
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
‗b‘
has occurred. Such an error burst may also include an end-shifted version of the contiguous
co
sequence.
In any event, Binary (n, k)CRC codes are capable of detecting the following error patterns:
1. All CRC error bursts of length (n-k) or less.
2. A fraction of (1
.
- 2 (n –k - 1)) of CRC error bursts of length (n – k + 1 ).
lvi
3. A fraction (1-2(n – k)) of CRC error bursts of length greater than (n – k + 1 ).
4. All combinations of (d min – 1) or fewer errors.
tka
5. All error patterns with an odd number of errors if the generator polynomial
g (X) has an even number of non zero coefficients.
Generator polynomials of three CRC codes, internationally accepted as standards are listed
ar
below.
All three contain (1 +X) as a prime factor. TheCRC-12 code is used when the character lengths is
Sm
61
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
62
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
63
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
Error-Control Coding
Error-control coding techniques are used to detect and/or correct errors that occur in the
message transmission in a digital communication system. The transmitting side of the error-
control coding adds redundant bits or symbols to the original information signal sequence. The
receiving side of the error-control coding uses these redundant bits or symbols to detect and/or
correct the errors that occurred during transmission. The transmission coding process is known
as encoding, and the receiving coding process is known as decoding.
64
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
There are two major classes in error-control code: block and convolutional. In block
coding, successive blocks of K information (message) symbols are formed.
The coding algorithm then transforms each block into a codeword consisting of n
symbols where n>k. This structure is called an (n,k) code. The ratio k/n is called the code rate.
A key point is that each codeword is formed independently from other codewords.
m
An error-control code is a linear code if the transmitted signals are a linear function of
the information symbols. The code is called a systematic code if the information symbols are
co
transmitted without being altered. Most block codes are systematic, whereas most convolutional
codes are nonsystematic.
.
Almost all codes used for error control are linear. The symbols in a code can be either
lvi
binary or non-binary. Binary symbols are the familiar '0' and '1'.
tka
Linear Block Codes
Linear block coding is a generic coding method. Other coding methods, such as
Hamming and BCH codes, are special cases of linear block coding. The codeword vector of a
linear block code is a linear mapping of the message vector. The codeword x and the message m
ar
65
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
Viterbi algorithm gets its efficiency via concentrating on suvival paths of the trellis.
. co
lvi
tka
ar
Sm
66
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
4.10 CONVOLUTIONAL CODES.
* Convolutional codes are widely used as channel codes in practical communication systems
for error correction.
ar
* The encoded bits depend on the current k input bits and a few past input bits.
* The main decoding strategy for convolutional codes is based on the widely used Viterbi
Sm
algorithm.
* Convolutional codes are commonly described using two parameters: the code rate and the
constraint length. The code rate, k/n, is expressed as a ratio of the number of bits into the
convolutional encoder (k) to the number of channel symbols output by the convolutional
encoder (n) in a given encoder cycle.
* The constraint length parameter, K, denotes the "length" of the convolutional encoder, i.e.
how many k-bit stages are available to feed the combinatorial logic that produces the
output symbols. Closely related to K is the parameter m, which can be thought of as the
memory length of the encoder. A simple convolutional encoder is shown below(fig 3.1).
67
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
The information bits are fed in small groups of k-bits at a time to a shift register. The
output encoded bits are obtained by modulo-2 addition (EXCLUSIVE-OR operation) of
the input information bits and the contents of the shift registers which are a few previous
information bits.
m
. co
lvi
A convolutional encoder with k=1, n=2 and r=1/2
tka
The operation of a convolutional encoder can be explained in several but equivalent ways such
as, by
a) state diagram representation. b) tree diagramrepresentation.
c) trellis diagram representation.
ar
machine. Contents of the rightmost (K-1) shift register stages define the states of the encoder. So,
the encoder in Fig. 3.1 has four states.
The transition of an encoder from one state to another, as caused by input bits, is depicted
in the state diagram.Fig. 3.2 shows the state diagram of the encoder in Fig. 3.1.
68
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
co
State diagram representation for the encoder.
.
b) Tree Diagram Representation: The tree diagram representation shows all possible
lvi
information and encoded sequences for the convolutional encoder. Fig. 3.3 shows the tree
diagram for the encoder in Fig. 3.1. The encoded bits are labeled on the branches of the tree.
Given an nput sequence, the encoded sequence can be directly read from the tree. Representing
tka
convolutional codes compactly: code trellis and state diagram: State diagram
ar
Sm
69
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
8
co
Distance for some convolutional codes:
.
lvi
tka
Usually, supporting descriptions on state transitions, corresponding input and output bits
etc. are labeled in the trellis diagram.
It is interesting to note that the trellis diagram, which describes the operation of the
encoder, is very convenient for describing the behavior of the corresponding decoder, especially
when the famous „Viterbi Algorithm (VA)‟ is followed.
70
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
Fig.. Trellis diagram for the encoder in Fig. 3.1
tka
1/3 rate convolutional encoder has the following generator g1=(1 0 0), g2=(1 0 1),
g3=(1 1 1)
ar
v)This code is used for transmission over a Awgn channel with hard decision decoder.
Using viterbi algorithm
-------
71
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
5.1 INTRODUCTION:
Global system for mobile communication (GSM) is a globally accepted standard for
digital cellular communication. GSM is the name of a standardization group established in 1982
to create a common European mobile telephone standard that would formulate specifications for
a pan-European mobile cellular radio system operating at 900 MHz. It is estimated that many
m
countries outside of Europe will join the GSM partnership.
co
Subscriber Identity Module (SIM). It is a memory device that stores information such as the
subscribers identification number, the networks and countries where the subscriber is entitled to
service, privacy tax and other user specific information A subscriber uses the SIM with a four
.
digit personal ID number to activate service from GSM phone.
lvi
5.2 Advanced Mobile Phone Services (AMPS).
tka
AMPS is a Standard Cellular Telephone Service (CTS). The AMPS system uses a seven
cell reuse pattern with provisions for sectoring and cell splitting to increase channel when
needed. AMPS uses frequency modulation and frequency division duplex for radio
transmission.
ar
Explanation
• N AMPS
Explanation
• Voice modulation and Demodulation
Compander
Pre-emphasis
Post Deviation Limiter filter.
Supervisory signal.
Division Limiter.
72
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
5.3 Cellular Concept and Frequency Reuse, Channel Assignment and Handoffs
• When a user/call moves to a new cell, then a new base station and new channel
should be assigned (handoff)
• Handoffs should be transparent to users, while their number should be kept to minimum
• A threshold in the received power (Pr, handoff) should be determined to trigger the
handoff process. This threshold value should be larger than the minimum acceptable
received power (Pr, acceptable)
m
• Define: Δ=Pr,handoff - Pr,acceptable
– If Δ is large then too many handoffs
co
– If Δ is small then insufficient time to complete a handoff
.
drop in the signal strength is not due to the momentary (temporary) bad channel
lvi
condition, but it is due to the fact that the mobile is moving away from BS.
tka
• Thus the BS needs to monitor the signal level for a certain period of time before
initiating a handoff. The length of the time (running average measurements of signal) and
handoff process depends on speed and moving pattern.
ar
• First generation systems typical time interval to make a handoff was 10 seconds (large
Δ). Second generations and after typical time interval to make a handoff is 1-2 seconds
Sm
(small Δ).
• First generation systems: handoff decision was made by BS by measuring the signal
strength in reverse channels.
73
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
Prioritizing Handoffs
co
• Guard Channels: Fraction of total bandwidth in a cell is reserved for exclusive use of
handoff calls. Therefore, total carried traffic is reduced if fixed channel assignment is
used. However, if dynamic channel assignment is used the guard channel mechanisms
may offer efficient spectrum utilization.
.
lvi
– Number of channels to be reserved: If it is low (under-reservation) the QoS on handoff
tka
call blocking probability can not be met. If reservation is high (over-reservation) may
result in waste of resources and rejection of large number of new calls.
– Static and Dynamic schemes: Advantage of static scheme is its simplicity since no
ar
Prioritizing Handoffs
• Queuing Handoffs: The objective is to decrease the probability of forced determination
of a call due to lack of available channels. When a handoff call (and in some schemes a
new call) can not be granted the required resources at the time of its arrival, the request is
put in a queue waiting for its admitting conditions to be met.
74
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
– This is achieved because there is a finite time interval between the time that the signal
of a call drops below the handoff threshold, and the time that the call is terminated due to
low (unacceptable) signal level. Queuing and size of buffer depends on traffic and QoS.
Queueing in wireless systems is possible because signaling is done on separate control
channels (without affecting the data transmission channels).
• According to the types of calls that are queued, queuing priority schemes are classified
as: handoff call queuing, new call queuing and handoff/new call queuing (handoff calls
m
are given non-preemptive priority over new calls).
co
Practical Issues (Capacity/Handoff)
• To increase capacity, use more cells (add extra sites).
• Using different antenna heights and powers, we can provide ―
large‖ and ―
small‖ cells
.
co-located at a signal location (it is used especially to handle high speed users and low
speed users simultaneously.
lvi
• Reuse partitioning (use of different reuse patterns)
tka
• Cell splitting: Change cell radius R and keep co-channel reuse ratio (D/R) unchanged. If
R‘=R/2 than the transmit power needs to be changed by (1/2)4 = 1/16.
• Another way is to keep cell radius R unchanged and decrease D/R ratio required (that is
decrease the number of cells in a cluster). To do this it is required to decrease interference
ar
Super audio tone (SAT): SAT is superimposed on the voice signal on both the forward and
reverse link and is barely audible to the user
• The particular frequency of the SAT denotes the particular base station location for a
given channel and is assigned by the MSC for each call.
75
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
5.4 Global System for Mobile Communications (GSM) Code division multiple access
(CDMA)
Global system for mobile communication (GSM) is a globally accepted standardfor
digital cellular communication. GSM is the name of a standardization groupestablished in 1982
to create a common European mobile telephone standardthat would formulate specifications for a
pan-European mobile cellular radiosystem operating at 900 MHz. It is estimated that many
countries outside ofEurope will join the GSM partnership.
m
Throughout the evolution of cellular telecommunications, various systems havebeen
developed without the benefit of standardized specifications. This presented many problems
co
directly related to compatibility, especially with the development of digital radio technology. The
GSM standard is intended to address these problems.
.
lvi
tka
ar
GSM SERVICES
• Telephone Services
Explanation
• Data Services
Explanation
• Supplementary Services
Explanation
76
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
GSM Features:
Explanation
GSM System Architecture:
• Base Station Subsystem (BSS)
• Network and Switching Subsystems (NSS)
• Operation Support Subsystem (OSS)
GSM interface:
• Abis interface
m
• A – interface
GSM channel Types:
co
• Traffic channels
• Control channels
Frame structure for GSM.
.
Different types of GSM services
• Telephone services
lvi
• Data services
tka
• Supplementary services
Signaling tone :
The signaling tone is a 10 kbps data base which signals call termination by the subscriber.
ar
It is a special end of call message consisting of alternating 1s and 0s which is sent on the RVC by
the subscriber unit for 200ms. The signaling tone alerts the base station that a subscriber has
Sm
Telephone services in GSM: Teleservices provides communication between two end user
applications according to a standard protocol. GSM mainly focuses on voice oriented tele
services. This service includes emergency calling and facsimile. GSM also supports video text
and tele text.
77
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
Handoff.
When a user/call moves to a new cell, then a new base station and new channel should be
assigned (handoff)
• Handoffs should be transparent to users, while their number should be kept to minimum
• A threshold in the received power (Pr, handoff) should be determined to trigger the
handoff process. This threshold value should be larger than the minimum acceptable
received power (Pr, acceptable)
• Define: Δ=Pr,handoff - Pr,acceptable
m
– If Δ is large then too many handoffs
– If Δ is small then insufficient time to complete a handoff.
co
Features of CDMA
• Frequency reuse
.
• Soft capacity
lvi
• Multipath fading
tka
• Data Rate
• Soft Handoff
• Self Jamming
• Flexibility.
ar
78
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
1) The satellite should be placed 37,786 kms (approximated to 36,000 kms) above the surface of
the earth.
2) These satellites must travel in the rotational speed of earth, and in the direction of motion of
earth, that is eastward.
3) The inclination of satellite with respect to earth must be 00.
m
1) Gravitational pull of sun and moon makes these satellites deviate from their orbit. Over the
period of time, they go through a drag. (Earth‟s gravitational force has no effect on these
co
satellites due to their distance from the surface of the Earth.)
2) These satellites experience the centrifugal force due to the rotation of Earth, making them
deviate from their orbit.
.
3) The non-circular shape of the earth leads to continuous adjustment of speed of satellite from
the earth station.
lvi
These satellites are used for TV and radio broadcast, weather forecast and also, these satellites
tka
are operating as backbones for the telephone networks.
Disadvantages of GEO:
Northern or southern regions of the Earth (poles) have more problems receiving
ar
these satellites due to the low elevation above a latitude of 60°, i.e., larger antennas are
needed in this case. Shading of the signals is seen in cities due to high buildings and the
Sm
low elevation further away from the equator limit transmission quality.
The transmit power needed is relatively high which causes problems for battery powered
devices. These satellites cannot be used for small mobile phones. The biggest problem for voice
and also data communication is the high latency as without having any handovers, the signal has
to at least travel 72,000 kms.
Due to the large footprint, either frequencies cannot be reused or the GEO satellite needs
special antennas focusing on a smaller footprint. Transferring a GEO into orbit is very expensive.
79
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
Omni-directional antennas using low transmit power in the range of 1W. The delay for packets
delivered via a LEO is relatively low (approx 10 ms).
co
The delay is comparable to long-distance wired connections (about 5–10 ms). Smaller
footprints of LEOs allow for better frequency reuse, similar to the concepts used for cellular
networks. LEOs can provide a much higher elevation in Polar Regions and so better global
coverage.
.
lvi
These satellites are mainly used in remote sensing an providing mobile communication
services (due to lower latency).
tka
Disadvantages:
The biggest problem of the LEO concept is the need for many satellites if global
coverage is to be reached. Several concepts involve 50–200 or even more satellites in orbit.
ar
The short time of visibility with a high elevation requires additional mechanisms for
Sm
The high number of satellites combined with the fast movements resulting in a high
complexity of the whole satellite system.
One general problem of LEOs is the short lifetime of about five to eight years due to
atmospheric drag and radiation from the inner Van Allen belt1. Assuming 48 satellites and a
lifetime of eight years, a new satellite would be needed every two months.
80
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
The low latency via a single LEO is only half of the story. Other factors are the need for
routing of data packets from satellite to if a user wants to communicate around the world.
Due to the large footprint, a GEO typically does not need this type of routing, as senders
and receivers are most likely in the same footprint.
m
MEOs can be positioned somewhere between LEOs and GEOs, both in terms of their
orbit and due to their advantages and disadvantages.
co
Using orbits around 10,000 km, the system only requires a dozen satellites which is more
than a GEO system, but much less than a LEO system. These satellites move more slowly
.
relative to the earth‟s rotation allowing a simpler system design (satellite periods are about six
hours).
lvi
tka
Depending on the inclination, a MEO can cover larger populations, so requiring fewer
handovers.
Again, due to the larger distance to the earth, delay increases to about 70 – 80 ms.
the satellites need higher transmit power and special antennas for smaller footprints
The three orbits of satellite. Low Earth orbit : Medium Earth orbit & Geosynchronous Earth
orbit
Visitor location register (VLR)—The VLR is a database that contains temporary
information about subscribers that is needed bythe MSC in order to service visiting subscribers.
The VLR is always integrated with the MSC. When a mobile station roams into a new MSC
81
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
area, the VLR connected to that MSC will request data about the mobile station from the HLR.
Later, if the mobile station makes a call, the VLR will have the information needed for call setup
without having to interrogate the HLR each time.
Mobile services switching center (MSC)—The MSC performs the telephony switching
functions of the system. It controls calls to and from other telephone and data systems. It also
performs such functions as toll ticketing, network interfacing, common channel signaling, and
others.
m
Home location register (HLR)—The HLR is a database used for storage and management of
co
subscriptions. The HLR is considered the most important database, as it stores permanent data
about subscribers, including a subscriber's service profile, location information, and activity
status. When an individual buys a subscription from one of the PCS operators, he or she is
registered in the HLR of that operator.
.
lvi
Kepler’s laws of planetary motion
tka
1. A satellite will orbit a primary body following an elliptical path
2. For equal intervals of time a satellite will sweep out equal areas in orbital plane
3. The square of the periodic time of orbit is proportional to the cube of the mean distance
between the primary and the satellite.
ar
i) Uplink
ii) Downlink iii) Crosslink
15. Define apogee
The point in an orbit that is located farthest from earth.
Satellites are specifically made for telecommunication purpose. They are used for mobile
applications such as communication to ships, vehicles, planes, hand-held terminals and for TV
82
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
and radio broadcasting They are responsible for providing these services to an assigned region
(area) on the earth. The power and bandwidth of these satellites depend upon the preferred size
of the footprint, complexity of the traffic control protocol schemes and the cost of ground
stations.
A satellite works most efficiently when the transmissions are focused with a desired area.
When the area is focused, then the emissions don‟t go outside that designated area and thus
minimizing the interference to the other systems. This leads more efficient spectrum usage.
m
Satellite‘s antenna patterns play an important role and must be designed to best cover the
co
designated geographical area (which is generally irregular in shape). Satellites should be
designed by keeping in mind its usability for short and long term effects throughout its life time.
.
The earth station should be in a position to control the satellite if it drifts from its orbit it
lvi
is subjected to any kind of drag from the external forces.
tka
Kepler’s laws:
Kepler’s first law
A satellite will orbit a primary body following an elliptical path
Kepler’s second law
ar
For equal intervals of time a satellite will sweep out equal areas in orbital plane
Kepler’s third law
Sm
The square of the periodic time of orbit is proportional to the cube of the mean
distance between the primary and the satellite
5.6 Bluetooth
Bluetooth is a standard developed by a group of electronics manufacturers that allows
any sort of electronic equipment from computers and cell phones to keyboards and headphones
to make its own connections, without wires, cables or any direct action from a user. Bluetooth is
intended to be a standard that works at two levels.
------
83
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
APPENDICES - 1
m
2. What are the needs for modulation. Nov/Dec 2014
co
In order to carry the low frequency message signal to a longer distance, the high frequency
carrier signal is combined with it.
a) Reduction in antenna height
.
b) Long distance communication c) Ease of radiation
d) Multiplexing
lvi
e) Improve the quality of reception f) Avoid mixing up of other signals
tka
Phase Modulation is defined as changing the phase of the carrier signal with respect to the
instantaneous change in message signal.
5. Define noise
Noise is an unwanted electrical signal which gets added tom a transmitted signal when it is
travelling towards the receiver
84
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
Amplitude Modulation is defined as changing the amplitude of the carrier signal with respect to
the instantaneous change in message signal.
co
9. State Carson’s rule.
Carson‘s rule states that the bandwidth required to transmit an angle modulated wave as twice
.
the sum of the peak frequency deviation and the highest modulating signal frequency.
lvi
Mathematically carson‘s rule is B=2( f +fm) Hz.
tka
10. Define modulation index
It is defined as ratio of amplitude of the message signal to the amplitude of the carrier signal.
m=Em/Ec.
ar
changed in proportion with the instantaneous value of modulating signal is called analog
communication system.
85
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
on by a modulating signal. M=(Em/Ec)*100
co
UNIT II DIGITAL COMMUNICATION
1. Define bit rate
Bit rate is defined as number of bits transmitted during one second between the transmitter and
receiver.
.
2. Define baud rate.
lvi
Baud rate is defined as the rate of change of signal on transmission medium after encoding and
tka
modulation have occurred.
3. Define bandwidth efficiency
Bandwidth efficiency is the ratio of the transmission bit rate to the minimum bandwidth required
for a particular modulation
ar
86
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
9. Define Minimum Shift Keying (MSK).
The minimum frequency space that allows the 2 fsk representing symbols 0s and 1s. Thus CP
co
(Continuous Phase) FSK signal with a deviation ratio if one half is defined as MSK.
.
QAM is a form of digital modulation similar to PSK except the digital information is contained
lvi
in both the amplitude and phase of the transmitted carrier.
11. Define Frequency Shift Keying (FSK).
tka
Frequency Shift Keying is defined as changing the amplitude of the carrier signal with respect to
the binary information or digital signal.
MSK baseband waveform are smoother compared with QPSK MSK signals have continuous
phase It does not have any amplitude variation
Sm
87
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
link.
3. What is meant by point to point communication?
co
Point to point communication is the link between two stations A and B ie)., information is
transferred between a main frame computer and a remote computer terminal.
4. What is meant by Forward Error Correction (FEC)?
.
FEC, a receiver can use an error correcting code, which automatically correct certain errors
without any retransmissions
lvi
In FEC, bits are added to the message before the transmission
tka
Purpose of FEC code is to reduce the wasted time of retransmission
5. What is meant by data communication
Data communication can be defined as two personal computers connected through a Public
Telecommunication Network (PTN)
ar
88
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
make it accommodate the information signal.
10. What are the different types of error detection techniques?
co
a. Redundancy b. Echoplex
c. Exact count encoding d. Parity
e. Check sum
f. Vertical Redundancy Check
.
lvi
g. Horizontal Redundancy Check h. Cyclic Redundancy Check
11. Define Pulse width modulation
tka
In PWM system, the message signals are used to vary the duration of carrier pulse. The message
signal may vary either the trailing edge or leading edge or both of the carrier pulses n order to
accommodate the intelligence of information system.
12. Define sampling rate
ar
The sampling rate fs must be atleast two times the highest frequency component of the original
signal to be accurately represented fs>=2fm
Sm
89
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
PART - A
m
symbol
co
2. Define channel capacity [Nov/Dec-2010, 2011, May/June-2011]
Channel capacity is defined as the maximum of the mutual information that may be transmitted
through the channel
.
lvi
3. Define entropy Nov/Dec-2006, 2010, 2014, May/June- 2004, 2007, 2011, 2013]
tka
The entropy of a source is a measure of the average amount of information per source symbol in
a long message.
A block code of length n and 2k code words is calleda linear (n, k) code if and only if its 2k code
words form a k-dimensional subspace of the vector space of all the n-tuples over the field GF(2).
Sm
90
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
To improve the transmission quality.
co
10. What are the advantages of Shannon fano coding [Nov/Dec- 2012]
Reduced bandwidth
Reduced noise
It can be used for error detection and correction.
.
lvi
11. Define channel coding theorem
tka
Channel coding theorem is applied for discrete memory less additive white gaussian noise
channels
91
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
1. Define GSM.
Global system for mobile communication (GSM) is a globally accepted standard for digital
cellular communication. GSM is the name of a standardization group established in 1982 to
create a common European mobile telephone standard that would formulate specifications for a
pan-European mobile cellular radio system operating at 900 MHz. It is estimated that many
countries outside of Europe will join the GSM partnership.
m
2. Define Subscriber Identity Module (SIM).
co
It is a memory device that stores information such as the subscribers identification number, the
networks and countries where the subscriber is entitled to service, privacy tax and other user
specific information A subscriber uses the SIM with a four digit personal ID number to activate
service from GSM phone.
.
lvi
3. What is meant by super audio tone (SAT)?
tka
• SAT is superimposed on the voice signal on both the forward and reverse link and is barely
audible to the user
• The particular frequency of the SAT denotes the particular base station location for a given
channel and is assigned by the MSC for each call.
ar
The signaling tone is a 10 kbps data base which signals call termination by the subscriber. It is a
special end of call message consisting of alternating 1s and 0s which is sent on the RVC by the
subscriber unit for 200ms. The signaling tone alerts the base station that a subscriber has ended
the call.
92
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
reuse pattern with provisions for sectoring and cell splitting to increase channel when needed.
AMPS uses frequency modulation and frequency division duplex for radio transmission.
co
8. What are the three orbits of satellite? Low Earth orbit
Medium Earth orbit & Geosynchronous Earth orbit
.
9. Define VLR.
lvi
Visitor location register (VLR)—The VLR is a database that contains temporary information
tka
about subscribers that is needed bythe MSC in order to service visiting subscribers. The VLR is
always integrated with the MSC. When a mobile station roams into a new MSC area, the VLR
connected to that MSC will request data about the mobile station from the HLR. Later, if the
mobile station makes a call, the VLR will have the information needed for call setup without
ar
Mobile services switching center (MSC)—The MSC performs the telephony switching
functions of the system. It controls calls to and from other telephone and data systems. It also
performs such functions as toll ticketing, network interfacing, common channel signaling, and
others.
11. What is Bluetooth?
Bluetooth is a standard developed by a group of electronics manufacturers that allows any sort of
electronic equipment from computers and cell phones to keyboards and headphones to make its
own connections, without wires, cables or any direct action from a user. Bluetooth is intended to
be a standard that works at two levels.
93
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
13. State Kepler’s laws of planetary motion
1. A satellite will orbit a primary body following an elliptical path
co
2. For equal intervals of time a satellite will sweep out equal areas in orbital plane
3. The square of the periodic time of orbit is proportional to the cube of the mean distance
between the primary and the satellite.
14. What are the links in satellite communication?
.
i) Uplink
lvi
ii) Downlink iii) Crosslink
tka
15. Define apogee
The point in an orbit that is located farthest from earth.
15. Define perigee
The point in an orbit that is located closest to earth .
ar
assigned (handoff)
• Handoffs should be transparent to users, while their number should be kept to minimum
• A threshold in the received power (Pr, handoff) should be determined to trigger the handoff
process. This threshold value should be larger than the minimum acceptable received power (Pr,
acceptable)
• Define: Δ=Pr,handoff - Pr,acceptable
– If Δ is large then too many handoffs
– If Δ is small then insufficient time to complete a handoff.
94
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
APPENDICES - B
QUESTION BANK
UNIT -1
PART- A (2 MARKS)
m
3. A transmitter radiates 9 kW without modulation and 10.125 kW after modulation. Determine
depth of modulation. (nov/dec 2009)
co
4. Define the transmission efficiency of AM signal. (april/may 2009)
5. Draw the phasor diagram of AM signal. (nov/dec 2011)
6. What are the disadvantages of DSB-FC modulation. (nov/dec 2009)
.
7. Distinguish between low level and high level modulator. (nov/dec 2009)
lvi
8. List out the application of AM. (april/may 2009).
9. Define bandwidth efficiency (nov/dec 2012)
10. Distinguish between FM and PM (nov/dec 2012)
tka
11. What is the bandwidth need to transmit 4kHz voice signal using AM? (nov/dec 2012)
12. Define modulation and modulation index (may/jun 2012)
13. What is the purpose of limiter in FM receiver? (may/jun 2012)
ar
14. Draw the frequency spectrum and mention the bandwidth of Am signal (nov/dec 2011)
15. In an AM transmitter, the carrier power id 10kW and the modulation index is 0.5. Calculate
the total RF power delivered (nov/dec 2011).
Sm
1. What is the principle of Amplitude modulation? Derive expression for the AM wave and
draw its spectrum. (nov/dec 2009, nov/dec 2010)
2. Describe the frequency analysis of Angle modulated waves. Explain their
95
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
7. Derive for carrier power and transmitter power in terms of modulation index? (nov/dec 2012)
8. Explain the function of every block of superhetrodyne receiver? (nov/dec 2012)
co
9. Draw the block diagram and explain the function and working of DSBSC system. (may/june
2012)
10. Obtain a relationship between carrier and side band powers in an AM DSBFC wave and
.
explain how power distribution takes place in AM DSB FC system. (apr/may 2012)
lvi
11.Define modulation index for FM and PM and obtain the relation between modulation index
and modulating signal for FM and PM (apr/may 2012).
tka
12. Compare the advantages and disadvantages of angle modulation with
amplitude modulation (nov/dec 2010).
13. Distinguish between FM and PM by giving its mathematical analysis. (nov/dec 2010)
14. Derive the relationship between the voltage amplitudes of the side band
ar
Calculate
96
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
UNIT – II
PART – A (2 MARKS)
1. Differentiate coherent and non coherent digital modulation methods (nov/dec 2009)
2. Compare bandwidth of m-ary PSK signal and m-ary FSK signal.
4. Sketch the waveform of ASK and PSK for binary sequence 1100101(nov/dec 2011, apr/may
2010).
5. Differentiate QPSK and BPSK. (april/may 2010).
6. Differentiate ASK and FSK (april/may 2011)
m
7. Define minimum Shift keying.
8. Define Duo binary encoding
co
9.Define DPSK (nov/dec 2007).
11 What are the advantages of QPSK? (nov/dec 2011)
13 Define information capacity and bit rate (nov/dec 2010) .
.
15. What is the relation between bit rate and baud for a FSK system?
lvi
16. What are the advantages of digital transmission?
17. Define ASK, PSK and FSK.
tka
19. Why is ASK called as ON-OFF keying? (nov/dec 2006)
20. What are the differences between QASK and QPSK?
21. Draw the block diagram of a BPSK transmitter? (nov/dec 2012)
22. Draw 8-QAM phasor diagram. (apr/may 2012)
ar
23. Determine the peak frequency deviation and minimum bandwidth for binary FSK signal with
mark frequency of 49 kHz, a space frequency of 51 kKz (apr/may 2012)
Sm
24. What is the relation between bit rate and baud for a FSK system (nov/dec 2010)
25. Draw the block diagram of a BFSK transmitter. (nov/dec 2012)
26. What are the advantages of QPSK? (apr/may 2010)
1. Draw FSK Transmitter and explain. Describe its Bandwidth Considerations.( nov/dec 2011)
97
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
2. For a BPSK modulator with a Carrier frequency of 70 MHz and an input bit rate of 10 Mbps,
determine the maximum and minimum upper and lower side frequencies, draw the output
spectrum, determine the minimum Nyquist bandwidth, and calculate the baud
(Assume f= 5MHz) (nov/dec 2011)
3. Draw and explain the operations of Non-coherent and coherent FSK
modulators. (nov/dec 2009)
4.Draw QPSK modulator and explain. Describe its Bandwidth considerations. (nov/dec 2009)
5. What is carrier recovery? Discuss how carrier recovery is achieved by the
m
squaring loop and Costas loop circuits. ((nov/dec 2011, nov/dec 2010, apr/may 2010)
6. Draw the block diagram of FSK receiver and explain the operation. Determine the : (i) peak
co
frequency deviation (ii) minimum bandwidth (iii) baud for FSK signal with a mark frequency of
49 kHz, space frequency of 51 kHz, and input bit rate of 2 kbps. (april/may 2009).
7. Illustrate the concept of 8 QAM transmitter with the truth table (apr/may 2010).
.
8. Explain BPSK transmitter and receiver with block diagram and derive an expression for its
lvi
probability of error. (nov/dec 2012) (april/may 2011)
9. Describe the working of QPSK transmitter and receiver. Determine its bandwidth efficiency
tka
and compare it with other m-ary PSK schemes. (nov/dec 2012, apr/may 2012, nov/dec 2010)
10. Explain the generation and detection of PSK system? (may/june 2012, apr/may 2012)
ar
UNIT III
Sm
PART – A (2 MARKS)
1. State sampling theorem. (NOV/DEC 2011, NOV/DEC 2012)
2. Define PAM. NOV/DEC 2009
3. Construct NRZ and RZ format for 011010.
4. Define adaptive equalization.
5. Define ISI. NOV/DEC 2011
6. Define Nyquist Criteria.
7. What is the interpretation obtained from eye pattern?
8. Define Nyquist sampling theorem.
98
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
16. What is meant by fading? (Nov/dec 2012)
co
PART –B (16 MARKS)
1. State and prove Sampling theorem. Mention and explain types of sampling and
sampling circuit. V/DEC 2010,2011)
.
2. What is eye pattern? What are the interpretations obtained from it? (May/june
2013)
lvi
3. Describe in detail the PCM technique with focus on its sampling rate, and signal to
tka
quantization Noise ratio. (Apr/may 2011, nov/dec 2011)
4. What is ISI? Explain the applications of eye pattern to detect ISI. (nov/dec 2012,
apr/may 2010, may/june 2013, apr/may 2011)
5. With a block diagram, explain the adaptive Delta Modulation technique.
ar
(Apr/may2011,nov/dec 2011)
6. What is DPCM? Explain its principle with neat block diagram. (APRIL/MAY 2011).
Sm
7. Explain the elements of PCM transmitter and receiver with a neat block diagram.
(May/june 2013) (nov/dec 2010, 2011, 2012)
8. What is companding? Explain analog and digital companding with neat diagram.
(nov/dec 2009, apr/may 2010, june 2011)(May/june 2011)
9. Find the signal amplitude for minimum quantization error in a delta modulation
system if step size is 1 volt having repetition period 1 ms. The information signal
operates at 100 Hz.
99
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
10. Draw the block diagram and describe the operation of a delta modulator and
demodulator. What are its advantages and disadvantages compared to a PCM system?
(may/june 2010, 2012, Nov/dec 2010)
UNIT IV
PART – A (2 MARKS)
1.What do you meant by data communication codes?
2.What are the other names for data communications codes?
3.what is ASCII code? NOV/DEC 2011
m
4.Name the classification of errors. NOV/DEC 2009
5. Define error correction
co
7. Define error detection. NOV/DEC 2010
8. Error correction methods
9.Mention the advantage of of parallel interface
10.Define modem NOV/DEC 2011
.
11.Give the disadvantage of synchronous modem
lvi
12.Define modem equalizers. NOV/DEC 2009
tka
13.Name the modem standard.
14. List the standard organizations for data communications. NOV/DEC 2011
15. Mention any two error control codes? (Nov/dec 2012)
16. Draw the null modem circuit? (Nov/dec 2012)
ar
100
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
communication. (Apr/May 2011) (Nov/Dec 2012)
14. Differentiate low speed, medium speed and high speed modem. (apr/may 2011, nov/dec
co
2011)
15. Explain with block diagram how analog signal is transmitted through digital transmission
link using digital modulation technique. (Nov/Dec 2012)
.
16. Explain source-coding theorem. Consider five messages s0 to s4 with probabilities 1/2,
lvi
1/4, 1/8, 1/16 and 1/16. Use Shanon-Fano algorithm to develop an efficient code.
(May/June 2012)
tka
UNIT V
PART – A (2 MARKS)
1. Define pseudo noise sequence.
ar
101
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
14. What is the principle of frequency hopping spread spectrum? NOV/DEC 2011
15. A spread spectrum communication system has the following parameters; information bit
duration Tb = 4.095 ms, PN chip duration Tc = 1 ms. Determine Processing Gain.
16. What is meant by slow frequency hopping and fast-frequency hopping?
17. What is frequency hopping?
18. What is meant by an orthogonal code?
19. Define Pseudonoise sequence? NOV/DEC 2006
20. What are the different types of multiple access techniques?
m
21. What is the significance of PN sequence? Give an example to PN sequence?
(May/June 2012)
co
22. What are the types of FH spread spectrum technique?
23. Mention the properties of PN sequence? (Nov/Dec 2012)
24. Define processing gain and jamming margin? (May/June 2012)
.
PART –B (16 MARKS)
lvi
1. Explain in detail the transmitter and receiver of DS SS technique with BPSK. (May/june
2010,2013, NOV/DEC 2009, 2010, 2011, 2012)
tka
2. Explain in detail the transmitter and receiver of FH SS technique (NOV/DEC
2009,2010,2011,2012, may/june 2012)
3. Explain in detail the characteristics, properties and generation of PN sequence (NOV/DEC
2010,2011, may/june 2010)
ar
4. Explain the two common multiple access technique for wireless communication. (NOV/DEC
2011)
Sm
5. Differentiate direct sequence and frequency hop spread spectrum technique NOV/DEC 2011
6. Explain the operation of TDMA and CDMA techniques. (May/june 2010,2011,2013.
Nov/dec 2010)
7. Give a detail account of the different types of multiple access techniques. (10) (NOV/DEC
2011)
8. Explain the source coding of speech for wireless communications. NOV/DEC 2011
NOV/DEC 2012)
9. Define slow frequency hopping and fast frequency hopping? Nov/Dec 2012.
102
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
APPENDICES – C
UNIVERSITY QUESTIONS
m
. co
lvi
tka
ar
Sm
103
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
104
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
105
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
106
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
107
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
108
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
109
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
110
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
111
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
112
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
113
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
114
Downloaded From www.smartkalvi.com | All Study materials available
CS6304 ANALOG AND DIGITAL COMMUNICATION
m
. co
lvi
tka
ar
Sm
115
Downloaded From www.smartkalvi.com | All Study materials available