sec -3.2, fundamental of transmission
DESCRIPTION
Fundamentals of Digital Transmission, In coding and Modulation Techniques, Definition and description of Digital Hierarchies, Digital Multiplexing Concepts, Signal Justification and Control, Jitter and Line codingTRANSCRIPT
Fundamental of Transmission
SECTION 3.2
Fundamental of Digital Transmission, Encoding & Modulation
Techniques, Definition & Discription of Digital hierarchies, Digital
Multiplexing concepts, Signal justification & Control, Jitter & Line
Coding
BRBRAITTJabalpur, issued in january-2006 0
Fundamental of Transmission Sec. 3.2
FUNDAMENTAL OF DIGITAL TRANSMISSION
Introduction
Basically there are two ways in which information of any type can be
transmitted over telecommunication media – analog or digital. Analog means that
the amplitude of the transmitted amplitude signal varies over a continuous range.
Digital transmission means that a stream of on/off pulses are sent on the
transmission media. The pulses are referred to as bits. Examples of analog signals
are human voice, hi–fi music, temperature reading, etc. While that of digital are data,
telegraphy signals.
Telecommunication systems started with the transmission of digital signals. In
fact, non–electric signalling systems date back over 2000 years. The Greek General
Polybius is known to have used a scheme based on an array of 10 torches in 300
B.C. and Roman armies made extensive use of a form of samaphore signalling.
Claude Chappe, Sommering, Wheatstone and Cook were all experimenting with
different kinds of Telegraphy till it was perfected by Mores. In all this, only written
message was transmitted and message was converted to a coded signal to match
the characteristics of a transmission line. Gary, Bandot and others developed other
codes which were mainly used in Telegraph network. Thus, we can say, by 1972
most of the basic techniques of digital transmission had been discovered.
In 1876, Alexander Graham Bell invented the Telephone and as means of
communication, the telephone was fast, personal and convenient. It needed no
training in the use of codes and so made electrical communications directly
accessible to the general public. Thus, telephone began to dominate the
development of communications. Telephony involves the transmission of analog
signals and when a practical amplifying service appeared in the form of the
thermionic valve, this also proved suitable for dealing with analog signals. Hence,
after 1880, the developing Telecom networks were basically designed to handle
analog transmissions and to an increasing extent, the digital transmission in the form
of telegraphy had to be adopted to fit in with the characteristics of these networks.
BRBRAITTJabalpur, issued in january-2006 1
Fundamental of Transmission Sec. 3.2
By 1950s, the world's communications systems were based entirely on analog
transmission.
However, interest in the digital transmission received an impetus after the
publications of classic papers of Nyquist and Shannon. With the invention of pulse
code modulation by Reeves in 1938, the basic principles for digitizing analog speech
signals were established. However, the technical means for transmitting digitized
speech signals were not available at that time. It was not until the transistor came
into use that indications of the economic advantages of digital techniques as
compared to analog methods became apparent. LSI and VLSI techniques that are
now available have made digital communications far more economical as compared
to analog methods became apparent. LSI and VLSI techniques that are now
available have made digital communications far more economical as compared to
analog systems. Digital transmission systems are gaining more acceptance in view
of : (1) introduction of digital switching systems, (2) the need to transmit non voice
signals which are increasingly becoming important instead of the plain old
Telephone service, and (3) the introduction of new media like optical fibres,
waveguide which are more suitable for digital transmission systems, will be
introduced in the network and by the turn of the century, most of the countries would
have gone completely digital.
Advantages of Digital Communication
(i) Fig.1 shows the qualitative representation of the signal to noise ratio
along a transmission line. In both analog and digital systems the signal power P is
subject to line attenuation which can be compensated by repeaters. However, a
main difference exists in the accumulated noise power N. In the transmission of
analog signals, this power Na is amplified in linear repeaters by the same factor as
the useful signal and the noise contributions from the individual repeater section
accumulate. In the digital transmission on the other hand, the signal is practically
achieved of the noise Nd with the aid of regenerative repeaters. Residual noise may
only become effective in the form of digital errors and jitter due to regeneration,
reshaping and retiming (3 Rs.) carrier out section by section, only the digital errors
BRBRAITTJabalpur, issued in january-2006 2
Fundamental of Transmission Sec. 3.2
are accumulated while the noise is not. The need to recognize only the presence or
absence of a pulse makes the system highly immune from noise. Thus, the
transmission quality is almost independent of distance and method of transmission
involved. This is of particular value in transmission paths subject to extreme
interference such as for instance in space flights or in communications with
interplanetary probes.
Fig. 1 Signal to Noise Ratio Along A X–Mission Path
BRBRAITTJabalpur, issued in january-2006 3
Fundamental of Transmission Sec. 3.2
(ii) Compatibility of different media : Cables, radio links, switching equipment can
be interconnected without decoding the digital signals by means of relatively cheap
interface equipment which contributes little or no impairment to the signal. There is
thus no need to take any consideration of the particularities of the original signal.
(iii) Compatibility of different traffic : Any digital media of suitable capacity can carry
encoded speech, telephone signalling, telegraphy, digital data, encode visual
information or an arbitrary mixture there of. The desperate requirements of these
signals can be handled in the terminals and have no mutual interference between
different types of traffic. The introduction of ISDN is thus possible.
(iv) Multiplexing, demultiplexing, branching of digital signals produce no additional
interference as noise in analog communications. Hence, these can be done as often
as necessary. Moreover, all bits are subject to same interference and hence all TDM
channels are treated equally, i.e. there are no channels of inferior quality as for
instance in FDM transmission certain channels at the edges of the tranmission
bands.
(v) Level fluctuations occurring during transmission have no effect on the primary
signal recovered in the receiver. In FDM, however, sophisticated equipments are
required to maintain the level more or less constant.
(vi) Economies in certain applications : PCM is inherently cheaper than the FDM
and the investment needed can be made progressively as the traffic growth justifies
it. Economies can be achieved by combining services already of a digital nature.
Digital signals can be switched by digital exchanges without demodulation.
(vii) Possibility of novel facilities : The digital mode lends itself to such things as
cryptography, storage and various forms of digital processing not accomplished
otherwise.
(viii) Applicability to other transmission media : Optical fibre waveguides multiple
access satellites appear to be more suited digital than to analog information.
(ix) Applicability to extremely difficult transmission paths.
BRBRAITTJabalpur, issued in january-2006 4
Fundamental of Transmission Sec. 3.2
(x) Simpler equipment : There is no need of complicated filter and analog
amplifiers for various ranges.
(xi) Easy repeatability of design.
Main Obstacles to Digitalisation
(a) Spectrum width : For example the bandwidth required for 2700 channels is 12
MHz in the case of analog systems where as band width required in the case of
1920 channels is as much as 140 MHz. Thus, band width required is very large in
the case of digital signals, this results consequently :
(i) Less efficient use of carrier capacity in terms of telephone channels;
(ii) Working at very high frequencies;
(iii) Need of multi–level modulation for radio transmission;
(iv) Voice interpolation required for satellite communication;
(v) Higher sensitivity to selective transmissions caused by propagation.
(b) Different transmission of TV signals : Digital transmission of TV signals requires
a very wideband if redundancy reduction is not used which, however, involve higher
cost and quality problems for moving images.
(c) Reliability and power consumption : For the same transmitted signals, digital
transmission equipments are in general more complex than analog ones.
Eqpt. Analog Digital
Line repeaters(12 MHz Vs 140 Mb/s)
2 W 4 W
1+1 Radio repeater(1800 FDM Vs 140
Mb/s)200 W 600 W
Means to overcome digital transmission limits :
(a) Evolution of high frequency components and technology
BRBRAITTJabalpur, issued in january-2006 5
Fundamental of Transmission Sec. 3.2
– Hybrid circuits
– High speed integrated circuits
– FET's amplifiers (for radio transmission)
(b) Introduction of large scale integrated components (LSI, VLSI)
– Use of microprocessor (for functions such as adaptive combination, voice
interpolation etc.).
– increased circuit compactness (TV encoding, Signal processing, etc.).
– reduced power consumption.
Pulse Transmission
Channel Capacity or Information Rate
In general, the capacity of a channel for information transfer is proportional to
its bandwidth. Two major theories that relate to the amount of data that can be
transmitted based upon the bandwidth of a medium are the Nyquist Relationship and
Shannon's Law. Prior to discussing these theories, it is important to understand the
difference between bit and baud due to the confusion that dominates the use of
these terms.
Bit versus baud
The binary digit or bit is a unit of information transfer. In comparison, the term
baud defines a signalling change rate, normally expressed in terms of signal
changes per second.
In a communications system, the encoding of one bit per signal element
results in equivalency between bit and baud. That is, an information transfer rate of
X bits per second is carried by a signalling change rate of X baud, where each baud
signal represents the value of one bit. Now, suppose our communications system
was modified so that two bits are encoded into one signal change. This would result
BRBRAITTJabalpur, issued in january-2006 6
Fundamental of Transmission Sec. 3.2
in the baud rate being half the bit rate, which obviously makes bit and baud non–
equivalent. The encoding of two bits into one baud is known as dibit encoding.
Nyquist relationship
In 1928, Harry Nyquist developed the relationship between the bandwidth and
the baud rate on a channel as
B = 2W
where B is the baud rate and W the bandwidth in Hz.
The Nyquist relationship was based upon a problem known as intersymbol
interference which is associated with band–limited channels. If a rectangular pulse is
input to a band–limited channel, the bandwidth limitation of the channel results in a
rounding of the corners of the pulse. This rounding results in the generation of an
undesired signal in which the leading and trailing edges formed due to signal
rounding can interfere with both previous and subsequent pulses. This signal
interference is illustrated in Fig.3.
Fig. 3
BRBRAITTJabalpur, issued in january-2006 7
Fundamental of Transmission Sec. 3.2
Pulse response through a band–limited channel. The bandwidth limitation of a
channel causes the leading and trailing edges of a pulse to interfere with other
pulses as the signal change exceeds twice the bandwidth of a channel. This
condition is called intersymbol interference.
The Nyquist relationship states that the rate at which data can be transmitted
prior to intersymbol interference occurring must be less than or equal to twice the
bandwidth in Hz. Thus, an analog circuit with a bandwidth of 3000 Hz can only
support baud rates at or under 6000 signaling elements per second.
Since an oscillating modulation technique such as amplitude, frequency or
phase modulation halves the achievable signaling rate, a twisted pair telephone
circuit supports a maximum signaling rate of 3000 baud.
Shannon's law
In 1948, Claude E. Shannon presented a paper concerning the relationship of
coding to noise and calculated the theoretical maximum bit rate capacity of a
channel of bandwidth W Hz. The relationship developed by Shannon is given by
C = W log2 (1+S/N)
where
C = capacity in bits per second,
W = bandwidth in Hz,
S = Signal power at the receiver input
N = power of thermal noise = No.W
Bit Baud Rate, Symbols
We wish to transmit fb bits/s in a baseband channel having a bandwidth of B
Hz. In most applications, the transmission system is considered to be more cost
effective, if, in a given bandwidth, more bits/sec can be transmitted. If fb, the
transmission rate, is normalized to a Bandwidth B = 1 Hz, then the system efficiency
can be characterized in terms of transmitted bits per second per Hz (b/s/Hz).
BRBRAITTJabalpur, issued in january-2006 8
Fundamental of Transmission Sec. 3.2
Nyquist theorem on minimum Bandwidth transmission systems states that it is
possible to transmit fs independent symbols in a channel (low pass filter) having a
bandwidth of only B = fn = fs/2 Hz.
If the digital signal changes at a rate of N bits/sec, then the modulated phase
would change at a rate of N/2 symbols/sec. This rate of change of symbols is known
as the Baud–rate (R).
Nyquist Criteria, Roll Off Factor
Give an ideal low pass change of Bandwidth Bo Hz, it is possible to transmit
independent binary symbols through the channel at the maximum rate Rb = 2 Bo
bits/sec. Equivalently, given a bit rate Rb = 1/Tb, the Bandwidth Bo = 0.5 Rb defines
the minimum transmission bandwidth acceptable for distortion-less transmission.
The Bandwidth Bo so defined is called Nyquist Bandwidth.
For practical usefulness, however, the minimum Bandwidth Solution has to be
modified. It is done by (1) permitting a channel Bandwidth B in excess of the Nyquist
Bandwidth Bo, and (2) introducing transition region shaped as one–half of a raised–
cosine. The width of the transition region is controlled by the role off factor x, defined
as excess bandwidth (i.e. the amount by which the channel Bandwidth B exceeds
the Nyquist Bandwidth Bo) divided by the Nyquist Bandwidth itself.
In the raised cosine solution, flexibility exists in the selection of the
transmitting and receiving filters. This flexibility can be exploited to provide noise
immunity. In particular, given a base-band channel of transfer function H(f) and a
message source of known waveform, we can optimize the transfer function HT(f) of
the transmitting filter and the transfer function HR(f) of the receiving filter, so that the
following 3 requirements are jointly satisfied.
(i) ISI is Zero.
(ii) Probability of symbol error is minimized.
(iii) Constant power is transmitted.
BRBRAITTJabalpur, issued in january-2006 9
Fundamental of Transmission Sec. 3.2
(iv) Nyquist BW required has been defined as equal to half the symbol
rate, i.e. N.BW = R/2
Thus, for a 140 Mb/s signal, the symbol rate = 70 Mb/s if QPSK is employed.
The minimum BW needed for transmitting so many symbols without ISI is 35 MHz.
This is the one sited filter Bandwidth. The total RF BW would include both sides of
the spectrum and be equal to 70 MHz. This is the theoretical minimum BW.
If 16 PSK is used, then Baud rate = 35 MB/s.
Nyquist BW = 17.5 MHz.
Total channel BW = 35 MHz.
What is Inter Symbol Interference (ISI) ?
Inter symbol interference is interference between adjacent symbols due to
pulse spreading by band limited channels.
Because of the delay (as the band width of channel is finite) the delayed
version of wave form of one sampling interval will extend into the next sampling
interval leading to ISI.
Suppose that binary information is transmitted using a pulse type waveform.
A 1 Volt pulse is used to send a 1 and 0 Volt pulse for a binary 0. When this
waveform goes through the system, it gets distorted. Among other effects, any sharp
corners of the wave are rounded, since the system cannot pass infinite frequency.
Therefore, the values in previous sampling intervals affect the value within the
present interval. If for example, we send a long string of 1s, we would expect the
channel output to eventually settle to a constant 1. Similarly, if we send a long string
of 0's, the output should eventually settle towards 0. If we alternate 1's and 0's, the
output might resemble a sine wave, depending upon the frequency cut off of the
channel.
Therefore, if we examine a single interval in which a binary 1 is being
transmitted, the output waveform within that interval will depend upon the particular
BRBRAITTJabalpur, issued in january-2006 10
Fundamental of Transmission Sec. 3.2
sequence that preceded the interval in question. If we now plot all possible
waveforms within the interval, including those for a 1 and those for a 0 in the interval,
we get a pattern that resembles a picture of an eye.
The following figure (Fig.6) shows some representative transmitted
waveforms and the resulting receiver waveform. The eye pattern is sketched.
The eye pattern is, therefore, the superposition of many waveforms within one
sampling interval, the components of this composite waveform being the signals due
to all possible preceeding data strings. The number of individual waveforms
contributing to the eye pattern depends upon the memory of the system. For
example, if the system transient response extends over six sampling intervals, the
particular pattern of six most recent bits determines the waveform within the interval.
BRBRAITTJabalpur, issued in january-2006 11
Fundamental of Transmission Sec. 3.2
Transmitter Receiver
Superimposition of Received Waveform
Fig. 6 Generation of Eye Pattern
BRBRAITTJabalpur, issued in january-2006 12Superpositionof receivedwaveforms
Fundamental of Transmission Sec. 3.2
Encoding & Modulation Techniques
If transmission media were perfect, we would not have to worry about errors
in data communications. Unfortunately, that is not the case. Noise spikes and other
types of interference can change 1s to 0s and 0s to 1s during transmission. A short
20 ms click on a telephone line may be annoying during a telephone conversation,
but it is unlikely to disrupt voice communication. However, if data are being sent over
the line at 4800 b/s, that same click may destroy 240 data bits. A number of
techniques have been developed to detect and sometimes to correct errors.
All of the methods of detecting errors involve the transmission of redundant
data. Redundant data are data that are not necessary to the information content of
the transmission. Redundant data could be omitted and communication would still
take place. Error checking schemes compare the redundant data to see if they
agree. If they do agree, it is likely that no error has occurred. If they do not agree, it
is almost certain that an error has occurred.
The simplest way to deal with errors is to let the receiving operator correct
them. This method takes advantage of the fact that human language itself is
redundant. For example, suppose the following sentence is sent over a news service
communication system as part of a news story :
THE DOWNTOWN BRANCH OF THE BANK OF CENTERVILLE WAS
ROBBED OF MORE THAN $4000 LAST NIGHT.
If the transmission is sent to Baudot, and the first bit of the second W in the
word DOWNTOWN is changed by a noise spike, the message will be received as :
THE DOWNTOAN BRANCH OF THE BANK OF CENTERVILLE WAS
ROBBED OF MORE THAN $4000 LAST NIGHT.
It would not be difficult for the receiving operator to realize that DOWNTOAN
is not a word and to make the necessary correction before publishing the story.
There is enough reduntant information in the message to do that. However, if the
character 4 in the sentence is affected by noise, and the message is received as :
BRBRAITTJabalpur, issued in january-2006 13
Fundamental of Transmission Sec. 3.2
THE DOWNTOWN BRANCH OF THE BANCK OF CENTERVILLE WAS
ROBBED OF MORE THAN $8000 LAST NIGHT.
the receiving operator will know that there is an error in the message but will
probably not know how to fix it. There is enough redundant information in the
message to detect the error, but there is not enough to correct it.
In most of today's data communication systems, the only types of errors that
humans are expected to correct are typing errors. Most communication systems
detect and correct errors that occur after the information leaves the keyboard.
Echoplex
Echoplex is a simple form of error detection that relies on redundant
transmission to help the sending operator make corrections. It is commonly used on
full–duplex communications systems in which each character is sent as it is typed
into the transmitting terminal. Almost anyone who has used a computer and a
modem has used echoplex. As the receiving terminal receives each character, it
retransmits or echoes it back to the transmitting terminal where it appears on that
termianal's screen. The operator checks the character on the screen to see if it has
been echoed correctly. If there is an error, the operator presses the backspace key
to erase the erroneous character and then types the correct one.
The advantage of echoplex is its simplicity. It does not require complex
circuitry, and it is easy to implement. One disadvantage of echoplex is that it relies
on a human operator to detect and correct errors. Another disadvantage is that it
makes inefficient use of the communications channel, because the same information
is transmitted in both directions. Although echoplex is commonly used to correct
typing errors in communication systems that transmit information as the operator
types it into a terminal, it is not used in other types of communications systems.
Parity
Parity is one of the simplest forms of automatic error detection and is
frequently used with the ASCII code. Although ASCII is a 7–bit code, a redundant
BRBRAITTJabalpur, issued in january-2006 14
Fundamental of Transmission Sec. 3.2
bit, called a parity bit, is often added to the ASCII character. The parity bit is placed
in the most significant bit (bit 7) position. There are two types of parity – odd and
even. If even parity is used, every 8–bit data word in a message contains an even
number of binary 1s. If odd parity is used, every word has an odd number of 1s. As
the parity bit is added to the ASCII character by the sending terminal, it is either set
or cleared to form the correct parity.
Neither type of parity has an advantage over the other in most
communications systems, and both are widely used. However, the transmitting and
receiving terminals must use the same type of parity, and all characters sent
between those two terminals must have the same type of parity.
Example 5–6
The following ASCII characters are sent : 110 0001, 111 0010 and 110 0101.
If the characters are transmitted with odd parity, where parity bit is added to each
character, a 1 or a 0? What is the ASCII code for each character in hexadecimal
including theparity bit ?
Solution
For odd parity, the total number of binary 1s in each character, including the
parity bit is odd. The first character, 110 0001 has three 1s, which is already odd
parity. Therefore, a parity bit of 0 is added in the MSB position to make the complete
8–bit data character 0110 0001, or $61. The second character, 111 0010 has an
even number of 1s. The sending terminal adds a binary 1 as a parity bit to make the
total number of 1s odd. The resulting ASCII character, including the parity bit , is
1111 0010, or $F2. The third character, 110 0101, also requires a 1 for odd parity,
which makes the complete data character 1110 0101, or $E5.
The receiver checks the parity of each incoming ASCII character to see if it is
correct. If the receiver is programmed to receive odd parity, every incoming data
word must have odd parity. If it is programmed to receive even parity, every
incoming data word must have even parity. If one bit in a data character gets
BRBRAITTJabalpur, issued in january-2006 15
Fundamental of Transmission Sec. 3.2
changed by noise during transmission, the parity of the received character will be
incorrect. When incorrect parity is received, it is called a parity error. For example,
suppose a communications system uses even parity and that the ASCII character
1011 1000 is sent. If a noise spike changes bit 1, the character will be received as
1011 1010, which has odd parity. This is a parity error.
How a communication system responds to parity errors depends on how the
terminals have been programmed. In a half–duplex or full–duplex system, the
receiving terminal may send a message back to the transmitting terminal requesting
that the entire message containing the error be retransmitted. In a simplex system,
the receiving terminal cannot send messages back to the transmitting terminal, so
there is no way for it to request retransmission. In such a case, the terminal may be
programmed to print a star (*) on the screen to let the receiving operator know that
an error has occurred.
A parity error is generated when an odd number of bits is changed during
transmission, but no parity error is generated when an even number of bits is
changed. For example, suppose 2 bits are changed by noise during transmission so
that the character 1011 1000 is received as 1011 1110. Although the receiver
character contains two errors, both the received character and the character that
was originally sent have even parity. The receiving terminal does not generate a
parity error, and the data error is not detected.
Like all methods of error detection, parity adds redundant information ot the
data stream. A disadvantage of parity is that it detects only errors that affect an odd
number of bits in a data word. An advantage of parity is that it is simple to
implement. Because of its simplicity, parity is widely used.
Horizontal and Vertical Parity Check
A better method of detecting errors involves using a combination of
horizontal and vertical parity checks. The simple parity check discussed in
Section 5–2–2 is a horizontal parity check. Vertical parity is calculated for all of the
bits with the same bit number in a block of data. After a block of data has been sent,
BRBRAITTJabalpur, issued in january-2006 16
Fundamental of Transmission Sec. 3.2
the transmitting terminal calculates a parity bit for bit 0 of all of the characters in the
block, another parity bit for bit 1 of all of the characters, and so on. The vertical parity
bits are transmitted as a block check character (BCC) at the end of the block of
data.
Either even or odd parity may be used for both the horizontal and vertical
parity bits. The same parity may be used for both, or one of them may have even
parity, and the other may have odd parity. However, the transmitting and receiving
terminals must use the same parity scheme. For illustration, the horizontal parity in
Table 1 is even, and the vertical parity is odd. Bits 0 through 6 in the figure are the
ASCII code for the information transmitted. Notice that even the parity bit of the BCC
passes both the vertical and horizontal parity check.
Table 1A short message using even character and odd column parity
P b6 b5 b4 b3 b2 b1 b0ASCII
Character
1 1 1 0 0 1 0 0 d
1 1 1 0 0 0 0 1 a
0 1 1 1 0 1 0 0 t
1 1 1 0 0 0 0 1 a
1 0 1 0 0 0 0 0 SP
0 1 1 0 0 0 1 1 c
0 1 1 0 1 1 1 1 o
1 1 1 0 1 1 0 1 m
1 1 1 0 1 1 0 1 m
1 1 0 0 0 0 1 1 BCC
The receiver checks the horizontal parity of each character as it is received.
The receiver also generates its own BCC and compares it with the check character
received at the end of the block of data. The two should be identical. If they are not,
an error has occurred, and the receiver can request that the sending terminal
retransmit the block of data.
BRBRAITTJabalpur, issued in january-2006 17
Fundamental of Transmission Sec. 3.2
However, the combination of horizontal and vertical parity checking does
more than detect errors. It also allows the receiver to correct single–bit errors without
requesting further information from the transmitter, a process known as forward
error correction (FEC). Table 2 shows the data block of Table 1, but bit 1 of the SP,
or space, character has been altered by noise. Both the horizontal parity check for
the space character and the vertical parity check for bit 1 fail. Therefore, bit 1 of the
SP character must be in error. The receiver can correct the error by changing the 1
back to a 0.
Table 2Bit 1 of the SP character fails both character and column parity checks
and is therefore in error.
P b6 b5 b4 b3 b2 b1 b0ASCII
Character
1 1 1 0 0 1 0 0 d
1 1 1 0 0 0 0 1 a
0 1 1 1 0 1 0 0 t
1 1 1 0 0 0 0 1 a
1 0 1 0 0 0 1 0 SP
0 1 1 0 0 0 1 1 c
0 1 1 0 1 1 1 1 o
1 1 1 0 1 1 0 1 m
1 1 1 0 1 1 0 1 m
1 1 0 0 0 0 1 1 BCC
Unfortunately, the combination of horizontal and vertical parity can reliably
perform FEC only on single–bit errors. Errors that involve two or more bits cannot
always be corrected. To illustrate, in Table 3, both bit 1 of the SP character and bit 2
of the character c have been changed by noise. Both characters fail horizontal parity
checks, and bits 1 and 2 fail their vertical parity checks, but the receiver cannot
determine which bits are in error. The error could just as easily be bit 2 of the space
character and bit 1 of character c. Even though the receiving terminal cannot
perform FEC, at least the receiving terminal can determine that a transmission error
BRBRAITTJabalpur, issued in january-2006 18
Fundamental of Transmission Sec. 3.2
has occurred, and it can request that the sending terminal retransmit the entire block
of data.
Table 3Two–bit errors can be detected by a combination of character and column parity checks, but
they usually cannot be corrected
P b6 b5 b4 b3 b2 b1 b0ASCII
Character
1 1 1 0 0 1 0 0 d
1 1 1 0 0 0 0 1 a
0 1 1 1 0 1 0 0 t
1 1 1 0 0 0 0 1 a
1 0 1 0 0 0 1 0 SP
0 1 1 0 0 1 1 1 c
0 1 1 0 1 1 1 1 o
1 1 1 0 1 1 0 1 m
1 1 1 0 1 1 0 1 m
1 1 0 0 0 0 1 1 BCC
No system of error checking is 100% foolproof. Table 4 contains 4 bit erorrs.
Bits 1 and 2 of both the SP and c characters have been altered during transmission.
Both characters pass their horizontal checks, and both bit positions pass vertical
parity checks. Even the combination of horizontal and vertical parity checks has
failed to detect the errors.
Parity bits can be generated by software routines in the sending terminal, and
they can be checked by software routines at the receiving terminal. However, it is
more efficient to generate and check parity bits in hardware. Figure 11 is the
schematic of a circuit that can be used to generate horizontal parity bits. The 7 bits
of the ASCII character are applied to the inputs labelled bit 0 through bit 6, and a
bias bit is applied to the remaining input. If the bias bit is a 1, the correct horizontal
parity bit will be generated to give the character odd parity. A bias bit of 0 will cause
the circuit to generate the correct horizontal parity bit for even parity. Trace the
circuit by assuming a set of inputs to assure yourself that it works.
BRBRAITTJabalpur, issued in january-2006 19
Fundamental of Transmission Sec. 3.2
Parity generator and checker circuits are part of the DTE circuit. They were
once constructed from discrete, exclusive OR gates as shown in Figure 11 below,
but today they are built into a larger integrated circuit that also performs other
communication tasks, as will be discussed in Chapter 8.
Fig. 11A Parity Generator Circuit
Table 4Even the combination of character and column parity checks
will not detect all errors
P b6 b5 b4 b3 b2 b1 b0ASCII
Character
1 1 1 0 0 1 0 0 d
1 1 1 0 0 0 0 1 a
0 1 1 1 0 1 0 0 t
1 1 1 0 0 0 0 1 a
1 0 1 0 0 1 1 0 SP
0 1 1 0 0 0 1 1 c
0 1 1 0 1 1 1 1 o
1 1 1 0 1 0 1 1 m
1 1 1 0 1 1 0 1 m
1 1 0 0 0 0 1 1 BCC
BRBRAITTJabalpur, issued in january-2006 20
Fundamental of Transmission Sec. 3.2
Checksums
As illustrated in Table 5, a checksum is the least significant byte of the
arithmetical sum of the binary data transmitted. As the data is sent, the transmitting
terminals sums it. At the end of the data block, it sends the least significant byte of
the sum as an extra character, called the checksum. The receiver generates its own
checksum by summing the data as it is received. At the end of the block, it compares
the checksum it generated with the checksum it receives from the transmitter. If the
two are identical, it is likely that no error occurred. If the two checksums are different,
an error has occurred, and the receiver requests that the block of data be resent.
Table 5
The checksum is the least significant byte of the sum of the coded data
Character EBCDIC
T $E3
e $85
r $99
r $99
i $89
b $82
l $93
e $85
Checksum $BD
Cyclic Redundancy Check (CRC)
One of the more effective methods of error detection is the cyclic
redundancy check (CRC). A circuit that can be used to generate a 16–bit CRC
character is shown in Fig.12. Identical CRC circuits are used in the transmitting and
the receiving terminals to generate a check character which is highly dependent on
all the data that were sent in the block. We will use the CRC circuit in the receiving
terminal as our example.
BRBRAITTJabalpur, issued in january-2006 21
Fundamental of Transmission Sec. 3.2
Fig. 12A CRC circuit
The CRC circuit is initialized with all 0s in the shift registers. Each time a bit is
received, every bit in the shift registers is shifted right. Assume that the first bit
received is a 1. It is exclusively 0Red in G3 with a 0 shifted out of b0 of the shift
register to produce a logical 1 which is in turn shifted into the b15 position of he shift
register and continues to shift right as each subsequent bit is received. Four
received bits later, it will have been shifted to the b11 position where it will influence
the output of exclusive OR gate G1. The output of G1 is shifted to the right until it
arrives at the b4 position and influences the output of G2. The G2 output in turn
shifts right to the b0 position where it is exclusively 0Red with a received bit of data
to influence the output of G3 and thereby the input to the CRC circuit.
The important thing to recognize is that once a bit is received, it continues to
influence the contents of the shift registers in the CRC circuit. If one bit is received
incorrectly, it will cause the contents of the CRC shift registers to be different than
they would have been if all bits had been received correctly.
As mentioned, the transmitting terminal has a CRC circuit identical to the
CRC circuit in the receiver. As each bit is transmitted, a copy of that bit is input into
the CRC circuit. At the end of the block of data, the sending terminal transmits the
contents of its CRC registers. When the receiver receives the CRC character, it
compares it with the contents of its own CRC registers. The two CRC characters
BRBRAITTJabalpur, issued in january-2006 22
Shift right register Shift right register Shift right register
Datainput
Fundamental of Transmission Sec. 3.2
should be identical. If they are not, an error has occurred in transmission, and the
receiver can request that the sending terminal retransmit the block of data.
Although Fig.12 shows a circuit that generates a 16–bit CRC, 32–bit CRCs
are also common in many data communication systems. Twelve–bit and 24–bit
CRCs are used in some systems. Like the parity checker circuit, CRC generators
are usually not separate circuits as shown in the figure. They are included in a larger
integrated circuit that also performs other data communications functions.
Summary
In this chapter, we have looked at codes used in data communications and
methods used to detect and sometimes correct errors. Of the codes presented in
this chapter, the two that are most commonly used in data communications are
ASCII and EBCDIC. Baudot is a 5–bit code, and it was the first code to be widely
used for data communications. Baudot has two modes, a letters mode and a figures
mode, each with its own character set. The LTRS and FIGS characters are used to
shift back and forth between the two modes. Communications systems that once
used Baudot have now almost all switched to the ASCII code.
ASCII is a 7–bit code, although a redundant 8–bit, called a parity bit, is
sometimes added to detect errors. There is also an 8–bit version of ASCII which is
called extended ASCII. ASCII is used both in data communications and to store data
in personal computer memories and disks.
EBCDIC is an 8–bit code that was developed by IBM Corporation for use in
its larger computers. EBCDIC is also used in equipment that was designed to be
compatible with those IBM Computers.
Errors inevitably occur in data transmission. In some systems, those errors
tolerated, and nothing is done to correct them. However, a number of schemes been
developed to detect and sometimes correct errors. All of these methods are
redundant information. In echoplex, the receiving terminal echoes each recent
character back to the sending terminal where it appears on the terminal screen, i.e.
BRBRAITTJabalpur, issued in january-2006 23
Fundamental of Transmission Sec. 3.2
terminal operator visually inspects each character to make sure that it is correct.
Echoplex's main use is to correct typing errors.
Parity is an extra bit that is added to each data character in the MSB position.
The parity bit is set or cleared to ensure that each character either contains an even
number of 1s or that each character contains an odd number of 1s. Parity is
consequently used with the ASCII code.
A combination of horizontal and vertical parity checks cannot only detect
errors, but also allow the receiver to correct single–bit errors, a process known as
forward error correction (FEC). This system, in addition to having a parity bit each
character, uses a binary check character (BCC) which is transmitted at the end of a
block of data.
A checksum is no more than the least significant type of the arithmetical sum
of all the binary characters transmitted in a block of data. Both the transmitter and
the receiver calculate a checksum, and at the end of a transmission, the sending
terminal transmits the checksum which the receiver then compares with its own
checksum.
A cyclic redundancy check (CRC) character can be formed by circulating
transmitted data through a system of shift registers and exclusive OR gates.
Identical circuits are used at the transmitter and receiver. At the end of a block of
data, a sending terminal transmits its CRC character, and the receiver compares it
with the CRC character that it has generated. If the two CRC characters are
different, then error has occurred.
BRBRAITTJabalpur, issued in january-2006 24
Fundamental of Transmission Sec. 3.2
MODULATION TECHNIQUES
1.0 Introduction
In order to transmit digital signals over Radio systems. It is necessary to transfer the information to the Radio frequency carrier.
Digital, information can be imposed upon the carrier by modifying theamplitude, frequency, phase or a combination of these characteristics, The choice of the modulating scheme is made after considering a number of conflicting requirements, which include susceptibilities to noise interference, fading, non linearities, spectrum efficiency (i.e. Bits/sec/Hz) and equipment complexities with associated cost aspect. The spectrum efficiency is a ratio of bit speed (say R bits per second) and band width say B Hz. This ratio i.e, R/B is known as the spectrum efficiency for the particular modulation technique adopted for the purpose of modulation of the RF carrier. The following sections describe the most commonly adopted digital modulation schemes.
2.0 Amplitude Shift Keying
In general, for amplitude modulation, the amplitude of the carrier is varied in proportion to the amplitude of the modulating signal and the carrierfrequency does not change The special cases-of digital modulating signals are referred to as amplitude shift keying. A number is usually added as per the number of the digital symbol states. Ti&us binary signals produce 2 ASK and 4 level signals produce 4 ASK. The ASK signals are generally expressed mathematically as:
X (t) = g (t) x A x cos {2 fc t)
where g ft) is the random digital signal. A binary ASK modulator is symbolized in Fig. 2.1 where the binary bits cause switching between carrier 'ON’ and 'OFF' states.
BRBRAITTJabalpur, issued in january-2006 25
Binary input
Fig. 2.1
ASK MODULATOR
Fundamental of Transmission Sec. 3.2
FIG. 2.2
SIGNAL CONSTELLATION
FIG 2.3 ASK WAVESHAPE
BRBRAITTJabalpur, issued in january-2006 26
BANDWIDTH LIMITED AT 2 ASK AT Q
Fundamental of Transmission Sec. 3.2
The power spectral density of the resultant 2 ASK signal as the same as that of the random data signal but mirrored about the carriers.
In the normal ASK signal the presence of DC component in the modulating signal results in the presence of a carrier component, which contains no information in the output signal and is a waste of available transmitted power.
2.1 Suppressed Carrier ASK
If the DC component is removed from the random signal, the resultant
Signal is referred to as double side band suppressed carrier amplitude
modulated signal often abbreviated to the word DSB.
2.2 Single Sideband ASK
The modulating process produces both upper and lower sidebands and the spectrum occupancy of the signal doubles. Since either of the sidebands of ASK signals contains the information to be transmitted, spectrum efficiency can be improved considerably by elimination of one of the sidebands, such a system is known as single sideband suppressed carrier amplitude modulation (SSBSCAM) usually abbreviated to SSB. To separate the sidebands a perfect high or low pass filter is required with a cut off at the carrier frequency.
2.3 Vestigial Sideband ASK
An alternative method to overcome the difficulties associated with SSBsignals is to transmit a small part (vestige) of the other sideband. This isknown as vestigial sideband amplitude modulation VSBAM oftenabbreviated to VSB.
3.0 Frequency Shift KeyingIn frequency modulation, the frequency of the carrier is varied in proportion to the amplitude of the modulating signal and the carrier amplitude remainsconstant; Since for 'digital modulation the baseband signal takes on only one of the two values, the frequency of the modulation also will take one of the two values and the modulation prosess can be thought of as a keying operation. In general, the binary FSK signal can be mathematically expressed by.
X(t) = A Cos (2 fc t+2fd g (t) dt + ).
where A. and fc are the carrier amplitude and frequency, g(t) is a randombinary waveform with levels + 1 and -1 and -0 is an arbitrary phase. Theinstantaneous frequency is given by the derivative of the phase of X(t), namely by fc + fd g(t) which is equal to the two shift frequencies f 1 and f 2
where f1= fc - fd and f2 = fc + fd
Figure 3.1 illustrates a simple modulator consisting of two oscillators and a switch (key). This form of FM is referred to as Frequency Shift Keying (FSK).
BRBRAITTJabalpur, issued in january-2006 27
Fundamental of Transmission Sec. 3.2
The waveform for FSK modulation technique can be represented as in
Fig. 3.2
The power spectral density of FSK waveform is as follows (Fig. 3.3).
BRBRAITTJabalpur, issued in january-2006 28
Carrier Wave
Bit Stream
FSK
+E0
-E
+V
0
-V+E
0
-E
Fundamental of Transmission Sec. 3.2
3.1 Demodulation of FSK There are two methods of demodulation of FSK. They are - Coherent detection - Incoherent detection.
3.1.1 Coherent detection
The Coherent detection is illustrated in Fig. 3.4
BRBRAITTJabalpur, issued in january-2006 29
Fundamental of Transmission Sec. 3.2
3.1.2 Incoherent Detection
If the phase of the incoming wave is not known, we must resort to incoherent forms of detection. An incoherent demodulator is illustrated in
Fig. 3.5.
Fig. 3.6. compares the performance of incoherent detector with that of coherent detector.
FIG 3.6
PERFORMANCE COMPARISON OF INCOHERENT AND COHERENT FSK DETECTOR
BRBRAITTJabalpur, issued in january-2006 30
Incoherent
Coherent
Fundamental of Transmission Sec. 3.2
It may be seen that for a given BER requirement, the Eb/No (and hence C/N) requirement is more for incoherent detection compared to that of coherent detection i.e. Coherent detection is superior to incoherent detection.3.2 M-ARY FSKM-ARY FSK (MFSK) -is-a way to trade bandwidth for signaling speed. Instead of sending data using binary signals with one of two frequencies, the signaling alphabet is expanded to include M possible frequencies. This process will normally increase the speed between the lowest and the highest freq. and therefore the bandwidth can be expected to increase. However, since increased information is sent with each signal element, the baud rate can be decreased to partially counteract the increase in bandwidth. For example, if it were necessary to send 1000 bps of, data, this could be one by sending a binary FSK pulse every millisecond. Alternatively, a 4 ary FSK burst could be sent every 2 ms, representing a decrease in baud rate by a factor of two. (Baud rate is a unit of signaling speed and it is the number of symbols (pulses)/ second in the Channel. If each symbol represents one bit, then baud rate is same as bit rate, it each symbol represents more than one bit then baud rate is less than bit rate. Baud rate= Bit Rate/No, of Bits per Symbol).
The performance of MFSK for the various values of M is shown in Fig.3.7. In the Fig.3.7 it may please be noted that ordinate is the symbol error probability and not the bit error probability. This is an important distinction, since a single symbol error can cause more than one bit error. We should also note that constant energy (E) does not imply constant signal power. As Main causes, the symbol period increases, so proportionately less signal power is required to achieve the same signal to noise ratio. Also shown on the figure is a theoretical bound for M——> which is obtained from the Shannon channel capacity theorem.
BRBRAITTJabalpur, issued in january-2006 31
Fundamental of Transmission Sec. 3.2
Fig 3.7 SYMBOL ERROR PERFORMANCE FQR MFSKC.E. Shannon has shown that a given communication channel has a maximum rate of information 'C', Known as .the channel capacity. If the information rate R, is less than C, one can approach arbitrarily small error probabilities by intelligent coding techniques. If the information rate R is greater than the channel capacity 'C', errors can not be avoided regardless of the coding technique employed.
We consider the band limited channel operating in the presence of additive white Gaussian noise. In this case, the channel capacity is given by:
C= B log2 (1 + S/N)
Where C is the capacity in bits per second, B is the bandwidth of channel in Hz and S/N is the signal to noise ratio.
The signal power S is the energy per bit multiplied by the number of bits per second. The noise power is No multiplied by the system bandwidth. If we take the limit as the bandwidth approaches infinity.
C = Lim B log2 (1+EC/NoB)
B
= Lim (EC/No) Log2 (1+EC/No B/Ec)
B
= (EC/No) Log2 e = 1.44 EC/No
E/No = -1.6dB
This is shown in Fig. 3.7 labeled as M since the infinite bandwidth assumption coincides with the infinite value of M.
4.0 PSK Modulation
In general for Phase modulation, the phase of the carrier is varied inproportion to the amplitude of the input signal and the amplitude andfrequency remains constant. The special cases of Digital Modulation ofsignals are referred to as Phase Shift Keying (PSK) Modulation with a number in the front indicating the number of levels of the digital signal. 2 PSK, 4 PSK and 8 PSK are modulation methods that have been adopted for some digital radio systems.
4.1 Correspondence between carrier phase and bit stream stateSince a bit stream is a series of binary digits, it requires a 2 Phase PSKsystem, where phases of a ‘O’ and ‘’ radians correspond to the Os and 1 s of the bit stream. The number of phases used is limited only by the requirement that each phase be distinguishable from the others, which result in an increased capacity for information transmission, n bit streams required 2n combinations of n bits as shown in table below.
BRBRAITTJabalpur, issued in january-2006 32
Fundamental of Transmission Sec. 3.2
Therefore, a system which can distinguish 2n phases can transmit upto n bitstream.
Table: Correspondence between phases and codes.
a. 2 Phase System
Phase Binary Binary Code Stream 1
0 0 0
1 1
b. 4 Phase System
Phase Quaternary Binary Code
Stream 1 Stream 2
0 0 0 0
/2 1 0 1
2 1 0
3/2 3 1 1
BRBRAITTJabalpur, issued in january-2006 33
a- 2 Phase Systemb- 4 Phase System
Fundamental of Transmission Sec. 3.2
SIGNAL - SPACE DIAGRAM FOR BINARY CODES
Since the required number of code combinations is the nth power of 2 i.e 2, 4 and 8 phase FSK systems are feasible.
4.2 Principles of Modulation
There are two type of phase modulation.
• Absolute phase modulation
• Differential phase modulation
In the absolute phase modulation system, pulse signals directly modulate acarrier. Demodulation uses another carrier to synchronize with the carrier and detect difference in phase. Should the phase of the two sub carriers differ by rt, (for BRSK), the entire data train will be inverted and every bit will be in error.
For this reason, we often choose differential form of encoding. In suchtechniques, the data are represented as changes in levels rather than by the particular signal level. In other words phase transitions rather than phase states are transmitted.
Two phase differential phase modulation called 2-DPSK, is described withreference to the following (Fig.4.1).
On the top line, the original bit stream, X is the sequence 0110. The phasestream on the 2nd line is obtained by
BRBRAITTJabalpur, issued in january-2006 34
Fundamental of Transmission Sec. 3.2
Yi=Xi Yi-1 ( exclusive OR)
At the receiving end the following calculation recovers the original bit stream.
Xi=Yi Yi.1
4.3 Principles of Demodulation
There are two ways to detect PSK signals :
(1) Coherent detection
(2) Differential) detection (delay detection)
signal, using each of these two methods.
(1) Coherent Detection
The following figure (Fig,4.2) illustrates the coherent detection principle. A
Cos (wt + ) represents a PSK signal and contains the information.
The PSK signa! and a synchronous carrier (i.e. having same phase andfrequency of carrier on the transmitter side) are fed to the phase detector.Detected output after the LPF (Low Pass Filter) is proportional to Cos, Since Cosassumes values of either +1 or -1 corresponding to = o and respectively, the decision circuit judges only polarity (+ or -1) in the 2 phase
BRBRAITTJabalpur, issued in january-2006 35
Fundamental of Transmission Sec. 3.2
PSK system. Bits 0 and 1 correspond to phases 0 and respectively. The carrier used in the receiver must be synchronized with that of the carrier on the transmitter side. Thus, a carrier synchronising circuit called the carrier recovery circuit is also necessary.
(2) Differential Detection (Delay Detection)
The following figure (Fig.4.3) illustrates the differential! detection principle. Theincoming PSK signal is expressed as E= A Cos (wt+).
The one bit delayed PSK signal E' is expressed as:
E = A Cos (wt +i-1), where Ii and i-1 represent the phases corresponding to
the ith and (i-1)th bits respectively. The E and E1 signals are fed to a phase
detector. The output of LPF is Cos (wt +I-1), The decision circuit discriminates
between different values of Cos (wi +i-1), in the same way as
the decision circuit in the coherent detection case.
Comparison
Differential Detection is not applicable to low speed data streams, However, itis applicable to high speed data streams, but the detected output containstwice as much thermal noise as the O/P of coherent detection system. This isbecause differential detection uses two separately received PSK signals (witha time difference of one bit) which are equally noisy, whiie in the coherentdetection case the carrier is assumed to be free of noise.
BRBRAITTJabalpur, issued in january-2006 36
Fundamental of Transmission Sec. 3.2
For these reasons, the coherent detection is the preferred demodulationmethod. Unlike differential detection coherent detection needs carrierrecovery.
4.4 Decision circuit {Threshold Comparator)
The detector output, which represents the phase changes of received PSKsignal, includes thermal noise, distortion arid interference, which enter thesignal at repeaters and along propagation paths. Consequently, the detectedoutput waveforms are considerably distorted as shown in the following figure.
ISI : Intersymbol interference
NRZ : Non return to zeroWAVEFORMS OF DETECTED BASEBAND
Using the clock signal to discriminate between "1" and "0" states, it ispossible to recover the original waveform from the distorted pulse waves.There are two "decision methods: Instantaneous decision and integraldecision. The instantaneous decision method determines whether the detected valuebelong to the "range 1" (Over the threshold) or the "range 0" (Below thethreshold) by comparing the detected output amplitude to the threshold level(0 Volts), at sampling points derived from the Clock Frequency. The output isa pulse stream with the appropriate voltages.
The integral decision method integrates the amplitude of the detected outputfor a fixed time interval and compares the result with the threshold. The
BRBRAITTJabalpur, issued in january-2006 37
Fundamental of Transmission Sec. 3.2
integral decision method is more sensitive to inter symbol interference thanthe instantaneous decision method, and so the instantaneous decisionmethod is preferred.4.4.3 What is Jitter ?
Unwanted phase modulation is termed as jitter, in the decision circuit clock pulses are generated using PSK signal phase changes as a reference. These clock pulses may some times be inaccurate due to poor tuning of the pulse generating circuit causing jitter.
4.5 BPSK Modulation BPSK Modulator is shown in Fig. 4.6. Ring Modulator (MOD)
BRBRAITTJabalpur, issued in january-2006 38
Fundamental of Transmission Sec. 3.2
4.6 Four Phase PSK Systems
The following figure (Fig. 4.7) illustrates a functional block diagram of QPSK Modulator
Fig. 4.7
BLOCK DIAGRAM OF QPSK MODULATOR
In this system the I/P pulse stream is converted into two bit streams. Theirpulse speed is exactly half that original stream. The serial to parallel converter block includes a differential encoding function. QPSK modulator can be thought of 2 BPSK modulators in parallel.
As the signal space diagram indicates, the QPSK modulator uses a gray code arrangement i.e., instead of having (0,1),(1 (1 ,1) , (0,0) symbols we Be- having (0,1) , (1,1), (1,0), (0,0) symbols. The reason is explained with reference to the following figure (Fig.4.8).
BRBRAITTJabalpur, issued in january-2006 39
S/P Con
Input Data
II /2 II /2
P/S
TH
TH
BPF BPF
1
2
3
I
Q
MM 4 OutputData
1&2 : LPF3 : Bit Timing Recovery4 : Carrier TH : Threshold ComparatorBPF : Band Pass Filter
Transmitter Receiver
Fundamental of Transmission Sec. 3.2
FIG. 4.9Vector Diagram of PSK signals, noise, and sub-carriers
Any noise superimposed in a PSK signal changes the signals vectors. The noise vector are constantly varying in phase and amplitude and if the vector sum of the noise and PSK signal cross a carrier vector, a bit error occurs. As a noise vector increases in magnitude, so does the possibility of mistaking the true PSK signal
BRBRAITTJabalpur, issued in january-2006 40
Fundamental of Transmission Sec. 3.2
vector for an adjacent one. However, the possibility of the noise vector increasing enough to mistake the true PSK signal vector for the signal vector 1800 opposite (differing by ) is very low. Gray coding therefore improves bit error rate compared with natural binary coding, because one symbol error results in a single bit error.
i.e., bit error rate = Symbol error rate / 2
Circuits used for Natural Code to Gray Code conversion (At the transmitter)and vice versa (At the Receiver) are shown below.
Natural Code to Gray Code Conversion
4.6.1 Coherent Detection
For QPSK demodulation coherent detection is superior to differentialdetection. The block diagram of coherent detection circuit is as follows(Fig. 4.10).
BRBRAITTJabalpur, issued in january-2006 41
Fundamental of Transmission Sec. 3.2
FIG. 4.10CONFIGURATION OF COHERENT DETECTION CIRCUIT
4.6.2 Carrier Recovery
The carrier wave required for the coherent detection must be recovered
from 4 PSK signal which does not contain the proper unmodulated frequency component. The 4 PSK signal is expressed by
E = A Cos (wt+ + n/2)
The n/2 phase component must be removed because it randomly assumes values of 0,1, 2, 3. There are many carrier recovery strategies. We will consider (1) Four multiplication system (2) Costa's
Loop method.
4.6.2.1 Four Multiplication System
The derivation of the four multiplication of a 4 PSK signal system is as fallows:
E4 = A4 Cos4 (t + + n/2)
BRBRAITTJabalpur, issued in january-2006 42
Fundamental of Transmission Sec. 3.2
= A4 /8{3+4Cos2 (t + + n/2)+ (t + + n/2)}
A band pass filter extracts the 4 components called E(4).
A4 Cos4 (t + + n/2)E(4) = 8 = A4 Cos (4t + 4)
Four times frequency division fo E(4) recovers a pure carrier. Similarly for BPSK scheme 2 multiplication system can be used.
Fig. 4.11Costa’s loop
The VCO operates at the carrier frequency fc . The output of upper low pass filter is given by, 0.5 A (t) sin ( -). This output is therefore proportional to the sine of the phase difference. If the two frequencies are not matched, the phase difference includes a linearly varying term.
The output of the lower LPF is given by, 0.5 A (t) sin ( -). This output is therefore proportional to the cosine of the phase difference.
When these two terms are multiplied together, the result is the error term.
E(t) = 0.25 A2 (t) sin( -) cos ( -).
= 0.125 A2 (t) sin[2( -)]
BRBRAITTJabalpur, issued in january-2006 43
Fundamental of Transmission Sec. 3.2
The error term is therefore proportional to the sine of twice the phase difference and the loop drives this term toward zero.
5.0 16 QAM
The 16 QAM (Quadrature Amplitude Modulation) system carriers twice as much information as the QPSK system.
5.1 Modulation
The 16 QAM signal is obtained by vector summing two 4 level ASK signals in quadrature. The following figure shows two 4 level ASK signals in quadrature (Fig. 5.1).
FIG 5.1
TWO 4- LEVEL ASK SIGNALS PERPENDICULAR TO EACH OTHER
The signal space diagram is as shown in the Fig. 5.2
BRBRAITTJabalpur, issued in january-2006 44
Fundamental of Transmission Sec. 3.2
The block diagram of 16 QAM is shown if Fig . 5.3.
The modulator is provided with four data signal inputs S1 to S4 which areapplied to D/A converters. The D/A converter delivers a single data streamwith four amplitude levels from the two data input streams each with twoamplitude levels. The four amplitude level output are applied to modulationcircuits.
The modulator circuits consist of two balanced diode mixers coupled with twohybrid transformers. The hybrid transformer at the input delivers two outputswith a 90° phase shift, the I channel and Q channel signals. The hybridtransformer at the output simply combines the two outputs.
The demodulator block diagram is shown in Fig. 5.4.
The demodulator demodulates the IF signal and produces four data signaloutputs S1 to S4.
The IF amplifier which contains an AGC loop reduce ; IF signal levelchanges before applying to the detector. The detector consists of twobalanced diode mixers and hybrid transformer. The hybrid transformer at theinput splits the IF signal into two signals with no phase shifting between them.
BRBRAITTJabalpur, issued in january-2006 45
Fundamental of Transmission Sec. 3.2
BRBRAITTJabalpur, issued in january-2006 46
Fundamental of Transmission Sec. 3.2
BRBRAITTJabalpur, issued in january-2006 47
Fundamental of Transmission Sec. 3.2
The other hybrid transformer produces two signals with a 900 phase shift between them. The local frequency signal is fed to the two mixers via the hybrid transformer. The output of the detector, the I channel and the Q channel signals are amplified separately and applied to cosine roll off filters for spectrum shaping and to A/D converters. The A/D converters perform the threshold decision.
BRBRAITTJabalpur, issued in january-2006 48
Fundamental of Transmission Sec. 3.2
DEFINITION AND DESCRIPTION OF DIGITAL HIERARCHIES
1.0 INTRODUCTION AND DEFINITION
The term “digital hierarchy” has been created when developing digital
transmission systems. It was laid down when by multiplexing a certain number of
PCM primary multiplexers were combined to form digital multiplexers of higher order
(e.g. second-order multiplex equipments).
Consequently, a digital hierarchy comprises a number of levels. Each level is
assigned a specific bit rate which is formed by multiplexing digital signals, each
having the bit rate of the next lower level. In CCITT Rec. G.702, the term “digital
multiplex hierarchy” is defined as follows :
“A series of digital multiplexes graded according to capability so that
multiplexing at one level combines a defined number of digital signals, each having
the digit rate prescribed for the next lower order, into a digital signal having a
prescribed digit rate which is then available for further combination with other digital
signals of the same rate in a digital multiplex of the next higher order”.
2.0 WHY HIERARCHIES ?
2.1 Before considering in detail the digital hierarchies under discussion we
are going to recapitulate in brief, why there are several digital
hierarchies instead of one only. It has always been pointed out that as
far as the analogue FDM technique is concerned, the C.C.I.T.T.
recommends the world wide use of the 12-channel group (secondary
group). Relevant C.C.I.T.T. Recommendation exists also for channel
assemblies with more than 60 channels so that with certain exceptions
– there is only one world-wide hierarchy for the FDM system (although
the term “hierarchy” is not used in the FDM technique).
2.2 In the digital transmission technique it was unfortunately not possible
to draw up a world-wide digital hierarchy. In practice, equipment as
specified in C.C.I.T.T. Recommendation G.732 and 733, they do not
only differ completely in their bit rates, but also in the frame structures,
in signalling, frame alignment, etc. Needless to say that, as a
consequence, the higher order digital multiplexers derived from the two
BRBRAITTJabalpur, issued in january-2006 49
Fundamental of Transmission Sec. 3.2
different PCM primary multiplexers and thus the digital hierarchies
differ as well.
2.3 Since these two PCM primary multiplexers are available, two digital
heirarchies only would have to be expected. In reality, however, two
digital hierarchies with several variants are under discussion because
the choice of the fundamental parameters of a digital hierarchy
depends not only on the PCM primary multiplex, which forms the basic
arrangement in that hierarchy, but on many other factors such as :
(a) the bit rate of the principal signal sources.
(b) traffic demand, network topology, operational features, flexibility
of the network.
(c) time division and multiplexing plant requirements.
(d) compatibility with analog equipment.
(e) characteristics of the transmission media to be used at the bit
rates for the various levels of the hierarchies.
Since today these factors which are essential for forming digital
hierarchies vary from country to country, it is no wonder that we now
have to consider more than two proposals for digital hierarchies.
3.0 DIGITAL HIERARCHIES BASED ON THE 1544 KBIT/S PCM PRIMARY
MULTIPLEX EQUIPMENT
It was around 1968 that Bell labs. proposed a digital hierarchy based on the 24-
channel PCM primary multiplex at the various levels of the hierarchy :
Level in hierarchy Bit rate Trans. line
First level 1544 kbit/s T1
Second level 6312 kbit/s T2
Third level 46304 kbit/s L5 (Jumbo Grp)
Fourth level 280000 kbit/s WT4 (Wave guide)
Fifth level 568000 kbit/s T5
This proposal was modified during the following years. At the end of the study
period 1968/72, the following digital network hierarchy was finally proposed as given
in Fig.1.
BRBRAITTJabalpur, issued in january-2006 50
Fundamental of Transmission Sec. 3.2
Fig. 1
Encoded FDM (Master Group) USA & Canada
3.1 For the various bit rates at the higher levels of the two proposals,
different reasons have been indicated. The bit rate of 44736 kbit/s was
selected to provide a flexibility point for circuit interconnection and because it
was a suitable coding level for the 600 channel FDM mastergroup.
3.2 It is also an appropriate bit rate for inter-connection to radio-relay links
planned for use at various frequencies.
3.3 At the same time, N.T.T. published its PCM hierarchy are concerned
(1554 and 6112 kbit/s, respectively), these two proposals are identical. They
differ, however, in the higher levels as shown in Fig.2.
Fig. 2
Encoded TDM (Japanese)
BRBRAITTJabalpur, issued in january-2006 51
Fundamental of Transmission Sec. 3.2
3.4 In the N.T.T. proposal the bit rate of 32064 kbit/s at the third level of
the proposed hierarchy might be considered a suitable bit rate to be used on
international satellite links perhaps for administrations operating different
PCM primary multiplex equipments. It is also a convenient bit rate for
encoding the standardized 300-channel FDM mastergroup. Delta modulation
and differential PCM for 4 MHz visual telephone are also suitable for this bit
rate. Transmission of 32064 kbit/s via a special symmetrical cable of new
design is also possible.
3.5 The above fact shows that the differing bit rates of the third level
indicated in the two hierarchy proposals can, therefore, be justified by
technical arguments. As far as the differing bit rates of the fourth level are
concerned, only a few technical reasons are included in the two proposal. In
both cases coaxial cables are used as a transmission medium so that the
medium does not call for different bit rates.
3.6 Moreover, it seems that at present the specifications of the fourth level
(and higher ones) in the two proposed hierarchies is not yet considered so
urgent. For the time being the third level seems to be more important.
3.7 The C.C.I.T.T. faced with this situation has reached finally the solution
which is covered by CCITT recommendation G.752 as one can see from this
recommendation, two different hierarchical levels are existing in the third level
of this hierarchy, namely 32064 kbits/s and 44736 kbit/s respectively. Higher
level have not been specified so far.
4.0 DIGITAL HIERARCHY BASED ON THE 2048 KBIT/S PCM PRIMARY
MULTIPLEX EQUIPMENT
For this digital hierarchy, two specifications have at present been laid down
only for the first level at 2048 kbit/s and for the second level at 8448 kbit/s.
As for the higher levels, the situation is just contrary to that existing in the
case of digital hierarchies derived from 1544 kbit/s primary multiplex, i.e.
general agreement has more or less been reached on the fourth level having
a bit rate of 139264 kbit/s. 5th order system where bit rate of 565 Mb/s have
also been planned now.
4.1 The critical point in this hierarchy is whether or not the third level at 34368
kbit/s should exist.
BRBRAITTJabalpur, issued in january-2006 52
Fundamental of Transmission Sec. 3.2
4.2 The C.C.I.T.T. has agreed after long discussions on the following
(Recommendation G.751) “that there should be a 4th order bit rate of 139264
kbit/s in the digital hierarchy which is based on the 2nd order bit rate of 8448
kbit/s”.
There should be two methods of achieving the 4th order bit rate :
Method 1 by using a 3rd order bit rate of 34368 kbit/s in the digital hierarchy.
Method 2 by directly multiplexing sixteen digital signals at 8448 kbit/s. The
digital signals at the bit rate of 139264 kbit/s obtained by these two methods
should be identical.
The existence of the above two methods implies that the use of the bit rate of
34368 kbit/s should not be imposed on an Administration that does not wish
to realize the corresponding equipment.
4.3 In accordance with the above two methods the following realizations of digital
multiplex equipments using positive justification are recommended :
Method 1 : Realization by separate digital multiplex equipments : one type
which operates at 34368 kbit/s and multiplexes four digital signals at 8448
kbit/s; the other type which operates at 139264 kbit/s and multiplexes four
digital signals at 34368 kbit/s.
Method 2 : Realization by a single digital multiplex equipment which operates
at 139264 kbit/s and multiplexes sixteen digital signals at 8448 kbit/s.
Method 1 has been put into practice.
4.4 Where the fifth level is concerned, some preliminary proposals (e.g. 565148
kbit/s) have been submitted which were not discussed in detail.
Therefore, the present structure of this digital hierarchy is as given in Fig.3.
Fig. 3
BRBRAITTJabalpur, issued in january-2006 53
139.264
Fundamental of Transmission Sec. 3.2
Encoded TDM (European)
5.0 Most of the administrations favour the specification of a third level at 34368
kbit/s, mainly as a suitable flexibility point for the operation of the network and
as an adequate bit rate for digital line systems which are to be set up either
on new cables (screened symmetrical or micro-coaxial cables) or an radio-
relay links. Other administrations do not consider the specification of a third
level to be advantageous for their networks. On the contrary they regard it to
be more economical to go directly from the second level at 8448 kbit/s so the
fourth level at 139264 kbit/s, is also achieved by multiplexing four digital
signals at 34368 kbit/s, each of which is obtained by multiplexing first four
digital signals at 8448 kbit/s. However, this is a matter of internal multiplexing
only, i.e. digital multiplex equipment of this type has no external input or
output at 34368 kbit/s.
All administrations interested in the third level at 34368 kbit/s would thus be
offered the possibility of using this level. Their digital multiplex equipment
which multiplexes in the same way each of the four digital signals at 8448
kbit/s has to provide external outputs for the resulting signal at 34368 kbit/s.
The digital multiplex equipment which multiplexes each of the four digital
signals at 34368 kbit/s has to provide four inputs for these bit rates and one
output for the resulting bit rate of 139264 kbit/s.
5.1 Outlook
The above context indicates that at the moment the discussion of digital
hierarchies is still underway and is mainly concentrated on the third and fourth
levels. Although certain trends are evident the specification of these and
higher levels will take some time. In the interest of a comprehensive
specification of the digital hierarchies to be drawn up as soon as possible, it is
to be hoped that all parties concerned perform their studies with high priority.
All digital multiplexes and hierarchies proposed till date are operating in an
asynchronous mode (positive justification, “positive stuffing”, bit-interleaved).
It is likely that in the future, synchronous digital multiplex equipment has to be
considered when setting up digital hierarchies. For various digital line systems
being developed in many countries non-hierarchical bit rates have
provisionally been adopted with due regard to the characteristics of the
transmission media used. These non-hierarchical bit rates for digital line
BRBRAITTJabalpur, issued in january-2006 54
Fundamental of Transmission Sec. 3.2
systems have also to be born in mind when defining the digital hierarchies
and may affect the hierarchical bit rates.
6.0 CCITT Recommendations
6.1 Second order digital multiplex equipment operating at 8448 kbit/s and
using positive justification CCITT Rec. G 742.
1. This 2nd order digital multiplex equipment using positive justification is
intended for use on digital paths using 2048 kbit/s primary multiplex
equipments.
2. Bit rates : The nominal bit rate should be 8448 kbit/s. The tolerance on
this rate should be +30 PPM.
3. Frame Structure :
Frame Structure Bit No.
Frame alignment word (1111010000) 1 to 10
Alarm to remote Tml 11 Set I
National use 12 Set I
Bits from tributaries 13 to 212 Set I
Justification Control bits 1 to 4 Set II
Bits from tributaries 5 to 212 Set II
Justification Control bits 1 to 4 Set III
Bits from tributaries 5 to 212 Set III
Justification Control bits 1 to 4 Set IV
Bits for tributaries available for
justification
5 to 8 Set IV
Bits from tributaries 9 to 212 Set IV
Frame Length
bits/tributary
848 bits
206 bits
4. Loss Recovery of Frame alignment and consequent action.
Loss of frame alignment should be assumed to have taken place when four
consecutive frame alignment signals have been incorrectly received in their
predicted positions.
BRBRAITTJabalpur, issued in january-2006 55
Fundamental of Transmission Sec. 3.2
When frame alignment is assumed to be lost, the frame alignment device
should decide that, such alignment has effectively been recovered, when it
detects the presence of three consecutive frame alignment signals.
The frame alignment device having detected the appearance of a single
correct frame alignment signal, should begin a new search for the frame
alignment signal in one of the two following frames.
5. Multiplexing Method
Cyclic bit inter-leaving in the tributary numbering order and positive
justification is recommended. Positive justification should be indicated by the
signal 111, no justification by the signal 000. Majority decision is
recommended.
6.2 Third order digital multiplex equipment operating at 34368 kbit/s.
1. Bit rates :
The nominal bit rate should be 34368 kbit/s. The tolerance on the rate
should be + 20 PPM
2. Frame Structure (Fig. 5)
Frame Structure Bit No.
Frame alignment word (1111010000) 1 to 10 Set I
Alarm to indication to the remote TML 11 Set I
National use 12 Set I
Bits from tributaries 13 to 384 Set I
Justification Control bits 1 to 4 Set II
Bits from tributaries 5 to 384 Set II
Justification Control bits 1 to 4 Set III
Bits from tributaries 5 to 384 Set III
Justification Control bits 1 to 4 Set IV
Bits for tributaries available for
justification
5 to 8 Set IV
Bits from tributaries 9 to 384
Frame length
bits/tributary
1536 bits
378 bits
3. Loss and Recovery of Frame alignment
Same as the 2nd order digital MUX system.
BRBRAITTJabalpur, issued in january-2006 56
Fundamental of Transmission Sec. 3.2
4. Multiplexing Method
Same as the 2nd order digital MUX system.
BRBRAITTJabalpur, issued in january-2006 57
Fundamental of Transmission Sec. 3.2
Fig. 5
BRBRAITTJabalpur, issued in january-2006 58
Fundamental of Transmission Sec. 3.2
34368 Kb/s Multiplexing Frame Structure
BRBRAITTJabalpur, issued in january-2006 59
Fundamental of Transmission Sec. 3.2
6.3 Fourth order digital multiplex equipment operating at 139264 kbit/s.
1. Bit rates :
The nominal bit rate should be 139264 kb/s. The tolerance on the rate
should be +15 PPM
2. Frame Structure
Frame Structure Bit No.
Frame alignment word (111110100000) 1 to 12
Alarm to indication to the remote digital MUX
tml13 Set I
Bit reserved for National use 14 to 16
Bits from tributaries 17 to 488
Justification Service bits 1 to 4
Bits from tributaries 5 to 488 Set II to V
Justification Control bits 1 to 4
Bits for tributaries available for justification 5 to 8 Set VI
Bits from tributaries 9 to 488
Frame length
bits/tributary
2928 bits
723 bits
3. Loss and Recovery of Frame alignment
Same as the 2nd and 3rd order digital MUX system.
4. Multiplexing Method
Same as the 2nd and 3rd order digital MUX system.
7.0 INTERFACES
7.1 Specification for Interfaces at 2048 kb/s.
1. General characteristics :
Bit rate : 2048 kb/s + 50 PPM
Code : HDB3.
BRBRAITTJabalpur, issued in january-2006 60
Fundamental of Transmission Sec. 3.2
2. Specification at Output Port
Pair(s) in each directionOne Coaxial
Pair
One Symmetrical
Pair
Test Load Impedance 75 ohm (rest.) 120 ohm (rest.)
Nominal peak voltage of a mark
(pulse)2.37 V 3 V
Peak voltage of a space (no pulse) 0+0.237 V 0+0.3 V
Nominal pulse width 244 ns 244ns
Ratio of amplitude of +ve and –ve
pulses at the centre of pulse interval0.95 to 1.05 0.95 to 1.05
Ratio of widths of +ve and –ve
pulses at the nominal half amplitude0.95 to 1.05 0.95 to 1.05
3. Specification at I/P Ports
The digital signal presented at the i/p port shall be modified by the
characteristics of the interconnecting pair. The attenuation of this pair shall be
assumed to follow f law and the loss at a frequency of 1024 KHz shall be in the
range of 0 to 6 dB. This attenuation should take into account any losses incurred by
the presence of a digital distribution frame between the equipments.
The input port shall be able to tolerate a digital signal with these electrical
characteristics but modulated by sinusoidal jitter.
7.2 Specification for Interfaces at 8448 kb/s
1. General Characteristics :
Bit rate : 8448 kb/s + 30 ppm
Code : HDB3
2. Specification at o/p Port :
Pair(s) in each direction One Coaxial Pair
Test Load Impedance 75 ohm (rest.)
Nominal peak voltage of a mark (pulse) 2.37 V
Peak voltage of a space (no pulse) 0 + 0.237 V
Nominal pulse width 59 ns
Ratio of amplitude of +ve and –ve pulses at the centre of pulse interval
0.95 to 1.05
BRBRAITTJabalpur, issued in january-2006 61
Fundamental of Transmission Sec. 3.2
Ratio of widths of +ve and –ve pulses at the nominal half amplitude
0.95 to 1.05
3. Specification at I/P Ports
The digital signal presented at the i/p port shall be modified by the
characteristics of the interconnecting cable. The attenuation of this cable shall be
assumed to follow a f law and a loss at a frequency of 4224 KHz shall be in the
range of 0 to 6 dB. This attenuation should take into account only losses incurred by
the presence of a digital distribution frame between the equipments.
The i/p port shall be able to tolerate digital signal with these electrical
characteristics but modulated by sinusoidal jitter.
7.3 Interface at 34368 kb/s
1. General Characteristics
Bit rate : 3436 kb/s + 20 ppm
Code : HDB–3.
2. Specification at o/p Port
Pair(s) in each direction One Coaxial Pair
Test Load Impedance 75 ohm (rest.)
Nominal peak voltage of a mark
(pulse)1.0 V
Peak voltage of a space (no pulse) 0 + 0.1V
Nominal pulse width 14.55
Ratio of amplitude of +ve and –ve
pulses at the centre of pulse interval0.95 to 1.05
Ratio of widths of +ve and –ve pulses
at the nominal half amplitude0.95 to 1.05
3. Specification at I/P Ports
The digital signal presented at the i/p port shall be modified by the
characteristics of the interconnecting cable. The attenuation of this pair shall be
assumed to follow f law and the loss at a frequency of 17184 KHz shall be in the
range of 0 to 12 dB.
BRBRAITTJabalpur, issued in january-2006 62
Fundamental of Transmission Sec. 3.2
The i/p port shall be also to tolerate a digital signal with these electrical
characteristics but modulated by sinusoidal jitter.
7.4 Interface at 139264 kb/s
1. General characteristics
Bit rate : 139264 kb/s + 15 ppm
Code : CMI
2. Specification at o/p Port
Pair(s) in each direction One Coaxial Pair
Test Load Impedance 75 ohm (rest.)
pk. to pk. voltage 1 + 0.1 V
Rise time between 10% and 90%
amplitude of measured amplitude< 2 ns
Return loss > 15 dB for 7 MHz to 210 MHz
3. Specification at I/P Ports
The digital signal presented at the i/p port shall be modified by the
characteristics of the interconnecting coaxial pair shall be assumed to follow f law
and have a maximum insertion loss of 12 dB at frequency of 70 MHz.
The Return loss characteristic should be same as o/p port. The input port
should be able to tolerate a digital signal with these electrical characteristics but
modulated by sinusoidal jitter.
BRBRAITTJabalpur, issued in january-2006 63
Fundamental of Transmission Sec. 3.2
DIGITAL MULTIPLEXING CONCEPTS, SIGNAL JUSTIFICATION & CONTROL
AND JITTER
1. INTRODUCTION
The functions of digital multiplex equipment are to combine a defined integral number of digital input signals (called tributaries) at a defined digit rate by time division multiplexing and also to carry out the reverse process (demultiplexing).
In analogue system, multiplex equipment uses F.D.M. to assemble individual
channels into groups, super group etc. Similarly, in digital systems, hierarchical levels have
been defined using T.D.M. and are identified by their digit rate measured in bit/sec.
Bit rate Mbit/sec. No. of channels
2.048 308.448 120
34.368 480139.264 1920
2.0 MULTIPLEXING OF DIGITAL SIGNALS
The digital signals which are to be multiplexed may be synchronous to one clock (called master clock) or they may not be synchronous (called asynchronous signals).
3.0 MULTIPLEXING OF SYNCHRONOUS DIGITAL SIGNALS
The various tributary bit streams are synchronous and operate at the same rate defined as T bit/sec. To multiplex ‘n’ such tributaries the rate of multiplex output should be nT bit/s. The method adopted for multiplexing such n signals into one stream may be as follows :
(i) Block interleaving :
Bunch of information taken at a time from each tributary and fed to main multiplex output stream. The memory required will be very large.
(ii) Bit interleaving :
A bit of information taken at time from each tributary and fed to main multiplex output stream in cyclic order, a very small memory is required.
At the demultiplex end, it is necessary to recognise which bit of information belongs to which tributary. This could be achieved by transmitting a fixed code after a fixed number of information bits called “frame”. The fixed code is called frame alignment signal. It is recognised first and received frame of information is aligned to this fixed code.
BRBRAITTJabalpur, issued in january-2006 64
Fundamental of Transmission Sec. 3.2
This method of multiplexing is easy but not reliable. If any deviation in
nominal bit rate of a tributary occurs, it will cause loss of time slot and hence loss of
information.
BRBRAITTJabalpur, issued in january-2006 65
Fundamental of Transmission Sec. 3.2
4.0 MULTIPLEXING OF ASYNCHRONOUS SIGNAL
Here, various tributaries operate at different bit rates.
Two signals are asynchronous at their corresponding significant instant occur at nominally the same rate, any variation in rate being constrained within specified limits.
When nominal bit rate of tributaries are within specified limit. It is necessary to synchronize the tributary signal with a common nominal bit rate of multiplexer derived from timing generator of multiplexer. The synchronization is done in such a way that there is no loss of information. The process adopted for such synchronization is called “Pulse stuffing” or justification. Justification is a process of changing the rate of digital signals in a controlled manner. There are three types of justification processes :
(a) Positive justification : Common synchronization bit rate offered at each tributary is higher than the bit rate of individual tributary.
(b) Positive-negative justification : Common synchronization bit rate offers is equal to the nominal value.
(c) Negative justification : Common synchronization bit rate offered is less than the nominal value.
Fig. 1(a) shows a configuration where the outputs of two PCM transmitters
A&B are to be multiplexed in the combiner. If A and B are synchronous, they can be
easily multiplexed by the combiner as shown in Fig. 1(b). Generally, however, A&B
are clocked by separate clock sources of asynchronous. In this case multiplexing is
not successively accomplished simply by the use of combiner owing to the
occurrence of pulse phase fluctuations and/or pulse amplitude superposition as can
be seen in Fig.1(c).
5.0 RETIMING ASYNCHRONOUS SIGNALS BY JUSTIFICATION
Figure 2 shows a system for explaining the principle of the multiplexer for
successfully multiplexing plural asynchronous signals. The waveforms appearing at
various points in Fig.2 are shown in Fig.3. An asynch. input pulse train A is written
into MEM I comprising several elements. The writing pulse train C whose bit rate is f
is extracted from A at a clock extraction (CLK EXT I). On the other hand, the written
information is read out of MEM I with a sufficient phase lag with respect to time of
writing in. Through an inhibit gate (INH GATE I), the reading pulse train D is
obtained by dividing the output bit rate nf (1+ Δ) of a common clock generator (CLK
GEN) at a bit rate divider (DIV 1).
n - no. of asynch. signals to be multiplexed.
BRBRAITTJabalpur, issued in january-2006 66
Fundamental of Transmission Sec. 3.2
Δ - clock increase rate.
BRBRAITTJabalpur, issued in january-2006 67
Fundamental of Transmission Sec. 3.2
As the bit rate of the reading pulse train D is set at (f+ Δ f) which is higher
than any value of f, the time of read out (D) gradually approaches that of write in ©.
The phase difference between C&D is monitored by a phase comparator of COMP I
and just before the difference reaches zero, a pulse is applied to the inhibit input of
INH GATE I from a control circuit (CONT I) to inhibit the gate. At this moment, with
one bit of the reading pulse train D being removed, the reading operation pauses
and an information less pulse (or justification pulse) is inserted into the read out
pulse train E. the time of read out (D) at the same time is again set to a sufficient lag
with respect to time write in (G). As all the signals read out of the respective
memories are now retimed by timing pulses derived from the common CLK GEN,
they are now easily multiplexed as F in Fig.3 at the combiner (COMB).
The information pulses inserted into E (those hatched in Fig. 3) and this sort
of retiming method are respectively called “justification pulses” and “justification”.
The information whether or not justification has been performed, is inserted into F
and COMB and transmitted to the receiving side.
6.0 RECOVERING ORIGINAL SIGNALS BY DEJUSTIFICATION
The justification pulses have to be removed at the receiving side to perfectly
recover the original signals. This operation is called “dejustification”.
The transmitted pulse train F from the line is received and demultiplexed at
distributor (DIST). One of the demultiplexed signal E that corresponds to A, is written
into memory MEM 2. The writing pulse train G whose bit rate is Δis obtained through
an ingibit grate (INH GATE 2) by dividing the output bit rate nf(1+ Δ f) of clock
extractor (CLK EXT2). On the other hand, the written information is read out of MEM
2 with a slight phase lag with respect to the time of write in. The reading pulse train
H, whose bit rate is f, is applied from voltage controlled oscillator (VCO). As the bit
rate of the reading pulse train H is lower than that of the writing pulse train G, the
time of read out (H) gradually drifts away from that of write in (G). Just before a
justification pulse in E (ONE of these hatched in Fig.3) is written into MEM 2, the
information, telling that the justification has been performed is applied from DIST to
a control circuit (CONT 2). Then a pulse is applied to the inhibiting input of INH
GATE 2 from CONT 2 to inhibit the gate.
BRBRAITTJabalpur, issued in january-2006 68
Fundamental of Transmission Sec. 3.2
At this moment, with one bit of the writing pulse train G being removed, the
writing operation pauses and the justification pulse is removed or dejustified. At the
same time, the time of read out (H) again set to be very close to the time of write in
(G). As the reading operation does not pause, the original signal is recovered as ‘A’.
The phase difference between G and H is monitored by a phase comparator (COMP
2), and the low frequency components of the output voltage of COMP 2 are applied
to VCO through a low pass filter (LPF). Thus, the jitter introduced due to
dejustification into the read out pulse train ‘A’ is sufficiently suppressed. The loop
formed by VCO, COMP and LPF is called a “Phase controlled loop”.
Figure 4 gives the frame structure for 34 Mbits/sec system.
7.0 JUSTIFICATION CONTROL SIGNAL
Justification control signal indicates at demultiplexer the presence of
justifiable bit in the frame. To avoid errors present in the justification control bit, more
than one bit is transmitted as control bit and majority decision is taken at
demultiplexer.
Normally 3 or 5 bits (3 bits in case of 8 and 34 Mbits systems and 5 bits in
140M bits system) are transmitted per tributary per frame as justification control bits
and 2 or 3 bits present at demultiplexer out of 3 or 5 bits transmitted are taken as
majority decision and it is assumed that justifiable bit is present in the frame. These
3 or 5 bits of justification control bits per tributary per frame are distributed in the
frame. Two or three digital errors are required to cause false information of
justification (loss of one digit or addition of one digit) which results in a loss of frame
alignment in lower hierarchical levels.
8.0 HARDWARE REALIZATION OF DIGITAL MULTIPLEX SYSTEM
System are realized by digital circuits using TTL and ECL ICs. The typical
gate delays and toggling speeds of the different series of ICs are given below :
Propagation delays
(typical)
Toggling speed
(typical)
LS series TTL 15 ns 25 MHz
S series TTL 5 ns 75 MHz
10,000 series
ECL
3 ns 200 MHz
BRBRAITTJabalpur, issued in january-2006 69
Fundamental of Transmission Sec. 3.2
As is is evident from the above rates that LS series is suitable only till 8 MHz
system, where as S series is suitable for 34 MHz system and 10,000 series is being
used for 140 MHz system.
9.0 TRANSMIT TRIBUTARY
The information from tributary is written in an elastic memory with tributary
clock derived from incoming signal. Elastic memory is read out by a clock which is
faster than the clock of its own. Reading clock is derived from common transmit
clock (Common synchronization clock). The reading clock is of rate F2/n (where n is
the no. of tributaries and F2 is output frequency of multiplexer for ex. 34,368/4 for
34M bit system) with gaps where non information bit occurs in the frame structure
(i.e., for frame alignment signal and justification control bit, service digits). Since
read clock always operates faster than write clock, it is required to stop read clock
for a bit and insert non-information bit-justification bit. The information which read out
from memory contains information bit, justification control bit and justifiable bit. The
decision when to insert the justifiable bit is taken when linearly increasing phase
difference crosses a threshold level. The threshold value is selected in such a way
that average rate of read clock is equal to the write clock rate.
In the demultiplexer, the clock timing of the input multiplex signal enables a
control on the timing of operations. The detection of frame alignment signals enables
the receive frame to be aligned with the transmit frame which enables the receiver to
demultiplex the tributary information. This tributary information is written in elastic
memory as in transmit tributary by the clock derived from receive clock. A phase
locked oscillator is used to read the elastic memory with a timing rate equal to the
average write clock and, therefore, equal to that of the corresponding tributary signal
at the input of the multiplexer.
10.0 JITTER ASPECT OF MULTIPLEX EQUIPMENT
While considering the jitter aspect of the multiplex system, different types of
jitter introduced in the systems are taken into account such as :
(a) Jitter introduced due to the routine insertion of the frame alignment
words and of the service digits and justification instructions.
(b) Justification jitter.
(c) Waiting time jitter.
BRBRAITTJabalpur, issued in january-2006 70
Fundamental of Transmission Sec. 3.2
The first two jitter components are at high frequencies in relation to the pass
band of the P.L.L. and hence filtered out, whereas waiting time jitter which is due to
phase difference between write and read clock and varies from frame to frame, has
a low frequency component and cannot be jittered out by P.L.L. at the demultiplexer
output.
11.0 LINE INTERFACE
The output of multiplexer is purely a unipolar digital signal having D.C.
voltage. Normally cable are balanced, having no DC component, or minimum DC to
avoid cross talk. Any code such as AMI, HDB3, CMI can be chosen, which are
bipolar in nature. These line codes are selected in such a way that :
1. Timing signal at the receiver could be extracted easily, hence it should
contain enough timing information. Timing signal extraction circuit has
limitations because of the “Q factor” of the coil used in the circuit.
Higher the Q of coil, the costlier it is.
2. The bandwidth of the signal is kept small. The energy in the upper part
of the frequency spectrum should be small in order to avoid attenuation
distortion caused by high transmission loss at higher frequency.
3. The energy in the lower part of the frequency spectrum should also be
kept small in order to reduce the interference from voice frequency
circuit in the same cable and vice-versa.
4. It should have no DC component which could be obtained by selecting
a code having minimum digital sum variation.
The output of 2, 8 and 34 MBit systems is in HDB3 code. Rules followed for
HDB3 line code are as follows :
(i) Every sequence of four consecutive zeros is replaced by either 000V
or B00V, where B is a normal bipolar mark and V is a mark violating
the AMI sequence.
(ii) Sequence 000V or B00V is used such that the number of bipolar
pulses between successive violation pulse is odd. This ensures that
violation pulses, form their own bipolar sequence.
The output of 140 MBit system is in CMI code, where the coding rule is
as follows :
BRBRAITTJabalpur, issued in january-2006 71
Fundamental of Transmission Sec. 3.2
Binary element CMI code
1 00 } transmitted
11 } alternately
0 01
Fig. 1
BRBRAITTJabalpur, issued in january-2006 72
CombinerPCM
FIG. 1 (a)
When A & B are Synchronous
FIG. 1 (b)
FIG. 1 ( c )
Fundamental of Transmission Sec. 3.2
Fig. 2
System for Multiplexing & Demultiplexing Asynchronous Signals
BRBRAITTJabalpur, issued in january-2006 73
ME
M2
Fundamental of Transmission Sec. 3.2
Fig. 3
Waveforms at Respective Points
BRBRAITTJabalpur, issued in january-2006 74
Fundamental of Transmission Sec. 3.2
BRBRAITTJabalpur, issued in january-2006 75
380 BIT
S
FIG. 4
Fundamental of Transmission Sec. 3.2
LINE CODES
1.0 INTRODUCTION1.1 The digital output of a PCM equipment contains "1s and 'O's. For transmission of the digital signals between two points, the '1' s and 'O' s contained by the signal are transmitted in the form of pulses as shown in Fig. 1.
Fig. 1. Pulse representation of digital signals
The transmission medium normally used for transmitting PCM signals is the VF cable pair. If the stream of pulses shown in Fig. 1. is transmitted as it is, the signal undergoes high frequency attenuation distortion and also suffers from other kinds of distortion such as cross talk etc. This is because of the electrical characteristics of the VF pair. Moreover the .signal passed through the cable pair has strong DC content. This is because of the characteristics of the signal and those of the medium do not match.
1.2 For distortion free transmission, the PCM output should be converted into a suitable code which will match the characteristics of the medium. This code is called the "line code" and the signal converted to the line code is called a line signal. This handout briefly describes the basic requirements of a line code, the different types of line codes and the operation of an HDB3 code decoder.
2.0 REQUIREMENTS OF A LINE CODE.2.1 The line code used for transmission of PCM signals should meet the following requirements.(i) The total band width of the signal should be as small as possible.(ii) The energy in the upper part of the signal spectrum should be small so that the attenuation distortion caused by the high transmission losses at high frequencies is very low.
The energy in the lower part of the spectrum should also be low to reduce the interference (cross talk) from VF circuits in the same cable. This would minimize interference from the PCM signals to the other VF circuits as well. (It may be recalled that a narrow pulse has. a wide frequency spectrum, the energy distribution, i.e. the levels of the various frequency components of the spectrum should be such that the
BRBRAITTJabalpur, issued in january-2006 76
Fundamental of Transmission Sec. 3.2
major chunk of the signal power is around the centre of the spectrum. The frequency components in the lower and higher limits of the spectrum should have low levels).
(iii) There should not be any DC comonent in the line coded sinal (line signal) so that transformers can be used for coupling purposes.
(iv) The line code should permit easier designs of repeaters.
(v) The line code should contain adequate timing information since this is vital for regenerating the signals at repeater stations and at the receiving station for the purpose of synchronization.
(vi) The line code must have an in-built error monitoring capability.
2.2 Since the invention of PCM by A.M. Reeves in 1938, a number of line' codes has been designed. A few of them will be discussed in the following paragraphs.
3.0 NRZ BINARY CODE.
3.1 NRZ stands for "Non-return to Zero" code.
(i) Suppose we have a code 100111011001 In Pulse form this would appear as in Fig. 2.
.Here it may be seen that whenever a' 1' is continuously transmitted, the output continues at 'V level for a duration equal to the number of bits transmitted. In a30 chl. PCM system, the bit duration is 0.488 micro second. If three '1 ' 1 s are transmitted, the output signal is a pulse which is 3x0.488 micro seconds wide.
BRBRAITTJabalpur, issued in january-2006 77
Fundamental of Transmission
(ii) In the example the signal has only one polarity. A 'O1 is O volt and a '1 ' is positive (say-f-5v). Sometimes, however, a '1 ' is denoted by a positive voltage and "O1 is denoted by a negative voltage. A pulse stream 10,0.110111001 in such a case can be represented graphically as in Fig.3.
Here also when there is a string of% 1' s to be transmitted, the output continues at * 1' for as many bits as are continuously transmitted.In both cases, the output does not return to zero after every 'V bit when a number of 1's are transmitted.- for this reason, this type of code is called a non return to zero or "NRZ" binary. When the signal has only one polarity, as in the first example, the code is called unipolar or unbalanced NRZ binary and when the signal has dual polarity, as in the second example it is called a balanced NRZ binary or bipolar NRZ.
3.2 Limitation of NRZ Binary Code.Fig 4. Shows the spectrum of an NRZ binary signal.(i) From the spectrum for the NRZ signal, it can be seen that there is a strong DC component.
(ii) There is a large low frequency content. This may result in cross talk. (iii) There is no frequency component at 1/T, 2/T etc. It means that there is no component corresponding to the clock frequency. This makes efficient recovery of timing pulses very difficult.
BRBRAITTJabalpur, issued in january-2006
FIG.3 BIPOLAR NRZ SIGNAL
78
Fundamental of Transmission
(iv) The high DC component does not permit the use of transformers for coupling. (v) Thus the simple NRZ binary code does not satisfy the requirements of a line code.
4.0 RZ BINARY
4.1 This is a modification of the NRZ code and stands for "Return to zero" binary. In this '1' bit is represented by a pulse of half the bit duration as shown in Fig. 5
(b) The spectrum for this code is shown in Fig. 5 (c).
FIG. 5. RZ BINARY - WAVEFORM & SPECTRUM
4.2 Here the '1' bits pulse have only 50% duration. From the spectrum we can seen that there is a strong component at 1/T, the clock frequency. Hence clock recovery is possible. But still, because of the strong DC.component and low frequency content, this code is also not suitable for transmission.
BRBRAITTJabalpur, issued in Nov. 2008 79
Fundamental of Transmission
5.0 BIPOLAR CODING (AMI CODE).5.1 AMI stands for "Alternate Mark Inversion" This code solves the DC content problem,. Here, a logic 'O' is represented by o volt and logic '1' is alternately encoded with positive & negative voltages. Therefore, the average voltage is maintained very close to zero and hence there is no DC component. Under steady state conditions a low DC of the order of 0.4 to 0.9 volts only remains.The waveform for an AMI code is shown in Fig. 6.
FIG. 6. AMI CODE. SIGNAL WAVEFORM5.2.1 From the AMI wave form is can be seen that this code has a built in error monitoring facility. Since alternate marks (or *1's) are to be inverted, any deviation from this would mean an error. This can be practically achieved by having a comparator network which will check the polarity of the ' 1' s received. The spectrum of an AMI code signal (after doing Fourier analysis and plotting the various frequency components of the signal) has a shape as shown in Fig. 7.
FIG. 7. SPECTRUM OF AMI SIGNAL
(ii) From the spectrum For the AMI code it can be seen that the maximum power is centred around the half bit rate i.e. 1/2T and that there is no DC component.
BRBRAITTJabalpur, issued in Nov. 2008 80
Fundamental of Transmission
(iii) Although the AMI code satisfies most of the line code requirements, a series of *O's is encountered, the timing information is likely to be lost. This is a limitation of the AMI code.
(iv) The AMI code is the one specified for 24 channel PCM systems.
5.3 Generation of AMI code.Fig. 8. shows the block schematic of the network used to generate the AMI code.
(i) The serial PCM output in RZ binary form is fed to the flioflop toggle point and to the gates G1 and G2 as show(ii) Cricuit operation
(A) First make arrivesUnder this condition, the flip flop is set and Q goes HIGH. Consequently Gl output goes HIGH which triggers the positive generator. The output of this generator is a positive pluse. The wave forms for this condition are shown in section I of Fig. 9.
FIG. 9. AMI GENERATION - WAVEFORMS FOR FIG.5
BRBRAITTJabalpur, issued in Nov. 2008 81
Fundamental of Transmission
(B) The next mark arrivesThis pulse will reset the flip flop. Hence Q goes HIGH. G2 will be also HIGH and it triggers the -ve generator whose output is a negative pulse as shown in section II.
(C) Two continuous ‘1 ' s arriveUnder this condition, the flip flop is Set by the first bit and Reset by the second. Therefore G1 goes HIGH first to generate a positive pulse and G2 goes HIGH next to generate a negative pulse as shown in section III. The adder network combines the outputs of negative and positive pulse generators to give the AMI output. These various wave forms are shown in Fig. 9. from (a) to (h).
6.0 HDB3 CODE
6.1 To overcome the timing difficulties in the AMI code another code called the HDB3 code has been devised. The abbreviation HDB stands for HIGH-DENSITY BIPLOAR code.
6.2 (i) The HDB3 code is actually a code from a family of codes derived from what is called binary N zero substitution or BNZS method.(ii) In this method, the PCM signal is usually transmitted according to the AMI code; but when a string of N zeroes is encountered, the N zeroes are replaced by a special code, which will deliberately introduce a bipolar deviation or violation. (Normally in the AMI code, if there are N zeroes, they will be transmitted as such. But in the BNZS method, a ' 1 ' pulse is introduced deliberately. The polarity of this " 1 ' depends upon the polarity of the previous mark encountered. This additional' 1 ' pulse introduced in place of a '0' is called a "violation").
(iii) When the substitution of a zero by a violation pulse is done for 4 zeroes, (i.e. N = 4) the BNZS code is called the B4ZS code. Since this code precludes strings of zeroes greater than three, it is also referred to as a HDB3 code. Here when the number of zeroes is more than 3, the fourth bit position is filled with a violation pulse.
(iv) Consecutive violations are made to be of opposite polarity so that these violations themselves donot produce any DC component.
(v) The violation pulse is always placed in the last bit position. Suppose there are 4 zeroes coming in a row. Then the HDB3 code for this would be BOOV in general where V is the violation pulse. The polarity of this depends on the polarity of the last '1' and the number of %1'"encountered prior to the four zeroes.
(vi) The first bit of the code was shown as B in (v) above. B is set to '0' if the number of '1' s encountered prior to the violation is ODD. If it is EVEN or ZERO then the "B" bit is filled with a T whose polarity is in accordance with the AMI code. i.e. if the previous ' 1' was positive + then B is '1' with negative polarity and vice versa. (vii) The substitution rules stated above are summarized in table 1.
BRBRAITTJabalpur, issued in Nov. 2008 82
Fundamental of Transmission
Table 1. HDB3 Code - Substitution Rules
Number of ' 1 ' since last Violation
Polarity of preceding '1'
Odd Even
Negative 000 V" B+OOV+
Positive 000 V + B" 00 V
From the above Table it can be seen that when the number of Ts is even, the HDB3 substitution is BOOV; in this, B follows the AMI code and V follows B. If 'B' is positive, then V is also a positive pulse. Thus consecutive violations are made to be of opposite polarity so that there is no DC component added by the violations themselves.
6.3 Examples of HDB3 Code ConversionCondition 1.
6.3.1. (Number of' 1 's preceding violation is ODD.)Consider the NRZ binary wave form given in Fig 10 (a). Assume that there is no previous violation.
[NO of 1 = ODD]
Fig 10 (b) is the RZ binary form for Fig 10 (a).
Fig 10 (c) is the corresponding HDB3 Code.
(i) Notice that upto pulse Z, the HDB3 Code follows the AMI Code.
(ii) After pulse Z, we have four consecutive zeroes. This calls for a violation.
(iii) Prior to the arrival of these zeroes, three ‘1 's were encountered i.e.
number of ‘1 's preceding the violation is ODD.
BRBRAITTJabalpur, issued in Nov. 2008 83
Fundamental of Transmission
(iv) This means that the HDB3 substitution for the 4 zeroes will be of the form 000V.
(v) Also the polarity of the last ' 1 ' before the arrival of the zeroes is positive. Therefore the violation pulse will also be a positive pulse, as shown shaded in Fig 10 (c).
(vi) Then the fourth pulse P arrives which is converted according to AMI code as shown.
EX: Draw the HDB3 code with the first pulse in Fig 10 (c) as a negative pulse.
6.3.2 Example 1. (b)
Consider the RZ binary wave form shown in Fig 11 (a). In this the first pulse is a violation pulse resulting from the occurrence of 4 zeroes just before pulse X.
(i) Here, the first pulse is positive violation pulse. The next pulse (i.e. pulse X) is converted in accordance with AMI code and is therefore
shown as a negative pulse in Fig 11 (b).(ii) After pulse X we get 4 Zeroes.(iii) Now, the total number of '1's SINCE the last violation is one, i.e. ODD. Therefore the substitution is of the form 000V.(iv) As the polarity of the last M' before the arrival of zeroes is negative, the violation pulse is also negative which is shown as a shaded pulse. (V-).6.3.3 Example 1 (c)Consider the RZ wave form shown in fig 12 (a), assume that there was no previous violation.
FIG. 12. EXAMPLE OF HDB3 CODE [1(c)]
BRBRAITTJabalpur, issued in Nov. 2008 84
Fundamental of Transmission
(i) Here after pulse X, we have 4 zeroes and again after pulse Y, 4 more zeroes.
(ii) The first pulse goes as a positive pulse. The next four zeroes are substituted by 000 V because the polarity of the last '1' is positive and the total number is ODD.
(iii) Then pulse is converted into a negative pulse according to AMI code.
(iv) The next 4 zeroes are substituted by 000V since in this case the total number of '1' s is again ODD and the polarity of the last '1' is negative.
6.3.4 Condition 2 :Number of T EVEN consider the RZ binary shown in Fig.13(a) and assume that there was no previous violation.
(i) In this case the pluses X and Y are converted according to AMI Code as shown in Fig 13 (b).(ii) Four zeroes are encountered after pulse Y. Here the number of' 1 's prior to these zeroes is EVEN and therefore the substitution is of the form BOOV.(iii) Since the last "1' is a negative pulse, from Table 1 the substitution BOOV.(iv) The HDB3 substitution for the 4 zeroes is shown in Fig 13 (b) as shaded positive pulses.(v) The next pulse Z is converted as a negative pulse in accordance with AMI code.6.3.5 Example 2 (b)
Consider the RZ wave form shown in Fig 14 (a). Assume there was no previous violation.
Fig 14. HDB CODE CONVERSION (eg 2b)
BRBRAITTJabalpur, issued in Nov. 2008 85
Fundamental of Transmission
(i) In this case, the wave form begin with 4 zeroes. There are no previous violations. The number of "1's preceding the string of "0" is zero i.e. EVEN.
(ii) Therefore, The substitution is of the form boov.
(iii) The (AMI) coding network is so designed that the very first bit is always a positive pulse. Hence the HBD3 code for Fig 14 (a) would be 00 V which is as shown in Fig 14 (b).
(iv) The following " 1's X, Y and 2 are converted according to AMI code.
6.3.6 Example 2 (C)Consider the RZ wave from in Fig 15 (a). Assume a positive violation pulse to start with.
Fig. 15 HDB2 code conversion [eg. 2 (c)
(i) Here, as shown in Fig 15 (b), a positive violation pulse is assumed. Then we have pulses X and Y which are converted according to AMI code.
(ii) After pulse Y, we get 4 zeroes. Theses should be substituted by BOOV since the number of' 1 's is EVEN. (iii) Further since the polarity of the last ' 1 ' is positive, the code would
be B 00V. This is shown as shaded pulsed in Fig 15 (b). Then pulse Z is converted according to AMI code.
6.3.7 Example 2 (d)Consider the RZ Wave form in Fig 16 (a)
BRBRAITTJabalpur, issued in Nov. 2008 86
Fundamental of Transmission
(i) Here after pulses X and Y, we get eight consecutive zeroes. (ii) X and Y follow AMI code. Number of T s is Even in this case.
(iii) The first four zeroes are substituted by B 00 V since the last' 1' was negative.
(iv) After the first 4 zeroes, we have another 4 zeroes coming number of' 1' in this case zero i.e. EVEN again. (v) Hence the second set of zeroes is also converted as BOOV. But the polarity of the last '1' (although it was a violation pulse), was
positive.Hence, the second set of zeroes is converted, as B 00 V
(vi) Pulse Z, then follows AMI code,
(vii) The substitution pulses are shown in shaded areas in Fig 16 (b). 6.4 But for the insertion of violation pulses, the HDB2 coding is similar to the AMI code. The spectrum for the HDB3 code is shown in Fig. 17
From the spectrum it can be seen that there is no DC component and that maximum power is around 0.46/T. It means that the power in the lower and upper limits of the spectrum is low. This would minimize high frequency alternation and cross talk. Although this spectrum also has mulls at 1/T2/T etc, because of the violation pulse introduced, timing is not lost when a long
BRBRAITTJabalpur, issued in Nov. 2008 87
Fundamental of Transmission
string of zeroes is encountered. The HDB3 code satisfies ad the requirements of a line code and is therefore specified by the CCCTT for 30 channel PCM systems having 2048 kbits/sec, clock.
7.0 HDB3 CODER & DECODER Fig. 18 shows a simplified block schematic of an HDB3 CODER Here, the encoder output is passed to the AMI circuit through a A bit shift register. The shift register output is also fed to a ^4 ZERO DETECTOR'. Normally, the HDB3 CODER FUNCTIONS as an AMI code generator. When 4 or more *O's come, they are detected and an output goes to the violation command circuit during this operation the 0 detector is inhibited for 4 clock periods. The mark counter gives a ' 1 ' when even number of marks are encountered.
When ODD ' 1 ' are encountered, the AND gate O/P is zero. The pulse from the violation command circuit is added to AMI output. When even * 1 ' s are encountered, the AND gate output SETS the first stage of the shift register. This goes to the AMI circuit and gets coded according to AMI law. The violation pulse is then added after a delay of 2 bits. After the violation pulse is added, the inhibit circuit and more counter are cleared.
BRBRAITTJabalpur, issued in Nov. 2008 88
Fundamental of Transmission
7.2 HDB3 DECODERThe HDB3 code must be decoded into RZ binaryform at there receiving end for detecting the analog signal. The HDB3 decoder used for this purpose has the following function.
(a) Detect an AMI violation(b) Count the number of zeros preceding the violation
This is done to determine if the last received mark is HBD substitution or an error.
Fig. 19 shows a simplified block schematic of an HDB3 decoder.
Here the RZ converter converts all negative pulse into positive pulses. These are then fed to a four bit shift register. When there is no violation. (i.e. when there are no continuous zeroes present) the shift register gives a serial output which is RZ binary form.
Simultaneously, The AMI violation detector checks for a deviation from the AMI code. If alternate N1's are not having opposite polarity, then it gives an output which will reset all the four bits of the shift register to zero. (This is done because, at the transmitting end when a number of zeroes are faced the V bit in BOOV code was inserted with a polarity opposite to that of the previous mark By resetting the shift register we are converting the BOOV code back to 0000. This is what is desired).
The output of the shift register is a serial RZ digital signal with the HDB3 code substitutions removed. This RZ signal is the same as the TDM multiplexed output of the PCM equipment and this can be further processed through PCM decoder to retrieve the analog signal. Waveforms Typical HDB code/decoder wave forms are shown in Fig.20.
BRBRAITTJabalpur, issued in Nov. 2008 89
Fundamental of Transmission
BRBRAITTJabalpur, issued in Nov. 2008 90
Fundamental of Transmission
8.0 CMI CODE (CODED MARK INVERSION)
8.1 This is a 2 level NRZ code in which a binary '0' is coded as '01' and binary ‘1's are coded alternatively as a logic '0' or T. In case of a binary '0' the two CMI bits '0' and '1' are for half clock duration whereas for binary Ts the 'O1 and '1' are for full clock duration. This is illustrates in Fig.21.
This is basically a binary code and the bit rate of the code is twice the bipolar AMI code.For this reason CMI code is grouped with 1B2B family of line codes. The CMI code has a high clock content and for this reason. The CMI code is recommended by CCITT for 140 Mb/s multiplex equipment (not a line code).
9.0 4B-3T CODE9.1 This is a redundant ternary line code. In this code, blocks of FOUR binary input digits are translated into cords of three ternary digits. The code has following features. Reduction of line frequency by 25% compared to AMI signals.
Provides possibility of Inservice Monitoring of BER by monitoring RDS
(Running Digit sound)
Code efficiency is a high as 84%
Rapid block synchronization
This code is used in line systems of 34 Mb/s and 140 Mb/s capacity.
BRBRAITTJabalpur, issued in Nov. 2008 91
Fundamental of Transmission
9.2 AB3 T code combination0000 - + 0 - 0001 - - + 00010 - 0 - +0011 - + - 00100 - + + 00101 - 0 + +0110 - + 0 +0111 - + + +1000 - + + - 1001 - - + +1010 - + - +1011 - + 0 01100 - 0 + 01101 - 0 0 +1110 - 0 + - 1111 - - 0 -A Bit binary 3 Bit Ternary Other Ternary combinations are also possible.The Exact combination Varies for manufacturer to manufacturer.
10.0 BINARY CODES10.1 There are 2 level binary codes for used in optical line transmission. These are called alphabetical codes, these have the form 2N-1) B2NB where N is an integer.
Some of the codes are : 1B2Bcode(n = 1) 3B 4B code (n = 2) 5B 6B code (n = 3)
11.0 COMPARISON OF LINE CODES
Parameter AMI HDB3 4B3T
Levels 3 3 3
Redundancy 58.5% 58.5% 18.8%
Normalized timing constant 1 1.28 0.76
Normalized average power 1 1.2 1.36
Max. No. Of consecutive 'O's 4 3 4
Input rate O/P rate 1 1 1.33
DSV (Digital sum variation) 1 2 7
BRBRAITTJabalpur, issued in Nov. 2008 92
Fundamental of Transmission
11.2 SPECTRAL COMPARISON OF LINECODESFig. 22 Shows a comparison of the spectra of various line codes.
12.0 POWER DENSITY OF DIFFERENT CODESThe digital output of the PCM equipment is as such not suitable for transmission over a cable pair. It has to be converted into a suitable line code which will match the physical parameters of the medium. A number of codes have been devised for this purpose of these the most important are the AMI code and the HDB3 code which meet almost all the basic requirement of a line code. The working principle of an HDB3 decoder has also been outlined in this handout.
13.0 5B6B CODE:13.1 The coding is done as per Table - 1. For 5 bits of input signal to the code, either
state 1 or state 2 of 6 bit code is selected as shown in figure (23). Disparity information is used to select the state of the current 6 bit code word as compared with the previous transmitted state.
For example, if state 1 is selected, the input 5 bit data is converted into the corresponding 6 bit code in state-1 in Table-1.
BRBRAITTJabalpur, issued in Nov. 2008 93
Fundamental of Transmission
BRBRAITTJabalpur, issued in Nov. 2008 94
Fundamental of Transmission
If the disparity of the converted 6-bit"code is 0, the next 5-bit data is also converted into a6-bit code in state-1. if the disparity is +2, the next 5 bit data is converted into a 6 bit code in state 2. Thus state 1 and state 2 are alternated by a detection of disparity + 2 or - 2.
BRBRAITTJabalpur, issued in Nov. 2008 95
Fundamental of Transmission
In 5B6B Decoder, the disparity information is used to decide the state of the current 6-bit code as compared with the previously recognized state. Normally disparity+2and -2 are received alternately with disparity 0 ; thus state 1 and state 2 .are alternated.If an error detector detects any uncertainty state shown in figure (24) with reference to violation of 5B6B decoding law or detects no code word, the error detector generates an error alarm.5B6B code in used in 34 Mb/s and 140 Mb/s optical line systems. ``````
Table -1 5B6B Coding LawInput word State 1 d State 2 d 0 101011 2 010100 -2 1 011100 0 011100 0 2 110001 0 110001 0 3 101001 0 101001 0 4 011010 0 011010 0 5 010011 0 010011 0 6 101100 0 101100 0 7 111001 . 2 000110 -2 8 100110 0 100110 0 9 010101 0 010101 0 10 010111 2 101000 -2 11 100111 2 011000 -2 12 110011 2 000111 0 13 011110 2 100001 -2 14 101110 2 010001 -2 15 110100 0 110100 0 16 OOT011 0 001011 0 17 011101 2 100010 -2 18 011011 2 100100 -2 19 111000 0 001100 -2 20 110110 2 001001 -2 21 111010 2 000101 -2. 22 101010 0 101010 : 0 23 011001 0 011001 0 24 101101 2 010010 -2 25 001101 0 001101 0 26 110010 0 110010 0 27 010110 0 010110 0 28 100101 0 100101 0 29 100011 0 100011 0 30 001110 0 001110 0 31 110101 2 001010 -2
BRBRAITTJabalpur, issued in Nov. 2008 96