0% found this document useful (0 votes)
34 views

Cse3086 Itc Notes 30 Oct

Uploaded by

Karthik Gowda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

Cse3086 Itc Notes 30 Oct

Uploaded by

Karthik Gowda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

CSE3086 - Information Theory and Coding

COURSE CONTENT (SYLLABUS):

Module 1: Information Theory [11 Sessions] [Blooms ‘level: Understand]


Introduction, Measure of information, Average information content (entropy) of symbols in long independent sequences,
Information rate, Properties of entropy, Extension of discrete memory less (zero- memory) sources, Average information
content (entropy) of symbols in long dependent sequences, Mark off statistical model for information source, Entropy and
information rate of Mark off sources.
Module 2: Source Coding [12 Sessions] [Blooms ‘level: Apply]
Properties of codes- Block codes, on-singular codes, Uniquely decodable codes. Instantaneous codes and Optimal codes,
Prefix of a code, Test for instantaneous property, Construction of Instantaneous code, Decision tree, Kraft’s inequality,
Source coding theorem (Shannon’s Noiseless coding theorem), Shannon’s encoding algorithm, Shannon Fano Algorithm,
Huffman minimum redundancy code (binary, ternary and quaternary), Code efficiency and redundancy, Extended Huffman
Coding, Arithmetic Codes, Lempel – Ziv Algorithm.
Module 3: Channels and Mutual Information [12 Sessions] [Blooms ‘level: Apply]
Introduction, Discrete communication channels, Representation of a channel, Probability relations- Apriori, Posteriori
entropy, Equivocation, Mutual information, Properties, Rate of information transmission over a discrete channel, Capacity of
a discrete memoryless channel, Shannon’s theorem on channel capacity (Shannon’s second theorem), Special channels-
Symmetric, Binary symmetric, Binary erasure, Noiseless, Deterministic and cascaded channels, Estimation of channel
capacity by Muroga’s method, Continuous channels, Shannon-Hartley theorem and its implications, Shannon’s limit, Rate
Distortion Theory.
Module 4: Linear Block Codes [10 Sessions] [Blooms ‘level: Apply]
Introduction to Fields and Vector Spaces, Types of errors, Examples, Methods of controlling errors, Types of
codes, Linear Block Codes- Matrix description, Encoding circuit, Syndrome and error detection, Syndrome circuit,
hamming weight, hamming distance, Minimum distance of a block code error detection and correction capabilities
of a linear block code, Single error-correcting Hamming codes, Table lookup decoding using standard array,
General decoder for a linear block code. Binary cyclic codes: Algebraic structures of cyclic codes, Encoding using
(n-k) bit shift register, Syndrome calculation.

Page 1
INDEX SHEET
Sl
No. Unit & Topic of Discussion PAGENO.

1 Introduction 5
2 Measure of information 5
Average information content of symbols in long independent 8
3 Sequences
Average information content of symbols in long dependent 9
4 Sequences
5 Mark-off statistical model for information source, 11
6 Entropy and information rate of mark-off source. 19
7 Review questions 27
SOURCE CODING 29
8
9 Encoding of the source output 30
10 Shannon‟s encoding algorithm 31
11 Communication Channels 44
12 Discrete communication channels 45
13 Review questions 73
14 FUNDAMENTAL LIMITS ON PERFORMANCE 74
15 Source coding theorem 75
16 Huffman coding 75
17 Discrete memory less Channels 81
18 Mutual information 88
19 Channel Capacity 90
20 Review questions 110
21 Continuous Channel 112
Differential entropy and mutual information for continuous 119
22 Ensembles
23 Channel capacity Theorem 121
24 Review questions 129
25 INTRODUCTION TO ERROR CONTROL CODING 130
26 Introduction 131
27 Types of errors 133
28 Types of codes 133
29 Linear Block Codes: Matrix description. 136
30 Error detection and correction 146
31 Standard arrays and table look up for decoding 149

Page 2
32 Hamming codes 153
33 Review questions 155
34 Binary Cyclic Codes 157
35 Algebraic structures of cyclic codes 167
36 Encoding using an (n-k) bit shift register, 171
37 Syndrome calculation. 178
38 BCH codes 181
39 Review questions 182
40 Introduction 184
41 Golay codes and Shortened cyclic codes 188
42 R S codes 189
43 Burst error correcting codes 189
44 Burst and Random Error correcting codes 191
45 Review questions 196
46 Convolution Codes 198
47 Time domain approach 200
48 Transform domain approach. 206
49 Review questions 216

Page 3
Information Theory and Coding

PART A
Unit – 1: Information Theory

Syllabus:
Introduction, Measure of information, Average information content of symbols in long
independent sequences, Average information content of symbols in long dependent
sequences. Mark-off statistical model for information source, Entropy and information rate of
mark-off source. 6 Hours

Text Books:
• Digital and analog communication systems, K. Sam Shanmugam, John Wiley,
1996.

Reference Books:
• Digital Communications - Glover and Grant; Pearson Ed. 2nd Ed 2008

Page 4
Unit – 1: Information Theory
1.1 Introduction:
• Communication
Communication involves explicitly the transmission of information from one point to another,
through a succession of processes.
• Basic elements to every communication system
o Transmitter
o Channel and
o Receiver
Communication System

Source User
of Transmitter CHANNEL Receiver of
information information

Message Transmitted Received Estimateof


signal Signal signal message signal

• Information sources are classified as:

INFORMATION
SOURCE

ANALOG DISCRETE

• Source definition
Analog : Emit a continuous – amplitude, continuous – time electrical wave
from. Discrete : Emit a sequence of letters of symbols.
The output of a discrete information source is a string or sequence of symbols.
1.2 Measure the information:
To measure the information content of a message quantitatively, we are required to arrive at
an intuitive concept of the amount of information.
Consider the following examples:
A trip to Mercara (Coorg) in the winter time during evening hours,
1. It is a cold day
2. It is a cloudy day
3. Possible snow flurries

Page 5
Amount of information received is obviously different for these messages.
o Message (1) Contains very little information since the weather in coorg is „cold‟ for most
part of the time during winter season.
o The forecast of „cloudy day‟ contains more informat ion, since it is not an event that
occurs often.
o In contrast, the forecast of „snow flurries‟ convey s even more information, since the
occurrence of snow in coorg is a rare event.
On an intuitive basis, then with a knowledge of the occurrence of an event, what can be said
about the amount of information conveyed?
It is related to the probability of occurrence of the event.
What do you conclude from the above example with regard to quantity of information?
Message associated with an event „least likely to occur‟ contains most information. The
information content of a message can be expressed quantitatively as follows:
The above concepts can now be formed interns of probabilities as follows:
Say that, an information source emits one of „q‟ po ssible messages m1, m2 …… m q with p1, p2 ……
pq as their probs. of occurrence.
th
Based on the above intusion, the information content of the k message, can be written as

I (mk) a 1
pk
Also to satisfy the intuitive concept, of information.
I (mk) must zero as pk 1
Therefore,

I (mk) > I (mj); if pk < pj


O (mj); if pk 1 -------------- I
I (mk) ≥ O; when O < pk < 1

Another requirement is that when two independent messages are received, the total
information content is –
Sum of the information conveyed by each of the messages.

Thus, we have
I (mk & mq) I (mk & mq) = Imk + Imq ------ I
\ We can define a measure of information as –

1
------ III
p

Page 6
Unit of information measure
Base of the logarithm will determine the unit assigned to the information content.
Natural logarithm base : „nat‟
Base - 10 : Hartley / decit
Base - 2 : bit
Use of binary digit as the unit of information?
Is based on the fact that if two possible binary digits occur with equal proby (p1 = p2 =
½) then the correct identification of the binary digit conveys an amount of information.
I (m1) = I (m2) = – log 2 (½ ) = 1 bit
\ One bit is the amount if information that we gain when one of two possible and equally
likely events occurs.
Illustrative Example
A source puts out one of five possible messages during each message interval. The probs. of
these messages are p1 = 1 ; p2 = 1 ; p1 = 1 : p1 = 1 , p5 1
2 4 4 16 16
What is the information content of these messages?
1
I (m1) = - log2 = 1 bit
2
1
I (m2) = - log2 = 2 bits
4
1
I (m3) = - log = 3 bits
8
1
I (m4) = - log2 = 4 bits
16
1
I (m5) = - log2 = 4 bits
16

HW: Calculate I for the above messages in nats and Hartley

Page 7
Digital Communication System:
Estimate of the
Source of Message signal Message signal User of

Source Source
Receiver
Transmitter Encoder decoder
Source
code word source codeword
Channel
decoder
Channel of
code word channel codeword

Modulator Demodulator

Received
Channel signal

Entropy and rate of Information of an Information Source /


Model of a Mark off Source

1.3 Average Information Content of Symbols in Long Independence Sequences


Suppose that a source is emitting one of M possible symbols s0, s1 ….. s M in a statically
independent sequence
Let p1, p2, …….. p M be the problems of occurrence of the M-symbols resply. suppose further
that during a long period of transmission a sequence of N symbols have been generated.

On an average – s 1 will occur NP1 times


S2 will occur NP2 times
: :
si will occur NPi times
1
The information content of the i th symbol is I (si) = log
p bits
i
\ PiN occurrences of si contributes an information content of
1
i ii
p
i
bitsPN.I(s)=PN.log
\ Total information content of the message is = Sum of the contribution due to each of

Page 8
M symbols of the source alphabet
M 1
bits
pi
i.e., Itotal = ∑NP1 log

i =1
I
\ Averageinforamtion content total M 1 bits per
H= ---- IV
= ∑ N P 1 lo g

p
per symbol in given by N i =1 i symbol
This is equation used by Shannon
Average information content per symbol is also called the source entropy.

1.4 The average information associated with an extremely unlikely message, with an extremely
likely message and the dependence of H on the probabilities of messages
consider the situation where you have just two messages of probs. „p‟ and „(1-p)‟.
1 1
Average information per message is H = p log + (1 - p) log
p 1-p
At p = O, H = O and at p = 1, H = O again,
The maximum value of „H‟ can be easily obtained as,
H = ½ log 2 + ½ log 2 = log 2 = 1
max 2 2 2

\ Hmax = 1 bit / message


Plot and H can be shown below
H

The above observation can be generalized for a source with an alphabet of M symbols.

Entropy will attain its maximum value, when the symbol probabilities are equal,

i.e., when p1 = p2 = p3 = …………………. = p M=


1
M
\ Hmax = log2 M bits / symbol

1
Hmax = ∑p M log
pM

Hmax = ∑p M log
1
1
M

Page 9
1
\ Hmax = ∑ M log 2 M = log 2 M

• Information rate
If the source is emitting symbols at a fixed rate of „‟r s‟ symbols / sec, the average source
information rate „R‟ is defined as –
R = rs . H bits / sec

• Illustrative Examples
1. Consider a discrete memoryless source with a source alphabet A = { so, s1, s2} with
respective probs. p0 = ¼, p1 = ¼, p2 = ½. Find the entropy of the source.
Solution: By definition, the entropy of a source is given by
M
1
H = ∑ pi log bits/ symbol
i =1 pi

H for this example is


2
1
H (A) = ∑ pi log
i=0 pi
Substituting the values given, we get
1 + P 1 + p log 1
H (A) = po log 1 log 2
Po p1 p2
= ¼ log2 4 + ¼ log2 4 + ½ log2 2
3
= = 1.5 bits
2
if rs = 1 per sec, then
H′ (A) = rs H (A) = 1.5 bits/sec
2. An analog signal is band limited to B Hz, sampled at the Nyquist rate, and the samples are
quantized into 4-levels. The quantization levels Q1, Q2, Q3, and Q4 (messages) are assumed
independent and occur with probs.

P1 = P2 = 1 and P2 = P3 = 3 . Find the information rate of the source.


8 8

Solution: By definition, the average information H is given by

H = p log 1 +p log 1 + p log 1 + p log 1


1 2 3
p1 p2 p3 4
p4
Substituting the values given, we get

Page 10
H = 1 log 8 + 3 log 8 + 3 log 8 +1 log 8
8 8 3 8 3 8
= 1.8 bits/ message.

Information rate of the source by definition is


R = rs H
R = 2B, (1.8) = (3.6 B) bits/sec

3. Compute the values of H and R, if in the above example, the quantities levels are so chosen
that they are equally likely to occur,
Solution:
Average information per message is
H = 4 (¼ log 4) = 2 bits/message
2

and R = rs H = 2B (2) = (4B) bits/sec

1.5 Mark off Model for Information Sources


Assumption
A source puts out symbols belonging to a finite alphabet according to certain probabilities
depending on preceding symbols as well as the particular symbol in question.

• Define a random process

A statistical model of a system that produces a sequence of symbols stated above is and which
is governed by a set of probs. is known as a random process.

Therefore, we may consider a discrete source as a random process

And the converse is also true.

i.e. A random process that produces a discrete sequence of symbols chosen from a finite set
may be considered as a discrete source.

• Discrete stationary Mark off process?

Provides a statistical model for the symbol sequences emitted by a discrete source.

General description of the model can be given as below:

1. At the beginning of each symbol interval, the source will be in the one of „n‟ possible states 1, 2,
….. n

Where „n‟ is defined as

Page 11
m
n ≤ (M)

M = no of symbol / letters in the alphabet of a discrete stationery source,

m = source is emitting a symbol sequence with a residual influence lasting

„m‟ symbols.

i.e. m: represents the order of the source.


nd
m = 2 means a 2 order source

m = 1 means a first order source.

The source changes state once during each symbol interval from say i to j. The probabilityy of
this transition is Pij. Pij depends only on the initial state i and the final state j but does not depend on
the states during any of the preceeding symbol intervals.

2. When the source changes state from i to j it emits a symbol.

Symbol emitted depends on the initial state i and the transition ij.

3. Let s1, s2, ….. s M be the symbols of the alphabet, and let x1, x2, x3, …… x k,…… be a sequence of
th
random variables, where xk represents the k symbol in a sequence emitted by the source.
th
Then, the probability that the k symbol emitted is sq will depend on the previous
symbols x1, x2, x3, …………, x k–1 emitted by the source.

i.e., P (Xk = sq / x1, x2, ……, x k–1 )

4. The residual influence of


th
x1, x2, ……, x k–1 on xk is represented by the state of the system at the beginning of the k symbol
interval.

i.e. P (xk =s q / x1, x2,……, x k–1 ) = P (xk = sq / Sk)

When Sk in a discrete random variable representing the state of the system at the beginning of the
th
k interval.

Term „states‟ is used to remember past history or residual influence in the same context as the use
of state variables in system theory / states in sequential logic circuits.
System Analysis with regard to Markoff sources
Representation of Discrete Stationary Markoff sources:

o Are represented in a graph form with the nodes in the graph to represent states and the
transition between states by a directed line from the initial to the final state.

Page 12
o Transition probs. and the symbols emitted corresponding to the transition will be shown
marked along the lines of the graph.
A typical example for such a source is given below.
½
1
C P1(1) = /3
1
P2(1) = /3
1
P3(1) = /3
¼
C ¼
C
A B
¼ ¼

¼
B 3
1 B ½

½ A A
¼

o It is an example of a source emitting one of three symbols A, B, and C


o The probability of occurrence of a symbol depends on the particular symbol in question and
the symbol immediately proceeding it.
o Residual or past influence lasts only for a duration of one symbol.
Last symbol emitted by this source
o The last symbol emitted by the source can be A or B or C. Hence past history can be
represented by three states- one for each of the three symbols of the alphabet.
• Nodes of the source
o Suppose that the system is in state (1) and the last symbol emitted by the source was A.
o The source now emits symbol (A) with probability ½and returns to state (1).
OR
o The source emits letter (B) with probability ¼ andgoes to state (3)
OR
o The source emits symbol (C) with probability ¼ andgoes to state (2).

To state 2
A 1 C ¼ To state 3
½ B
State transition and symbol generation can also be illustrated using a tree diagram.

Tree diagram
• Tree diagram is a planar graph where the nodes correspond to states and branches
correspond to transitions. Transitions between states occur once every Ts seconds.
Along the branches of the tree, the transition probabilities and symbols emitted will be
indicated.Tree diagram for the source considered

Page 13
Symbol
probs. Symbols Symbol
A 1 AA
emitted ½ sequence
¼ C 2 AC
1
A ¼ B
3 AB
1 ½ A 1 CA
/3 1 C
¼ C
2 2 CC
B
3 CB
¼ A 1 BA
B C
3 2 BC
B
3 BB

1
1 C 2 AC
B
3 AB
¼
1 1 CA
/3 C C
½ 2 2 CC
B
3 CB
¼
1 BA
B
3 2 BC
B
3 BB

1 AA
1 2 AC
B
¼ 3 AB
1 CA
1
/3 2 CC
B
Initial 3 CB
state ½
1 BA
3 2 BC
B
3 BB
State at the end of the State at the end of the
first symbol internal second symbol internal

Page 14
Use of the tree diagram
Tree diagram can be used to obtain the probabilities of generating various symbol sequences.

Generation a symbol sequence say AB


This can be generated by any one of the following transitions:

1 2 3

OR

2 1 3

OR

3 1 3

Therefore proby of the source emitting the two – s ymbol sequence AB is given by

P(AB) = P ( S1 = 1, S2 = 1, S3 =3)
Or
P ( S1 = 2, S2 = 1, S3 = 3 ) ---------- (1)
Or
P ( S1 = 3, S2 = 1, S3 = 3 )

Note that the three transition paths are disjoint.

Therefore P (AB) = P ( S1 = 1, S2 = 1, S3 = 3 ) + P ( S1 = 2, S2 = 1, S3 = 3 )
+ P ( S1 = 2, S2 = 1, S3 = 3 ) ------------- (2)

The first term on the RHS of the equation (2) can be written as
P ( S1 = 2, S2 = 1, S3 = 3 )
= P ( S1 = 1) P (S2 = 1 / S1 = 1) P (S3 = 3 / S1 = 1, S2 = 1)
= P ( S1 = 1) P (S2 = 1 / S1= 1) P (S3 = 3 / S2 = 1)

Page 15
Recall the Markoff property.
Transition probability to S3 depends on S2 but not on how the system got to S2.

1
Therefore, P (S1 = 1, S2 = 1, S3 = 3 ) = /3 x ½ x ¼

Similarly other terms on the RHS of equation (2) can be evaluated.

1 1 1 4 1
Therefore P (AB) = /3 x ½ x ¼ + /3 x ¼ x ¼ + /3 x ¼ x ¼ = =
48 12

Similarly the probs of occurrence of other symbol sequences can be computed.


Therefore,
In general the probability of the source emitting a particular symbol sequence can be
computed by summing the product of probabilities in the tree diagram along all the paths that yield
the particular sequences of interest.

Illustrative Example:
1. For the information source given draw the tree diagram and find the probs. of messages of lengths
1, 2 and 3.
¼
C
A 1 C 2 B3 /4
3
/ ¼
p1 = ½ P2 = ½

Source given emits one of 3 symbols A, B and C

Tree diagram for the source outputs can be easily drawn as shown.

Page 16
AAA
AAC
ACC
3
/4 ACB
½ 1
CCA
¼ C CCC
CBC
3
B /4 CBB
CAA
CAC
CCC
3
/4 CCB
½ 2
BCA
¾ C BCC
BBC
3
/4 BBB

Messages of length (1) and their probs


3
A ½x¾= /
3
B ½x¾ = /
1+1
C½x¼+½x¼==¼88

Message of length (2)


How may such messages are there?
Seven
Which are they?
AA, AC, CB, CC, BB, BC & CA
What are their probabilities?
9
Message AA : ½ x ¾ x ¾ =
32
Message AC: ½ x ¾ x ¼ = 3 and so on.
32

Tabulate the various probabilities

Page 17
Information Theory and Coding

Messages of Length (1) Messages of Length (2) Messages of Length (3)


3 9 27
A AA AAA
8 32 128
3 3 9
B AC AAC
8 32 128
1 3 3
C CB ACC
4 32 128
2 9
CC ACB
32 128
9 27
BB BBB
32 128
3 9
BC BBC
32 128
3 3
CA BCC
32 128
9
BCA
128
3
CCA
128
3
CCB
128
2
CCC
128
3
CBC
128
3
CAC
128
9
CBB
128
9
CAA
128

Page 18
• A second order Markoff source
Model shown is an example of a source where the probability of occurrence of a symbol
depends not only on the particular symbol in question, but also on the two symbols proceeding it.
2
P1 (1)
/8 1/
18
2 7
3
(AA) / (AA) P2 (1)
18
B 3 7/ 8 7
/4 P3 (1)
(BB) 18
1 2
(AB) 4 1 3 /8 P4 (1)
B 18
m
No. of states: n ≤ (M) ;
2
4≤M
\M=2

m = No. of symbols for which the residual influence lasts


(duration of 2 symbols)
or
M = No. of letters / symbols in the alphabet.

Say the system in the state 3 at the beginning of the symbols emitted by the source were BA.

Similar comment applies for other states.

1.6 Entropy and Information Rate of Markoff Sources


• Definition of the entropy of the source
Assume that, the probability of being in state i at he beginning of the first symbol interval is
the same as the probability of being in state i at the beginning of the second symbol interval, and so
on.

The probability of going from state i to j also doesn‟t depend on time, Entropy of state „i‟ is
defined as the average information content of the symbols emitted from the i-th state.
n
1
Hi = ∑ pij log2 bits / symbol -------------- (1)
p
j =1 ij

Entropy of the source is defined as the average of the entropy of each state.
n

i.e. H = E(Hi) = ∑pi Hi ------------------------------ (2)


j =1

Where,
Pi = the proby that the source is in state „i'.
Using eqn (1), eqn. (2) becomes,

Page 19
n n
H = ∑ pi ∑ pij log 1 bits / symbol -------------- (3)
p
ij
i =1 j =1

Average information rate for the source is defined as


R = rs . H bits/sec
Where, „r s‟ is the number of state transitions per second or the symbol rate of the source.
The above concepts can be illustrated with an example
Illustrative Example:
1. Consider an information source modeled by a discrete stationary Mark off random process shown
in the figure. Find the source entropy H and the average information content per symbol in messages
containing one, two and three symbols.
¼
C
A 1 C 2 B3 /4
3
/ ¼
p1 = ½ P2 = ½

• The source emits one of three symbols A, B and C.


• A tree diagram can be drawn as illustrated in the previous session to understand the various
symbol sequences and their probabilities.
¾ 1 AAA
¾ 1
¼ 2 AAC
1 ¼ 1 ACC
¼ 3
¾ /4 2 ACB
½ 1
¾ 1 CCA
¼ 1
¼ ¼ 2 CCC
2 ¼ 1 CBC
B 2
¾ 3
B /4 2 CBB
¾ 1 CAA
¾ 1
¼ 2 CAC
1 ¼ 1 CCC
¼ 3
¼ B /4 2 CCB
½ 2
A ¾ 1 BCA
¼ 1
¾ C ¼ 2 BCC
2 C ¼ 1 BBC
B 2
¾ 3 2 BBB
/4

Page 20
As per the outcome of the previous session we have

Messages of Length (1) Messages of Length (2) Messages of Length (3)


3 9 27
A AA AAA
8 32 128
3 3 9
B AC AAC
8 32 128
1 3 3
C CB ACC
4 32 128
2 9
CC ACB
32 128
9 27
BB BBB
32 128
3 9
BC BBC
32 128
3 3
CA BCC
32 128
9
BCA
128
3
CCA
128
3
CCB
128
2
CCC
128
3
CBC
128
3
CAC
128
9
CBB
128
9
CAA
128

Page 21
By definition Hi is given by
H =np 1
i ∑ log
ij
p ij
j=1
Put i = 1,
=n= 2 p 1
Hi ∑ 1j log
p
j=1 1j
p log 1 + p log 1
11 p 12 p
11 12

Substituting the values we get,


3 1 1 1
H1 = log2 + log 2
4 (3 / 4) 4 1/ 4
3 4 1
= log 2 + log2 (4)
4 3 4
H1 = 0.8113

SimilarlyH2 = 1 log 4 + 3 log 4 = 0.8113


4 4 3
By definition, the source entropy is given by,
n 2

H = ∑pi Hi = ∑pi Hi
i =1 i=1

= 1 (0.8113) + 1 (0.8113)
2 2
= (0.8113) bits / symbol

To calculate the average information content per symbol in messages containing two symbols.
• How many messages of length (2) are present? And what is the information content of these
messages?
There are seven such messages and their information content is:
1 1
= log
(BB
I (AA) = I (BB) = log ( AA) )

1 = 1.83 bits
i.e., I (AA) = I (BB) = (9 /
log 32)
Similarly calculate for
other messages and
verify that they are
=

3
.
4
1
I (BB) = I (AC) = log 1 5

Page 22
b
i
t
s
(3 /
32)
I (CB) = I (CA) =

Page 23
I (CC) = log = 1 = 4 bits
P(2 / 32)

• Computation of the average information content of these messages.

Thus, we have
7

H(two)= ∑Pi log


1 bits / sym.
i=1 Pi
7

= ∑Pi . Ii
i= 1

Where Ii = the I‟s calculated above for different messages of length two

Substituting the values we get,


H
9 3 3 2 3
(two) = (1.83) + x (3.415) + (3.415) + (4) + x (3.415)
32 32 32 32 32
+ 3 9
x (3.415) + x (1.83)
32 32
\H
= 2.56 bits
(two)

• Computation of the average information content per symbol in messages containing two
symbols using the relation.

GN = Average information content of the messages of length N


Number of symbols in the message
Here, N = 2

\ GN = Average information content of the messages of length


(2) 2
H
( two )
=
2
2.56
= = 1.28 bits / symbol
2
\ G 2 =1.28
Similarly compute other G‟s of interest for the problem under discussion viz G 1 &
G3. You get them as
G1 = 1.5612 bits / symbol
And G3 = 1.0970 bits / symbol
• from the values of G’s calculated
We note that,

Page 24
G1 > G2 > G3 > H

• Statement
It can be stated that the average information per symbol in the message reduces as the length of
the message increases.
• The generalized form of the above statement
If P (mi) is the probability of a sequence mi of ‘N’ symbols form the source with the average
information content per symbol in the messages of N symbols defined by
- ∑P(mi ) log P(mi )
i

GN = N
Where the sum is over all sequences mi containing N symbols, then GN is a monotonic decreasing
function of N and in the limiting case it becomes.

Lim GN = H bits / symbol


N ¥

Recall H = entropy of the source


The above example illustrates the basic concept that the average information content per symbol
from a source emitting dependent sequence decreases as the message length increases.
• It can also be stated as,
Alternatively, it tells us that the average number of bits per symbol needed to represent a message
decreases as the message length increases.
Problems:
Example 1
The state diagram of the stationary Mark off source is shown below
Find (i) the entropy of each state
(ii) The entropy of the source
(iii) G1, G2 and verify that G1 ≥ G2 ≥ H the entropy of the source.
½
C
P(state1) = P(state2) =
2
P(state3) = 1/3

¼C ¼
C
A B
¼
¼

Page 25
For the Mark off source shown, calculate the information rate.

½
½ S ½
S S 3 R 1
L 1 L 2 R /2
½ ¼ ¼
p1 = ¼ P2 = ½ P3 = ¼

Solution:
By definition, the average information rate for the source is given by
R = ------------------------------------------------
rs . H bits/sec (1)
Where, rs is the symbol rate of the source
And H is the entropy of the source.
To compute H
Calculate the entropy of each state using,
n
= p 1bits/ sym ------------------------ (2)
Hi ∑ log
p
iJ

j=1 ij

For this example,


= 3p
1; i = 1, 2, 3 ------------------ (3)
Hi ∑ ij log
p
ij
j=1

Put i = 1
\H = 3
i ∑p 1j log p1 j
j=1

= - p11 log p11 – p 12 log p12 – p 13 log p13


Substituting the values, we get
1 1 1 1
H1 = - x log - log -0
2 2 2 2
= + 1 log (2) + 1 log (2)
2 2
\ H1 = 1 bit / symbol
Put i = 2, in eqn. (2) we get,
3

H2 = - ∑p 2 j log p 2 j
j=1

i.e., H2 = - [p21 log p21 + p22 log p22 + p23 log p23 ]
Substituting the values given we get,

Page 26
1 1 1 1 1 1
log + log + log
H2 =-
4 4 2 2 4 4
1 1 1
=+ log 4 + log 2 + log 4
4 2 4
1 1
= log 2 + + log 4
22
\ H2 = 1.5 bits/symbol

Similarly calculate H3 and it will be


H3 = 1 bit / symbol

With Hi computed you can now compute H, the source entropy, using.
H= 3
∑ Pi Hi
i= 1

= p1 H1 + p2 H2 + p3 H3
Substituting the values we get,
1 1 1
H= x1+ x 1.5 + x1
4 2 4
1 1.5 1
= + +
4 2 4
1 1.5 2.5
= + = = 1.25 bits / symbol
2 2 2
\ H = 1.25 bits/symbol

Now, using equation (1) we have


Source information rate = R = rs 1.25
Taking „r s‟ as one per second we get
R = 1 x 1.25 = 1.25 bits / sec

Page 27
Review questions:

(1) Explain the terms (i) Self information (ii) Average information (iii) Mutual Information.

(2) Discuss the reason for using logarithmic measure for measuring the amount of information.

(3) Explain the concept of amount of information associated with message. Also explain what
infinite information is and zero information.

(4) A binary source emitting an independent sequence of 0‟s and 1‟s with pro babilities p and (1-
p) respectively. Plot the entropy of the source.

(5) Explain the concept of information, average information, information rate and redundancy as
referred to information transmission.

(6) Let X represents the outcome of a single roll of a fair dice. What is the entropy of X?

(7) A code is composed of dots and dashes. Assume that the dash is 3 times as long as the dot and
has one-third the probability of occurrence. (i) Calculate the information in dot and that in a
dash; (ii) Calculate the average information in dot-dash code; and (iii) Assume that a dot lasts
for 10 ms and this same time interval is allowed between symbols. Calculate the average rate
of information transmission.

(8) What do you understand by the term extension of a discrete memory less source? Show that
the entropy of the nth extension of a DMS is n times the entropy of the original source.

(9) A card is drawn from a deck of playing cards. A) You are informed that the card you draw is
spade. How much information did you receive in bits? B) How much information did you
receive if you are told that the card you drew is an ace? C) How much information did you
receive if you are told that the card you drew is an ace of spades? Is the information content of
the message “ace of spades” the sum of the information contents of the messages ”spade” and
“ace”?

(10) A block and white TV picture consists of 525 lines of picture information. Assume that each
consists of 525 picture elements and that each element can have 256 brightness levels.
Pictures are repeated the rate of 30/sec. Calculate the average rate of information conveyed by
a TV set to a viewer.

(11) A zero memory source has a source alphabet S= {S1, S2, S3} with P= {1/2, 1/4, 1/4}. Find
the2 entropy of the source. Also determine the entropy of its second extension and verify that H
(S ) = 2H(S).

(12) Show that the entropy is maximum when source transmits symbols with equal probability.
Plot the entropy of this source versus p (0<p<1).

(13) The output of an information source consists OF 128 symbols, 16 of which occurs with
probability of 1/32 and remaining 112 occur with a probability of 1/224. The source emits
1000 symbols/sec. assuming that the symbols are chosen independently; find the rate of
information of the source.

3 BB
A 1 AA
C

Page 28
Syllabus:
Encoding of the source output, Shannon‟s encoding algorithm. Communication Channels,
Discrete communication channels, Continuous channels.

Text Books:
• Digital and analog communication systems, K. Sam Shanmugam, John Wiley,
1996.

Reference Books:
• Digital Communications - Glover and Grant; Pearson Ed. 2nd Ed 2008

Page 29
2.1 Encoding of the Source Output:
• Need for encoding
N
Suppose that, M – messages = 2 , which are equally likely to occur. Then recall that average
information per messages interval in H = N.
Say further that each message is coded into N bits,
H
\ Average information carried by an individual bit is = = 1 bit
N
If the messages are not equally likely, then „H‟ will be les s than „N‟ and each bit will carry
less than one bit of information.
• Is it possible to improve the situation?
Yes, by using a code in which not all messages are encoded into the same number of bits. The
more likely a message is, the fewer the number of bits that should be used in its code word.
• Source encoding
Process by which the output of an information source is converted into a binary sequence.

Symbol sequence
emitted by the Input Source Output : a binary sequence
information source Encoder

• If the encoder operates on blocks of ‘N’ symbols, t he bit rate of the


Where, GN = –
encoder is given as
Produces an average bit rate of GN bits / symbol
1
∑p(m ) log p(m )
i i
Ni

p(mi ) = Probability of sequence ‘mi’ of ‘N’ symbols from the source,


Sum is over all sequences „m i‟ containing ‘N’ symbols.
GN in a monotonic decreasing function of N and
Lim

N ®¥ GN = H bits / symbol
Performance measuring factor for the encoder
Coding efficiency: ηc

Source inf ormation rate


Definition of ηc =
Average output bit rate of the encoder

ηc = H(S)

Page 30
2.2 Shannon’s Encoding Algorithm:
• Formulation of the design of the source encoder
Can be formulated as follows:

possible
messages
A unique binary
INPUT code word „c i‟ of
A message encoder length „n i‟ bits for
the message „m i‟

N-symbols Replaces the input message


symbols by a sequence of
binary digits

„q‟ messages : m 1, m2,…..m i, ......... , m q


Probs. of messages : p1, p2, ..…..p i, ……..., p q

ni : an integer
• The objective of the designer
^

To find „n i‟ and „c i‟ for i = 1, 2, .... , q such that the average number of bits per symbol H N
used in the coding scheme is as close to GN as possible.
q
Where, H ^ = 1 ∑n p i i
N
N
i =1
1
q 1
and GN = ∑pi log
N
i =1 pi
i.e., the objective is to have

as closely as possible

• The algorithm proposed by Shannon and Fano


Step 1: Messages for a given block size (N) m1, m2, ........ mq are to be arranged in decreasing order of
probability.
Step 2: The number of „n i‟ (an integer) assigned to message m i is bounded by

log2 1 < n i < 1 + log 2 1


pi pi
Step 3: The code word is generated from the binary fraction expansion of ‘Fi’ defined as

Page 31
i-1

Fi = ∑p k , with F1 taken to be zero.


k =1

Step 4: Choose ‘n i’ bits in the expansion of step – (3)


Say, i = 2, then if ni as per step (2) is = 3 and
If the Fi as per stop (3) is 0.0011011
Then step (4) says that the code word is: 001 for message (2)

With similar comments for other messages of the source.

The codeword for the message ‘mi’ is the binary fraction expansion of Fi upto „ ni’ bits.

i.e., Ci = (Fi)binary, ni bits

Step 5: Design of the encoder can be completed by repeating the above steps for all the messages of
block length chosen.
• Illustrative Example
Design of source encoder for the information source given,
¼
C
A 1 C 2 B3 /4
3
/ ¼
p1 = ½ P2 = ½

Compare the average output bit rate and efficiency of the coder for N = 1, 2 & 3.
Solution:
The value of „N‟ is to be specified.
Case – I: Say N = 3 ß Block size
Step 1: Write the tree diagram and get the symbol sequence of length = 3.
Tree diagram for illustrative example – (1) of session (3)

Page 32
A¾ 1 AAA
C ¼ 2 AAC
1 C ¼ 1 ACC
C ¼ 3
B /4 2 ACB
½
A ¾ 1 CCA
¼ 1
¼ C ¼ 2 CCC
2 C ¼ 1 CBC
B 2 3
B /4 2 CBB
A¾ 1 CAA
C ¼ 2 CAC
1 C ¼ 1 CCC
C ¼ 3
¼ B /4 2 CCB
½
1 BCA
B ¼ 1
¾ C C ¼ 2 BCC
2 C ¼ 1 BBC
2 3
/4 2 BBB
From the previous session we know that the source emits fifteen (15) distinct three symbol messages.
They are listed below:

Messages AAA AAC ACC ACB BBB BBC BCC BCA CCA CCB CCC CBC CAC CBB
CAA
Probability 27 9 3 9 27 9 3 9 3 3 2 3 3 9 9
128128 128 128 128 128 128 128 128 128 128 128 128 128 128

Step 2: Arrange the messages „m i‟ in decreasing order of probability.


Messages AAA BBB CAA CBB BCA BBC AAC ACB CBC CAC CCB CCA BCC ACC
mi CCC
Probability 27 27 9 9 9 9 9 9 3 3 3 3 3 3 2
pi 128128 128 128 128 128 128 128 128 128 128 128 128 128 128

Step 3: Compute the number of bits to be assigned to a message „m i‟ using.

Log2 1 < n i < 1 + log 2 1 ; i = 1, 2, ……. 15


pi pi
Say i = 1, then bound on „n i‟ is
128 128
log < n1 < 1 + log
2
7 27

Page 33
i.e., 2.245 < n1 < 3.245

Recall „n i‟ has to be an integer


\ n1 can be taken
as, n1 = 3

Step 4: Generate the codeword using the binary fraction expansion of Fi defined as
i- 1

Fi = ∑p k ; with F1 = 0
k =1

Say i = 2, i.e., the second


2 - 1 message,
= 1p
then calculate n2 you should get it as 3 bits.
27 27
Next, calculate F2 = ∑p k ∑ k = . Get the binary fraction expansion of . You
k =1 k =1 128 128
get it as : 0.0011011
Step 5: Since ni = 3, truncate this exploration to 3 – bits.
\ The codeword is: 001

Step 6: Repeat the above steps and complete the design of the encoder for other messages listed above.

The following table may be constructed

Message Binary expansion of Code word


pi Fi ni
mi Fi ci
AAA 27 0 3 .00000 000
128
27
BBB 27/128 3 .001101 001
128
9
CAA 128 54/128 4 0110110 0110
9

CBB 128 63/128 4 0111111 0111


9
128
BCA 9 72/128 4 .1001100 1001
128
BBC 9 81/128 4 1010001 1010
128
9
AAC 90/128 4 1011010 1011
128
3
ACB 128 99/128 4 1100011 1100

Page 34
3
CBC 108/128 6 110110 110110
128
3
CAC 128 111/128 6 1101111 110111
3

CCB 128 114/128 6 1110010 111001


3
128
CCA 3 117/128 6 1110101 111010
128
BCC 2 120/128 6 1111000 111100
128
ACC 123/128 6 1111011 111101

CCC 126/128 6 1111110 111111

• the average number of bits per symbol used by the encoder

Average number of bits = ∑n i pi

Substituting the values from the table we


get, Average Number of bits = 3.89 nn
^ =∑ i
\ Average Number of bits per symbol = H
N i N
Here N = 3,
^
\ 3.89
H3 = = 1.3 bits / symbol
3
State entropy is given by
n
1
Hi = ∑pij bits / symbol
p
log

j =1 ij

Here number of states the source can be in are two


i.e., n = 2
2 1
Hi = ∑pij log
pij
j=1
Say i = 1, then entropy of state – (1) is
2
1 1 1
Hi = ∑pij = p11 log
p + p12
log
p log
p
1j 11 12
j=1
Substituting the values known we get,

Page 35
3 1 1 1
H1 = 4x log(3 / 4) +4 log 1/ 4
3 4 1
= x log + log (4)
4 3 4
\ H1 = 0.8113

Similarly we can compute, H2 as


2
1 1
H2 = ∑ p21 log p = p21 + p22 log p
21 22
j =1

Substituting we get,

1 1 3 1
H2 = x log + log

4 (1/ 4) 4 3/4
1 3 4
= x log (4)+ log
4 4 3

H2 = 0.8113

Entropy of the source by definition is

H = ∑pi Hi ;
j =1

th
Pi = Probability that the source is in the i state.
2

H = ∑ pi H i ; = p1H1 + p2H2
i =1

Substituting the values, we get,

H = ½ x 0.8113 + ½ x 0.8113 = 0.8113

\ H = 0.8113 bits / sym.

Page 36
• What is the efficiency of the encoder?
By definition we have
ηc= = H x 100 = H x 100 = 0.8113 x 100 = 62.4%
^ ^

H2 H3 1.3

\ ηc for N = 3 is, 62.4%

Case – II
Say N = 2
The number of messages of length „two‟ and their probabilities (obtai ned from the tree diagram)
can be listed as shown in the table.
Given below
N=2
Message pi ni ci
AA 9/32 2 00
BB 9/32 2 01
AC 3/32 4 1001
CB 3/32 4 1010
BC 3/32 4 1100
CA 3/32 4 1101
CC 2/32 4 1111
^
Calculate H N and verify that it is 1.44 bits / sym.
\ Encoder efficiency for this case is
H
ηc = ^ x100 H
N

Substituting the values we get,


ηc = 56.34%

Case – III: N=1


Proceeding on the same lines you would see that
N=1
Message pi ni ci
A 3/8 2 00
B 3/8 2 01
C 1/4 2 11

Page 37
^
H1 = 2 bits / symbol and
ηc = 40.56%

• Conclusion for the above example


^
We note that the average output bit rate of the encoder H N decreases as ‘N’ increases and

hence the efficiency of the encoder increases as ‘N’ increases.

Operation of the Source Encoder Designed:


I. Consider a symbol string ACBBCAAACBBB at the encoder input. If the encoder uses a
block size of 3, find the output of the encoder.

¼
C
A 1 C SOURCE
3
/4 ¼
p1 = ½ P2 = ½
INFORMN. SOURCE

Recall from the outcome of session (5) that for the source given possible three symbol
sequences and their corresponding code words are given by –
Message Codeword
ni
mi ci
AAA 3 000
BBB 3 001
CAA 4 0110
CBB 4 0111
BCA 4 1001 Determination of the
BBC 4 1010 code words and their
size as illustrated in
AAC the previous session
ACB 4 1100
CBC 6 110110
CAC 6 110111
CCB 6 111001
CCA 6 111010
BCC 6 111100
ACC 6 111101

Page 38
CCC 6 111111
Output of the encoder can be obtained by replacing successive groups of three input symbols by
the code words shown in the table. Input symbol string is

ACB
123
BCA
123
AAC
123
BBB
{
1100 1001 1011 011 ¬ Encoded version of the symbol string

II. If the encoder operates on two symbols at a time what is the output of the encoder for the
same symbol string?
Again recall from the previous session that for the source given, different two-symbol sequences
and their encoded bits are given by

N=2
Message No. of bits ci
mi ni
AA 2 00
BB 2 01
AC 4 1001
CB 4 1010
BC 4 1100
CA 4 1101
CC 4 1111

For this case, the symbol string will be encoded as –

AC
{{{{{{
BB CA AA CB BB
100101110100 1010 01 ¬ Encoded message

DECODING
• How is decoding accomplished?
By starting at the left-most bit and making groups of bits with the codewords listed in the
table.
Case – I: N = 3
i) Take the first 3 – bit group viz 110 why?
ii) Check for a matching word in the table.
iii) If no match is obtained, then try the first 4-bit group 1100 and again check for the matching
word.
iv) On matching decode the group.

Page 39
NOTE: For this example, step (ii) is not satisfied and with step (iii) a match is found and the decoding
results in ACB.
Repeat this procedure beginning with the fifth bit to decode the remaining symbol groups.
Symbol string would be ACB BCA AAC BCA

• Conclusion from the above example with regard to decoding


It is clear that the decoding can be done easily by knowing the codeword lengths apriori if no
errors occur in the bit string in the transmission process.
• The effect of bit errors in transmission
Leads to serious decoding problems.
Example: For the case of N = 3, if the bit string, 1100100110111001 was received at the decoder
input with one bit error as
1101100110111001
What then is the decoded message?
Solution: Received bit string is
110110 0110 11101

Error bit

CBCCAACCB ----- (1)

For the errorless bit string you have already seen that the decoded symbol string is
ACB BCA AAC BCA ----- (2)
(1) and (2) reveal the decoding problem with bit error.

Illustrative examples on source encoding


1. A source emits independent sequences of symbols from a source alphabet containing five
symbols with probabilities 0.4, 0.2, 0.2, 0.1 and 0.1.
i) Compute the entropy of the source
ii) Design a source encoder with a block size of two.
Solution: Source alphabet = (s1, s2, s3, s4, s5)
Probs. of symbols = p1, p2, p3, p4, p5
= 0.4, 0.2, 0.2, 0.1, 0.1
5

(i) Entropy of the source = H = - ∑pi log pi bits / symbol


i= 1

Substituting we get,
H = - [p1 log p1 + p2 log p2 + p3 log p3 + p4 log p4 + p5 log p5 ]
= - [0.4 log 0.4 + 0.2 log 0.2 + 0.2 log 0.2 + 0.1 log 0.1 + 0.1 log 0.1]

Page 40
H = 2.12 bits/symbol
(ii) Some encoder with N = 2
Different two symbol sequences for the source are:
(s1s1) AA ( ) BB ( ) CC ( ) DD ( ) EE
(s1s2) AB ( ) BC ( ) CD ( ) DE ( ) ED
(s1s3) AC ( ) BD ( ) CE ( ) DC ( ) EC A total of 25 messages
(s1s4) AD ( ) BE ( ) CB ( ) DB ( ) EB
(s1s5) AE ( ) BA ( ) CA ( ) DA ( ) EA
Arrange the messages in decreasing order of probability and determine the number of bits „n i‟ as
explained.
Proby. No. of bits
Messages
pi ni
AA 0.16 3
AB 0.08
AC 0.08
BC 0.08 4
BA 0.08
CA 0.08
... 0.04
... 0.04
... 0.04
... 0.04 5
... 0.04
... 0.04
... 0.04
... 0.02
... 0.02
... 0.02
... 0.02
... 0.02 6
... 0.02
... 0.02
... 0.02
... 0.01
... 0.01
... 0.01 7
... 0.01

^
Calculate H1 =
^
Substituting, H1 = 2.36 bits/symbol

2. A technique used in constructing a source encoder consists of arranging the messages in


decreasing order of probability and dividing the message into two almost equally probable

Page 41
groups. The messages in the first group are given the bit ‘O’ and the messages in the second
group are given the bit ‘1’. The procedure is now applied again for each group separately, and
continued until no further division is possible. Using this algorithm, find the code words for six
messages occurring with probabilities, 1/24, 1/12, 1/24, 1/6, 1/3, 1/3

Solution: (1) Arrange in decreasing order of probability

m5 1/3 0 0
st
m6 1/3 0 1 ß 1 division
nd
m4 1/6 1 0 ß 2 division
m2 1/12 1 1 0
3rd
division
m1 1/24 1 1 1 0 th
ß 4 division
m3 1/24 1 1 1 1

\ Code words are

m1 = 1110
m2 = 110
m3 = 1111
m4 = 10
m5 = 00
m6 = 01

Example (3)
a) For the source shown, design a source encoding scheme using block size of two
symbols and variable length code words
^
b) Calculate H 2 used by the encoder
c) If the source is emitting symbols at a rate of 1000 symbols per second, compute the
output bit rate of the encoder.

½
½ S ½
S S 3 R 1
L 1 L 2 R /2
½ ¼ ¼
p1 = ¼ P2 = ½ P3 = ¼

Page 42
Solution (a)
1. The tree diagram for the source is

½ 1 LL (1/16)
1
½ 2 LS (1/16)
¼
¼ 1
C ¼ 1
¼ 2 SL (1/32)
2 ½ 3 SS (1/16)
¼ SR (1/32)
½ 1 LL (1/16)
1 2 LS (1/16)
½ LL
¼ 1 SL (1/16)
½ ¼ LS
2 ½ 2 ½ 2 SS (1/8)
¼ 3 Different
¾ ½ (1/16) SS Messages
2 2 SR
of Length
½ 3 RS (1/8) Two
RS
¼ 1 SL (1/32) RR
2 2 SS (1/16)
½
¼ 3 SR (1/32)
½
¼ 3
C ½ 2 RS (1/16)
½
3
½ 3 RR (1/16)

2. Note, there are seven messages of length (2). They are SS, LL, LS, SL, SR, RS & RR.
3. Compute the message probabilities and arrange in descending order.
4. Compute ni, Fi. Fi (in binary) and ci as explained earlier and tabulate the results, with usual
notations.
Message
pi ni Fi Fi (binary) ci
mi
SS 1/4 2 0 .0000 00
LL 1/8 3 1/4 .0100 010
LS 1/8 3 3/8 .0110 011
SL 1/8 3 4/8 .1000 100
SR 1/8 3 5/8 .1010 101
RS 1/8 3 6/8 .1100 110
RR 1/8 3 7/8 .1110 111

Page 43
7
1 ∑- pi log 2 pi = 1.375 bits/symbol
G2 =
2 i -1
^ 7
1 pn
(b) H 2 = ∑ i i = 1.375 bits/symbol
2 i -1
^
1
Recall, H N ≤ GN + N ; Here N = 2
^
1
\ H 2 ≤ G2 +
2
(c) Rate = 1375 bits/sec.

2.3 SOURCE ENCODER DESIGN AND COMMUNICATION CHANNELS


• The schematic of a practical communication system is shown.

Data Communication Channel (Discrete)


Coding Channel (Discrete)
Modulation Channel (Analog)

b Channel c Channel d ication e f g Channel h


Encoder Σ Decoder
OR
Transmissi

Transmitter channel

Fig. 1: BINARY COMMN. CHANNEL CHARACTERISATION

• ‘Communication Channel’
Communication Channel carries different meanings and characterizations depending on its
terminal points and functionality.

(i) Portion between points c & g:


Referred to as coding channel
Accepts a sequence of symbols at its input and produces a sequence of symbols at its
output.
Completely characterized by a set of transition probabilities pij. These probabilities will
depend on the parameters of – (1) The modulator, (2) Transmiss ion media, (3) Noise, and
(4) Demodulator

Page 44
A discrete channel

(ii) Portion between points d and f:


Provides electrical connection between the source and the destination.
The input to and the output of this channel are analog electrical waveforms.
Referred to as „continuous‟ or modulation channel or simply analog
channel. Are subject to several varieties of impairments –
Due to amplitude and frequency response variations of the channel within the
passband.
Due to variation of channel characteristics with time.
Non-linearities in the channel.
Channel can also corrupt the signal statistically due to various types of additive and
multiplicative noise.

2.4 Mathematical Model for Discrete Communication Channel:


Channel between points c & g of Fig. – (1)
• The input to the channel?
A symbol belonging to an alphabet of „M‟ symbols in the general case is the input to the channel.

• he output of the channel


A symbol belonging to the same alphabet of „M‟ input symbols is the output of the channel.

• Is the output symbol in a symbol interval same as the input symbol during the same symbol
interval?
The discrete channel is completely modeled by a set of probabilities –
th
pit Probability that the input to the channel is the i symbol of the alphabet.

(i = 1, 2,.................. M)
and
th th
p ij Probability that the i symbol is received as the j symbol of the alphabet at the output of
the channel.

• Discrete M-ary channel


If a channel is designed to transmit and receive one of „M‟ possibl e symbols, it is called a
discrete M-ary channel.

• discrete binary channel and the statistical model of a binary channel

Page 45
Shown in Fig. – (2).
O P00 O

P10
Transmitted pij = p(Y = j / X=i)
Received t
p t = p(X = o); p1 P(X = 1)
digit X
digit X
P01 por = p(Y = o); p r P(Y = 1)
o 1
poo + po1 = 1 ; p11 + p10 = 1
1 p11 1

Fig. – (2)

• Its features
X & Y: random variables – binary valued
Input nodes are connected to the output nodes by four paths.
(i) Path on top of graph : Represents an input „O‟ appearing correctly
as „O‟ as the channel output.

(ii) Path at bottom of graph :


(iii) Diogonal path from 0 to 1 : Represents an input bit O appearing
incorrectly as 1 at the channel output
(due to noise)
(iv) Diagonal path from 1 to 0 : Similar comments

Errors occur in a random fashion and the occurrence of errors can be statistically modelled
by assigning probabilities to the paths shown in figure (2).

• A memory less channel:


If the occurrence of an error during a bit interval does not affect the behaviour of the system
during other bit intervals.
Probability of an error can be evaluated as
p(error) = Pe = P (X ≠ Y) = P (X = 0, Y = 1) + P (X = 1, Y = 0)
Pe = P (X = 0) . P (Y = 1 / X = 0) + P (X = 1), P (Y = 0 / X= 1)
Can also be written as,

t
Pe = p p01 + p t p10 ------ (1)

We also have from the model

Page 46
r t t
po = po p00 + p1 . p10 , and
(2)
p1r = pot p01 + p1t p11

• Binary symmetric channel (BSC)


If, p00 = p11 = p (say), then the channel is called a BSC.

• Parameters needed to characterize a BSC


• Model of an M-ary DMC.

p11
1 1
p12 pit = p(X = i)
prj = p(Y = j)
2
p = p(Y = j / X = i)
ij
2

INPUT X OUTPUTY
j
pij

piM

M M

Fig. – (3)

This can be analysed on the same lines presented above for a binary channel.
M

prj = ∑p it pij -------------------------------- (3)


i =1

• The p(error) for the M-ary channel


Generalising equation (1) above, we have

p
P(error) = P e = ∑p it ∑ ij ----- (4)
i=1 j =1
j¹i

• In a DMC how many statistical processes are involved and which are they?
Two, (i) Input to the channel and
(ii) Noise

Page 47
• Definition of the different entropies for the DMC.
i) Entropy of INPUT X: H(X).

H(X) = - ∑p t log pi
i
( t ) bits / symbol ----- (5)
i= 1

ii) Entropy of OUTPUT Y: H(Y)


H(Y) = - ∑p r log p
M
( r ) bits / symbol ----------- (6)
i i
i =1

iii) Conditional entropy: H(X/Y)

H(X / Y) = - ∑ ∑P (X = i, Y = j) log (p (X =i / Y = j)) bits/symbol - (7)


i= 1 j=1

iv) Joint entropy: H(X,Y)


M M

H(X, Y) = - ∑ ∑P (X = i, Y = j) log (p (X = i, Y = j)) bits/symbol - (8)


i= 1 i=1

v) Conditional entropy: H(Y/X)


M M

H (Y/X) = - ∑ ∑P (X = i, Y = j) log (p (Y = j / X = i)) bits/symbol - (9)


i=1 i= 1

Representation of the conditional entropy


• H(X/Y) represents how uncertain we are of the channel input „x‟, on the average, when we know
the channel output „Y‟.

Similar comments apply to H(Y/X)


vi) Joint Entropy H(X, Y) = H(X) + H(Y/X) = H(Y) + H(X/Y) - (10)

ENTROPIES PERTAINING TO DMC

• To prove the relation for H(X Y)


By definition, we have,
M M

H(XY) = - ∑ ∑p ( i, j) log p ( i, j)
i j

Page 48
i associated with variable X, white j with variable Y.

H(XY) = - ∑ ∑p ( i) p ( j / i) log [p ( i) p ( j / i) ]
ij

= -∑ ∑p ( i) p ( j / i) log p ( i) + ∑ ∑p ( i) p ( j / i) log p ( i)
ij

Say, „i‟ is held constant in the first summation of the first t erm on RHS, then we can write
H(XY) as

H(XY) = - ∑p ( i)1 log p ( i) + ∑ ∑p ( ij) log p ( j / i)

\H(XY) = H(X) + H(Y / X)


Hence the proof.

1. For the discrete channel model shown, find, the probability of error.

0 p 0 Since the channel is symmetric,


p(1, 0) = p(0, 1) = (1 - p)

X Y Proby. Of error means, situation


when X ≠ Y
1
1 p Received
Transmitted digit
digit
P(error) = Pe = P(X ≠ Y) = P(X = 0, Y = 1) + P (X = 1, Y = 0)
= P(X = 0) . P(Y = 1 / X = 0) + P(X = 1) . P(Y = 0 / X = 1)

Assuming that 0 & 1 are equally likely to occur

P(error) = 1 x (1 – p) + 1 (1 – p) = 1 -p +1 -p
2 2 2 2 2 2
\ P(error) = (1 – p)

2. A binary channel has the following noise characteristics:

Page 49
Y
P(Y/X)
0 1
0 2/3 1/3
X
1 1/3 2/3
If the input symbols are transmitted with probabilities ¾ & ¼ respectively, find H(X), H(Y),
H(XY), H(Y/X).
Solution:
Given = P(X = 0) = ¾ and P(Y = 1) ¼

\ H(X) = - ∑p i log pi = 3log 4 + 1 log 2 4 = 0.811278 bits / symbol


2

i 4 3 4
Compute the probability of the output symbols.

Channel model is-

x1 y1

x2 y2

p(Y = Y1) = p(X = X1, Y = Y1) + p(X = X2, Y = Y1) ------------ (1)
To evaluate this construct the p(XY) matrix using.
y1 y2
2 .3 1 . 3 x1 1 1
3 4 3 4 2 4
P(XY) = p(X) . p(Y/X) = = -----(2)
1 1 2 1 1 1
. . x
2
3 4 3 4 12 6

\ P(Y = Y1) = 1 + 1 = 7 -- Sum of first column of matrix (2)


2 12 12
nd
Similarly P(Y2) = 5 sum of 2 column of P(XY)
12
Construct P(X/Y) matrix using

Page 50

You might also like