analog and digital comm techniques pdf

313

Upload: justina-ilamidi-abigo

Post on 01-Apr-2015

748 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: analog and digital comm techniques pdf
Page 2: analog and digital comm techniques pdf

Analogue and Digital Communication Techniques

Page 3: analog and digital comm techniques pdf

This Page Intentionally Left Blank

Page 4: analog and digital comm techniques pdf

Analogue and Digital Communication Techniques

Grahame Smillie Lecturer, Hull College

Newnes

OXFORD AMSTERDAM BOSTON LONDON NEW YORK PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO

Page 5: analog and digital comm techniques pdf

Newnes An imprint of Elsevier Science Linacre House, Jordan Hill, Oxford OX2 8DP 200 Wheeler Road, Burlington, MA 1803

First published 1999 Transferred to digital printing 2002

Copyright �9 1999, G. A. Smillie. All rights reserved

The right of G. A. Smillie to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988

No part of this publication may be reproduced in any material form (including photocopying or storing in any medium by electronic means and whether or not transiently or incidentally to some other use of this publication) without the written permission of the copyright holder except in accordance with the provisions of the Copyright, Designs and Patents Act 1988 or under the terms of a lieenee issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London, England W 1T 4LP, Applications for the copyright holder's written permission to reproduce any part of this publication should be addressed to the publisher

British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library

ISBN 0 340 73125 7

For information on all Newnes publications visit our website at www.newnespress.com

, , ~ . . . . . . . . . . . . , , , , , , - - = , 1

Page 6: analog and digital comm techniques pdf

Contents

About the author Preface Acknowledgements

xiii XV

XV

1.1 1.2 1.3 1.4 1.5 1.6

1.7

1.8

Chapter 1 Definition of terms Introduction Frequencies Types of signal Analogue signal Digital signal Waveforms 1.6.1 Square wave 1.6.2 Sawtooth wave 1.6.3 Noise spikes Measurement of signal level 1.7.1 The decibel 1.7.2 The dBm 1.7.3 The dBr 1.7.4 The dBmO Review questions

1 1 1 2 2 3 4 5 6 7 8 9

11 13 13 13

2.1 2.2 2.3 2.4

2.5

Chapter 2 Analogue modulation principles Introduction Frequency band classifications Modulation techniques Amplitude modulation 2.4.1 Sidebands 2.4.2 Line graph 2.4.3 Sideband transmission 2.4.4 Comparison of single sideband and double sideband

transmission Frequency division multiplexing 2.5.1 Introduction 2.5.2 12 MHz coaxial cable system

15 15 15 17 17 18 20 21

23 24 24 24

Page 7: analog and digital comm techniques pdf

vi Contents

2.6

2.7

2.8

2.9 2.10

3.1 3.2. 3.3 3.4 3.5

3.6

3.7 3.8

4.1 4.2 4.3

4.4

4.5 4.6

Modulation depth 2.6.1 Mathematical treatment 2.6.2 Overmodulation 2.6.3 Power in the sidebands and carrier frequency Practical circuits 2.7.1 Single balanced modulators 2.7.2 Double balanced ring modulator 2.7.3 Power in the sidebands in practical amplitude modulators Angle modulation 2.8.1 Frequency modulation 2.8.2 Phase modulation Comparison of amplitude, phase and frequency modulation Review questions

Chapter 3 Spread spectrum systems Introduction Spread spectrum systems Spread spectrum system criteria Reasons for use of spread spectrum systems Pseudorandom code generators, scramblers and descramblers 3.5.1 Pseudorandom noise code generators 3.5.2 Scramblers and descramblers Types of spread spectrum techniques 3.6.1 Direct sequence spread spectrum 3.6.2 Frequency hopping 3.6.3 Time hopping Advantages and disadvantages of spread spectrum techniques Review questions

Chapter 4 Digital modulation techniques Introduction Amplitude shift key modulation Frequency shift key modulation 4.3.1 Frequency modulation generalities Phase shift key modulation 4.4.1 Some phase shift key generalities 4.4.2 Two-phase shift key modulation 4.4.3 Four-phase shift key modulation 4.4.4 Eight-phase shift key modulation 4.4.5 Sixteen-phase shift key modulation Sixteen-quadrature amplitude modulation Bandwidths 4.6.1 Nyquist bandwidth 4.6.2 Spectrum analyser comparison

28 29 29 32 35 35 37 38 39 39 43 45 45

46 46 46 47 47 47 47 49 50 50 52 56 57 58

59 59 60 61 64 66 66 66 68 70 75 76 81 81 81

Page 8: analog and digital comm techniques pdf

Contents vii

4.7

4.8

5.1 5.2 5.3

5.4 5.5

5.6

5.7

5.8

5.9

5.10 5.11 5.12 5.13

6.1 6.2

6.3

6.4 6.5

Differential phase modulation 4.7.1 PSK differential modulation 4.7.2 Sixteen-quadrature amplitude differential modulation Review questions

Chapter 5 Pulse code modulation Introduction Time division multiplexing Principle of operation 5.3.1 The time division multiplexed signal Recommended standards The 30/32-channel CEPT PCM system 5.5.1 The frame and multiframe structure 5.5.2 Time durations 5.5.3 Time slot usage on a 30/32-channel CEPT PCM system Aliasing distortion 5.6.1 ITU recommended sampling 5.6.2 Nyquist sampling 5.6.3 Aliasing distortion defined Quantising and encoding 5.7.1 Quantisation 5.7.2 Encoding The 30/32-channel CEPT PCM system operation 5.8.1 The transmitter 5.8.2 The receiver Importance of frame and multiframe alignment 5.9.1 Frame alignment 5.9.2 Multiframe alignment Alarms Dependent regenerative repeaters Power feeding Review questions

Chapter 6 Noise figure and noise temperature Introduction Internal noise 6.2.1 Component noise 6.2.2 System noise or equipment noise External noise 6.3.1 Line noise 6.3.2 Impulse noise System performance Noise figure/noise factor 6.5.1 Noise in cascaded systems

83 84 89 95

97 97 97 98

100 100 101 101 102 103 104 105 106 106 106 106 112 116 116 ll9 121 121 122 122 124 125 126

127 127 127 128 130 132 133 133 133 134 136

Page 9: analog and digital comm techniques pdf

viii Contents

6.6 6.7 6.8

7.1 7.2 7.3 7.4 7.5 7.6

7.6

8.1 8.2 8.3

8.4

8.5 8.6 8.7

9.1 9.2 9.3

9.4

Effective noise temperature Variation of noise figure with frequency Review questions

Chapter 7 Effects of noise and distortion on analogue and digital signals

Introduction Amplitude distortion Frequency distortion Amplitude and frequency distortion Limited bandwidth Effects of noise 7.6.1 Effect of noise on analogue transmission systems 7.6.2 Effect of noise on digital transmission systems 7.6.3 Transmission effects on a digital signal 7.6.4 Intersymbol interference 7.6.5 The eye diagram Review questions

Chapter 8 Determination of bit error rates Introduction Entropy Causes of errors on digital signals 8.3.1 Limited bandwidth Probability of bit error rate 8.4.1 Gaussian white noise 8.4.2 Probability of a bit error 8.4.3 Data rates and signal-to-noise ratio 8.4.4 Unipolar bit stream 8.4.5 Bipolar bit stream Shannon and Hartley capacity theorem Comparison of unipolar and bipolar bit streams Review questions

Chapter 9 Source coding techniques Introduction Asynchronous and synchronous transmission Codes used on computers 9.3.1 American Standards Institute Code for Information

Interchange (ASCII) 9.3.2 Extended binary coded decimal code (EBCDIC) Huffmann coding 9.4.1 Usage of Huffmann coding 9.4.2 Advantages and disadvantages of Huffmann coding

141 144 144

146 146 146 147 148 149 149 149 150 151 152 153 154

155 155 156 158 158 159 159 160 161 162 163 164 168 169

170 170 170 171

171 173 173 177 179

Page 10: analog and digital comm techniques pdf

Contents ix

9.5

9.6

Hamming coding 9.5.1 Usage of Hamming coding 9.5.2 Advantages and disadvantages of Hamming coding Review questions

179 183 183 184

10.1 10.2

10.3

10.4

10.5

10.6

10.7

Chapter 10 Bit error detection and correction Introduction Error detection using parity bits 10.2.1 Parity determination 10.2.2 Error detection using the parity bit 10.2.3 Advantages and disadvantages of using parity bits 10.2.4 Disadvantages of using asynchronous transmission to

send each character individually Block check codes 10.3.1 Advantages of block check codes 10.3.2 Disadvantages of block check codes Frame check sequence or cyclic redundancy check 10.4.1 Error bursts 10.4.2 Advantages of cyclic redundancy checks 10.4.3 Common cyclic redundancy code polynomials 10.4.4 Binary prime number The CRC process 10.5.1 The CRC generation process at the transmitter 10.5.2 The CRC checking process at the receiver Convolutional encoding 10.6.1 Connection pictorial 10.6.2 Connection vectors or polynomials 10.6.3 State and tree diagrams 10.6.4 The trellis diagram Review questions

185 185 185 185 187 189

189 190 192 192 193 193 194 194 194 196 196 199 203 203 205 206 209 230

11.1 11.2 11.3

11.4

Chapter 11 Line and interface coding Introduction Requirements of line and interface codes Non-return to zero codes 11.3.1 Non-return to zero - level (NRZ-L) 11.3.2 Non-return to zero - space (NRZ-S) 11.3.3 Non-return to zero - mark (NRZ-M) Return to zero (RZ) 11.4.1 Unipolar return to zero (URZ) 11.4.2 Polar return to zero (PRZ) 11.4.3 Return to zero - alternate mark inversion (RZ-AMI) 11.4.4 High-density bipolar format - n code (HDB-n)

231 231 231 232 232 234 234 235 235 236 236 237

Page 11: analog and digital comm techniques pdf

x Contents

11.5

11.6

11.7 11.8

The phase-encoded group 11.5.1 Biphase - mark (BI~-M) or Manchester I code 11.5.2 Biphase - level (BI~-L) or Manchester II code 11.5.3 Biphase - space (BI~-S) 11.5.4 Delay modulation (DM) or Miller code Pulse modulation 11.6.1 Pulse position modulation (PPM) 11.6.2 Pulse duration modulation (PDM) Frequency distribution Review questions

240 241 241 242 242 243 243 244 245 246

12.1 12.2 12.3

12.4

12.5 12.6

12.7 12.8

Chapter 12 ISO open systems interconnect seven-layer model Introduction Message transfer and message switching Protocol categories and operation 12.3. I Stop and wait protocol 12.3.2 Continuous protocol 12.3.3 Protocol operation Types of protocols 12.4.1 Asynchronous protocol 12.4.2 Protected asynchronous protocol 12.4.3 Character-oriented protocols 12.4.4 Byte-oriented protocols 12.4.5 Bit-oriented protocols The International Standards Organisation seven-layer model Functions of the different layers 12.6.1 Physical layer 12.6.2 Data link layer 12.6.3 Network layer 12.6.4 Transport layer 12.6.5 Session layer 12.6.6 Presentation layer 12.6.7 Application layer 12.6.8 Null layers and sublayers 12.6.9 Headers, data blocks and layers 12.6.10 General The ITU, ISO and CCITT Recommended interfaces 12.8.1 Physical layer 12.8.2 Data link layer 12.8.3 Network layer 12.8.4 Transport layer 12.8.5 Session layer 12.8.6 Presentation layer

247 247 247 248 248 248 248 249 249 249 249 251 251 251 252 252 252 252 253 253 253 253 253 253 255 255 255 255 261 268 276 277 277

Page 12: analog and digital comm techniques pdf

Contents xi

12.8.7 Application layer 12.9 ISO and CCITT recommended protocols 12.10 Review questions

278 278 278

Answers to review questions 279

Bibliography 288

Index 289

Page 13: analog and digital comm techniques pdf

This Page Intentionally Left Blank

Page 14: analog and digital comm techniques pdf

About the author

Grahame Smillie started out as a telecommunications technician in South Africa, working on transmission equipment for TELKOM SA.

In 1978 he joined the TELKOM SA training college and lectured on the National Certificate programme. After further study he gained an HND in Tele- communications and a teaching qualification. Subsequently he lectured on the HND programme as well as running training courses for the transmission staff in the company.

In 1993 he came to the UK where he is currently the BTEC EDEXCEL Higher National Diploma Engineering (Electronics & Communication) course tutor at Hull College, where the idea for the book was born. He also lectures on the BTEC EDEXCEL National Certificate and national Diploma as well as the City & Guilds programmes in electronics and telecommunications.

Page 15: analog and digital comm techniques pdf

To my wife Irene and my three children Donna, Darren and Warren. I will always cherish their support and encouragement

Page 16: analog and digital comm techniques pdf

Preface

The idea for this book was born out of the notes that I made while lecturing on the HND Engineering (Electronics & Communication) Programme. From my experiences as a lecturer I very soon realised that the text books that the students consulted were either too advanced and too mathematical, more suitable to 3-year and 4-year degree courses, or too simple in that they were orientated to the BTEC/ EDEXCEL National Diploma and National Certificate programmes.

In this book I have tried to bridge the gap between the two educational levels. Hopefully, students taking advanced GNVQ, HND and degree courses will find the information given useful and helpful in their studies. I have also tried to bridge some of the gaps between purely descriptive text with mathematical descriptions.

The knowledge gained and experiences whilst working as a technician and training officer in the telecommunications industry, together with the experience of lecturing at a further education college, equipped me to write this book

I sincerely hope that all students who use this book will benefit from the information contained within its covers.

Acknowledgements I would like to thank my colleague and friend Jane Hutchinson for proofreading the manuscript and making valuable suggestions. I also want to thank Arnold Publishers for giving me the opportunity to have this book published and for the support that they have given me.

Page 17: analog and digital comm techniques pdf

This Page Intentionally Left Blank

Page 18: analog and digital comm techniques pdf

1 Definition of terms

Knowledge is the foundation of civilisation.

1.1 INTRODUCTION

Before starting, it is necessary to discuss some fundamentals that are important in understanding analogue and digital transmission. The first area that is discussed is what is meant by frequency. Also the make-up of complex waveforms such as square and sawtooth waveforms is described. In order to understand a complex waveform a knowledge of harmonic frequencies is necessary, and this is explained.

Units of measurement are also very important, so an explanation of the gain or loss of a network is given. The discussion then includes an explanation of the decibel. Other common units such as dBm, dBr and dBmO are also discussed.

1.2 FREQUENCIES

Frequency is measured in hertz (Hz), equivalent to cycles per second: thus 1 Hz is 1 c/s. The SI measurement system is used to designate frequency ranges. The common frequency ranges with their SI symbols are given in Table 1.1.

Table 1.1 Common frequency ranges

Frequency SI symbol

1 Hz 1000 Hz 1000 000 Hz 1000 000 000 Hz

1 Hz I kHz 1 MHz 1 GHz

Page 19: analog and digital comm techniques pdf

2 Definition of terms

1.3 TYPES OF SIGNAL

There are only two different types of signal that are processed, transmitted and received by telecommunication equipment. These are analogue and digital. Each type has individual characteristics.

1.4 ANALOGUE SIGNAL

An analogue signal is defined as a continuous waveform having a positive peak and a negative peak and having an infinite range of levels. This infinite range is due to the fact that if two discrete points on the waveform are chosen then a point halfway between these two points will yield a different amplitude. If the distance between this new point and one of the previous points is halved then a new point having a different amplitude will be obtained. This process will continue an infinite number of times.

An analogue signal has no discontinuous points, i.e. it follows an unbroken curve for its full duration. Typical analogue waveforms are shown in Fig. 1.1.

+2

+1

0

-1

-2 Sine wave

+2

+1

0

-1

-2

+2

+1

0

-1

-2

Cosine wave

Sinusoidal waveform

+2

+1

0

-1

-2 Typical speech waveform

Fig. 1.1 Analogue waveforms

Page 20: analog and digital comm techniques pdf

Digital signal 3

The f requencyf of the analogue wave is determined by the following formula:

f = l _ Hz t

where t = time in seconds

The time t is the duration of one complete cycle, i.e. one wavelength. The formula used to determine the wavelength A in free space (vacuum) is as

follows:

r A=ym

where c = velocity of light in a vacuum = 3 x 108 m/s

The waveforms shown in Fig. 1.1 are shown in the time domain, which means that the amplitude is plotted against time.

A sine wave and a cosine wave consist of a single frequency. A sine wave can be described as having a start phase of 0 ~ and an initial amplitude of zero. The wave then starts to move towards the positive maximum amplitude. A cosine wave can be described as having a start phase of 90 ~ and an initial positive maximum ampli- tude. The wave then starts to move towards the zero amplitude point. A sinusoi- dal wave has a start phase anywhere from 0 ~ to 360 ~ and an initial amplitude anywhere between the positive maxima and the negative maxima. However, the sinusoidal wave follows the shape of a sine wave.

A complex wave is a wave that consists of a number of different frequencies.

1.5 DIGITAL SIGNAL

A digital signal is a complex waveform and can be defined as a discontinuous waveform having a finite range of levels.

A theoretical digital signal is shown in Fig. 1.2. At times t~, t2, t3, t4 and t5, the signal assumes two states. These states are a logic 0 and a logic 1. It can be seen that at these times the signal is discontinuous (i.e. there is a break).

A practical digital waveform is not a discontinuous waveform, but has a lead- ing edge, which is also referred to as the positive edge, and a trailing edge, which is referred to as a negative edge or lagging edge. A typical practical digital wave is shown in Fig. 1.2.

In practice the leading edge has a finite rise time and the trailing edge has a finite fall time. The rise time of the leading edge is the time taken for the output ampli- tude to rise from 10% of the final steady-state value to 90% of the final steady- state value. The fall time or decay time of the trailing edge is defined as the time taken to fall from 90% of the initial output amplitude to 10% of the initial output amplitude. The rise and decay times are shown in Fig. 1.2.

Page 21: analog and digital comm techniques pdf

4 Definition of terms

+'I +4 I +3 I +2 ',

|

+1 I 0

t o t~

Positive edge, leading edge

+4 +3 +2 +1

0 , to tl

+'I +4 +3 +2 +1

0

+5

+4 -t +3 +2 +l

0

90% of Vss

10% of Vss

Vss = Steady-state voltage i

i i i i i ii i i i | i i i i i i I i I i i i i i i i l i i i i l l i i ii i I I , , II

t2 t 3 t4 t 5 Theoretical digital signal

Negative edge, trailing edge, lagging edge

Practical digital signal

'-" t l --,

Leading edge expanded

90% of Vss

t ! - - - - -~ ' ,

Trailing edge expanded

10% of Vss

Vss = Steady-state voltage

i i ii i i I i I ii

L t6

l t6

Fig. 1.2 Digital waveforms

A digital signal has a pulse repetition time (PRT) which is the duration of one full cycle (one wavelength). The fundamental frequency (i.e. the lowest frequency in the wave) is determined by means of the following formula:

1 f = P R T Hz

1.6 WAVEFORMS

Different waveforms are produced using different harmonically related frequen- cies. The harmonic frequencies are those frequencies which are directly related to the fundamental frequency.

A fundamental frequency is the lowest frequency that exists in the complex wave and its frequency is determined by the inverse of the duration of one cycle. Some of these harmonic frequencies are given in Table 1.2.

Page 22: analog and digital comm techniques pdf

Waveforms 5

Table 1.2 Harmonic frequencies

Fundamental frequency Harmonic frequency Relationship

f~ 2nd 23q

3rd 3./i

4th 43q

5th 5fl 50th 50~

200th 200./]

1.6.1 Square wave

A square wave is made up of a fundamental frequency and all the odd harmonic frequencies. The amplitude relationship between the fundamental frequency and the harmonic frequencies is very important, as well as the initial phase rela- tionship between the different frequencies. The fundamental frequency and all the odd harmonic frequencies must be sine waves and the amplitude relationship

+1

0

-2 Fundamental frequency

L-x--:-- v Third harmonic frequency

+1

0

-1

+2

+1

0

-1

-2

+1

0

-1

Fundamental + 3rd harmonic

I_ L- 'a Fith harmonic frequency

+2

+1

0

-1

-2 Fundamental + 3rd harmonic +5th harmonic

Fig. 1.3 Construction of a square wave

Page 23: analog and digital comm techniques pdf

6 Definition of terms

must be as follows:

nth harmonic amplitude = max. amplitude off1

where J] = fundamental frequency n = harmonic number (1, 3, 5, 7 etc.)

The construction of a square wave is shown in Fig. 1.3. This figure shows the resultant of the fundamental frequency and the third harmonic frequency as well as the resultant of the fundamental frequency, the third harmonic frequency and the fifth harmonic frequency. By adding more and more odd harmonic frequencies, eventually a true square wave will result.

1 .6 .2 S a w t o o t h wave

This wave is also a complex wave consisting of a fundamental frequency and all the harmonic frequencies. Again the fundamental frequency and the harmonic frequen- cies are all sine waves. The amplitude relationship between the fundamental and the harmonic frequencies is given by the equation in Section 1.6.1. The only difference is that n = 1, 2, 3, 4, 5 etc.

+2

+I

0

-1

-2 Fundamental frequency +1

0

-1 Second harmonic frequency +3 r"

+2

+1

0

-1

- 2

- 3 L. Fundamental + 2nd harmonic +1 - f - ~ f ' ~

-1 Third harmonic frequency + 3 -

+1

0,, ~ ,-'N -1

- 2 -

-3 - Fundamental + 2nd harmonic + 3rd harmonic

Fig. 1.4 Construction of a sawtooth wave

Page 24: analog and digital comm techniques pdf

1.6.3 Noise spikes

The construction of a sawtooth wave is shown in Fig. 1.4. This figure shows the resultant of a fundamental frequency and the second harmonic frequency as well as the resultant of a fundamental frequency, a second harmonic frequency and a third harmonic frequency.

If more and more harmonic frequencies are added then a true sawtooth wave results.

+2

+1

0

-1

-2

In any communication system one of the biggest problems is noise. Noise can be caused by sudden current surges due to drastically changing loads in the supply leads. A typical noise spike is created by a fundamental frequency and all the har- monic frequencies. Again all the frequencies are sine waves but all the harmonic frequencies have the same amplitude as the fundamental frequency. This results in very narrow spikes of large amplitude.

Figure 1.5 shows the fundamental frequency, and the second, third and fourth harmonic frequencies. In this figure the fundamental and harmonic frequencies all

+2

+1

0

-1

-2 Fundamental frequency

Second harmonic frequency

+2

+1

0

-1

-2

Waveforms 7

+2

+1

0

-1

-2

Third harmonic frequency

Fourth harmonic frequency

Fig. 1.5 Fundamental and harmonic frequencies

Page 25: analog and digital comm techniques pdf

8 Definition of terms

Fig. 1.6 Resultant noise spikes

have the same amplitude. Figure 1.6 shows the resultant wave when these frequen- cies are added together. By adding more and more harmonic frequencies the spike increases in amplitude and it is reduced in width; also the ripple between the positive and negative spikes is reduced.

These noise spikes can occur in the electricity supply in the early morning when workers in heavy industry switch on their equipment, causing a sudden surge of current in the supply, and in the late afternoon or early evening when the equipment is switched off, creating a sudden drain in the current.

Other causes of noise spikes are induced voltages and currents due to lightning strikes.

1.7 MEASUREMENT OF SIGNAL LEVEL

The gain or loss of a network can be expressed as a ratio of output power over input power. If the output power is greater than the input power then the network has a power ratio > 1, which means that the network has a gain. If the output power is less than the input power then the network has a power ratio <1, which means that the network has a loss. If the power ratio equals 1 then the net- work has a unity gain.

Instead of measuring the power a signal dissipates in watts, it is easier to meas- ure the signal level. The unit of measurement is the bel, but this is a rather large unit for practical purposes, so instead the decibel is used.

Page 26: analog and digital comm techniques pdf

Measurement of signal level 9

1.7.1 The decibel

A decibel (dB) is one-tenth of a bel and can be defined as the loss or gain of a network in a logarithmic form.

Power in (Pin) [ N ~---Power out (Pout)

The loss or gain NRati o of the network shown above is given as follows:

Pout NRati~ Pin

The above equation yields a ratio as both the output power and the input power are in watts.

To enable a unit of measurement to be attached to this ratio, the following formula is used:

Pout N = 10 logl0 ~ dB

The advantage of using the decibel as a unit of measurement is that the individual gains of the individual networks can be added together instead of being multiplied together.

Example 1.1

Determine a formula for the overall gain of the three cascaded networks shown below as a ratio and in dB.

Pio i ,1 P' Poo,

PI P2 Pout NRatio = K X ~11 x p"-~

This yields the following as a ratio:

N = Pout Pin

To convert this into dB the following results:

( P, P2 Pout ) N - 10 log,o ~ x E • -~2

PI /)2 Pout N = 10 log10 ~ + 10 logl0 ~ + 10 logl0 ~ dB

Example 1.2

Calculate the gain or loss of each of the following networks in dB:

1. Input power is 4 ~tW and output power is 16 ~tW. 2. Input power is 4 mW and output power is 16 mW. 3. Input power is 4 W and output power is 16 W.

Page 27: analog and digital comm techniques pdf

10 Definition of terms

Solution

.

,

Pout 16 ~tW N = 10 logl0 ~ = 10 logI0 4 laW

N = 10 lOgl0 4 = 10 x 0.602 = 6 dB

Pout 16 mW N = 10 log10 ~ = 10 logl0 4 mW

N = 10 log10 4 = 10 x 0.602 = 6 dB

Pout _ 16 W N = 10 lOgl0 ~ - 10 logl0 4 W

N = 101og104 = 10 x 0.602 = 6dB

In this example it can be seen that the equation yields the same answer for each of the three networks. Hence the dB gives no indication of the input power or output power. In all three examples the network has a gain of 6 dB.

If the input voltage to a network and output voltage from the network are given then the equation becomes

Vo Zi N = 20 logl0 -~i + 10 log10 Zo dB

where Fo - output voltage Fi - input voltage

Zo - output impedance Zi - input impedance

If the input and output impedance of the network is the same then the equation becomes

Zo N - 20 log10 ~ dB

where 1Io = output voltage Vi = input voltage

If the input current to a network and output current from the network are given

then the equation becomes

Io Zo N - 20 log10 ~ + 10 log10 ~-i dB

where Io = output voltage Ii = input voltage

Zo = output impedance Zi = input impedance

If the input and output impedance of the network is the same then the equation becomes

Io N = 20 lOgl0 ~ dB

Page 28: analog and digital comm techniques pdf

where Io = output voltage /i = input voltage

Measurement of signal level 11

1.7.2 The dBm

This unit of measurement is used to measure the actual power at a point in a system relative to 1 mW. This indicates whether the power at the point is greater than 1 mW or less than 1 mW. The dBm is defined as the gain or loss of a network, where the reference signal power is 1 mW, and the power ratio is expressed in a logarithmic form. This is shown by

P N = 10 lOgl0 1 mW dBm

Example 1.3

Determine the signal level for each of the following signal powers in dBm:

1. 4laW 2. 16~tW 3. 4 m W 4. 16mW

P =101oglo41aW 1. N = 10 logl0 1 m-----W 1 mW

N = 10 loglo 0.004 = -23.98 dBm

P =101ogl016~tW 2. N = 10 logl0 1 m-----W 1 mW

N = 10 logl0 0.016 = - 17.96 dBm

P 4 m W 3. N = 10 loglo 1 m-----W = 10 loglo I mW

N = 10 logt0 4 = 6 dBm

P 4. N = 10 logl0 1 mW = 10 loglo 16 mW

1 mW

N = 10 loglo 16 = 12 dBm

As can be seen in the above example the level in dBm indicates the actual

power in the signal relative to 1 roW. Table 1.3 illustrates this relationship more clearly.

From this it can be seen that the dBm is used to measure the amount of power at a point in a system.

Refer to Fig. 1.7; the input signal power at the origin of the system is 100 I~W, which is a level of - l0 dBm. The origin of the system is also referred to as the zero test level point (0 TLP). The total loss of the local telephone exchange and the

Page 29: analog and digital comm techniques pdf

Table 1.3 Relat ionship between power and dBm

Power (mW) Level (dBm)

16 +12

8 +9

4 +6

2 +3

1 0

0.5 - 3

0.25 - 6

0.125 - 9

0.0625 - 1 2

100 laW Signal power

-10 dBmO

0 dBr Test point

-10dBm Signal level

Origin [

Loss = 10 dB

Local' ' National telephone ~ dial exchange exchange

10laW 19.95 nW 6.31 nW

-10 dBmO -10 dBmO -10 dBmO

-10 dBr -37 dBr -42 dBr

-20 dBm -47 dBm -52 dBm

31.62 pW Signal power

-10dBmO

-65 dBr Test point �88

-75 dBm Signal level

T" T ', fc c 420 kHz

fc I 1116kHz I

Loss - 27 dB Loss = 5 dB fi ~

I 4332 kHz

Loss = 23 dB

Channel , Group Supergroup translation , translation translation

stage ' stage stage

Fig. 1.7 Power losses through a telephone system

Page 30: analog and digital comm techniques pdf

Review questions 13

national dial exchange is 10 dB. The resultant signal power at the audio-in point is 10 ~tW, which is equivalent to a signal level o f - 2 0 dBm.

The channel presents a loss of 27 dB and as a result the signal power at the output of the channel translation stage is 19.95 nW, which equates to a signal level o f - 4 7 dBm. The group translation stage presents a loss of 5 dB and as a result the signal power at the output of the group translation stage is 6.31 nW, which equates to a signal level o f - 5 2 d B m . The supergroup translation stage presents a loss of 23 dB, which means that the output signal power from this stage is 31.62 pW, which equates to a signal level o f - 7 5 dBm.

1.7.3 The dBr

This unit of measurement is used to indicate the level at a point in a system relative to a level of 0 dBm being sent at the origin of the system or 0 TLP. Refer to Fig. 1.7; the total loss that is caused by the local telephone exchange and the national dial exchange is 10 dB. As can be seen in the figure, the level at the audio-in point relative to the 0 TLP is -10 dBr.

The loss presented to the signal by the channel is 27 dB, hence the level at the output of the channel translation stage relative to the 0 TLP is -37 dBr. The group translation stage presents a loss of 5 dB to the signal, hence the level at the output of the group translation stage relative to the 0 TLP is -42 dBr.

The loss presented to the signal by the supergroup translation stage is 23 dB, hence the level at the output of this stage relative to the 0 TLP is -65 dBr.

1.7.4 The dBmO

This signal level is determined by

N = (N dBm - N dBr) dBmO

As can be seen in the above equation, it is the difference between the level in dBm and the level in dBr. It should be the same at every test point in a system for the same signal. A practical example of its usage is the half-power points of a filter. These points are often referred to as the 3 dB down points; a more correct way to designate these points is as the - 3 dBmO points.

By referring to Fig. 1.7 it can be seen that the dBmO level at each test point is exactly the same. This unit of measurement is often used in fault finding to isolate a faulty piece of equipment in a system.

1.8 REVIEW QUESTIONS

1.1 Describe the relationships that must exist between a fundamental frequency and the harmonic frequencies for a square wave.

1.2 Describe, with sketches, the construction of a sawtooth wave.

Page 31: analog and digital comm techniques pdf

14 Definition of terms

1.3 Define each of the following: (a) A sine wave. (b) An analogue signal. (c) A digital signal.

1.4 Describe why noise spikes are so troublesome to telecommunication signals. 1.5 Calculate the gain or loss in dB for each of the following:

(a) Input RMS voltage is 3.4mV, output RMS current is 2.5mA, input impedance is 550 f~ and the output impedance is 220 f~.

(b) The input power is 25 mW and the output power is 2.5 mW. (c) The input RMS current is 2.4 mA and the output peak current is 5 mA.

The input and output impedance of the network is the same. 1.6 Calculate the signal level in dBm for each of the following:

(a) 5.5 mW. (b) 6.4 V RMS across 600 f~. (c) 0.8 mA RMS into 350 f~.

Page 32: analog and digital comm techniques pdf

2 Analogue modulation principles

Technology can help improve the quality of life.

2.1 INTRODUCTION

In order to understand how transmission systems translate the input frequency band to a higher frequency band it is necessary to understand the fundamentals of modulation and modulators. It is also necessary to understand the demodula- tion process and demodulators.

Firstly, the products of modulation for amplitude modulators are shown very clearly by means of line graphs in this chapter. The line graph is also used to describe the concepts behind frequency division multiplexing. Practical modula- tors produce products of modulation that are different to the theoretical model. The necessity for things such as single sideband transmission with suppressed carrier on high-quality media is explained and the resultant advantages that this gives.

Secondly, the principle of frequency modulation is necessary as this modulation technique is used extensively in microwave and satellite systems. A brief intro- duction to frequency modulation is given in this chapter.

Thirdly, the principle of phase modulation is necessary. Adaptations of phase modulation are used extensively in digital systems. This chapter also gives a brief introduction to the concept of phase modulation.

2.2 FREQUENCY BAND CLASSIFICATIONS

The electromagnetic spectrum consists of frequencies from just above 0 Hz to cr Hz. The frequency spectrum is broken up into different segments which indicate the usage for particular frequency range. Table 2.1 gives the classification of the different frequency bands as used in telecommunications.

Page 33: analog and digital comm techniques pdf

16 Analogue modulation principles

Table 2.1 Classification of frequency bands

Frequency band Classification Abbreviation

20 Hz-21 kHz Audio frequency band - 300 Hz-3.4 kHz Commercial speech band AF

10 kHz-30 kHz Very low frequencies VLF 30 kHz-300 kHz Low frequencies LF

300 kHz-3 MHz Medium frequencies MF 3 MHz-30 MHz High frequencies HF

30 MHz-300 MHz Very high frequencies VHF 300 MHz-3 GHz Ultra high frequencies UHF

3 GHz-30 GHz Super high frequencies SHF 30 GHz-300 GHz Extra high frequencies EHF

The frequency band of 20 Hz to 21 kHz is the total band that the human ear can hear. However, very few people are capable of hearing this full range. In modern society there is a lot of manmade noise. The amplitude of this noise is partially responsible for desensitising our ears to the full range of frequencies that we should be able to hear. Ageing causes the ear to hear less of the frequency range. This means that as people age the bandwidth of their ears decreases, such that people stop heating the higher frequencies in the frequency band.

The frequency band 300 Hz to 3400 Hz is referred to as the commercial speech band because this is the band that ITU recommended for use for the conveyance of speech over commercial telephony circuits; it is also referred to as the audio frequency (AF) band. When the CCITT 1 conducted tests it was found that speech could be conveyed and still be totally intelligible in a limited band of 3.1 kHz (300 Hz to 3400 Hz). However, for the conveyance of music either a 10 kHz or preferably a 15 kHz band is necessary. The CCITT discovered that the fundamental frequency of the average male voice was around 800 Hz and that of the average female was around 1 kHz.

The VLF band is used for communication under the sea and in deep mines. The sizes of the aerials to transmit these frequencies are too large to make it viable for communication through the air.

The LF, MF, HF and VHF bands are used by commercial radio stations to convey programmes from the studio to listeners.

The VHF and UHF bands are used by commercial TV stations to convey television pictures from the studio to viewers.

The SHF band is used for direct line-of-sight communication by means of microwaves. This is used by companies such as BT. This band is also used for satellite communication.

The EHF band is still largely experimental, except for the frequency range of light which is used in optical fibres.

I The Consultative Committee of International Telegraphy and Telephony (see Section 12.7).

Page 34: analog and digital comm techniques pdf

Ampfitude modulation 17

2.3 MODULATION TECHNIQUES

The fundamental reason for modulation is to enable efficient use of the available frequency spectrum, on a particular medium, that is used for the communication. As a result many different modulation techniques have been developed. Each method has advantages and disadvantages, and some methods are easier to implement than others. Some modulation techniques favour one type of medium rather than another type.

All the different modulation techniques can be classified under the following main headings:

1. Amplitude modulation schemes. 2. Angle modulation schemes composed of:

(a) Frequency modulation. (b) Phase modulation.

3. Composite modulation schemes composed of: (a) Pulse position modulation. (b) Pulse width modulation. (c) Pulse amplitude modulation. (d) Pulse code modulation. (e) Delta modulation. (f) Phase shift key modulation. (g) Frequency shift key modulation. (h) Quadrature amplitude modulation.

2.4 AMPLITUDE MODULATION

In amplitude modulation, the amplitude of the carder frequency is made to vary in sympathy with the amplitude of the modulating signal. A true amplitude modulator produces a waveform that is shown in Fig. 2.1. The carder frequency is designated as fc and the modulating frequency is designated as fa. Notice the variation of the amplitude of the carrier frequency. The shape of the resultant envelope is the same as that of the modulating frequency. Figure 2.1 shows a single modulating frequency. In practice the modulating signal will be a band of frequencies. This band of frequencies could be the commercial speech band which is used over a telephone network.

The mathematical relationship is given by

V i - - [A(t) + Vc] sinnwt

where Vc is the peak amplitude of the carrier frequency, the instantaneous ampli- tude of the modulated signal is vi and the instantaneous amplitude of the carrier frequency vc is given by

Vc = Vc sin n~vt

Page 35: analog and digital comm techniques pdf

+2

+1

0

-1

-2

18 Analogue modulation principles

+2

+1

0

-1

-2

Modulating frequency

-

Carrier frequency

0 +1 +2 +3 +4 +5 +6 +7 +8 I " . ! I I I I I

+4

+3 , ," "

+2 "

+1 ~ ..-

~ | s s

-2 t t S

- 3 , " , . ,

--4 " " " . - " Amphtude modulation waveform

+9 +

s

0 +11 +12 . ! I

1

s t

s

Fig. 2.1 Amplitude modulation

The instantaneous amplitude of the modulating frequency is given by

Va = fa(/)

As [fa(t)+ Vr is time dependent, this results in the amplitude of the carrier frequency being a function of the amplitude of the modulating frequency.

The complex waveform shown in Fig. 2.1 contains the following products of modulation:

�9 The cartier frequency. �9 The lower sideband. �9 The upper sideband.

The symbol for the modulator is shown in Fig. 2.2. Notice that the arrow points in the direction of the propagation of the information.

2.4.1 Sidebands

The upper sideband is determined by means of the following:

USB = A + f a

Page 36: analog and digital comm techniques pdf

Amplitude modulation 19

+3

+2

+1

0

i i i i i i i

, A ii, 1

Intput

fa

I, . , ! i 2 3 4

S y m b o l

I Carrier frequency

fc

I I

5 6

Line graph

Output

fc, LSB, USB

I L S B I U S B i

7 8 9 10

I I

11 12

+5

+4

+3

+2

+1

. . - " !

- i

. !

_. . . - ' " /, ,, i

! !

; I I I , , i ! i

' 1 2 3 ' 4 ! ! !

I 3.4 kHz . . . . . "

' 0.3 kHz

f<

LS. S , us. ! I I I

' i i "

5 6 7 , 8 ' 9 10 11 ! ! i

i i i

, 7.7 kHz . . . . . 11.4 kHz ! |

. . . . . . 4.6 kHz . . . . 8.3 kHz

Line graph

Fig. 2.2 Line graphs for double s ideband t ransmission

I

12

The lower sideband is determined by the following:

LSB = I fc- fa[

The modulus is taken so as to produce a positive result. At a demodulator the modulating frequency is sometimes higher than the carder frequency. To ensure that the answer is positive the modulus is taken as there are no negative fre- quencies. The frequency starts at just above 0 Hz and increases in a positive direction.

Example 2.1

Determine the frequency of the lower sideband and upper sideband for an ampli- tude modulator where the carrier frequency is 8 kHz and the modulating frequency is 1 kHz.

Page 37: analog and digital comm techniques pdf

20 Analogue modulation principles

Solution

The upper sideband:

USB =f~ +fa

= 8 kHz + I kHz

= 9 kHz

The lower sideband:

LSB = I f c - f a [

= 18 kHz - 1 kHz I

= 7 kHz

Example 2.2

Determine the frequency band of the upper sideband and the lower sideband for an amplitude modulator having a carrier frequency of 8 kHz and a modulating

signal of 300 Hz to 3400 Hz.

Solution

The upper sideband:

USB =f~ +fa

= 8 kHz + (0.3 kHz ,--, 3.4 kHz)

= 8 kHz + 0.3 kHz +--, 8 kHz + 3.4 kHz

= 8.3 kHz ~ I 1.4 kHz

The lower sideband:

LSB = I L - A I

= 1(8 kHz - 0.3 kHz ~ 8 kHz - 3.4 kHz)[

= 7.7 kHz ~ 4.6 kHz

= 4.6 kHz ~ 7.7 kHz

2.4.2 Line graph

A line graph is a tool that is used to graphically show the products of modulation. Figure 2.2 shows the line graphs for Examples 2.1 and 2.2. Notice that the arrow- head points in the direction of the lowest frequency that produced that particular frequency. In Example 2.2 the frequencies of 7.7 kHz and 8.3 kHz are produced by the 300 Hz component. The arrowhead indicates this fact. The frequencies of

Page 38: analog and digital comm techniques pdf

Amplitude modulation 21

4.6 kHz and 11.4 kHz are produced by the 3.4 kHz component. The backs of the arrows indicate this.

2 .4 .3 Sideband transmission

The example shown in Fig. 2.2 is for double sideband (DSB) transmission. Double sideband transmission is wasteful of the frequency spectrum as the same informa- tion is carried in the USB and the LSB. In practice, on very good media only one of the sidebands is sent, and this is known as single sideband (SSB) transmission. On large-capacity point-to-point systems the carrier frequency is suppressed at the transmitter and reintroduced at the receiver. This means that only the one sideband is transmitted over the media.

This method of transmission is illustrated in Fig. 2.3. Notice that this filter at the output of the modulator either selects the USB or the LSB.

Audio input Audio Amplitude Output RF filter amplifier modulator filter amplifier

Audio i n p u t - - ~ ~ [ ~ > ~ ~ ~ [ ~ ~ [ ~ RFoutput,

Point A Point B Point C Point D

Carrier frequency

0 : 1 ! ! !

. . . . 0.3 kHz

[ I I I I I I I I 2 3 : 4 5 6 7 8 9 10 11

3.4 kHz Frequency band at point A

fc

! 2 3 4 ' 5 6 7 ' ,8 ' 9 10 I1

i

' 7.7 kHz ', 11.4 kHz ' 4.6 kHz " - - - 8.3 kHz

Frequency band at point B

I I I ,,, I - - I ~ I I I 2 3 4 ' 5 6 7 : 8 9 10 11

i !

, 7.7 kHz . . . . ' 4.6 kHz

Frequency band at point C and D LSB selected and suppressed carrier

I I 0 1

I I 0 1

! I I I I I I I 0 1 2 3 4 5 6 7

USB I ~ I I I 8 ', 9 10 11

I

, 11.4 kHz " - - - 8.3 kHz

Frequency band at point C and D USB selected and suppressed carrier

I 12

I 12

I 12

I 12

Fig. 2.3 Line graphs for single sideband transmission

Page 39: analog and digital comm techniques pdf

22 Analogue modulation principles

Example 2.3

Transmitter: a carrier frequency of 108 kHz and a modulat ing frequency of

0.3 kHz to 3.4 kHz is applied to an amplitude modulator . The USB and the

LSB are both transmitted to the distant receiver, with a suppressed carrier.

Receiver: the resultant USB and LSB from the transmitter are input to an

amplitude demodulator . A carrier frequency of 108 kHz is reintroduced to the

demodulator .

Determine the following:

1. The LSB and USB at the output of the modulator .

2. The LSB and USB at the output of the demodulator .

Solution

1. Transmitter The upper sideband:

USB =f~ +A

= 108 kHz + (0.3 kHz ~ 3.4 kHz)

= 108 kHz + 0.3 kHz ~ 108 kHz + 3.4 kHz

= 108.3 kHz +-+ 111.4 kHz

The lower sideband:

LSB = ] f e - f a l

= 1(108 kHz - 0.3 kHz ~ 108 kHz - 3.4 kHz)[

= 107.7 kHz ~ 104.6 kHz

= 104.6 kHz ~ 107.7 kHz

This is shown in Fig. 2.3.

2. Receiver Received band = 108.3 kHz to 111.4 kHz. The upper sideband"

USB = A + A

= 108 kHz + (108.3 kHz ~ 111.4 kHz)

= 108 kHz + 108.3 kHz ~ 108 kHz + l 11.4 kHz

= 216.3 kHz +-, 219.4 kHz

The lower sideband:

LSB = I f c - f a l

= I(108 kHz - 108.3 kHz ,--* 108 kHz - 111.4 kHz) l

= 0.3 kHz ~ 3.4 kHz

Page 40: analog and digital comm techniques pdf

Ampfitude modulation 23

Received band = 104.6 kHz to 107.7 kHz. The upper sideband:

usa=A+A = 108 kHz + (104.6 kHz ~ 107.7 kHz)

= 108 kHz + 104.6 kHz ~ 108 kHz + 107.7 kHz

= 212.6kHz ~ 215.7 kHz

The lower sideband:

LSB = I f c - A [

= [(108 kHz - 107.7 kHz ~ 108 kHz - 104.6 kHz)[

= 0.3 kHz ~ 3.4 kHz

From the above it can be seen that when the USB from the transmitter is demodulated and the LSB taken a band of 0.3 kHz to 3.4 kHz is yielded. When the LSB from the transmitter is demodulated and the LSB also taken then the band of 0.3 kHz to 3.4 kHz results.

The USB that results when the USB from the transmitter is demodulated is a frequency range beyond human heating and of such a high frequency that it will not be able to propagate down the telephone cable pair effectively. The same applies to the USB that results when the LSB from the transmitter is demodulated.

As can be seen the USB and LSB at the transmitter carry the same information and hence it is not necessary to transmit both sidebands over the medium, such as

a point-to-point circuit working over a metallic pair. Single sideband transmission results in a more efficient use of the available frequency spectrum, as only 4 kHz need be allocated to each channel instead of 8 kHz. This means that twice the number of SSB channels can be used when compared to DSB channels in the same frequency band.

2.4.4 Comparison of single sideband and double sideband transmission

A comparison of SSB and DSB transmission given in Table 2.2. This table shows the advantages of using single sideband transmission. Over poor quality media,

however, it is preferable to use DSB and at the receiver select either the USB or

Table 2.2 Comparison of SSB and DSB

Advantages of SSB

Bandwidth

Power

Requires at most half the bandwidth of DSB for the same information. Allows better use of the available frequency spectrum.

Requires less power than DSB, which leads to: Increased transmitter efficiency. Reduced amplifier distortion.

Page 41: analog and digital comm techniques pdf

24 Analogue modulation principles

the LSB at the input to the demodulator. The selection is based on the amount of noise in the two bands as well as the signal strength in the two bands.

2.5 FREQUENCY DIVISION MULTIPLEXING

2.5.1 Introduction

Frequency division multiplexing (FDM) is used to enable the frequency spectrum of a particular medium to be efficiently used. There are a number of different systems on which FDM is used. Some of these systems are listed below:

�9 3-channel �9 12-channel �9 12-channel �9 12-channel �9 18-channel

�9 960-channel �9 900-channel �9 1800-channel

�9 2700-channel

open wire system. low-frequency open wire system. high-frequency open wire system. carrier on cable system. rural carrier system. coaxial cable system. coaxial cable system. coaxial cable system. coaxial cable system.

All the above systems are point-to-point analogue systems where each channel uses the commercial speech band.

Only the 2700-channel coaxial cable system will be discussed.

2 . 5 . 2 12 M H z c o a x i a l c a b l e s y s t e m

Figure 2.4 shows a typical coaxial cable system which uses FDM. With FDM each channel is permanently allocated a particular frequency band for all time on the common transmission medium, irrespective of whether the channel is used to convey valid information or not.

The system is based on a basic group which comprises 12 channels. The com- mercial speech band (0.3 kHz to 3.4 kHz) is applied to the input of each channel. The carrier frequencies for the individual channels are given in Table 2.3.

For practical purposes the commercial speech band is considered to have a band width of 4 kHz. The actual bandwidth is 3.1 kHz. But it must be remem- bered that space must be left on each side of the band to ensure that the filter can select the appropriate band from the complete frequency range.

All the carrier frequencies and frequency bands are CCITT recommended. Since the time when the recommendations for FDM systems were laid down, CCITT has changed and become part of the ITU.

As can be seen in Table 2.3 the LSB is selected at the output of each channel. The carder frequency is also suppressed, so the resultant band is 60 kHz to

108 kHz.

Page 42: analog and digital comm techniques pdf

Supergroup translation

stage

Channel translation

stage r - �9

CH 1

~,1o4~z I Group

~,~,~z I

translation stage

fc 1100 kHz I ~ �9 Major group rGR 1 SG 7 I translation

N ~ ~ stage ~ 9 ~ z ! ~ ~ . ~ .

fc N ~ 8 .448 M _~ fc' 468 kHz I

~~z I ~ fc--~16--~z [ ~ ~ ~

~ .f336 MH t~ "~ SG 11 I "~ 12

.......... fc ' 80 kHz ] fc '612 kHz [ "" CH 9 [ n,,~,, h.,,,a

fc'64 kHz

Base band ~ 312kHzto 120241dtz

(2700 channels)

fr 14340 kHz

Fig. 2.4 Frequency division multiplexing

Page 43: analog and digital comm techniques pdf

26 Analogue modulation principles

Table 2.3 Carrier frequencies for 12-channel groups

Channel number Carrier frequency Output frequency band (kHz) (kHz)

1 108 104-108 2 104 100-104 3 100 96-100 4 96 92-96 5 92 88-92 6 88 84-88 7 84 80-84 8 80 76-80 9 76 72-76

10 72 68-72 11 68 64-68 12 64 60-64

The output of the channel translation stage is fed into the group translation stage. The group translation stage consists of five groups and forms a basic super- group. A basic supergroup consists of 60 channels (five groups • 12 channels per group). The carrier frequencies and resultant frequency bands are shown in Table 2.4. Note that the input modulating frequency band is from 60 kHz to 108 kHz, which gives a bandwidth of 48 kHz (12 channels x 4 kHz per channel). The 60 kHz to 108 kHz is the output of the channel translation stage.

The LSB is again taken at the output of each group card and again the carrier frequency is suppressed. The frequency band of 312kHz to 552kHz, which is a bandwidth of 240 kHz (five groups x 48 kHz per group), is sent to the supergroup translation equipment where a basic major group is formed. A basic major group consists of 15 supergroups, which is equivalent to 900 channels (15 supergroups x 5 groups/supergroup x 12 channels per group).

The carrier frequencies for the supergroups and the resultant frequency band is given in Table 2.5. Note that the output of the group translation stage is 312 kHz to 552 kHz. This is a basic supergroup and this is the modulating frequency band that is fed into each supergroup translation card.

Table 2.4 Group cartier frequencies and output frequency bands

Group No. Cartier frequency Output frequency band (kHz) (kHz)

1 420 312-360 2 468 360-408 3 516 408-456 4 564 456-504 5 612 504-552

Page 44: analog and digital comm techniques pdf

Frequency division multiplexing 27

Table 2.5 Supergroup carrier frequencies and output frequency bands

Supergroup No. Carrier frequency Output frequency band (kHz) (kHz)

2 - - 312-552 3 1116 564-804 4 1364 812-1052 5 1612 1060-1300 6 1860 1308-1548 7 2108 1556-1796 8 2356 1804-2044 9 2604 2052-2292

l0 2852 2300-2540 II 3100 2548-2788 12 3348 2796-3036 13 3596 3044-3284 14 3844 3292-3532 15 4092 3540-3780 16 4340 3788-4028

The LSB is selected at the output of each supergroup card and again the carrier is suppressed. The resultant band of 312 kHz to 4028 kHz is sent to the major group translation stage. The major group translation stage accepts three basic major groups. The carrier frequencies and resultant frequency bands are given in Table 2.6.

The LSB is selected at the output of major groups 2 and 3. Major group 1 is unmodulated and is only combined with the modulated outputs of the other two major groups. The resultant baseband is from 312 kHz to 12 024 kHz. This band is now sent to the terminal equipment where it is amplified and then trans- mitted down the coaxial cable.

A coaxial cable, such as that used to connect a TV aerial to a TV receiver, is made up of a thick cylindrical copper conductor in the centre which is surrounded by a copper sheath. The inner conductor is prevented from touching the outer sheath by means of spacers, i.e. insulation material placed around the inner conductor. This construction is sometimes referred to as a coaxial tube.

Table 2.6 Major group carrier frequencies and output frequency bands

Major group No. Cartier frequency Output frequency band (kHz) (kHz)

1 - - 312-4 028 2 8 448 4 420-8 136 3 12 336 8 308-12 024

Page 45: analog and digital comm techniques pdf

28 Analogue modulation principles

x•3.4 kHz 0.3 kHz

Basic

major group Base band

4028 12024 i

/ SG 16 Basic group / 37~

~ SGI5 4 - - 108 3540 . ~ L CHI ~ 3532 MG 3

--, 104 SG 14 ~(./.~ CH 2 3292

~ , 3284 100 Basic SG 13

: CH3 supergroup 3044 "~ 8308 ~/3036

~ CH4 ~ i i ~ 5 5 2 2 / S G 1 2 8136 92 GR 5 z- 2796

, ~ : /2788 ' CH 5 504 / 1 S G 11 88 GR 4 ~~.__~ CH 6 456 'zk"! 2548 ! /~ 2540 84 MG 2

CH 7 GR 3 ' 7 I SG l0 80 408 , , ~ ~390 ~

~ / [SG9 76 360 "" Z----! 2052 CH9 GRI ; A2044 4420 72 312 ~ / [SG 8 4028 CH 10 Group lz--I 1804 / ~ : /11796 68 translation I / I SG 7 6c4 ni l CH 12 , / 1548

,. . ~ :,-:t 60 I Z.... SG 6 MG 1 l 1308

1300 Channel translation 12 channels

Z ! !

t I ! : /

) ) , / !

!

!

! . . . . .

SG 5 1060 1052 SG 4 812 804 SG 3 564 552 SG 2 312

Supergroup translation

900 channels

/ 312

Major group translation

2700 channels

Fig. 2.5 Line graph for a 12 MHz coaxial system

For a high-capacity 12 MHz coaxial cable system two tubes are used, one for each direction of transmission. This means that each channel works on a four- wire basis. This system has a channel capacity of 2700 channels.

Figure 2.5 shows the line graph for the 12 MHz FDM system described above. Notice the sideband inversion due to the LSB being selected at the output of each stage, and being passed to the next stage.

2.6 MODULATION DEPTH

The modulation depth, sometimes referred to as the modulation index, is normally measured as a percentage. The modulation depth is a measure of the efficiency of the modulator. All modulators must be protected from overmodulation, which

Page 46: analog and digital comm techniques pdf

Modulation depth 29

occurs when the input signal becomes too large. Such high-amplitude signals can damage the modulator. Overmodulation produces frequency components that can interfere with other circuits. This means that the output bandwidth is increased. Overmodulation also results in less power in the desired sidebands.

2.6 .1 M a t h e m a t i c a l t rea tment

The modulation depth is given by

maximum ampl i tude- minimum amplitude m = x 100%

maximum amplitude + minimum amplitude

= (Vc + v . ) - ( vr v . ) • lOO% (vr + v.) + (vr v.)

( vr v . - vr v~) = x 100%

(Vc+ Va+ Vc-- Va)

- - 2Vax 100% 2Vc

Va x 100% vr

where Vr is the peak amplitude of the cartier frequency and V~ is the peak ampli- tude of the modulating signal.

Example 2.4

Determine the modulation index for an amplitude modulator when a carrier fre- quency having peak amplitude of 2 V is modulated with a modulating frequency having a peak amplitude of 1.5 V.

So/m/on

v~ m = --~r 100%

1.5V = x 100%

2.0V

= 75%

2 .6 .2 O v e r m o d u l a t i o n

Overmodulation occurs when the modulation depth is greater than 100%. Figure 2.6 shows 100% modulation. It would be reasonable to assume that all amplitude modulators should operate at this depth. This is in fact false, as the modulation index must allow for a variation in the amplitude of the input

Page 47: analog and digital comm techniques pdf

30 Analogue modulation principles

Fig. 2 .6

+2

+1

0

- I

- 2 Modulat ing frequency

+ RAAAAAAAAAAA +I

0

-ltVVVVVVVVVVVV - 2

Carrier frequency

0 +1 +2 +3 +4 +5 +6 +7 +8 +9 + 0 +11 +12 I - - I ' - - ' - ' ' ' ' ' ' ' ' '

+4 . ' " - - . . " " ,

+3 " '" "" " ' ,

s t t

+1 ". .

-2_3 ... . . ,, "'" " " " . . . , , -

- 4 Ampl i tude modulat ion w a v e f o r m

O n e - h u n d r e d p e r c e n t m o d u l a t i o n

signal and still ensure that overmodulation does not take place. Not all people talk over the telephone with the same average loudness; some talk very softly and some very loudly. The amplitude modulators must not cause overmodulation in either case. They should also not cause unnecessary distortion in the output signal relative to the input signal. As a result, practical amplitude modulators are set up to work with a modulation depth of between 70% and 80%.

Overmodulation causes frequencies to appear in the output signal other than the expected products for the modulator. It results in increased bandwidth requirements, and less power in the desired sidebands. A typical overmodulation waveform is shown in Fig. 2.7.

Example 2.5

Calculate the modulation depth for an amplitude modulator where the carrier frequency has a peak-to-peak amplitude of 500 mV and the modulating frequency has a RMS amplitude of 194.45 mV.

Page 48: analog and digital comm techniques pdf

Modulation depth 31

+2

+1

0

-1

-2 Modulating frequency

+2

+1

0

-1

-2

-3

--4

+ AAAAAAAAAAA+' 0 -ILVVVVVVVVVVVV

-2

Carrier frequency

0 + 1 +2 +3 +4 +5 +6 +7 +8 +9 + I 0 + 11 + 12 + 4 ~ i i' i ..... i i i i i i i ' i ;

+ 3

�9 . --...V V

Amplitude modulation waveform

Fig. 2.7 Overmodulation

Solution

Convert to the same unit o f measurement:

Vap=k-- VaaMs •

= 194.45 m V x v/2

- 274.994 m V

cpeak-to-peak

2 5 0 0 m V

= 250 m V

m = -~--~c x 1 0 0 %

274.994 m V

2 5 0 m V

= 109.998%

x 100%

This example demonstrates h o w overmodula t ion can take place.

Page 49: analog and digital comm techniques pdf

32 Analogue modulation principles

2.6.3 Power in the sidebands and carrier frequency

A second important parameter is the actual power that exists in each sideband and the amount of power that exists in the carrier. The relationship between the total power dissipated, the power in the carrier frequency and the power in the sidebands is given by

PT -- Pc + PUSB + PLSB

The power in the carrier frequency (Pc) where the carrier amplitude is given as a peak voltage (Vc) is given by

PC _m

(v~ .~) 2

load impedance

But

Therefore

G

Pc =

The power in each sideband is given by:

PUSB -- PLSB --

8R

R (G) 2

2R

R

Therefore the power in both sidebands is given by"

2m 2 Vc 2 PSB = 8R

m 2 Vc 2

4R

But the total power dissipated is given by:

PT = Pc + PUSB + PLSB

= Pc + PSB

V 2 m 2 V 2 c = I

2 R 4 R

=2R I+T

Page 50: analog and digital comm techniques pdf

Modulation depth 33

The equations given above can only be used when the voltage of the cartier is given as a peak voltage.

The efficiency r /of the modulator is measured by the ratio of the power in the sidebands to the total power dissipated:

PSB r / = - ~ r x 100%

E x a m p l e 2 .6

A sinusoidal modulating frequency is modulated with a carder frequency having a peak voltage of 8 V. The output is connected to a 5 kf~ load. Determine each of the following:

1. The power in the carrier frequency. 2. The power in each sideband. 3. The power in both sidebands. 4. The total power. 5. The efficiency of the modulator.

For each of the following modulation indexes m: 25%, 50%, 75%, 100%.

Solution

m = 25%"

,

,

~

(G) 2

P c = 2R

(8) 2

2 x 5000

64 = = 6.4 mW

10 000

m 2 V 2 PUSB = PLSB = 8R

0.252 x 82

8 x 5000

0.0625 x 64 = = 0 .1mW

40 000

PSB = PUSB + PLSB

= 0.1 m W + 0.1 m W = 0.2 mW

Ptotal = PSB + Pc

= 0.2 mW + 6.4 mW = 6.6 mW

Page 51: analog and digital comm techniques pdf

34 Analogue modulation principles

~

m = 50%"

11,

0

~

.

m = 75%"

11

.

.

r / = PSB x 100% Pr

0 . 2 m W

6 . 6 m W x 100% = 3%

P c = 2R

= 6 . 4 m W

PUSB -- PLSB = mEV~ 2

8R

0.52 x 8 z

8 x 5000

0.25 x 64 = = 0.4 m W

40 000

PSB ---- Puss + PLSB

= 0.4 m W + 0.4 m W = 0.8 m W

Ptotal = PSB + Pc

= 0.8 m W + 6.4 m W = 7.2 m W

Psn x 100% r / = PT

0.8 m W

7 . 2 m W x 100% = 11%

Pc = 6.4 m W

PUSB -- PLSB -- mZVc z

8R

0.75 z x 8 2

8 x 5000

0.5625 x 64 = = 0.9 m W

40 000

PSB ----- PUSB + PLSB

= 0.9 m W + 0.9 m W = 1.8 m W

etotal "- Pss + Pc

= 1.8 m W + 6.4 m W = 8.2 m W

Page 52: analog and digital comm techniques pdf

Practical circuits 35

0

m = 100%:

PSB T/= -~x x 100%

1.8 mW 8.2 mW -- - - - - - - x 100% = 22%

0

0

Pc = 6.4mW

mEVr 2 Pusa = PLSB = 8R

12• = = 1.6mW

8 x 5000

Psn = PusB + PLSB

= 1.6mW + 1.6mW = 3.2mW

0 Ptot~] = Psa + Pc

= 3.2 mW + 6.4 mW = 9.6 mW

0

PSB r /= -~x x 100%

3.2mW = x 100% = 33%

9.6mW

This example shows that at a modulation depth of 100% the power in both side- bands is only 33 % of the total output power. This means that the power in each sideband is only 16.5%. Also shown is that the lower the modulation depth the lower the percentage power in the sidebands. These two facts indicate the disadvantages of amplitude modulation.

2.7 PRACTICAL CIRCUITS

Only diode modulators are considered here. In practice either unbalanced or balanced amplitude modulators are used. The types of circuits discussed are:

�9 Ring modulators, single and double balanced. �9 Cowan modulator (a single balanced circuit).

2.7.1 Single balanced modulators

Ring modulator Figure 2.8(a) shows a typical single balanced ring modulator. Note where the modulating frequency and the carrier frequency are applied. The carrier frequency is used to either forward bias or reverse bias the two diodes. When the diodes are forward biased by the cartier frequency, the modulating frequency passes through

Page 53: analog and digital comm techniques pdf

36 Analogue modulation principles

(a)

, , ~

fa f~

L

(b)

Sss ~~

"'~x .., " . . - - . - " " "sss S

(c)

I r i o , ! 2 3 '

', 3.4 kHz . . . . . . ' i . . . . 0.3 kHz

L

LSB ~ ~ " J USB

I I I | " ',1" r I I I 5 6 7 ' ,8 ' 9 10 I1

7.7 kHz - - - ' ' 11.4 kHz 4.6 kHz '---- 8.3 kHz

Fig. 2.8 Single balanced ring modulator: (a) circuit; (b) output waveform; (c) products of modulation

to the output. When the diodes are reverse biased by the carrier frequency, the modulating frequency is prevented from reaching the output. The resultant output waveform and line graph are shown in Fig. 2.8(b) and (c). In this figure the carrier frequency is assumed to be 8 kHz and the modulating signal is the

commercial speech band. In this case the products of modulation are the modulating frequency, the lower

sideband and the upper sideband, as shown in the line graph. The carrier fre- quency itself is suppressed through the modulator.

Cowan modulator Figure 2.9 shows a typical single balanced Cowan modulator. The line graph of the output products is also shown. When the diodes are forward biased by the carrier frequency, the diodes apply a short circuit to the analogue input thus pre- venting any signal from appearing at the output. When the diodes are reverse biased by the carrier frequency, the analogue input appears at the output.

In this case the products of modulation are the modulating frequency, the lower sideband and the upper sideband. As shown in the line graph the carrier frequency itself is suppressed through the modulator.

Page 54: analog and digital comm techniques pdf

Practical circuits 37

(a)

A

f~

fm

=.

(b)

IF" e �9 w

0'0 I 2 3 l ', 3.4 kHz . . . . . -' ' - - - - 0.3 kHz

Vleeeo o a

, . , " l : l : f i . ,

4 ' 5 6 7 I 8 I 9 10 11 ', 12 i ! i |

, 7.7 kHz - - - , 11.4 kHz | |

4.6 kI tz . . . . 8.3 kHz

(c)

Fig. 2.9 Cowan modulator: (a) circuit; (b) output waveform; (c) products of modulation

Carder leak In Figs 2.8 and 2.9, a potentiometer is used to balance the modulator. This is done to ensure there is very little power in the carder frequency at the output. In prac- tice the cartier frequency is measured at the output of the modulator and the potentiometer is adjusted until the level of the carrier drops as low as possible. In practice the carder leak should have a level o f - 3 8 dBmO.

2.7.2 Double balanced ring modulator

Figure 2.10(a) shows a typical double balanced ring modulator. Note where the modulating frequency and the cartier frequency are applied. The carrier frequency is used to forward bias two of the diodes at a time. The other two diodes will be reverse biased during this time. When the amplitude of the carder frequency changes, the other two diodes are forward biased and the first two diodes are reverse biased.

This process allows the modulating frequency to always appear at the output, as shown in Fig. 2.10(b). In the figure it is assumed that the cartier frequency is

Page 55: analog and digital comm techniques pdf

38 Analogue modulation principles

L fm

(a)

(b '

J L ~ I I I

0 : 1 2 3 ', 3.4 kHz . . . . . . ' 0.3 kHz

L

i , "1:,:,r" i I J ! , 4 ', 5 6 7 ', 8 ', 9 10 11 ' 12

! ! !

', 7.7 kHz . . . . . 11.4 kHz ! !

4.6 kHz . . . . 8.3 kHz

(c)

Fig. 2.10 Double balanced ring modulator: (a) circuit; (b) output waveform; (c) products of modulation

8 kHz and the modulating frequency is the commercial speech band. The line graph for the output modulation products is shown in Fig. 2.10@). As can be seen, the output modulation products are the USB and LSB only. Again a poten- tiometer is incorporated for the suppression of the carder frequency at the output and in practice the level of the carrier leak should be -38 dBmO.

2.7 .3 Power in the s idebands in practical amplitude modulators

In the double balanced modulator, the cartier frequency is suppressed through the modulation stage. The output products are only the USB and LSB. As a result the output power is equally split between each sideband. The power in each sideband is thus slightly less than - 3 dBmO.

In the single balanced modulator the output products of modulation are the USB, the LSB, and the modulating frequency. This means that the output power is equally split between the three products. This means that each sideband has slightly less than 33% of the total output power.

Page 56: analog and digital comm techniques pdf

2.8 ANGLE MODULATION

This consists of:

�9 Frequency modulation. �9 Phase modulation.

These modulation methods are very similar.

Angle modulation 39

2.8.1 Frequency modulation

In frequency modulation, the cartier frequency is caused to vary by an amount proportional to the amplitude of the modulating signal, at a rate proportional to the frequency of the modulating signal.

The frequency modulation e is given by

e = E0 sin(~oct + m sin wat)

where E0 = peak amplitude of the carder frequency ~vr = 21rfr ~v~ =21rf~ m = modulation index

This expression can be expanded as follows:

e = E 0 {Jo m sin wct

+ Jlm[sin(wc + wa)t - sin(we - wa)t]

+ J2m[sin(wc + 2Wa)t- sin(~Vc - 2Wa)t]

+ J3m[sin(wr + 2 w ~ ) t - sin(~or - 3~oa)t]

+...}

where J~ m = Bessel function of the first kind and nth order, with argument m

Referring to Fig. 2.11 it can be seen that the greater the amplitude of the modu- lating signal the greater the frequency swing. The higher the frequency of the modulating signal the faster the rate of swing.

With frequency modulation, multiple upper and lower sidebands exist in the output waveform. This is shown in Table 2.7.

The modulation index, which is sometimes known as the modulation depth, is given by

deviation of carder from mean value m =

zxf A

modulating frequency

The frequency deviation is the difference between the carrier frequency and the lowest output frequency or the difference between the highest output frequency

Page 57: analog and digital comm techniques pdf

40 Analogue modulation principles

I L

!

" Frequency swing _~i Large-amplitude low-frequency signal

-L L +L

Small-amplitude low-frequency signal

~ L I L !

!

i i i i i

I

i ! | i

|

Large-amplitude high-frequency signal

Fig. 2.11 Frequency modulation

and the carrier frequency. The deviation on both sides of the carrier frequency is

always the same. The frequency swing is given as the difference between the highest output

frequency and the lowest output frequency. For modulat ion indices > 1, the bandwidth is given by the following approxi-

mate formula:

B= 2(zxL +L)

Table 2.7 Frequency modulation sidebands

Order Equation Upper Equation Lower Equation

1st fc +fa 1st fr +fa 1st fc -f~ 2nd fc 4-2fa 2nd fc + 2fa 2nd A - 2fa 3rd fc 4- 3fa 3rd fc + 3fa 3rd fc - 3fa 4th fc 4- 4fa 4th fr + 4fa 4th fr - 4fa

�9 �9 �9

Page 58: analog and digital comm techniques pdf

Angle modulation 41

1.0

0.9

0.8 - . . ~

0.7

.o 0.6

0.5

O.4

-~ 0.3 E = 0.2

o 0.1

�9 ~ 0

~ -0.1

= - 0 . 2 ~

E -0.3 <

-0.4

0

Carrier

1st order

2nd order 3rd

4th 5th 6th order order order 7th 8th 9th

order order order

I I I I I I I I I I I I 1 2 3 4 5 6 7 8 9 10 11 12

Modulation index

Fig. 2.12 Bessel funct ion curves

where fr = deviation of the cartier frequency fa = modulating frequency

A parameter that is more important is the maximum modulation index that is used on a system. This parameter is referred to as the deviation ratio and is given by

D = Afmax

For a modulation depth of m = 2.405, 5.32, or 8.654, the carrier frequency has an amplitude of 0 V and as a result all the power is transferred to the sidebands. This can be seen when consulting the Bessel function curves shown in Fig. 2.12. This graph is a plot of the modulation index, along the x axis against the relative power in each sideband relative to the power in the unmodulated carrier frequency (y axis). To enable the graph to be used universally the relative power has been normalised.

The larger the value of modulation index the greater the number of significant sidebands. The smaller the modulation index the fewer the number of significant sidebands. A significant sideband is defined as a sideband that has at least 1% of the power in the unmodulated carrier frequency.

In high-capacity point-to-point systems a modulation index of D < 0.5 is used. This results in the following products of modulation,fc, USB and LSB only. This is similar to an amplitude modulator where DSB are used. A system which has a modulation depth of D < 0.5 is referred to as a narrowband FM system. By consulting the Bessel function curves the above can be confirmed.

Page 59: analog and digital comm techniques pdf

42 Analogue modulation principles

(a)

1

_T_-

-v~c

Fig. 2.13

+2

+1

-1

-2

L

(b) Maximum Minimum Maximum

Frequency modulator: (a) circuit; (b) output waveform

Systems which have modulation indices greater than 0.5 are referred to as wideband systems. These systems normally have a large number of significant sidebands. The larger the value of modulation index is the greater the number of significant sidebands.

A typical frequency modulator is shown in Fig. 2.13.

Advantages and disadvantages of frequency modulation Frequency modulation has major advantages when compared with amplitude modulation in the following areas:

�9 Signal-to-noise ratio: the signal-to-noise ratio at the output of an FM receiver is greater than that at the output of an AM receiver.

�9 Transmitter efficiency: FM transmitters are more efficient as the output ampli- tude and hence power is constant.

�9 Signal suppression: an FM receiver can suppress the weaker of two signals simultaneously received at or near the same frequency.

�9 Dynamic range: the FM system has a larger dynamic range than the AM system.

Page 60: analog and digital comm techniques pdf

Angle modulation 43

I I I

-4) c ~c +~c

Large-amplitude low-frequency signal

--~c ~c +~c

Small-amplitude low-frequency signal

"(1)c ~c +(l)c i ! , !

i

Large-amplitude high-frequency signal

Fig. 2.14 Phase modulation

However, frequency modulation also has some significant disadvantages:

�9 Design: a frequency modulator is more complex than an amplitude modulator. �9 Bandwidth: frequency modulation uses a much larger bandwidth than ampli-

tude modulation.

2 .8 .2 P h a s e m o d u l a t i o n

In phase modulation, the phase of the carder frequency is caused to vary by an amount proportional to the amplitude of the modulating signal, at a rate propor- tional to the frequency of the modulating signal.

Figure 2.14 shows the principle of operation of a phase modulator. Notice that the larger the amplitude of the modulating signal the greater the phase change and the higher the frequency of the modulating signal the faster the rate of change takes place.

e = E0 sin(~oct + m sin ~Oat)

= E0 sin(~oct + r162

Page 61: analog and digital comm techniques pdf

44 Analogue modulation principles

(a)

f~

f~

+1

0

-2

(b)

Fig. 2.15 Phase modulator: (a) circuit; (b) output waveform

where E0 = peak amplitude of the carrier frequency

we = 27rf~ Wa = 27rfa m = modulation index

~c = phase change applied to carrier frequency

With phase modulation, multiple upper and lower sidebands exist in the output waveform which are similar to those for frequency modulation, as shown in Table 2.7.

Figure 2.15(a) shows a typical phase modulator. As can be seen the modulator is a ring modulator. The phase of the carrier frequency at the output is either the same as that of the input carrier frequency or the output carrier frequency is changed by 180 ~ relative to the input carrier frequency. The example shown applies to a digital input waveform. The amplitude of the input digital signal is used to forward bias two of the diodes. The output phase of the carrier frequency depends on which diodes are forward biased. Note where the carrier frequency and the digital input signal are applied to the phase modulator and compare this to where the carrier frequency and analogue input signal is applied to the amplitude ring modulator.

Derivatives of phase modulation are extensively used in digital systems. Some of these modulation schemes are discussed in Chapter 4. Phase modulation is not used in analogue systems because of the complexity of the modulator circuit and the complexity of the output signal.

Page 62: analog and digital comm techniques pdf

Review questions 45

2.9 COMPARISON OF AMPLITUDE, PHASE AND FREQUENCY MODULATION

Table 2.8 gives a comparison between the three modulation techniques discussed.

Table 2.8 Comparison of modulation techniques

Modulation Implementation Interference technique

Frequency Power Usage spectrum

Amplitude Easy

Phase Difficult

Frequency Medium

Badly affected Limited Limited power in the Large sidebands

Hardly affected Very large Dependent on the Little number of sidebands

Hardly affected Very large Dependent on the Growing number of sidebands

2.10 REVIEW QUESTIONS

2.1 State the products of modulation at the output of an amplitude modulator, and draw the resultant output waveform for a sinusoidal input signal.

2.2 Calculate the output products of modulation for a single balanced modulator given that the input signal is from 60 kHz to 108 kHz and the carrier fre- quency is 340 kHz.

2.3 Given that the input frequency range to a double balanced demodulator is 312 kHz to 552kHz and the carrier frequency applied to the demodulator is 300 kHz, determine the output products.

2.4 Calculate the modulation depth for an amplitude modulator given that the carrier frequency has a peak-to-peak voltage of 2.5 V and the RMS voltage of the modulating signal is 0.58 V.

2.5 A sinusoidal modulating frequency is modulated with a carrier frequency having a peak voltage of 3.5 V. The output is connected to a 12 k12 load. The modulation depth is 85%. Determine each of the following: (a) The power in the carrier frequency. (b) The power in each sideband. (c) The power in both sidebands. (d) The total power. (e) The efficiency of the modulator.

2.6 State the criteria that stipulate whether an FM system is narrowband or wideband.

2.7 State the advantages and disadvantages of frequency modulation.

Page 63: analog and digital comm techniques pdf

3 Spread spectrum systems

Communication enables mankind to impart ideas and knowledge.

3.1 INTRODUCTION

There are numerous types of transmission systems. Spread spectrum systems are becoming more and more popular, especially as the available frequency spectrum is becoming more and more crammed. Although these systems are extremely com- plex and require a high cost in development, they do have numerous advantages over more conventional systems.

The major advantage of these systems is the signal security that the system presents. Unlike conventional systems it is extremely difficult to eavesdrop on a conversation that takes place over a spread spectrum system.

The system was initially developed for military applications, and some police forces use spread spectrum systems because of the signal security.

3.2. SPREAD SPECTRUM SYSTEMS

Conventional systems try to cram as much information into as small a bandwidth as possible. For police usage this means that the bands can be easily monitored. For military use, these systems can easily be jammed by high-power jamming fre- quencies that cover the frequency band of the particular system. Conventional systems also normally output a relatively high power to the antenna.

Spread spectrum systems spread the signal over as wide bandwidth as possible. Also they try to hide the transmitted signal as close to the background noise as possible. This makes the communication very difficult to find in the frequency spectrum, which means that they cannot be easily tracked. Also they are more difficult to jam.

There are three different types of spread spectrum techniques that can be used. These are:

�9 Time hopping.

Page 64: analog and digital comm techniques pdf

Pseudorandom code generators, scramblers and descramblers 47

�9 Direct sequence. �9 Frequency hopping.

3.3 SPREAD SPECTRUM SYSTEM CRITERIA

For a system to be described as a spread spectrum system the following two criteria must be satisfied:

�9 The transmitted signal must occupy a bandwidth much greater than the band- width of the modulating signal (i.e. the input signal to the system).

�9 The bandwidth occupied by the transmitted signal must be determined by a prescribed waveform and not by the modulating frequency (i.e. carder frequency).

3.4 REASONS FOR USE OF SPREAD SPECTRUM SYSTEMS

There are three major reasons for the use of spread spectrum techniques in communication systems today.

�9 They aid privacy of the transmission, since the spectral density of the spread spectrum may be less than the noise spectral density of the receiver.

�9 The despreading process in the receiver will spread the spectra of unwanted narrowband signals, thus improving interference rejection.

�9 The effect on a spread spectrum receiver, that receives a spread spectrum from a different spread spectrum system using the same frequency bands but implement- ing a different spreading pattern, approximates to noise in the receiver.

3.5 PSEUDORANDOM CODE GENERATORS, SCRAMBLERS AND DESCRAMBLERS

3.5.1 Pseudorandom noise code generators

All spread spectrum systems make use of pseudorandom code generators. This code is referred to as pseudorandom noise code (PN code). This code is used to determine the frequency spectrum that the output signal will occupy, i.e. the output bandwidth. In other words these generators are used to control the spread- ing pattern of the system. A simple 3-bit pseudorandom coder is shown in Fig. 3.1. Take note of the truth table that results from this circuit.

The truth table output produces the following output states:

0002, 1102, 1012, 0102, 1112, 0112, 0012, 0002

Page 65: analog and digital comm techniques pdf

48 Spread spectrum systems

CLK

XOR~ XOR 2

d xOl~'l

t QIQ! ~ 2 ~ i 02

c L K

0

a (LSB)

Operation i

d a a ' b

1 0 ! 0

1 I 0 1

0 1 1 0

1 0 I I

0 1 1 1

0 0 0 1

0 0 0 0

1 0 1 0

b

Output

C C

0 0

0 1

1 1

0 0

1 1

1 0

1 0

0 0

(MSB)

Output

b a

0 0

1 0

0 1

I 0

1 1

! i

0 1

0 0

Logic 1 X

~ C

J

Fig. 3.1 Pseudorandom code generator

As can be seen, the output logic states do not follow a logical sequence. The output sequence is determined by the outputs of the two exclusive-OR (XOR) gates that are incorporated in the circuit.

In this example the sequence will repeat itself after six clock pulses. In practice very large generators are used, which means that the sequence will only repeat itself after a large number of clock pulses.

In Fig. 3.1 two XOR gates are used. The truth table for an XOR gate is given in Table 3.1. Notice that the output is a logic high only when there are opposite logic levels on the inputs.

The input x is permanently connected to a logic high. Initially the three flipflops are all reset, which means that Q1, Q2 and Q3 are all logic low. Point d is a logic high, as a logic low XORed with a logic high results in a logic high. Point a' goes to a logic high. Now Dl is logic high, D2 is logic high and D 3 is logic low. After the first clock pulse, QI goes high, Q2 high and Q3 goes low.

The logic low on Q3 is fed back to the one input to X O R 2. This results in d remaining at a logic high. Point a t goes to a logic low. Thus Dl is now a logic

Page 66: analog and digital comm techniques pdf

Pseudorandom code generators, scramblers and descramblers 49

Table 3.1 Truth table for XOR gate

b a Output

0 0 0 0 1 1 1 0 1 1 1 0

high, D 2 is a logic low and D 3 is a logic high. After the second clock pulse, Q1 goes to a logic high, Q2 goes to a logic low and Q3 goes to a logic high.

Ql is connected to output a, which is the least significant bit (LSB), Q2 is connected to b and Q3 is connected to c, which is the most significant bit (MSB).

3 . 5 . 2 S c r a m b l e r s a n d d e s c r a m b l e r s

In order to make the information even more difficult to be decoded by unauthorised receivers the information is scrambled. Figure 3.2 shows the circuits for a simple 3-bit scrambler and a 3-bit descrambler. This process is also referred to as encryption and decryption. In this example the input data is a continuous string of logic Is. In practice the data that is applied to the circuit is digitised speech, digitised video, or data. As a result the data that is transmitted is random due to the scrambler.

The operation of this circuit is the same as that of the 3-bit pseudorandom noise generator. The only difference is that the output of the PN generator is XORed with the data input. As a result the data stream of a continuous string of logic ls is changed into a sequence of

1 1 0 1 0 0 0 11010002

As can be seen the output repeats itself. In practice, however, the data itself is random and the scrambler consists of many more stages, and hence the output is a pseudorandom sequence.

The descrambler circuit is identical to that of the scrambler and works in exactly the same way. In this case the output of the PN generator is XORed with the input pseudorandom data stream and as shown in this example a data stream consisting of a sequence of logic Is results. What is important here is to remember that the descrambler and the scrambler must be properly synchronised or else a totally corrupted data output will result. The descrambler must produce the identical PN code to that of the scrambler, and the descrambler must start to descramble the data at the same point that the scrambler scrambled the data.

Page 67: analog and digital comm techniques pdf

50 Spread spectrum systems

Data a b c inpu! Output

0 0 0 1 1 1 1 0 1 1 1 0 1 1 0 0 1 0 1 1 1 1 1 1 0 0 1 1 1 0 0 0 1 1 0 0 0 01 1 1

(a)

CLK

d

d D Q

~ I

Logic 1

Scrambler output

Data input

....... Data a b c input Output

0 0 0 0 ' 1 1 1 1 1 1 1 , 0 1 0 1 0 1 0 1 1 1 1 1 0 1 O l 1 0 1 0 0 1 0 I 0 [ 0 0 1 1

A

d

a

...... 0~ I CLK -

(b)

Fig. 3.2 (a) Scrambler; (b) descrambler

Logic I

QI m a

Descrambler output

~ !

Data input

(scrambled data)

3.6 TYPES OF SPREAD SPECTRUM TECHNIQUES

3.6.1 Direct sequence spread spectrum

In this method, phase modulation or a derivative of phase modulation is used. The data is first scrambled. The scrambling process is achieved by mixing the actual data with the output of a PN coder as described in Section 3.5.2.

The resultant scrambled data is then modulated in a binary phase shift key (BPSK) or quadrature phase shift key (QPSK) modulator. The output of the BPSK modulator is then transmitted. A basic block diagram of the system using a BPSK modulator is shown in Fig. 3.3.

In this example the PN code generator is running at a higher clock frequency than that used for the data. The resultant scrambled data is now transmitted at

Page 68: analog and digital comm techniques pdf

Types of spread spectrum techniques 51

Data in B P S K data

modula tor

Scrambled

data

Fig. 3.3 Scrambler system using BPSK modulation

B P S K code

modula tor

a much higher rate than that of the data. When a logic high is applied to the BPSK modulator the cartier undergoes a phase change of 180 ~ When a logic low is applied to the BPSK modulator the cartier undergoes a 0 ~ phase change. This is shown in Fig. 3.4.

The cartier frequency containing the phase change information is received by the distant receiver. This signal is then descrambled by a descrambler that relies on a PN code generator producing PN code identical to that at the trans- mitter. The signal is then converted back into logic levels to produce the original data.

A spread spectrum system that does not have a coder identical to that at the transmitter will not be able to decode the data correctly.

Figure 3.4 shows the processes that take place in a direct sequence spread spectrum system.

Serial data input

l I ~ i

Pseudorandom data sequence

' i,i F 1 0 0 0 1 1 1 I 0 0 0 0 0 0 ; l , , : , : �9 , ,

i i i i ! i ! i i i i i i i i i i ! i i i i i i ! i i i i i ! i i i i i ! i i i ! i ! i i i i i i ! i i i i i i I i i i | i i | i i

. . . . . Scrambled data . . . . i i i i i i i i

' IT 0 0 1 1 1 0 0 I I ! 1 0 0 0 0 0 0

I I I ! I I I l I I I I ! I I I I I I I I

i i ! I i i i i i i i i i

i i i I i i i i i i ! i

' ' 's i l d p l~ e o d ' i g ' ' ' , Tran m te as -m ulated s n a l ' ', : I

, , , , , , , , , , , | , , , . , ,

i i i i i i i t i i i i I i i i ! i i i i i i i I i i i I i i i i i ! i i i i

. . . . . . . Rece ived phase-modulated, si,gnal : : , ' , : ,

H o I l o H H 0 , , , , , , , , , , , , , , , , , , , , , ,

i i ! i i i i i i ! i i i i

, . . . . . . . , , , , , , ,' I ) - - , . m o d u l a t e d r e c e i . . . e d s i g n a l , . . . . . . . ', ,' , , ,' , | �9

I ! i !

' Received data , i

J I - Fig. 3.4 Direct sequence spread spectrum

Page 69: analog and digital comm techniques pdf

52 Spread spectrum systems

3.6.2 Frequency hopping

In this method frequency shift key (FSK) modulation is used. Before describing how the system works it is necessary to define the terms that are used with respect

to the system"

�9 Hop set: this is the number of channels that are used by the system (i.e. the number of different frequencies utilised).

�9 Dwell time: this is the length of time that the system transmits on an individual channel (i.e. the length of time spent on one frequency).

�9 Hop rate: this is the rate at which the hopping takes place (i.e. how fast the system changes from one channel to another or from one frequency to

another).

Frequency allocation A theoretical model using the 3-bit PN coder described in Section 3.5.1 will be used to explain the principles behind the frequency-hopping spread spectrum system. Consider the FSK modulator where the carrier frequency is controlled by a 3-bit PN code generator and produces the carrier frequencies shown in

Table 3.2. In Table 3.2 the hop set is equal to 8. This means that eight different channels or

frequencies are used. These different channels are indicated in Fig. 3.5. It is imperative that the receiver has an identical PN code generator and that the

PN coder at the receiver is synchronised with that at the transmitter.

Pseudorandom coder

A 3-bit PN coder produces the binary codes and the associated output frequencies shown in Table 3.3. The hop set equals 8 according to Table 3.2.

Assume that the dwell time is 1 ~ts. The hop rate is determined as follows:

1 hop rate =

dwell time • hop set

1 = = 125 kHz

llas x 8

Table 3.2 Control codes and frequencies for an FSK modulator

Control codes Carrier frequency Derivation of output Output frequency (kHz) frequency (kHz) (kHz)

000 8 8 + 1.75 9.75 001 8 8 + 1.25 9.25 010 8 8+0.75 8.75 011 8 8 + 0.25 8.25 100 8 8 - 0.25 7.75 101 8 8 -0.75 7.25 110 8 8 - 1.25 6.75 111 8 8 - 1.75 6.25

Page 70: analog and digital comm techniques pdf

Types of spread spectrum techniques 53

10

--- 8 N

5 0

0

O "

7

PN code 000

. . . . . . . . . J . . . . . . . . . .

9.75 kHz

PNcode : PNcode : PNcode ' PNcode 110 : 101 : 010 : I11

! ! !

i ! ! i ! ! ! ! ! ! ! !

! i | ! i | i i ! | i ! ! | ! ! ! ! !

I ! !

PN code

i ! i t i i

7.25 kHz ', !

|

!

6.75 Idtz , !

i i iiii i i , i

o ! !

i |

! !

i i i i | i i i i ! i l i i

i i i i i ! i i

i i i i i i i i i i

', 8.75 kHz ! i i i e ! !

i

!

0

: Dwell ' Dwell ' Dwell , time , time , time

6.25 kHz

011

8.25 kHz

PN code 001

9.25 kHz i i i I

Fig. 3.5 Frequency hopping

Assume the PN code that is applied to the frequency synthesiser is

0 0 0 110 101 0 1 0 111 011 0012

The frequency synthesiser produces the carrier frequencies as shown in Table 3.3 which are in accordance with the frequency allocation for the different PN codes as shown in Table 3.2.

T a b l e 3.3 C o d e s a n d f r e q u e n c i e s for a 3-bit P N d e c o d e r

a b c O u t p u t f r e q u e n c y ( k H z )

0 0 0 9.75

1 1 0 6.75

1 0 1 7.25

0 1 0 8.75

1 1 1 6.25

0 1 1 8.25

0 0 1 9.25

Page 71: analog and digital comm techniques pdf

54 Spread spectrum systems

Signal strength Signal strength Signal strength Signal strength

Perfectly synchronised

Signal strength

Signal strength

Fig. 3.6 Synchronisation

Signal strength Signal strength

Receiver clock ahead in time

Signal strength Signal strength

Receiver clock behind in time

Signal strength

Signal strength

The digitised speech is then modulated with each of these carrier frequencies for a dwell time of 1 ~ts. It is then spread over a hop set of eight channels, in this example, in a pseudorandom fashion. The overall bandwidth of the system is 6 .25kHz- fa to 9.75kHz +fa. For a speech band f~ = 3.4kHz, the output frequency would be from 2.85kHz to 13.15 kHz, which gives a bandwidth of 10 kHz.

For a conventional system using frequency modulation the output bandwidth would be 6.8 kHz and as can be seen the spread spectrum system produces a bigger output bandwidth. In practice the carrier frequency would be much higher than 8 kHz and the carrier frequency deviation would be much greater that shown in Table 3.2. Also the PN code would be much larger. This would result in a much greater output bandwidth than given in the example.

Synchronisation One of the most important aspects of a spread spectrum system is the synchroni- sation of the receiver with the transmitter. A tracking circuit in the receiver is used to synchronise the receiver with the transmitter.

The tracking circuit compares the signal strength of the despread signal over the dwell time. If the receiver is exactly synchronised then the signal strength is constant over the whole dwell time, as shown in Fig. 3.6. If the receiver clock is ahead of the transmitter clock then the signal strength will move from high to low during the dwell time. This means that the receiver is hopping to the next frequency prior to the transmitter, as shown in Fig. 3.6.

If the receiver clock is behind the transmitter clock then the signal strength will move from low to high during the dwell time. This indicates that the transmitter has hopped to the next channel prior to the receiver, as shown in Fig. 3.6.

A control loop in the receiver is used to either advance or retard the PN code generator count in the receiver.

Page 72: analog and digital comm techniques pdf

Types of spread spectrum techniques 55

~ _ ~ Audio stage I

Sync. tone

Frequency- hopped spectra

< Frequency --~ , , , , - - ~ ,~ �9

' i- I Yi i I:

,, , lf , l sY' th._l [ logic [ ,

Despread

< Frequency --~ J

FII IAu ge I sta

! !

M: tio I i eIN:, ! ! ! ! ! !

I.opping [ control / I ran'

Reset

do-

Lom

Frequency-hopping transmitter

|

i

i

!

i

t

i

i

!

!

i

!

i

i

i . !

Reset

Frequency-hopping receiver

Fig. 3.7 Frequency-hopping spread spectrum system

System operation Figure 3.7 shows a typical block diagram of a frequency-hopping spread spectrum system.

The transmitter At the transmitter the hopping control circuit controls the whole system. This is the circuit into which the user will enter his/her personal identification number (PIN). The PIN will then enable the PN code generator. The user group number is entered into the manual frequency select logic, which allocates the channels for that user to the system. The PN code generator output drives a high-speed frequency synthesiser, which then allocates the correct channels in a pseudorandom manner.

The output frequency from the frequency synthesiser is then fed as the carder frequency to the mixer where the input audio is modulated. The resultant modu- lated frequency is then amplified and transmitted.

The receiver The received signal is first amplified by a wideband amplifier. The signal is then demodulated with the carrier frequency from the high-speed synthesiser. The resultant intermediate frequency (IF) is applied to a tracking circuit. The user

Page 73: analog and digital comm techniques pdf

56 Spread spectrum systems

must input into the manual frequency select logic the same user group code as was used at the transmitter. The user must also enter his/her PIN into the hopping control logic circuit.

The sync and tracking circuit compares the signal strength over the dwell time and develops control signals that either advance or retard the PN code generator. Once the system is correctly aligned then the IF will be demodulated to the audio range and communication can then take place.

The block diagram in Fig. 3.7 only shows one direction. Obviously this circuitry is repeated for the other direction for full communication to take place.

3.6.3 Time hopping

Time hopping is where a short pulse, called a chirp, is transmitted having either a pseudorandom pulse duration or transmitted in a random position relative to the input bit period. Thus time hopping can be implemented in two different ways.

(b)

i !

i

2T

U

! 0

Input data

4T 3T 5T 6T Spreading pulses

Output

HU

!

| i i

(a)

! i !

I- M 2T

|

i

Input data

T 6T 3T Spreading pulses

Output

4T 5T !

Fig. 3.8 Time hopping methods: (a) method 1, equal chirp durations; (b) method 2, varying chirp durations

Page 74: analog and digital comm techniques pdf

Advantages and disadvantages of spread spectrum techniques 57

Method 1 With this technique each binary bit is transmitted as a short pulse. The actual interval in which it is transmitted is determined by a PN code generator.

This technique seeks to accomplish uncertainty in the communication channel for any unwanted receiver by varying the time intervals between transmitted pulses. By referring to Fig. 3.8(a) it can be seen that the spreading pulses are very short pulses that appear in a pseudorandom position during the bit period. The polarity of the output signal indicates whether the input binary was a logic high or a logic low.

During each bit period a chirp (subdivision) is selected at random by the PN code generator. Each chirp has the same duration as shown in Fig. 3.8(a).

Method 2 With this technique each chirp has a different duration. The start of each chirp takes place at the same point during the bit period. The PN code generator causes the chirp duration to be altered. Referring to Fig. 3.8(b), the chirp duration for the spreading pulse is different. Again the polarity of the output signal indi- cates whether the input binary was a logic high or a logic low.

3.7 ADVANTAGES AND DISADVANTAGES OF SPREAD SPECTRUM TECHNIQUES

The advantages of spread spectrum techniques as applied to communication systems can be summarised as follows:

�9 All types:

Multiple usage by different user groups, as each user group can be allocated a different PN code.

This code is the key necessary to unlock the message from the system. With- out this key it is very difficult, almost impossible to extract the information.

A spread spectrum will see another spread spectrum signal as interference and reject it as it would for a narrowband signal.

�9 Frequency hopping:

A narrow band will only cause minimal interference on the wideband signal. Frequency jamming is extremely difficult and can only be effectively achieved

if the jamming receiver has the same PN code and channel allocation. The greater the hop set, the smaller the dwell time and the greater the band-

width the smaller the interference from narrowband signals. �9 Frequency hopping and direct sequence."

The output power of the spread spectrum is spread over a large bandwidth. This means that the spectrum has a very low spectral density; 1 W output power over an 8 MHz band gives a spectral density of 125 nW/Hz.

These systems are particularly useful to the military and police. The low spec- tral density may not even be recognised as valid communication, thus leading to low probability of interception and recognition.

Page 75: analog and digital comm techniques pdf

58 Spread spectrum systems

Disadvantages of spread spectrum techniques are:

�9 Al l types:

Complex circuitry. Expensive to develop. Very large bandwidths.

�9 Time hopping."

Easily jammed and hence is not generally used in its true form.

3.8 REVIEW QUESTIONS

3.1 State the criteria that specify a system as a spread spectrum system. 3.2 Discuss the reasons for using spread spectrum systems. 3.3 Briefly discuss the direct sequence spread spectrum system. 3.4 Describe the terms hop rate, dwell time and hop set with respect to a

frequency-hopping spread spectrum system. 3.5 Describe the basic operation of a frequency-hopping spread spectrum

system. 3.6 Describe the synchronisation process used on a frequency-hopping spread

spectrum system. 3.7 Briefly discuss the two different methods that can be used in a time-hopping

spread spectrum system. 3.8 State the advantages and disadvantages of spread spectrum systems.

Page 76: analog and digital comm techniques pdf

4 Digital modulation techniques

Knowledge empowers man to use technology wisely.

4.1 INTRODUCTION

The techniques used to modulate digital information so that it can be transmitted via microwave, satellite or down a cable pair are different to that of analogue transmission. However, it must be remembered that when the data is transmitted via satellite or microwave, the radio frequency (RF) stage is an analogue stage and that the data is transmitted as an analogue signal.

This means that the techniques used to transmit analogue signals are used to transmit digital signals. The problem is to convert the digital signal to a form that can be treated as an analogue signal. This chapter deals with the different modulation techniques that are used to convert a digital signal into an analogue signal that is then in the appropriate form to either be transmitted down a twisted cable pair or to be applied to the RF stage where it is modulated to a frequency that can be transmitted via microwave or satellite.

Although digital transmission is on the increase worldwide, many of the existing circuits are still analogue. This means that the digital signals must be changed into an analogue format to enable them to be transmitted over the existing metallic pairs that form the link. The equipment that implements this conversion for a personal computer (PC) that is used to communicate with other PCs via the public switched telephone network (PSTN) is a modem. The term modem is made up from the words 'modulator' and 'demodulator'.

A modem accepts a serial data stream from the PC and converts it into an analogue format that matches the transmission medium. A typical system arrange- ment is as shown in Fig. 4.1. As can be seen in the figure the data terminal equip- ment (DTE) is the point at which the data originates and also the end point for received data. The data circuit equipment (DCE) comprises the modem. The con- nection between the DTE and DCE is via an interface such as the RS232C. The modem is connected to the PSTN by means of a suitable circuit such as a cable pair.

There are many different modulation techniques that can be utilised in a modem. Some of these techniques are:

Page 77: analog and digital comm techniques pdf

60 Digital modulation techniques

,ation \ (application UART ~ Interface / Modem

! programs) ~N~ Control (Originate)

[ Line control ]

i Printer

Printer ~ line

Personal ~ computer Telephone

Fax or terminal line machine

DCE

I,'o'A Modem (Answer)

Personal computer

or terminal

machine /-"

/

, C,, . . . . ] . l . _ [ . . . - ' " ' DTE [ St,~tion i, i, | o.,ro.er

RS232C UART v i station Interface .-, . , M (application t..onlro| ) , .. Vi programs~

t - - -~

DCE: Data circuit equipment

DTE: Data terminal equipment

PSTN: Public switched telephone network

Fig. 4.1 Low-speed data link

�9 Amplitude shift key modulation (ASK). �9 Frequency shift key modulation (FSK). �9 Binary-phase shift key modulation (BPSK). �9 Quadrature-phase shift key modulation (QPSK). �9 Quadrature amplitude modulation (QAM).

4.2 AMPLITUDE SHIFT KEY MODULATION

In this method the amplitude of the carrier assumes one of two amplitudes depend- ent on the logic states of the input bit stream. Unlike an amplitude modulator used for modulating analogue signals, the carrier frequency need not be totally suppressed. The typical output waveform of a ring modulator is shown in Fig. 4.2. The frequency components are the USB and LSB with a small residual carrier frequency. The carrier suppression resistor is omitted from this modulator so that when a logic 0 is sent, a low-amplitude carrier frequency is allowed to be transmitted. This ensures that at the receiver the logic 1 and logic 0 conditions can be recognised uniquely.

Page 78: analog and digital comm techniques pdf

Frequency shift key modulation 61

+2

+1

0

+3

+2

+1

0

-1

-2

-3

Logic 1 Logic 0

Modulating frequency

Logic 1

VVVJV VV VVV Carrier frequency

0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +10 +11 +12 . , ,

I I I I I I I I I I I I I

+2+3+1 ,4"% Z"%

Output frequency

Fig. 4.2 Amplitude shift key modulation

A typical single sideband modulator is shown in Fig. 4.3(a). The carrier fre- quency is used to either forward bias or reverse bias the two diodes. When the diodes are forward biased then the digital signals are passed to the output. When the diodes are reverse biased then the digital signal is prevented from reaching the output and only a residual carrier frequency appears at the output.

A typical Cowan modulator is shown in Fig. 4.3(b). In this case, when the diodes are forward biased by the carrier frequency the input is short circuited and the input digital signal is prevented from reaching the output. When the carrier frequency reverse biases the diodes then the digital signal is passed to the output.

Figure 4.3(c) shows a ring modulator. The phase of the carrier frequency is used to forward bias two of the diodes and reverse bias the other two diodes.

4.3 FREQUENCY SHIFT KEY MODULATION

In this method the frequency of the carrier is changed to two different frequencies depending on the logic state of the input bit stream. The typical output waveform

Page 79: analog and digital comm techniques pdf

62 Digital modulation techniques

(a)

Data input

fc

Output

(b)

Data input

I

f~

Output

(c)

Data ~ input

I11

f~

Output

Fig. 4.3 (a) Single balanced modulator; (b) Cowan modulator; (c) ring modulator

is shown in Fig. 4.4. The carrier frequency is more conveniently referred to as the centre frequency. Notice that a logic high causes the centre frequency to increase to a maximum and a logic low causes the centre frequency to decrease to a

minimum. A typical FSK transmitter and receiver is shown in Fig. 4.5. The circuits shown

use phase-locked loop circuits.

The transmitter The input digital signal is applied to a digital-to-analogue (D/A) converter. The resultant analogue signal is summed with the control voltage produced by the phase comparator. The resultant control voltage is used to change the frequency of the voltage-controlled oscillator (VCO). The output of the VCO is the FM output which is applied to the input of the next stage.

Some of the output signal from the VCO is divided and this frequency is phase- compared with a frequency produced by the reference oscillator. The resultant output of the phase comparator produces a control voltage. The greater the

Page 80: analog and digital comm techniques pdf

Frequency shift key modulation 63

Fig. 4.4

+2

+1

0

+3

+2

+1

0

-1

-2

-3

Logic l Logic 0

Modulating frequency

I Logic I [

VVVVVVVVV /V Carrier frequency

0 +I +2 +3 +4 +5 +6 +7 +8 +9 +10 +11 +12 , ,

I I I I I I I ! I I I I i

Output frequency

Frequency shift key modulation

difference between the two input frequencies the larger the control voltage. The control voltage will be either positive or negative, depending on whether the output frequency of the VCO is higher or lower than the reference frequency at the input to the phase comparator. The divider incorporated into the circuit enables the output frequency of the VCO to be much larger than the reference frequency.

If there is no digital input then the output of the VCO is the cartier frequency or centre frequency. Hence by changing the control voltage the centre frequency is either increased to a maximum or decreased to a minimum.

The receiver The FM signal is applied to the receiver input. This input signal is phase- compared with the output of the VCO. The output of the phase comparator produces a d.c. control voltage, which contains the information relating to the original digital signal. The control voltage is used to change the frequency of the VCO. In this way the control voltage is changing in accordance with the original digital signal.

The control voltage is then applied to an analogue-to-digital (A/D) converter, which produces the original digital signal.

Page 81: analog and digital comm techniques pdf

64 Digital modulation techniques

i@i Reference frequency

(a)

F M ~

output

Phase comparator

Divider

Summer d.c. control voltage ,d

- I Vco ~J I l t Data

input

Phase comparator

d.c. control voltage . ~ [ A / ~ VDI

Data output

(b)

Fig. 4.5 (a) FSK transmitter using a VCO; (b) FSK receiver using a VCO

4.3.1 Frequency modulation generalities The modulation index is given by

/xf m = L

When the modulating frequency fa is at a maximum and the frequency deviation Af is at a maximum then the modulation index is referred to as the deviation ratio (D). The deviation ratio is determined by

max Af O = ~

max fa

A generalised formula to determine the required bandwidth is

B = 2(Af +fa)

Typical frequency allocation for low-speed modems is given in Table 4.1. For an FSK modulator the deviation ratio is determined by:

tone separation D =

bit rate

The bandwidth is given by

B = tone separation + bit rate

Page 82: analog and digital comm techniques pdf

Frequency shift key modulation 65

Table 4.1 Frequency allocation for a low-speed modem

Bit rate (b/s) Direction Frequencies ( H z ) Nominal frequency

Logic 0 Logic 1 (Hz)

<300 A-B 1180 980 1080 B-A 1850 1650 1710

600 A-B 1700 1300 1500 B-A

1200 A-B 2100 1300 1700 B-A

Example 4.1

Calculate the deviation ratio and bandwidth required to transmit a 1200 b/s

digital signal.

tone separation

bit rate

Tone separation: from Table 4.1,

tone separation = 2100 - 1300

= 800 Hz

D _~ tone separation

bit rate

800

1200

=0 .67

The bandwidth is given by

B = tone separation + bit rate

= 800 + 1200

= 2000 kHz

If the bandwidth is limited to the bit rate then the receiver will still be able to recover the original data. The tone difference is 800 Hz which is smaller than the 2 kHz given above.

As the deviation ratio is approximately equal to the energy concentrated in the carrier and the first-order sidebands it is not necessary to transmit all the sidebands. The receiver need only recover the original logic states from the received signal.

Page 83: analog and digital comm techniques pdf

66 Digital modulation techniques

4.4 PHASE SHIFT KEY MODULATION

With this method the phase of the carrier changes between different phases deter- mined by the logic states of the input bit stream.

There are several different types of phase shift key (PSK) modulators:

�9 Two-phase (2 PSK). �9 Four-phase (4 PSK). �9 Eight-phase (8 PSK). �9 Sixteen-phase (16 PSK). �9 Sixteen-quadrature amplitude (16 QAM).

The 16 QAM is a composite modulator consisting of amplitude modulation and phase modulation. However, it is more closely associated with phase modulation than amplitude modulation.

The 2 PSK, 4 PSK, 8 PSK and 16 PSK modulators are generally referred to as binary phase shift key (BPSK) modulators, whereas the QAM modulators are generally referred to as quadrature phase shift key (QPSK) modulators.

4.4.1 Some phase shift key generalities

The symbol rate S of a binary PSK modulator can be determined by

D S = - symbols/s

n

where D = data rate (b/s) n = number of bits per symbol

The total number of possible symbols at the output is given by

M = 2 ~ symbols

where M = number of possible symbols at the output n = number of bits per symbol

The phase difference between each symbol is given by

P = 360 ~ _ _ 27r rad M M

The maximum input bit rate C can be determined by

C = B log2 M

where B = bandwidth M = maximum possible number of symbols at the output

4.4.2 Two-phase shift key modulation

In this modulator the carder assumes one of two phases. A logic 1 produces no phase change and a logic 0 produces a 180 ~ phase change. The output waveform for this modulator is shown in Fig. 4.6.

Page 84: analog and digital comm techniques pdf

Phase shift key modulation 67

+2 +1 0 +3 +2 +1 0 -1 -2 -3

t Logicl I Logic0 ! Logicl l .... Modulating frequency

V ~ V ~ ~C ~arrierfre~quency V ~ ~ ~ ~ t +1 +2 +3 +4 +5 +6 +7 +8 +9 +10 +11 +12

Output frequency

Fig. 4.6 Phase shift key modulation

A ring modulator (Fig. 4.3(c)) can be used for this purpose. The only difference between the ASK modulator and the 2 PSK modulator is where the carder frequency and the digital modulating signal are applied. The carrier frequency and digital modulating signal are swapped around for the 2 PSK modulator so that the digital signal is used to forward bias and reverse bias the diodes.

Example 4.2

A 2 PSK modulator has an input bit rate of 2400 b/s and works into a commercial speech band circuit.

Determine:

1. The number of possible symbols at the output. 2. The symbol rate. 3. The phase difference between the symbols. 4. The maximum bit rate.

Page 85: analog and digital comm techniques pdf

68 Digital modulation techniques

Solution

1. Each input bit causes a phase change of either 0 ~ or 180 ~ Hence n = 1 and

M = 2 n I = 2 = 2

D 2. S

t l /

= - symools/s n

= 2400 symbols/s

i.e. the symbol rate is the same as the bit rate.

360 ~ 3. P =

M

360 ~ = = 180 ~

2

This shows that there are only two output vectors for the output data.

4. The bandwidth is 300 Hz to 3400 Hz (B = 3100 Hz). Hence

C = B log2 M

= 3100 log2 2

= 3100 b/s

This means that the maximum input bit rate that can be applied to the circuit is

3100 b/s. If a higher bit rate was applied to the input then the received data

would be errored.

4.4.3 Four-phase shift key modulation

With 4 PSK, 2 bits are processed to produce a single phase change. In this case

each symbol consists of 2 bits, which are referred to as a dibit.

Example 4.3

A 4 PSK modulator has an input bit rate of 2400 b/s and works into a commercial

speech band circuit.

Determine:

1. The number of possible symbols at the output.

2. The symbol rate. 3. The phase difference between the symbols.

4. The maximum bit rate.

Solution

1. Two bits produce a single phase change. Hence n = 2 and

M = 2 ~-- 22 - 4

Page 86: analog and digital comm techniques pdf

Phase shift key modulation 69

D 2. S = - symbols/s

n

2400 - ~ - 1200 symbols/s

2

In this case the output symbol rate is half of the input bit rate.

3. P = 360~ M

360 ~ = = 90 ~

4

This shows that there are four output phases for the output data. 4. The bandwidth is 300 Hz to 3400 Hz (B - 3100 Hz). Hence

C = B log2 M

= 3100 log2 4

= 3100 logl0 4 logl0 2

= 6200 b/s

This means that the maximum input bit rate that can be input into the circuit is 6200 b/s. If a higher bit rate was applied to the input then the received data would be errored.

The actual phases that are produced by the 4 PSK modulator are shown in Table 4.2.

Because the output bit rate is less than the input bit rate, this results in a smaller bandwidth.

A typical 4 PSK circuit is shown in Fig. 4.7(a) and the constellation is shown in Fig. 4.7(b). The input signal is applied to a 2-bit splitter or a l-to-2 demultiplexer. The output bit rate on each of the two outputs is half of that at the input to the splitter.

The two outputs are each connected to the digital inputs to the two ring modulators. The carrier frequency is applied directly to the carrier input to the top ring modulator. The carder input to the bottom ring modulator undergoes a 90 ~ phase shift. The phasor output of the top ring modulator is along the

Table 4.2 Phases produced by a 4 PSK modulator

Dibit Phase change

00 +225~ ~ 01 +135~ ~ 10 +315~ ~ 11 +45~ ~

Page 87: analog and digital comm techniques pdf

70 Digital modulation techniques

(a)

Logic 0 1 Voltage-2 0 +2

I+Ac sin Oct

B ( ~ + A c cos Oct

V O

L ! o t g a l g

C e

1 +2

0 - 2

Output

Four phase shift key modulation constellation

Ol 11

O0 B 10

(b)

B �9 . . . . . . . . . . . . . . . . . . 1 T + 2 v 0

0,1 1,1 ,, +A c cos (Oct

- 2 v +2v

A I IA 0 1

-A e sin (Oct +A c sin mct

s �9

s �9

s �9

s �9

�9 - A c cos Oct "" 0,0" _!_ ~'~ 6

�9 0 - 2 V - B

Fig. 4.7 Four-phase shift key modulation" (a) circuit; (b) constellation

horizontal axis and the phasor output from the bottom ring modulator is along the vertical axis.

A logic high at the input to each ring modulator produces a voltage of +2 V at the output and a logic low at the input produces an output voltage o f - 2 V.

The outputs from the two ring modulators are then summed together in a linear summer. The output of the linear summer produces the constellation shown in Fig. 4.7(b).

4.4.4 Eight-phase shift key modulation

With this modulator 3 bits are processed to produce a single phase change. This means that each symbol consists of 3 bits.

Page 88: analog and digital comm techniques pdf

Phase shift key modulation 71

Example 4.4

An 8 PSK modulator has an input bit rate of 2400 b/s and works into a commer- cial speech band circuit.

Determine:

1. The number of possible symbols at the output. 2. The symbol rate. 3. The phase difference between the symbols. 4. The maximum bit rate.

So/ut/on

1. Three bits produce a single phase change. Hence n = 3 and

M = 2" = 2 3 = 8

D 2. S = - symbols/s

n

2400 = - - ~ = 800 symbols/s

In this case the output symbol rate is a third of the input bit rate.

360 ~ 3. P =

M

360 ~ = = 45 ~

8

This shows that there are eight output vectors for the output data. 4. The bandwidth is 300 Hz to 3400 Hz (B = 3100 Hz). Hence

C = B log2 M

= 3100 log2 8

= 3100 loglo 8 loglo 2

= 9300 b/s

This means that the maximum input bit rate that can be input into the circuit is 9300 b/s. If a higher bit rate was applied to the input then the received data would be errored.

A theoretical 8 PSK modulator Figure 4.8(a) shows a typical circuit for this modulator. With this modulator bit ,4 controls the output polarity of the first digital-to-analogue converter (DAC 1). Bit B is used to control the output polarity of the second digital-to-analogue converter (DAC 2) and bit C is used to control the output amplitude of both the digital-to-analogue converters (DAC 1 and DAC 2).

Page 89: analog and digital comm techniques pdf

72 Digital modulation techniques

A [ DAC ] C ~, ~ + A c sin tOct

Input fc Output

_7 I 900

+A C cos Old

B [DAC21 ~....// Mixer 2

(a)

CB +A c cos Oct

OlO _ . _ ~ Oil

Q u a d ~ ~ ' ~ ! " i i / / i anti

~ . z ~ "11 110 . . . . . . . . . . r--" +0.5V@---/- . . . . 1 . . . . . . . . . . . ~ l

f c a -1.21V -..O.5V~- /1 \ ~ +0.5V +I.21V \i / T \ i/ +Zcs,n c, 1130 . 0 ~ . . . . . . . . . . ,--- -0.5V"~-'-'X . . . . . ~- . . . . . . . . . . ~ 101

CBA Quad ant 4 xxx - " o ~ ~ - o

000 001

-A C cos (Oct CB

(b)

Fig. 4.8 Theoretical eight-phase shift key modulator: (a) circuit; (b) constellation

The input digital signal is applied to a 3-bit splitter or a 1-to-3 demultiplexer. This means that the output bit rate on each of the three outputs is a third of that at the input to the splitter. The data on lead A and lead B are applied to the inputs of the two digital-to-analogue converters (DAC 1 and DAC 2). The output on lead C is applied to the second input to DAC 1 directly but is negated before being applied to the second input to DAC 2.

The carrier frequency from the oscillator is connected directly to the carrier input on mixer 1 (ring modulator) and it passes through a 90 ~ phase shifter before being applied to the carrier input for mixer 2 (ring modulator). The two mixers are identical circuits. The resultant carrier frequency phases are as shown in the circuit diagram indicated in Fig. 4.8(b). As can be seen the phase of the carrier for quadrants 1 and 2 is positive, i.e. axis CB, and the phase of

m

the carrier for quadrants 4 and 5 is negative, i.e. axis CB. The digital-to-analogue conversion follows the conditions given in Table 4.3.

Page 90: analog and digital comm techniques pdf

Table 4.3 modulator

Phase shift key modulation 73

Digital-to-analogue conversion conditions for 8 PSK

A Polarity B Polarity C Amplitude C Amplitude

0 - 0 - 0 0.5 1 1.21 1 + 1 + 1 1.21 0 0.5

The conditions shown in Table 4.3 produce the positions as shown in Table 4.4 for all the different input permutations.

The constellation diagram can now be drawn according to this table and is shown in Fig. 4.8(b). The operation of each mixer is the same as described in Section 4.5.2. By referring to Table 4.4 it will be seen that in each quadrant there are two phases.

The outputs of the two modulators (mixer 1 and mixer 2) are applied to a linear summer. The output of the linear summer then produces the constellation as shown in Fig. 4.8(b).

A p r a c t i c a l 8 P S K m o d u l a t o r

In practice the phase of the carrier frequencies is as shown in Fig. 4.9(a). The digital-to-analogue conversion follows the conditions given in Table 4.3.

The circuit is identical to that of the theoretical 8 PSK modulator except for the phasing of the carrier frequency. On the CB axis the polarity must be multiplied by a negative due to the phasing of the carrier frequency. This produces the positions shown in Table 4.5. In this case the phase of the carrier is negative for the CB axis for quadrants 1 and 2 and the phase of the carrier is positive for the CB axis for quadrants 3 and 4.

The constellation diagram can now be drawn according to this table and is shown in Fig. 4.9(b). As can be seen, again there are two phases in each quadrant. The operation of the circuit is identical to that of the theoretical 8 PSK circuit.

Table 4.4 Input permutations and positions (theoretical) . .

C C B A

1 0 0 0

1 0 0 1

1 0 1 0

1 0 1 1

0 1 0 0 O 1 0 1 0 1 1 0 0 1 1 1

C .4 Polarity Amplitude C' B Polarity Amplitude

0 0 - 0.5 1 0 - 1.21 0 1 + 0.5 1 0 - 1.21 0 0 - 0.5 1 1 + 1.21 0 1 + 0.5 1 1 + 1.21 1 0 - 1.21 0 0 - 0.5 1 1 + 1.21 0 0 - 0.5

1 0 - 1.21 0 1 + 0.5

1 1 + 1.21 0 1 + 0.5 . .

Quad

Page 91: analog and digital comm techniques pdf

A[DA

C

Input

I - c

k +A c sin tOct

7 i / , " ~ - A C c o s 0~ct

I

Ou!put

(a)

CB +A C cos COct

ooo OOl

m ~ / 1 ~ ' 2 1 V t - " ~ ~ r a - - . j. . . . . . . . . .

Quad i " i anti

C A , , ' , , , , t......-~Ak ~ [ [ [ '.11 CA -1.21V -0.5VI~ / 1 \ -~+0.5V +I.21V

-ac sin t~ \i ~ ] / T ~ i ~ i/ +Ac sin t~ Ill

[Note[ 110 ~rant 3 ~ !,--- -0.5V --1-- - - ~ _ . . . . . , , i ~ ~ ~ Q u ~ d rant

]CxBA ] Quad "01 011 4

-A C cos O)ct CB

(b)

Fig. 4.9 Practical eight-phase shift key modulator: (a) circuit; (b) constellation

Table 4.5 Input permutations and positions (practical)

C' C B A C A Polarity Amplitude C B

1 0 0 0 0 0 1 0 0 1 0 1 1 0 1 0 0 0 1 0 1 1 0 1 0 1 0 0 1 0 0 1 0 1 1 1 0 1 1 0 1 0 0 1 1 1 1 1

Polarity Amplitude

0.5 1 0 ( - x - ) = + 1.21 + 0.5 1 0 ( x ) = + 1.21

0.5 1 1 ( x + )= 1.21 + 0.5 1 1 ( x + ) = 1.21

1.21 0 0 ( - x ) = + 0.5 + 1.21 0 0 ( x ) = + 0.5

1.21 0 l ( x + ) = - 0.5 + 1.21 0 1 ( x + ) = 0.5

Quad

Page 92: analog and digital comm techniques pdf

Phase shift key modulation 75

4.4.5 Sixteen-phase shift key modulation

With this modulator 4 bits are processed to produce a single phase change. This

means that each symbol consists of 4 bits.

Example 4.5

A 16 PSK modulator has an input bit rate of 2400 b/s and works into a commer-

cial speech band circuit. Determine:

1. The number of possible symbols at the output.

2. The symbol rate. 3. The phase difference between the symbols.

4. The maximum bit rate.

So/m/on

1. Four bits produce a phase change. Hence n = 4 and

M = 2 n = 2 4 = 16

D 2. S

/ ' 1 /

= - symools/s n

2400 = 600 symbols/s

In this case the output symbol rate is a quarter of the input bit rate.

. P ~ ~

360 ~

M

360 ~ = ~ = 22.5 ~

16

This shows that there are 16 output vectors for the output data. 4. The bandwidth is 300 Hz to 3400 Hz (B - 3100 Hz). Hence

C = B log2 M

= 3100 log2 16

= 3100 lOgl0 16 lOglo 2

= 12 400 b/s

This means that the maximum input bit rate that can be input into the circuit is 12 400 b/s. If a higher bit rate was applied to the input then the received data would be errored.

Page 93: analog and digital comm techniques pdf

76 Digital modulation techniques

i I ....... i .... I I I I

O /

I I

O

f eq-

/ O

"/" 0

0

-

�9 /

I I I. I I I I I I t

Fig. 4.10 Constellation for 16 PSK modulation

The constellation of a 16 PSK modulator is shown in Fig. 4.10. Only the constel- lation for this modulation scheme is shown. A better modulator is the 16 QAM, which is described in more detail below. Notice that in the constellation for the 16 PSK, each phasor is separated from the adjacent phases by 22.5 ~

4.5 SIXTEEN-QUADRATURE AMPLITUDE MODULATION

With this modulator, 4 bits are processed to produce a single vector. Bits A and C determine the quadrant in which the phasor will lie and bits B and D determine the position within the quadrant that the phasor will assume. Bit A is the MSB and bit D is the LSB. This is a better method than 16 PSK modulation. The complete constellation is shown in Fig. 4.11.

A typical circuit is shown in Fig. 4.12. The circuit consists of four identical ring modulators. The carrier to the bottom two modulators undergoes a 90 ~ phase shift.

The top two modulator outputs are summed together to produce phases on the horizontal axis through a linear summer. The outputs of the bottom two

Page 94: analog and digital comm techniques pdf

Sixteen-quadrature amplitude modulation 77

O 0011

-+3V-- 0111

+2V-

�9 - - O-+lV- 0010 0110

-3V -2V - I V I I

�9 �9 - - l v - 0001 0101

- 2 V -

�9 �9 - -3v - 0000 0100

~ 1 I L ~ I

I 1 I I

�9 �9 1011 1111

�9 �9 1010 1110

+IV +2V +3V I I

,,, �9 �9 1001 1101

�9 �9 1000 I100

[ ~ 1 ~ 1 ~ 1 ~

Fig. 4.11 Constel lat ion for 16 QAM showing the 4-bit b inary codes

modulators are summed together to produce the resultant phases on the vertical axis through a linear summer. The vertical and horizontal vectors are summed together to produce the 16 QAM constellation through a linear summer.

The two 6 dB attenuators, or pads, are used to ensure that the output voltage is half of the input voltage. The 6 dB pads are connected to the outputs of the ring modulators for bits B and D.

The following mathematical manipulations show that the 6 dB pads cause the output voltage to be half of the input voltage:

Vout N - 20 loglo ~ dB

Vout - 6 dB - 20 logl0 Vin

-0 .3 = loglo V~ Vin

V~ = 10 -0.3 = 0.5 Via

Page 95: analog and digital comm techniques pdf

78 Digital modulation techniques

Logic 0 1 Voltage -2 0 +2

Logic 00 01 10 11 Voltage -3 -1 +I +3

I

co,ic0 l I oltage ~ ? +1 B

! I If- ~"xl 6dB

_....~ 9 0 , ~ t ~ d Pad

P[ I i:i ou,ou,

I ~'-LI o+2 ~ 6dB [ 1o 1 qt Pad [ 11 g t ; L 11 ~--~c0 g-2 ~ o 10

[ VIL1 o+2 ~ !Ol ~-=-] o ! t 00

c g-2,

16 quadrature amplitude modulation constellation

T

' ' " AB Y

T

CD

Fig. 4.12 Modulator circuit for 16 QAM

The circuit produces the phase angles in each quadrant as shown in Fig. 4.13. This figure, together with Fig. 4.14, clearly indicate the three different amplitudes. Figure 4.13 together with Fig. 4.15 indicate the 12 different phases that result. The three different amplitudes and 12 different phases together with the binary codes for each phasor are shown in Fig. 4.16. This figure shows more clearly the 4-bit binary codes for each phasor.

The modulator works according to the data given in Table 4.6. From this the positions in the constellation can be plotted as shown in Fig. 4.11.

When the logic condition in lead A is a logic high, the output of the ring mod- ulator produces a phase having an amplitude of +2 V. When the logic condition on lead A is a logic low then the output of the ring modulator produces a phase having an amplitude o f - 2 V. The same applies to the logic conditions on leads B, C and D and the outputs from the other ring modulators. The 6 dB pad that is associated with the output of the ring modulator for lead B produces an output voltage of either + 1 V for an input voltage of +2 V or -1 V for an input voltage o f - 2 V. The same applies to the 6 dB pad associated with the ring modulator for lead D.

Page 96: analog and digital comm techniques pdf

+3V

+2V

+IV

I I I i

Phase 3

se 2

�9 �9

I , , I .....

+IV +2V +3V

Fig. 4.13 Phase angles in the first quadrant for 16 QAM

I I I I

O ! C -3V -2V - I V \ �9 o , ~ . .

-2V -

I I I I

I I i I

~ O

I i I I I +IV +2V +3V

_~d " J

I I I I

Fig. 4.14 Constellation for 16 QAM showing three amplitudes

Page 97: analog and digital comm techniques pdf

I I I I

_ N N ~ 5 ~hase4

- �9 �9

Phase 6 . ~ ~

t

- �9 �9

I I I I

I I I !

~ Phase 3 ~ _

e2 �9 �9 -

- - m

~ Phase 1

P

Phase 12

�9 �9 -

I I I I

Fig. 4.15 Constellation for 16 QAM showing 12 phases

i I I I I I i i

_ Quadrant 2 ~ ~ Quadrant ! _

- ~ ~ o + - 3 " f : - ~ o ~ ~ . ~ - 0011 ~ 0111 1 0 1 1 ~ J i l l

/ / J -- [ q~ �9 + iv -

0010 01,10

-3V -2V -IV +lV +2V +3V ~1 \ ! I / I/ O O - I V -

0 0 1 1 ooo, o o ~ * ~ " ~

L - -

- �9 o ~ , ~ : - ~ ~ qD �9 - o o o o ~ o , o o c o ~176176 ~ , , oo

- Quadrant 3 ~ ~ Quadrant 4 -

I I I I I I I I

Fig. 4.16 Constellation for 16 QAM showing amplitudes, phases and codes

Page 98: analog and digital comm techniques pdf

Table 4.6 Input permutations and positions (16 QAM) .

A B C D A B Polarity Amplitude C Polarity

Bandwidths 81

0 0 0 0 0 0 3 0 0 - 3 0 0 0 1 0 0 - 3 0 1 - 1 0 0 1 0 0 0 - 3 1 0 + 1 0 0 1 1 0 0 - 3 1 1 + 3 0 1 0 0 0 1 - 1 0 0 - 3 0 1 0 1 0 1 - 1 0 1 - 1 0 1 1 0 0 1 - 1 1 0 + 1 0 1 1 1 0 1 - 1 1 1 + 3 1 0 0 0 1 0 + 1 0 0 - 3

1 0 0 1 1 0 + 1 0 1 - l

1 0 1 0 1 0 + 1 1 0 + 1

1 0 1 1 1 0 + 1 1 1 + 3

1 1 0 0 1 1 + 3 0 0 - 3

1 1 0 1 1 1 + 3 0 1 - 1

1 1 1 0 1 1 + 3 1 0 + 1

1 1 1 1 1 1 + 3 1 1 + 3

Amplitude Quad

The resul tant constel la t ion consists of three different ampl i tudes dis t r ibuted in

12 different phases as shown in Figs 4.11 and 4.14-4.16.

4.6 BANDWIDTHS

An impor t an t cons idera t ion in any c o m m u n i c a t i o n circuit is bandwidth . T o d a y

the usable f requency spec t rum is becoming increasingly crowded, with less and

less available. This means that bandwid ths mus t be l imited more and more.

4 . 6 . 1 N y q u i s t b a n d w i d t h

This is the m i n i m u m bandwid th required to t ransmi t and receive a digital signal to

ensure error-free communica t ion . The Nyquis t bandwid th is much smaller than

the comple te signal bandwidth . The receiver need only be able to identify the different logic states.

4 . 6 . 2 S p e c t r u m a n a l y s e r c o m p a r i s o n

Consider a m o d u l a t o r using a ca rde r frequency of 140 M H z when a 143.36 Mb/s

bit s t ream is applied to it. F igure 4.17 shows these compar isons .

Page 99: analog and digital comm techniques pdf

82 Digital modulation techniques

2 PSK modulator (Fig. 4.17(a)) The entire band stretches from -3.36 Hz to 283.36 MHz. This is derived from

140 MHz - 143.36 MHz to 140 MHz + 143.36 MHz

In practice the band is from 0Hz to 143.35MHz as there are no negative frequencies.

The Nyquist bandwidth is 68.32 MHz to 211.68 MHz. The frequency deviation is thus 71.68 MHz.

4 PSK modulator (Fig. 4.17(b)) The entire band stretches from 68.32 MHz to 211.68 MHz. This is derived from

143.36/2 = 71.68 Mb/s

140 MHz - 71.68 MHz to 140 MHz + 71.68 MHz

The Nyquist bandwidth is 104.16MHz to 175.84MHz. The frequency devia- tion is thus 35.84 MHz. This is a smaller bandwidth than the 2 PSK.

8 PSK modulator (Fig. 4.17(c)) The entire band stretches from 104.16MHz to 175.84MHz. This is derived from

143.36/4 = 35.84 Mb/s

140 MHz - 35.84 MHz to 140 MHz + 35.84 MHz

The Nyquist bandwidth is 122.08 MHz to 157.92 MHz. The frequency deviation is thus 17.92 MHz. This is a smaller bandwidth than the 4 PSK.

16 PSK modulator (Fig. 4.17(d)) The entire band stretches from 122.08 MHz to 157.92 MHz. This is arrived at

by

143.36/8 = 17.92Mb/s

140 MHz - 17.92 MHz to 140 MHz + 17.92 MHz

The Nyquist bandwidth is 131.04 MHz to 148.96 MHz. The frequency deviation is thus 8.96 MHz. This is a smaller bandwidth than the 8 PSK.

64 QAM From the above it is obvious that if 64 QAM was implemented then the Nyquist bandwidth would be

146.36 MHz/16 = 8.96 MHz

Page 100: analog and digital comm techniques pdf

(a)

(b)

t 0 -3.36 32.48 68.32 1104.161 140 [175.841 211.68 247L~~.52 283.36

(c)

Fig. 4.17

(d)

/ i" .... 71.68MHz ==_ 71.6 / " Bandwidth = 143.36 MSz ~i

[o ,_ ! 2,80 -3.36 168.321 140 ~ 283.36

Differential phase modulation 83

~~ Bandwidth = 35.84 MHz

17.92 MHz '/--~-- 17.92 MHz

-3.36 50.4 86.24 1122.0811401157,921 193.76 229.6 283.36

8.9~6 ~ ~ Bandwidth = 17.92 MHz

~ - ~ / ~ 8.96 MHz

I-3.36}_~ 14i.441177.281 !~13.~21 ~4011157.921 ~ 1238.56] 1283.361 I14.561 1131.04 1148,96 i

Spectrum analyser comparison: (a) 2 PSK; (b) 4 PSK; (c) 8 PSK; (d) 16 PSK

with a deviation of 4.48 MHz. The advantages of QAM modulation are clearly seen. However, there is a limit, as the higher the modulation scheme becomes the closer the phasors are to one another. When the signal is transmitted and noise is introduced it is possible for phasors to cross over and the result is corrupted data.

4 .7 D I F F E R E N T I A L P H A S E M O D U L A T I O N

Differential phase modulation is used on radio and microwave systems which employ BPSK, QPSK or QAM modulators. On these systems the data is trans- mitted in different phasors and/or amplitudes.

If differential modulation techniques are not used then the received signal will be decoded incorrectly as the constellation can and does rotate as it propagates through the air. Differential encoding enables the relative phase and relative amplitude information to be transmitted instead of the actual phase and actual

Page 101: analog and digital comm techniques pdf

84 Digital modulation techniques

amplitude information. This ensures the correct detection and restoration of the digital information.

4.7.1 PSK differential modulation

A typical 8 PSK differential modulator circuit is shown in Fig. 4.18(a). Bits C, B and A, together with bits c, b and a, form the address for the EPROM. Bits C, B and A are the input bits, with bit C being the MSB and bit A the LSB. The output of the EPROM produces bits c, b and a, with bit c being the MSB and bit a being the LSB. These bits are then applied to the 8 PSK modulator.

By considering the constellation diagram of a practical 8 PSK modulator, as shown in Fig. 4.19, bits B and A determine the quadrant and bit C determines the position within the quadrant.

It is important to be able to position the phasors in the quadrant. Figure 4.19(a) shows the axis for a theoretical 8 PSK modulator. As can be seen, the x - x axis contains the binary codes for C A which are 102, 002, 012, 112 from left to right.

B

Binary input

(a)

EP"OM il

oAc

17 F.," c ~Z_~ oultFut

+A C cos (Oct

(b)

ADC F ~ A +Ac sin OOct [ ~ B Binary output

IF ~~--] ~ ~ ~ I ~ input r[ Z ~ EPROM

I

+A C cos ~ct ~'-,N A[DC

I oT CLK I ~_ El

.. ~_1 .v I

Fig. 4.18 (a) 8 PSK modulator (b) 8 PSK demodulator

Page 102: analog and digital comm techniques pdf

Differential phase modulation 85

(a)

i C, A I XXX ]

Quadrant 2

BA = I0 C = I C=O

110

CA

I I 10 100

BA = O 0

C = I C=O

Quadrant 3

J

010

BA= I0 C=O ~=1

CA

I O0

B,4 =00 C=0 C = I

000

v

CB _ 01

I

CB O0

m

011

BA= II C=O C = I

CA I I

01

BA = O I

C=O C = I

001

Quadrant I

BA=II C = l C=0

Ill CA

I 1 I I i I x

11 I01

BA =01 C = I C=O

Quadrant 4

(b)

Quadrant 2

BA =O0 C = I _ C=0

100 CA

10 11o

BA= 10 C = l 6"=0

Quadrant 3

i t

000

BA =O0 C=0 C = !

CA

I O0

BA= 10 C=O C = I

010

Y

CB O0

I '

CB _ OI

001

BA =OI C=O C = l

CA

I I 01

BA=il C=0 C = I

011

Quadrant 1

BA =01 C = I C=0

101 CA

il III

BA=II C = I

Quadrant 4

Fig. 4.19 Constellations for (a) theoretical 8 PSK and (b) practical 8 PSK modulation

Likewise the y - y axis contains the binary codes for C"B, which are 102, 002 , 012, 112 from bottom to top.

Figure 4.19(b) shows the axis for the constellation for the practical 8 PSK modulator. In this case the x - x axis contains the binary codes for CA which are 102, 002, 012 and 112. The y - y axis contains the binary codes for CB, which are 112, 012, 002 and 102.

As an example, the binary code 0012 produces a phasor in quadrant 4 for the theoretical 8 PSK modulator and quadrant 1 for the practical 8 PSK modulator as CA = 012 and CB = 102.

The differential encoding takes place according to the data given in Table 4.7. In this example the logic state of bit C remains unchanged through the differential encoder.

Page 103: analog and digital comm techniques pdf

86 Digital modulation techniques

Table 4.7 Differential encoding data

Bin code Phase angle

Bib A/a

0 0 0 ~

0 1 +90 ~

1 0 - 9 0 ~

1 1 4-180 ~

Example 4.6

A practical 8 PSK differential modulator produces the constellation as shown in Fig. 4.9. The following bit stream is applied to the input of the modulator. The differential encoding takes place according to the data given in Table 4.7.

D a t a = ( l l 0 ) 101 000 010 100 011 1012

Determine the codes for the encoded data at the output of the EPROM. Assume the default code to be 1102.

Solution

The encoding is done as shown in Table 4.8.

1. Find the position on the constellation diagram for 1102 ~ 3rd quadrant. Find the position on the constellation diagram for 1012 ~ 1st quadrant. Relative to 1102, 1012 is found by moving 1102 by 4-180 ~ ~ bits ba = 11, bit c = b i t C = 1. The data is cba = 1112.

2. Feed 1112 back to the input. Find the position on the constellation diagram for 1112 ~ 4th quadrant. Find the position on the constellation diagram for 0002 ~ 2nd quadrant.

Table 4.8 Differential encoding for 8 PSK modula to r

Present Quad Next Quad Phase change Outpu t code

C B A C B A c b a

I I 0

I I I

0 1 1

0 1 0

I I 0

0 0 1

3rd 1 0 1 1st +180 ~

4th 0 0 0 2nd 4-180 ~

4th 0 1 0 3rd - 9 0 ~

3rd l 0 0 2nd - 9 0 ~

3rd 0 l 1 4th +90 ~

1st l 0 1 1st 0 ~

1 1 1

0 1 1

0 1 0

1 1 0

0 0 1

1 0 0

T . . . . . . . . . . . . I

Page 104: analog and digital comm techniques pdf

Differential phase modulation 87

Relative to 1112, 0002 is found by moving 1112 by + 180 ~ -~ bits ba = 11, bit c = bit C = 0. The data is 0112.

3. Feed 0112 back to the input. Find the position on the constellation diagram for 0112 "- '} 4th quadrant. Find the position on the constellation diagram for 0102 ~ 3rd quadrant. Relative to 0112, 0102 is found by moving 0112 by -90 ~ ~ bits ba = 10, bit c - bit C - 0 . The data is 0102.

4. Feed 0102 back to the input. Find the position on the constellation diagram for 0102 -~ 3rd quadrant. Find the position on the constellation diagram for 1002 ~ 2nd quadrant. Relative to 0102, 1002 is found by moving 0102 by -90 ~ - , bits ba = 10, bit c = bit C = 1. The data is 1102.

5. Feed 1102 back to the input. Find the position on the constellation diagram for 1102 --} 3rd quadrant. Find the position on the constellation diagram for 0112 --* 4th quadrant. Relative to 1102, 0112 is found by moving 1102 by +90 ~ --} bits ba = 01, bit c = b i t C = 0 . The data is 0012.

6. Feed 0012 back to the input. Find the position on the constellation diagram for 0012 -* 1st quadrant. Find the position on the constellation diagram for 1012 ~ 1 st quadrant. Relative to 0012, 1012 is found by moving 1102 by 0 ~ --} bits ba = 00, bit c = bit C = I . The data is 1002.

This gives the following data streams:

CBA CBA CBA CBA CBA CBA CBA

Input data = (110) 101 000 010 100 011 1012

cba cba cba cba cba cba cba

Diff. encoded data = (110) 111 011 010 110 001 1002

The differentially encoded data is eventually transmitted to the distant receiver. The receiver must correctly decode the information to obtain the original data stream.

A typical circuit for the differential decoder is shown in Fig. 4.18(b). In this case the intermediate frequency (IF) input is equally split and applied to the two ring demodulators. The IF is demodulated and the outputs are connected to analogue- to-digital converters (ADCs). The resultant digital signals on leads b and a are used as part of the address for the EPROM. The ADC also produce the logic con- dition for lead c which is also used as part of the address for the EPROM. The leads c, b, and a are then connected to the inputs to three D flipflops. The Q

Page 105: analog and digital comm techniques pdf

88 Digital modulation techniques

outputs of these flipflops produce the same logic conditions one clock pulse later. These outputs are used as part of the address for the EPROM.

The output of the EPROM produce the logic conditions for outputs C, B and A. These three outputs are multiplexed together to produce a serial output bit stream.

Example 4.7

A practical 8 PSK differential demodulator produces the constellation shown in Fig. 4.9. The following bit stream is received from the distant transmitter. The differential decoding takes place according to the data given in Table 4.7.

DATA = (110) 111 011 010 110 001 1002

Determine the output data of the decoder. Assume the default code to be 110 2.

So/ut/on

To enable the decoding to be done refer to the constellation diagram for the prac- tical 8 PSK modulator shown in Fig. 4.9(b). The decoding is done as shown in Table 4.9.

1. Find 110 2 o n the constellation --, 3rd quadrant. Determine where 1102 is moved to. Next input data is 1112 ~ C ~--- 1, ba - 11.

112 = 4-180 ~ 1102 is moved to the 1st quadrant ~ B A = 01.

D a t a - 1012. 2. Feed 1112 back to the input.

Find 1112 on the constellation ---, 4th quadrant. Determine where 1112 is moved to. Next input data is O112 ~ C = O, ba = 11.

112 = -t-180 ~

Table 4.9 Differential decoding for 8 P S K demodu la to r

Present

c b a

Quad

1 1 0 3rd

1 1 1 4th

0 1 1 4th

0 1 0 3rd

1 1 0 3rd

0 0 1 1st

Next

c b a

1 1 1

0 1 1

0 1 0

1 1 0

0 0 1

1 0 0

Phase change

+180 ~

4-180 ~

_90 ~

90 ~

+90 ~ 0 o

Ou tpu t code

C B A

1 0 1

0 0 0

0 1 0

1 0 0

0 1 1

1 0 1

Page 106: analog and digital comm techniques pdf

Differential phase modulation 89

1112 is moved to the 2nd quadrant --, B A = 00.

Data = 0002.

3. Feed 0112 back to the input. Find 0112 on the constellation ---, 4th quadrant. Determine where 0112 is moved to. Next input data is 0102 ~ C = 0, ba = 10. 102 = --90 ~ 0112 is moved to the 3rd quadrant ~ B A = 10. Data = 0102.

4. Feed 0102 back to the input. Find 0102 o n the constellation ~ 3rd quadrant. Determine where 0102 is moved to. Next input data is 1102 --~ C = 1, ba = 10. 102 - --90 ~ 0102 is moved to the 2nd quadrant - , B A = 00.

Data = 1002

5. Feed 1102 back to the input. Find 1102 o n the constellation ~ 3rd quadrant. Determine where 1102 is moved to. Next input data is 0012 --* C - 0, ba = O1.

012 = +90 ~ 1102 is moved to the 4th quadrant ~ B A - 11.

Data = 0112. 6. Feed 0012 back to the input.

Find 0012 on the constellation --, 1 st quadrant. Determine where 0012 is moved to. Next input data is 1002 ~ C = 1, ba = 00.

002 -- 0 ~

0012 remains in the 1 st quadrant - , B A - 0 I.

Data - 1012.

This gives the following data stream:

C B A C B A C B A C B A C B A C B A

Output data = 101 000 010 100 011 1012

This is the same as the original data at the transmitter prior to the differential encoding.

4.7.2 Sixteen-quadrature amplitude differential modulation

A typical circuit for a 16 QAM differential modulator is shown in Fig. 4.20. Bits A, B, C and D together with bits a, b, c and d form the address for the EPROM. Bits A, B, C and D are the input bits with bit A being the MSB and bit D the LSB. The output of the EPROM produces bits a (MSB), b, c and d (LSB). These bits are then applied to the 16 QAM modulator.

Page 107: analog and digital comm techniques pdf

90 Digital modulation techniques

C

Binary input

EPROM

Fig. 4.20 A 16 QAM differential modulator

6dB Pad

6dB Pad

16 quadrature amplitude modulation constellation

T ~ o 0 ~ 0 / . , 0 ~t~0 �9 ~ �9 �9

; ~ r : A B

~ , do, ~ ,,~o, ,,o, T 000@ 0100 ~l F I(l~t I1~]

CD

output

The differential modulation method given in the solution to Example 4.8 relies on being able to position the phasors in the correct quadrant in the constellation. By referring to Fig. 4.21 it can be seen that the x - x axis contains the binary codes for AB, which are 002, 012, 102, 112 from left to right. Likewise the y - y

axis contains the binary codes for CD which are 002, 012, 102, 112 from bottom to top.

Using this information it is a fairly simple matter to position each phasor in the correct quadrant. As shown, AC = 112 for quadrant 1, AC = 012 for quadrant 2, A C = 002 for quadrant 3 and A C = 102 for quadrant 4. Hence the logic conditions for A C determine the quadrant in which the phasor lies. The logic conditions for BD determine the position within the quadrant as in each quadrant the logic states of BD assume values of 002, 012, 102 or 112.

As an example the phasor having the code 00102 means that A C = 012 and BD = 002. The code 10002 causes the phasor to lie in quadrant 4 as A C = l0 and BD = 002.

The differential encoding takes place according to the data given in Table 4.10.

Page 108: analog and digital comm techniques pdf

Differential phase modulation 91

~ X

I I I

Quadrant 2

0011 O

AC=01 BD=01

A C = O I BD = O0

0 0010 AB

I I 00

0001

0 AC=O0 BD=01

AC=O0 BD = O0

0 0000

Quadrant 3

' I Y

0111 �9 CO__ AC=01 BD= 11

AC=01 BD= 10

�9 c~__ 0110

AB

I 01

0101 �9 c o _ AC =O0 BD= 11

AC=O0 !

BD= IOco ~ �9 - 0100

I I I I

Quadrant I

1011 1111 �9 �9

AC= 11 A C = 11 BD=01 BD= 11

AC= 11 AC= 11 BD = O0 BD = 10

�9 �9 - 1010 1110 AB AB

I I I I x - 10 II

1001 1101 �9 �9 -

AC = 10 AC = 10 BD=01 BD= 11

AC = 10 AC = 10 BD = O0 BD = 10

�9 �9 1000 1100

Y

i .... I I I I I I I

Fig . 4 .21 C o n s t e l l a t i o n for 16 Q A M s h o w i n g p o s i t i o n i n g of p h a s o r s

Quadrant 4

I I

Example 4.8

A 16 QAM differential modulator produces the constellation as shown in Fig. 4.11. The following bit stream is applied to the input of the modulator. The differential encoding takes place according to Table 4.10.

Data = (0110) 1101 1000 0001 1100 10102

Determine the codes for the encoded data at the output of the EPROM. Assume the default code to be 01102.

Table 4.10 Differential encoding data

Bin code Phase angle Bin code Amplitude

A / a C /c B i b D / d b / B d i D

0 0 0 ~ 0 0 1 1

0 1 - 9 0 ~ 0 1 1 0

1 0 + 9 0 ~ 1 0 0 1

1 1 + 1 8 0 ~ l l 0 0

Page 109: analog and digital comm techniques pdf

92 Digital modulation techniques

Solution

The differential coding is done according to the data given in Table 4.11.

1. Find the position on the constellation diagram for 01102 --o 2nd quadrant. Find the position on the constellation diagram for 11012 -0 4th quadrant. Relative to 01102, 11012 is found by moving 01102 by + 180 ~ --0 bits ac = 11.

Bits B D = 11, therefore bits b d = 00 .

The data is 10102. 2. Feed 10102 back to the input.

Find the position on the constellation diagram for 10102 --0 1st quadrant. Find the position on the constellation diagram for 10002 --0 4th quadrant. Relative to 10102, 10002 is found by moving 10102 by -90 ~ ~ bits ac = 01 .

Bits B D - 0 0 , therefore bits b d = 1 I.

The da t a is 01112-

3. Feed 01112 back to the input .

F ind the pos i t ion on the cons te l la t ion d i a g r a m for 01112 --~ 2nd q u a d r a n t .

F ind the pos i t ion on the cons te l la t ion d i a g r a m for 00012 -.-o 3rd q u a d r a n t .

Rela t ive to 01112,00012 is found by m o v i n g 01112 by + 9 0 ~ --0 bits ac = I O.

Bits B D = 01, therefore bits b d = 10.

The da t a is 11002.

4. Feed 11002 back to the input .

F ind the pos i t ion on the cons te l la t ion d i a g r a m for 11002 ~ 4th q u a d r a n t .

F ind the pos i t ion on the cons te l la t ion d i a g r a m for 11002 ~ 4th q u a d r a n t .

Relative to 11002, 11002 is found by moving 11002 by 0 ~ --o bits ac = 00 .

Bits B D = 10, therefore bits b d = 01 .

The data is 00012. 5. Feed 00012 back to the input.

Find the position on the constellation diagram for 00012 --o 3rd quadrant. Find the position on the constellation diagram for 10102 ~ 1st quadrant. Relative to 00012, 10102 is found by moving 00012 by + 180 ~ -~ bits ac = 11.

Bits B D = 00, therefore bits b d = l l. The data is 11112.

Table 4.11 Differential encoding for 16 QAM modulator

Present Quad Next Quad

A B C D A B C D

0 1 1 0 2nd 1 0 1 0 1st 0 1 1 1 2nd 1 1 0 0 4th 0 0 0 1 3rd

1 1 0 1 4th 1 0 0 0 4th 0 0 0 1 3rd 1 1 0 0 4th 1 0 1 0 1st

Phase

2hange l a c

180 ~ ] 1 1 -90 ~ ] 0 1 ~-90 o 1 0

0 ~ 0 0 180 ~ 1 1

Amplitude

B D b d

1 0 0

0 1 1 1 1 0

0 0 1 0 1 1

Output data

a b c d

1 0 1 0

0 1 1 1 1 I 0 0

0 0 0 1 1 1 1 1

!

Page 110: analog and digital comm techniques pdf

Differentia/phase modulation 93

This gives the following data streams:

ABCD

Input data = 1101 ABCD ABCD ABCD ABCD

1000 0001 1100 1010 2

abcd abcd abcd abcd abed abcd

Diff. encoded data - (0110) 1 0 1 0 0 1 1 1 1 1 0 0 0001 11112

Once the data has been differentially encoded it will eventually be transmitted to the distant receiver. The receiver must be able to correctly decode the data to obtain the original data.

A typical circuit is shown in Fig. 4.22. The IF input is equally split to the four mixers where each input is demodulated with the same carrier frequency. The carrier oscillator is connected directly to the top two mixers and the carrier frequency is shifted by 90 ~ before being applied to the bottom two mixers. The top two mixers produce bits a and c while the bottom two mixers produce bits b and d. These four bit streams are then applied to the EPROM as part of the address. They are also applied to the D inputs of four flipflops and one

IF input } 16 quadrature amplitude modulation constellation

~ o?,,1 ~,, ,~ T

0010 0110 | 1010 I I I0

"=;;;,;AB 0000 0100 / I000 I100 �9 �9 ~ �9 �9

CD

6dB Pad

Pad

a

v

c A

r

~ Binary

EPROM

d , a h

v

b A

r IIW

I

Fig. 4.22 A 16 QAM differential demodulator

Page 111: analog and digital comm techniques pdf

94 Digital modulation techniques

clock cycle later the same logic conditions appear on the four Q outputs and form the other part of the EPROM address. The output of the EPROM produces the bit streams on leads A, B, C and D. These four bit streams are then multiplexed together to form a serial output bit stream.

Example 4.9

A 16 QAM differential demodulator produces the constellation as shown in Fig. 4.11. The following bit stream is received from the distant transmitter. The differential decoding takes place according to the data given in Table 4.10.

D a t a - (0110) 1010 0111 1100 0001 11112

Determine the output data of the decoder. Assume the default code to be 0110 2.

S o l u t i o n

The decoding is done as shown in Table 4.12.

1. Find 01102 on the constellation ~ 2nd quadrant. Determine where 01102 is moved to. Next input data is 10102 --o b d = 00 and B D = 11 ~ ac = 11. 112 -- =t=180 ~ 01102 is moved to the 4th quadrant. A C = 10. Data = 11012.

2. Feed 10102 back to the input. Find 10102 on the constellation --o 1 st quadrant. Determine where 1010 2 is moved to. Next input data is 01112 ~ b d = 11 and B D = O0 ~ ac = 01.

012 = -90 ~ 10102 is moved to the 4th quadrant. A C = 10. Data = 10002.

Table 4.12 Differential decoding for 16 Q A M demodula to r

Present

a b c d

0 1 1 0

1 0 1 0

0 1 1 1

1 1 0 0

0 0 0 1

Quad Next

a b c d

2nd

1st

2nd

4th

3rd

1 0 1 0

0 1 1 1

1 1 0 0

0 0 0 1

1 1 1 1

Phase Ampli tude

a c Change Quad A C

1 1 180 ~

0 1 - 9 0 ~

1 0 +90 ~

0 0 0 ~

1 1 180 ~

4th 1 0

4th 1 0

3rd 0 0

4th 1 0

1st 1 1

b d B D

0 0 1 1

1 1 0 0

1 0 0 1

0 1 1 0

1 1 0 0

Output data

A B C D

1 1 0 1

1 0 0 0

0 0 0 1

1 1 0 0

1 0 1 0

X I

Page 112: analog and digital comm techniques pdf

Review questions 95

3. Feed 01112 back to the input. Find 01112 on the constellation - , 2nd quadrant. Determine where 01112 is moved to. Next input data is 11002 --, b d = l 0 and B D = 01 - , ac = lO .

102 = +90 ~ O1112 is moved to the 3rd quadrant. A C = 00.

Data = 00012. 4. Feed 11002 back to the input.

Find 11002 on the constellation ~ 4th quadrant. Determine where 11002 is moved to. Next input data is 00012 -0 b d = 01 and B D = 10 ~ ac = 00.

002 = 0 ~ 11002 remains in the 4th quadrant. A C = 10. Data = 11002.

5. Feed 00012 back to the input. Find 00012 on the constellation ~ 3rd quadrant. Determine where 00012 is moved to. Next input data is 11112 ~ b d = 11 and B D = O0 ~ ac = 11.

112 = +180 ~ 00012 is moved to the 1 st quadrant. A C = 11. Data = 10102.

This gives the following data streams:

A B C D A B C D

Output data = 1101 1000 A B C D A B C D A B C D

0001 1100 1010 2

This is the same as the original data that was input into the transmitter.

4.8 REVIEW QUESTIONS

4.1 Describe the operation of the ASK modulators shown in Fig. 4.3. 4.2 Explain with the aid of a diagram how a VCO can be used as an FSK

modulator. 4.3 Explain with the aid of a diagram how a VCO can be used as an FSK

demodulator. 4.4 Draw a typical circuit diagram of a PSK modulator. 4.5 Draw the constellation of a typical theoretical 8 PSK modulator. 4.6 Show the positions on the constellation of a practical 8 PSK modulator for

the following data stream.

Data = 011 101 110 0012

Page 113: analog and digital comm techniques pdf

96 Digital modulation techniques

4.7 Determine the output data for a 16 QAM differential modulator given that the default code is 10012. The modulator codes the data according to the information given in Table 4.10. The input data stream is as follows"

Data = 0111 0011 0000 0110 11112

4.8 Decode the bit stream obtained in Question 4.7 using a 16 QAM demodu- lator which uses a default code of 10012. The demodulator decodes the data according to the information given in Table 4.10.

Page 114: analog and digital comm techniques pdf

5 Pulse code modulation

The human being is a community animal and cannot survive without communication with other human beings.

5.1 INTRODUCTION

The method of converting analogue signals to digital format for telephones is of prime importance, as most businesses and most homes still have a cable pair linking the telephone or telephone system to the exchange. There are presently two standards, the North American standard and the European standard. The UK has followed the European standard and hence this chapter deals mainly with the pulse code modulation (PCM) system that is based on the European standard.

The PCM system relies on many different processes and this chapter is devoted to explaining these different concepts. The concepts are then placed in the full context of a typical PCM system.

5.2 TIME DIVISION MULTIPLEXING

Time division multiplexing is a method of allocating each channel to a single line in a specific time slot. This means that each channel has full access to the trans- mission line during its particular time slot only. All the channels use exactly the same frequency band. This is unlike an FDM system (discussed in Chapter 2). Each channel on the FDM system is connected to the line for the whole time but each channel is allocated a different frequency band.

Figure 5.1 shows how an analogue signal applied to one channel, on a PCM system, is sampled and the resultant pulse amplitude modulated (PAM) signal that is obtained. The PAM signal is then transmitted. Notice that the PAM signal consists of a number of samples. Observe that the dotted line on the PAM signal touches the peaks of each sample and that the shape of this dotted line is the same as that of the original modulating frequency.

Page 115: analog and digital comm techniques pdf

98 Pulse code modulation

+2

+1

0

-1

-2 Modulating frequency

+1

0 I I I

Sampling frequency v t

0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +10 +11 +!,_2 I I I I I I I I I I I I ,

Fig. 5.1

+2+1 f """�9

0 "'[

-'t -2

"-,I,,,.. l-" ..1.'" q' , , . , , . , , , �9

Pulse amplitude modulating signal

Time division multiplexing

5.3 PRINCIPLE OF OPERATION

For the principle to be effectively used, a number of analogue signals are sampled to produce a time division multiplexed (TDM) signal. The principle of TDM is shown in Fig. 5.2. As shown in this figure, each sample in the TDM signal is quantised and encoded into a binary signal. The binary signal is then further processed and then transmitted down the transmission medium.

Figure 5.2(a) shows two mechanical switches. One mechanical switch has multiple inlets and the second mechanical switch has multiple outlets. The wiper arms of both switches start their rotation at the same position. The two motors driving both switches must be synchronised so that the correct inlet is connected to the correct outlet at the same time. This means that when the wiper on switch 1 is connected to inlet 1, the wiper arm of switch 2 must be connected to outlet 1. The wipers only stay in this position for a short duration and the wiper of switch 1 rotates to inlet 2. At the same time the wiper of switch 2 rotates to outlet 2. This process then continues until, as in this case, inlet 3 at the transmitter is connected to outlet 3 at the receiver. Both wiper

Page 116: analog and digital comm techniques pdf

Principle of operation 99

(a)

(b)

Fig. 5.2

Rotary switch 1 Rotary switch 2 ,, F--'~I""-.. Inlet 1 Outlet 1

Ch 1 ~r--[~.. , . .~ / / f . ~ ( ~ ~ . . ~ ~ C h l

Synchronisation Inlet 2 / Wiper .-!"[ r . . . . . . . . . . . . . . . t [ .~" Wiper \ Outlet 2

o ~ ~ ( ~ pcM LI PCM ~ arm k ~ Ch2 ] ~ ~ ~,,[encoding[ [encoding]~/ / ~ I M _ Ch2

Ig"l I ' ~ ~ _ Transmission line ~ ~ F~ ,., Ch 30---I,,'l-I ~ ~ , I , , . . . . , ~ ',', - I /~-i~"1--O Ch 3

- !~ ~ Inlet 3 Outlet 3 V t_~

l ! , , ,nn,

!nnn~nnn

i l l i i l l n i l f l l l |

flilllnfllln Frame

PAM signal channel 1

Channel 1

Clock 1 j PAM signal channel 2

Channel2 I_ _ ~ _

el PAM signal channel 3 /

Channel 3 ~ PAM ,,r l -I t x t v 7 T . cPAaMsiegn4a

] PAM , ~ Channel4 I j m m r i

Channel 1 Channel 2 Channel 3 Channel 4 Channel 1

T D M signal etc. n ,n_, , . . , l I| 'U I p F'Lq PAM highway

Principle of TDM: (a) mechanical switches; (b) simple system

arms then rotate to connect channel 1 at the transmitter to channel 1 at the receiver.

In practice the mechanical switches are too slow and the principle is imple- mented using electronic gates instead.

As can be seen, the signal on each channel is connected to the line for only a short time. The signal that is developed for each channel is a PAM signal and because there are multiple switches the resultant signal is a TDM signal that is transmitted down the line.

Referring to Fig. 5.2(b), the mechanical switches have been replaced by elec- tronic switches or analogue gates. Each analogue gate is controlled by means of a sampling frequency which is a rectangular waveform. Each time the rectangular pulse appears on the control lead of that particular gate the gate closes for the duration of the rectangular pulse. Each pulse has an extremely short width. Thus the gate only remains closed for a very short period of time.

Page 117: analog and digital comm techniques pdf

100 Pulse code modulation

Channel I

Channel 2

~ . - - ' - i ~ I I I ...... . .LJ L l _.a-"--

Channel 3

Channel 4

InllHnlIHIIIHIIIHIIIInlIHHIIHHIIIIII InlIHHlll IIIHIIIHHIIHHIIHHIII i

Sampling frequency

L Irln ii~rl I1~ illn ,n~ . , onl,nndnndon,, n_ ~ n l Ul I I I I "uu-luur u" u - u . , u uu I - Time division multiplexed signal

Fig. 5.3 Signal sampling for a four-channel TDM system

The output of each channel gate produces a PAM signal. However, as can be seen, the outputs of all the gates are commoned together and hence a TDM signal is obtained on the PAM highway.

5.3.1 The time division multiplexed signal

Figure 5.3 shows how the TDM signal is developed on a four-channel system. As shown, each channel is sampled using a sampling frequency. The sampling fre- quency for each individual channel is displaced in time relative to the preceding and succeeding channel. This means that the sampling takes place successively, so that channel 1 is sampled first, followed by channels 2, 3 and 4, then channel 1 is sampled again and so on.

5 .4 R E C O M M E N D E D S T A N D A R D S

The International Telecommunication Union (ITU), which is a subcommittee of the United Nations (UN) has recommended two standards. These are:

Page 118: analog and digital comm techniques pdf

The 30~32-channel CEPT PCM system 101

�9 North American standard. �9 European standard.

The North American standard is based on a 24-channel PCM system which uses the p-law (or mu-law) for quantising. The system produces a gross line bit rate of 1.55 Mb/s. The system was designed for channel-associated signalling.

In 1959 the European countries formed a non-political organisation 'CEPT'. The English translation of this mnemonic is: 'The European Committee of Postal and Telecommunication Administrations'. This committee recommended standards for compatibility of the telecommunications systems employed throughout Europe.

From this committee the European standard based on the 30/32 channel PCM system was recommended. This system contains 30 speech channels, a synchroni- sation channel and a signalling channel. The gross line bit rate of the system is 2.048 Mb/s and it uses the A-law in the quantisation process.

The European system can be adapted for common channel signalling and if this is used then it would have 31 data channels and a single synchronisation channel. The gross line bit rate would still be 2.048 Mb/s.

Both systems use a sampling frequency of 8 kHz for each channel.

5.5 THE 30/32-CHANNEL CEPT PCM SYSTEM

The 30/32 channel PCM system uses a frame and multiframe structure. The channel allocation is as follows:

�9 Time slot 0: frame alignment word (FAW), frame service word (FSW). �9 Time slots 1 to 15: digitised speech for channels 1 to 15. �9 Time slot 16: multiframe alignment word (MFAW), multiframe service word

(MFSW), signalling information. �9 Time slots 17 to 3 l: digitised speech for channels 16 to 30.

5.5.1 The frame and multiframe structure

The frame structure The frame consists of 32 pulse channel time slots (TS), as shown in Fig. 5.4, numbered TS 0 to TS 31. Each time slot consists of 8 bits. As shown time slots 1 to 15 are used for the digitised speech on channels 1 to 15 and time slots 17 to 31 are used for the digitised speech on channels 16 to 30.

In these time slots bit 1 is used to indicate the polarity of the sample and bits 2 to 8 indicate the amplitude of the sample. This is also shown in Fig. 5.4.

The multiframe structure In order for signalling information (dial pulses) for all 30 channels to be transmitted, the multiframe consists of 16 frames numbered F0 to F15. This structure is shown in Fig. 5.4. Signalling for two channels is transmitted in time slot 16 in each frame.

Page 119: analog and digital comm techniques pdf

102 Pulse code modulation

, Muhi f r ame ,

2 m s .......... > :

i,~

i , . . . . i-"

! i 0

F r a m e " ,

125 ias ~*~

E l 2IIiIII3 4 5 6 7 8 9 ' !'~ ' ' '~ 14l" 16 L 1 | i I ' I I i ' I I i I 1,ThSl'9120121122123124125126127128129130h'

, ,6 9110111112 13 14115 L161lTIlS|I9120121122123124125126127128129130 i i I i i i

Time slot ' Time slot ' Time slot " !

3.9061as �9 ~ ~ 3.906p.s - - ~ 3 . 9 0 6 ~ - -

Even frames = FAW

, 1 0 1 0 1 , 1 , 1 0 1 , 1 , Odd frames - FSW

�9 MSB LSB

! i | i i

Pol ',Amplitude', t | , * �9

MSB I ,' ,~- 488 ns

Bit

I I l

LSB

,1213141,12131 , Frame 0, TS 16 = MFAW + MFSW

I MFAW MFSW , 0 1 0 ' , 0 ' , 0 X',A~.~X,X,

..... = |1 l Frames to 15, TS 16 I

Signalling I Signalling for CH,I to,15 for,CH 16 to 30

Time slot 1 to time slot 15 = channel 1 to channel 15

Time slot 17 to time slot 31 = channel 16 to channel 30

Nationally determined

> Remote frame alignment alarm indication Remote multiframe alignment alarm indication <

Fig. 5.4 Frame and multiframe structure for a 30/32-channel PCM system

5.5.2 Time durations

The sampling theorem states that the sampling frequency fs must be greater than twice the highest modulating frequency.

The analogue input to each channel is the commercial speech band and this is defined as being a frequency range of 300 Hz to 3400 Hz. This means that the highest modulating frequency is 3400 Hz. The sampling frequency must be greater than 6800 Hz. The CCITT recommendation is that the 8 kHz is used as the sampling frequency.

The following calculated time durations are all shown in Fig. 5.4.

Frame duration The frame duration is determined as follows:

1 frame duration = -

A

Page 120: analog and digital comm techniques pdf

The 30~32-channel CEPT PCM system 103

Given that fs is 8 kHz,

frame duration = 125 Ils

Time slot duration The time slot duration is determined as follows:

time slot duration = frame duration

time slots per frame

Given that frame duration is 125 ps and number of time slots per frame is 32,

time slot duration = 3.906 ~ts

Bit duration The bit duration is determined as follows:

bit duration = time slot duration

bits per time slot

Given that time slot is 3.906 ~ts and number of bits per time slot is 8,

bit duration = 488 ns

Multiframe duration The multiframe duration is determined as follows:

multiframe duration = frame duration • frames per multiframe

Given that frame duration is 125 ps and number of frames per multiframe is 16,

multiframe duration = 2 ms

Gross fine bit rate The gross line bit rate is determined as follows:

1 gross line bit rate =

bit duration

Given that bit duration is 488 ns,

gross line bit rate = 2.048 Mb/s

5.5.3 Time slot usage on a 30/32-channel CEPT P C M system

Table 5.1 shows the allocation of the 32 time slots in each of the 16 frames. Time slot 0 in the even frames (i.e. frames 0, 2, 4, 6, 8, 10, 12 and 14) carries the FAW, which is X00110112. Time slot 0 in the odd frames (i.e. frames 1, 3, 5, 7, 9, 11, 13 and 15) carries the FSW, which is X 1ANNNNN2. The structure of the time slot for these two words is shown in Fig. 5.4. The MSB (X) in both cases is a 'don't care' bit and is normally kept in the set state. Bit 2 in the FAW is always reset and bit 2 in the FSW is always set. The receiver recognises whether the received word in TS 0 of F 0 is the FSW or the FAW by detecting whether bit 2 is a logic low or a logic high.

Page 121: analog and digital comm techniques pdf

104 Pulse code modulation

Table 5.1 Allocation of time slots within frames

Frame Time slots

0 1 to 15 16 17 to 31

0 FAW CH 1 to 15 MFAW MFSW CH 16 to 30 1 FSW CH 1 to 15 CH 1 CH 15 CH 16 to 30 2 FAW CH 1 to 15 CH 2 CH 17 CH 16 to 30 3 FSW CH 1 to 15 CH 3 CH 18 CH 16 to 30 4 FAW CH 1 to 15 CH 4 CH 19 CH 16 to 30 5 FSW CH 1 to 15 CH 5 CH 20 CH 16 to 30 6 FAW CH 1 to 15 CH 6 CH 21 CH 16 to 30 7 FSW CH 1 to 15 CH 7 CH 22 CH 16 to 30 8 FAW CH 1 to 15 CH 8 CH 23 CH 16 to 30 9 FSW CH 1 to 15 CH 9 CH 24 CH 16 to 30

10 FAW CH 1 to 15 CH 10 CH 25 CH 16 to 30 11 FSW CH 1 to 15 CH 11 CH 26 CH 16 to 30 12 FAW CH 1 to 15 CH 12 CH 27 CH 16 to 30 13 FSW CH l to 15 CHI3 CH28 CH 16to30 14 FAW C H l t o l 5 CH 14 CH29 CH 16to30 15 FSW CH 1 to 15 CH 15 CH 30 CH 16 to 30

In both the FSW and M F S W words the A bit is the alarm bit for the extension

of remote alarm conditions. The N bits in the FSW are used for nationally

determined conditions. The X bits in the M S F W are 'don ' t care' states and are

normally placed in the set state.

Time slot 16 in frame 0 is used to carry the M F A W and M F S W words. The first

4 bits in the time slot are allocated to the M F A W and the last four bits are

allocated to the M F S W . As shown in Fig. 5.4 the M F A W consists of 00002

and the M F S W consists of XAXX2.

The purpose and usage of the FSW and the M F S W will be dealt with in Section

5.10.

Time slot 16 in frames 1 to 15 carries signalling information for the 30 speech

channels. In each frame, signalling information for two channels is conveyed. This

is shown in Table 5.1 as well as Fig. 5.4. Time slots 1 to 15 carry the digitised speech information for channels 1 to 15,

respectively, and time slots 17 to 31 carry the digitised speech for channels 16 to

30, respectively.

5.6 ALIASING DISTORTION

As ment ioned before, the 30/32-channel P C M system must use a sampling

frequency of 8 kHz, which is the ITU recommendat ion. The sidebands that

result in the T D M signal are as shown in Fig. 5.5(a).

Page 122: analog and digital comm techniques pdf
Page 123: analog and digital comm techniques pdf

106 Pulse code modulation

5.6.2 Nyquist sampling

If the sampling frequency is made exactly twice the highest modulating frequency then this is referred to as Nyquist sampling. In this case there is no gap between the speech band and the 1st LSB as well as between the 1st USB and the 2nd LSB etc. This means that the original speech cannot be extracted easily by means of a simple low-pass filter. The resultants bands are shown in Fig. 5.5(b); the process continues to infinity.

5.6.3 ABasing distortion defined

Aliasing distortion can be caused by two factors:

�9 When the sampling frequency is smaller than twice the highest modulating frequency.

�9 When the audio input frequency band extends beyond 3400 Hz.

fs smaller than 2fa This situation is shown in Fig. 5.5(c). Notice how the sidebands overlap one another. In this case the original speech cannot be extracted using a low-pass filter without interference. This problem is prevented by deriving the clock frequency and system timing from a highly stable crystal oscillator. The resultant bands are shown in the figure; the process continues to infinity.

fa stretches beyond 3400 Hz This situation is shown in Fig. 5.5(d). Notice how the sidebands overlap one another. In this case the original speech cannot be extracted without interference. This problem is prevented by passing the input audio through a low-pass filter at the input to the channel. This filter is referred to as an aliasing filter and limits the highest frequency that is applied to the input to the channel gate to 3400 Hz. The resultant bands are shown in the figure; the process continues to

infinity.

5.7 QUANTISING AND ENCODING

The quantising and encoding process normally takes place simultaneously. How- ever in this discussion each process will be discussed separately.

5.7.1 Quantisation

Linear quantising versus non-linear quantising Consider the two scales shown in Fig. 5.6. Comparing sample 1 to the linear scale, the sample is increased by 0.25V from 1.75 V to 2 V. The percentage distortion, more correctly referred to as the percentage quantisation noise, that is added to

Page 124: analog and digital comm techniques pdf

Quantising and encoding 107

Quanta levels 7 - 7

6 - 6

0

�9 ~ 5 - 5

4 - 4 r

2 3 - 3

2 - 2

1 - 1

_ - 8

Quantised - up Quantised

.{ . . . . . down

_ . . . . " . . . . . il; il . . . . . .

Quantised Quantised m up up

. . . . . . . . . . . . . . . . . . . . " . . . . . . . . . . . . . . . . . . -( . . . . . . :

Sample Sample 1 2

~--- 4.75

4

1.75

1

Fig. 5.6 Linear and non-linear quantising scales

m

8 Quanta

levels

.9.0

L .

- 4 = 0

O

Z m

2

1

the sample is determined by the equation

distortion [actual sample ampli tude- quantised sample amplitude[ = x 100% actual sample amplitude + quantised sample amplitude

Notice that the modulus of the numerator is taken to ensure a positive value irrespective of whether the quantised sample amplitude is greater than the actual sample amplitude or vice versa.

This means the percentage quantisation noise added to sample 1 when com- pared to the linear scale is 6.7%. Comparing sample 1 to the non-linear scale results in a percentage distortion of 6.7% as it is increased by 0.25V from 1.75 V to 2 V, which is the same as that given by the linear scale.

Comparing sample 2 to the linear scale means that it is increased by 0.25 V from 4.75 V to 5 V, which gives a percentage quantisation noise of 2.56%. Comparing sample 2 to the non-linear scale, it is decreased in amplitude by 0.75 V from 4.75 V to 4 V, as shown. This gives a percentage quantisation noise of 8.57%.

The above shows that the difference in the percentage quantisation noise added between the two samples, when compared to the linear scale, is 6 . 7 - 2.56%, which yields 4.14%. The difference in the percentage quantisation noise added between the two samples when compared to the non-linear scale is 8 .57- 6.7%, which yields 1.87%.

This shows that the non-linear scale produces a smaller percentage difference in the amount of distortion added, i.e. 1.87%, when compared to the percentage difference for the linear scale, i.e. 4.14%.

This shows that the non-linear scale tries to add approximately the same percentage quantisation noise to both the samples. The scale tales to produce the same percentage quantisation noise irrespective of the sample amplitude. In practice this is more accurately achieved because the non-linear scale has more quanta for small amplitudes than for large amplitudes, which will reduce the percentage quantisation noise for small amplitude samples but increase the percentage quantisation noise for large amplitude samples. The linear scale,

Page 125: analog and digital comm techniques pdf

108 Pulse code modulation

however, produces a very small distortion for large amplitude samples but a large percentage distortion for small amplitude samples.

The non-linear scale is preferred because the quantisation noise added tends to be more independent of the sample amplitude than the quantisation noise added by a linear scale.

Non-linear quantising As mentioned earlier, the ITU has recommended two different non-linear quan- tising scales, the A-law and the #-law. These quantising scales are very similar, the only difference being the mathematical equation which is used to produce the graph. These two equations are given below. The #-law equation is

loge( 1 + #lxl)xmax

Y = Ymax Ioge(1 + #) sgn x

where +1 forx>_O

s g n x = - l f o r x < O

To obtain a signal-to-noise ratio (SNR) >38 dB for an 8-bit time slot the standard value of/z is 255. The formula to calculate the SNR is

(2.) SNR = 3 iOge#

where n = number of bits per time slot

The equation to calculate the SNR in dB is

dB SNR=101ogl0 3 ioge~

For values of # = 255 and n = 8, SNR = 38.06 dB. The A-law equation is

Ymax (l Ixl/Xmax loge A sgnx f o r 0 <

Y = Ymax (l+l~ n x l + loge A

Ixl 1 Xma x A

1 f o r ~ < Ixl

Xmax < 1

+1 for x > 0 where s g n x = - l f o r x < 0

To obtain an SNR >38 dB for an 8-bit time slot the standard value of A is 87.6, which is the SNR value as a ratio. The formula to calculate the SNR in dB is

SNR = 20 log10 A dB

For a value of A = 87.6, SNR = 38.85 dB. The A-law and #-law graphs for the standard values specified above are very

similar and hence in the discussion given below only the A-law quantising scale

Page 126: analog and digital comm techniques pdf

Quantising and encoding 109

will be discussed, as this is the one that the ITU recommended for use on the 30/32- channel PCM system.

Each time slot consists of 8 bits. This means that the decimal range that can be represented is from 0~0 to 255~0. This can be determined as follows:

maximum decimal number = 2"

where n - number of binary bits

Because any sample can be either negative or positive, the quantising scale is composed of a positive half and a negative half, which are mirror images of one another. As a result the scale is sometimes referred to as a folded scale.

The decimal range in each half is from 0~0 to 12710. In each time slot bit 1, which is the MSB, is used to indicate the polarity of the sample. If the sample is positive then bit 1 is set to a logic 1. If the amplitude of the sample is negative then bit 1 is reset to a logic 0. Bits 2 to 8 are used to indicate the relative amplitude of the sample in the range 0~0 to 127~0. The structure of TS 1 to TS 15 and TS 17 to TS 31 is shown in Fig. 5.4.

The scale gives a smooth logarithmic curve. In practice the scale is implemented with discrete linear segments that follow the smooth curve and hence the scale is said to be quasilogarithmic. Figure 5.7 shows this scale, with straight lines between +Vmax and +V/2, +V/2 and +V/4, etc. through to -V/2 and -Vm~. The scale is known as a 13-segment scale as can be seen in Fig. 5.8.

+127

+111

v +95

- ~ -',, +79

- ~ " : , +63 v ",', -~ ,,.::, v ', ",',,

- -~ "', "'"'., +31

V V" , " ~ u

2 4 " "l'il

! i

' i : ' I , | | i

! i i ! i ! i

i i , i i I i i

i i J-P

' , " " , ", v

1

Fig. 5.7 Linear segments making up the logarithmic curve

Page 127: analog and digital comm techniques pdf

110 Pulse code modulation

+127

+111

+95 v

i m

64 ,�9 +79 Segment8 v �9149

32 ' ,~�9 +63

16 v "','::, s '"'i":',"::, +31

v my -T

i ": ~'~~

, ! ~.~.~"

, ! 111 ~,

i . Segment ~'~ i Segment 13' ! ,~ t!~g~. ".

t ~'~ I.~ ,'~

I i " ! - -

Fig. 5.8 T h i r t e e n - s e g m e n t scale

!

I

i t

I ! !

1 1 t

1 t 1 I I I

V

..., . ! ,~ ,,~}[ ,~ !

~ ] Segment 2 ~,',~.~ ! .'y,,,~'. t

~'~,~: i ""?~ i

v v "'" +u +T

v +~- ~ � 9 1 4 9 V

+ T6 "'"-, + v

�9 32 3 g t"e-men" 6 , - + ~

Segment 1

t -111

-127

Notice that segment 7 consists of a positive section between + V/64 and 0, and a negative section between 0 and -V/64.

Each linear segment is broken up into a number of quanta. The number of quanta in each segment is given in Table 5.2. The quanta total 256, which repre- sents the range from 010 to 255~0.

Because the speech band has already been limited to between 300 Hz and 3400 Hz there is a loss of quality. Also the higher frequency components normally have small amplitudes. To enable these small components to be more accurately quantised, more quanta levels are allocated in the region between + V/64 and -V/64, and as shown in Table 5.2 there are 64 quanta in this range.

Figure 5.9 shows how the quantising takes place on a system. For simplicity, eight quanta have been allocated per linear section and each time slot consists of 5 bits. If a sample has an amplitude that is halfway between two quanta levels then the amplitude that is allocated is the higher quantum level. This is shown for sample 4 which has an actual amplitude of +8.5 V and is quantised to an ampli- tude of +9 V. The sample is then encoded to a 5-bit binary word of 110012.

If the sample has an amplitude that is smaller than the threshold value then it is allocated the lower amplitude. This is shown for sample 2, which has an actual amplitude of +12.3 V. The sample is quantised to an amplitude of +12 V. The sample is then encoded to a 5-bit binary word of 111002.

Page 128: analog and digital comm techniques pdf

Quantising and encoding 111

Table 5.2 Number of quanta in each segment

Segment Voltage range No. of quanta

1 + Vm= to + V/2 16 2 + V/2 to + V/4 16

3 + V/4 to + V/8 16

4 + V/8 to + V~ 16 16 5 + V / 1 6 to + V / 3 2 16

6 + V/32 to + V/64 16 7 + V/64 to 0 32

7 0 to - V/64 32

8 - V/64 to - V/32 16 9 - V/32 to - V/16 16

10 - V~ 16 to - V/8 16

11 - V/8 to - V/4 16 12 - V/4 to - V/2 16

13 - V/2 to - Vmax 16

If the amplitude of the sample is higher than the threshold level then the next higher amplitude is allocated; this is shown for sample 1 which has an actual amplitude of +2 .75 V. The sample is quantised to an amplitude of +3 V. The sample is then encoded to a 5-bit binary word of 100112.

Quanta values

I I I

I I I I I I I I I I O I I I I g I I I I I I I I I I I

Quantised Binary

values code + 1 5 - 1 1 1 1 1 +14-- l l l l O I

+12 - 11100

+ 9 - 11001

+7 ~- 10111

+3 - 10011

I I I I I I I

-7 n00111

-15-=01111 Quantised Binary

values code

!

! 7 o :

0 : o o | I I ;

o ;

o " I o ; i ! i _," i i i

- Sample I +2.75 v m

- Sample 2 + 12.3 V

- Sample 3 + 14 V _L II I

_ Sample 4 +8.5 V

Quanta values

I

J I !

I o I o I u I o

i ' !

i ' !

~ ,, : o

i ' !

i ' | : o

Fig. 5.9 Quasilogarithmic quantisation

Page 129: analog and digital comm techniques pdf

112 Pulse code modulation

Sample 3, which has an actual amplitude of + 14 V, is the only sample that has the correct amplitude allocated to it as it is exactly midway between the two threshold values. It is quantised to an amplitude of + 14 V and is then encoded to the 5-bit binary word of 111102.

In these examples it can be seen that the quantising scale does not allocate accurately the correct amplitude to a sample. This results in noise in that the sample amplitude is either slightly reduced or slightly increased. This noise is known as quantising noise. Quantising noise results due to a sample having an infinite level range being quantised against a scale having a finite level range.

Although this example only shows samples having a positive amplitude the same applies to samples having a negative amplitude. The only difference is the status of the MSB. As can be seen for the positive samples the MSB is a logic 1. For samples having a negative polarity the MSB would be coded as a logic 0.

5.7.2 Encoding

Figure 5.10 shows a block diagram of a typical encoder. Each sample is encoded into an 8-bit word in this circuit. The circuit implements the successive approx- imation method of analogue-to-digital conversion.

The sample is applied to the input and passes through the analogue switch. Its amplitude is then held in a store (which is normally a capacitor that is charged to the appropriate voltage) and the switch is then opened to prevent any interference. This circuit is simply a sample-and-hold circuit.

At the same time the output of the serial-input-serial-output (SISO) register is reset and the ring counter is reset by the controller circuit. The first operation performed is the determination of the sample amplitude. This is done by means of a comparator. The comparator output is connected to the controller. The controller starts the ring counter. The ring counter is used to set the output of FF 1. If the sample polarity is positive then FF 1 is left in the set state. If the polarity is negative then FF 1 is reset. The controller also connects the correct reference voltage to the weighted resistor chain.

The ring counter is clocked, which causes FF 2 to be set and the controller causes gate G2 to close, so that a reference voltage VR is applied to the amplitude comparator, with a value Vr~f/2, which is a relative amplitude of 6410. Note that VR is the total resultant voltage applied to the one input of the amplitude comparator from the output of gates G2 to G8, and Vrer is a fixed reference voltage that is applied via the weighted network to gates G2 to G8. The amplitude comparator compares the input voltage Va to the reference voltage VR. If Va > VR then the controller will cause gate G2 to remain closed and cause FF 2 to remain set. If Va < VR then the controller will cause gate G2 to open and FF 2 to be reset. Gates G3 to G8 are all open at this stage.

The controller will now cause gate G3 to close and clock the ring counter which will cause FF 3 to be set. The value of VR becomes Vrd4, which is a relative

Page 130: analog and digital comm techniques pdf

Quantising and encoding 113

Analogue input

G2

G3

G4

G5

G6

G7

Sample & hold

~System -'

control

+ - l o g i c I

- = l o g i c 0

Polarity

vR

t~-13-t~ -~- -2t:;t t;tJ-t-6t -~- -4t-3--2t-:!

~-~" ~; t* t-6t ;- ;t .3. -~t-; ! ~" t ~-7t--t-I* -4t-3--~t-'- ! ~, ~q7 t i ' 1.3. ffl !

Lng counter

Controller

S e r i a l

~ - ~ ~' ~ ~ 21'

-Vre f

Quantiser

Reset

! I System System control clock

J ~ . ,J

Encoder

Fig. 5.10 Quantiser and encoder

amplitude of 3210. If gate G2 was closed then the total reference voltage VR would be Vr~f/2 + Vref/4, which has the relative amplitude of 6410 + 3210 = 9610.

The amplitude comparator compares the input voltage Va to the reference voltage VR. If Va >_ VR then the controller will cause gate G3 to remain closed and cause FF 3 to remain set. If Va < VR then the controller will cause gate G3 to open and FF 3 to be reset. Gates G4 to G8 are all open at this stage. Gate G2 is either permanently open or closed for the rest of this conversion cycle.

The cycle will continue with gates G4 to G8 with the setting and/or resetting of FF 4 to 8 in turn and comparing Va to the new reference voltage in turn. At the end of the cycle the 8-bit binary word is stored in FF 1 to FF 8 and is output as a serial bit stream.

The process can be more easily understood by considering the following example.

Example 5.1

Using Fig. 5.11 determine the 8-bit word for a sample having a relative amplitude of --5710.

Page 131: analog and digital comm techniques pdf

114 Pulse code modulation

Sample & hold [ + = logic 1 ~ Serial '- ~ -' - = logic 0 ~ output System d r . . I . 1

control [I ~ - ~ Poiarity " ~ ~ - - - - - ] " -

input

[- .... V R = 32 + 1 6 + 8 + 1 = 57,o } / I l l l l l l ~

v., 8 7 6 5 4 3 " 9 1 C L K v@ t!]7_[.60~5_ .~_~! A

32,..\ I ,~,, ,~,, .~.,,, .o~, .~, .~, s., .~.~, ~ I I J"10~ I ,. . . . . . . . . . . II ~! Controller [ J I

. _ ~ v,~ [ 8 1 7 / 6 / 5 / 4 1 3 / 2 1 1 1 ~ , 1 1 l . . . . . . . J _ �9 . . . . T roq-o-[ol-oroq -[oT61' l I 11 I f ~ Reset

v.f I 8 ' 1 7 1 " ' r l ln .... ~ - - - - - J I t - -_ G4 ~- t01"0"t01-0"ti1-~'t01-~l ~ i I

o~o~ I System System v.f 18 ~7_ ~ 6~_5_ 14~_3_ ~ 2~_1 ] B , control clock

�9 G5 I 16 / u / u / u / i I l l I l U / U I

C 8 7 6 '-~' ~, 3 '7. I Data= 00 I I I 00

v.,f 8 7 6 5 4 3 2 i , ..... f0t-:t0t-:t t-:t t l c

v., 8 7 6 5 4 3 5 i

I-o-I 6 - -111 -Vref -12810 I~ i ~ ol -~-ig-l-~l~ Se! Sel %! Re.e! Rese!

Quantiser Encoder

Fig. 5.11 Encoding example

Solution

Initially FF 1 to FF 8 are reset. FF 1 is then set and the polarity of the sample is checked. In this case the polarity of the sample is negative and hence FF 1 is reset. The negative reference voltage is connected to the weighted resistor chain.

FF 2 is set and gate G2 is closed. This causes VR to be equal to the relative reference amplitude of 6410. Now 5710 < 641o and as a result FF 2 is reset and gate G2 is opened.

FF 3 is set and gate G3 is closed. This causes VR to be equal to the relative reference amplitude of 321o. Now 5710 > 321o and as a result FF 3 remains set and gate G3 is left closed.

FF 4 is set and gate G4 is closed. This causes VR to be equal to the relative reference amplitude of 321o + 161o = 4810. Now 5710 > 4810 and as a result FF 4 remains set and gate G4 is left closed.

FF 5 is set and gate G5 is closed. This causes VR to be equal to the relative

reference amplitude of 3210 + 1610 +810 = 561o. Now 5710 > 5610 and as a result FF 5 remains set and gate G5 is left closed.

Page 132: analog and digital comm techniques pdf

Quantising and encoding 115

FF 6 is set and gate G6 is closed. This causes VR to be equal to the relative reference amplitude of 321o + 161o + 81o + 41o = 601o. Now 571o < 601o and as a result FF 6 is reset and gate G6 is opened. At this point VR has a relative amplitude of 5610.

FF 7 is set and gate G7 is closed. This causes VR to be equal to the relative

reference amplitude of 321o + 161o + 81o + 21o = 581o. Now 571o < 581o and as a result FF 7 is reset and gate G7 is opened. At this point VR has a relative amplitude of 561o.

FF 8 is set and gate G8 is closed. This causes VR to be equal to the relative

reference amplitude of 321o + 161o + 810 q- 110 = 571o. Now 571o = 571o and as a result FF 8 remains set and gate G8 remains closed.

At this point the 8-bit word is now stored in FF 1 to FF 8 and is output as a serial data stream.

Polarity 64 32 16 8 4 2 1 Code = 0 0 1 1 1 0 0 12

The following method describes the same principle using a table.

Example 5.2

Determine the 8-bit word for a sample having a relative amplitude of -571o using Table 5.3.

57j0 - 001110012

As can be seen in Table 5.3, a negative polarity causes bit 1 to be reset. Now the analogue input voltage is compared to the 641o reference. As 571o is smaller than 641o, bit 2 is reset and this gate is opened. 571o is now compared to 321o; as it is greater than 321o, bit 3 is set and this gate remains closed. 571o is now compared to 321o + 161o giving 481o; as 571o is greater than 481o, bit 4 is set and this gate remains closed. 571o is now compared to 3210 + 161o + 81o which is 561o; as 571o is greater than 561o bit 5 is set and this gate remains closed. 571o is now compared to 321o + 16to + 81o + 41o, which is 601o; as 571o is smaller than 601o, bit 6 is reset

Table 5.3 Sample of relative amplitude -571o

Weighting VR Va > FR Gate status Binary Bit number

Polarity m m _ 0 l 64 64 No Open 0 2 32 32 Yes Closed 1 3 16 48 Yes Closed 1 4 8 56 Yes Closed l 5 4 60 No Open 0 6 2 58 No Open 0 7 l 57 Yes Closed l 8

Page 133: analog and digital comm techniques pdf

116 Pulse code modulation

and this gate is opened. 5710 is now compared to 3210 + 16t0 + 810 + 210, which is 5810; as 5710 is smaller than 5810, bit 7 is reset and this gate is opened. 5710 is lastly compared to 3210 + 1610 + 810 + 110, which is 5710. As Va = VR, bit 8 is set and this gate remains closed. The resultant 8-bit binary word is

Polarity 64 32 16 8 4 2 1

0 0 1 1 1 0 0 12

One major advantage of using this system is its ability to prevent over- modulation from taking place. Any sample having an amplitude greater than + 127 will be encoded into I 11111112 and any sample having an amplitude greater than -127 will be encoded into 011111112.

5.8 THE 30/32-CHANNEL CEPT PCM SYSTEM OPERATION

Refer to Fig. 5.12.

5.8.1 The transmitter

Aliasing filter The input to each channel is the commercial speech band. This band is 300 Hz to 3400 Hz. The speech passes through the input channel filter which is a low- pass filter and called the aliasing filter. This filter ensures that no frequency greater than 3400 Hz passes to the channel switch. This is done to ensure that aliasing distortion does not take place due to the input frequency band being too large.

Channel amplifier This amplifier is a variable gain amplifier, which enables the correct signal level to be applied to the channel switch.

Channel switch This is an analogue switch, which is controlled by the timing circuit. Only one channel switch can be closed during a particular time slot. The switches are operated sequentially. During time slot 0 all the channel switches are open as this time slot is allocated to the frame alignment word (FAW) and frame service word (FSW). During time slot 16 all the channel switches are open as this time slot is allocated to the multiframe alignment word (MFAW) and multiframe service word (MFSW) as well as the signalling for the channels.

During time slot 1 the channel switch for channel 1 is closed, during time slot 2 the channel switch for channel 2 is closed. This process continues up time slot 15 where the channel switch for channel 15 closes.

During time slot 17 the channel switch on channel 16 is closed. During time slot 18 the channel switch of channel 17 is closed. This process continues until time slot 31 during which time the channel switch of channel 30 is closed.

Page 134: analog and digital comm techniques pdf

The 30~32-channel CEPT PCM system operation 117

Audio Audio Audio Audio Transmit I t Receive t in out in out signalling [ / signallin[

l ~, ,$ ~ ~ channe l s ] channels [" "] Ailia.,,ing ~ ~ Integrating [ ~ l to 30 ~ . l to 30 I . . . . . . . I Ch=mels ~ to 29 filter t ' ~ r ' ~ filter Ill , Signalling processor , J [ i . . . . . . . . . L . . . . . . . . . : . . . . . "~:~ .~ t " C h a n n e i , ~ I V ' ' _ ~ ! I card L _r'ca _r'ca card #~lU~[=~'llProcessod ! I " ~ T'~t-~ u ~ l " ~ IE o~ ~C_b

/ I II I l l l l l l l l t l l l l l l l l l l l l l l l i l l t : llllreceivePAMhighway ~ - - ~ / l lJ '----~-;DM-C,,~,;on= . . . . ,--~--T I I ] llJ I .... ' / III i I receive PAM highway / III I '

,,'~ansmit l~, '; r - ~ Q... , . , .~, ~ . . . . . . . Ill | timin & eneodi, l, a ,~ , l .e /111 I ~ / l l l ! ~ F~ '1 timing ;~ , ~ , ~ , ] - I1 l - " f

, , _ , . . . .

, , I , I timing I ~.~__~.. _---~._ . ~ - _ - - - - ~ 1 . . . . . . . Jl- L",-'-- - ' ~ - ~--J ' l[ F A W + ~ ~ ---l ~ ~ I - [ A W " ~ I ~

] ~ [[FSW ! k" "- Combiner! [ [I Decomblner I FSW I ~ I / I I word I ~ I I I I . . . . . . . . . . . . . I word I ~ !

' en. ! ~ J I , def. / ~ . r - _ + . . . . , I I L _ . . _ L I I I : I I _ _ L _ _ _ T [ _ . J I

I , J NRZ l Line I I Tir~ing i I ! NRZ ! Line I I RZ Ico~er I l extractionl ~ RZ I decoderl HOB'31 I ' ' / H D B ' 3 1 I

~ - ~ I . . . . . . . ~ . . . . . ~ . . ~ - - e , / l ~ Terminal I Timing [ ~ Retiming ! I

PCM ', T / repeater I extracti~ I I _, _ ! i :: , I

terminal I L~ r : : ; 0 : ';n.~l~nt~;u"~enli '~' ] ~cesnap'ng [ ' " " [ ~ ]

. . . . F i ~' Line �9 , + ~ regenerator !

I @ . , i T,~,. ' . . j ,o,~a;,., T, mi., .~ o'~"o"1 I i

I I extraction l i " '

! - - ~ i ! i i =etimi . ~ L ~ +

. . . . i

Fig. 5 .12 T y p i c a l P C M system

The output signal from each individual channel switch yields a pulse amplitude modulated (PAM) signal. The outputs of the channel switches are commoned together on to the transmit PAM highway. The resultant signal on the PAM high- way is a time division multiplexed (TDM) signal. This signal is still analogous in nature.

Quantising and coding The PAM highway is connected to the input to the quantising and encoding circuit. The signal first passes through a switch, which allows the individual sample to be applied to a sample-and-hold circuit. Once the sample is stored the switch opens for the remainder of the time slot period to ensure that the next sample does not interfere with the quantising and encoding process of the present sample. The individual sample is then quantised according to the A-law

Page 135: analog and digital comm techniques pdf

118 Pulse code modulation

quantising scale and encoded into an 8-bit binary word. The output of the encoder results in an NRZ-L serial data stream.

The transmit timing circuit The main clock frequency for the transmitter is developed by a crystal controlled oscillator. The output of the oscillator is applied to a squarer circuit, which produces a square wave output. This output is then applied to divider circuits and counter circuits, including ring counters. All the necessary control signals to control the complete transmitter are developed in this circuitry.

Transmit signalling circuit The signalling conditions from the automatic exchange, such as loop signalling, for each channel are applied to a signalling processor. The signalling condition is converted into a binary code and applied to the signalling multiplexer. The circuit containing the multiframe alignment word (MFAW) and multiframe service word (MFSW) is also connected to the signalling multiplexer. During time slot 16 of frame 0 the MFAW together with the MFSW is selected by this multiplexer and transmitted to the transmit combiner as an NRZ-L serial bit stream. During time slot 16 of frame 1 the digitised signalling conditions for channels 1 and 16 are selected by the signalling multiplexer. During time slot 16 of frame 2 the digitised signalling conditions for channel 2 and 17 are selected. This process continues until time slot 16 of frame 15 where the digitised signalling conditions for channel 15 and 30 are selected and passed to the transmit combiner.

Transmit combiner This circuit consists of a multiplexer. The digitised speech is applied to the multiplexer on one lead. The digitised signalling is applied to the multiplexer via a switch on a separate lead. The circuit containing the frame alignment word (FAW) and frame service word (FSW) is applied to the multiplexer on another lead. During time slot 0 of each frame the output from the FAW and FSW circuit is selected by the transmit multiplexer. During time slots 1 to 15 and 16 to 31 the digitised speech input is selected. During time slot 16 the digitised signalling or MFAW and MFSW is selected. The output of the transmit multi- plexer is an NRZ-L serial binary bit stream which contains the frame and multiframe structure.

Line coding The NRZ-L serial data is now applied to the line coder circuit. The first process in the line coder is alternate digit inversion (ADI). The output of this circuit is still NRZ data. The next process is return-to-zero where the ADI data is converted into a unipolar return-to-zero (unipolar RZ) serial bit stream.

There is normally a solder strap or switch which can be changed to enable either alternate mark inversion (AMI) coding or high-density bipolar format

Page 136: analog and digital comm techniques pdf

The 30~32-channel CEPT PCM system operation 119

3 (HDB-3) coding to be implemented. The resultant AMI code or HDB-3 code is then transmitted to the transmit transformer. Both the AMI code and the HDB-3 code are bipolar RZ codes. The actual coding technique is discussed in Chapter 11.

The transmit transformer This transformer is used for d.c. isolation between the system and the twisted copper pair line. The transformer also enables a constant current supply to be connected to the line to enable the dependent regenerators along the route to be powered from the terminal.

5.8.2 The receiver

The receive transformer This transformer is the d.c. isolation between the twisted copper pair and the system. This transformer also enables the loop for the constant current supply, which is used to power the dependent regenerators, to be completed.

The terminal regenerator This is used to restore the signal to its original format. The signal is first amplified by an a.c. amplifier. It is then equalised and then the timing is extracted. The extracted timing is processed to produce a clock frequency that is identical to that of the distant transmitter. The clock is used to ensure correct reshaping and retiming of the received signal. The signal is then reshaped and retimed to produce the original AMI code or HDB-3 code. This code is then connected to the line decoder.

The line decoder The timing is extracted and this is sent to the receive timing circuit. The AMI code or HDB-3 code is decoded back to unipolar return-to-zero data and sent as a serial data stream to the return-to-zero decoder. The resultant ADI data is then decoded in the ADI decoder and the resultant NRZ-L serial data stream is sent to the receive decombiner. The actual decoding is discussed in more detail in Chapter 11.

The receive timing circuit The extracted timing is used to control a digital phase-locked loop which pro- duces a clock frequency that is identical to that of the distant transmitter. This clock is then divided and applied to a series of binary counter and ring counters. All the necessary timing signals for the complete receiver are generated in this circuit.

The decombiner This consists of a demultiplexer. One output is connected to the FAW and FSW detector circuit. Initially the demultiplexer sends all the received data to this detector. The switch that connects the demultiplexed speech to the speech circuits

Page 137: analog and digital comm techniques pdf

120 Pulse code modulation

and the switch that connects demultiplexed digitised signalling to the signalling circuits are disabled. When the FSW and FAW have been recognised in three consecutive frames and in this order then the data in the next time slot is connected to the output going to the decoder and the speech circuits are enabled. This remains in force until time slot 16 when the data is routed to the receive signalling decombiner. The data is again routed to the decoder circuit for time slots 17 to 31.

The next time slot after time slot 31 will be time slot 0 of the next frame and as a result the data is routed to the FAW detector circuit where the FSW is expected. Once recognised, the above process will continue.

The decoder The NRZ-L data is decoded in this circuit and the output is the TDM signal. This signal is connected to the receive PAM highway via a switch.

The channel switch The PAM highway is commoned to the inputs of all the channel switches. Again only one switch can be closed at a time during time slots 1 to 15 and time slots 17 to 31. The appropriate switch is closed and the output of the switch yields the PAM signal for that particular channel.

The receive channel amplifier This amplifier is an analogue amplifier with an adjustable gain. The gain is set to produce the required output level for the channel.

The integrating filter The PAM signal is connected to the receive channel filter or integrating filter. This filter has a relatively slow response time and as a result a continuous analogue signal appears at the output.

The receive signalling circuit The digital information in time slot 16 is passed via a switch to the receive sig- nalling decombiner. As soon as frame alignment is achieved then this switch will be enabled. The decombiner is a demultiplexer. Initially all the data is sent to the MFAW detector and the signalling processors are disabled. On recognition of the MFAW and MFSW in three consecutive multiframes then the next time signalling data received is routed to the receive signalling processor which is now enabled. The receive signalling processor converts the binary code back to the original signalling format required by the exchange for channels 1 and 16. The next time that signalling data is received it is processed and sent to channels 2 and 17. This process continues until frame 15 at which point the received data is associated with channel 15 and 30. The next time data is received it is routed to the multiframe word detector as the multiframe word is then expected.

The system uses what is known as channel-associated signalling, as the speech path and the signalling paths are separated. This is unlike data circuits where

Page 138: analog and digital comm techniques pdf

Importance of frame and multiframe alignment 121

common channel signalling is used. In common channel signalling the address is packeted together with the data.

5.9 IMPORTANCE OF FRAME AND MULTIFRAME ALIGNMENT

For a 30/32-channel PCM to operate correctly the receiver must align both the frame and multiframe correctly. Only then will all the received data be correctly decoded and sent to the correct destination.

5.9.1 Frame alignment

Figure 5.13(a) shows the frame alignment. If the time slots are correctly aligned but the frames are not then, as shown in this example, the speech on channel 3 will be connected to channel 1. This means that the wrong people speak to one another. The data on channel 15 is used for signalling information on channels 4 and 13. This results in wrong numbers.

Without frame alignment the speech channels and the signalling circuits at the receiver are disabled. Once frame alignment is achieved, the correct time slot is

Transmitted frame

MFAW' [CHIcH 7 to CH ~" FAW CH l CH 2 CH 3 CH 4 to CH 14 CH 15 MFSW 28 29 CH CH 13 J u

T S 0 TS 1 T S 2 TS3 �9 ~ -TS 14 TS 15 TS 16 TS30 TS31

MFAW FAW CH I CH 2 CH 3 CHcH413to CH 14 CH 15 MFSW CcHH 1728t~ CH 29 CH 30

T S 0 T S I T S 2 TS3 T S I 4 T S I 5 T S I 6 TS30 TS31

Received frame

(a)

Transmitted frame

Frame 1 ~ignallinl~

CH I ca 17 to!c H 29 CH 30 FAW C H I C H 2 C H 3 CHcH413tO!CHI4 CHIS-c~I-i-6 CH28

T S 0 T S I TS2 T S 3 - ~ - T S I 4 TS15 T S I 6 TS30 TS31

CH 12 FAW CH 1 CH 2 CH 3 CHcH413to CH 14 CH 15 ct-I'2"I "CcHHI 287 to CH 29 CH 30

T S 0 T S I T S 2 T S 3 T S l 4 T S I 5 TS16 TS30 TS31

Frame 12 Received frame

(b)

Fig. 5.13 (a) Frame alignment; (b) multiframe alignment

Page 139: analog and digital comm techniques pdf

122 Pulse code modulation

connected to the correct time slot. This causes the speech channels at the receiver to be enabled. However, the signalling channels are not properly aligned and the receive signalling circuits remain disabled.

If frame alignment is lost then both the speech and the signalling circuits will be affected and the speech and signalling circuits will be disabled. Once frame align- ment is achieved only the speech circuits will be enabled. The signalling circuits will remain disabled.

5.9.2 Muitiframe alignment

The multiframe alignment is used to align the signalling so that the correct signalling conditions are associated with the correct channel. This is shown in Fig. 5.13(b). Once multiframe alignment is achieved then the signalling circuits at the receiver are enabled.

If multiframe alignment is lost then only the signalling circuits will be disabled. In this case, established calls will be able to continue uninhibited. However, no new calls will be able to be established over the system.

5.10 ALARMS

On each terminal there are six different alarm conditions that are monitored constantly. These are:

�9 Loss of clock alarm (CLA). �9 Bit error rate alarm (BER). �9 Frame alignment alarm (FAL). �9 Multiframe alignment alarm (MFAL). �9 Remote frame alignment alarm (RFAL). �9 Remote multiframe alignment alarm (RMFAL).

In this discussion only the FAL, RFAL, MFAL and RMFAL are going to be considered.

Referring to Fig. 5.14(a) the FAW and FSW detector has an alarm lead that is connected to the FAW and FSW generator. Bit 3 in the FSW can be set by an alarm condition placed on this lead, so as to inform the distant terminal that this terminal has an alarm. The same applies between the MFAW and MFSW detector and the MFAW and MFSW generator. In this case bit 2 of the MFSW is set by an alarm condition.

If a terminal receiver loses frame alignment the FAL and MFAL alarms on that terminal will become active and the terminal will cause bit 3 in the FSW and bit 2 in the MFSW to be set. The distant terminal receiver will be informed of these alarm conditions by checking the status of bit 3 in the FSW and bit 2 in the MFSW. Because these bits have been placed in the set state the distant terminal will cause the RFAL and RMFAL alarms to be activated. This is shown in Fig. 5.14(b).

Page 140: analog and digital comm techniques pdf

Alarms 123

(a)

From receiver

/ \

~~ Frame alignment word detector

F-'~-~am~ word detector

MFAW + MFSW + ,,, signalling

~ Multiffame alignment [ word detector

Signalling Multiframe service processor word detector

TS 1 to TS 15 TS 17 to TS 31

To transmitter

/ \

Frame alignment word generator Frame service

"-[ word generator

MFAW + MFSW +~--"

/ signalling

Multiframe alignment ~ \ word generator ]

Multiframe service Signalling word generator processor

TS 1 to TS 15 TS 17 to TS 31

(b)

PCM terminal

Transmitter

Receiver

RFAL + RMFAL FAL + MFAL I PCM terminal alarms alarms J

"-! Receiver Feedback

]~ Transmitter,, loop

(c)

RMFAL PCM terminal alarm

Sig Tx ---~, Transmitter

SigRx ~ Receiver ]~.,

PCM terminal l Break l

Receiver?~ , Sig Rx

I Transmitter ~ Sig Tx

MFAL alarm

~ Feedback loop

Fig. 5.14 (a) Remote alarms; (b) frame alignment alarm; (c) multiframe alignment alarm

The R indicates that a remote alarm is active. In other words the receiving terminal has lost frame alignment and the fault is either the receiver, the twisted pair linking the transmitter to the receiver or the transmitter.

If a terminal receiver loses multiframe alignment then the MFAL alarm will become active at the terminal. At the transmitter bit 3 in the FSW will remain reset but bit 2 in the MFSW will be set. At the distant terminal receiver the RMFAL alarm will become active as the receiver will detect that bit 2 in the MFSW is in the set state. This is shown in Fig. 5.14(c).

As above, the R indicates that a remote alarm is active. In other words the receiving terminal has lost multiframe alignment and the fault is either in the receive or transmit signalling circuitry in that particular direction. In this case it cannot be the twisted pair or the circuitry that carries the digitised

Page 141: analog and digital comm techniques pdf

124 Pulse code modulation

speech and FAW at either terminal as frame alignment in that direction is still maintained.

5.11 DEPENDENT REGENERATIVE REPEATERS

Figure 5.15(a) shows a typical block diagram of a dependent regenerative repeater. These regenerators are normally housed in manholes, in sealed contain- ers which are pressurised. If the pressure in the container is higher than outside and if a small crack in the seal should develop the pressurised air would escape and prevent water from entering into the container.

The a.c. signal is applied to an amplifier and then equalised, which reduces some of the distortion that the signal has experienced in the previous section.

, ~1~- - ] ~ +ve pulses ]--~ . ~ [ ~ ~ Cable pair ~ ~ ~ . I IC~ ~ ] ~ ' - - ! Cable

' = : ~ ~ J .............. [ [-~ -ve pulses ] ---~ I " [-----~1~:' [

l ;:ram*::i oo l I .... [ Ipow l o C Straps: A-B, 1-2 for through ~ower I circuit I ?

A-C, 1-3 for power turn around 6 3 I P~ I 0 circuit] I 0

_1 Timing I 2 [ extractionll ]

I Cablepair ~ ~ ~ . . H C o m b i n e r l ]. .......... ~l~tJ./~- able

~ ~ _ _ _ J " ~.._~ lVe ;ulses}.__ j .............

(a)

pair

pair

Terminal Transmitter~-O Twisted pair I o-]Transmitter Terminal

A Receiver ~ . . Twisted pair 2 .Q---[ Receiver B

(b) i-~ 3.6 km ~::

Power fed from terminal A ~ Dead section ~ ~ _,.,~t~,,_ 3 ~~tS.~~_ _~~ Transmitter Terminal Terminal Transmitter 316 km .6 km-~~ ,~ - 3.6 km 3.6 km

A Receiver ~ Receiver B Power returned to terminal A ~ Turnaround

(c) regenerator

Power fed from terminal A ~ Dead section ~ Power fed from terminal B ITerminallTransmitter ~ - - - ~ ~ - < ~ - - - ~ Transmitter Terminal I I A Receive r - - O - - - - - - - O - , ~ - - - O ' ~ " - < ~ - - - o-<]-oJ----O- Receiver B Power returned to terminal A ~ Turnaround ~ Power returned to terminal B

(d) regenerator

Fig. 5.15 (a) Dependent regenerative repeater; (b) no power feeding required; (c) power fed from terminal A only; (d) power fed from both terminals

Page 142: analog and digital comm techniques pdf

Power feeding 125

The timing is extracted at this point and it is used to clock the circuits to enable reshaping and retiming of the signal. The output of the equaliser is fed to two circuits. The first one reshapes and retimes the positive pulses and the second reshapes and retimes the negative pulses. The outputs of these two circuits are combined together to form a single bipolar code. This code is the regenerated code. The bipolar code is applied to the transmission medium via a transformer.

The centre taps of the transformers are used to extract and insert the d.c. power that is fed to the regenerative repeater from the terminal. The regenerative repeater is either a through repeater or a turnaround repeater. A through repeater is a repeater where the power is fed to the regenerator and then fed to the next regenerator along the route. In this case the straps that are connected are strap A to strap B and strap 1 to strap 2.

A turnaround repeater is a repeater where the power is turned around back to the terminal that supplies the power. In this case the straps are strap A to strap C and strap 1 to strap 3.

5.12 POWER FEEDING

The repeater receives its power from one of the terminals. The terminal feeds the d.c. power via a centre-tapped transformer down the transmit pair from the terminal. The power is returned back to the terminal via the centre tap of a transformer on the receive pair. The transmit pair is the go leg and the receive pair is the return leg with respect to the d.c. power; this arrangement is shown in Fig. 5.12 as well as Fig. 5.15.

Figure 5.15(b), (c) and (d) shows three possible arrangements. When the distance between the two terminals is 3.6 km or less, no regeneration is required and no power will be supplied to the line as shown in Fig. 5.15(b). In this case the section joining the two terminals together is referred to as a dead section as it carries no d.c.

If the distance between the two terminals is greater than 3.6 km then regenera- tion will be required. In some cases the number of regenerators required is such that the power need be only supplied from the one terminal. This arrangement is shown in Fig. 5.15(c). In this case the last regenerator is referred to as a turn- around regenerator as the power must be turned around back to the terminal that supplies the power.

If more regenerators are required such that the power supply from one terminal is not sufficient, then power can be sent from both terminals. This arrangement is shown in Fig. 5.15(d). In this case there will be two turnaround regenerative repeaters. The section connecting these two regenerative repeaters together will be a dead section.

In the above description a distance between regenerators of 3.6 km has been quoted. This distance can only be achieved if the correct PCM Z screen cable is used. If ordinary junction cables are used then this distance drops to 1.8 km.

Page 143: analog and digital comm techniques pdf

126 Pulse code modulation

When the number of dependent regenerative repeaters is such that the power supplied from both terminals cannot supply the necessary power to all the required regenerative repeaters, a power feeding regenerative repeater is used. This repeater must be mounted in an equipment room where power is available. This regenerator is capable of supplying power in both directions, whereas each terminal can supply power in one direction. By using power feeding regenerative repeaters a PCM system can be made to work over extended distances.

5.13 REVIEW QUESTIONS

5.1 Describe why a non-linear quantising scale is used rather than a linear scale. 5.2 Draw the frame and multiframe structure of a CEPT 30/32-channel PCM

system. Show all time durations on the diagram. 5.3 Calculate each of the following for a 38/40-channel PCM system that uses 8

bits per time slot and has a gross line bit rate of 6.556 Mb/s. The frame and multiframe structure follows the philosophy of the CEPT 30/32-channel PCM system. (a) The bit duration. (b) The channel time slot duration. (c) The frame duration. (d) The multiframe duration.

5.4 Calculate the sampling frequency of the signalling channel on the CEPT

30/32-channel PCM system. 5.5 A PCM system works between two towns A and B. The FAL alarm becomes

active at town A. Describe any other alarms that would become active at town A and the alarm conditions that will become active at town B.

5.6 Describe what happens on a PCM terminal when it loses multiframe align- ment. Describe the communication that take place between the two terminals and state the alarms that will become active at both terminals.

Page 144: analog and digital comm techniques pdf

6 Noise figure and noise temperature

Effective communication opens the door to new knowledge and experiences.

6.1 INTRODUCTION

The enemy of any electronic engineer is noise. This is especially true for the trans- mission engineer. Noise affects both analogue and digital systems and engineers are always trying to find new methods to reduce noise in circuits and the noise introduced into the transmission media.

As a result an understanding of noise and some of the techniques used to con- trol it are necessary. This chapter attempts to introduce the reader to the concept of noise and the importance of controlling the effect it has on transmitted and received signals.

There are two classes of noise, internal and external. Both these sources of noise affect communication systems. Internal noise affects the signal as it propagates through the system and circuits. This noise cannot be eliminated and can only be controlled by careful component selection, circuit design and circuit layout. External noise or line noise is the noise injected into the signal when the signal is propagated over the medium that connects the trans- mitter to the receiver. There is nothing the designer can do to control this noise. Instead the designer must take it into account this noise when designing the receiver.

6.2 INTERNAL NOISE

Internal noise can be classified under the following headings:

�9 Component noise. �9 System noise.

Page 145: analog and digital comm techniques pdf

128 Noise figure and noise temperature

6.2.1 Component noise

Component noise is caused by the following:

�9 Thermal agitation of electrons. �9 Shot noise. �9 Partition noise. �9 1 / f noise. �9 Electromagnetic and electrostatic coupling from one circuit to another. �9 Contact noise.

The above types of noise are referred to as white noise. White noise is noise that has the same amplitude for all frequencies across the whole frequency spectrum.

Both thermal noise and shot noise cannot be completely eliminated. This results in set limits on possible useful amplification that can take place.

Thermal noise (Johnson noise) Thermal noise is also referred to as Johnson noise. Thermal agitation cannot be completely eliminated but it can be reduced by cooling. At any temperature greater than OK (-273~ thermal agitation causes the electrons in the material to move. This movement results in thermal noise.

Any conductor/semiconductor contains a number of electrons that are free to move about constantly. This results in collisions, which cause a continuous exchange of energy. Even in a circuit where no current flows, the random motion of these free electrons produces voltage fluctuations across the terminals. These random fluctuations in voltage result in a mean square voltage I? 2. Experimental results by Nyquist showed that the available thermal noise power (Pn) is given by the empirical equation

Pn = K T B J /Hz

where K - Boltzmann's constant

= 1.38 • 10 -23 J /K

T = absolute temperature in kelvins

B = bandwidth

Thermal noise in a resistor A noisy resistor can be represented by a Th~venin equivalent circuit consisting of a voltage (noise) source and a noise-free resistor in series with one another (Fig. 6.1). Under matched conditions the value of the load resistor (RE) will be equal to the resistor (R) and be noise free. Hence the circuit consists of the voltage (noise) source in series with the noise-free resistor in series with the load, in a closed circuit.

The resultant RMS current can be determined by:

/RMS ~

2 v/ 0 2R

Page 146: analog and digital comm techniques pdf

Internal noise 129

~ N o i s e r e s i s t o r

V s RL m

N o i s e N o i s e - f r e e

s o u r c e r e s i s t o r

:- R "

Fig. 6.1 Th6venin equivalent circuit for a noisy resistor

But

From Nyquist

( : 0 ) 2 Pmax = I2R = 2 R R

Pmax = 4R

Pmax = Pn = K T B

K T B = 4R

#2 = 4KTBR

Example 6.1

Determine the value of the noise voltage developed in a 1 kfl resistor which is in a circuit that must be capable of carrying a bandwidth of 10 kHz at a temperature of 17~

So/m/on

T = 273 + 17 = 290K

~,2 __ 4KTBR

172 = 4 x (1.38 x 10 -23) X 290 x 104 X 10 3

172 = 1.6 x l0 -13

RMS noise voltage = V/1.6 x 10 -13

= 0.4 IxV

Shot noise The noise caused by the statistical variation of the number of free electrons contributing to the flow of current in semiconductors and valves is known as shot noise. The current flowing through a semiconductor diode is due to electrons

Page 147: analog and digital comm techniques pdf

130 Noise figure and noise temperature

moving across the pn junction, from the cathode to the anode. The number of electrons arriving at the anode at a particular instant in time is not the same as the number arriving at the next instant in time. This results in a minute alternating current. This alternating current is superimposed on the normal current through the device. Because the electrons arrive at the cathode like a shot this noise is referred to as shot noise. In transistors the shot noise is due to the variation in electrons arriving at the collector.

- 2 The fluctuating components give rise to the mean square shot noise current t s.

Partition noise The input current to a transistor flows from the emitter to the base. After crossing the barrier it divides between the base terminal and the collector terminal. This base current is also subject to random fluctuations and contributes to the overall noise produced by the transistor. Because the noise is produced at the base junc- tion the noise is referred to as partition noise.

l]f noise Fluctuations in the conductivity of the semiconductor material provide a noise source which is inversely proportional to frequency. This noise is known as current or excess noise. It is usually negligible above 10 kHz and for some transis- tors above 1 kHz.

Electromagnetic and electrostatic induction Electrostatic and electromagnetic coupling can be considerably reduced by proper screening of power supply circuits and the HF circuits as well as careful circuit board layout. Electrostatic coupling takes place through the capacitance effects between parallel conductors and printed circuit board tracks, whereas electro- magnetic induction takes place through transformer action between parallel conductors and circuit board tracks.

Contact noise Short breaks in the transmission in a system due to poorly adjusted relay and switch contacts cause impulse noise. This form of noise seriously affects data circuits. If the contacts are dirty then this will add to the overall attenuation of the signal in the system. Dirty contacts also produce thermal noise.

6.2.2 System noise or equipment noise

Another source of noise is intermodulation noise, which is caused by the non- linear characteristics of components, such as diodes and transistors, as well as by circuits, such as modulators and filters. This type of noise produces frequencies in the output signal that were not present at the input. The non- linear characteristic causes the output signal to be distorted relative to the input signal.

Page 148: analog and digital comm techniques pdf

Internal noise 131

(a)

t !i ,/;dllL V

-ii . . . . . . . . . 1 ' i i i V ",b ! !

!

I ~ Bput signal voltage

Undistorted output signal current

(b)

I !

I ' ' ' I : L : v

!

d ~ Input signal ~ voltage

%1

Fig. 6.2 (a) Ideal diode response; (b) typical diode response

Distorted output signal current

Figure 6.2(a) shows the ideal response of a diode and the undistorted current as the result of a sinusoidal input voltage applied across the device. In practice, however, the diode characteristic is non-linear, as shown in Fig. 6.2.(b), so that the output current is distorted.

Figure 6.3(a) shows the undistorted output voltage for a transistor having an ideal response. Unfortunately the family of curves for In are not parallel to each other. Figure 6.3(b) shows a more realistic picture, where it can be clearly seen that the output signal voltage is distorted.

Two-tone method A method used to determine the amount of intermodulation noise is the two-tone test. If two frequencies fl and J~ are applied to the input of a non-linear device then the output signal can contain the following components:

f l , f 2 , f l +f2, fl --f2, f l + 2f2, )q -- 2f2,f l + 3f2,fl -- 3f2, 2fl +f2, 2j~ --./2,

3fl +f2, 3fl - f 2 , 2fl + 3f2, 2fl -3./2, 3fl +2./2, 3fl - 2f2 etc.

Intermodulation noise is dependent on the amplitude of the input signal and the non-linearity of the component and/or device. The exact frequency com- ponents will depend on how non-linear the device is. Devices such as diodes

Page 149: analog and digital comm techniques pdf

132 Noise figure and noise temperature

Q point I L l Input s ignal- I B

| ! i

VCE

(a)

Ic

Undistorted output signal voltage

~'Input s i g n a ~ /B i

~ urrent

I8

, , Vc E

Distorted output (b) signal voltage

Fig. 6.3 (a) Ideal transistor response; (b) typical diode response

and transistors and circuits such as modulators exhibit non-linear or intermodu- lation noise.

6.3 EXTERNAL NOISE

With careful design, correct circuit board layout, proper choice of components and correct screening of RF/IF stages, the correct use of heatsinks etc., the effects of internal noise on the transmitted and received traffic can be controlled. However, once the signal is transmitted down the medium, it comes under the influences of external sources of noise that cannot be controlled.

External noise is caused by the following:

�9 Static interference (sand storms/dust storms). �9 Radiation (sun spot activity, cosmic radiation, manmade radiation). �9 Crosstalk (interference from adjacent pairs). �9 Mains induction (interference from adjacent power routes). �9 Voltaic interference (volcanic activity).

Page 150: analog and digital comm techniques pdf

System performance 133

6.3.1 Line noise

Radiation from the medium carrying the transmitted signal can take place and this constitutes attenuation. Induction into the medium from external sources also takes place quite easily. Even properly screened cables are not totally immune to external interference. The only medium that is totally unaffected by external sources of noise is an optic fibre. However, optic fibres have their own problems.

Metallic pairs are subject to induction from adjacent circuits (crosstalk) and induction from mains routes that are parallel to the transmission route. Overhead pairs are also susceptible to static electricity due to sand, dust and thunderstorms, and induction from sources such as sunspot activity, cosmic radiation etc. Under- ground cables are affected by voltaic noise, which is caused by volcanic activity. Radio and microwave transmissions are also affected by atmospheric conditions such as rain, snow, hail, inversion etc., which cause fading to take place resulting in high attenuation.

All of the above sources are external sources of noise. These sources contribute to what is referred to as line noise. Line noise cannot be eliminated and hence the received signal will contain a certain amount of noise. The receiver must be able to cope with this noise in such a way that the actual information is not lost or swamped by this noise but if possible its effect is reduced. The receiver can do nothing about the internal noise arising from the equipment at the transmitter. The receiver will also contribute a certain amount of internal noise to the signal.

6.3.2 Impulse noise

Short breaks in the transmission on the transmission line, due to bad joints on open wire lines and cable pairs, seriously affect data circuits. The thermal noise produced by the transmission lines, receive aerials and aerial feeders can adversely affect analogue and digital circuits. Analogue signals will be affected worse because receive amplifiers are used. Digital signals are regenerated which means that they should not be affected to the same extent.

6.4 SYSTEM PERFORMANCE

Although digital transmission is used extensively today, many of the media used require an analogous signal. This means that the digital information must be changed into an analogue format. A typical example is radio and microwave transmission. To a large extent frequency modulation is used on radio and micro- wave systems. The criterion used to determine the performance of any analogue system is the signal-to-noise ratio (SNR). This is determined by means of the following equation:

SNR = wanted signal power _ _ S unwanted noise power N

Page 151: analog and digital comm techniques pdf

134 Noise figure and noise temperature

Very often the SNR is expressed in dB"

SNRdB = 10 log10(S) dB

E x a m p l e 6 . 2

Determine the signal-to-noise ratio at the output of an amplifier that produces an output signal voltage of 1.2 V if the output noise voltage is 12 mV. Express the answer in decibels.

So/ut/on

The signal power S and noise power N are found using

(voltage) 2 V 2 power - impedance = -Z-

therefore

s = v ,~ Zout

2 N = Vn~

Zout

S SNR = - -

N

v;~ z0 v 2. slg • Z0 2 2 Vnoise Vnoisc

v;~i, SNR~B = 10 log10 ,T-

Vnoise

Vsig = 20 logl0 Vnoise dB

= 20 lOgl0 1.2

12 x 10 -3

= 40dB

6.5 NOISE FIGURE/NOISE FACTOR

A measure which is used extensively on the amplifier chain at the front end of a receiver is the noise figure or noise factor. The noise figure is a measure of the noisiness of the input stage. In other words it determines the effect that the inter- nal noise, produced by that stage, has on the received signal. As will be shown

Page 152: analog and digital comm techniques pdf

Noise figure~noise factor 135

below the more internal noise produced by a stage the worse the output signal-to- noise ratio becomes. Hence the internal noise must be controlled, especially for the input stage of the receiver where the received signal strength is already weak and a large amount of noise accompanies the signal due to the transmission medium.

I/P Receive amp chain

G, F, Nr O/P

where G = gain

F = noise figure

Nr = internally generated noise power

The noise factor is a measure of the degradation of the output signal, and is determined by

F ~_ SNRin SNRout

In this equation both the SNRs are given as ratios and not in dB. Now

Si So SNRin = Nii and SNRou t = No

So = GSi and No = G(Ni + Nai)

Si F = Ni

G(Ni + Nai)

where Si = signal power at input

Ni = noise power at input

G = amplifier gain as a ratio

N a i - - amplifier noise referred to the input of the amplifier

All the internal noise generated in the amplifier is assumed to be generated by an external source at the input to the amplifier and the amplifier then becomes a noise-free device. The externally generated noise is now referred to as Nai.

Therefore

Si G(Ni + Nai) F - - ~ i • GSi ....

Ni +Nai Ni

This is then expressed in the important equation

N,i F = I + ~ Ni

Page 153: analog and digital comm techniques pdf

136 Noise figure and noise temperature

It can be seen that if the amplifier is noise free then Nai - 0 and the noise figure F would be equal to unity. This means that SNRin = SNRout.

An alternative derivation for an expression of N~ in terms of the noise figure is given below:

but

We have

but

Thus

Si G ( Ni -t-- Nai ) F = ~ x GSi

G(Ni + Nai) = N O

F -" Si No Ni 6Si No

GNi

No = GNiF

N O = GNi -Jr-GNai

GNai - N r

No = G N i + N r

Si GNi + GNai F = N i i • a s i

GNi + Nr

GNi G FNi = GNi + Nr

Nr = G F N i - G Ni

= G N i ( F - l)

6.5.1 Noise in cascaded systems

Consider the following system:

I/P -- Ni--l Amp,,t l"mP l GI , F1, Nrl G2, F2, Nr2 G3, F3, Nr3

The gain is expressed as a ratio and not in dB. For each stage"

F = N~ - GNi + Nr GUi GN~

O/P

So, No

Page 154: analog and digital comm techniques pdf

Noise figure~noise factor 137

but

For the cascaded system:

Now output noise due to Ni:

Nr = GNi(F - I)

No No GNi NiGI G2G3

output noise = NiGAGnGc

Output noise due to amp A:

output noise = NrAGBGc

= NiGAGBGc(FA- l)

Output noise due to amp B"

output n o i s e - NrBGc

= N i G B G c ( F B - 1)

Output noise due to amp C:

output noise = N~c

= N i G c ( F c - 1)

Tho total output noise is given by:

No = NiGAGBGc + NrAGBGc + NrBGc + Nrc

No = NiGAGBGc + NiGAG.Gc(FA - 1) + NiG.Gc(FB - 1) + NiGc(Fc - 1)

No = NiGAGBGcFA + NiGsGc(FB - 1) + NiGc(Fc - 1)

f _,.. No

NiGAGBGc

F NiGAGBGcFA NiGBGc(FB-I) = + + NiGAGBGc NiGAGBGc

F B - 1 F c - 1 F = F A + ~ + ~

GA GAGB

Hence for a system having n cascaded stages:

N i G c ( F c - l) Ni G A GB Gc

From this equation it can be seen that the first stage contributes the most to the noise figure. Any noise generated in the first stage will be subjected to the gain of all the subsequent stages, thus the first stage must have the lowest amount of internally generated noise. The first stage is normally cooled to ensure that its noise figure is as low as possible.

F 2 - 1 F 3 - 1 F . - 1 F=F~-~ ~ ~-...+

Gl GIG2 GIG2""G._I

Page 155: analog and digital comm techniques pdf

138 Noise figure and noise temperature

Normally the front end of a receiver consists of an odd number of amplifiers. In very basic systems there is only one amplifier, in more complex systems there can be up to five cascaded amplifiers. The following general rule is used when deciding the order in which these amplifiers must be connected together in the front end of a receiver:

�9 The first amplifier should have the lowest noise figure and the lowest gain. �9 The last amplifier in the chain should have the highest gain and highest noise

figure.

Example 6.3

Given the parameters for three power amplifiers as indicated below, determine the following:

1. The order in which the amplifiers must be connected. 2. The overall lowest noise figure for the cascaded system.

A m p A I [ C ~ - - - I I Amp B I ! Amp

G A - - 12 dB GB -- 6 dB Gc = 20 dB

F A = 2 Fa = 1.7 F c = 4

Solution

Step 1. Convert all the gains in dB to ratios.

GdB ---- 10 logl0 Gratio

Grati o - - 10al-~o a

Amplifier A:

Amplifier B"

Amplifier C:

Step 2.

GA ---- 10 i~a = 15.85•

GB = 106n~ = 3.98x

Gc = 10 ~~ = 100x

Decide and motivate the order of connection.

I / P - - [ Amp B .... ] I AmPl A .... ] Amp C [

Ga = 6 dB GA = 12 dB Gc = 20 dB

--3.98x = 15.85x = 100x

FB = 1.7 F A - - 2 F c = 4

o/P

Page 156: analog and digital comm techniques pdf

Noise figure~noise factor 139

Amplifier B has the smallest noise figure and the smallest gain hence it is placed first. Amplifier C has the highest gain and noise figure and hence is placed last.

Step 3. Determine the overall lowest noise figure. Now

F 2 - 1 F 3 - 1 /7(3) = FI 4

Gl GIG2

so for the system given in step 2

Y(3) = FB + FA-I

GB

2 - 1 = 1 . 7 +

3.981

1 = 1.7 + 3.981

+ ~

+

Fc-I GBGA

4--I

3.981 x 15.849

3

63.095

= 1.7 + 0.2512 + 0.0475

= 1.9987

Example 6.4

An amplifier has a power gain of 12dB and has 0.118 nW of internal noise referred to the input. Determine the noise figure for the amplifier when the input signal level to the amplifier is - 3 8 d B m and the input signal-to-noise ratio is 27 dB.

Solution

Method 1

Output signal level = gain + input signal level

= 12dB + ( - 3 8 d B m ) = - 2 6 d B

Input noise level = input signal l e v e l - SNR

= - 3 8 dBm - (27 dB) - - 6 5 dBm

Input noise power:

Nnois e = 10 log Nn~ W I mW dB

Nnois e dBm

= 10 ~o x 1 x 10 -3

-65 dBm

= 10 ~o x 1 x 10 .3

- 0.316nW

Page 157: analog and digital comm techniques pdf

140 Noise figure and noise temperature

Total input noise power:

N n o i s e - - input noise power + amp noise ref input

= 0 . 3 1 6 n W + 0 . 1 1 8 n W

= 0.434 nW

Convert the total input noise power to a level:

Nnoise = 10 log Nnoise W l m W

Total output noise level"

dBm

= 10 log 0 .434nW

l m W

= -63 .6 dBm

dBm

output SNR = output signal l e v e l - output noise level

= - 2 6 d B m - ( - 5 1 . 6 d B m )

= 25.6 dB

SNRdB

S N R r a t i o - - 10 lo

25.6 dB

= 1 0 lo

= 363.1

output noise level = gain + total input noise level

= 12 dB + ( -63 .6 dBm)

= - 5 1 . 6 d B m

- 501

Output SNR:

S N R d B - - 10 log S N R r a t i o dB

SNRdB

S N R r a t i o - - 10 l0

27 dB

= 1 0 ,o

The input SNR = 27 dB. Convert ing to a ratio,

Nnoise = gain + total input noise level

= 12 dB + ( -63 .6 dBm)

= - 5 1 . 6 d B m

Page 158: analog and digital comm techniques pdf

Effective noise temperature 141

Amplifier noise figure:

F = input SNR output SNR

501

363

= 1.38

M e t h o d 2

F = I + ~

= 1 + 0.118nW

0.316nW

= 1.37

In practice the following equation is used when there are more than two cascaded amplifiers:

F 2 - 1 F('0 = F1 -I- G-----~

In the above examples it can be seen that the higher-order terms contribute a very small amount to the final answer and as a result only the first two terms are significant.

6.6 EFFECTIVE NOISE TEMPERATURE

Consider one cascaded system having an overall noise figure of 1.87 and a second cascaded system having an overall noise figure of 2.09. Which system is better? It cannot be assumed that the system having the lower noise figure is better if they are two different systems receiving different signals. Hence some form of measurement that will enable the two systems to be compared is necessary. The measurement that is used for this is the effective noise temperature.

When a noisy resistor was examined the total noise power dissipated was given by

N = K T B

To determine the noise power in a 1 Hz bandwidth:

N W/Hz 2Vo= A standard temperature of 17~ is chosen, as this temperature is suitable and convenient for human habitation. The temperature is to be expressed in kelvins, so a suitable approximation is

To = 273 + 17 = 290K

Page 159: analog and digital comm techniques pdf

142 Noise figure and noise temperature

Now the noise figure for an amplifier is given by

Hence

Replace Ni with KToB:

Replace Nai with KTeB"

Nai F = I + ~

Ni

F - 1 = Nai Ni

Nai-- N i ( F - 1)

Nai = (F - 1)KToB

KTeB = ( F - 1)KToB

Te - ( F - 1)7"0

But To = 290K:

T e - - 290(F - 1)

For a cascaded system the overall effective noise temperature will be

Te,.) = 290(F(n) - 1)

The overall noise figure for a cascaded system is given by

/72--1 V 3 - 1 r n - 1 r(n) = F1 - ~ - ~ 4 ~-'.. +

G1 GIG2 GIG2" "'Gn-I

Consequently, the overall effective noise temperature for a cascaded system is given by:

Te2 Te3 Ten Te(.) = Tel +--G-T + GIG2 + . - . + GIG2""Gn-I

where Tel, T~2,..., Te, are the effective noise temperatures of the individual amplifiers all measured at the standard temperature To. In these equations it is assumed that the inputs and outputs of all the stages are correctly matched.

Example 6.5

Determine the effective noise temperature for each stage and the overall effective noise temperature of the cascaded system given in Example 6.3.

Solution

Amplifier A:

TeA = T0(FA - 1)

= 290(2 - 1)

= 290K

Page 160: analog and digital comm techniques pdf

Effective noise temperature 143

Amplifier B"

Amplifier C:

rob = ro (FB - 1)

= 290(1.7 - 1)

= 203K

Toc = T o ( F c - l)

= 2 9 0 ( 4 - 1)

= 870K

N o w the overall effective noise tempera ture is

TeA _ TeC re{3) -- TeB + -~B h GBGA

290 870 = 203 + ~ + 3.98 x 15.85

= 289.66K

Check:

ro,,~ = r o ( e ~ 3 ) - l )

= 290(1.9987 - 1)

= 289.623K

Example 6.6

Two different systems have the following parameters:

System 1" Overall noise figure = 1.87 S tandard operat ing temperature = 30~

System 2: Overall noise figure = 1.92 S tandard operat ing tempera ture = 13.5~

Determine which system is better.

Solution

System 1-

ro~.:, = ro(F~3)- 1)

To = 273 + 30

= 303K

T~t.) = 303(1.87 - 1)

= 263.61K

Page 161: analog and digital comm techniques pdf

144 Noise figure and noise temperature

System 2:

To = 273 + 13.5

= 286.5K

Te(,~ = 286.5(1.92 - 1)

= 263.58K

From the above results it can be seen that there is very little difference between the two systems. Hence both systems are equally good.

In this example the designer of system 1 decided to design excellent amplifiers and the designer did not concentrate too much on the cooling and probably only used ordinary heatsinks. The designer of system 2 designed a complex cooling system to keep the amplifier chain as cool as possible but this designer did not design very good amplifiers.

6.7 VARIATION OF NOISE FIGURE WITH FREQUENCY

As frequency increases from a low frequency the noise figure starts at a high value and decays exponentially until an optimum constant value is achieved. As the frequency increases still further the noise figure increases exponentially. The response at the low frequency end is primarily due to the effect of the input noise. The response at the high frequency end is primarily due to the amplifier gain decreasing with an increase in frequency.

6.8 REVIEW QUESTIONS

6.1 Determine the value of the noise voltage that is developed in a 200 9t resistor working at an ambient temperature of 22~ and capable of carrying the frequency range of 60 kHz to 108 kHz.

6.2 Briefly describe how internal noise can be minimised in a circuit used in a communication system.

6.3 Determine the signal-to-noise ratio on the output of an amplifier that pro- duces an RMS output voltage of 3.2 V if the input RMS noise voltage is 2.5 mV, given that the amplifier has a voltage gain of 8 dB.

6.4 Determine the signal-to-noise ratio at the output of an amplifier that causes an RMS output current of 1.5 mA to flow through a correctly matched load, having an impedance of 1.2kfL when the input RMS noise voltage is 1.85mV. The input impedance to the amplifier is also 1.2kVt and the amplifier has a current gain of 17 dB.

6.5 Given the parameters for the three voltage amplifiers indicated below, deter- mine the following:

Page 162: analog and digital comm techniques pdf

Review questions 145

6.6

(a) The order in which the amplifiers must be connected. (b) The overall lowest noise figure for the cascaded system. (c) The effective noise temperature for each amplifier. (d) The overall effective noise temperature for the cascaded system.

! AmpA! 'AmpB ! , I AmPCl G A = 44 dB GB = 16 dB Gc = 8 dB

FA = 2.5 F a = 1.7 Fc = 1.2

The received input signal level to the following system is -25dBm. Given the parameters for three voltage amplifiers indicated below, determine the following:

(a) The noise figure for amplifier B, which must have an SNR of 38 dB. (b) The order in which the amplifiers must be connected. (c) The overall lowest noise figure for the cascaded system. (d) The effective noise temperature for each amplifier. (e) The overall effective noise temperature for the cascaded system.

G A - - 17 dB GB = 14 dB Gc = 16 dB

FA = 2.5 Nai = 75.15 pW Fc = 1.2

Page 163: analog and digital comm techniques pdf

7 Effects of noise and distortion on analogue and digital signals

Human endeavour is fraught with danger but success is very sweet.

7.1 INTRODUCTION

Having gained an understanding of the sources of noise the next important step is to understand how the noise affects analogue and digital signals that are transmitted down different media.

In this chapter the effects that noise has on a signal are discussed, as well as the effects the medium has on the signal as it propagates down the medium. In the discussion a comparison is drawn between the effects of noise on analogue and digital signals and the reasons and the advantages of digital transmission as opposed to analogue transmission.

Any signal that is propagated down a transmission medium experiences two phenomena:

�9 Amplitude distortion. �9 Frequency distortion.

On top of these two effects line noise is added to the signal. As a result the received signal is badly distorted and contains a large amount of noise.

7.2 AMPLITUDE DISTORTION

This is the attenuation that the signal undergoes across the medium. For metallic pairs the higher the frequency the greater the attenuation.

Figure 7.1 shows the resultant waveform for a signal consisting of a funda- mental frequency and the third harmonic. By observing the figure it can be seen that the third harmonic has a third of the amplitude of the fundamental frequency at the transmitter. Also when these two frequencies are added together, the begin- nings of a square wave results.

Page 164: analog and digital comm techniques pdf

Frequency distortion 147

[ " ' "

I , I

F u n d a m e n t a l

A t t enua t i on

3rd h a r m o n i c 3rd h a r m o n i c

........ ] ~

-

D

_ R e c e i v e d s ignal ] - ................................................

Fig. 7.1 Amplitude distortion

As can be seen, at the receiver, the higher frequency (third harmonic) experi- ences more attenuation than the lower frequency (fundamental). As a result the amplitude relationship between the third harmonic and the fundamental is now different as the amplitude of the third harmonic is smaller than a third of the amplitude of the fundamental. The resultant wave shape, when these two frequen- cies are added together, is now different to what it was at the transmitter.

7.3 FREQUENCY DISTORTION

In free space all frequencies travel at the speed of light. In any medium each frequency travels at a different velocity. This effect is referred to as frequency distortion and its effects are felt as group delay.

Consider Fig. 7.2. This figure shows a fundamental and the third harmonic. At the transmitter the two frequencies start at 0 ~ and initially both start in a positive direction.

Now along the medium the two frequencies travel at different velocities and as a result the phase relationship changes. At the receiver it can be seen in the example that the fundamental has undergone a 360 ~ phase change, whereas the third harmonic has undergone a phase change of 450 ~ The relative phase difference between the fundamental and the third harmonic is now 90 ~ . The net effect is that this difference in velocity causes a change in phase relationship which in turn causes the shape of the resultant wave to be different to that at the transmitter.

Page 165: analog and digital comm techniques pdf

148 Effects of noise and distortion on analogue and digital signals

/ - ' ~ , ~ , / T N , , V V V

3rd harmonic W V V

3rd harmonic

I . . . . . . . . . ]

Received signal

Fig. 7.2 Frequency distortion

7.4 AMPLITUDE AND FREQUENCY DISTORTION

Figure 7.3 shows the effect on the same two frequencies when both amplitude and frequency distortion take place. Notice the difference in shape of the resultant

I , I

Fundamental

!3rd harmonic Velocity of propagation .... l 3rd harm~

�9 . I I j

Fig. 7.3 Amplitude and frequency distortion

Page 166: analog and digital comm techniques pdf

Effects of noise 149

wave at the transmitter and receiver. The received signal looks totally different to that at the transmitter. The received signal now also contains frequency compo- nents that were not present in the original signal transmitted by the transmitter.

7.5 LIMITED BANDWIDTH

Any transmission medium can only accept a particular frequency range. A true digital signal consists of a fundamental frequency and an infinite number of harmonics. When this signal is transmitted over the medium, only those frequen- cies that are within the frequency range of the medium will propagate down the medium and reach the receiver. The received signal will now look different to that at the transmitter.

7.6 EFFECTS OF NOISE

Noise affects both analogue and digital signals. Digital signals, however, are more robust to the effects of noise than analogue signals.

7.6.1 Effect of noise on analogue transmission systems

As the signal is transmitted from the transmitter it is noise free. At the first repeater a certain amount of attenuation has taken place and a certain amount of noise is added. The noise is a result of external frequencies being induced into the trans- mission medium. As the signal passes through the repeater, the signal is amplified but so is the noise. The signal-to-noise ratio at the output of the first repeater is worse than that at the output of the transmitter.

Each section of transmission line will have a certain amount of noise induced into it. As a result the more repeaters there are, the worse the signal-to-noise ratio becomes. Eventually the signal will be totally swamped by noise. This is then the limiting factor on the total distance that the analogue system can work over.

There are two different ways of thinking about the noise and its effects on the analogue signal. Both of these philosophies are shown in Fig. 7.4. Philosophy 1 implies that the noise induced into the section can be replaced by a single noise source placed at the output of the amplifier that amplifies the signal from the previous section. The section now becomes noise free. This noise will be attenuated as it propagates down the section in the same way and by the same amount as the signal. However, each repeater amplifier will amplify the signal and the noise at the input to the amplifier, but more noise is added at the output of the amplifier, which is caused by the noise induced into that section of the medium.

As shown in Fig. 7.4 the amount of noise at the input to the next amplifier is greater than what it was at the input to the previous amplifier. Also the amplifier

Page 167: analog and digital comm techniques pdf

150 Effects of noise and distortion on analogue and digital signals

t ~

E <

Transmitter Receiver Repeater l Repeater 2

-I> D ..... I> D- i ! i 0

' ,~- 1st section ---~I~-2nd section-~',~- 3rd section---~', I i i ! i i i i i i

,' ' P h i l o s o p h y 1 ' ', - - - - l . . . . . . . . . . . . . . . . . . . . . . . . . . I . . . . . . . . . . . . . . . . . . . . . . . . . . . I . . . . . . . . . . . . . . . . . . . . . . . . . . I ~k'-

s! ~_.

Distance

Philosophy 2

o , . , i l . . . . . . . S ' , o a ' . . . . . . . . i . . . . . . . . . . . . . . . . . . . . . . '. ' - -

i o 0

i i !

i 0

i | i 0 i

, ,. ~

Distance

Fig. 7.4 Noise effects in an analogue system

amplifies both the signal and the noise by the same amount. The net effect is that the signal-to-noise ratio at the distant receiver is much worse that what it was at the output of the transmitter.

Philosophy 2 treats the signal in exactly the same way as it was treated in philo- sophy 1, as can be seen in Fig. 7.4. However, the noise can be thought of as gently increasing the further the signal moves from the transmitter. The generation of the noise can be thought of as taking place along the full length of the medium and as a result the amplitude of the noise gently increases. The increase in amplitude also reflects the effect of the amplifiers, which is now introduced along the full length of the medium instead of at discrete points. The net effect is the same in that the signal-to-noise ratio at the receiver is much worse than what it was at the output of the transmitter.

7 .6.2 Effect of noise on digital transmission systems

A regenerative repeater recreates a brand new signal from the old signal but leaves behind all the problems that the old signal had. The signal undergoes attenuation

Page 168: analog and digital comm techniques pdf

Effects of noise 151

Transmitter

~ , - = ,

e L

E <

~= e ~

E <

Regenerative Regenerative Receiver repeater 1 repeater 2 1

-UI Ut ........ D . , U]- ! i !

',~--- st section ---~',~- 2nd s e c t i o n - - ~ , ~ 3rd section - - ~ i I ! I i i i i i

, ' Philosophy 1 ', - - -

l- I- SNR', ' Signal ', ' SNR

I . . . . i ! i ! i ! ! !

I ! v

' Distance i

i

i

i

i

i

i

k : ' I !

I I

, Philosophy 2 ,

S N R I , , SNR , Signal , i ! ! i !

i

. i l l , _ - ! ! - - i

' N o i s e ' I ! =

= I !

t ! = !

v

Distance

Fig. 7.5 Noise effects in a digital system

between the transmitter and the first regenerator. Along the section noise is added to the signal. At the regenerator only the signal is regenerated. This means that at the output the signal is clean and the noise in the previous section remains in that section and is not carried through the regenerator.

The result of this is that the signal-to-noise ratio at the output of the regenera- tor is identical to that at the output of the transmitter. Theoretically the distance over which a digital system can work is not limited by the signal-to-noise ratio as is the case in an analogue system.

This is shown in Fig. 7.5. Again the two philosophies can be applied. However, as shown, the signal-to-noise ratio at the receiver is exactly the same as what it was at the distant transmitter.

7.6.3 Transmission effects on a digital signal

Figure 7.6 shows how a digital signal is affected by a transmission medium and by noise. Notice that the attenuation affects and limited bandwidth cause the medium to act as a low-pass filter.

Page 169: analog and digital comm techniques pdf

This Page Intentionally Left Blank

Page 170: analog and digital comm techniques pdf

Effects of noise 1 5 3

Transmitted bit stream

Recei, sign~

, i ,

i t | i

, i ,

' [ ' ' [ '

I ! i , i 0

i ' . i

i ,

i '

i I i i i I I i i ! i I i i i I

' ! ' i ' I [ I i : , ! ,

; I I I i I [ t , . t t

i ; l I i I I

11~____ I I I

Rcsull

F i g . 7 . 7 I n t e r s y m b o l i n t e r f e r e n c e

at the receiver because the resultant voltage level due to the stretching could cause a logic 0 to be decoded as a logic 1 instead.

7.6.5 The eye diagram

Intersymbol interference can very easily be detected in the eye diagram. Figure 7.8 shows different eye diagrams. The eye diagram is created by the two different logic states being overlaid upon one another. At the transmitter the data consists of rectangular pulses. But as the data is continually changing a square shape would result. The change in data is due to the fact that the signal used to create the data stream (i.e. speech) is continually changing.

As the signal is conveyed over a limited bandwidth channel, the elliptical shape as shown in Fig. 7.8 should result. Now if there is very little intersymbol interfer- ence then the eye diagrams would be very open; however, the eye diagram would appear to close as the intersymbol interference increased.

Most digital systems are equipped with a test point at which the eye diagram can be viewed on an oscilloscope. Intersymbol interference causes bit errors to

Page 171: analog and digital comm techniques pdf

154 Effects of noise and distortion on analogue and digital signals

(b)

(a)

Decision point

Threshold level

Open eye Low BER

BER > 1 in 10 6

Closed eye High BER

BER < 1 in l0 6

Fig. 7.8 The eye diagram: (a) construction; (b) typical diagrams

occur. A large amount of intersymbol interference causes the bit error rate (BER) to increase.

7.6 REVIEW QUESTIONS

7.1 Describe, using diagrams, what is meant by amplitude distortion. 7.2 Describe, using diagrams, what is meant by frequency distortion. 7.3 Describe, using a diagram, the effect of noise on an analogue transmission

system. 7.4 Describe, using a diagram, the effect of noise on a digital transmission

system. 7.5 Describe, using diagrams, what is meant by intersymbol interference.

Page 172: analog and digital comm techniques pdf

8 Determination of bit error rates

Noise prevents man from being able to concentrate and think of solutions to problems.

8.1 INTRODUCTION

Coding of data into a format that can efficiently be transported over a medium is the subject of this chapter. Most data streams have a certain amount of redund- ancy. For the efficient transmission of the actual required data it is important to remove as much redundancy as possible. In many circumstances headers, footers, error codes etc. are added to the data stream. This added data causes the redun- dancy of the data to increase. Thus more time is required to transport the data over the medium. This chapter introduces some of the concepts behind reducing the redundancy of the transmitted data.

In Chapter 7 the concept of noise and its effects on digital signals was intro- duced. This chapter extends this concept and deals with the techniques used to determine the probable bit error rate on certain types of data codes.

Any message or piece of text contains character strings, semantics and syntax:

�9 Characters - letters of the alphabet, numbers 0 to 9. �9 Syntax - punctuation etc. �9 Semantics- meaning.

Communication systems are concerned with conveying the character strings and syntax characters. A communication system does not try to understand or inter- pret the meaning of the text and hence it is not concerned with semantics.

All data has some redundancy. Redundancy is that data which has no meaning but accompanies the data that has meaning. An example of redundancy in the English language is the following sentence:

The boy and the dog went for a walk.

In this sentence the words conveying meaning are 'boy', 'dog', 'went', and 'walk'. The other words 'the', 'and', 'the', 'for' and 'a' arc redundant in terms of the mean- ing of the sentence but are necessary to make the sentence grammatically correct.

Page 173: analog and digital comm techniques pdf

156 Determination of bit error rates

8.2 ENTROPY

The entropy function is used to find the ideal amount of data that should be trans- mitted to enable the data to be efficiently transmitted without transmitting the redundant data.

Entropy can be defined as the average amount of information per source input. The entropy function is given as follows:

n

S(x) - - Z P(xi) log2 e(xi) i = !

where P(xi) = probability of the character designated as X i.

Consider a transmission system that is to transmit the first six characters of the alphabet only. Each letter will be expressed as a digital signal. By convention each letter would be allocated 3 bits. This could be as shown in Table 8.1. Here the codes 110 and 111 are both redundant as they are not used. If there were only four characters then each character could be allocated 2 bits with no redundancy. On the other hand, if there were eight characters then each character could be allocated 3 bits with no redundancy. In this example, however, there is redun- dancy and 6 x 3 = 18 bits are required to transmit all six characters.

The entropy function is used to try to find the most economical way of trans- mitting the data. To use the entropy function the probability of each character must be known. Consider in the example that each character has equal probability of appearing in the text to be transmitted. This means that each character has a probability of 1/6 or 0.1667. Therefore P(xi) = 0.1667.

n

S(x) = - Z P(xi) log2 P(xi) i = l

6

= - ~ 0.1667 log2 0.1667 i = l

= - (6 • O. 1667 log20.1667)

= - log20.1667

lOgl0 0.1667

log10 2

= - ( - 2 . 5 8 5 )

= 2.585 bits/character

This means that all six characters can be transmitted by a transmission system using 6 x 2.585 = 15.51 bits. Relative to the previous method there is a distinct

saving of 18 - 15.51 = 2.49 bits. In practice each character in the alphabet does not have equal probability.

Some characters appear in a piece of text far more often than other characters.

Example 8.1 demonstrates this point.

Page 174: analog and digital comm techniques pdf

Table 8.1 Three-bit character codes

Character Digital code

A 000 B 001

C 010 D 011

E 100 F 101

110

111

Entropy 157

Example 8.1

Determine the ideal number of bits that should be allocated to each of the follow- ing characters with the probabilities given:

xi P(xi)

A 0.43 B 0.25 C 0.14 D 0.09 E 0.06 F 0.03

Solution

The entropy function is given as follows:

n

S(x) = - Z e( ,)log e ( x i )

i = l

= - (0.43 log 2 0.43 + 0.25 log 2 0.25 + 0.14 log2 0.14

+ 0.09 log2 0.09 + 0.06 log2 0.06 + 0.03 log2 0.03)

= 2.129 bits/character

In this case the message can be most efficiently be transmitted using 2.129 bits/ character.

Obviously it is not possible to transmit 0.129 of a bit. Instead only complete bits can be transmitted. In Chapter 9 coding is dealt with in more detail and the mechanisms used to enable data to be transmitted efficiently are discussed.

Page 175: analog and digital comm techniques pdf

158 Determination of bit error rates

8.3 CAUSES OF ERRORS ON DIGITAL SIGNALS

There are a number of causes of errors on digital signals. These are:

�9 Noise. �9 Limited bandwidth. �9 Bit stream rate.

The noise that is referred to here is line noise, discussed in Chapter 7.

8.3.1 Limited bandwidth

Any transmission medium can be represented by the circuit shown in Fig. 8.1. When the inductance and capacitance effects only are considered, it can be seen that the line acts as a low-pass filter.

The input circuitry to any circuit normally has a filter. This filter limits the bandwidth of the signal that is allowed to pass on to the next stage. The input filter and the filter effect of the medium result in a band-limited channel that the digital signal passes over.

A digital signal consists of a fundamental frequency and an infinite number of harmonic frequencies. The band-limiting effect of the circuit prevents a large number of these harmonic frequencies from reaching the distant receiver.

L R_ 4

G C

L_ R_ 4 4

R L 4 4

R L 4 4

Equivalent of a 1 km section of a transmission medium

A

4

4

L 4

L 4

Equivalent low-pass filter

Fig. 8.1 Transmission medium

Page 176: analog and digital comm techniques pdf

Probability of bit error rate 159

Transmitted bit

Pulse shape due to band limiting

i Transmitted bit stream

ca.~mg. / i \ l ' / j ka a , VV i 7 ,bros.;- t t:-":Z:P7 ; :-;:i::;:::; i1.:;7.

:::.:i:ii,', I "~";-':::" I ".":.~ .... "..,:. .:: ~:..' I L: . ' ' ':"-'..-..-

,: Band- l imi ted signal ,

I I I Sampling points

Fig. 8.2 In te rsymbo l In te r fe rence

When the band-limiting effect of the channel is taken into account then pulse spreading results. Figure 8.2 shows how the tails of a bit affect the previous and post bits. These tails can cause errors in the bit stream.

8.4 PROBABILITY OF BIT ERROR RATE

8.4.1 Gaussian white noise

Gaussian white noise is noise that is equally spread across the whole frequency spectrum. This means that it affects all frequencies equally. However, over a transmission medium the signal suffers attenuation. Unfortunately the attenua- tion is not the same for all frequencies in the signal and on a metallic pair the higher the frequency the greater the attenuation.

Because of this effect the Gaussian white noise affects the higher frequencies more than the lower frequencies on a metallic pair. The Gaussian white noise is now referred to as triangular noise. Figure 8.3 shows this effect. Gaussian white

Page 177: analog and digital comm techniques pdf

160 Determination of bit error rates

e ~

E <

Gaussian white noise

r Frequency

White noise

Signal attenuation Frequency

E <

Signal level

Triangular noise

r

Frequency

Fig. 8.3 Gaussian white noise

noise is normally measured as the amount of noise per hertz. It is then quite simple to calculate the amount of noise in the actual frequency range.

8 .4 .2 Probabil i ty of a bit error

Consider the following equation:

Eb ST No No

where Eb = signal energy (J/bit) No = Gaussian white noise (W/Hz)

S = signal power (W) T = bit time duration (s)

Using

1 T ~

C

Page 178: analog and digital comm techniques pdf

Probability of bit error rate 161

where C = bit rate (b/s)

but

where N = noise power (W) B = Bandwidth (Hz)

Therefore

Eb S

No CNo

N = BNo

Eb S

No C_N B

8.4.3 Data rates and signal-to-noise ratio

The equation developed in Section 8.4.2 can be expressed as

E b - - SNR B No C

This equation can be modified to express the bit rate C in terms of the other variables:

C = SNR B No Eb

In this equation the signal-to-noise ratio must be expressed as a ratio and not in dB.

Example 8.2

Given that:

Gaussian white noise = 1 x 10 -11W/Hz

Bandwidth = 4 kHz

Signal energy = 20 x 10-11J

Determine the bit rate if the signal-to-noise ratio is (a) 40 dB, (b) 20 dB and (e) 10dB.

Solution

(a) SNR = 40 dB = 10 000

B = 4 kHz

Eb = 20 x 10 - l l

No = 1 x 10 -11

Page 179: analog and digital comm techniques pdf

162 Determination of bit error rates

(b) S N R = 20 dB = 100

C = S N R x B No Eb

= 10 000 x 4000 x

B = 4 kHz

= 2 M b / s

1 x 10 -11

20 x 10 - l l

Eb = 20 x 10 -1!

N o - 1 x 10 -11

(c) S N R = 1 0 d B = 1 0

C = S N R x B No Eb

= 100 x 4000 x

= 20 k b / s

1 x 10 -11

20 x 10 -11

B = 4 kHz

Eb = 20 x 10 -11

No = 1 x 10 -11

C = S N R x B No Eb

= 10 x 4000 x

= 2 k b / s

1 x 10 -11

20 x 10 -11

F r o m this example it can be seen that the signal-to-noise ratio drastically affects

the m a x i m u m bit rate that can be t ransmit ted over the circuit.

8.4.4 Unipolar bit stream

F or unipolar bit streams the following equat ion applies:

P(b) = 1 _(x2/2) x----~e f o r x >_ 3

where

Page 180: analog and digital comm techniques pdf

Probabifity of bit error rate 163

Example 8.3

A unipolar bit stream having a signal energy of 9 x 10-9j and Gaussian white noise of 1 x 10 -9 W/Hz. Determine the probable bit error rate.

Solu t ion

P(b) =

x = ~

_ ~ / ~ • 10-9 -- x 10 -9 = x /~= 3

1 _(x2/2) - - - - - -e f o r x > 3 x V ~

1 r

= 3 V ~

= 1.47 x 10 -3 ~-, 1.5 x 10 -3

This means that there is a probability that 1.5 bits out of every 1000 will be errored.

8.4.5 Bipolar bit stream

For bipolar bit streams the following equation applies:

P(b) 1 _(,,,.212 ) = ~ e f o r x > 3 xv/-~

where X=V ~/2 B = SNR

Example 8.4

A bipolar bit stream has a signal energy of 9 x 10 -9 J and Gaussian white noise of 1 x 10 .9 W / H z . Determine the probable bit error rate.

Solution

x=V ~ 2 x 9 x 10 - 9

- 1 • 10 -9 - - x / ~ = 4.243

Page 181: analog and digital comm techniques pdf

164 Determination of bit error rates

1 _(x2/2) e(b) : x x / ~ e f o r x > 3

4 .243x /~ e-(4.2432/2)

= 11.6 x 10 -6 ~ 12 x 10 -6

This means that there is a probability that 12 bits out of every 1 000000 will be

errored.

8.5 SHANNON AND HARTLEY CAPACITY THEOREM

The Shannon and Hartley capacity theorem is used to determine the maximum bit

rate that can be used over a band-limited channel having a specific signal-to-noise

ratio. The theorem is as follows:

C = B log2(1 + SNR) b/s

where the SNR must be expressed as a ratio and not in dB.

Example 8.5

Determine the maximum bit rate that can be transmitted over a channel having a

bandwidth of 4 kHz and a signal-to-noise ratio of 48 dB.

Solution

SNR = 48 dB = 63 095.73

C = B log2 ( 1 + SNR) b/s

= 4000 log2(1 + 63 095.73) b/s

= 63.781 kb/s ,~ 64 kb/s

Example 8.6

Determine the maximum bit rate that can be transmitted over a channel having a

bandwidth of 15 kHz with a signal-to-noise ratio at the receiver of 42 dB.

Solution

Step I. Convert the SNR in dB to SNR as a ratio.

SNRdB -- 10 log10 SNRrat io

S N R r a t i o - - 10 sNI%B/1~

= 1042/10

= 15 849

Page 182: analog and digital comm techniques pdf

Shannon and Hartley capacity theorem 165

Step 2. Determine the maximum possible bit rate.

C = B log2(1 + SNR) b/s

= 150001og2(1 + 15849) b/s

= 150001og2(15 850) b/s

= 15 000 logl0(15 850) b/s log10 2

= 209.283 kb/s

Example 8.7

A unipolar bit stream having a bit rate of 139.264 Mb/s is transmitted down a transmission medium having a launch level of 0 dBm. At the receiver after regen- eration the signal level is 0 dBm. The signal-to-noise ratio at the receiver is 30 dB.

Determine the following:

1. The minimum bandwidth required. 2. The probable bit error rate. 3. The probable bit error rate if the bandwidth is limited to 1.26 MHz. 4. The probable bit error rate if the bandwidth in (1) is used but the signal-to-

noise ratio is reduced to 20 dB.

Solution

1. Determine the minimum bandwidth.

C = B log2 (1 + SNR)

n C

log2(1 + SNR)

SNR = 30 dB = 1000rat io, therefore

n __. 139.264 x 10 6

log2(1 + 1000)

= 13.97 MHz ~ 14 MHz

2. Probable bit error rate:

B = 14 MHz, C = 139.264 Mb/s

x = Eb = N R ~

~/ 14 X 10 6

= 1000 139.264 x 106

= 10.026

Page 183: analog and digital comm techniques pdf

166 Determination of bit error rates

P(b) = l _(x2/2)

1 _(10.0262/2) e

10.026x/~

- 5 . 9 2 x 10 -24 ~ 6 x 10 -24

3. Probable bit error rate:

B = 1.26MHz, SNR = 30dB = 1000

x = = R ~

i 1.26 x 106 = 1000139.264x 106

= 3.008

P(b) = 1 _(x2/2) x--~nn e

= 1.44 x 10 -3

4. Probable bit error rate:

B = 1 4 M H z , S N R = 2 0 d B = 1 0 0

X - - - - ~

i 14 x 10 6

= 100 139.264 x 10 6

= 3 . 1 7

1 _(x 2/2 ) PCb) = xv /~e

1 _(3.172/2) ~ e 3 .17x /~

= 0.827 x 10 -3 ~ 0.83 x 10 -3

E x a m p l e 8 .8

A bipolar bit stream having a bit rate of 139.264 Mb/s is transmitted down a trans- mission medium having a launch level of 0 dBm. At the receiver after regeneration the signal level is 0 dBm. The signal-to-noise ratio at the receiver is 30 dB.

Determine the following:

Page 184: analog and digital comm techniques pdf

Shannon and Hartley capacity theorem 167

1. The minimum bandwidth required. 2. The probable bit error rate. 3. The probable bit error rate if the bandwidth is limited to 1.26 MHz. 4. The probable bit error rate if the bandwidth in (1) is used but the signal-to-

noise ratio is reduced to 20 dB.

Solution

1. Determine the minimum bandwidth.

C = B log2 ( 1 -t- SNR)

B __. C

log2 ( 1 + SNR)

SNR = 30 dB = 1000ratio, therefore

B ,_~ 139.264 x 106

log2(1 + 1000)

= 13.97 MHz ~ 14 MHz

2. Probable bit error rate:

B = 14 MHz, C = 139.264 Mb/s

v/ SNR" x=v = . . . . .

~/2 14 x 106B = x 1000 139.264 x 106

= 14.18

1 _(x2/2) P(b) = x-----~e

1 _ ( 1 4 . 1 8 2 / 2 ) - - e

14.18x/~

= 612.23 x 10 -48 ~ 612 x l0 -48

3. Probable bit error rate:

B = 1.26 MHz, SNR = 30 dB = 1000

x = V" -~-o = S N R ~

~/2 1.26 x 106 = x 1000 139.264 x 106

= 4.254

Page 185: analog and digital comm techniques pdf

168 Determination of bit error rates

1 P(b) = x x / ~

~ e - ( X 2 / 2 )

4 .254x /~ e-(4.2542/2)

= 11.03 x 10 -6 ~ 11 x 10 -6

4. Probable bit error rate:

B = 1 4 M H z , S N R = 2 0 d B = 1 0 0

x=V o =

~/ 14 x 106B - 2 x 100 139.264 x 106

= 4.484

1 _(x2/2) P(b) = x - ~ e

4 .484x /~ e-(4.4842/2)

= 3.83 x 10 -6 ~ 4 x 10 -6

8.6 COMPARISON OF UNIPOLAR AND BIPOLAR BIT STREAMS

Table 8.2 shows the comparison between results from Examples 8.7 and 8.8. As can be seen, the bipolar bit stream performs far better than the unipolar bit stream. By comparing different values for the SNR it can be seen that, for both

codes, the worse the SNR becomes the worse the probable bit error rate becomes.

Hence in practice the received SNR does play a part in the quality of the received

signal and cannot be ignored.

Table 8.2 Comparison of results from Examples 8.7 and 8.8

Bit stream SNR (dB) B (MHz) P(b)

Unipolar 30 14 30 1.26 20 14

Bipolar 30 14 30 1.26 20 14

6 x 10 -24 1.4 x 10 -3

0.83 x 10 -3

612 x 10 -48 11 x 10 -6 4 x 10 -6

Page 186: analog and digital comm techniques pdf

Review questions 169

These two examples also demonstrate the effects of limiting the bandwidth too much. Again in both cases for the same SNR the probable bit error rate increases as the bandwidth is reduced.

8.7 REVIEW QUESTIONS

8.1 Describe, with the aid of a diagram, what is meant by Gaussian white noise and why it is sometimes referred to as triangular noise.

8.2 Determine the ideal number of bits that should be allocated to each of the following characters. The number of times the character appears in a particular piece of text is given in brackets after the character.

8.3 Given that:

A (25), B (32), C (12), D (4), E (64), F (18)

Gaussian white noise = 1 x 10-11 W/Hz

Bandwidth = 4 kHz

Signal energy = 20 x 10-11 j

determine the bit rate if the signal-to-noise ratio is (a) 35 dB, (b) 15 dB and (c) 8dB.

8.4 A unipolar bit stream has a signal energy of 4.5 x 10 -9 J/bit and Gaussian white noise of 3.5 x 10 -l~ W/Hz. Determine the probable bit error rate.

8.5 A bipolar bit stream has a signal energy of 4.5 x l0 -9 J/bit and Gaussian white noise of 3.5 x l0 -l~ W/Hz. Determine the probable bit error rate.

8.6 Determine, using the Shannon and Hartley capacity theorem, the maximum bit rate that can be transmitted over a channel having a bandwidth of 4 kHz and a signal-to-noise ratio of 38 dB.

Page 187: analog and digital comm techniques pdf

9 Source coding techniques

Mankind must be able to make sense of received information for it to be meaningful.

9.1 INTRODUCTION

Coding of data into a format that can efficiently be transported over a medium is the subject of this chapter. Most data streams have a certain amount of redund-

ancy. For data to be efficiently transported all the redundancy should be removed. The second important criterion is the accuracy of the received data. It is no

good receiving a compressed data stream if, during transmission, the data becomes errored, resulting in a high error rate at the receiver. Some of the error detection and error correction schemes that are employed in modern com- munication systems are discussed in this chapter.

Data can be transferred asynchronously or synchronously. In both these methods error detection is very necessary. There are many techniques that are used to enable error detection to take place. Some methods enable error correc- tion to take place as well.

All error detection schemes have some disadvantages and all error detection

schemes fail to detect all types of errors. However, some methods outperform others with respect to redundancy and efficiency.

9.2 ASYNCHRONOUS AND SYNCHRONOUS TRANSMISSION

Asynchronous transmission means that the transmitted data stream is not contin- uous. In other words the data stream is only present when there is data to trans- mit. Even then the data stream need not be continuous. Each data block can be transmitted separately with a break before the next data block is transmitted. The break between the data blocks need not be constant and can be of any duration. The data block can consist of a page of text, a paragraph of text, a single word or even a single character as in the case of the transmission of ASCII characters over an asynchronous, serial port.

Page 188: analog and digital comm techniques pdf

Codes used on computers 171

9.3 CODES USED ON COMPUTERS

Over the years many different types of coding techniques have been used to encode alphanumeric characters. Currently there are two accepted codes that are specifically used on computers. These two types are ASCII and EBCDIC.

9.3.1 American Standards Institute Code for Information Interchange (ASCII)

The American Standards Institute Code for Information Interchange or ASCII was developed specifically to enable standardisation in the computer industry.

T a b l e 9.1 T h e A S C I I c o d e

I H e x c o d e I 0 1 ' 2 ~ 3 4 5 6

i B i t s 5 i 0 1 0 1 0 ' 1 O , . i . . . . . . , I ' i . . . .

H e x c o d e 6 0 0 1 1 i 0 0 i 1 . . . . . . . i ~

4 3 2 1 7 0 0 0 0 ! 1 ! 1 1

0 0 0 N U L D L E SP 0 @ [ P L \ 1 . . . . i i , .

! ' ] A ' q - a 1 O 0 i S O H D C I J ~

2 0 0 S T X D C 2 " 2 B ~ R b . . . . . ! , . . . . . . .

3 0 0 E T X D C 3 # 3 C S c , t ~ ' " " i ' " " ' '

0 1 E O T D C 4 $ 4 ! D T d . . . . . . ! , .

5 0 1 E N Q N A K 1 % 5 i E U e ! . . . . . . . , | �9 �9 , , , ,

6 0 1 0 A C K S Y N 7 ~ ; ~ & 6 F , V t f �9 , , | , , , , i , , , , , , ,

7 0 1 1 B E L E T B ' 7 G W g I '~ �9 , , , , , , , , , ,

8 1 0 ! BS C A N ( 8 H X h I x

9 1 1 H T E M ) 9 I Y i J

! 1 0 ' L F S U B , * �9 J Z j , ,

1 1 , V T E S C + ; K [ k {

1 0 F F F S , < L \ 1 , I , , , , , , �9 , , , �9 ,

D 1 1 0 1 C R G S - = M ] m }

E 1 1 1 0 S O R S . > N " n "

F 1 1 1 1 SI U S / ? O _ o J . . . . . . . . .

' 4

A

B

c

Y

z

D E L

N U L - null, or all zeros; SOH - start of header; STX - start of text; ETX - end of text; EOT - end of transmission; E N Q - enquiry; A C K - acknowledge; BEL - bell or alarm; BS - backspace; HT - horizontal tabulation; LF = line feed; VT = vertical tabulation; F F = form feed; CR = carriage return; SO - shift out; SI = shift in; D L E - data link escape; DCI - device control l; DC2 - device control 2; DC3 -- device control 3; DC4 = device control 4; N A K - negative acknowledge; SYN = synchronous idle; ETB - end of trans- mission block; C A N = cancel; SUB = substitute; EM = end of medium; D E L - delete; ESC - escape; FS = file separator; GS = group separator; RS - record separator; US - unit separator; SP -- space.

Page 189: analog and digital comm techniques pdf

172 Source coding techniques

The ASCII code is widely used by many computer manufacturers worldwide. It is a 7-bit code with the possibility of a parity bit being added to form a byte. Table 9.1 indicates the coding for the various alphanumeric characters as well as control characters. The code can support up to 128 different characters and all of these 128 states are used in the coding.

The table is read from bit 7 to bit 1, where bit 7 is the MSB and bit 1 is the LSB. When the code is transmitted from a PC over an asynchronous port such as an RS232C then the LSB is transmitted first and the MSB last. A parity bit is normally added and sent out between the MSB and the stop bits. The 8-bit data stream is packaged between a single start bit and l, 1.5 or 2 stop bits. The start bit is normally a logic 0 and the stop bits are normally a logic I.

When the data is transmitted over a synchronous port, the data is not packaged between start and stop bits but is packaged in a frame between the start of text (STX) and end of text (ETX) commands. With this method the LSB is still transmitted first and the MSB last. Again a parity bit can be included after the MSB to make up an 8-bit binary word for each character.

Table 9.2 The EBCDIC code

BITS b3 0 0 0 0 0 0 0 0 I I l

b2 0 0 0 0 l l ! l 0 0 0

bl 0 0 l l 0 0 l 1 0 0 l

~b7 b6 b5 b0 0 1 0 1 0 1 0 1 0 1 0 1

0 0 0 0 NUL s o n STX ETX ' HT DEL

0 0 0 1 DLE DCI DC2 DC3 RF.S NL BS i

0 0 1 0 BYP i LF EOB

0 0 l l ; SYN , DC4 EOT

0 1 0 0 I SP i r

0 i 0 I &

o 1 i o - / | |

0 1 1 1 �9 , ,

1 0 0 0 a b c d e f g h i

1 0 0 1 j k ! m , n o p q r �9 ,

1 0 I 0 s t u v w • y z

1 0 1 1

. . . . . i 1 1 0 0 A B C D E F G H

l l 0 l J K L M N O P Q

1 1 1 0 S T U V W X Y �9 |

1 1 l 1 0 1 2 3 4 5 6 7 8 .....

RES, N L no t specifically a l located.

CAN

1 l 1 l 1

0 l l - i 1

l 0 0 I I

1 0 1 0 1

VT FF CR SO SI

IFS IGS IRS IUS l

ENQ ACK BEL

NAK SUB

�9 < ( +

$ �9 ) ! ~ -

, % > ?

# @__, / - "

N U L = null , or all zeros; S O H = s tar t o f header ; S T X = s tar t o f text; E T X = end o f text; H T = ho r i zon t a l

t abu la t i on ; D E L = delete; V T = vert ical t abu la t i on ; F F = fo rm feed; C R = car r iage re tu rn ; SO = shift out ;

Sl = shift in. D L E = d a t a l ink escape; DC1 = d e v i c e con t ro l 1; D C 2 = d e v i c e con t ro l 2; D C 3 = d e v i c e con t ro l 3;

BS = backspace; C A N = cancel; IFS = file separa to r ; I G S = g r o u p separa to r ; IRS = record sepa ra to r ;

I U S = un i t separa to r . B Y P = bypass (escape); L F = line feed; E O B = end o f block; E N Q = enqui ry ; A C K = acknowledge ; B E L =

bell.

S Y N = s y n c h r o n o u s idle; D C 4 = device con t ro l 4; E O T = end o f t r ansmiss ion ; N A K = negat ive a c know l -

edge; S U B = subs t i tu te ; SP = space.

Page 190: analog and digital comm techniques pdf

Huffmann coding 173

9.3.2 Extended binary coded decimal code (EBCDIC)

The extended binary coded decimal code (EBCBIC) was developed by IBM for standardisation on all their computers. This code is extensively used on many large computers today. The EBCDIC code is an 8-bit code that enables encoding of 256 different alphanumeric characters, control characters etc. Currently not all the codes are specifically allocated, as indicated in Table 9.2.

The code has one major disadvantage that there is no parity bit. In order for an error to be detected the same data needs to be transferred twice and the two received data streams must be compared.

9.4 HUFFMANN CODING

The problem with the ASCII and EBCDIC codes is that they still have redun- dancy. When trying to store or transmit data efficiently it is necessary to try to remove as much redundancy as possible. Huffmann coding is a technique that is used to achieve this. The technique is more commonly employed when storing data, known as 'zipping' the data up. Obviously the data must be 'unzipped' when it is retrieved.

Huffmann coding uses the entropy function, a tree diagram, a state diagram and a table. The following examples demonstrate the Huffmann coding technique.

Example 9.1

The following six letters, having the probabilities shown, must be digitally transmitted.

Xi P(xi)

A, B 0.3 C 0.13 D, E, F 0.09

Determine the following:

1. The minimum number of bits per character. 2. The Huffmann codes. 3. The compression rate. 4. The efficiency.

So/m/on

1. Minimum number of bits per character.

Page 191: analog and digital comm techniques pdf

174 Source coding techniques

n

S ( x ) - - Z P(x i ) log2 P(x i ) i=1

S(x) = - (2 x 0.3 log2 0.3 + 0.13 log2 0.13 + 3 x 0.09 log2 0.09)

= 2.363 bit/character

2. The Huffmann codes are found from Fig. 9.1. A summary is given in Table 9.3. The codes given average out at 2.4 bits per character.

(a)

X i P (x i) A 0.30

B 0.30

1 ~ 0 ( 0.6 )

C 0.13 1 ~ --~0(0.22) D 0.09

E 0.09 ...... 1 l (o.18)

F 0.09 ,, [--0-0

1

~ (0.4)

1

MSB

LSB 1

6 (b)

1

I io.61 I

i I 0 MSB

/

0 1 ~ 0 i

iol j io., 1 1 0 1

Fig. 9.1 (a) Tree diagram; (b) state diagram

(1) n

0 LSB

Table 9.3 The Huffmann codes

xi P(xi) Code

A 0.3 11

B 0.3 10

C 0.13 011

D 0.09 010 E 0.09 001

F 0.09 000

Sum niP(xi)

nie(xi)

0.6

0.6

0.39 0.27 0.27

0.27

2.4

Page 192: analog and digital comm techniques pdf

Huffmann coding 175

The state diagram is read from the top to the bottom. In other words the MSB is at the top of the diagram and the LSB is at the bottom of the diagram for each individual character.

3. Compression rate: conventionally for six characters, three bits would be allocated to each character.

conventional no bits/char Compression rate =

Huffmann average

3 2.4

= 1.25

4. Efficiency:

S(x) Efficiency (7/)= E Flie(xi ) x 100%

2.363 x 100%

2.4

= 98.46%

Figure 9.2 shows a flow chart to decode the Huffmann codes received for Example 9.1. As can be seen, if the first bit in the stream is a logic 1 then the character will be either A or B. To determine which character the status of the next bit must be determined. If the next bit is a logic 1 then the character is A, but if the next bit is a logic 0 then the character is B.

if the first bit is a logic 0 then the next 2 bits must be examined to determine whether the character is C, D, E, or F. If the next bit is a logic 1 then the character is either C or D. If the last bit is a logic 1 then the character is C. However, if the last bit is a logic 0 then the character is D.

If the first bit is a logic 0 and the next bit is a logic 0 then the character is either E or F. If the last bit is a logic 1 then the character is E and if the last bit is a logic 0 then the character is F.

Example 9.2

In a piece of text only the following letters are used. The number of times each letter appears is given in brackets after the letter.

A (183), B (183), C (183), D (108), E (108), F (67), G (67), H (67), I (34)

Determine the following:

1. The minimum number of bits per character. 2. The Huffmann codes. 3. The compression rate. 4. The efficiency.

Page 193: analog and digital comm techniques pdf

176 Source coding techniques

(~ Start )

Z / Fetch first bit//

Yes No

/Fetch ~next bit /

iCh n I //Fetch ne

S, Fetch next bit /

, next bit/ /Fetch next bit

,w

/Output character/

//" Fetch next bit , /

Fig. 9.2 Decoding flow chart

Solution

Before doing anything determine the total number of characters and then deter- mine the probability for each character.

Total N o . = 3 x 1 8 3 + 2 • 1 0 8 + 3 •

= 1000

Probability for characters:

P(xi) = No. of characters in text

Total No. of characters in text

Probability for characters A, B and C"

183 P(x i ) - - 1000

=0.183

Page 194: analog and digital comm techniques pdf

Huffmann coding 177

Probability for characters D and E:

108 P(xi) = 1000

= 0.108

Probability for characters F, G and H:

67 e(xi) = 1000

= 0.067

Probability for character I"

34 P(xi) = 1000

= 0.034 n

1. S(x) = - ~ P(xi) log2 P(xi) i = 1

S(x) = - (3 x 0.183 log2 0.183 + 2 x 0.108 log2 0.108

+ 3 x 0.067 log2 0.067 + 0.034 log2 0.034)

= 2.9884 bits/character

2. The Huffmann codes are determined using Fig. 9.3. They are shown in Table 9.4. 3. Compression rate: conventionally for nine characters, four bits would be

allocated to each character.

conventional No. bits/char Compression rate =

Huffmann average

4

3.052

= 1.311

4. Efficiency:

S(x) Efficiency (7/) = ~ niP(xi) x 100%

2.9884 = x 100%

3.052

= 97.92%

9.4.1 Usage of Huff'mann coding

Huffmann coding is only of use as source code as a computer program is required to compress the characters. The program will be written in to follow the steps as indicated in the flow chart given in Fig. 9.2. As a result it is only carded out in the front-end processor.

Page 195: analog and digital comm techniques pdf

(a)

X i P (X i)

A 0.183

B 0.183

C 0.183

D 0.108

E 0.108

F 0.067

G 0.067

H 0.067

I 0.034

1 /

....... 1 ~ ' - 0.549

~-00.366 Io

1 i -

,~-nfl 0.216 i i

V

1 ~ --~00.134

1

..... ~-000"101

0.235

1

1 0.451

- - I r a

(b)

1

I Io. 49 !

t ! o 1

i oi,61 1o 661 I 1 [ 0 1 ! 0

0.451 [

I 0 I

10235 i I o

I I io., 4 ! io.,o,I 1 I 0 1 ] 0

Fig. 9.3 (a) Tree diagram; (b) state diagram

Table 9.4 Huffman coding

xi P(xi) Code ni niP(xi)

A 0.183 B 0.183 C 0.183 D 0.108 E 0.108 F 0.067 G 0.067 H 0.067 I 0.034

11 101 100 011 010

0011 0010 0001 0000

Sum nie(xi)

2 0.366 3 0.549 3 0.549 3 0.324 3 0.324 4 0.268 4 0.268 4 0.268 4 0.136

3.052

Page 196: analog and digital comm techniques pdf

Hamming coding 179

9.4.2 Advantages and disadvantages of Huffmann coding

The advantage of this coding method is that less memory is required to store the compressed data. This technique is carried out when files are zipped up for storage on floppy disks.

The disadvantage of this method on live changing data is that the data to be transmitted must first be stored and then compressed and then transmitted. At the receiver the data must be stored, decoded and then passed on to the rest of the circuitry. The storage of the data adds a propagation delay to the process and as a result this coding method is not used on digitised speech.

9.5 HAMMING CODING

Another coding method is Hamming coding. This is a data-based coding tech- nique. The number of Hamming bits required is directly proportional to the size of the data block. The Hamming bits are used for error detection and correc- tion at the distant receiver. The method described below is for the detection and correction of single-bit errors.

The number of Hamming bits required is determined as follows.

2 * > k

where r = 1 , 2 , 3 . . .

k = number of message bits

The number of Hamming bits (H) required is

H = r + l

The total number of bits that are transmitted in the block is

block length (n) = H + k

This coding technique is also referred to as an (n,k) block check code. The Hamming bit positions must be specified and the transmitter and receiver must know their positions. By convention the Hamming bit positions are as shown in Table 9.5. Note that the bit positions are numbered from 1 and not from 0.

The Hamming bits are determined by means of the following. For all the data bits, those bits that yield a logic 1, their bit position is converted into the binary

Table 9.5 Hamming bit positions

Bit number

17 a 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 I b

D H D D D D D D D H D D D H D H H

a M S B . b LSB.

D = da ta bit.

H = H a m m i n g bit.

Page 197: analog and digital comm techniques pdf

180 Source coding techniques

equivalent. All the binary codes are then modulo 2 added to produce the Hamming codes. This process is shown in Example 9.3.

The distant receiver determines the Hamming codes and then compares this with the received Hamming codes. If the modulo 2 sum of the received Hamming codes and the receiver-generated Hamming codes is all logic 0 then the data stream is unerrored. If there is a difference then the actual binary code indicates which bit is errored.

The Hamming distance is the minimum number of bit positions in which two valid code words differ. Consider the following 7-bit code words using even parity:

Word 1 0000000 0 Word 2 0000001 1 Word 3 0000010 1 Word 4 0000011 0

Comparing words 1 and 4, there is a 2-bit change and these words both yield the same parity status. Comparing words 2 and 3, there is a 2-bit change and these words both yield the same parity status. Hence the Hamming distance is 2. This means that the code will only detect and correct single-bit errors.

For the code to detect x errors, the code must have a Hamming distance of x + 1. In the above example x = 1 resulting in a Hamming distance of 2. It enables the code to detect and correct x errors then a Hamming distance of 2x + 1 is required.

The value k/n is known as the code rate or code efficiency and the value (1 - k / n ) is known as the redundancy.

Example 9.3

The Hamming bits are to be inserted into bit positions 1, 2, 4, 8 etc. Determine each of the following:

1. The number of Hamming bits required for the data block given below. 2. The (n, k) block check code. 3. The Hamming code for the data block given below. 4. The code efficiency. 5. The code redundancy.

Binary word = 010100000012

Solution

1. Message bits (k) = 11.

2r>k

L e t r = l : 21 = 2 < 11 L e t r = 2 : 2 2 = 4 < 11 Let r = 3: 23 = 8 < 11 L e t r = 4 : 2 4 = 1 6 > 11

Page 198: analog and digital comm techniques pdf

Hamming coding 181

Therefore

H = r + l

= 4 + 1

= 5

2. Total number of bits in the block:

n = k + H

= 1 1 + 5

= 1 6

Therefore a (16,11) block check code is required.

0

MSB 16 15 14 13 12 11 10 9

H 0 1 0 1 0 0 0

8 7 6 5 4 3

H 0 0 0 H 1 I

LSB 2 1

H H

Modulo 2 sum

3 = 00011

12 = 01100

14 = 0 1 1 1 0

= 00001

H

16 0

15 14 13 12 11 10 0 1 0 1 0 0

H

9 8 7 6 0 0 0 0

H

4 0

H H

2 1

0 12

4. Code efficiency:

k 11 Efficiency = - = = 0.6875

This equates to an efficiency of 68.75%.

5. Code redundancy:

Redundancy = 1 - -k = l 11 n 16

= 1 - 0.6875 = 0.3125

Example 9.4

The Hamming bits appear in bit positions l, 2, 4, 8 and 16. The following (l 6, l l)

block check code is received at a receiver. Determine whether the data is error free

or not.

00101100111001112

Page 199: analog and digital comm techniques pdf

182 Source coding techniques

Solution

H

16

0

H

15 14 13 12 11 10 9 8 7 6 5

0 1 0 1 1 0 0 1 1 1 0

H

4

0

H

2

1

H

1 1

Modulo 2 sum

Receiver generated H a m m i n g codes

Received H a m m i n g codes

Modulo 2 sum

The received bit s tream is error free.

=01011

=01011

= 00000

3 = 00011

6 = 00110

7 - 00111

11 - 01011

12 = 01100

14 - 01110

= 01011

Example 9.5

The H a m m i n g bits appear in bit positions 1, 2, 4, 8 and 16. The following (16,11)

block check code is received at a receiver. Determine whether the data is error free

o r not.

00101110101011002

Solution

H H H H H

16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1

0 0 1 0 1 1 1 0 1 0 1 0 1 1 0 0 I

Modulo 2 sum

Receiver generated H a m m i n g codes

Received H a m m i n g codes

Modulo 2 sum

The error code

This equates to bit 10, hence bit 10 is errored.

= 00110

= O1100

= 0 1 0 1 0

= 010102

3 = 00011

6 = 00110

10 = 01010

11 = 01011

12 = 01100

14 = 01110

= 00110

Page 200: analog and digital comm techniques pdf

The corrected code is:

H H 16 15 14 13 12 11 10 9 8 0 0 1 0 1 1 0 0 1

The correct message data stream is"

010110001012

7 6 5 0 1 0

Hamming coding 183

H H H 4 3 2 1 1 1 0 0

9.5.1 Usage of Hamming coding

Hamming coding is only of use as source code as a computer program is required to compress the characters. As a result it is only carded out in the front-end processor.

9.5.2 Advantages and disadvantages of Hamming coding

The advantage of this coding method is that it is extremely effective on networks where the data streams are prone to single-bit errors.

The disadvantage of this method is that for a single-bit detection and correction code, if multiple bits are errored then the errors are detected but the resultant could cause another bit that is correct to be changed, causing the data to be further errored. Consider the following example.

Example 9.6

An (11,7) block check code is received. The Hamming bits are in bit positions 1, 2, 4 and 8. Determine whether the data is errored and which bit or bits are errored.

Transmitted data block = 100101100 0 02

Received data block = 1001010010 0

H H H H

So/m/on

Receiver-generated Hamming bits:

Bit 3 = 0011

Bit 6 = 0110

Bit 11 = 1011

Modulo 2 add = 1110

Received Hamming code = 1000

Modulo 2 add = 0110

This indicates that bit 6 is errored, which is wrong as bits 3 and 5 were errored.

Page 201: analog and digital comm techniques pdf

184 Source coding techniques

9.6 REVIEW QUESTIONS

9.1 State the full name for the following mnemonics: (a) ASCII (b) EBCDIC

9.2 The following six letters, having the probabilities shown, must be digitally transmitted.

Xi P(xi)

A, B 0.305 C 0.15 D, E, F 0.08

Determine the following: (a) The minimum number of bits per character. (b) The Huffman codes. (c) The compression rate. (d) The efficiency.

9.3 In a piece of text only the following letters are used. The number of times each letter appears is given in brackets after the letter.

A (205), B (183), C (178), D (178), E (84), F (84), G (53), H (53), I (32)

Determine the following: (a) The minimum number of bits per character. (b) The Huffman codes. (c) The compression rate. (d) The efficiency.

9.4 The Hamming bits are to be inserted into bit positions 1, 2, 4, 8 etc. Deter- mine each of the following: (a) The number of Hamming bits required for the data block given below. (b) The (n, k) block check code. (c) The Hamming code for the data block given below. (d) The code efficiency. (e) The code redundancy.

Binary word = 1001100010002

9.5 The Hamming bits appear in bit positions 1, 2, 4, 8 and 16. The following (16,11) block check code is received at a receiver. Determine whether the data is error free or not.

00101100111101112

Page 202: analog and digital comm techniques pdf

10 Bit error detection correction

and

Mankind has relied on coding systems to make complex problems understandable.

10.1 INTRODUCTION

Coding systems within a transmission system are the subject of this chapter. Basic systems such as parity bits for error detection and block check codes for error detection and single-bit error correction are discussed. The advantages and dis- advantages of these systems are covered.

More complex systems such as cyclic redundancy checks are discussed in some detail from a mathematical point of view as well as from a practical perspective.

The chapter ends with an in-depth discussion on trellis coding, how it works and why it is used on large-scale systems today.

10.2 ERROR DETECTION USING PARITY BITS

10.2.1 Parity determination

Parity bits are used on asynchronous data streams to determine whether the received data has been errored or not. The transmitter determines the status of the parity bit and inserts it into the data stream, normally at the back of the stream. The receiver determines what the parity should be using the data bits only and then compares this to the status of the received parity bit. If the two states are the same then the receiver assumes that the received data is error free. If, however, the two states are different then the receiver assumes that the data was errored.

Consider an ASCII character that is transmitted via an RS232C port. The ASCII character consists of 7 bits. These 7 bits are loaded into a UART (universal asynchronous receiver transmitter). The UART adds a single start bit and 1.5 to

Page 203: analog and digital comm techniques pdf

186 Bit error detection and correction

two stop bits. The UART also determines the parity bit of the 7-bit data code.

Even parity is where there are an even number of logic l s in the binary word. The word 11001102 has four logic 1 states and hence the parity is even. If the system was using even parity then the transmitter would insert a parity bit having a logic 0 state into the data stream.

The word 11001002 has only three logic 1 states and hence it has odd parity. If the system was using even parity then the transmitter would insert a parity bit having a logic 1 state into the bit stream. This would cause the 8-bit word to have even parity.

If the word 11001102, which has even parity, was transmitted over a system using odd parity then the transmitter would insert a parity bit having a logic 1 state. Likewise for the word 11001002 transmitted over a system using odd parity then the transmitter would insert a parity bit having a logic 0 state.

Example 10.1

Consider the ASCII code for the character 'h'.

Character Hex code Binary code

h 68 1101000

Assume even parity is used and two stop bits are used. The start bit is always a logic 0, the stop bits are always logic 1 and the parity bit for H is I. The trans- mitted data stream for the h is as follows:

S LSB MSB P Stp Stp

0 0 0 0 1 0 1 1 1 1 1

where S - s t o p L S B - least significant bit

P - parity MSB - most significant bit

Stp - stop

As can be seen above, the LSB is transmitted first and the MSB last when the data is transferred asynchronously.

Figure 10.1(a) shows one method used to determine the parity of the ASCII character. The switch shown must be placed in the appropriate position according to the parity to be transmitted. For even parity XOR gates are used, whereas for odd parity the last gate is an XNOR gate. The output of the last gate together with the input data is then clocked into the output buffer.

Page 204: analog and digital comm techniques pdf

Error detection using parity bits 187

(a)

(b)

LSB

~T ~. .~ .... L. ,~_ 5 j L A 4 .... ! l �9 - -

o ~ ^6 0

O . , Even 0

D Q b,!

Clock --- Odd parity

LSB [ - ~ ~ ~ . . - ~ ~_DII,,~ ! i ~ T~ _ :, ~ ~ ?

QI- ] !" MSB

Odd ",

Fig. 10.1 Par i ty de te rm ina t i on : (a) at the t ransmi t te r ; (b) at the rece i ve r

10.2.2 Error detection using the parity bit

Figure 10.1 (b) shows how the parity bit is used to determine whether the received data is errored or not. The switch is in the position for odd parity to be detected. This shows that the data applied to the last gate is exclusive ORed with a logic 1. With the switch placed in the position for the detection of even parity, the data applied to the last gate is exclusive ORed with a logic O.

Example 10.2

Consider the following asynchronous bit stream that arrives at a receiver:

010100111112

Stripping off the start bit and two stop bits first:

101001112

Page 205: analog and digital comm techniques pdf

188 Bit error detection and correction

Identifying the parity bit and the data bits:

Data bits = 10100112

Parity bit - 12

The receiver determines the parity of the data and compares it to the received parity bit:

Receiver determined parity = 02

This is not the same as that received and hence the data has been errored. The receiver does not know whether the parity bit was errored or whether, as in this example, the data was errored.

Example 10.3

Consider the following transmitted character and received character:

Transmitted character = Received character =

LSB MSB P 1 0 0 0 0 1 1 12 1 0 0 0 1 0 1 12

In this case two bits have been errored, but when the receiver determines the parity and compares this to the received parity bit, no difference is found and hence the receiver assumes that the data is correct. This is clearly not the case.

Example 10.4

The following asynchronous data stream is received at an RS232C port. The data has a single start bit and two stop bits. A parity bit is incorporated with each character.

096A6C6D833 F426H

Determine the serial binary code that has transmitted and determine the ASCII

characters.

Solution

Determine the binary code"

0 9 6 A 6 C 6 D 8 3 F 4 2 6H 0000 1001 0110 1010 0110 1100 0110 1101 1000 0011 1111 0100 0010 01102

Group the bits in groups of 11 ~0, i.e. one start bit, one parity bit, two stop bits and seven data bits:

00001001011 01010011011 00011011011 00000111111 01000010011 02

Page 206: analog and digital comm techniques pdf

Error detection using parity bits 189

List each character separately"

MSB LSB Word 1 0 0 0 0 1 0 0 1 0 l 1 Word 2 0 l 0 1 0 0 l 1 0 1 1 Word 3 0 0 0 1 1 0 1 1 0 1 1 Word 4 0 0 0 0 0 1 1 1 1 1 1 Word 5 0 1 0 0 0 0 1 0 0 1 1

Strip off the start and stop bits and separate the parity bit:

Data Parity

0001001 0 1010011 0 0011011 0 0000111 1 1000010 0

Even parity is used. Remember that the LSB of each character is sent out first, so reverse the order:

1001000 = 4816 = H

1100101 = 6516 = e

1101100 = 6Ci6 = 1

1110000 = 7016 = P 0100001 = 2116 = !

10.2.3 Advantages and disadvantages of using parity bits

When used for error detection parity bits will:

�9 Detect errored data where an odd number of bits have been errored. �9 Not detect errored data where an even number of data bits have been errored.

10.2.4 Disadvantages of using asynchronous transmission to send each character individually

As can be seen in the above examples, to transmit 7 bits, 10.5 to 11 bits must be transmitted. The efficiency is determined by the following equation:

number of message bits x 100%

r / = total number of transmitted bits

The redundancy is determined by

Redundancy = 100% - r/

This means that the ASCII character that is transmitted asynchronously has an efficiency of 66.67% when 1.5 stop bits are used, giving a redundancy of

Page 207: analog and digital comm techniques pdf

190 Bit error detection and correction

33.33%. If two stop bits are used then the efficiency drops to 63.64% which yields a redundancy of 36.36%.

A second disadvantage is that if the parity bit is errored during the transmission but the data is not errored then the receiver will detect that the data has been errored.

10.3 BLOCK CHECK CODES

Parity bits can be used in another way for error detection and single-bit error correction.

Consider the block of data shown in Table 10.1, consisting of EBCDIC codes, which is to be transmitted asynchronously

The data will be sent out in the following frame format: �9 , . . . . . . .

I soF I Wor , Wor 8 I VRC I.RC I I where SOF = start of frame

EOF = end of frame

The receiver will determine the VRC and HRC on the data and then compare it to the received VRC and HRC. If there is a difference between the received VRC/ HRC and the receiver-determined VRC/HRC then the receiver might be able to correct the error.

Table 10.1 E B C D I C da t a ,

W o r d 1 = T

W o r d 2 = r

W o r d 3 = y

W o r d 4 = SP

W o r d 5 = t

W o r d 6 = h

W o r d 7 = i

W o r d 8 = s

L R C or H R C

LSB M S B

0 0 1 1 0 1 1 1

1 0 0 1 1 0 0 1

l 0 0 0 0 l 0 l ,

0 0 0 0 0 0 l 0 , , ,

0 0 1 1 0 1 0 1

1 0 0 0 0 0 0 1

1 0 0 l 0 0 0 l

0 0 l 0 0 1 0 l

0 0 l 0 l 0 0 1

VRC = vertical redundancy check.

V R C

1

0

1

1 , ,

0

0

1

1

HRC or LRC = horizontal redundancy check or longitudinal redundancy check.

Example 10.5

The transmitted data is received from a distant transmitter as shown in Table 10.2. In this example the receiver is able to correct the error as the comparison between the VRCs and HRCs yields a logic 1 in only one column and one row. The errored bit is shown emboldened in the table.

Page 208: analog and digital comm techniques pdf

Block check codes 191

Table 10.2 Received data, Example 10.5

Word 1

Word 2

Word 3

Word 4

Word 5

Word 6 . . . . . . . . . . . .

Word 7

Word 8

LSB Bit 1

0

MSB Received Receiver XOR Bi t2 Bi t3 Bi t4 Bit5 Bi t6 Bi t7 Bi t8 VRC VRC

, ,

0 1 1 0 1 1 1 1 1 0

1 0 1 1 1 0 0

1 0 0 0 0 1 0

0 0 0 0 0 0 1 ......

0 0 1 1 0 1 0 , ,

1 0 0 0 0 0 0

1 0 0 1 0 0 0

0 0 1 0 0 1 0 . . . .

0 0 1 0 1 0 0

0 0 0 0 1 0 0

1 0 1 1

1 1 1 0

0 1 1 0 ,,

1 0 0 0

1 0 0 0 ,,

1 1 1 0

1 1 1 0

1 Received H R C

1 Receiver H R C

0 0 1 0 0 0 0 0 XOR

Example 10.6

The transmitted data is received from a distant transmitter as shown in Table 10.3.

In this example there are two separate errors that are in two different columns and

two different rows. As a result the receiver can identify that there are two errors but it cannot uniquely identify which data bits are errored.

Looking at the table, is bit 1 or bit 5 of word 3 errored and is bit 1 or bit 5 of word 7 errored? The system is only able to determine that either bit 1 or bit 5 of word 3 was errored and either bit 1 or bit 5 of word 7 was errored.

Table 10.3

Word 1

Word 2

Word 3

Word 4

Word 5

Word 6 ,,,

Word 7

Word 8 . . . .

Received data, Example 10.6

LSB Bit 1

0 , ,

1

1

0

0

1

0

0

0

1

1

MSB Received Receiver XOR Bi t2 Bi t3 Bi t4 Bit5 Bi t6 Bi t7 Bi t8 VRC VRC

| a . . . . .

0 1 1 0 1 1 1 1 1 0 l |

0 ! 0 1 1 0 0 1 0 0 0

0 0 0 1 1 0 1 1 0 1 , i ! ,

0 0 0 0 0 1 0 1 1 0 ! i

0 1 1 0 1 0 1 0 0 0

0 0 0 0 0 I 0 1 0 0 0 �9 , ! !

0 ! 0 1 0 0 0 1 1 0 1 |

0 ' 1 0 0 1 0 l 1 l 0 | | ,

0 1 0 1 0 0 1

0 0 0 0 0 0 ! t

0 0 0 1 0 0

Received H R C

1 Receiver H R C

0 X O R

Page 209: analog and digital comm techniques pdf

192 Bit error detection and correction

This shows that the system can correct single-bit errors but can only detect

multiple-bit errors and identify the errored words.

Example 10.7

In Table 10.4 the received data has two errors in the same row. As a result the

error is reflected in two columns but because two bits are errored there is no

indication in which row. As a result the receiver is unable to correct these two

errors. Again the system is able to identify the errored rows and is unable to

correct the errored bits.

The same would result if two bits were errored in the same column. In this case

the errors would be indicated in two different rows (words).

Table 10.4

W o r d 1

W o r d 2

W o r d 3

W o r d 4

W o r d 5

W o r d 6

W o r d 7

Word 8

Received data, Example 10.7

LSB

Bit 1 . . . . .

0

1

1

0

0

1

1

0

0

0

0

MSB Received Receiver X O R

B i t 2 B i t 3 B i t 4 B i t 5 B i t 6 B i t 7 B i t8 VRC VRC

0 1 1 0 1 1 1 i 1 1

0 0 1 1 0 0 i 1 0 0 . . . . . . .

0 0 0 0 l 0 1 1 1

0 0 0 0 0 1 1 . . . . . .

0 1 0 1 1 0 1 0 0

0 0 0 0 0 0 1 0 0 �9 |

0 0 1 0 0 0 1 1 ! . .

0 1 0 0 1 0 1 1 1 , �9

0 1 0 1 0 0 1 Received H R C

0 0 1 0 0 0 1 Receiver H R C

0 0 1 1 0 0 0 X O R . . . . . .

10.3.1 Advantages of block check codes

The advantages of block check codes are:

�9 The detection of all single- and multiple-bit errors.

�9 The correction of all single-bit errors.

10.3.2 Disadvantages of block check codes

The disadvantages of block check codes are:

�9 The inability to correct multiple errors that occur in the same row or

column.

Page 210: analog and digital comm techniques pdf

Frame check sequence or cyclic redundancy check 193

�9 The inability to correct multiple errors that occur in different columns and

different rows. �9 The high redundancy for small matrices.

Consider the above examples. In each case an 8-word by 8-bit matrix is used. This

means that the actual data consists of the following:

Start of text = 1 x 8-bit word = 8 bits

Data = 8 • 8-bit word = 64 bits

VRC = 1 x 8-bit word = 8 bits

H R C = 1 x 8-bit word = 8 bits

End of text = 1 x 8-bit word = 8 bits

Total = 96 bits

This gives an efficiency of 66.67% and a redundancy of 33.33%.

10.4 FRAME CHECK SEQUENCE OR CYCLIC REDUNDANCY CHECK

When dealing with live data on a transmission system, which takes place dynami-

cally, there is no time to store the data and then retransmit it. In this case it is more

important to be able to determine whether the data has been errored or not. Not

only must single-bit errors be detected but error bursts as well.

10.4.1 Error bursts

An error burst begins and ends with a bit that is errored; the bits between the erroneous bits may or may not be errored.

The length of the error burst is determined by the following:

�9 The number of bits including the two errored bits.

�9 The number of bits between the last erroneous bit and the first erroneous bit in

the next error burst must be greater than or equal to the number of bits between the two successive erroneous bits.

Example 10.8

Transmitted message = 01 Received message = 01

6-bit error burst

Min. 6 error-free bits 4-bit error burst

Min. 4 error free bits

011101 110110 O1 0110 1100 10 111100 110110 O1 1111 1100 10

Page 211: analog and digital comm techniques pdf

194 Bit error detection and correction

10.4.2 Advantages of cyclic redundancy checks

A generator polynomial of R bits will detect:

�9 All single-bit errors. �9 Most double-bit errors. �9 Most odd numbers of bit errors. �9 All error bursts <R. �9 Most error bursts >R.

The error code that is incorporated into the data stream is called either a frame check sequence (FCS) or cyclic redundancy check (CRC). The placement of the FCS or CRC is incorporated into the frame at the end of the frame, i.e. immedi- ately after the data.

10.4.3 Common cyclic redundancy code polynomials

The generator polynomial is chosen in such a way as to enable the error sequences indicated above to be detected. The generator polynomial is a prime binary number which means that it is only divisible by itself and by 12 without leaving a remainder.

There are three common CRC codes used; these are CRC- 16, CRC-CCITT and CRC-32. The binary representation of the CRC-16 and CRC-CCITT codes is given below.

Weighting 216 215 214 213 212 211 21~ 29 28 27 26 25 24 23 22 21 20

CRC-16 1 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 12 CRC-CCITT 1 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 12

The polynomial representation of the CRC-16, CRC-CCITT and CRC-32 codes is given below.

CRC-16 = X 16 ~ X 15 -I- X 2 -I-- 1

C R C - C C I T T - X 16 -I- X 12 --I- X 5 --1-- 1

CRC-32 = X 32 -~- X 26 -q-- X 23 -~- X 16 -+- X 12 -~- X 11 d- X 10 4- X 8 -+- X 7

-[- X5 -~- X4 d- X2 --~- X-]- 1

10.4.4 Binary prime number

To explain this more fully a generator polynomial G(x) of I 10012 will be used. This code will develop a CRC-4 code and this will be shown later. Is the binary code 110012 only divisible by 12 and by 110012 or not? In other words is 110012 a binary prime number or not? The proof that this number is indeed a binary prime number is shown in Fig. 10.2. The addition that is done at each successive point in the solution is modulo 2 addition. This is simply the XOR of the two bits:

0 X O R 0 = 0 , 0 X O R I = 1 , I X O R 0 : I , 1 X O R 1 - 0

Page 212: analog and digital comm techniques pdf

1 1 0 0 1 r O

1 1 0 0 1 1 1 0 0 1

1 0

1 l O O r 1

1 1 0 0 1 1 0

�9 1 0 1 0

s 0 0

0 0

s 0 1

1 1

l O 0 0 r l l

1 1 0 0 1 1 1

s O 0

O 0

s O 0

O 0

s O 1

O 0

. 1

1 0 0

l l O r O l , ,

1 1 0 0 1 I 0 0

, , , , , ,

s l O 0

1 0 0

s O 0 1

0 0 0

, 0 1

1 0 1 l l l r l l

1 1 0 0 1 1 0 1

s i l O

1 0 1

. i ' l l 1 0 1

. . . . . .

e l l

1 1 0 l O O r O 1

1 i 0 0 1 ~ 1 1 0

, 0 0 0

0 0 0

s 0 0 1

0 0 0

s O 1

1 1 1 l O l r l O

l l O O l 1 1 1

�9 0 1 0 0 0 0

e l O l

1 1 1 . . . . .

, 1 0

1 0 0 0 1 1 r 0 0 1

1 1 0 0 i 1 0 0 0

, 1 0 0 1

1 0 0 0

* 0 0 1

1 0 0 1 l l r O l O

1 1 o o l 1 0 0 1

e l O l l

1 0 0 1

* 0 1 0

1 0 1 0 1 1 r I 1 1

, ,

1 1 0 0 1

1 0 1 0

�9 1 1 0 1

1 0 1 0 , ,

�9 1 1 1

1 0 1 1 l l r l O 0

1 1 0 0 1 1 0 1 1

. l l l i l O l l

* 1 0 0

1 1 0 0 1 0 r 0 0 1

1 1 0 0 1

1 1 0 0

s O 0 0 1

0 0 0 0

* 0 0 1

Fig. 10.2 Proof that 11001 is a prime number (continues)

Page 213: analog and digital comm techniques pdf

196 Bit error detection and correction

1 1 1 0 1 1 0 r 0 1 1

1 1 0 0 1

1 1 0 1

�9 0 0 1 1

0 0 0 0

�9 0 1 1

1 1 0

1 0 r l 0 1

1 1 0 0 1

1 1 1 0

, 0 1 0 1

0 0 0 0

, 1 0 1

1 1 1 1

1 0 r 1 1

1 1 0 0 1

1 1 1 1

�9 0 1 1 1 /

0 0 0 0

s 1 1 1

Fig. 10.2 (Continued)

It is obvious that when the following 5-bit codes are divided into 110012, they will yield a remainder, 100002, 100012, 100102, 100112, 101002, 101012, 101012, 101102, 101112, 110002, 110102, 110112, 111002, 111012, 111102, 111112. The only 5-bit code that will yield a remainder of 0 is 110012.

In the above example it is clear that the code 110012 is a binary prime number. Now the decimal equivalent of 110012 is 2510 which is not a decimal prime number.

10.5 THE CRC PROCESS

At the transmitter the CRC is determined on the whole frame on a bit-by-bit basis. The input binary bit stream is applied to a serial shift register and the division process takes place serially.

At the receiver the received bit stream is again divided on a bit-by-bit basis through a serial shift register. At the end of the frame the resultant CRC should be all zeros. If this is not the case then the data has been errored. The CRC or FCS circuit does not try to correct the errored data.

The circuits and description given below relate to a data stream of only 8 bits and a CRC code of 4 bits. In practice the data streams are much longer.

10.5.1 The CRC generation process at the transmitter

Using the binary notation Assume the generator polynomial G(x) and the input data are as given below:

G ( x ) = 1 1 0 0 1 2

Data = 11100110

Add four zeros to the back of the data stream:

Data = 11100110 0 0 0 0 2

Page 214: analog and digital comm techniques pdf

T h e C R C p r o c e s s

The calculation is shown in Fig. 10.3.

Transmitted data stream = 1110011001102

Using the polynomial notation

Data stream = 111001102

Add four zeros to the back of the data:

Data stream = 11100110 00002

Weighting = x II x l~ x 9 x s x 7 x 6 x 5 x 4 x 3 x 2 x I x ~

Data = 1 1 1 0 0 1 1 0 0 0 0 0 = 1 1 0 0 1 O(x)

Hence

Data = x 11 -~- x 10 + x 9 -+- x 6 -~- x 5

G ( x ) = X 4 + X 3 -f- 1

The calculation is shown in Fig. 10.4.

Remainder = x 2 + x

This equates to 01102

197

1 1 0 0 1

1 0 1 1 0 1 1 0

! l 1 0 0 1 1 0

1 1 0 0 l

�9 0 1 0 1 1

0 0 0 0 0

�9 1 0 1 1 1

1 1 0 0 1

�9 1 1 I 0 0

1 i 0 0 1

�9 0 1 0 I 0

0 0 0 0 0

�9 1 0 1

1 1 0

�9 1 1

1 1

�9 0

0

0 0 0 0

0 0

0 1

0 1 0

0 0 I

0 1 1 0

0 0 0 0

0 1 I 0 = C R C o r F E C

Fig. 10.3 CRC generation using binary notation

CRC circuit The CRC or FEC code can be developed using software or hardware. A typical CRC circuit is shown in Fig. 10.5(a). The circuit works as follows:

Page 215: analog and digital comm techniques pdf

x 7 + x 5 x 4 + x 2 + x

X4 + X 3 + I X II + x l 0 + X 9 + + + X 6 + X 5 + + + + +

X nl + X t~ + + + X 7 +

X 9 + + X 7 + X 6 + X 5

X 9 + X 8 + + + X 5

X 8 + X 7 + X 6 + +

X 8 + X 7 + + + X 4

x 6 + + x 4

x 6 + x 5 + + + x 2

x 5 + x 4 + + x 2

x 5 + x 4 + + + x

X 2 + X

Fig. 10.4 CRC generation using polynomial notation

, Pr--'ol-yno-"-mina-'-i-gener---a-tor a---n-d d,'-7"vider-"circul-'-~ - ~ ] ' Control signal ( C N T L )

(a)

(b)

Transmi t ~ _ ~

c lock circuit LSB PISO

% , , -v-

Parallel data input

Genera tor po lynomina l = 1 + x 3 + x 4 LSB M S B

Genera tor p o l y n o m i n a l - 1 1 0 0 12

M S B Serial

output

Tx Transmit PISO FCS shift register FCS S-R Clk CNTL ILSB MS[ AXORQ3 Qo QJ Q2 B'XORQ2 Q3 B Qo Qt Qz Q3 __.~ , i ,

0 1 0 l 1 0 0 1 l l ' | 0 0 0 l 0 l 0 0 0 0

l l o o i t 0 o t l' o 1 o 0 j o l o t o o 1 2 1 0 0 0 ! 1 0 0 1 ' 1 0 1 0 l 0 1 0.. 1 0 0

3 l 0 0 0 0 1 1 0 0 1 l 0 l 0 l l l 0 1 l

4 l 0 0 0 0 0 ! l 0 0 l l 0 0 0 0 l 1 0 0

5 1 0 0 0 0 0 1 "1 1 0 1 1 o 0 1 0 1 1 0

6 1 0 0 0 0 0 ' 1 I 1 0 1 0 0 l 1 0 1 0

7 I 0 0 0 0 'i0. 0 I I 0 0 0 0 I 'i" 0 0

lnllmilll= . ,, 8 0 0 0 0 0 0 0 1 1 ! 0 0 1 1 0

9 0 0 0 0 1 0 0 l 1 1 : 1 ' 0 0 1 1

l0 0 0 0 1 ! 0 0 0 1 1 ' 1 0 0 1 1

11 0 0 0 1 1 0 0 () 0 _ ~ 1 1 0 0

Transmit ted data s t ream M S B LSB

. ,~ 1 1 1 0 0 1 1 1 0 0 1 1 0

Data C R C or FCS

Fig. 10.5 (a) CRC-4 generator circuit; (b) circuit operation at the transmitter

Page 216: analog and digital comm techniques pdf

The CRC process 199

�9 Initially all the flipflops are reset. �9 The data is loaded into the parallel in serial out (PISO) register. �9 A logic 1 is placed on to the control lead (CNTL). �9 The MSB in the PISO register is applied to the first input of the XOR gate X0.

The Q3 output of FF 3 is applied to the second input of the XOR gate X0. �9 The output of the XOR gate X0 is fed to the first input of XOR gate X~ via the

AND gate enabled by the logic 1 on the CNTL lead. The Q2 output of FF2 is fed to the second input of XOR gate Xl.

�9 The data at the input to each flipflop is clocked through to the Q outputs. �9 Each data bit is passed through to the serial output via the AND & OR com-

binational logic circuit. �9 The complete cycle continues as above for all the data bits in the frame. In this

example an 8-bit data stream has been used. �9 After the last data bit has passed through the data level on the control lead

(CNTL) is made low. �9 The A input to XOR gate X0 is now a permanent logic 0. The input to FF0 as

well as the first input to the XOR gate XI is also a logic 0 as the logic condition on B' is low.

�9 The resultant status of each of the four flipflops is now clocked to the output serial lead via the AND & OR combinational circuitry.

This process is shown in Fig. 10.5(b).

10.5.2 The CRC checking process at the receiver

Using the binary notation

Received data stream = 11100110 01102 (no errors)

The generator polynomial that is used at the receiver must be the same as that used at the transmitter:

6(x) = l lO012

The calculation is shown in Fig. 10.6.

Received data stream = 11100110 01102 (no errors)

Assume the received data is errored (errored bit is emboldened):

Received data stream = 10100101 01102

The calculation is shown in Fig. 10.7. The remainder is not 00002; this informs the receiver that the received data is errored (remember that the errored data is in a frame).

Page 217: analog and digital comm techniques pdf

200 Bit error detection and correction

1 1 0 0 1

1 0 1 1 0 I 1 0

1 1 1 0 0 1 1 0 0 1 I 0

1 1 0 0 1

�9 0 1 0 1 1

0 0 0 0 0

�9 1 0 1 1 1

1 1 0 0 1

�9 1 1 1 0 0

1 1 0 0 1

�9 0 1 0 1 0

0 0 0 0 0

�9 1 0 1 0 1 This indicates tha t

1 1 0 0 1 the received bit

�9 1 1 0 0 1 s t ream is e r ro r free

1 1 0 0 1

�9 0 0 0 0 0

0 0 0 0 0

�9 0 0 0 0 = N o e r r o r s

Fig. 10.6 CRC checking using binary notation

1 1 0 0 1

1 1 0 0 1 1 1 0

1 0 1 0 0 1 0 1 0 1 1 0

1 1 0 0 1

�9 1 1 0 1 1

1 1 0 0 1

�9 0 0 1 0 0

0 0 0 0 0

�9 0 1 0 0 1

0 0 0 0 0

�9 1 0 0 1 0

1 1 0 0 1

�9 1 0 1 1 1 This indicates that

1 1 0 0 1 the received da ta is

�9 1 1 1 0 1 e r rored

1 1 0 0 1

, 0 1 0 0 0

0 0 0 0 0

�9 1 0 0 0 = Er ro r s detec ted

Fig. 10.7 CRC checking - errored data

Using polynomial notation

G(x ) = 110012

R e c e i v e d d a t a = 1110011001102 (no e r ro r s )

G ( x ) = x 4 + X 3 "+" 1

D a t a = x ~ + x ~~ + x 9 + x 6 + x 5 + x 2 + x

Page 218: analog and digital comm techniques pdf

The CRC process 201

x 7 + xS + x4 + x2 + x + 1

x 4 + x 3 + 1 x tn + x l~ + x 9 + + + x 6 + x s + +

x nn + x j~ + + + x 7

X 9 q- + X 7 4- X 6 4" X 5 q-

x 9 + x s + + + x 5

+ x~ + x

+ +x~ + x

x s + x 7 + x 6 + + + + x 2 + x

x s + x 7 + + + x 4

~s + + x4 + + x2 + x x 6 + x s + + + x 2

x s + x 4 + + + x

x 5 + x 4 + + + x

0 0 0

Fig. 10.8 CRC checking using polynomial notation

x 7 + x 6 + x 3 + x 2 + x

X4 4-X 3 q- 1 x nl + + x 9 + + + x 6 + + x 4 + + x 2 + x

x tt + x t~ + + x 7

�9 x l ~ + x 9 + + x 7 + x 6 + + x 4 + + x 2 + x

x n~ + x 9 + x 6

x7 + �9 + =' + + x2 + x x 7 + x 6 + + + x 3

x 6 + + x 4 + x 3 + X 2 + x

x 6 + x s + + + x 2 +

x s + x 4 + x 3 + �9 x

xS + x4 + + + x

�9 �9 X 3 �9

Fig. 10.9 CRC checking - errored data

The calculation is shown in Fig. 10.8. The remainder is zero and hence the received data is error free.

Now assume that the data stream is errored (errored bit shown in bold):

Received data stream = 10100101 01102

The calculation is shown in Fig. 10.9. In this case a non-zero remainder results, 0111; hence this indicates that the received data is errored.

CRC c i rcu i t

A typical CRC checking circuit is shown in Fig. l O.lO(a). The circuit works as follows:

�9 Initially all the flipflops are reset. �9 The serial data stream is clocked into the serial input parallel output ( S I P O )

register. �9 A logic 1 is placed on to the control lead. �9 Each received bit is applied to the first input of the XOR gate X0 on the D1 lead.

The Q3 output of FF3 is applied to the second input of the XOR gate X0 as well as the first input of the XOR gate Xl.

�9 The Q2 output of FF 2 is applied to the second input of the XOR gate Xl.

Page 219: analog and digital comm techniques pdf

202 Bit error detection and correction

Receive ? ' Qo O, Q., ~ ~ ~ ~ O Q data " - "1 ~f SIPO [[

F r o m c l o c k _ _ _ ~ R e c e i v e ~ [ - ~ _ ~ L s B [ ] ] i ] [ [MSD[-----~ ~"J V

extraction ['-I cl~ I-I , , ,' , , ,' , ,

1 4 - ara,,e, Control data output CRC or FEC error

Generator polynominal = 1 + x 3 + x 4

= 1 1 0 0 1 2 (a)

Rx Rx Receive SIP0 S-R Clk data LSB

0 I 0 0 0 0 0 0 0 0 1 1 1 0 0 0 0 0 0 0

2 1 1 1 0 0 0 0 0 0 3 0 ! 1 1 0 0 0 0 0 4 0 0 1 1 1 0 0 0 0 5 1 0 0 1 1 I 0 0 0 6 1 1 0 0 1 1 I 0 0 7 0 1 1 0 0 1 I 1 0

9 1 10 1

11 0 12

FCS shift register FCS S-R MSBBXORD~ Qo Q, 02 BXOR(2., 03 B O0 Q, O., Q.~

1 0 0 0 0 0 0 0 0 0 , ,

1 ! 0 0 0 0 0 1 0 0

1 1 1 0 0 0 0 1 ! 0 , . .

0 I 1 1 1 0 0 1 1 1 1 0 1 1 0 ! I 0 1 I

, . .

1 1 0 1 ! 0 0 1 0 1 . .

0 ! 1 0 ! 1 I ! 1 0 ! 0 1 1 0 ! ! 0 I !

0 1 0 1 1 0 0 1 0 1

, , , , , ,

0 0 0 o I E

. . .

0 [-"

|

o

o,= . . , , .uunnnnnnnunnum n . n n n . n . n n u n n m mnnN=,= ,,,= mmuNNNm ~ N n l n n l n l O N N N I11n'i ' lnri l l ' i ]

(b)

Fig. 10.10 (a) CRC-4 checking circuit; (b) circuit operation at the receiver

�9 The data at the input to each flipflop is clocked through to the Q outputs. �9 The input data bits are clocked into the SIPO register serially and then clocked

out in parallel. The data is also applied to the CRC checking circuit serially. �9 When the last data bit has been applied, the logic level on the control is made

low. �9 The four CRC bits are now applied to the input of the XOR gate Xo serially. �9 The resultant output states of the FFo to FF3 are clocked out into FF4 to

FF7. �9 The Q outputs are ORed together through a combinational logic circuit

consisting of OR gates. �9 If the final output from this combinational circuit is a logic 0 at the end of the

sequence then the received data stream is error free. �9 If, however, the final output of the combinational circuit yields a logic 1 the

received data and/or the CRC is errored.

Page 220: analog and digital comm techniques pdf

Convolutional encoding 203

The procedure discussed above is shown in Fig. 10.10(b) and applies to an 8-bit data stream.

10.6 CONVOLUTIONAL ENCODING

Convolutional encoding is used in systems for the same reasons as differential coding, as discussed in Chapter 4. The difference is that with convolutional decoding errored data is more likely to be corrected than with differential decoding. This method is sometimes referred to as forward error correction as the encoding method actually improves the error performance of the digital system.

The encoding can be represented in the following ways:

�9 Connection pictorial. �9 Connection vectors or polynomials. �9 State and tree diagrams. �9 Trellis diagram.

10.6.1 Connection pictorial

Figure 10.11 (a) shows the circuit for a typical convolutional encoder. Two gener- ator polynomials are used. The first one is gl, which is the polynomial for the top branch:

gl = l l l 2 = 1 - t - x + x 2

The second polynomial, g2, is for the bottom branch:

g 2 - 1012 - 1 4-X 2

Now consider a message vector (m) as follows:

m = 1012 = 1 + X 2

In this encoder there arc three registers; to clear the registers after data has been input, two logic Os must be added to the end of the data stream. This means that for the above message vector the data becomes

m - 101002

Now considering that modulo 2 addition is employed, the following process takes place to produce an output vector U, which consists of ul and u2. When the message vector is shifted into the encoder, the truth table is as shown in Table 10.5. Figure 10.11 (b) shows how this truth table is developed in the encoder circuit.

The circuit operation can be verified as shown below. This shows the multipli- cation of the two words. Remember the following:

Page 221: analog and digital comm techniques pdf

(a)

A b' Serial data [ ~ ~ r ] ut (First code symbol)

input ,~ Input ! ~ ! 2 [ ,t ~F,,..~ Output branch word

]jm,__Tu; (Second code symbol)

(b)

A ~ - t t ~ - l . I = I i ~ i qLY i ~1

Data input-~01OItilllOk~ =. =

r ~ ~ ] ul = 1

Oata,np= h ,.0 ~ ~ _ _ _ ~ u 2 = 0

. Input t ~ u l : O Datainput-'~' [ i0101~ ~ l ~ 1 2 - = 0 0.0

~ U l = l Input

D a t a i n p u t ~ [ [ [ O [ O ~ O a i ! b i ( ~ c , [ & ~ _ 1,0 . 2 - - 0

Data input--)m~ I , i [o~P'-~ %'! ~ 'c,!,%- ' . '

A ^ ~ ~ . = O

Input Data input- .~ ! l I ! ~ ~ O, 0

Fig. 10.11 Convolutional encoder: (a) circuit; (b) development of truth table

a=a'.b'=O0 b=a',b'=lO c=a'.b'=Ol d=a'.h'= l I

Table 10.5 Truth table

Serial input a' b' c' a' b' A c' ul a' c' u2 r U , ,

0 0 l 0 l 0 0 0 0 0 0 0 0 0 0 0 0 0 i . . . . . . . . .

0 0 0 1 0 1 0 0 1 0 l 0 1 1 0 l l l

0 0 0 1 0 1 0 0 l l 0 1 0 0 0 1 0

0 0 0 l 0 l 1 0 1 l 0 l l 0 0 0

0 0 0 1 0 0 1 l 0 l 0 0 0 1 0

0 0 0 l 0 0 0 l l 0 1 l 1 1

0 0 0 0 0 0 0 0 0 0 0 0 0

Page 222: analog and digital comm techniques pdf

Convolutional encoding 205

O x O = O , Ox l = l , 1 x O = O ,

gl(X) .m(x)= 11 12 1 0 1 0 0 2

l l l O 0

0 0 0 0 0 0

1 1 1 0 0 0 0

UI(X ) -- 1 1 0 1 1 0 0

g2(x)" m(x)= 1 0 12

1 0 1 0 0 2

1 0 1 0 0

0 0 0 0 0 0 1 0 1 0 0 0 0

u2(x) = 1 0 0 0 1 0 0

Now Ul (x) and u2(x) yield

u l ( x ) = 1 1 0 1 1 0 0

U2(X)-" 1 0 0 0 1 0 0

U(x) = 1,1 l,O 0,0 1,O 1,1 0,0 0,0

l x l = 1

(modulo 2 addition)

(modulo 2 addition)

10 .6 .2 C o n n e c t i o n vectors or p o l y n o m i a l s

Another method of describing the convolutional operation is by means of poly- nomials. As shown in Section 10.6.1, the following polynomials result:

gl(x) = 1112 = 1 + x + X 2

g 2 ( x ) = 1012 = 1 + + X 2

m(x) = 101002 = x 2 + x 4

Now

This yields

m(x).g l(x) = (x 2 + x4)-(1 + x + x 2)

x2 + x l + 1 X 4 + X 2

x 4 + x 3 + x 2

x 6 + x 5 + x 4

X 6 -+- X 5 + + X 3 + X 2

ul (x) = x 6 + x 5 + x 3 + x 2 (modulo 2 addition)

Page 223: analog and digital comm techniques pdf

206 Bit error detection and correction

Therefore

U l (x ) -- X 6 + X 5 + 0 ~ 4--l--x 3 q-X 2 - + ' 0 . x 1 + 0

This yields

m(x). gz(x) = (x 2 + x4) �9 (1 + x 2)

x2+ 1 X 4 -+- X 2

x 4 + + x 2

X 6 -+- d- X 4

X 6 -}- -!- X 4 d- + X 2

Therefore

U2(X ) -- X 6 + X 4-~-x 2 (modulo 2 addition)

U2(X ) = X 6 - 4 - 0 " x 5 d - 0 " X 4 + 0 " X 3-~-x 2 q - 0 ~ I -~-0

Now Ul (x) and U2(X ) yield

u (x) =

u 2 ( x ) =

X 6 + X 5 -+- 0" X 4 d- X 3 d- X 2 + 0 " X 1 -I- 0

X 6 + 0 . X 5 - 1 - 0 . x 4 + 0 . X 3 + X 2 - - I - 0 - x I -+- 0

U(x) = 1,1 1,0 0,0 1,0 1,1 0,0 0,0

Although this method clearly describes the operation of the encoder, it does not display the operation with respect to time.

10.6.3 State and tree diagrams

Figure 10.12(a) shows a convolutional encoder and Fig. 10.12(b) shows the result- ant state diagram.

Example 10.9

Determine the output code words produced when the data 101002 is applied to the system, using the state diagram given in Fig. 10.12(b).

Solution

Bit = 1234567

Input data = 10100002

Two logic 0 states are added to the back of the data to flush the registers:

Page 224: analog and digital comm techniques pdf

Convolutional encoding 207

(a)

a=a',b'=O'O b = a ' , b ' = l O c=a' ,b '=O I d=a' ,b '= 11

Serial data . ~ ' 1 ~ ] ul (First code symbol)

i n p u t [ Oali, , = 0 b , i 0c], output branch word . ~ ul, u20,0

u 2 (Second code symbol)

(b)

. - . . - " 4 a = 00 ~ Branch .- '" ~ ~ i word

1,1 ..-" 1,1 ," Input - 1 =

o t

," 1,0 e

~ - I n p u t = 0 ........ b = 1 0 ( Input=l ~ c=01 ]

' Encoder ' 0,0

"', Input = 1 Input

o,f"-. 0,,

' , .,' 1,0

Fig. 10.12 Convolutional encoder: (a) circuit; (b) state diagram

Bit 1 = 1"

Bit 2 = 0:

Bit 3 = 1"

Bit 4 = 0:

Bit 5 = 0:

Bit 6 = 0:

Bit 7 = 0:

C o d e w o r d = 1,1:

C o d e w o r d = 1,0:

C o d e w o r d = 0,0:

C o d e w o r d = 1,0:

C o d e w o r d = 1,1:

C o d e w o r d = 0,0:

C o d e w o r d = 0,0:

B r a n c h = a to b

B r a n c h = b to c

B r a n c h = c to b

B r a n c h = b to c

B r a n c h = c to a

B r a n c h = a to a

B r a n c h = a to a

The re fo re :

I n p u t d a t a = 1 0 1 0 0 0 02

O u t p u t code w o r d s = 11 10 00 10 11 00 00

F r o m this s ta te d i a g r a m a t ree d i a g r a m can be d r a w n as s h o w n in Fig. 10.13. N o t e

t ha t a f te r t ime t4 the t ree r epea t s itself.

Page 225: analog and digital comm techniques pdf

208 Bit error detection and correction

!

IIPO

IIPl

Input bit =k"~

Code word branch

O0

Code word branch

O0

Fig. 10.13 Tree diagram

11 Code word

branch

Code word branch

10 ii

* !, b

' 11 ,Code word ' b r a n c h

Code word branch

O0

11 Code word

branch

Code word branch

10

00 ~a

, , {b

lo {c b

Ol lid

II

!c

b

codOkord }d branch

Code word branch

11 1 a ,

c

! ! I Cod or, l

branch

~ a

oo ~aOO

,o ~c o"o ~'d~ '' O, to

oo " a II

~b ,o O0 ol

O, f C '1 oo

io ~d% O0 ~ a b O

I i

,I {b o,'0

I t. oo

ootb o,+d~ ,, +aoo { " Ol C , ~o oo ~b o, Ol , t .~ i !

~d t u o o 10 ,o {d %'

oo ~a0O O0 a ~0

II t b o! lO z , . !1

T t-. O0

11 b ~ o'i o, t d ,o oo

,o El O0 T U o! Ol II

Ol d ,o Id ~ IO

Code word 11 branch 11 a

Ol I c O0 +b Oi Cd,%,

oi i ol i c

I * lO d i C b~ rd , 10 1I d ! , ! ! , |

t3 t4 t5

0o ~ . , ~ T u i l

II ~b o11~

,0 ~c '~

!1 a I i

0o t b ' ~ 01

o, tc" oo

~d o, I0 Jo |

t6

in I!

With respect to the tree diagram note that when a logic 1 is input into the system, the bottom branch is taken; when a logic 0 is input, the upper branch is taken. The tree repeats itself and hence can be used for larger systems than the

example used. When the message vector 101002 is entered then the first 1 causes the lower

branch to be taken giving a branch code word of 1,1. The 0 then causes the upper branch to be taken resulting in a branch code word of 1,0 to be output. The next 1 causes the lower branch to be taken resulting in a branch code word of 00. The next 0 causes the upper branch to be taken producing the branch code word of 10. The next 0 causes the upper branch to be taken producing the

branch code word of 11. To flush the registers a further two logic 0 states must be applied. The first

of these causes the upper branch to be taken, producing a branch code word

Page 226: analog and digital comm techniques pdf

Convolutional encoding 209

of 00. The second causes the upper branch to be taken, producing a branch code word of 00.

Figure 10.13 shows the process when the input data 10100002 is applied. By following the path through the tree diagram the branch code words are as follows:

MSB:

LSB:

Input 1 = 11 ~ Branch a to b Input 0 = 10 ~ Branch b to c

Input 1 = 00 ~ Branch c to b

Input 0 = 10 ~ Branch b to c Input 0 = 11 ~ Branch c to a Input 0 = 00 ~ Branch a to a Input 0 = 00 ~ Branch a to a

Therefore the data stream causes the output branch code words to be produced as shown below:

Input data = 1 0 1 0 0 0 0 2

Code words = 11 10 O0 10 11 O0 O0

The same result was obtained from the methods given in Sections 10.6.1 and 10.6.2. However, this method introduces the element of time into the operation.

10.6.4 The trellis diagram

The trellis diagram is better than the state diagram and tree diagram as it com- bines both of these diagrams into one. Figure 10.14 shows the trellis diagram. The branching for an input logic 1 bit is shown as a dotted line and the branching for an input logic 0 bit is shown as a solid line.

Example 10.10

The input data to a convolutional encoder is 101002. Determine the output code for this encoder.

Solution

To clear the encoder, two zeros must be added to the data. In the example an extra logic 0 has been added. The encoding process is shown in Fig. 10.15.

Input data = 1010000 2

Bit number = 1234567

�9 Bit 1 is a logic 1 and causes the output code to be 11. The path is from a to b. �9 Bit 2 is a logic 0 and causes the output code to be 10. The path is from b to c. �9 Bit 3 is a logic 1 and causes the output code to be 00. The path is from c to b.

Page 227: analog and digital comm techniques pdf

210 Bit error detection and correction

tl t 2 t3 t4 i i

, O0 O0 O0 ,u a = O0 .g�9 ~

�9 , ! '~ �9 11 ' l

�9 i

b = 10IF------ - -

c - 0 1

d = l l

� 9 t

1

1

1

'01 I i

. . 4 - -

1 t i

0 1 ' i

Fig. 10.14 Trel l is d iagram

t5 t6 t7 t8 i i 1 I

O0 O0 ' O0 O0

10 10 10 10 10 I0

[ = input bit 0 . . . . . . . . Input bit ! .... [

00

i

/.-4.'. oo/i

e �9 i

' i e

10!

1 i i 1

1 i t

. . . . . . - ~

lO

�9 Bit 4 is a logic 0 and causes the output code to be 10. The path is from b to c.

�9 Bit 5 is a logic 0 and causes the output code to be 11. The path is from c to a. �9 Bit 6 is a logic 0 and causes the output code to be 00. The path is from a to a.

�9 Bit 7 is a logic 0 and causes the output code to be 00. The path is from a to a.

Output code - 11

Output branching = a - b

10 O0 10 11 O0 O0

b - c c - b b - c c - a a - a a - a

This is the same as the code produced by the state diagram and the tree diagram.

If the code 11 l0 00 10 11 00 002 is received at a receiver then the convolutional decoder will produce the output data as follows:

Output code = 11 10 00 10

Output branching = a - b b - c c - b b - c

Data = 1 0 1 0

11 O0 O0

c - a a - a a - a

0 0 02

The important question is how will the convolutional decoder react when the input data is errored. The decoder has no idea that the data it receives is errored. The errors will only become apparent as the data is applied to the trellis algo-

rithm. In practice this is a computer program.

Page 228: analog and digital comm techniques pdf

Convolutional encoding 211

Transmitter path a - b b - c c - b b--c c - a a - a a--a

Transmitter code 11 10 O0 10 11 O0 O0 Transmitter input data 1 0 1 0 0 0 0

a =O0~

b = IOIID------

c=O1 ~ - - - ~ 4F---

Receiver code 11 10 O0 10 11 O0 O0 Receiver path a - b b--c c - b b - c c - a a--a a - a

Receiver output data 1 0 1 0 0 0 0

Iilll i Illll i

, !

E

- - , - - - - , - - - - - , - - - - 4

d = l l ~ ~ "~ "~ - i i i i i i i ! i i

tl t2 t3 t4 t5

- - - - - e ~ - - - - - e - - - - - - - - -0 , 1

i

~ ~

i |

A A .4= ' v , v v

! ! ! ! ! !

t6 t7 t8

Transmitter input bit = ['X-]

Transmitter code = [ ~ ]

Receiver code =

Received output bit = IX]

Fig. 10.15 T re l l i s d i a g r a m for E x a m p l e 10.10

Example 10.11

The code received by a convolutional decoder is as follows:

C o d e = l l 1000101100002

Symbol no .= 1 2 3 4 5 6 7

Determine the most probable transmitted data that has been errored by the medium.

So/m/on

Taking path 1, the encoding process is shown in Fig. 10.16.

Page 229: analog and digital comm techniques pdf

212 Bit error detection and correction

a = O 0

b = 1 0 0 - - - - -

Transmitter path a - b b - c c -b b - c c -a a -a a -a

Transmitter code 11 10 00 10 11 00 00 +

Errored received code 11 10 00 11 11 00 00 Resultant receiver code !1 10 00 10 11 00 00

Receiver path a - b b - c c -b b - c c--a a -a a -a

Receiver output data 1 0 1 0 0 0 0 Hamming distance 0 0 0 1 0 0 0

Q m CD

m

@3 El | @

-- . ,P--I--+-----*---

Error

| E @ @

c = 0 1 1 ~ - - - - ~

| |

- - - - - - - e - - - - - - - e - - -

d = l l " ! !

tl

i d L A

i i ! | | !

t2 t3 t4

Hamming distance = n ~

Total Hamming distance = 1

Fig. 10.16 Trellis diagram for path 1, Example 10.11

| | ! , | , !

t5 t6 t7 t8

Received code = @

Actual received code =

Receiver output bit = ~ ]

Symbol 1" Branching = a to b

Input code =

Branching code =

H a m m i n g distance =

Symbol 2: Branching = b to c

Input code =

Branching code --

H a m m i n g distance =

11 ll

0

10 lO

0

Output data = 1

Output data - 0

Page 230: analog and digital comm techniques pdf

Convolutional encoding 213

Symbol 3"

Branching = c to b

Input code =

Branching code =

Hamming distance =

O0

O0

0

Output data = 1

Symbol 4:

Branching = b to c

Input code =

Branching code =

Hamming distance =

11

10

1

Output data = 0

Symbol 5:

Branching = c to a

Input code =

Branching code =

Hamming distance =

11

11

0

Output data - 0

Symbol 6: Branching = a to a Input code =

Branching code =

Hamming distance =

O0

O0

0

Output data = 0

Symbol 7: Branching = a to a

Input code =

Branching code =

Hamming distance =

O0

O0

0

Output data = 0

Total Hamming d i s t a n c e - 1

However, this is not the only possible path. There are 16 different paths. Figures

10.17 to 10.31 shows paths 2 to 16 respectively.

Page 231: analog and digital comm techniques pdf

214 Bit error detection and correction

a = O 0

b = 1 0 0 - - - - - -

Transmitter path a-b b -c c -b b -c c-a a--a a -a

Transmitter code 11 10 00 10 11 00 00

Errored received code 11 10 00 11 11 00 00 Resultant receiver code 11 10 00 10 11 00 11

Receiver path a - b b -c c -b b -c c -a a-a a -b

Receiver output data 1 0 1 0 0 0 1 Hamming distance 0 0 0 1 0 0 2

O Ol

Error

| c = 01 ~ - - - - - - O - - - - - -

0 Iiil

I= 1-01 @

Io-1 @

| iil

|

. J = , l - -- -~ ,u (.~ l l l l W l p , q F ,q,,

| i i i i i i i

tl t2 t3 t4

Hamming distance - @

Total Hamming distance - 3

Fig. 10.17 Trellis diagram for path 2, Example 10.11

i i i i i i !

t5 t6 t7 t8

Received code = @

Actual received code -- i

Receiver output bit =

Consider path 2 (Fig. 10.17):

Tx data = 1 0

T x p a t h = a-b b -c Tx code output = 11 10

Rx output data -- 1 0

Rx path - a-b b -c Rx code input = 11 10

Rx code actual = 11 10

Hamming distance - 0 0

Total Hamming d i s t a n c e - 3

1 0 0 0 0 c - b b - c c - a a - a a - a

00 10 11 00 00

1 0 0 0 1

c - b b - c c - a a - a a - b

00 11 11 00 00

00 10 11 00 11 0 1 0 0 2

Page 232: analog and digital comm techniques pdf

Convolutional encoding 215

a = O 0 ~ i

i

i ,E i

,

b - 10~----

c = O l e - - - - - ~

Transmitter path a-b b--c c-b b-c c--a a-a a-a Transmitter code 11 10 00 10 11 00 00

Errored received code 11 10 00 11 11 00 00

Resultant receiver code 11 10 00 10 11 11 10 Receiver path a-b b--c c-b b-c c-a a-b b--c

Receiver output data 1 0 I 0 0 1 0 Hamming distance 0 0 0 1 0 2 1

@ ill

r

Io-7 |

0 _ _ @ ~ . . . _ . @ ~ .

|

Error

__..r

1 ! �9 �9

~ ~ �9 ~

d= 11"# ~ r e �9 �9 e - q=, I I I i | I ! I

I I I I i I

t t 2 t 3 t 4 t 5 t 6 t 7 t 8

Hamming distance = 0

Total Hamming distance = 4

Received code = ( ~ )

Actual received code =

Receiver output bit = ['X-]

Fig. 10.18 Trellis diagram for path 3, Example 10.11

Consider path 3 (Fig. 10.18):

Tx data = 1 0

T x p a t h = a-b b -c Tx code output = 11 10

Rx output data = 1 0

Rx path = a-b b -c Rx code input = 11 10

Rx code actual = 11 10

Hamming distance = 0 0

Total Hamming distance = 4

1 0 0 0 0 c - b b - c c - a a - a a - a

O0 10 11 O0 O0

1 0 0 1 0

c - b b - c c - a a - b b - c

O0 11 11 O0 O0 O0 10 11 11 10

0 1 0 2 1

Page 233: analog and digital comm techniques pdf

216 Bit error detection and correction

a = 0 0 ~

Transmitter path a -b b -c c -b b -c c -a a--a a -a

Transmitter code 11 10 00 10 11 00 00

Errored received code 11 10 00 11 11 00 00 Resultant receiver code 11 10 00 10 I1 11 01

Receiver path a -b b -c c -b b -c c-a a -b b - d

Receiver output data 1 0 1 0 0 I 1 Hamming distance 0 0 0 1 0 2 I

|

0 ,In

El' |

b = 1 0 1 ~ - - - - - -

c = Ol 0 - - - - - - 0 - - - - - -

- - - e - - - - - - - I ~ - -

|

i

Error

I - - - - - - " 0

- - O - - - ----o--.~-

7q 0)

d = l l ~ ! ! !

|

t I t2 t3

Hamming distance = Q

Total Hamming distance = 4

! | i

t 6 t7 t8

Received code = ( ~

Actual received code =

Receiver output bit = V~

Fig. 10.19 Trel l is d i a g r a m for path 4, E x a m p l e 10.11

Consider path 4 (Fig. 10.19):

Tx data -- 1 0

T x p a t h - a-b b -c

Tx code output - 11 10

Rx output data = 1 0

Rx path = a-b b -c Rx code input = 11 10

Rx code actual = 11 10

H a m m i n g distance = 0 0

Total H a m m i n g distance = 4

1 0 0 0 0

c - b b - c c - a a - a a - a

00 10 11 00 00

1 0 0 1 1

c - b b - c c - a a - b b - d

00 11 11 00 00 00 10 11 11 01

0 1 0 2 1

Page 234: analog and digital comm techniques pdf

Convolutional encoding 217

a = 0 0 q

Transmitter path a - b b--c c -b b--c c--a a--a a--a Transmitter code 11 10 00 10 11 00 00

b = 1 0 ~ - - - -

Errored received code Resultant receiver code

Receiver path Receiver output data

Hamming distance

| i } i

I1 10 00 11 11 00 00 11 10 00 10 00 10 11

a-b b--c c--b b--c c -b b-.c c-.a 1 0 I 0 I 0 0

0 0 0 I 2 I 2

! ! i

i - - - - 0 ~ -

Error

[ i

[ [ [

-4

c = O l O~---. .__._..--

i d = l l g

i ! ! i

tl t 2

- - m e . m -

.t J

v ! !

t4

Hamming distance = Q

Total Hamming distance = 6

Fig. 10.20 Trell is diagram for path 5, Example 10.11

~ . . . . [ --.----AI i i ! , , ~ ! ! !

i [ l i i i ! [ i i [ [ i [ ! i : :

i i ' ! ! ] L k - - ' . . . . . - , ' v v ' v

i ! ! ! ! !

ts t6 t7

| i i

[

i i

i [

i A V

! !

t8

Received code = ( ~

Actual received code =

Receiver output bit = [-X']

Consider path 5 (Fig. 10.20):

Tx data = 1 0

T x p a t h = a - b b - c

Tx code output - 11 10

Rx output data = 1 0

Rx path = a - b b - c

Rx code input = 11 10

Rx code actual = 11 10

H a m m i n g distance = 0 0

Tota l H a m m i n g distance = 6

1 0 0 0 0

c - b b - c c - a a - a a - a

00 10 11 00 00

1 0 1 0 0

c - b b - c c - b b - c c - a

00 11 11 00 00 00 10 00 10 11

0 1 2 1 2

Page 235: analog and digital comm techniques pdf

218 Bit error detection and correction

a =001

Transmitter path a-b b -c c -b b -c c -a a-a a-a

Transmitter code II 10 00 10 11 00 00

|

b = 100------ ~

Errored received code Resultant receiver code

Receiver path

Receiver output data

Hamming distance

Q Lm

11 10 00 11 11 00 00

11 10 00 10 00 10 00 a-b b-c c -b b -c c-b b--c c -b

I 0 ! 0 I 0 1

0 0 0 1 2 I 0

m _ _ _ _ ,

Error

c = 011~----- ~

El' @

~ m ~ . . . _ . . m

d = 11,~ |

t l

11=, 11w l w qlW i i i i i i !

t3 t4 t5 t6

Hamming distance = @

Total Hamming distance = 4

Fig. 10.21 Trellis diagram for path 6, Example 10.11

| ~ - - - 4

Received code = @

Actual received code =

Receiver output bit = I-X-]

Consider path 6 (Fig. 10.21):

Tx data = 1 0

T x p a t h -- a-b b -c Tx code output = 11 10

Rx output data = 1 0

Rx path -- a-b b -c Rx code input -- 11 10

Rx code actual --- 11 10

H a m m i n g distance = 0 0

Total H a m m i n g distance = 4

1 0 0 0 0

c - b b - c c -a a - a a - a

O0 10 11 O0 O0

1 0 1 0 1

c -b b - c c -b b - c c - d

O0 11 11 O0 O0 O0 10 O0 10 O0

0 1 2 1 0

Page 236: analog and digital comm techniques pdf

Convolutional encoding 219

a = O 0

Transmitter path a - b b--c c - b b - c c - a a - a a - a

Transmitter code 11 10 00 10 11 00 00 +

Errored received code 11 10 00 11 11 00 00 Resultant receiver code 11 10 00 10 00 01 01

Receiver path a-b b -c c -b b -c c -b b - d d - c

Receiver output data 1 0 I 0 1 1 0 Hamming distance 0 0 0 1 2 1 1

b = 10 . ~ - - - - - l [

i | i |

c =01 ~ - - - ~ ~ - - - ~ ~

~ ~

,

,

~

~

~

. - - ~ - - - - - -

Error

d = l l

- - O - - . '~ - - - 4 1 - -

(D (D

i i ! i i ! i i I ! l ! i i I I

tl t2 t3 t4 t5 t6 t7 t8

Hamming distance = Q

Total Hamming distance = 5

Received code = ( ~

Actual received code =

Receiver output bit =

Fig. 10.22 Trellis diagram for path 7, Example 10.11

Consider path 7 (Fig. 10.22):

Tx data = 1 0 T x p a t h = a - b b - c

Tx code output = 11 10

Rx output data = 1 0 Rx path = a - b b - c

Rx code input = 11 10 Rx code actual = 11 10 Hamming distance = 0 0 Total Hamming distance = 5

1 0 0 0 0

c - b b - c c - a a - a a - a

00 10 11 00 00

1 0 1 1 0 c - b b - c c - b b - d d - c

00 11 11 00 00 00 10 00 01 01

0 1 2 1 1

Page 237: analog and digital comm techniques pdf

220 Bit error detection and correction

a = 0 0 1

Transmitter path a - b b - c c - b b - c c - a a - a a - a

Transmitter code 11 10 00 10 11 00 00

Errored received code !1 10 00 11 11 00 00

Resultant receiver code 11 10 00 10 00 01 I0

Receiver path a - b b--c c - b b - c c - b b - d d - d

Receiver output data 1 0 1 0 I 1 ! Hamming distance 0 0 0 1 2 1 !

|

b = lOaF----

(E)

Error

____, ~ _ . _ . . ,

| c = 010~----- ~ 4~--- - ~

d = l l a, ~- a~ a, z~ I i i i i i i i i i i I i i i i

tl t2 t3 t4 t5 t6 t7 t 8

Hamming distance = n ~

Total Hamming distance = 5

Received code = ( ~

Actual received code =

Receiver output bit = ['X-]

Fig. 10.23 Trellis diagram for path 8, Example 10.11

Consider path 8 (Fig. 10.23):

Tx data = 1 0

T x p a t h = a-b b -c

Tx code output = 11 10

Rx output data = 1 0

Rx path = a-b b -c

Rx code input = 11 10

Rx code actual = 11 10

Hamming distance = 0 0

Total Hamming distance = 5

1 0 0 0 0

c-b b -c c -a a -a a -a

O0 10 11 O0 O0

1 0 1 1 1 c-b b -c c-b b - d d - d

O0 11 11 O0 O0

O0 10 O0 O1 10

0 1 2 1 1

Page 238: analog and digital comm techniques pdf

Convolutional encoding 221

a = O0,- i

irn"

b = 1 0 ~ - - - - ~ $

Transmitter path a - b b - c c -b b - c c -a a - a a--a

Transmitter code I 1 10 00 10 11 00 00

r Errored received code 11 10 00 11 II 00 00

Resultant receiver code 11 10 00 01 01 11 00 Receiver path a - b b - c c - b b - d d - c c -a a - a

Receiver output data I 0 1 1 0 0 0 Hamming distance 0 0 0 1 I 2 0

(E) i |

m

| c = 0 1 0 - - - - - ~ ~ - - - - - ~

Error

| U |

i i

m i @

m - - - - - e - - - ~ , ~ e _ . . .

lZl |

d = l l ~ : : : tl t2 t 3

Hamming distance = @

Total Hamming distance = 4

I-el |

Fig. 10.24 T re l l i s d i a g r a m for path 9, E x a m p l e 10.11

i i i i i i ! ! !

t4 t5 t6 t7 t8

Received code -- ( ~

Actual received code =

Receiver output bit =

Consider path 9 (Fig. 10.24):

Tx data = 1 0

T x p a t h = a - b b - c

Tx code output = 11 10

Rx output data = 1 0

Rx path = a - b b - c

Rx code input = 11 10

Rx code actual = 11 10 H a m m i n g distance = 0 0

Total H a m m i n g distance = 4

1 0 0 0 0 c - b b - c c - a a - a a - a

00 10 11 00 00

1 1 0 0 0

c - b b - d d - c c - a a - a

O0 11 11 O0 O0 O0 O1 O1 II O0

0 1 1 2 0

Page 239: analog and digital comm techniques pdf

222 Bit error detection and correction

a =O0

b = l O ~ - - - - - - ~

Transmitter path a-b b-c c-b b-c c-a a--a a -a

Transmitter code 11 10 00 10 11 00 00

Errored received code 11 10 00 11 11 00 00 Resultant receiver code 11 10 00 01 01 11 11

Receiver path a-b b-c c-b b -d d-c c-a a -b

Receiver output data 1 0 1 1 0 0 1 Hamming distance 0 0 0 1 1 2 2

@ iU

- - - , - - - - - o - - t - - , - - - - -

Error

m

| c = 0 1 e----- ~ O----- ~ _ ~ $_..._ ~ ~ - - - - - _

@ |

O

d = l l ~ ! ! ! ! |

tl t2 t3

Hamming distance - Q

Total Hamming distance = 6

I-0-1 0

Fig. 10.25 Trellis diagram for path 10, Example 10.11

i i I ! !

t4 t5 t6 t7 t8

Received code = ( ~

Actual received code =

Receiver output bit = [X- l

Consider path 10 (Fig. 10.25):

Tx data = 1 0

T x p a t h = a-b b-c

Tx code output = 11 10

Rx output data = 1 0

R x p a t h = a-b b-c

Rx code input = 11 10

Rx code actual = 11 10

Hamming distance = 0 0

Total Hamming distance = 6

1 0 0 0

c-b b-c c-a a -a

00 10 11 00

1 1 0 0 c-b b - d d-c c -a

00 11 11 00

00 01 01 11

0 1 1 2

0 a - a

O0

1 a-b

O0

11

2

Page 240: analog and digital comm techniques pdf

Convolutional encoding 223

a=O0

b = 10l~---- ~

i

[ !

[

c = O I ~ - - - - ~

Transmitter path a-b b--c c-b b-c c-a a--a a-a

Transmitter code 11 10 00 10 11 00 00

Errored received code 11 10 00 11 il 00 00 Resultant receiver code 11 10 00 01 01 00 10

Receiver path a-b b-c c-b b -d d--c c -b b--c

Receiver output data I 0 I I 0 1 0 Hamming distance 0 0 0 1 1 0 1

Error

@ Im

ok

~ , _ _ . . _ . _ , _ _

- ~ l~-- - = , ~ 1 ~ - - -

iW ,Ira

. . . . - ~ n ~

m |

d = l l ~

tl t2 t 3

Hamming distance = @

Total Hamming distance = 3

I-0-1 |

Fig. 10.26 Trellis diagram for path 11, Example 10.11

! ! ! i ! ! ! !

t4 t5 t6 t 7 t8

Received code = ( ~

Actual received code =

Receiver output bit = [ ~

Consider path 11 (Fig. 10.26):

Tx data = 1 0

T x p a t h = a - b b - c

Tx code output = 11 10

Rx output data = 1 0

Rx path = a - b b - c

Rx code input = 11 10

Rx code actual = 11 10

H a m m i n g distance = 0 0 Total H a m m i n g distance = 3

1 0 0 0 0

c-b b - c c -a a -a a -a

O0 10 11 O0 O0

1 1 0 1 0

c -b b - d d - c c -b b -c

O0 11 11 O0 O0 00 01 01 00 10

0 1 1 0 1

Page 241: analog and digital comm techniques pdf

224 Bit error detection and correction

a = 0 0

b = 1011~------

Transmitter path a-b b-c c-b b-c c-a a-a a-a

Transmitter code 11 10 00 10 I! 00 00

Errored received code 11 10 00 11 I1 00 00 Resultant receiver code 11 10 00 01 01 00 10

Receiver path a-b b-c c-b b-d d-c c-b b-d

Receiver output data I 0 1 I 0 I 1 Hamming distance 0 0 0 1 ! 0 1

Q

_ ~~________ ,~

Error

m _ _ . _ _ ,

c = 0 1 0 - - - - - ~

- ~

@

d = l l ~ | ! !

t l t 2 13

Hamming distance = @

Total Hamming distance = 3

- ~ ~ - - - ~ I ~ - - - - -

@ | @

roll

m @

! | ! | |

t4 f5 t6 t7 t8

Received code = @

Actual received code = k ~

Receiver output bit =

Fig. 10.27 Trellis diagram for path 12, Example 10.11

Consider pa th 12 (Fig. 10.27)"

Tx da ta = 1 0

Tx pa th - a - b b -c

Tx code ou tpu t - 11 10

Rx ou tpu t da ta -- 1 0

Rx pa th --- a-b b - c

Rx code input = 11 10

Rx code actual = 11 10

H a m m i n g distance = 0 0

Tota l H a m m i n g distance = 3

1 0 0 0 0

c -b b - c c -a a - a a - a

O0 10 11 O0 O0

1 1 0 1 1

c -b b - d d - c c -b b - d

O0 11 11 O0 O0

O0 O1 O1 O0 O1

0 1 1 0 1

Page 242: analog and digital comm techniques pdf

Convolutional encoding 225

Transmitter path a - b b - c c - b b - c c - a a - a a - a Transmitter code 11 10 O0 10 11 00 00

Error

Errored received code II l0 00 II II 00 00 Resultant receiver code II l0 00 01 l0 01 II

Receiver path a - b b - c c - b b--d d - d d - c c - a Receiver output data 1 0 1 1 1 0 0

Hamming distance 0 0 0 l l 1 2

a = O 0 ~ ~, , ~, , , ~, ~,

) | ) ) J ) J ) i m l i ~ j ~ i | )rn ) i ) i j i m i i i i i i i i i

b= ,o ~ - i - - - - ~ - - - - * - - - - - *

) ! | 1 7 4 ! i ) i ) ) u ) u ) i )~~

j ) ) ) ! ! | ! i i ) i

~ = o , ~ - - - + - - - - - ) , --+----&=--- -----+~ i ) j ) i i | i i i ) ) ) 0\) Fi-l i /l-o-l) ) i i i i !| ) ,_,l[ i 1 2 Nu T T T T T T T T tl t2 t 3 t4 t5 t6 t7 t8

Hamming distance = Q Received code = ( ~ 1

Total Hamming distance = 5 Actual received code =

Receiver output bit =

Fig. 10.28 Trellis diagram for path 13, Example 10.11

Consider path 13 (Fig. 10.28)"

Tx data = 1 0 1 0 0 0

T x p a t h = a-b b-c c-b b-c c-a a-a

Tx code output = 11 10 00 10 11 00

Rx output data - 1 0 1 1 1 0 Rx path = a-b b-c c-b b -d d -d d-c Rx code input = 11 10 00 11 11 00

Rx code actual = 11 10 00 01 10 01

Hamming distance = 0 0 0 1 1 1 Total Hamming distance = 5

0 a - a

O0

0 c - a

O0 11

2

Page 243: analog and digital comm techniques pdf

226 Bit error detection and correction

a = 0 0

Transmitter path a-b b-c c-b b-c c--a a-a a-a

Transmitter code 11 10 00 10 11 00 00

Errored received code 11 10 00 11 11 00 00 Resultant receiver code 11 10 00 01 10 01 00

Receiver path a-b b-c c-b b-d d-d d-c c-b

Receiver output data ! 0 I I 1 0 1 Hamming distance 0 0 0 1 1 1 0

| b = 10q[~------- -- Ib---

@ El

| c = 0 1 l------ 4~-----

.__,---_ ~--- ~---

|

-----0--- --I-----~-----

@ | (!) N

| (i) : N :

d = l l

Error

/ | - - - " " - - - ' O

! o i 0 | i i o

t I t2 t3 t4 t5 t6 17 t8

Hamming distance = @

Total Hamming distance = 3

Received code = @

Actual received code = I

Receiver output bit =

Fig. 10.29 Trellis diagram for path 14, Example 10.11

Consider path 14 (Fig. 10.29):

Tx data = 1 0

Tx path = a-b b -c

Tx code output = 11 10

Rx output data = 1 0

Rx path --- a-b b -c Rx code input = 11 10

Rx code actual = 11 10

H a m m i n g distance = 0 0

Total Hamming distance = 3

1 0 0 0

c-b b -c c -a a -a

O0 10 11 O0

1 1 1 0 c-b b - d d - d d -c O0 11 11 O0

O0 Ol 10 O1

0 1 1 1

0 a - - a

O0

1

c -b

O0 O0

0

Page 244: analog and digital comm techniques pdf

Convolutional encoding 227

Transmitter path a--b b -c c -b b -c c--a a--a a - a

Transmitter code 11 10 00 10 11 00 00 . . . . . .

Errored received code 11 10 00 11 11 00 00

Resultant receiver code 11 10 00 01 10 10 01 Receiver path a-b b--c c-b b-d d--d d--d d-c

Receiver output data i 0 1 1 1 I 0 Hamming distance 0 0 0 1 1 1 1

A a - - 0 0 ....... " - - - " " " " " " . !

i I

! !

i ' i

i i !

| c = O l O - - - - ~ ~ - - - - ~

d = l l

Error

A

v

. . _ _ ~ . _ . . _ _ , ~ . --..~ ~ . _ . . . ~

~ e ~ - - ~ ~ 0 - - - - - - - ~ - - - - - - - - 0 - - - - - -

| |

| III

F1 |

|

| m

|

I i i i i i i i i ! i ! i i i !

tl t2 t3 t4 t5 t6 t7 t8

Hamming distance = O

Total Hamming distance = 4

Received code = ( ~

Actual received code =

Receiver output bit =

Fig. 10.30 Trellis diagram for path 15, Example 10.11

Consider path 15 (Fig. 10.30):

Tx data = 1 0

T x p a t h = a - b b - c

Tx code output = 11 10

Rx output data = 1 0 Rx path = a - b b - c

Rx code input = 11 10 Rx code actual = 11 10 Harnn,Jng distance = 0 0 Total H a m m i n g distance = 4

1 0 0 0 0

c - b b - c c - a a - a a - a

O0 10 11 O0 O0

1 1 1 1 0 c - b b - d d - d d - d d - c

O0 11 11 O0 O0 O0 O1 10 10 O1

0 1 1 1 1

Page 245: analog and digital comm techniques pdf

228 Bit error detection and correction

Transmitter path a-b b -c c -b b -c c-a a--a a - a

Transmitter code 11 10 00 l0 11 00 O0

Er ro red received code 11 10 130 11 11 O0 O0

Resul tant rece iver code 11 10 O0 01 10 10 10 Rece iver path a-b b-c c-b b-d d-d d-d d-d

Receiver output data 1 0 1 1 1 I I Hamming distance 0 0 0 ! i 1 1

a= 00i! [.i_](~ii ~ ..... �9 �9 �9

b= 10 ,~~)i- - - ~ - - ~ ) ~ - - - ~ - - - - - - - ~ _ _

c=010---- - - - -ql~--- - - - t n l ~ - - - o - . - - s , - - o . ~ - - - q

d = l l ~

tl t 2 t 3

Hamming distance = @

Total Hamming distance = 4

@ @

Error

| W

~ _ - - - , ~._.__~

~ - - - - - - O ~ - ----4

@

|

@ FF

Eli i ! i ! i

t4 t5 t6 t7 t 8

Received code = ( ~ Actual received code = I

Receiver output bit =

Fig. 10.31 Trellis diagram for path 16, Example 10.11

Consider path 16 (Fig. 10.31):

Tx data = 1 0 1 0 0 0 0

Tx path = a -b b - c c -b b -c c -a a - a a - a

Tx code output = 11 10 00 10 11 00 00

Rx output data = 1 0 1 1 1 1 1

R x p a t h = a -b b -c c -b b - d d - d d - d d - d

Rx code input = 11 10 00 11 11 00 00 Rx code actual = 11 10 00 01 10 10 10 Hamming distance = 0 0 0 1 1 1 1 Total Hamming distance = 4

As can be seen from the above there is only one correct path, which is path 1. This path yields a total Hamming distance of 1 whereas all the other paths yield a total

Page 246: analog and digital comm techniques pdf

Convolutional encoding 229

Table 10.6 Hamming distance results for paths 1 to 16

Transmitted code

II lO00 10 II 0000

Received code

II lO O0 II 11 O0 O0

Path number Receiver codes

Tx data

101 0000

O/P data Hamming distance

1 11 I0 00 10 11 00 00 ' 101 0000 1

11 10 00 10 11 00 11 101 0001 3

3 ! 11 10 00 10 11 11 10 101 0010 4

4 J 11 10 00 10 11 11 01 101 0011 4 i ! ,, ,

5 11 10 00 10 00 10 11 101 0100

6 II l0 00 l0 00 l0 00 101 0101 4

7 i II l0 00 l0 00 01 01 101 0110 5

II l0 00 l0 00 01 l0 101 0Ill 5

II l0 00 01 0111 00 101 1000 4

l0 II l0 00 01 0111 II 101 1001 6

ll ll l0 00 01 01 00 l0 101 1010 ' 3 i ! !

12 II l0 00 01 01 00 01 101 1011 3 !

13 11 10 00 01 10 01 11 101 1100 5

14 ll l0 00 01 l0 01 II 101 ll01 5 i i i ,

15 II l0 00 01 l0 l0 0l l 10l I l l0 4 ! i I

16 l l l0 00 01 l0 l0 l0 101 l l l l 4

Hamming distance greater than 1. In practice the path that yields the lowest

Hamming distance is the preferred path and the data that results due to that path is the data that is output by the receiver.

From the above it is also clear that the receiver will determine the total

Hamming distance for all the code combinations. In the above example the

first three codes, 11 l0 00, due to the first three data, 1012, are the same; however,

the next received code is errored and hence the last four codes, 11 11 00 00, will

cause the receiver to examine all the paths for the output data 00002 to 11112. Therefore there are 16 different paths that must be examined.

The results are shown in Table 10.6.

Figure 10.32 shows all the 16 possible paths for Example 10.11. In practice, if there are two paths that yield the same Hamming distance due to received data that is errored then the path that is closest to a is chosen as the correct path.

This coding method is very powerful as it can correct errors through the decoder and as a result is often referred to as forward error correction.

Page 247: analog and digital comm techniques pdf

230 Bit error detection and correction

t! t 2 t 3 t 4 t 5

a = 0 0 �9 �9 �9 �9

b = l O 0 �9 �9

c = 0 1 �9 �9 �9

t6 t7 t8 ,, ,, ,,

@

d = l l o �9 �9 �9

Fig. 10.32 Trellis diagram for all 16 paths, Example 10.11

10.7 REVIEW QUESTIONS

10.1 State the disadvantages of using a single parity bit for the detection of errors at a receiver.

10.2 Determine the asynchronous serial output data stream for the ASCII character P, where one start bit, a parity bit and two stop bits are used.

10.3 Code each ASCII character in the word 'Goal' for transmission over an asynchronous link where one start bit, a parity bit and a single stop bit is employed.

10.4 Describe the disadvantages of using block check codes for error detection and correction.

10.5 Determine the CRC-4 word for the following 8-bit data stream. The genera- tor polynomial is 1916.

Data = C A16

10.6 The following data stream is received by a circuit that employs CRC-4. Determine whether the data is error free or not.

Received data = 101100101112

10.7 Determine the coding for the following data stream that is input to a trans- mitter that employs trellis coding:

Data - 0110 2

Page 248: analog and digital comm techniques pdf

11 Line and interface coding

For mankind to respond in situations the available information must enable rational and logical decisions to be made.

11.1 INTRODUCTION

Interface coding and line coding is the subject of this chapter. All digital trans- mission systems must transmit the data in such a way that the clock frequency can be extracted from the received signal. This prevents having to supply a separate path for the clock frequency.

Some codes are designed to be transmitted as frequency-modulated signals, while others are designed to be conveyed over metallic pairs. All the codes have advantages and disadvantages. In practice the code that is best suited to the application is chosen.

There are numerous different transmission codes; only a few have been selected and are described here.

11.2 REQUIREMENTS OF LINE AND INTERFACE CODES

Interface codes are used when data at the output of one piece of equipment must be connected to the input of another piece, where the two pieces of equipment could be up to 100m apart. As will be shown later, ordinary binary data cannot be used and as a result the data must be changed into some other format.

Line codes are used when the data is transmitted down some medium to a distant receiver. In this case the distance between the transmitter and the receiver could vary quite considerably, from a few kilometres, as used on cable systems, to thousands of kilometres, as with satellite systems.

For a code to be used as an interface code or line code, the requirements that the code must satisfy are dependent on the type of medium and the format of the data transmission. However, some general requirements are:

Page 249: analog and digital comm techniques pdf

232 Line and interface coding

�9 D.c. component. For transmission lines, the d.c. component should be removed to enable correct detection of the individual bits at the receiver. The elimination of the d.c. component also enables a.c. coupling to take place. By eliminating the varying d.c., the resultant low frequency is eliminated which could other- wise affect adjacent pairs through crosstalk.

�9 Self-clocking. Symbol or bit synchronisation is required for digital communica- tion. In many applications the original clock frequency must be extracted from the incoming signal. Hence the incoming signal must have the clock frequency embedded in it for all bit stream sequences.

�9 Error detection. Some schemes have the means of detecting data errors without introducing additional error detection bits into the data sequence.

�9 Bandwidth compression. Some schemes increase the efficiency of the available bandwidth by enabling more information to be conveyed when compared to other schemes using the same type of medium.

�9 Noise immunity. Some schemes display a lower bit error rate than others even when they are transmitted over similar media having similar signal-to-noise ratios.

All the different types of interface codes and line codes can be categorised under one of the following:

�9 Non-return to zero (NRZ). �9 Return to zero (RZ). �9 Phase encoded. �9 Pulse modulation.

11.3 NON-RETURN TO ZERO CODES

These are the most commonly used codes, and can be partitioned into the follow- ing subgroups:

�9 NRZ-L (L for level). �9 NRZ-S (S for space). �9 NRZ-M (M for mark).

All these codes are shown in Fig. 11.1.

11.3 .1 N o n - r e t u r n to zero - level ( N R Z - L )

This code is widely used in digital logic circuits. It is often referred to as NRZ data and is shown in Fig. 11.1 (a).

Coding Logic 1 = No transitions during the bit period.

Remains high for the duration of the bit period

Page 250: analog and digital comm techniques pdf

Non-return to zero codes 233

(a) NRZ-L

I 1 I 0 1 0 1 0 1 I I 1 I 0 1 1 I 0 1

I I I I I I I I I I I I I I I I I I I

§ i i ' i ! I O I I I I I I I I I I I I I I I I I I I

(b) NRT_,-S

I I I I I I I I I I I I I I I I I I I

§ i i i I i O I I I I I I I I I I I I I I I I I I I

(c) NRZ-M

I I I I I I I I I I I I I I I I I I I

i " § ' ' ' ! ' I , , 0 "

I I I I I I I I I I I I I I I I I I I

(d) URZ I I I I I I I I I I I I I I I I I I I

+

or7 , , r -L l - ] , r ] I I I I I I I I I I I I I I I I I I I

I I I I I I I I I I I I I I I I I I I 4-

~o>~ oFL r L F L F L .~ I I I I I I I I I I I I I I I I I I I

I : I : I : I : I : I : I : I : I : I

~rl i_~ LI ( f ) A M I 0 I t 1. I ,,, I J

I : I : I : I I I : I : I : I : I : I

F ig . 11.1 N o n - r e t u r n t o z e r o c o d e s

Logic 0 = No transitions during the bit period. Remains low for the duration of the bit period

The logic state only changes when the following logic state is different to the preceding logic state.

Disadvantages �9 High d.c. component. �9 Loss of clock for long strings of logic I s and logic 0s.

If this code is used to transfer data from one circuit to another then a separate lead carrying the clock signal must also be used to enable the data to be correctly clocked in the second circuit.

If a long string consisting of, predominantly, logic 0 states or logic 1 states is transmitted then the frequency content drops towards 0 Hz. Also if there are a large number of logic 1 states in the bit stream then the average d.c. rises towards the voltage of the logic 1 state.

Page 251: analog and digital comm techniques pdf

234 Line and interface coding

11.3.2 Non-return to zero - space ( N R Z - S )

This code is shown in Fig. 11. l(b).

Coding

Logic 1 - N o transitions during the bit period. There is no change in level from the previous state for the duration of the bit period

Logic 0 = Single transition at the beginning of the bit period. If the previous state was low then the transition is from low to high. If the previous state was high then the transition is from high to low

Every time a logic 0 appears in the bit stream the logic level changes. A logic 1 causes no change in the logic state.

Disadvantages �9 High d.c. component. �9 Loss of clock for long strings of logic l s.

In this case if the input bit stream consists of a long string of logic 1 states then the frequency content drops towards 0 Hz. The d.c. content can either drop towards 0 V, if the previous state was at 0 V prior to the first logic 1 in the sequence, or the d.c. content can rise towards the voltage of a logic l, if the previous state was at a positive voltage prior to the first logic 1 in the sequence. However, if the input bit stream consists of a large number of logic 0 states then the output bit stream becomes almost a 1010102 sequence which has a fundamental frequency and har- monic frequencies.

11.3.3 Non-return to zero - mark ( N R Z - M )

This is often referred to as differential coding. It is sometimes referred to as non- return to zero - inverted (NRZ-I). This code is shown in Fig. 11.1 (c).

Coding

Logic 1 --Single transition at the beginning of the bit period. If the previous state was low then the transition is from low to high. If the previous state was high then the transition is from high to low

Logic 0 - No transitions during the bit period. There is no change in level from the previous state for the duration of the bit period

Every time a logic 1 appears in the bit stream the logic level changes. A logic 0 causes no change in the logic state.

Page 252: analog and digital comm techniques pdf

Return to zero (RZ) 235

Disadvantages �9 High d.c. component. �9 Loss of clock for long strings of logic 0s.

In this case if the input bit stream consists of a long string of logic 0 states then the frequency content drops towards 0 Hz and the d.c. content can either drop towards 0 V or rise towards the voltage of a logic 1. However, if the input bit stream consists of a large number of logic 1 states then the output bit stream becomes almost a 1010102 sequence which has a fundamental frequency and harmonic frequencies.

11.4 RETURN TO ZERO (RZ)

This code can be subdivided into the following subgroups.

�9 Unipolar return to zero (URZ). �9 Polar return to zero (PRZ). �9 Return to zero - alternate mark inversion (RZ-AMI). �9 High-density bipolar format n (HDB-n).

These codes find applications in digital baseband transmission and magnetic recording. They are shown in Fig. l l. 1.

11.4.1 Unipolar return to zero (URZ)

This code is shown in Fig. 11.1 (d).

Coding Logic 1 = Two transitions during the bit period.

The first transition is from a low to a high at the beginning of the bit period. The second transition is from a high to low halfway through the bit period

Logic 0 = No transitions during the bit period. The state remains low for the duration of the bit period

An input logic 1 causes the output to remain at a logic 1 for the first half of the bit period and return to a logic 0 for the second half of the bit period. The code has a 50% duty cycle for the logic 1 states.

Disadvantages �9 Reduced d.c. component. �9 Twice the bandwidth of NRZ codes.

Because the high states in the output bit stream have a shorter duration than that of the full bit period, the average d.c. is reduced. This reduction in the time period of the output high durations causes the fundamental frequency to be doubled relative to an NRZ-L data stream.

Page 253: analog and digital comm techniques pdf

236 Line and interface coding

11.4.2 Polar return to zero (PRZ)

This code is shown in Fig. 11.1 (e).

Coding Logic 1 = Two transitions during the bit period.

The first transition is from 0 V to a positive voltage at the beginning of the bit period. The second transition is from a positive voltage to 0 V halfway through the bit period

Logic 0 = Two transitions during the bit period. The first transition is from 0 V to a negative voltage at the beginning of the bit period. The second transition is from a negative voltage to 0 V halfway through the bit period

This code is referred to as a bipolar code or ternary code as there are three distinct voltages, i.e. a positive voltage, zero volts or earth potential and a negative vol- tage. The code has a 50% duty cycle for the logic 0 and logic 1 states.

Disadvantage �9 Reduced d.c. component.

Advantage �9 Clock frequency is embedded in the code for all bit sequences.

If the input bit stream consists of a long string of logic 1 states then only positive- going pulses will be produced, whereas if the input bit stream consists of a long string of logic 0 states then the output would consist of only negative-going pulses. As a result the average d.c. would either rise to a positive voltage or drop to a negative voltage respectively. Because of the reduction in the length of the pulse the average d.c. is reduced.

11.4.3 Return to zero - alternate mark inversion (RZ-AMI)

This code is usually referred to simply as alternate mark inversion or AMI. This code is shown in Fig. 11. l(f).

Coding Logic 1 = Two transitions during the bit period.

The first transition is from 0 V to either a positive or negative voltage at the beginning of the bit period. The second transition is from the positive or negative voltage to 0 V halfway through the bit period

Logic 0 = No transitions during the bit period. The output remains a low for the duration of the bit period

Page 254: analog and digital comm techniques pdf

Return to zero (RZ) 237

The first logic 1 (mark) in the input bit stream will cause a positive voltage output pulse, the second will cause the output pulse to go negative, and so forth. In other words each successive mark causes the output pulse to be in the opposite polarity to the previous mark. The code has a 50% duty cycle for the logic 1 states.

Disadvantage �9 Loss of clock for long strings of logic Os.

Advantages �9 No d.c. component. �9 Same bandwidth as the NRZ codes.

Because the output pulses are alternately positive and negative, the average d.c. remains very close to 0 V for a succession of logic 1 states at the input. Also because of the alternating nature of the signal the bandwidth is similar to that of NRZ-L data streams.

11.4.4 High-density bipolar format - n code (HDB-n)

This code is a derivative of RZ-AMI described in Section 11.4.3. Each successive mark reverses the output polarity of the RZ mark so that the resultant bit stream consists of pulses following an alternating polarity sequence.

For the 30/32-channel CEPT PCM system the CCITT recommendation is the HDB-3 code. The '3' indicates that the maximum number of consecutive logic 0 states may not exceed three. When there are more than three logic 0 states, a violation bit must be used. Sometimes it is also necessary to use a parity bit in order to cause the violation bit to assume the correct polarity. The term violation means 'break the alternate mark inversion law'.

The CCITT recommendation for line coding on a PCM system consists of the following codes:

�9 Alternate digit inversion (ADI). �9 Return to zero (RZ). �9 High density bipolar format 3 (HDB-3).

Coding

Alternate digit inversion (ADI) Each sample on each of the 30 speech channels is quantised and encoded into an 8-bit word. The structure of the 8-bit word is such that bit I represents the polarity and bits 2 to 8 indicate the amplitude of the sample. This coding is shown in Fig. 11.2.

Odd bits (1, 3, 5, 7):

Logic 1 = Logic 1 for the full bit period Logic 0 = Logic 0 for the full bit period

Page 255: analog and digital comm techniques pdf

238 Line and interface coding

I ! ! I !1 , , , ! i r - , , , �9 , , , , , , , , , , ,

I ! I I I I I ! ! l I ! ! ! l ! l l

B i t n o . ' 1 3 ' 4 ' 5 6 ' 7 ' 8 ' , 1 ' 2 3 ' 4 ' 5 ' 6 ' 7 , 8 ' 1 2 3 4 5 ' 6 7 8 I i i i i i | i I l

,-' Channel n , , ~-,< , , Channel n + I ', ', ~ - , = Channe l n + 2 ', -~, i , = o i i i i i , , , i I o ! l , i | I i i i i ! l i I l i i i

' " I . . . . . . ',,,'I-! " '

RZ

H B D - 3

HA] I ! I

I !

~4

lJ M

!

|

!

~M

LI V

i

!

! |

~V

I] lJ

P

Fig. 11.2 High-density bipolar format 3 coding

H V

! ! ! |

0

',/9/

I

I

IP

M

V [L

Even bits (2, 4, 6, 8):

Logic 1 = Logic 0 for the full bit period Logic 0 = Logic 1 for the full bit period

Consider the following bit stream"

Bit numbers Input bit stream ADI code

1 2 3 4 5 6 7 8 1 0 0 1 1 0 0 0 1 1 0 0 1 1 0 1

As shown above, the emboldened bits in the ADI code are in the opposite logic state relative to the input state. Notice that only the bits in the even bit positions have changed state.

The main problem with ADI is that for the following bit sequences there will be a loss of clock if this code was used as the interface or line code.

Bit numbers Input bit stream ADI code

1 2 3 4 5 6 7 8 0 1 0 1 0 1 0 1 0 0 0 0 0 0 0 0

Bit numbers Input bit stream ADI code

1 2 3 4 5 6 7 8 1 0 1 0 1 0 1 0 1 1 1 1 1 1 1 1

Page 256: analog and digital comm techniques pdf

Return to zero (RZ) 239

In the second example given above not only is there no clock but the average d.c. rises to the voltage of a logic 1.

Return to zero (RZ) The RZ code used is the URZ code. The coding technique is described in Section 11.4.1 and is shown in Fig. 11.1 (d) as well as Fig. 11.2.

High-density bipolar format 3 (HDB-3) The code follows AMI for all bit sequences where there are three or fewer consecutive logic 0 states (spaces) between two valid logic 1 states (marks). Figure 11.2 shows the typical conversion process from binary to HDB-3.

The violation bit is a bit that violates the AMI principle. The parity bit is not a valid mark but is a bit that is inserted into the bit stream to force the violation bit to assume a particular polarity.

When there are more than three consecutive logic 0 states then the fourth con- secutive space is made into a violation bit.

Rule 1. The violation bit must assume the polarity of the valid mark (i.e. mark or parity bit) that immediately precedes it.

Rule 2. The successive violation must assume a polarity that is opposite to the violation that immediately precedes it.

Rule 3. If there is no valid mark to force a violation bit to have the opposite polarity to the violation that immediately precedes it then a parity bit is used to force the violation to assume the opposite polarity.

Rule 4. The number of spaces between a valid mark and a violation bit is 3. Rule 5. The number of spaces between a parity bit and a violation bit is 2.

Figure 11.2 shows the conversion process from NRZ-L to HDB-3 when violation and parity bits are required. Notice that the HDB-3 output is a RZ code.

Referring to Fig. 11.2, the input NRZ-L bit stream is as follows:

Channel n Channel n + I

Bit No. 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8

Data 1 0 0 1 0 1 1 1 0 1 0 1 0 1 0 1

ADI 1 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0

HDB-3 + M - M 0 0 0 - V +M 0 0 0 +V - P 0 0 - V 0

where + M = positive valid mark

- M = negative valid mark

- V = negative violation bit

+ V = positive violation bit

+ P = positive parity bit

- P = negative parity bit

This code is a bipolar or ternary code as there are three states, namely a positive voltage, 0 V or earth potential and a negative voltage. The code has a 50% duty cycle for the logic 1 states.

Channel n + 2

1 2 3 4 5 6 7 8

0 0 0 0 0 1 0 12

0 1 0 1 0 0 0 0

0 + M 0 - M ~-P 0 0 + V

Page 257: analog and digital comm techniques pdf

240 Line and interface coding

Advantages of HDB-3 �9 The clock frequency is embedded in the code. �9 There is only a very small d.c. component. �9 It has a bandwidth that is smaller than RZ codes.

11.5 THE PHASE-ENCODED GROUP

This group consists of the following:

�9 Biphase - mark (BI~-M) or Manchester I code. �9 Biphase - level (BI~-L) or Manchester II code.

�9 Biphase - space (BI~-S). �9 Delay modulation (DM).

These codes are used in magnetic recording, optical communications and some

satellite systems. All these codes are shown in Fig. 11.3.

(a) N R Z - L

(b) B I t l ) - M

t 1 t 0 I 0 t 0 t 1 t 1 I 0 I 1 t 0 t

t : t : t : t : t : t : t : t : t : t + i o 1 1 , , ! i l l ,

I : I : I l I l I : I l I : I : I I I

I I I I I I I I I I I I I I I I I I I

;Vb I tL_R ' I I I I I I I I I I I I I I I I I ', I

I I I I I I I I I I I I I I I I I I I

~~ FI__I-[J'IJ-1 I ' ! P' 0 ' I i I : I : I : I : I : I : I : l : I : I

I : I : I : I : I : I : I : I : I : I

"t' i 'U- I 0 t t I : I : I : I l I : I : I l I : I l I

I l I l I l I l I : I l I l I : I : I

I I I I I I I I I I I I I I I I I I I

I I I I I I I I I I I I I I I I I I I

;_l-la rl F! !-I i-la l-I_i-L I I I I I I I I I I I I I I I l I I I

I I I I I I I I I I I I I I I I I I I

~,,~ ~I t~ I-I 17 1 U-L]-I I ~ , I I I I I I I I I I I I I I I I I I I

Fig. 11.3 The phase-encoded group

Page 258: analog and digital comm techniques pdf

The phase-encoded group 241

11.5.1 Biphase- mark (BI~-M)or Manchester I code

The biphase - mark (BI~-M) code was developed by Manchester University and hence is also known as the Manchester I code. It is a split-phase code. The code is shown in Fig. 11.3(b).

Coding Logic 1 = Two transitions during the bit period. The first

transition is at the beginning of the bit period. If the previous state was low then the first transition will be from low to high and if the previous state was high then the first transition will be from high to low. The second transition is halfway through the bit period in the opposite direction relative to the first transition

Logic 0 = One transition during bit period, at the beginning of the bit period. If the previous state is low then the transition is from low to high. If the previous state was high then the transition is from high to low

Disadvantages �9 High average d.c. component. �9 Twice the bandwidth of NRZ codes.

Advantage �9 Clock frequency is embedded in the code for all bit sequences.

The code has a 50% duty cycle for the logic 1 states.

11.5.2 Biphase - level (BI~-L) or Manchester II code

The biphase level (BI~-L) code was also developed by Manchester University and hence is also known as the Manchester II code. It is a split-phase code. This code is shown in Fig. 11.3(c).

Coding Logic 1 = One transition during the bit period, halfway through

the bit period from high to low if the previous state is high. Two transitions during the bit period if the previous state is low. The first transition will be from low to high at the beginning of the bit period and the second transition will be from high to low halfway through the bit period

Logic 0 = One transition during the bit period, halfway through the bit period from low to high if the previous state

Page 259: analog and digital comm techniques pdf

242 Line and interface coding

is low. Two transitions during the bit period if the previous state is high. The first transition will be from high to low at the beginning of the bit period and the second transition will be from low to high halfway through the bit period

Disadvantages �9 Reduced d.c. component. �9 Twice the bandwidth of NRZ codes.

Advantage �9 Clock frequency is embedded in the code for all bit sequences.

11.5.3 Biphase - space (BI~-S)

This code is a split-phase code. It is shown in Fig. 11.3(d).

Coding

Logic 1 = One transition during the bit period at the beginning of the bit period. If the previous state was low then the transition is from low to high. If the previous state was high then the transition will be from high to low

Logic 0 = Two transitions during the bit period. The first transition is at the beginning of the bit period and the second transition is halfway through the bit period. For the first transition, if the previous state was low then the transition will be from low to high and if the previous state was high then the transition will be from high to low. The second transition will be in the opposite direction to the first transition

Disadvantages �9 Very high d.c. component. �9 Twice the bandwidth of NRZ codes.

Advantage �9 Clock frequency is embedded in the code for all bit sequences.

The code has a 50% duty cycle for the logic 0 states.

11.5.4 Delay modulation (DM) or Miller code

This code is a split-phase code and is also known as the Miller code. This code is shown in Fig. 11.3(e)

Page 260: analog and digital comm techniques pdf

Pulse modulation 243

Coding Logic 1 = One transition halfway through the bit period. If the

previous state was low then the transition will be from low to high. If the previous state was high then the transition will be from high to low

Logic 0 = No transitions during the bit period unless followed by a second logic 0. The second logic 0 has one transition at the beginning of the bit period in the opposite direction to the previous state

Disadvantage �9 Reduced d.c. component.

Advantages �9 Clock frequency is embedded in the code for all bit sequences. �9 The same bandwidth as NRZ codes.

11.6 PULSE MODULATION

This group consists of the following:

�9 Pulse position modulation (PPM). �9 Pulse duration modulation (PDM).

These codes are shown in Fig. 11.3.

11.6.1 Pulse position modulation ( P P M )

This coding method was briefly considered in Chapter 2 when spread spectrum systems were covered. The theoretical definition for the code is given here. This code is shown in Fig. 11.3(f).

Coding Logic 1 = Two transitions during the bit period. The first

transition is one third of the period from the start of the bit period from low to high. The second transition is two-thirds of the period from the start of the bit period from high to low

Logic 0 = Two transitions during the bit period. The first transition is at the beginning of the bit period from low to high. The second transition is one-third of the period from the start of the bit period from high to low

Page 261: analog and digital comm techniques pdf

244 Line and interface coding

An input logic 1 forces the output to remain at a logic 0 for one-third of the bit period, a logic 1 for one-third of the bit period and then a logic 0 for one-third of the bit period.

An input logic 0 causes the output to change to a logic 1 for one-third of the bit period and then to a logic 0 for two-thirds of the bit period.

Disadvantage �9 Large bandwidth compared to NRZ codes.

Advantages �9 Reduced d.c. component. �9 Clock frequency is embedded in the code.

11.6.2 Pulse duration modulation ( P D M )

This coding method was briefly considered in Chapter 2 when spread spectrum systems were covered. The theoretical definition for the code is given here. This code is shown in Fig. 11.3(g).

Coding Logic 1 - T w o transitions during the bit period. The first

transition is at the beginning of the bit period from low to high. The second transition is two-thirds of the period from the start of the bit period from high to low

Logic 0 = Two transitions during the bit period. The first transition is at the beginning of the bit period from low to high. The second transition is one-third of the bit period from the start of the bit period from high to low

An input logic 1 forces the output to a logic 1 for two-thirds of the bit period and then to a logic 0 for one-third of the bit period.

An input logic 0 causes the output to change to a logic 1 for one-third of the bit period and then to a logic 0 for two-thirds of the bit period.

Disadvantages �9 Large d.c. component for long strings of logic Is. �9 Large bandwidth compared to NRZ codes.

Page 262: analog and digital comm techniques pdf

Frequency distribution 245

Advantage �9 Clock frequency is embedded in the code for all bit sequences.

11.7 FREQUENCY DISTRIBUTION

Figure 11.4 shows the spectral density against normalised bandwidth and Fig. 11.5 shows the frequency distribution for the different groups. Figure 11.5 shows that the RZ and biphase codes have a larger bandwidth requirement than the NRZ code. Figure 11.4 shows that the bipolar codes have a smaller bandwidth require- ment than the NRZ code. It can also be seen that the biphase codes require larger bandwidths than any of the other coding methods.

5.6

5.2

4.8

4.4

4.0

~, 3.6 N

~ 3 . 2

~

= 2.8

~ 2.4

2.0

1.6

1.2

0.8

0.4

Delay modulation

Biphase

0.2 0.4 0.6 0.8 1.0 1.2 1.4

Normalised bandwidth (IT, where T is the signal pulse width)

1.6 1.8 2.0

Fig. 11.4 Spectral densities of various PCM waveforms

Page 263: analog and digital comm techniques pdf

246 Line and interface coding

-4f -3f -2f -f 0 f 2f 3f 4f (a)

~.~.'~ :~,'.'~:;;'i

-4f -3f -2f -f 0 f 2f 3f 4f (b)

-4f -3f -2f -f 0 f 2f 3f 4f (c)

Fig. 11.5 Spectral densities: (a) NRZ codes; (b) RZ codes; (c) biphase codes

11.8 REVIEW QUESTIONS

11.1 State the requirements of a line or interface code. 11.2 State the four different categories into which all the codes can be classed. 11.3 Code the following bit stream into AMI. The coding must show the ADI,

RZ and AMI steps.

Data stream = 1001110101110100002

11.4 Code the following bit stream into HDB-3. The coding must show the ADI, RZ and HDB-3 steps.

Data stream = 1001110101110100002

11.5 Code the following bit stream into Manchester I code.

Data stream = 1001110101110100002

11.6 Code the following bit stream into Manchester II code.

Data stream = 1001110101110100002

Page 264: analog and digital comm techniques pdf

12 ISO open systems interconnect seven-layer model

Quality of information not quantity of information makes decision making easier.

12.1 INTRODUCTION

Data transmission is becoming more and more widespread. An understanding of the different protocols is important in the modern world. This is especially true with the advent of the worldwide net. This chapter discusses the International Standards Organisation (ISO) seven-layer model and the principle of operation of data being transmitted via the ISO model.

Initially a discussion on the different types of protocol is given. This leads to a general discussion of the ISO model. A discussion of the different interfaces used at the physical layer is then given.

The chapter also deals with the data format and the structures of the other layers within the model and the importance of each layer.

12.2 MESSAGE TRANSFER AND MESSAGE SWITCHING

All modem data transfer systems use a system referred to as automatic repeat request (ARQ). This method is used to ensure that unerrored data is transferred to the end user. If errored data is received then the system asks for the data to be retransmitted. The ARQ instructions are written into a protocol, which is a computer program that is loaded into a switching computer. The protocol enables the switching computer to correctly process the data that it receives from a terminal so that it can transmit it to another terminal.

Page 265: analog and digital comm techniques pdf

248 /SO open systems interconnect seven-layer model

12.3 PROTOCOL CATEGORIES AND OPERATION

The ARQ protocols are divided into two categories:

�9 Stop and wait. �9 Continuous.

12.3.1 Stop and wait protocol

This is a message-oriented protocol. This means that the complete message must be transmitted to a switching computer and stored in the computer memory. Only once the complete message is stored in the memory is it then sent to the next computer.

This implies that the switching computer must have a very large memory as it must serve several users simultaneously. Also the message transfer is slow through this system in that while the computer is busy with the data from one user it cannot service the other users. The emphasis in this system is on storage of the message and not on message transfer. For large messages the other users are forced to wait and hence the users are not fairly served.

12.3.2 Continuous protocol

In this system the message is broken up into small packets. The packets are then continuously transferred to the switching computer. The switching computer now only has to store the packet before transmitting it to the next computer. The emphasis here is on forwarding the data and not on storage. This has the added advantage that the memory of the switching computer is smaller and also the system is a lot faster so that the users are more efficiently

served.

12.3.3 Protocol operation

There are three different ways in which these protocols can operate, these are:

�9 Simplex operation. �9 Half-duplex operation. �9 Full-duplex operation.

Simplex operation is where the communication is only in one direction. This is similar to commercial radio and TV.

Half-duplex operation is where both terminals can transmit and receive but not at the same time. Data can only be transferred in one direction at a time. This is similar to the communication using walkie-talkies.

Full-duplex operation is where both terminals can transmit and receive at the same time.

Page 266: analog and digital comm techniques pdf

12.4 TYPES OF PROTOCOLS

There are five different types of protocols namely:

�9 Asynchronous. �9 Protected asynchronous. �9 Character oriented. �9 Byte oriented. �9 Bit oriented.

Types of protocols 249

12.4.1 Asynchronous protocol

These protocols are extremely simplistic. They provide no error correction. Each character is packaged between a start bit and stop bits. If a parity bit is included and an error occurs, the errored data is still accepted as the receiver ignores the status of the parity bit.

12.4.2 Protected asynchronous protocol

These protocols use the parity bit for error detection and inform the computer that the data is errored. The protocol does not ask for retransmission of the errored data. These protocols are also simplistic in nature. Each character is packaged between a start bit and stop bits with a parity bit included just before the stop bits.

12.4.3 Character-oriented protocols

A typical example of this type of protocol is the binary synchronous protocol (Bisync or BSC) developed by IBM. The binary synchronous protocol format is as follows:

where SYN = synchronous character

SOH = start of header (marks the beginning of the message block)

STX - s t a r t of text (marks the beginning of the text block)

ETX - end of text (marks the end of the text block)

bcc = block check character (used for error detection).

The SOH and (Header) arc optional and arc dependent on the user and the application.

A data link escape (DLE) command is incorporated when the data is to be transparent to BSC. Consider the following data string that is to be transmitted to a distant terminal.

Data s t r ing=ABC STX DEF ETX 123 DLE 456

Page 267: analog and digital comm techniques pdf

250 /SO open systems interconnect seven-layer mode/

In this string the character strings 'STX', 'ETX' and 'DLE' are commands that the BSC protocol will respond to. in order for these text strings to be treated as text strings and not commands, they must be made transparent to the protocol. This is achieved as follows:

is xl The first DLE command makes the text block transparent. The second DLE command is ignored, the third DLE command is accepted as data and the last DLE command indicates the end of the transparency.

Bisync transmission method The protocol is an automatic repeat request (ARQ) protocol. Each block must be acknowledged prior to the next block being transmitted.

The protocol is a half-duplex protocol. Each block must be acknowledged prior to the next block being sent. The system uses two different acknowledgement signals called ACK 0 and ACK 1. This is used to clearly identify which block of data has been correctly received by the distant receiver. Figure 12.1 (a) shows

A " " ~ ~ o c k 1

" " ~ . ~ o c k 2

" ~ . . . ~ o c k 4

- ~ Time

(a) (b)

A B ~ o c k I

A C ~ --

"-~. . .~ock 2

_

" ' - ~ . ~ N Q

~ ~ . ~ o c k 2

m

" ~ ~ ~ o c k 3

X ~ ------~NQ t

A c ~ L

~ c k 4

~ Time

Fig. 12.1 Bisync call procedure

Page 268: analog and digital comm techniques pdf

The international standards organisation seven-layer model 251

the normal transmission method of the bisync protocol. As shown, when data block 1 is transmitted from A to B, before data block 2 can be transmitted, the acknowledgement signal (ACK 1) must be sent from B to A. When data block 2 from A arrives at B then B sends the ACK 0 signal to A. The same applies when data blocks are sent from B to A.

If, as shown in Fig. 12.1 (b), A does not receive an acknowledgement from B then after a timeout period A will send an enquiry signal (ENQ) to B. On receipt of this signal, B sends the same acknowledgement signal that it sent out pre- viously, in this case ACK 1. However, if A is expecting the ACK 0 signal then it knows that data block 2 did not arrive at B and hence this block must be retransmitted.

The same procedure applies when data blocks are transferred from B to A.

Limitations of the bisync protocol This protocol has three major limitations:

�9 Inappropriate over satellite links as the delays become too long. �9 Each block of data must be acknowledged before the next block is sent. �9 Data is only presented in one direction at a time although the circuit could

possibly support full-duplex operation.

12.4.4 Byte-oriented protocols

The length of each frame (i.e. number of bytes) is contained in a count field which is part of the frame header. This provides built-in transparency as the receiver knows how many bytes to receive. This means that the receiver can uniquely identify the data between the SOH and ETX commands.

12.4.5 Bit-oriented protocols

A typical example of this type of protocol is the high-level data link control protocol (HDLC). This protocol is described in detail when the data link layer in the open systems interconnect seven-layer model is discussed in Section 12.8.2.

12.5 THE INTERNATIONAL STANDARDS ORGANISATION SEVEN-LAYER MODEL

The International Standards Organisation (ISO) developed the recommendations for the open systems interconnect (OSI) seven-layer model. This model is recommended to be implemented in switching computers to enable different computers to communicate with one another. The whole idea behind the model is to enable data terminals to be interconnected by the network in an unrestricted way. Figure 12.2 shows the model. Each one of the layers contains a software

Page 269: analog and digital comm techniques pdf

252 /SO open systems interconnect seven-layer model

I Switching computer

7. Application

6. Presentation

5. Session

4. Transport

3. Network

2. Data link

Switching computer

7. Application

6. Presentation

5. Session

4. Transport

3. Network

2. Data link

1. Physical 1. Physical , ,

I I Fig. 12.2 Open systems interconnect seven-layer model

package. The physical layer contains both a software package and hardware such as an RS232C or RS449 port.

12.6 FUNCTIONS OF THE DIFFERENT LAYERS

12.6.1 Physical layer

The physical layer protocol is responsible for moving data over the transmission medium. It does not supply error correction or data sequencing. It is the physical interface between the open system and the transmission medium. This is not to be confused with the error detection and correction schemes that are used within the transmission system, which ensure error-free performance from the input to the system at the transmitter to the output of the system at the receiver. If the data applied to the input to the transmitter is already errored, the transmission system cannot correct it.

The physical layer deals with the transfer of the data between the users or end

terminals.

12.6.2 Data link layer

The data link layer protocol provides error detection and recovery. It is responsible for transferring user data (information) and control data between the end terminals. The control data is used to initiate the call, maintain the integrity of the call and terminate the call that is transferred over the link.

12.6.3 Network layer,

The network layer protocol is the interface between the open system and the communication network. It selects routes to establish logical connections. It relays protocol data units (PDUs) for other open systems.

Page 270: analog and digital comm techniques pdf

Functions of the different layers 253

12.6.4 Transport layer

The transport layer protocol provides higher layers with reliable connections over routes and networks that have different levels of quality. Some routes provide high-quality connections where the error rate of the transferred data is exceptionally good. However, other routes result in a large error rate. The transport layer must ensure that irrespective of the route, the quality of the received data is the same.

It correctly sequences the PDUs if the network layer does not provide this service. It shields higher layers from the realities of the network and route.

12.6.5 Session layer

The session layer protocol establishes a communication session, maintains the session for the duration of the call and then terminates the session at the end of the call. The transport layer does this on behalf of the application on two open systems.

12.6.6 Presentation layer

The presentation layer protocol is concerned with the transformations that are required to get the data from the format acceptable to one application into the presentation format acceptable to another application. An example is ASCII presentation on one terminal to EBCDIC presentation on another terminal and vice versa.

12.6.7 Application layer

The application layer protocol is responsible for exchanging user data or infor- mation. Examples of this are: bank account details, flight bookings, hotel reservations etc.

12.6.8 Null layers and sublayers

Every layer in the OSI model must be present; null layers, or layers that are totally empty, are not permitted. Each layer must contain a software package.

A layer may be sublayered if the functions of a layer can be more precisely defined by breaking it into smaller pieces. This is shown in Fig. 12.3.

12.6.9 Headers, data blocks and layers

Figure 12.4 shows where headers and footers are added to the data. The data from the user's computer is passed to the application layer, where a header is added to the data. The data and this header form the data that is passed to the presentation layer, which adds its header to the data. This is then transferred to the session

Page 271: analog and digital comm techniques pdf

254 /SO open systems interconnect seven-layer mode/

Upper sublayer

Middle sublayer

Lower sublayer

Maintains services provided to layer above.

Implements the layer protocol.

Manages the interface to the next lower layer.

Fig. 12.3 Sublayers

layer, which adds its header. The transport layer adds a header, the network layer adds a header. The data link layer adds a header as well as a footer. This is then transferred over the physical connection via the physical layer. This means that the data transferred over the physical layer has a high redundancy and hence it is important to ensure that the raw data has no or very little redundancy.

[ ] User data User data [ ]

I.I ..... 1

H 1

H I

Application

Presentation

Session

Transport

Network

Data link

Physical

Application

Presentation

Session

Transport

Network

Data link

Physical

i I

I i"1

I I"l

H

[-fi] Header

]'FI Footer [-] Data

Fig. 12.4 Headers and footers in the seven-layer model

Page 272: analog and digital comm techniques pdf

Recommended interfaces 255

12.6.10 General

The physical, data link and network layers are the responsibility of the transmission engineer. The application, presentation and session layers are the responsibility of the switching engineer. The transport layer is the glue that holds the model together and is the responsibility of both the transmission and switching engineers.

12.7 THE ITU, ISO AND CCITT

The International Telecommunications Union (ITU) consists of several forums such as ITU-T (formerly CCITT), ITU-R (formerly CCIR) and ITU-D. CCITT stands for the Consultative Committee of International Telegraphy and Telephony. Many of the ITU recommendations still use the CCITT designated numbers.

�9 ITU-T determines the recommendations for telecommunication systems such as cable systems.

�9 ITU-R determines the recommendations for radio, microwave and satellite systems.

�9 ITU-D determines recommendations for data communication over local area networks (LANs) and wide area networks (WANs).

The main function of the International Standards Organisation (ISO) is to recommend standards that will be accepted by the whole world to enable the data equipment made by different manufacturers to be able to communicate properly.

There are many different organisations that recommend standards. Some of these organisations are vendor oriented, some are nationally oriented and some are internationally oriented. Many of the standards recommended by these various organisations are very similar. The only differences are in terms of implementation.

12.8 RECOMMENDED INTERFACES

12.8.1 Physical layer

The ISO recommendations are the 'X.21' and 'X.21 bis' protocols. The X.21 bis recommendations cover the RS232C port and the V.24 interface, which is used when the connection to the public switched network is an analogue connection and the medium connecting the data terminal equipment (DTE) to the analogue exchange is a metallic cable pair and the data rate is relatively slow.

The X.21 bis recommendation also covers the unbalanced and balanced RS232C ports which are used when the connection from the DTE to a digital exchange is by means of a digital link.

Page 273: analog and digital comm techniques pdf

256 /SO open systems interconnect seven-layer mode/

The X.21 recommendations cover the RS449 protocol and the V. 11 and V.35 interfaces, which are used for higher data rates than the RS232C port. The V.35 interface is used when the link to the analogue exchange is an analogue link by means of metallic cable pair. The V.11 interface is used when the link to a digital exchange is a digital link.

The X.21 bis protocol

The V.24 interface Figure 12.5(a) shows the position of the modems in relationship to the DTE and data circuit equipment (DCE). The link connecting the two modems together is now totally analogue.

Figure 12.5(b) shows the actual V.24 interface. In its simplest form the V.24 interface consists of 13 different circuits. The modem was originally designed to

(a)

. . . . . . . . . , . . . . . . .

DTE . . . . . . . Modem ds ~ DC DTE

X.21 V.24 Twisted V,24 X.21 pair

(b)

DCE

CCITT circuit Symbol number

100 DTR - I rx dat i l l TxClk -LTxda= !!4 TxCik _-ERxdai I 15 Rx CIk _- E Carrie 109 CD : F Signal 102 Sig _- L Data s 107 DSR : [~ Clear 1 106 CTS _ [" Reque 105 RTS : L Recei, 104 RxD " F Transt ~o3 T~t~ ~[ mere 101 SHG _

Ring indication Data terminal ready ' TX data timing (DCE) : Tx data timing (modem) " Rx data timing Carrier detect Signal ground Data set ready Clear to send Request to send ,._ Receive data Transmit data .. Shield ground -

Modem

Symbol Pin numbers

- RI 22 DTR 20 Tx CIk ! 6 Tx Clk 15 Rx Clk 17 CD 8 Sig DSR CTS 54 RTS RxD TxD 2 SHG 1

(c)

L o g i c l > 2 V { Logic 0 < 0.8 V

DCE ~,

Logic 1 > -3.0 V ~_~ Logic 0 < +3,0 V

Signal ground v

Logic I > 2 V Logic 0 < 0.8 V

Dig. ex.

(d)

Y

DCE , i ,

Current detector

I

1

I

I

v

v

I Cu~ent detec tor I -

D! e. e;~

Fig. 12.5 (a) Signal definitions; (b) V.24 interface; (c) unbalanced RS232C interface; (d) 20 mA loop current RS232C interface

Page 274: analog and digital comm techniques pdf

Recommended interfaces 257

connect a data rate of 9600 baud (9600 b/s) to the exchange in the public switched telephone network (PSTN). The V.24 interface consists of a 25-way D connector that connects the RS232C port to the modem. The transmit clock frequency can be either generated on the RS232C port or on the modem. It can thus be fed from the RS232C port to the modem on the Tx timing lead from the DTE to the DCE or it can be fed from the modem on the Tx timing lead on the DCE to the DTE. The receiver clock is always fed from the modem to the RS232C port on the Rx timing lead. The functions of the leads are shown in Fig. 12.5(b).

Ideally the modem should be placed very close to the DCE and the DCE should be placed into one of the slots in the DTE. The analogue exchange can be situated quite a few kilometres from the DTE. The modem normally forms part of the DCE whereas the DTE is the user terminal or computer.

RS232C/V.24 signal definitions

Digital links For short distances between the DTE and a digital exchange (less than 100 m), the RS232C interface, as shown in Fig. 12.5(c), is used. In this instance the link between the DCE and the exchange is a digital link. Figure 12.5(c) shows an unbalanced link using ECL (emitter-coupled logic) where a logic 1 is allocated a negative voltage greater than - 3 V and a logic 0 is allocated a positive voltage greater than +3 V.

When the distance between the DTE and the digital exchange is longer than 100m and the data is to be transferred in a digital format, the 20mA loop interface can be used. This interface is a balanced interface and is shown in Fig. 12.5(d). The data is changed into pulses of current or no current at the trans- mit end and the receiver reproduces the data by detecting the current/no-current conditions. This is similar to the transfer of dial pulses from a rotary dial on a telephone and is referred to as loop disconnect signalling as the receiver senses when the loop is made and when the loop is broken.

Analogue links Figure 12.6 shows a typical call procedure over an RS232C port connected to a modem. When a call is to be made, the first step is to establish a link and this is done by means of dial pulses that must be transmitted first. The dial pulses are used in the exchange to route the call to the correct destination.

If the distant terminal is free then the DCE will cause the data set ready (DSR) lead to go high, which indicates to the receive modem that the DTE at the distant end is ready to accept a call. The modem on receipt of the call initialisation signal from the exchange will cause the ring indication (RI) to go high. The DCE responds by causing the transmit data (TxD) lead to go high, which causes the modem to transmit a constant tone to the exchange on the cable pair.

This tone is then received by the calling modem which causes the carrier detect (CD) lead to go high. This informs the calling DCE that the called DCE is ready for the call to proceed.

Page 275: analog and digital comm techniques pdf

258 /SO open systems interconnect seven-layer mode/

DCE I V.24 I Modem I PSTN ] Modem

!

Push data button on

L

Light (~) o n

CD on

DTR on DSR on RxD CD off RTS on

CTS on TxD

Light o n

RTS off CTS off ~" Light

off ~ ~ CD off Replace . . . . . . . . . . . . handse t . , DSR off

Light ~ "~ off

I ] DCE I IM~

i m e

V.24

U I K o n

RI on ,,.._

CTS on TxD r RTS off CTS off

CD on ,~ r

RxD RTS off "~ CTS off CD off

_., DTR off

_4 DTR on

s s i

i s i

I i

Fig. 12.6 RS232C/V.24 call procedure

�9 s S s

DCE i

DCE

r].~ Short time J J delay ."

At the called modem, after a timeout period, the modem causes the clear to send (CTS) lead to go high. This causes the DCE to place a data signal on the TxD lead. After a short duration the called DCE causes the request to send (RTS) lead to go low, which causes the called modem to stop transmitting the data tones back to the calling end. On receipt of the low on the RTS lead the

called modem causes the CTS lead to go low. At the calling end the DCE causes the data terminal ready (DTR) lead to go

high. The modem responds by causing the DSR lead to go high. The modem, on receipt of the data tones, causes the data to be output to the DTE on the receive data (RxD) lead. When the modem senses that the data tones have been removed it causes the CD lead to go low. This in turn results in the DTE causing the RST lead to go high, which causes the calling modem to transmit data tones to

the called modem. On receipt of the data tones by the called modem, the CD lead goes high. At the

calling modem after a short delay, the CTS lead goes high. The calling DCE now responds by transmitting the data on the TxD lead to the modem. The calling modem now transmits the data tones to the called modem. The called modem con- verts the received data tones back to data and sends it to the DCE on the RxD lead.

Page 276: analog and digital comm techniques pdf

Recommended interfaces 259

Once all the data has been received the calling DCE causes the RTS lead to go low, which causes the CTS to go low. The modem stops sending data tones. The same takes place in the opposite direction. Both modems then detect that the data tones have been removed and cause the CD lead to go low, which terminates the call.

The X.21 protocol This protocol describes the RS449 interface. The RS449 interface is micro- processor based. The X.21 interface describes the link between the DTE and the DCE, which is shown in Fig. 12.7(a). The V.35 interface describes the link between the DCE and the modem, which is shown in Fig. 12.7(a) and (b).

The X.21 interface consists of five separate leads or five pairs of wires. These are the transmit data lead or pair, receive data lead or pair, control lead or pair, the

' ! m

X.21 V.35 Twisted V.35 X.21

(a) pair

(b)

D C E

Symbol

RR

TM

DM

RTS

CTS

RxD

TxD

SHD

Receiver ready

Test mode

Data mode

Request to send

Clear to send

Receive data < - - - , ,,

Transmit data

Shield ground

M o d e m

Symbol

" RR

TM

DM

" RTS

" CTS =

" RxD 4 ~

" TxD

_I_ SHD _

J• X.21 V.II

l DTE 1

V.I X.21 (c)

___•+V -V+v RT IX2E

Logic 0 < :1:

RT + V

Dig. ex.

(d)

Fig. 12.7 (a) Signal definitions; (b) V.35 interface; (c) unbalanced V.11 interface; (d) balanced V.11 interfaced

Page 277: analog and digital comm techniques pdf

260 /SO open systems interconnect seven-layer mode/

(a)

(b)

(c)

Fig. 12.8

X.21

C a ! l e d ~

X.21

DTE

Symbol ] Transmit T �9 Control C = I_A Receive R - 1~ Indication I - l ~ Sil~nal (bit) S [ -'~ Timing

~...1 _ Symbol ~ 1 - T

" 1 " C = R

! = S

DCE

F r o m

DTE

From DCE

TI I H I cl I ; i

I : H ' ! ~ l i ! ! i : I

! | | |

~ "= ~ = -~

-= s ~- - -

O = O

From { T

DTE C

From ( R DCE I

[s@,l ! | ! i

�9 ,... . .

Calling DTE Data ]

Data

Called DTE

L .

t.r2 t-

Data

I ! |

E ~ >"

l--

L , , ~

e J - .~

! | |

i I | |

_o = = u u 8

e -

(a) Signal definitions; (b) X.21 in ter face; (c) call procedure

O n

off On Off On Off On Off

O n

off On off On Off On Off

indication lead or pair and signal element lead or pair which carries the timing information. The unbalanced interface is shown in Fig. 12.7(a) as well as in Fig. 12.8(a) and (b).

A typical call procedure is shown in Fig. 12.8(c) which has been included for reference purposes only.

The RS449 recommendation covers the RS422 interface, which is a balanced interface and uses a pair of wires for each control signal, and the RS423 which is an unbalanced interface and uses a single wire for each control signal. The maximum separation in metres together with the maximum bit rates are indicated in Table 12.1 for both the RS422 and the RS423 interfaces.

When the RS449 interface is connected to a modem for use over an analogue link then the V.35 interface is used. When the RS449 is used on a digital link then the V. 11 interface is used.

Page 278: analog and digital comm techniques pdf

Table 12.1

Recommended interfaces 261

Maximum separation and bit rates RS422 and RS423

Circuit t y p e Maximum separation (m) Maximum bit rate

RS422

RS423

10 100kb/s 100 I 0 kb/s

1000 1 kb/s

10 10 Mb/s 100 1Mb/s

1000 100 kb/s

The V.35 interface The V.35 interface is used to connect the DTE via the DCE to a wideband (analogue) high-bit-rate modem. A 34-pin connector is used and data rates of between 48kb/s and 168kb/s are possible. Figure 12.7(b) shows the balanced V.35 interface and its control signals. When the interface is in operation only two of the controls are active at a time.

The V. 11 interface This interface is only used when the connection between the DTE and the exchange is a digital connection. Figure 12.7(c) and (d) shows the interface. In this case the ECL is used which is the same as the unbalanced RS232C shown in Fig. 12.5(c).

12.8.2 Data rink layer

The protocol that is recommended by the ITU is the CCITT-recommended high- level data link control (HDLC). This protocol is a derivative of the serial data link control (SDLC) protocol.

High-level data rink control protocol The frame format is shown below:

Flag Address

8 bits 8/16 bits

Control

8/16 bits

Data

n bytes

FCS

16 bits , ,

Flag

8 bits

where Flag = 01111110

FCS = flame check sequence employing CRC-16 or CCITT-CRC

CRC = cyclic redundancy check

The HDLC protocol supports three different types of frames; these are the unnumbered frame (U-frame), the supervisory frame (S-frame) and the informa- tion frame (I-frame).

Page 279: analog and digital comm techniques pdf

262 /SO open systems interconnect seven-layer model

The information frame This frame is used to control the flow of data. It has a frame format as shown below. The control field can be either 8 bits or 16 bits wide.

Flag

8 bits

Address

8/16 bits

Control

8/16 bits

Data

n bytes

FCS Flag , ,

16 bits 8 bits

Control field and address field (8-bit) For a frame having an 8-bit control field, the control field is as follows:

Bitno. 7 6 ! . 5 ! 4 3 2 ! 1 [ 0

Usage 0 N(s) P/F N(r)

�9 Bit 7 A logic 0 in this position indicates that this frame is an information frame.

�9 N(s) Contains the frame number of the frame presently being sent by the transmitter. The frame number is from 0002 to 1112, i.e. frames 0~0 to 710 ~ modulo 8.

�9 N(r) Contains the number of the next expected frame from the distant trans- mitter. The frame number is from 0002 to 1112, i.e. frames 010 to 710 modulo 8.

�9 P/F Poll or final bit. This bit is used for control purposes. It is used by one terminal to see if the other terminal is still there. If it is set to a logic 1 then the receiver must respond immediately by setting this bit to a logic 1. The receiver sets this bit to a logic 1 when it transmits its final frame.

An 8-bit address field enables one of 2561o ports to be addressed.

Control field and address field (16-bit) For a frame having a 16-bit control field, the control field is as follows:

5 14113112[111101 9 ] 8 7 6 [ 5 I 4 i 3 [ 2 [ 1 i 0

E) N(s) P/F N(r) _.

�9 Bit 15 A logic 0 in this position indicates that this frame is an information frame.

�9 N(s) Contains the frame number of the frame presently being sent by the transmitter. The frame number is from 00000002 to 11111112, i.e. frames 010 to 12710 --* modulo 128.

�9 N(r) Contains the number of the next expected frame from the distant trans- mitter. The frame number is from 00000002 to 11111112, i.e. 010 to 12710 ~ modulo 128.

�9 P/F Poll or final bit. This bit is used for control purposes. It is used by one terminal to see if the other terminal is still there. If it is set to a logic 1

Page 280: analog and digital comm techniques pdf

Recommended interfaces 263

A ** B A : B

j

j

~ Time

(a) (b) -

tT.o to.7

~ Time

Note. The above diagrams indicate the information frames having an 8-bit control field. As a result of this acknowledgement must take place after every eight frames. However, acknowledgement can take place at any point during the transmission. If a 16-bit control field is used then acknowledgement must take place after 128 frames.

Fig. 12.9 HDLC information frame transfer: (a) half-duplex working; (b) full-duplex working

then the receiver must respond immediately by setting this bit to a logic 1. The receiver sets this bit to a logic 1 when it transmits its final frame.

A 16-bit address field enables one of 65 53610 ports to be addressed. The HDLC information frame data transfer is shown in Fig. 12.9. Figure 12.9(a)

shows half-duplex working, whereas Fig. 12.9(b) shows full-duplex working, which is purely for reference purposes. Both figures show the procedure using a modulo 8 count for the N(s) and N(r) fields. The format used in these figures for the transfer of information frames is lN(s),N(r ).

Consider a call that has already been established, shown in l~ig. 12.9(a), and the point is reached where A has transmitted information frame 3 to B and is expect- ing information frame 2 from B (13,2). Then A transmits information frame 4 to B and is still expecting information frame 2 from B (14,2). B responds by trans- mitting information frame 2 to A and is now expecting information frame 5 from A (12,5). On receipt of this frame at A the N(r) is 5, which informs A that information frames 3 and 4 were received and accepted as error free by B and

Page 281: analog and digital comm techniques pdf

264 ISO open systems interconnect seven-layer model

thus these frames are acknowledged. Then A transmits information frame 5, expecting information frame 3 from B (15,3). On receipt of frame 15,3 at B, N(r) is 3, indicating that A is now expecting information frame 3 from B and acknowledging that A received information frame 2 correctly and without errors from B.

When A has transmitted I7,6, the next information frame that A transmits must be I0,6 because of the modulo 8 count. The same applies for the transmitted frames from B to A.

If a modulo 8 count is used for the N(s) and N(r) fields and if A transmits I0,0 to I7,0 and B does not transmit any frames during this time, then before A can trans- mit I0,0 again B must respond by acknowledging that it has received information frames 0 to 7 correctly.

The procedure that takes place when data is received or the distant terminal does not receive a frame is described in the next section.

The supervisory frame This frame is used to control the flow of data. The frame structure is shown below:

Flag

8 bits

Address

8/16 bits

Control

8/16 bits

FCS

16 bits

Eight-bit control field The control field is as follows:

Bitno. 8 7 ... 6 [ 5 4 3 [ 2 !

Usage 1 0 Supy P/F N(r) _ . .

�9 B i t s 8 a n d 7 �9 Supy �9 N(r)

�9 P/F

Flag

8 bits , , .

The code 10 2 identifies this frame as a supervisory frame. These are supervisory codes for the control of the flow of data. Contains the number of the next expected frame from the distant transmitter. The frame number is from 0002 to 1112, i.e. 010 to 710 -* modulo 8. Poll or final bit. This bit is used for control purposes. It is used by one terminal to see if the other terminal is still there. If it is set to a logic 1 then the receiver must respond immediately by setting this bit to a logic 1. The receiver sets this bit to a logic 1 when it transmits its final frame.

Sixteen-bit control field The control field is as follows:

15 14 1 3 ] 1 2 11 110 [ 9 ] 8 7

0 1 Supy Reserve P/F .

�9 Bit 15 and 14 The code 012 indicates that this is a supervisory frame.

6, . .151413121 ' 10 N(r)

Page 282: analog and digital comm techniques pdf

Recommended interfaces 265

�9 Supy These are supervisory bits which are used to control the flow of data.

�9 Reserve These are unallocated bits for future expansion. �9 N(r) Contains the number of the next expected frame from the distant

transmitter. The frame number is from 00000002 to 11111112, i.e. 010 to 12710 -+ modulo 128.

�9 P/F Poll or final bit. This bit is used for control purposes. It is used by one terminal to see if the other terminal is still there. If it is set to a logic 1 then the receiver must respond immediately by set- ting this bit to a logic 1. The receiver sets this bit to a logic 1 when it transmits its final frame.

The HDLC supervisory frame transfer is shown in Fig. 12.10.

Types of supervisory frames There arc four different types of supervisory frame. This means there arc four different control functions that can be carried out by the supervisory frame. These arc shown in Table 12.2.

B

RNR 3

RNR 3

RNR 3

REJ 3

- FCS error

Note. The above diagram indicates the supervisory frames having an 8-bit control field. As a result of this, acknowledgement must take place every eight frames. However, acknowlegement can take place at any point during the transmission, if a 16-bit control field is used then acknowledgement must take place after 128 frames.

Fig. 12.10 HDLC supervisory frame transfer - half-duplex working

Page 283: analog and digital comm techniques pdf

266 ISO open systems interconnect seven-layer model

Table 12.2 Supervisory frames

Type Meaning and usage

RR

RNR

REJ

SREJ

Receiver ready. Explicit acknowledgement of all frames prior to the specified frame. Receiver ready to receive data in the specified frame

Receiver not ready. Explicit acknowledgement of all frames prior to the specified frame. Receiver not ready to receive additional frames

Reject. Explicit acknowledgement of all frames prior to the specified frame. Request retransmission of all frames starting with the specified frame number

Selective reject. Requests retransmission of the specified frame only

With reference to Fig. 12.10, a call has been established and A has transmitted I1,1 to B and then I2,1 to B. At this point B becomes busy and cannot accept any more data from A, so it transmits a receiver-not-ready (RNR) frame to A. The format of this is RNRN(r). In this case N(r) is 3, hence B transmits RNR3 to A. This informs A that B has received information frame 2 correctly but that B cannot accept information frame 3 from A as it is busy. This indicates to A that information frames 1 and 2 have been acknowledged by B.

If B does not transmit any frames, then after a timeout period A transmits a receiver ready supervisory frame (RRI) to B which asks B whether it is ready to receive information frame 3 from A and also tells B that A is expecting information frame 1. On receipt of the RRl frame B must respond immediately. If B is still not ready then it will transmit RNR3 to A but if it is ready B will transmit RR 3 to A.

On receipt of the supervisory frame RR3 from B, A then responds by trans- mitting I3,~ to B. Assume that there is an FCS error in this frame when it is received at B but B does not respond immediately. Instead A transmits 14,1 to I6,1 to B. Because of the FCS error B does not accept I3,1 from A and at this point transmits a reject supervisory frame (REJ3) to A rejecting information frame 3 but acknowledging all previous information frames up to and including frame 2. On receipt of the REJ3 A responds by retransmitting I3,1 to 16,1 to B.

Unnumbered flames The function of the unnumbered flame is to set up the connection and then to disconnect the connection. The unnumbered frame is also used to set up the mode of operation. There are three different modes of operation. Each different mode applies to a specific type of circuit. There are three different types of circuits. These are given below"

�9 Unbalanced point to point. �9 Unbalanced multipoint. �9 Balanced point to point.

Page 284: analog and digital comm techniques pdf

Recommended interfaces 267

(a)

Primary

Command

Response

Secondary

Primary

Command Response

i l esponse I i Secondary

(b)

Secondary Secondary

(c)

Primary Secondary

Command Response , , i ,

, i i

Response Command

Secondary Primary

Fig. 12.11 (a) Unbalanced point to point; (b) unbalanced multipoint; (c) balanced point to point

Figure 12.11 shows these three basic configurations and the abbreviations are

given in Table 12.3. Unnumbered frame commands are given in Table 12.4 and unnumbered frame

responses are given in Table 12.5.

Table 12.3 Unnumbered frame configurations

Mode Type Circuit type Meaning and usage

1 NRM

2 ARM

3 ABM

Unbalanced point to point Unbalanced multipoint

Unbalanced point to point

Balanced point to point

Normal response mode Unbalanced configuration Secondary only transmits when requested to by the primary

Asynchronous response mode Secondary allowed to transmit to primary without first being requested to do so

Asynchronous balanced mode Both stations have equal status

Page 285: analog and digital comm techniques pdf

268 /SO open systems interconnect seven-layer model

Table 12.4 Unnumbered frame commands

Command Meaning

SARM

SARME

SNRM

SNRME

SABM

SABME

Set asynchronous response mode 8-bit address/control field

Set expanded asynchronous response mode 16-bit address/control field

Set normal response mode 8-bit address/control field

Set expanded normal response mode 16-bit address/control field

Set asynchronous balanced mode 8-bit address/control field

Set expanded asynchronous balanced mode 16-bit address/control field

RSET Reset

FRMR Frame reject

DISC Disconnect

Table 12.5 Unnumbered frame responses

Response Meaning

UA Unnumbered frame CMDR Command reject FRMR Frame reject DM Disconnect

Figure 12.12 shows the call procedure for the unnumbered frame. To initialise a call, A transmits an unnumbered frame, which sets the mode of operation. In this

case the command is SABM, which sets the circuit to asynchronous balanced mode. If B accepts that this mode is correct for that particular circuit then it responds by transmitting a UA frame to A. The call now proceeds with the trans- fer of information and supervisory frames. At the end of the call A transmits a disconnect (DISC) unnumbered frame to B. B responds by transmitting a DM unnumbered frame to A which acknowledges the disconnect command.

12.8.3 Network layer

This layer is sublayered into two sections. The recommendation for the top sublayer is the internet protocol (IP), which interfaces with the transport layer.

Page 286: analog and digital comm techniques pdf

Primary secondary

Recommended interfaces 269

Primary secondary

- - ~ ' - - - - - - - - " - - - - . . - . . . . . _ . . ~ S A B M

UA

DM

DISC

l imo

Note. The above diagrams indicate the supervisory frames having an 8-bit control field. As a result of this, acknowledgement must take place every eight frames. However, acknowlegement can take place at any point during the transmission. If a 16-bit control field is used then acknowledgement must take place after 128 frames.

Fig. 12.12 HDLC unnumbered frame transfer - balanced point-to-point circuit

The recommendation for the bottom layer is the X.213 protocol. This protocol implements the layer protocol and interfaces with the data link layer. The reason for this is that the X.213 recommendation does not include a specification for how the network layer will interface with the transport layer.

X.213 protocol

This protocol provides for the establishment of virtual circuits. There are two types of virtual circuit:

�9 Permanent virtual circuit (PVC). This circuit is similar to a leased line in that when the two DTEs want to communicate with each other they do not have to set up a connection first. The connection already exists. This means that they have permanent access to one another, through the packet-switched net- work, all the time. This is similar to a private wire circuit.

�9 Switched virtual circuit (SVC). This is a dial-up service where calls are estab- lished on demand through the packet-switched network. This is similar to a normal telephone call.

Page 287: analog and digital comm techniques pdf

270 ISO open systems interconnect seven-layer model

The network layer also allows two types of service:

�9 C o n n e c t i o n - o r i e n t e d s e r v i c e . Most PVCs and SVCs operate on this service. The PDUs are correctly sequenced by the network and hence arrive in the correct sequence.

�9 C o n n e c t i o n l e s s - o r i e n t e d s e r v i c e . In this service the PDUs may or may not arrive in the correct sequence. The recommendation does not guarantee correct sequencing of PDUs using this service. The user might have to rearrange the received data so that it follows the correct order.

The network layer also allows several different data streams to be multiplexed

together.

Multiplexing Several data streams can be multiplexed together and sent over a single X.25 link. Each data stream is allocated a unique logical channel number (LCN). The pro- tocol allows for a maximum of 409610 LCNs between each D T E - D T E pair.

Table 12.6 shows the arrangement. As can be seen, channel number 0 is allocated to the network layer protocol for recovery from fatal failures. The next group of channel numbers, 110 to X1, are allocated to the permanent virtual circuits. The next group of channel numbers, X2 to X3, are allocated to incoming calls only. This means that calls that are initialised at some distant terminals are allocated these channel numbers when the network is accessed. The next group of channel numbers, X4 to Xs, are allocated to bothway circuits which can be accessed by either local terminals or by distant terminals if there are no free channel numbers in the outgoing or incoming group, respectively. The next group of channel numbers, X6 to 409510, are allocated to outgoing calls which means that local terminals only have access to these numbers.

From the above it is obvious that the LCN assigned to the D T E - D C E pair at the local exchange has nothing to do with the LCN assigned at the D C E - D T E pair at the distant exchange for a particular D T E - D T E pair. This is shown in Fig. 12.13. The LCN for the DT E -DCE pair at the calling exchange will fall in either the outgoing or bothway group, whereas at the called end the LCN for the D CE-DT E pair will fall in either the incoming or bothway group.

Table 12.6 Assignment of logical channel numbers

Channel number Purpose

010

llo...X!

X2 . . .X3

Y 4 . . . Y 5

X6... 409510

X.25 network layer protocol

PVCs

Incoming calls

Bothway calls

Outgoing calls

Page 288: analog and digital comm techniques pdf

Recommended interfaces 271

A A-B

A--C 'i

A-D I

B! B-AI ! 1 i 'l'- ~- ~ LCN 68

\ i /

/ ,',, I I ! 1 P LCN85

I , , ,

D

Fig. 12.13 Logical channel number assignment

Packet header T h e f o r m a t o f the f r a m e is shown in Tab le 12.7.

Table 12.7 Packet header frame format

Octet 4 bits

l General format ID - . , , ,

2

3

4

4 bits , , ,

Logical channel group no.

Logical channel number

Packet type ID . . . . . . . . . .

Optional octets based on packet type

General format ID: Used to select certain packet layer options. Logical group number: Selects one of ! 6 groups�9 Logical channel number: Selects one of 256 outlets. Packet type ID: Distinguishes packet type.

Packet types The different p a c k e t types are s h o w n in Tab le 12.8.

Page 289: analog and digital comm techniques pdf

272 ISO open systems interconnect seven-layer model

Table 12.8 Packet types

From DTE to DCE From DCE to DTE Purpose

Call request Incoming call Call set-up Call accept Call connect

Data Data Data transfer

RR RR Receiver ready

RNR RNR Receiver not ready

Clear request Clear indication Call clearing Clear confirm Clear confirm

Reset request Reset indication Reset a VC Reset confirm Reset confirm

Restart request Restart indication Restart the entire packet layer

Packet assembler/dissembler (PAD) Packet assemblers/dissemblers are used on non-X.25 or packet-switched terminals and computers that require communication with packet-switched or X.25 terminals or computers. Essentially they are used on terminals, such as character-mode term- inals, that are not capable of packeting the data according to the X.25 protocol.

Standards relating to PADS �9 X.3 PAD in the public switched network. �9 X.28 Protocol for DTE, DCE interface for start-stop-mode terminals. �9 X.29 Protocol for the exchange of control data between PADs. �9 X.75 Terminal and transit call procedures and data transfer systems on inter-

national circuits between packet-switched data networks.

X.3 protocol The X.3 protocol is designed to enable the normal X.25 functions to be carried out by the PAD. These functions include things such as call establishment, flow control etc. The X.3 protocol offers other facilities which are controllable by

the terminal or the remote packet-mode DTE. These facilities are as follows:

�9 Is local echo checking required or not? �9 Are alternative control characters required such as line feed and carriage return?

When a PAD is accessed by a non-packet-mode terminal the software will start with the default parameters. However, some of these parameters will have to be different from the default values for the specific terminal.

X.28 protocol The X.28 protocol is used to enable only the specific values to be changed for the particular asynchronous character-mode terminal. The X.28 recommendation covers the following functions:

Page 290: analog and digital comm techniques pdf

Recommended interfaces 273

�9 Call establishment between the character-mode terminal and the PAD. �9 Setting of the parameters of the particular terminal. �9 Control of the data exchange process between the terminal and the PAD. �9 Call disconnection at the end of the data transfer.

The call can be established on a permanent virtual circuit basis (PVC) or switched virtual circuit basis (SVC). The main stipulation is that it is a switched circuit set-up using a PSTN. The PAD is capable of determining the data rate used by the terminal. The terminal will initially send a number of service request characters. This enables the PAD to initialise the standard values for the terminal as well as the data rate used by the terminal. Once this is done, then the PAD can establish the necessary virtual circuit through the PSTN.

Figure 12.14(a) shows where the PADs are situated relative to the different terminals connected to the PSTN. Figure 12.14(b) shows the situation where

G M Packet terminal

(a)

(b)

(c)

(d)

F-] A '

Terminal A protocol

Stz

-w-

Terminal F protocol

[ i F

i ! o I p,oto o,'~ X.28 -'~ X.25 ._I

i i i

i ~ x . s f . . . . . . . . . . . . . . . . . . . . . . . . . . . . i . . . . . . . . . . i : ; g 6 ~ ... . . . . . " . . . . . . . . . . . . . . . . . . . . . . . . . . . i I char=:te, | ~ F - F - - ~ ! ! /---4 L - . F - ~ I - J - - ~ Packet I I mode �9 IPADI IDCEI I / IDCEI I P S E i I I I PSEI IDCEI I ! IDCEI I mode I i"rE I / /~ I-! HH H I-4/---I H HH H ~T" I

,t X.29 =; | i

i . . . . . . . . . . . . . . . . . . . . . . . " ~ , ' " ' ~ 3 " . . . . . . . . . . . . . . . . . . . . i ; ] ' 6 " / ~ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ]

I mode i IDCEi i l IDCE! IPADI i PSE I i l I PSE i IDCEi i l IDCE! I mode I I ~.~ H , H I / - ~ H I--4/--I H ......... I-/H~ ~T ~-,I

- X.28 -~" X.25 ~= X.29 ~; I I | I

~x, xP~cket buffers

,~- X.3 -~ ,

PSE = Packet-switched exchange

Fig. 12.14 Packet assembler /d isassembler : (a) national usage; (b) near character -mode terminal; (c) remote from terminal; (d) internal structure

Page 291: analog and digital comm techniques pdf

274 ISO open systems interconnect seven-layer model

the PAD is situated relatively close to a character-mode terminal, i.e. in the same room. In Fig. 12.14(c) the PAD is situated some distance away from the charac- ter-mode terminal, i.e. in a street box.

Figure 12.14(d) shows that the PAD buffers the data that it receives from the character-mode terminal. Because the data is stored in the PAD, it can then packet the data for transmission over the X.25 network. At the receiver the PAD receives the packets and stores them so that it can transmit the complete message back to the character-mode terminal.

X.29 protocol The X.29 protocol lays down the recommendations for the communication between a PAD and a distant packet-switched terminal. The call request, call con- nect, data transfer and call disconnect are the same as the procedures used in X.25. In order for the distant packet-switched terminal to be able to identify the type of start-stop terminal, the PAD uses the first four octets of the identifier field. The distant packet-switched terminal can then use alternative protocols should they be required.

Also the Q bit in the header of each packet is used to inform the PAD that the data from the distant packet-switched terminal is either for the PAD or must be disassembled and sent to the start-stop terminal. If the Q bit is set then the data is meant for the PAD and if the Q bit is reset then the data is meant for the start-stop terminal.

X. 75 protocol This recommendation is for the establishment of virtual circuits between two signalling terminal exchanges (STE), which is normally required for international calls where one STE is in one country and the other STE is in a different country. The packet types are given in Table 12.9.

Table 12.9 Packet types for X.75

Packet type Protocol usage

Call request Call set-up Call connect

Clear request Call clearing Clear confirm

Data Data transfer Interrupt Interrupt confirm

Receiver ready Flow control Receiver not ready Reset confirm

Restart Restart Restart confirm

Page 292: analog and digital comm techniques pdf

Recommended interfaces 275

The format of the call request frame is shown in Table 12.10.

Table 12.10 Call request frame for X.75 I

8 7 6 [ 5 i

0 0 Modulo

' ! 3 1 ~ i 1 . . . .

Group , ,

Channel

. . . . . . . . Type .... ! I

Source address length Destination address length

Destination address Source address

! !

0 _[ 0 _[ Network utilities length I

Network utilities

0 [ 0 [ Facilities length ,

Facilities . . . . . . . .

User data

The format of the control frame is shown in Table 12.11.

Table 12.11 Control frame for X.75

8 7 6 [ 5 4 [ 3 ] 2

0 0 Modulo Group

1

Channel , , ,

Type . [ I

Additional fields . . . . . . . . .

The format of the data transfer frame is shown in Table 12.12.

Table 12.12 Data transfer frame for X.75

~ 7 ~l , 41 Q D Modulo

Channel

~ .... i M I Data fields

Group

~(s) l 0

Page 293: analog and digital comm techniques pdf

276 /SO open systems interconnect seven-layer mode/

DTE

DTE = Data terminal equipment DCE = Data circuit equipment STE = Signalling terminal equipment

X.75

Country A

DTE

Country B

Fig. 12.15 ISO and CCITT recommended protocols

Figure 12.15 shows where this standard is applied.

12.8.4 Transport layer

The transport layer can supply three types of service over five classes of circuit

protocol. The types of service are as follows:

�9 Type A: Reliable service (simple protocol). �9 Type B: Moderate service (more robust protocol).

�9 Type C: Poor service (complex protocol).

The five classes of protocol are as follows:

�9 TP0: class 0 - used on type A services. Flow control provided by the network.

�9 TPI" class 1 - used on type B services. Flow control provided by the network.

Basic error recovery. �9 TP2: class 2 - used on type A services. Multiplexes several transport connec-

tions over a single network connection. Provides flow control as this

must be done on a per transport connection basis. �9 TP3: class 3 - used on type B services. Error detection and recovery. Multiplexes

several transport connections over a single network connection. Flow con- trol provided as this must be done on a per transport connection basis.

�9 TP4: class 4 - used on type C services. Full error detection and recovery.

Employs check sums and timeouts for error detection and recovery.

Flow control provided due to poor quality link.

Page 294: analog and digital comm techniques pdf

Recommended interfaces 277

12.8.5 Session layer

The session layer regulates the data transfer and control for both half-duplex and full-duplex working. It inserts synchronisation points in the session for easy recovery if there is a failure.

12.8.6 Presentation layer

The protocol in the presentation layer is responsible for the establishment of pre- sentation connections and the release of these connections. It is also responsible for the transfer of data.

This layer also changes the format of the data to the required format of the terminal/computer.

Remote database access Distributed transaction processing File transfer access and management Job transfer access and management Virtual terminal Common application service elements Directory system/access

Layer 7 A

ISO 9579 ISO 10026

ISO 857111--4

ISO 8831/2

ISO 9040/1 ISO 8649150

pplication

Common management information ISO 9595/6 Interpersonal messaging X.420

ISO 8802.4

I ISO 2.5

Message handling service X.400

Teletex service Trx

Videotex TI000/I Facsimilie T0/4/5

ISO 9594 Directory services

Layer 6 Presentation i

ISO 8822131415 X.216/226 T50/51/61

Layer 5 Session

ISO 8326/7 i .a.215/225 T62

Layer 4 Transport ISO 8072/3 / X.214/224 T70

Layer 3 Network

ISO 8'8801847319542110589 X,213

ISO 8208/8881 i

ISO 8802.2

ISO 8802.3

T30 X25

Layer 2 l)ata link

" i X.212/222 r71

Layer I Physical

1450/1

144011

[ii ::ii Ix2'' v24111 ,,30,, " ' ' " ] X.21 ./bis

X.500/520

Fig . 12.16 Recommended protocols

Page 295: analog and digital comm techniques pdf

278 ISO open systems interconnect seven-layer model

12.8.7 Application layer

This protocol implements the actual application as required by the user.

12.9 ISO AND CCITT RECOMMENDED PROTOCOLS

Figure 12.16 shows the recommended protocols for each layer in the model.

12.10 REVIEW QUESTIONS

12.1 Describe the various categories into which data protocols fall. 12.2 Describe, using a diagram, the ISO seven-layer model. 12.3 Describe the functions and formats of the different types of frames produced

by the data link layer. 12.4 Using a diagram, describe how a layer can be sublayered. 12.5 Describe each of the following:

(a) Switched virtual circuit. (b) Permanent virtual circuit. (c) Connection-oriented services. (d) Connectionless-oriented services.

12.6 Describe the different types and classes of service provided by the transport layer.

12.7 Describe the reasons for and the functions of PADs.

Page 296: analog and digital comm techniques pdf

Answers to review questions

Chapter 1

1.1: A square wave consists of a fundamental frequency and all the odd harmonic frequencies. The initial phase of all these frequencies must be 0 ~ and they must all initially move in either a positive direction or a negative direction. The amplitude of each harmonic frequency must be the amplitude of the fundamental frequency divided by that harmonic number. 1.2: A sawtooth waveform consists of a fundamental frequency and all the har- monic frequencies. The initial phase relationship must be the same as that described for the square wave. The amplitude relationship must be the same as that described for a square wave. See Fig. 1.4 for the construction of the waveform. 1.3: (a) A sine wave is a continuous wave that has an infinite level range and consists of a single frequency. (b) An analogue waveform is a complex signal consisting of two or more frequencies that are added together. The waveform is continuous and has an infinite range of levels. (c) A true digital signal is a complex waveform that is a discontinuous signal and has a finite range of levels. 1.4: A true noise spike consists of a fundamental frequency and all the harmonic frequencies. However, each frequency in the noise spike has the same amplitude and hence because of the large amplitudes and large bandwidth of the signal they cause interference with telecommunication equipment or in some cases damage the equipment. 1.5: (a) Gain = 48.15 dB. (b) Loss = 10 riB. (c) Gain = 3.365 dB. 1.6: (a) Level = +7.4dBm. (b) Level = +18.34dBm. (c) Level = -6 .5dBm.

Chapter 2

2.1: For an unbalanced amplitude modulator the products of modulation are the USB, LSB and the cartier frequency. For a single balanced amplitude modulator the products of modulation are the USB, LSB and the modulating frequency. For a double balanced amplitude modulator the products of modulation are the USB and LSB only. 2.2: fa = 60 kHz to 108 kHz. LSB = 232 kHz to 280 kHz. USB - 400 kHz to 448 kHz. 2.3: LSB = 12kHz to 252kHz. USB = 612kHz to 852kHz.

Page 297: analog and digital comm techniques pdf

280 Answers to review questions

2.4: Modulation depth = 65.62%. 2.5: (a) Pc = 0.51 mW. (b) Pusa = PLSB - - 9 2 . 1 9 ~tW. (c) PsB = 184.39 laW. (d) Total power = 694.39 ~tW. (e) Efficiency = 26.55%. 2.6: A system that uses a modulation index of less than 0.5 is considered as a narrowband FM system and only transmits the carrier frequency together with the 1st USB and 1st LSB. A system that uses a modulation index greater than 0.5 is considered to be a wideband FM system and transmits multiple sidebands together with the cartier frequency. The relative power in each sideband and the carrier frequency is dependent on the actual modulation index. 2.7: Advantage: less affected by noise than AM. Disadvantage: very wide band- width.

Chapter 3

3.1: The transmitted signal must occupy a bandwidth much greater than the bandwidth of the modulating frequency. The bandwidth occupied by the transmitted signal must be determined by a prescribed waveform and not by the modulating frequency. 3.2: They aid privacy of the transmission since the spectral density of the spread spectrum may be less than the noise spectral density of the receiver. The de- spreading process in the receiver will spread the spectra of unwanted narrow band signals thus improving interference rejection. The effect on a spread spectrum receiver that receives a spread spectrum from a different spread spectrum system that uses the same frequency bands but implementing a different spreading pattern approximates to noise in the receiver. 3.3: See Section 3.6.1. 3.4: Hop set - this is the number of channels that are used by the system. Dwell time - this is the length of time that the system transmits on an individual channel. Hop rate - this is the rate at which the hopping takes place. 3.5: See Section 3.6.2, 'System operation'. 3.6: See Section 3.6.2, 'Synchronisation'. 3.7: Method 1: with this technique each binary bit is transmitted as a short pulse or chirp. The actual interval between each transmitted chirp is varied but each chirp has the same duration. Method 2" with this technique each chirp has a different duration. The start of each chirp takes place at the same point during the bit period. 3.8: See Section 3.7.

Chapter 4

4.1" Figure 4.3(a) is an ASK modulator. When the carrier frequency is such that the two diodes are forward biased, the full amplitude of the data signal appears on the output at the frequency of the carrier. When the carrier frequency is such that the two diodes are reverse biased, only a small amplitude carrier due to carrier

Page 298: analog and digital comm techniques pdf

Answers to review questions 281

leak appears on the output. Figure 4.3(b) is also an ASK modulator. When the carrier is such that the diodes are reverse biased, the peak output signal appears on the output at the frequency of the cartier frequency. When the diodes are forward biased by the cartier, only a small peak amplitude signal appears on the output due to carrier leak. 4.2: Refer to Fig. 4.5(a). The input data stream is applied to a digital to analogue converter. The analogue voltage is summed with the control voltage from a reference oscillator. This resultant control voltage is used to cause the VCO to change frequency such that when a logic 1 is applied the frequency increases to a maximum and when a logic 0 is applied the frequency drops to a minimum. The deviation is with reference to the reference frequency supplied by the reference oscillator. 4.3: Refer to Fig. 4.5(b). The input analogue signal is applied to the system by means of a filter which allows a frequency range equivalent to the frequency swing to be applied to the phase comparator. The resultant control voltage from the phase comparator is amplified by an amplifier. This control voltage varies in accordance with the frequency swing. The d.c. control voltage is applied to an analogue-to-digital converter which reproduces the digital signal. The con- trol voltage is also applied to the VCO which changes frequency in accordance with the control voltage and the VCO tries to track the varying frequency input. 4.4: Refer to Fig. 4.3. In this figure exchange the carrier frequency input with the data signal and the data input with the cartier frequency. 4.5: See Fig. 4.8(b). 4.6: See Fig. 4.9(b). 0112 appears in the fourth quadrant. 1012 appears in the first quadrant. 1102 appears in the third quadrant. 0012 appears in the first quadrant. 4.7: Present Quad Next Quad Phase Amplitude Output A B C D A B C D change a c B D b d a b 1 0 0 1 4 0 1 1 1 2 180 1 1 1 1 0 0 1 0

1 0 1 0 1 0 0 1 1 2 + 9 0 1 0 0 1 1 0 1 1

1 1 0 0 4 0 0 0 0 3 - 9 0 0 1 0 0 1 1 0 1

0 1 1 1 2 0 1 1 0 2 0 0 0 1 0 0 1 0 0 0 0 0 1 3 1 1 1 1 1 180 1 1 1 1 0 0 1 0

Data = (1 001) 1010 1100 Ol 11 0001 10102

4.8: Present Quad Next Phase Quad a b c d a b c d a c change A 1 0 0 1 4 1 0 1 0 I 1 180 3 0

1 0 1 0 1 1 1 0 0 1 0 + 9 0 2 0

1 1 0 0 4 0 1 1 1 0 1 - 9 0 3 0

0 1 1 1 2 0 0 0 1 0 0 0 2 0 0 0 0 1 3 1 0 1 0 1 1 180 1 1

c d 1 0

0 0 1 1

0 1 1 0

Amplitude C b d B D A

1 0 0 1 1 0

1 1 0 0 1 0

0 1 1 0 0 0

1 0 1 1 0 0

1 0 0 1 1 1

Data = 0111 0011 0000 0110 11112

Output B C D

1 l 1

0 l 1

0 0 0

1 1 0

1 1 1

Page 299: analog and digital comm techniques pdf

282 Answers to review questions

Chapter 5

5.1" See Section 5.7.1. 5.2: See Fig. 5.4. 5.3: (a) Bit duration = 152.53 ns. (b) Time slot duration = 1.22 ItS. (c) Frame duration = 48.81 ~ts. (d) Multiframe duration = 976.2 ItS. 5.4: Sampling frequency of signalling channel = 500 Hz. 5.5: Alarms at town A: FAL, MFAL. Alarms at town B: RFAL, RMFAL. 5.6: When, say, terminal A loses multiframe alignment then the MFAL alarm at that terminal becomes active and the receive signalling circuits are disabled. Bit 2 in the MFSW is set by the multiframe alarm detector circuit which is then trans- mitted to terminal B. At terminal B, bit 2 in the MFSW is detected as being set and causes the RMFAL alarm to become active. This inhibits the transmit signalling circuits.

Chapter 6

6.1: Noise voltage = 395.38 nV. 6.2: Electrostatic and electromagnetic coupling can be minimised by proper screening of the IF, RF and power supply circuits. Crosstalk can be reduced by separating the transmit cable pairs from the receive cable pairs. Thermal noise can be reduced by cooling the active components. 6.3: SNR = 54.15 dB. 6.4: SNR = 42.76 dB. 6.5: (a) Order = amplifier C first, amplifier B second, amplifier A last. Amplifier C has lowest noise figure and gain, amplifier A has the highest noise figure and gain. (b)/7(3) = 1.57. (c) TA = 435K, TB = 203K, Tc = 58K. (d) T(3)= 165.3K. 6.6: (a) FB = 1.15. (b) Order = amplifier B first, amplifier C second and amplifier A last. (c) F3 - 1.237. (d) TA -- 435K, TB = 43.5K, Tc = 58K. (e) T ( 3 ) - - 68.73K.

Chapter 7

7.1: Amplitude distortion occurs when the attenuation of a medium is not con- stant for all frequencies. On metallic pairs the higher frequencies are attenuated more than the lower frequencies. This results in a different amplitude relationship between the fundamental frequency and the harmonic frequencies at the receiver relative to the transmitter, and causes the output signal at the receiver to be dis- torted relative to the input signal to the transmitter. 7.2: The fundamental frequency and the different harmonic frequencies travel at different velocities down a transmission medium other than free space. This means that the phase relationship between the fundamental frequency and the harmonic frequencies at the input to the receiver is different to that at the output of the transmitter. This distortion causes the signal to contain harmonic frequencies that were not present in the original signal.

Page 300: analog and digital comm techniques pdf

Answers to review questions 283

7.3: Refer to Fig. 7.4. Along each section noise from external sources is induced into the transmission medium. The signal is attenuated as it propagates down the transmission medium. At the first repeater both the signal and the noise are ampli- fied. Hence at the output of the first repeater the signal-to-noise ratio is worse than it was at the output of the terminal repeater. The same effect takes place in all subsequent sections, resulting in a degraded signal-to-noise ratio at the input to the distant receiver. If too many repeaters are used between the trans- mitter and receiver then the noise could swamp the signal, making the system unusable. 7.4: In a digital system the signal is regenerated at each repeater. This means that the noise in the previous section is left behind in that section and is not carried forward to the next section. The digital signal is recreated by the regenerator and hence the signal-to-noise ratio at the distant receiver is the same as that at the output of the transmitter. 7.5: Refer to Fig. 7.7. Because all frequencies do not travel at the same velocity down the transmission medium this has the effect of causing the digital pulse to spread out. This spreading out can cause interference with the previous and post digital pulses and can cause a logic 0 to be decoded as a logic 1 instead.

Chapter 8

8.1: Refer to Fig. 8.3. Because the transmission media such as metallic pairs attenuate the higher frequencies more than the lower frequencies, the Gaussian white noise which has a constant amplitude across the full frequency range, affects the higher frequencies more than the lower frequencies and as a result is some- times referred to as triangular noise. 8.2: Total number of characters = 15510. P(x~) for A = 25/155 = 0.161; for B = 32/155 = 0.206; for C = 12/155 = 0.078; for D = 4 / 1 5 5 = 0 . 0 2 6 ; for E = 6 4 / 1 5 5 = 0 . 4 1 3 ; for F = 1 8 / 1 5 5 = 0 . 1 1 6 . S(x) = 2.20510. 8.3: (a) C = 46.508 kb/s. (b) C = 20.111 kb/s. (c) C = 11.479 kb/s. 8.4: x = 3.5857. P(b) = 179.647 • 10 -6. 8.5: x = 5.071. P(b) = 205.053 x 10 -9 8.6: C = 50.49 kb/s.

Chapter 9

9.1: ASCII = American Standards Institute Code for Information Interchange. EBCDIC = Extended Binary Coded Decimal Code. 9.2: (a) S(x) = 2.3310. (b) Huffmann codes are determined using the tree and state diagrams in Figure A. 1.

Page 301: analog and digital comm techniques pdf

284 Answers to review questions

Fig. A. 1

A (0.305)

B (0.305)

C (0.15)

D (0.08)

E (0.08)

F (0.08)

~ -~ (0.61) -

- - (0.23).

~ -- (0.16) ....

Tree diagram

(0.39)

1

! 0.61

1

1

I

1

101 31 !

I 10.391

i

State diagram

xi P(xi)

A 0.305

B 0.305

Code ni

11 2

10 2

C 0.15 011 3

D 0.08 010

E 0.08 001 . . . . .

F 0.08 000

Sum ni" P(xi)

, 1~ ..... i

r t i �9 P(xi) . . . .

0.610

0.610

0.450

0.240

0.240

0.240 . . . . .

2.390

(I.0)-

(c) Compress ion rate = 1.255. (d) Efficiency = 97.49%

9.3: Total number of characters = 105010. P(xi) for A -- 0.195; for B = 0.174; for

C = 0.17; for D = 0.17; for E = 0.08; for F = 0.08; for G = 0.05; for H = 0.05;

for I = 0 . 0 3 1 . (a) S(x)= 2.938610. (b) Huf fmann codes for A = 11; for

B = 101; for C = 100; for D = 011; for E = 010; for F = 0011; for G = 0010;

for H = 0001; for i = 0000. (c) Compress ion = 1.326. (d) Efficiency = 97.43%.

9.4: (a) r = 4. (b) (n,k)= (16, 5). (c) H a m m i n g code = 011102. Transmi t t ed

da ta = 01001100101010102. (d) Efficiency = 75%. (e) Redundancy = 25%.

9.5: Received H a m m i n g code = 010112. Receiver-determined H a m m i n g

code = 011102. The received da ta has been errored.

Page 302: analog and digital comm techniques pdf

Answers to review questions 285

C h a p t e r 10

10.1" If an even number of bits in the bit stream are errored by the medium then

the receiver will determine the status of the receiver parity bit to be the same as the

receiver determined status of the parity bit and hence the data will be accepted as

being error free.

10.2: ASCII character P = 10110002. For even parity the parity bit = 1. Trans-

mitted data = 000011011112. For odd parity the parity bit = 0. Transmit ted

data = 000011010112.

10.3: For even parity,

G = 10011102, even parity bit = 0

0 = 11011112, even parity bit = 0

a = 11010002, even parity bit = 1

l = 11000112, even parity bit = 0

Transmit ted data:

G = 001110010112

0 = 0I l l10110112

a = 000010111112

l = 011000110112 Tx data = 001110010110111101101100001011111011000110112

For odd parity,

G = 10011102, odd parity bit = 1

0 = 11011112, odd parity bit = 1

a = 11010002, odd parity bit = 0

l = I 1000112, odd pari ty bit = 1 Transmit ted data:

G = 00I l l0011112

o = 0I l l10111112

a = 000010110112

l = 011000I l l112 Tx data = 001110011110111101111100001011011011000111112

10.4: If two or more bits are errored then al though the VRC and H R C at the

receiver would detect that there are errors in a word or words and a column or

columns, the receiver would be unable to uniquely identify the errored bits and

hence correct the errors.

1 0 . 5 : C R C - 4 = ll002

10.6: Received CRC-4 = 01112. Receiver-generated CRC-4 = 11012. Hence the

received bit stream has been errored.

10.7: Data = 01 l0 002 (two zeros must be added to clear the registers). Data = 0 l 1 0 0 0 Path = a - a a - b b - d d - c c - a a - a

Code = 00 11 01 01 11 00 Trellis code -- 0011010111002.

Page 303: analog and digital comm techniques pdf

286 Answers to review questions

Chapter 11

11.1" D.c. component: For transmission lines the d.c. component should be removed to enable correct detection of the individual bits at the receiver. The elim- ination of the d.c. component enables a.c. coupling to take place and eliminates the resultant low frequency which could affect adjacent pairs through crosstalk.

Self-clocking: Symbol or bit synchronisation is required for digital communica- tion and is achieved by having the clock frequency embedded in the bit stream.

Error detection: Some schemes have the means of detecting data errors without introducing additional error detection bits into the data sequence.

Bandwidth compression: Some schemes increase the efficiency of the available bandwidth by enabling more information to be conveyed when compared to other schemes using the same type of medium.

Noise immunity: Some schemes display a bit error rate that is better than other schemes, when they are transmitted over similar media having similar signal-to- noise ratios. 11.2: Non-return to zero codes; return to zero codes; phase-encoded codes; multi- level binary codes. 11.3: D a t a s t ream - 1 0 0 1 l 1 0

A D I - l l 0 0 l 0 0

A M I = + M - M O 0 +MO 0

The code must be shown as an RZ code. 11.4: D a t a = l 0 0 l 1 1 0 1

A D I = 1 1 0 0 1 0 0 0

H D B - 3 = + M - M O 0 +MO 0 0

The code must be shown as an RZ code. 11.5: Data = 1 0 0 l l l 0 Code = l0 1 0 l0 10 l0 l 11.6: D a t a = l 0 0 l 1 l 0

Code = l0 01 01 l0 l0 l0 01

1 0 1 1 1 0 1 0 0 0 0 2

0 0 0 1 0 0 0 0 1 0 12

0 0 0 - M 0 0 0 0 + M 0 - M

0 1 1 1 0 1 0 0 0 02

0 0 1 0 0 0 0 1 0 1

+ V 0 - M O 0 0 - V + M O - M

1 0 01 0

1 1 1 0 1 0 0 0 02 10 10 10 1 01 0 1 0 12

1 0

l0 01 1 1 1 0 1 0 0 0 0 2

10 10 10 01 10 01 01 01 012

Chapter 12

12.1: Stop and wait protocols: These protocols are message oriented. The complete message must be transmitted to a switching computer and stored in the computer memory. Only once the complete message is stored in the memory is it then sent to the next computer. The switching computer must have a very large memory as it must serve several users simultaneously. The message transfer is slow through this system. The emphasis is on storage of the message and not on message transfer. For large messages the other users are forced to wait and hence the users are not fairly serviced.

Page 304: analog and digital comm techniques pdf

Answers to review questions 287

Continuous protocols: In this system the message is broken up into small packets. The packets are continuously transferred to the switching computer. The switch- ing computer stores the packet before transmitting it to the next computer. The emphasis here is on forwarding the data and not on storage. The memory of the switching computer is smaller and the system is a lot faster in that the users are more efficiently served. 12.2: Application layer, presentation layer, session layer, transport layer, net- work layer, data link layer, physical layer. 12.3: Frames are the information frame, supervisory frame, and unnumbered frame. They are discussed in Section 12.8.2. 12.4: See Section 12.6.8. 12.5: See Section 12.8.3. 12.6: See Section 12.8.4. 12.7: See Section 12.8.3.

Page 305: analog and digital comm techniques pdf

Bibliography

The ARRL Handbook for Radio Amateurs, 73rd Edition. The American Radio Relay League, 1996.

Green, D. C., Transmission Principles for Technicians, 2nd Edition. Longrnan Scientific & Technical, 1991. ISBN 0-582-99461-6.

Helmers, S. A., Data Communication, a Beginners' Guide, 1st Edition. Prentice-Hall, 1989. ISBN 0-13-198870-0.

Kennedy, D., Electronic Communication Systems, 4th Edition. McGraw-Hill International Editions, 1992. ISBN 0-07-112672-4.

Mazda, F. (editor), Telecommunication Transmission Principles, 1st Edition. Butterworth- Heinemann, 1996. ISBN 0-240-51452-1.

Sklar, B., Digital Communication Fundamentals and Applications, 1st Edition. Prentice-Hall International Editions, 1988. ISBN 0-13-212713-X.

Reyner, J. H. and Reyner, P. J., Radio Communication, 2nd Edition. Pitman, 1967.

Page 306: analog and digital comm techniques pdf

Index

aliasing distortion 104, 105, 106 aliasing filter 116 alternate digit inversion (ADI) 118, 119,

237-9 alternate mark inversion (AMI) I 18, 119,

233, 235, 236-7 American Standards Institute Code for

Information Interchange (ASCII) 170, 171-2, 173, 185, 186, 189

amplitude distortion 146-7, 148, 158 amplitude modulation (AM) 17, 18, 45

amplitude shift key (ASK) 60, 61, 67 carder leak 37 Cowan modulator 35-7, 61-2 double balanced ring modulator 37-8 double sideband transmission (DSB) 19,

21 lower sideband (LSB) 18-23, 60 modulation depth 28-35 100% modulation 29-30 over modulation 29-31 power in sidebands 32-5, 38 single balanced ring modulator 35-6,

61-2 sidebands 18 single sideband transmission (SSB) 23 upper side band (USB) 18, 20-3, 60

amplitude shift key modulation (ASK) 60, 61, 67

analogue signal 2, 149, 150 analogue to digital converter (A/D) 63 angle modulation 17, 39 answers to review questions 279-87 application layer 252, 253, 255, 278 asynchronous transmission 170, 188, 189,

249 audio frequency band 16 automatic repeat request (ARQ) 247, 248,

250

bandwidth compression 232 bel 8, 139, 140

Bessel functions 39, 41 bibliography 240 binary prime number 194-5, 196-7 bi-phase-mark 240, 241 bi-phase-level 240, 241-2 hi-phase-space 240, 242 bipolar bit stream 163, 168 bit error 160 bit error rate 156, 159, 165, 166, 167, 168 bit stream rate 156 block check codes 193

carrier leak 37 cascaded networks 9-10, 136, 137 CCITT 16, 24, 102, 255, 278 CEPT 101 channel associated signalling 120 chirp 56, 57 coding

alternate digit inversion (ADI) 118, 119, 237-9

alternate mark inversion (AMI) 118, 119, 233, 235, 236-7

bi-phase-mark 240, 241 bi-phase-level 240, 241-2 bi-phase-space 240, 242 delay modulation 240, 242-3 high density bipolar-format n

(HDB-n) 235, 237 high density bipolar-format 3

(HDB-3) 118, 119, 237, 238, 239-40 parity bit 238, 239 violation bit 238, 239

Manchester I 240, 241 Manchester II 240, 241-2 Miller code 242-3 non-return to zero-level (NRZ-L) 118,

119, 120, 232-3, 239, 240 non-return to zero-mark (NRZ-M) 232,

233, 234-5 non-return to zero-space (NRZ-S) 232,

233, 234

Page 307: analog and digital comm techniques pdf

290 Index

coding (cont.) phase encoded 232, 240-3 polar return to zero (PRZ) 233, 235,

236 pulse duration modulation (PDM) 240,

243, 244-5 pulse modulation 232, 243 pulse position modulation (PPM) 240,

243-4 return to zero (RZ) 232, 235, 238, 240 unipolar return to zero (URZ) 118, 233,

235, 239 commercial speech band (AF) 16 common channel signalling 121 complex waveforms 4 composite modulation 17 compression rate 175, 177 connection oriented circuit 270 connectionless oriented circuit 270 constellation diagram 72, 73, 74, 76, 77, 79,

80, 81, 82, 83, 85, 91 convolutional encoding 203-30

connection pictorial 203 state diagram 203, 206-7 tree diagram 203, 206, 207-9, 210 trellis diagram 203, 209-30

cosine wave 2 Cowan modulator 35-7, 61-2 cyclic redundancy check 193, 194, 195,

197-203, 261

data circuit equipment (DCE) 59, 256, 257, 270, 276

data link layer 252, 254, 255 data terminal equipment (DTE) 59, 255,

257, 270, 276 dBm 11-12 dBmO 12-13 dBr 12-13 decibel 9-10, 13, 108, 134, 138, 139, 140,

161,162, 164, 165, 166, 167, 168 decryption 49 delay modulation 240, 242-3 delta modulation 17 descrambler 47, 49-50 deviation ratio 41, 64-5 dibit 68 digital signal 3, 151, 152

edges 3-4 leading edge 3-4 practical 3-4 square wave 5-6, 146, 147 theoretical 3-4 trailing edge 3-4

digital to analogue converter (DAC) 71, 72, 73

direct sequence (DS) spread spectrum system 47, 50, 51, 57

double balanced ring modulator 37-8 double sideband transmission (DSB) 19, 21 dwell time 52, 53, 54 dynamic range 42

effective noise temperature 141-4 efficiency 33, 34, 35, 175, 177, 180, 181,

189 electromagnetic spectrum (EM spectrum)

15-16 encryption 49 entropy 156, 157, 173 error bursts 193 error detection 185, 187-9, 210-30, 232 European standard 101 extended binary coded decimal code

(EBCDIC) 172, 173 external noise 132

static 132, 133 radiation 132, 133 crosstalk 132, 133 mains induction 132 voltaic 132, 133 line noise 133

extra high frequency band 16 eye diagram 153-4

frame alignment 101, 103, 104, 116, 121, 122, 123, 124

frame check sequence (FCS) 193, 194 frequency

band classification 15-16 common frequency ranges 1

deviation 39, 40 distortion 147-8, 149 frequency shift key (FSK) 60 fundamental 4-7, 147, 148, 158 harmonic 4-8, 147, 148, 158 modulation (FM) 17, 39, 45 sine wave 5-7 square wave 5-6, 146, 147 swing 40 units of measurement 1

frequency division multiplexing (FDM) 24-8, 97

12 MHz coaxial cable system 24-8 frequency hopping (FH) spread spectrum

system 47, 52-6, 57 frequency modulation (FM) 17, 39, 45

bandwidth 43, 64-5

Page 308: analog and digital comm techniques pdf

Index 291

Bessel functions 39, 41 deviation ratio 41, 64-5 dynamic range 42 frequency deviation 39, 40 frequency swing 40 modulation index 39-41, 64 narrow band FM 41 sidebands 40, 41 signal suppression 42 signal to noise ratio 42 transmitter efficiency 42 wide band FM 42

frequency shift key modulation (FSK) 60, 61-4

gain or loss 8-10 Gaussian white noise 159-60, 161, 163, group delay 147

Hamming coding 179-83 Hamming distance 180 high density bipolar-format n

(HDB-n) 235, 237 high density bipolar-format 3 (HDB-3)

see coding high frequency band (HF) 16 hop rate 52 hop set 52 horizontal redundancy check (HRC)

190-3 Huffmann coding 173-9

impulse noise 133 index 39-41, 64 integrating filter 120 interface coding see coding internal noise 127

l / f noise 127, 130 component noise 127 contact noise 128 effective noise temperature 141-4 electromagnetic and electrostatic

induction 130 equipment noise 130-2 Johnson noise 128 partition noise 128, 130 shot noise 128, 129-30 system noise 127, 130-2 thermal noise 128, 133 two tone method of measurement 131-2

International Standards Organisation (ISO) 247, 251,255, 278

International Telecommunication Union (ITU) 24, 100, 104, 255

recommended sampling 105 intersymbol interference 152-3

lagging edge 3, 4 leading edge 3, 4 limited bandwidth 149, 156 line coding see coding logical channel number (LCN) 270, 271,

261-8, 277 longitudinal redundancy check 190 low frequency band (LF) 16

Manchester I code 240, 241 Manchester II code 240, 241-2 medium frequency band (MF) 16 message switching 248 message transfer 248 Miller code 242-3 modem 59

low speed 64 modulation

amplitude modulation (AM) 17-18, 45 angle modulation 17, 39 composite modulation 17 delta modulation 17 frequency modulation (FM) 17, 39, 45 phase modulation (PM) 17, 39, 43-5, 50 phase shift key modulation (PSK) 17, 50 pulse amplitude modulation (PAM) 17,

97-8 pulse code modulation (PCM) 17, 97 pulse duration modulation (PDM) 17 pulse position modulation (PPM) 17 pulse width modulation (PWM) 17 quadrature amplitude modulation

(QAM) 17, 60 multiframe alignment 101, 104, 116, 118,

120, 122, 123

narrow band FM 41 negative edge 3, 4 network layer 252, 254, 268-72, 277

connection oriented circuit 270 connectionless oriented circuit 270 logical channel number (LCN) 270, 271,

261-8, 277 permanent virtual circuit (PVC) 269 switched virtual circuit (SVC) 269

noise amplitude distortion 146-7, 148, 158 effects of noise 149-51 external noise 132

crosstalk 132, 133 line noise 133

Page 309: analog and digital comm techniques pdf

292 Index

noise (cont.) mains induction 132 radiation 132, 133 static 132, 133 voltaic 132, 133

figure/noise factor 127, 134-41,142, 144 cascaded systems 136

frequency distortion 147-8, 149 group delay 147 immunity 232 impulse noise 133 internal noise 127

1/f noise 127, 130 component noise 127 contact noise 128 effective noise temperature 141-4 electromagnetic and electrostatic

equipment noise 130-2 induction 130 Johnson noise 128 partition noise 128, 130 shot noise 128, 129-30 system noise 127, 130-2 thermal noise 128, 133 two tone method of measurement

131-2 noise figure/noise factor 127, 134-41,

142, 144 cascaded systems 136

noise spike 7-8 signal to noise ratio (SNR) 108, 133, 134,

135, 140, 161,162, 163, 164, 165, 166, 167, 168, 169

non-linear quantising 106, 107, 108 non-return to zero-level (NRZ-L) 118, 119,

120, 232-3, 239, 240 non-return to zero-mark (NRZ-M) 232,

233, 234-5 non-return to zero-space (NRZ-S) 232, 233,

234 North American standard 101 Nyquist bandwidth 79, 80, 81, 82, 83 Nyquist sampling 105, 106

open systems interconnect model (OSI) 247, 251-5

application layer 252, 253, 255, 278 data link layer 252, 254, 255, network layer 252, 254, 268-72, 277

connection oriented circuit 270 connectionless oriented circuit 270 logical channel number (LCN) 270,

271, 261-8, 277 permanent virtual circuit (PVC) 269

switched virtual circuit (SVC) 269 null layers 253 physical layer 252, 254, 255-61,277 presentation layer 252, 253, 255, 277 session layer 252, 253, 255, 277 transport layer 252, 253, 254, 255, 276,

277

packet assembler/dissembler (PAD) 272 parity 185, 186, 187, 188, 189, 238, 239 permanent virtual circuit (PVC) 269 personal computer (PC) 59 phase encoding 232, 240-3 phase modulation (PM) 17, 39, 43-5, 50

bandwidth 79-83 binary phase shift key (BPSK) 50-1, 83 constellation diagram 72, 73, 74, 76, 77,

79, 80, 81, 82, 83, 85, 91 differential phase modulation 83, 84 eight phase shift key (8 PSK) 66, 70-4, 81,

83 eight PSK differential phase 84-9 four phase shift key (4 PSK) 66, 68-70,

80, 83 Nyquist bandwidth 79, 80, 81, 83 phase shift key (PSK) 50, 67 phasor 69-70 practical 8 PSK 73-4 quadurature amplitude modulation

(QAM) 60, 83 quadrature phase shift key (QPSK) 50, 60,

83 sixteen phase shift key (16 PSK) 66, 75-6,

82, 83 sixteen quadrature amplitude

(16QAM) 66, 76, 79, 81 sixteen QAM differential phase 89-95 sixty four QAM 82 symbol rate 66, 68, 69, 71, 75 theoretical 8 PSK 71-3 two phase shift key (2 PSK) 66-8, 82, 83

physical layer 252, 254, 255-61,277 polar return to zero (PRZ) 233,235, 236 positive edge 3, 4 power ratio 8 presentation layer 252, 253, 255, 277 protocols

asynchronous 249 binary synchronous (BISYNC or BSE)

249-51 bit orientated 249, 251 byte orientated 249, 251 character orientated 249 continuous protocol 248

Page 310: analog and digital comm techniques pdf

Index 293

full-duplex operation 248 half-duplex operation 248 high level data link control (HDLC) 251,

261-8 information frame 262-4 supervisory frame 264-6 unnumbered frame 266-8

protected asynchronous 249 simplex operation 248 stop and wait 248 V. 11 256, 259, 261 V.24 255, 256, 257-9 V.35 256, 259, 261 V.21 255, 256, 259 X.21 bis 256 X.3 272 X.28 272-3 X.29 272, 274 X.75 272, 274-6 X.213 269-70

pseudorandom code generator 47-8 pseudorandom noise code generator

(PN) 47, 50-5, 57 public switched telephone network

(PSTN) 59, 257 pulse amplitude modulation 97-8 pulse code modulation (PCM) 97, 237

alarms 122 bit error rate alarm (BER) 122 frame alignment alarm (FAL) 122,

123 loss of clock (CLA) 122 multiframe alignment alarm

(MFAL) 122, 123 remote frame alignment alarm

(RFAL) 122, 123 remote multiframe alignment alarm

(RMFAL) 122, 123 aliasing distortion 104, 105, 106 aliasing filter 116 bit duration 103 channel amplifier 116, 120 channel switch 116, 120 combiner 118 decoder 120 decombiner 119 encoding 106, 112-16, 117, 118, 119 frame alignment 121, 122, 123 frame alignment word (FAW) 101,103,

104, 116, 122, 124 frame duration 102 frame service word (FSW) 101,103, 104,

116, 118, 119, 122 frame structure 101-2

gross line bit rate 103 integrating filter 120 ITU recommended sampling 105 junction cable 125 linear quantising 106, 107 line coding/decoding 118, 119 multiframe alignment 122, 123 multiframe alignment word

(MFAW) 101,104, 116, 118, 120, 122 multiframe duration 103 multiframe service word (MFSW) 101,

103, 104, 116, 118, 120, 122, 123 multiframe structure 101-2 non-linear quantising 106, 107, 108

A law 108 #law 108

Nyquist sampling 105, 106 pulse amplitude modulation 97-8 quanta 107, 110, 111 quantisation noise 107 quantising 106, 117 quasi-logarithmic quantising scale 109 regenerator (dependent) 119, 124, 126,

150, 151 power feeding 124, 125, 126

sampling theorem 102 sidebands 104, 105 signalling 118, 120, 121, 122, 123

channel associated signalling 120 common channel signalling 121

the 30/32 channel CEPT PCM system 101-26, 237

thirteen segment quantising scale 110, 111

time division multiplexing 97, 98, 99, 100, 104

time slots 101,103 time slot duration 103 time slot usage 103-4 timing 117, 118, 119, 125 transformer 119 Z screen cable 125

pulse duration modulation (PDM) 240, 243, 244-5

pulse position modulation (PPM) 240, 243-4

pulse repetition time (PRT) 4

quadrature amplitude modulation (QAM) 17, 60

quanta 107, 110, 111 quantising 106, 117 quantisation noise 107 quasi-logarithmic quantising scale 109

Page 311: analog and digital comm techniques pdf

294 Index

redundancy 180, 181, 189, 193, 254 regenerator (dependent) 119, 124, 126, 150,

151, power feeding 124, 125, 126

repeater 149, 150 return to zero (RZ) 232, 235, 238, 240 review questions 13, 45, 58, 95, 126, 144,

154, 169, 184, 203, 246, 278 ring modulators 35-8, 61-2, 67 RS232C port 185, 188, 252, 255, 257 RS422 260 RS423 260 RS449 256, 259-61

sampling theorem 102 sawtooth wave 6-7 scrambler 47, 49-50 semantics 156 session layer 252, 253, 255, 277 Shannon & Hartley capacity theorem

165-8 signal energy 161, 163 signal level

bel 8, 139, 140 dBm 11-12 dBmO 12-13 dBr 12-13

decibel 9-10, 13, 108, 134, 138, 139, 140, 161,162, 164, 165, 166, 167, 168

gain or loss 8-10 power ratio 8

signalling 118, 120, 121, 122, 123 channel associated signalling 120 common channel signalling 121

signalling terminal equipment (STE) 274, 276

signal suppression 42 signal to noise ratio (SNR) 108, 133, 134,

135, 140, 161, 162, 163, 164, 165, 166, 167, 168, 169

sine wave 2, 5-7 single balanced ring modulator 35-6,

61-2 single sideband transmission (SSB) 23 sinusoidal wave 2 speech waveform 2 spread spectrum systems 46-7

bandwidth 46, 54 chirp 56, 57 criteria 47 decryption 49 descrambler 47, 49-50 direct sequence (DS) 47, 50, 51, 57 dwell time 52, 53, 54

encryption 49 frequency hopping (FH) 47, 52-6, 57 frequency synthesiser 53, 55 hop rate 52 hop set 52 personal identification number (PIN) 55,

56 pseudorandom code generator 47-8 pseudorandom noise code generator

(PN) 47, 50-5, 57 random data 49 reasons for 47 scrambler 47, 49-50 state diagram 203, 206-7 synchronisation 54, 56 time hopping (TH) 46, 56, 58

super high frequency band (SHF) 16 switched virtual circuit (SVC) 269 synchronous transmission 170 syntax 156 system performance 133

the 30/32 channel CEPT PCM system 101-26, 237

time division multiplexing 97, 98, 99, 100, 104

time hopping (TH) spread spectrum system 46, 56, 58

trailing edge 3, 4 transmitter efficiency 42 transport layer 252, 253, 254,

255, 276, 277 tree diagram 203, 206, 207-9, 210 trellis diagram 203, 209-30 triangular noise 159-60 types of signals 2

analogue signal 2 digital signal 3

ultra high frequency band (UHF) 16 universal asynchronous receiver transmitter

(UART) 185, 186 unipolar bit stream 161, 168 unipolar return to zero (URZ) 118, 233, 235,

239

vertical redundancy check (VRC) 190-3 very high frequency band (VHF) 16 very low frequency band (VLF) 16 violation bit 238, 239 voltage controlled oscillator (VCO) 62-4 V. 11 256, 259, 261 V.24 255, 256, 257-9 V.35 256, 259, 261

Page 312: analog and digital comm techniques pdf

Index 295

wavelength 3 wide band FM 42

X.21 255, 256, 259 X.2 Ibis 256

X.3 272 X.28 272-3 X.29 272, 274 X.75 272, 274-6 X.213 269-70

Page 313: analog and digital comm techniques pdf

Printed in the United Kingdom by Lightning Source UK Ltd. 118416UK00001 B/99-100 IIUsJ!!!III, Ilill

312 ]!11