Access Technique
Access Technique
Access Technique
Lectures
NO C P
on
CO Y
O
Satellite Communications
OP
PY
Systems
DO NO T C
Assoc. Professor PhD Stefan Zhelev
Shumen University
Faculty of Technical Sciences
DO NO
T
Com
man
d satellitte
Uplin
satellitte k
T
Tele
metr
Dow y
transport nlilink
Tracking,
Telemetry,
DO
Command &
Monitoring
wire wire
fiber fiber
cable cable
users
video receiving
transmitting voice data
da graund
graund station
station
PR EIRP GR LFS , dB
Y
NO C P
CO Y
O
OP
PY
DO NO T C
DO NO
T
T
DO
ISBN 978-954-577-637-3
ɟɥɟɤɬɪɨɧɧɨ ɢɡɞɚɧɢɟ
© ɋɬɟɮɚɧ ɀɟɥɟɜ – ɚɜɬɨɪ
© ɒɭɦɟɧɫɤɢ ɭɧɢɜɟɪɫɢɬɟɬ “ȿɩɢɫɤɨɩ
ȿɩɢɫɤɨɩ Ʉɨɧɫɬɚɧɬɢɧ ɉɪɟɫɥɚɜɫɤɢ”
ɒɭɦɟɧ, 2012
Contents
Y
1. A little History of Satellite Communications
2. Satellite Communications Segments
3. Satellite Orbits
NO C P
4. Frequency Band
CO Y
4.1. Regulatory Process
4.2. The electromagnetictic frequency spectrum
O
5. Signal processing elements in satellite communications
OP
PY
Lecture 2. A Link Budget Calculation and Analysis
1. The quality of signal transmission
DO NO T C
2. Elements of the link
2.1. Effective Isotropic Radiated Power
2.2. Power flux density
2.3. Antenna Gain
2.4 Free-Space Path Loss
2.5. System Noise
2.6. Link Performance Parameters
DO NO
3. Link Budget
T
3.1. Frequency Translation Satellite
3.2. The on-board processing satellite
Y
3.3. TDMA capacity
3.4. Switching in satellite TDMA
4. Code Division Multiple Access
NO C P
CO Y
4.1. Direct Sequencee Spread Spectrum
4.2. Frequency Hopping Spread Spectrum.
O
OP
Problems
PY
DO NO T C
DO NO
T
T
DO
Satellite Communications Systems
Lecture 1.
Introduction to Satellite Communications
Y
1. A little History of Satellite Communications
2. Satellite Communications
ations Segments
3. Satellite Orbits
NO C P
4. Frequency Band
CO Y
4.1. Regulatory Process
tic frequency spectrum
4.2. The electromagnetic
O
5. Signal processing elements in satellite communications
OP
PY
1. A little History of Satellite Communications
DO NO T C
The unique feature of communications by satellites is there ability to provide
distance insensitive point to multipoint communications.
communications. These links can be between
fixed terminals, mobile terminals
terminals and both fixed and mobile terminals on lend, on the
air, and at sea as it is shown in Figure 1.
C om
mand
DO NO
Uplin satellitte
satellitte k
T
Tele
metr
D ow y
transport
ort nlink
Tracking,
Telemetry,
Command &
T
Monitoring
wire wire
fiber fiber
cable cable
DO
users
user
u
video
eo receiving
transmitting voice
ce data graund
graund station
station
Figure 1. The idea of a communications
communications satellite network
1
satellites are very high (above 100Mbps ), and can provide services for several hundred
video channels or several tens of thousands of voice or data links.
Low Error Rates.. Bit Error Rate (BER) is a measmeasure of quality. Bit errors on
a digital satellite link tend to be random, allowing statistical detection and error cor-
Y
rection techniques to be used. Error rates can be routinely achieved efficiently and
reliably with standard equipment.
Distance Independent Costs.. The cost of satellite transmission is independent
NO C P
itting and receiving earth stations.
of the distance between the transmitting
CO Y
Fixed Broadcast Costs.. The cost of satellite broadcast transmission, that is,
transmission from one transmit ground terminal to a number of receiving ground ter-
O
minals, is independent of the number of ground terminals receiving the transmission.
OP
PY
A little History of Satellite Communications
The first idea of communications by satellite was given by Arthur C. Clarke in
DO NO T C
terrestrial Relays”, 1945 1 .
his classic paper “Extraterrestrial
Satellite communications began in October
October 1957 with the launch by the former
called
USSR a small satellite calle d Sputnik 1 (4.10.1957), then
then 3.11.1957 was launched
Sputnik 2 with Laika.
The first communications by artificial satellite was accomplished by
SCORE (Signal Communicating by Orbiting Relay Equipment), launched by the Air
Force, USA into a low (160 by 1280 km) or orbit
bit in December 1958. SCORE relayed a
DO NO
1
A.C. Clarke, ‘Extraterrestrial Relays,’Wireless World, Vol. 51, pp. 305 308, October 1945.
2
M.I. Davis and G.N. Krassner, ‘SCORE First Communications Satellite,’ Journal of American Rocket Society,
Vol. 4, May 1959.
2
1970’s – GEO Applications Development, DBS:
x 1972 First domestic satellite system operational
operational (ANIKA launched in No-
vember 1972 by NASA for Telsat Canada, was the first domestic commercial com-
munications satellite.. Two later ANIKAs were launched
launche in April 1973 and May 1975.
Y
mpany, operated at C-band and had 12
The satellites, built by HughesAircraft Company,
transponders, each 36MHz wide).
x 1975 First successful direct broadcast experiment (USA-India).
NO C P
x 1977 A plan for direct broadcast sattellites (DBS) assigned by the ITU
CO Y
x 1979 International Mobile Satellite Organization
Organization (Inmarsat) established.
1980’s – GEO Applications Expanded, Mobile:
O
x 1981 First reusable launch vehicle flight.
OP
x 1982 International maritime communications
communications made operational.
PY
x 1984 First direct-to-home broadcast
broadcast system operational (Japan).
x 1987 Successful trials of land-mobile
DO NO T C
land-mobile communications (Inmarsat).
x 1987 TVSAT: First DBS-satellite (Direct
(Direct Broadcast Satellite, Television-
broadcasts directly to home)
x 1989-90 Global mobile communication service
service extended to land mobile and
aeronautical use (Inmarsat)
1990+’s NGSO applications development and GEO expansion
x 1990-95:
DO NO
launched (Inmarsat).
x 1998-2000: Mobile LEO systems initiate service and fail afterwards (Irid-
ium, Globalstar).
Communications Segments
2. Satellite Communications
The satellite communications have two areas or segments: the space segment
and the ground (or earth) segment.
earth segment.
The space segment includes the satellite (or satellites) in orbit in the system,
provides the operational control of the satellite(s) in orbit.
and the ground station that provides
The ground station is variously
variously referred to as the Tracking, Telemetry, Command
(TT&C) or the Tracking, Telemetry, Command and Monitoring (TTC&M) station.
Two elements of the space segment of a communications satellite system are shown
on Figure 2 - the satellite and TTC&M station.
A communications satellite is an orbiting artificial earth satellite. It receives a
communications signal from a transmitting ground station, amplifies or processes it,
and transmits it back to the ground stations for reception.
3
The TTC&M station provides essential spacecraft management and control
functions to keep the satellite operating safely in orbit. The TTC&M links between
the spacecraft and the ground are usually separate from the user communications
links and links may operate in the same frequency bands or in other bands. The space
Y
segment equipment carried aboard thee satellite has two subsystems: the bus and the
payload.
NO C P
Co
mm
CO Y
Up and
link
Te
le
Do metr
wn y
O
link
OP
PY
Graund Station
Tracking,
DO NO T C
Telemetry,
Command &
Monitoring
The bus has the subsystems that support the satellite: the physical structure,
power subsystem, attitude and orbital cont rol subsystem, thermal control subsystem,
control
and command and telemetry subsystem.
The payload on a satellite is the equipmen
equipmentt that provides the services, and con-
DO NO
sists of the communications equipment that that provides the relay link between the up-
T
and downlinks from the ground. That equipment is called the transponder
transponder. The an-
tennas on the satellite and the transponder receives the the uplink signal, amplifies (or
processes the signal), and then reformats and transmits the signal back to the ground
T
received station.
That portion of the link from the earth station to the satesatellite is called the up-
link,, and another - from the satellite
link satellite to the ground is called the downlink.
DO
4
3. Satellite Orbits
mmonly used orbits in satellite communications.
There are four most commonly
Geostationary (Geosynchronous) Earth Orbit (GEO)
The satellite remains fixed (or approximately
imately fixed) over one point on the
Y
equator. The parameters for the evaluation of the GEO link are:
Range (distance) from the earth station
ation (ES) to the satellite, in km
Geostationary Radius: rS 42164,17km ;
NO C P
Geostationary Height (Altitude): hGSO rs re 35786,43km ;
CO Y
Equatorial Radius: re 6378,14km ;
Advantages of Geostationary Earth Orbit:
O
- The period of revolution for the geostati onary orbit is 23 h 56 min 4,091 s, so
geostationary
OP
PY
the visibility of the satellite is 24 h;
h
- A satellite in GSO sees about one-third of the earth’s surface, so three GEO
DO NO T C
satellites, placed 1200 apart in the equatorial plane, could provide global coverage;
- An antennas on the ground, once aimed at the satellite, need not continue to
rotate.
Disadvantages of the GEO are:
- the gravity of the sun and moon disturb the orbit;
capacity and satellites using the same frequen-
- the geostationary orbit’s finite capacity
cies must be separated to prevent mutual interference;
- providing coverage of high latitudes (above 800 ) is generally not possible, so
DO NO
5
Russian states is well known. These orbits have a perigee altitude of about 1000 km,
and an apogee altitude of nearly 40 000 km.
Satellite orbits that are not synchronous, such as the LEO, MEO, or HEO, are
often referred to as non-geosynchronous
ronous orbit (NGSO) satellites.
Y
Orbital parameters are:
- Apogee – the point farthest from earth;
- Perigee – the point of closest approach to earth;
NO C P
- Line of Apsides – the line joining the perigee and apogee through the center
CO Y
of the earth;
- Ascending Node – the point where the orbit cro sses the equatorial plane, go-
crosses
O
ing from south to north;
OP
- Descending Node – the point where the orbit crosses
crosses the equatorial plane, go-
PY
ing from north to south;
- Line of Nodes – the line joining the ascending and descending nodes through
DO NO T C
the center of the earth;
- Argument of Perigee – the angle from ascending node to perigee, measured in
the orbital plane;
- Right Ascension of the Ascending Node,Node, – the angle measured eastward, in
the equatorial plane, from the line to the first point of Aries (Y) to the ascending node.
Table 1. The characteristics of satellite orbits
LEO ɆȿɈ GEO ɇȿɈ
DO NO
66 <24 3
cover the earth
- telephony;
- Communications;
- Broadcasting;
- Military surveillance;
- Point to multi-point
Applications - Weather; GPS
communications;
- Atmospheric studies;
- Mobile services;
- Earth observation.
- Weather observation.
6
ured in the plane containing the point considered, the satellite and the centre of the
earth.
Additional parameters are:
Equatorial Radius: re 6378,14km ; Eccentricity of the earth: ee 0,08182 ; Differ-
Y
ential longitude, B le ls - the difference between the earth ear station and satellite longi-
tudes; le earth station longitude, in degrees; ls satellite longitude, in degrees; LE earth
station latitude, in degrees; LS satellite latitude, in degrees; H earth station altitude
NO C P
CO Y
above sea level, in km.
Longitudes east of the Greenwich eenwich Meridian and latit
latitudes
udes north of the Equator
are positive; longitudes west of the Greenwich Greenwich Meridian and latitudes south of the
O
OP
Equator are negative.
PY
The distance between earth station and satellite can be calculated as 3 :
R 2 rs 2 R.rs . cos\ E . cos B , km
2
d ((1)
DO NO T C
§ ·
where R l2 z2 ; l ¨ re
H ¸. cos( LE ) ;
¨ 1 e 2 . sin 2 ( L ) ¸
© e E ¹
§ re (1 ee2 ) · §z·
z ¨ H ¸. sin( LE ) ; \E tg 1 ¨ ¸ .
¨ 1 e 2 sin 2 ( L ) ¸ ©l¹
© e E ¹
Elevation angle to the satellite:
§r h
DO NO
·
M cos 1 ¨ e 1
1 cos 2 ( B). cos 2 ( LE ) ¸ . (2)
T
© d ¹
Azimuth angle to the satellite:
The azimuth angle is determined from the intermediate angle A from one of
four possible conditions, based on the relativ
relativee location of the earth station and the
T
subsatellite point on the earth’s surface. The
The condition is determined
determin by standing at
the direction of the subsatellite point (SS) 4 (Fig-
the earth station (ES) and looking in the
ure 3).
DO
§ sin( B ) ·
$ sin 1 ¨¨ ¸,
¸ (3)
© sin E ¹
where E cos 1 >cos( B). cos( LE )@ , B le l s .
N N N N
4 4
ES ES
SS SS SS SS
4 4
ES ES
a) b) c) d)
3
Ippolito, Louis J., Satellite communications systems engineering: atmospheric effects, satellite link design, and system
Performance, 2008 JohnWiley & Sons Ltd.
4
Ippolito, Louis J., Satellite communications systems engineering: atmospheric effects, satellite link design, and system
Performance, 2008 JohnWiley & Sons Ltd.
7
The resulting equation to determine the azimuth angle 4 for each of the four
conditions is given in Table 2.
Y
rtheast $
northeast 1ɚ
northwest 3600 $ 1b
southeast 1800 $ 1c
NO C P
southwest 1800 $
CO Y
1d
O
OP
- If the earth station is located at the same longitude as the subsatellite point,
PY
the azimuth angle will be 1800 if the earth station is in the northern hemisphere and 0ƕ
if the earth station is in the southern hemisphere.
DO NO T C
- If the earth station is located on th 90ƕ if
thee equator, the azimuth angle will be 90ƕ
0
the earth station is west of the subsatellite point and 270 if the earth station is east of
the subsatellite point.
Altitude: H=0km.
Satellite: Longitude: 19.20 E, lS 19,2 .
DO NO
§ re (1 ee2 ) · § 6378,14.0,9933 ·
z ¨ H ¸. sin( LE ) ¨ 0 ¸.0,7925 5030,87 km
¨ 1 e 2 . sin 2 ( L ) ¸ © 0,998 ¹
© e E ¹
§z·
\ E tg 1 ¨ ¸ 52,230 ; R l 2 z 2 6364,15 km
© ¹l
3) Determine the range
R 2 rs 2 R.rs . cos\ E ..cos
2
d cos B
6367,84 2 42164,17 2 2.6367,84. 42164,17. 0,6125. 0,9356 38866,9km
4) Determine the elevation angle
§r h ·
M cos 1 ¨ e 1 cos 2 ( B). cos 2 ( LE ) ¸ 27,010
© d ¹
5) Determine the azimuth angle
E cos 1 >cos( B). cos( LE )@ cos 1 (0,9356.0,6099) 55,210
§ sin( B ) · § 0,353 ·
$ sin 1 ¨¨ ¸¸ sin 1 ¨ ¸ 25,47 0
© sin E ¹ © 0,821 ¹
8
Since the subsatellite point SS is southeast of the earth station ES according Table 2:
4 1800 A 154,530 .
4. Frequency Band
Y
4.1. Regulatory Process
The satellite communications system parameters
parameters that are under the regulatory
include:
NO C P
- choice of radiating frequency;
CO Y
- maximum allowable radiated power;
- orbit locations (slots) for GSO.
O
The allocation and regulation of thethe frequency spectrum is colled spectrum (or
OP
frequency) management.
PY
The Europe countries have active organizations
organizations involved with spectrum man-
development of satellite systems or the provi-
agement. They are responsible for the development
DO NO T C
sion off satellite based services. Besides national organizations
organizations there is international
International Telecommunications
management by the International Telecommunications Union (ITU), with headquar-
ters in Geneva, Switzerland. The ITU was formed in 1932 from from the International
Nations Specialized Agency, cur-
Telegraph Union, created in 1865. It is a United Nations
rently with over 190 members.
The ITU has three primary functions:
- allocations and use of the radio-frequency spectrum;
DO NO
- telecommunications standardization;
T
expansion of worldwide telecommunications.
- development and expansion
According to these three functions the ITU have three sectors:
(ITU-R), responsible for frequency alloca-
- the Radiocommunications Sector (ITU-R),
tions and use of the radio-frequency spectrum;
T
- the Telecommunications Standards SectorSector (ITU-T), responsible for telecom-
munications standards; and
- the Telecommunications Development Sector (ITU-D), responsible for the
DO
9
Table 3. Electromagnetic frequency spectrum
Range Frequency Length of the wave
Extremely low frequency ELF 3 ÷ 30 Hz 100000 ÷10000 km
Super low frequency SLF 30 ÷ 300 Hz 10000 ÷1000 km
Ultra low frequency ULF 300 ÷ 3000 Hz 1000 ÷100 km
Y
Very Low frequency VLF 3 ÷ 30
30 kHz 100 ÷10 km
Low frequency LF 30 kHz
kHz ÷ 300 kHz 10
0 km ÷1 km
Medium frequency MF 300 kHz ÷ 3 MHz 1 km ÷100 m
High frequency HF 3 MHz ÷ 30 MHz
M 100 m ÷10 m
NO C P
Very high frequency VHF 30 MHz ÷ 300 MMHz 10 m ÷ 1 m
CO Y
Ultra high frequency UHF 300 MHz ÷ 3 GHz 1 m ÷ 10 cm
Super high frequency SHF 3 GHz ÷ 30 GHz 10 cm ÷ 1 cm
O
Extremely high frequency EHF 30 GHz ÷ 300 GHz 1 cm ÷ 1 mm
OP
Terahertz THz 300GHz ÷3000GHz
÷3000GHz 1 mm ÷ 0.1 mm
PY
Infrared IR 3000GHz ÷ 400THz 0,1mm÷0,75ȝm
0,1mm÷0,75
Visible 400 THz ÷ 750 THz 0,75ȝ
0,75 ȝm÷0,4
0,75ȝm÷0,4ȝm
Ultraviolet UV 750 THz ÷ 3 PHz 0,4ȝ
0,4 ȝm÷0,1
0,4ȝm÷0,1ȝm
DO NO C
T
T
DO
8
Figure 3. Electromagnetic frequency spectrum ( O c | 3.10 m / s )
Q 1/ s
DO
10
10,7-11,7 Downlink Fixed 1000
11,7-12,5 Downlink Broadcast 800
12,5-12,75
5 Downlink Fixed (trade) 250
Ku
12,75-13,25 Uplink Fixed (trade) 250
14-14,8 Uplink Fixed 800
Y
17,3-18,3 Uplink Fixed 1000
17,7-20,2 Downlink Fixed 2500
20,2-21,2 Downlinkk Mobile 1000
Ka 22,5-23 Downlinkk
Downlin Broadcast 500
NO C P
27-30 Uplink Fixed 3000
CO Y
30 - 31 Uplink Mobile 1000
O
Most commercial communications satellites now operate with a 500 MHz band-
OP
downlink. They use a frequency spectrum
width both on the uplink and on the downlink.
PY
6 / 4GHz and 14 / 12GHz (uplink/downlink). The typical 500 MHz satellite bandwidth can
be segmented into many satellite transponders bandwidths. For example, eight trans-
DO NO T C
ponders can be provided, each with a 54 MHz nominal bandwidth and center-to-center
frequency spacing 61MHzMHz . The C-band Fixed Satellite Se
Servic
rvices (FSS) operate with a
500MHz bandwidth. A typical design would would accommodate 12 transponders, each
with a bandwidth of 36 MHz, with guard bands of 4MHz between each (Figure 4). A
typical commercial communications satellite today can have 24 to 48 transponders,
operating in the C-band, Ku-band, or Ka-bands.
DO NO
500MHz
T
vertical plarization
4 36
6105 6145
T
Ɇ
ɆHz
11
TDM time division multiplexing
FM/FDM frequency division multiplex
SCPC single channel per carrier
MCPC multiple channel per carrier
FSK frequency shift keying
Y
BPSK binary phase shift keying
QPSK quadrature phase shift keying
QAM quadrature amplitude modulation
FDMA frequency division multiple access
NO C P
CO Y
TDMA time division multiple access
CDMA code division multiple access
NIC nearly instantaneous compounding
O
CVSD continuously variable slope delta modulation
OP
ADPCM adaptive differential pulse code modulation
PY
Baseband Source Carrier Multiple Transmission
Formating Combin
Combining Modulation Access Channel
DO NO T C
Analog: FM/FDM
FM/FD
Voice SSB/SC SCPC, FDMA
Video DSB/SC FDM MCPC TDMA
PCM FSK
Digital: BPSK
NIC FDMA
Data QPSK
CVSD TDMA
Voice/Video
ADPCM TDM QAM CDMA
Source Multiple
Source
Multi-Plexer modulator Transmiter
Coding Access
uplink
DO NO
T
Satellite
downlink
The Source information may be analog or digital. The first three elements
(baseband formatting, source combining, and
and carrier modulation) prepare the signal
for introduction to the transmission channel
channel (the ground-to-satellite-to-ground RF
Destination location is subjected to a reverse se-
channel). The received signal at the Destination
quence of processing.
12
Sideband Suppressed Carrier (SSB/SC) or Double Sideband Suppressed Carrier
(DSB/SC).
Amp
SSB/SC
Y
Amp
Ɇix filter
16,6 19,7 20 KHz
300 3400 Hz
Amp
NO C P
CO Y
20KHz DSB/SC
O
Figure 6. Analog voice baseband formats
OP
PY
DO NO T C
video
aud
dio
color
DO NO
PAL
P A chanal spectrum
T
ǴHz
7,5ǴHz
7,5Ǵ
7,5
-10
-20
T
-30
-40
-50
DO
-60
ǴHz
5,5ǴHz
5,5Ǵ
5,5 ǴHz
Video
info 4,436618 ǴHz
4,436618ǴHz
4,436618Ǵ Color Audio
info info
13
COMPOSITE NTSC 4,2MHz
audio 1
C
O
Y
M
6,2MHz fC =±18MHz
B
audio 2 I
N
E fC
NO C P
R
CO Y
6,8MHz
audio 3
O
OP
PY
7,2MHz
spectrum
Figure 8. Signal processing format and spectrum for analog video satellite transmission
DO NO T C
Source Combining - Analog Signals
Source combining involves the combining of multiple sources into a single
signal, which then modulates an RF carri
carrier
er for transmission through the communica-
tions channel. The preferred combining method
method for analog data is Frequency Division
Multiplex (FDM).
The ITU-T FDM standard for FDM is shown in figure 9.
Group 12 Voice Channels,
DO NO
....
.. 4 kHz separation,
60-108KHz
T
+ + +
SuperGroup 60 Voice Channels,
... 312-552KHz
ȝ5
Basic MasterGroup
T
... 300 Voice Channels,
ȝ5 812-2044KHz
Super MasterGroup
900 Voice Channels,
DO
ȝ3 8516-12388KHz
Y
Baseband Formatting
Digital signals dominate satellite commun mmunications
ications systems, for data, voice, im-
aging, and video applications. Digital formatted
formatted signals allow for more comprehen-
NO C P
sive processing capabilities regarding coding, error correction, and data reformatting.
CO Y
The basis for digital communications is the binary digital (2-level) format. There are
many of binary waveforms used for the encoding of baseband data - unipolar NRZ
O
and polar NRZ, polar RZ, split phase (Manchester)
(Manchester) coding, alternate mark inversion
OP
(AMI) and etc.
PY
A measure the quality of digital signals is Bit Error Rate (BER). The bit error
rate or bit error ratio is the number of bit errors divided
divided by the total number of trans-
DO NO T C
ferred bits during a studied time interval. BER is an unitless performance measure,
often expressed as a percentage number. The BER is often expressed as a function of
the Eb / N 0 , (energy per bit to noise po
power
wer spectral density ratio).
A second step in digital baseband formatting
formatting is multi-level coding, where the
binary bit stream is combined into groups, called symbols. symbols. It reduces the required
bandwidth. When two consecutive bits are are combined, they are forming a group of
two bits, there are four possible combinations
combinations of the two bits, resulting in quaternary
DO NO
TS Tb .N b (3)
The symbol rate is
Rb
RS (4)
Nb
where Rb is the bit rate.
The symbol rate is often expre ssed in units of baud, i.e., the baud rate. A
expressed
transmission rate of RS simbols / s is the same as a rate of RS baud . The baud rate is
equal to the bit rate only for N b 1 , that is, for binary signals.
The second possibility is when the origin original source data is analog (voice or
video). Conversion to digital form is required
requir before digital formatting is performed.
The most popular baseband formatting ttechnique for analog source data is Pulse
Code Modulation (PCM).
In addition to conventional PCM there are some other digital voice source cod-
ing techniques used for the communications systems, as:
Adaptive differential PCM (ADPCM)
15
ADPCM also uses differential encoding, but takes the mean-square value in the
wer coding bits than PCM
sampling process. It requires fewer PCM.
Adaptive delta modulation (ADM) or continuously
ontinuously variable slope delta modu-
lation (CVSD)
Y
ADM uses differential encoding – only changes are transmitted. ADM pro-
vides acceptable voice at 24–32 kbps, providing
providing a more spectral efficient option.
Nearly instantaneous compounding (NIC)
NO C P
taking advantage of short-term redundancy
NIC achieves bit-rate reduction by taking
CO Y
rates approaching 1/2 that required for PCM,
in human speech. It can achieve data rates
because of a more efficient use of the frequency spectrum.
O
OP
Source Combining
PY
ivision multiplex (TDM).
Digital satellite communications systems use Time ddivision
This technique combines multiple digitally encoded signals into a composite signal at
DO NO T C
a bit rate equal to or greater than the sum of the input rates. Multiple PCM bit streams
are combined in a TDM multiplexer, which which generates a TDM composite
composite bit sequence
that drives the RF modulator (Figure 10). 10). Because PCM samples the incoming sig-
nals 8000 times per second, each sample occupies 1 / 8000s ( 125Ps ). According rec-
ommendation G.702 ITU-T TDM is organized into a well structured hierarchy.
hierarchy
PCM
Binary
Sequence
DO NO
PCM
T
Modulator TDM
MULTIPLEXER
Composite
alog Signals
PCM Sequence
Modulator
To RF
…...
Analog
Modulator
An
T
PCM
Modulator
Two TDM standards for voice circuits are in global use: DS or T-carrier TDM
signalling and CEPT TDM signalling.
signalling. Each hierarchy starts with 64 kbps analog
consist of different combinations, as shown in
voice, but the subsequent TDM levels consist
Figure 12. The systems used in Europe and North America are different (Figure 12).
The North American standard is based on a 24-channel PCM system, whereas the
European system is based on 30/32 channels. This system contains 30 speech chan-
nels, a synchronisation channel and a signalling channel, and the gross line bit rate of
the system is 2.048 Mbps (32 x 64 Kbps).
Kbps The system can be adapted for common
channel signalling,
signalling, providing 31 data channels and
an employing a single synchronisa-
tion channel.
The following details refer to the European
Eur system (Figure 11). The 30/32
channel system uses a frame and multiframe structure, with each frame consisting of
32 pulse channel time slots numbered
numbere 0-31. Slot 0 contains the Frame Alignment
Word (FAW) and Frame Service Word (FSW). Slots 1-15 and 17-31 are used for
digitised speech (channels 1-15 and 16-30 respectively). In each digitised speech
16
channel, the first bit is used to signify the polarity of the sample, and the remaining
bits represent the amplitude of the sample.. The duration of each bit on a PCM system
is 0,488Ps . Each time slot is therefore 3,904Ps ( 8bits * 0,488Ps ). Each frame therefore
occupies 125Ps ( 32 *3,904Ps ).
O PY
PY
DO NO T C
CO
DO NO
T
Figure 11. The frame and multiframe structures for a 30/32 channel PCM system
T
Japan Europe
NO
USA
DO
*4 *4
139264 kbit/s
97728 kbit/s 274176 kbit/s
1920 channels
*6 *3
*3 *4
34368 kbit/s
32064 kbit/s 44736 kbit/s
480 channels
*5 *7 *4
8448 kbit/s
6312 kbit/s 120 channels
*3 *4
*4
2048 kbit/s
1544 kbit/s 30 channels
*24 *30
64 kbit/s
ISDN
Figure 12. Standardized TDM structures
17
In order for signalling information (dial pulses) for all 30 channels to be trans-
mitted, the multiframe consists of 16 frames numbered 0-15. In frame 0, slot 16 con-
tains the Multiframe Alignment Word (MFAW) FAW) and Multiframe Service Word
(MFSW). In frames 1-15, slot 16 contains signalling information
info for two channels.
Y
The frame and multiframe structure are shown below. The duration of each multi-
frame is 2ms ( 125Ps *16 ). A TDM multiplexer can provide Bit multiplexing, Byte (8
bits symbol) multiplexing and block multiplexing.
NO C P
CO Y
Forward Error Correcting (FEC)
The purpose of Forward Error Correcting (FEC)
(FEC) is to improve the capacity of a
O
transmission channel by adding to the source data
data redundant information. It is a proc-
OP
ess known as channel coding.. Channel coding consists:
PY
Reed Solomon coding;
Interleaving;
DO NO T C
Convolution code.
The place of channel coding is between
between multiplexing and modulating process,
as shown in Figure 13.
video
audio TV cod
coder
M
DO NO
video U f
audio TV coder
T
L
T PA
I
..................
P RS Convoluti QPSK
L interleaving
coder on coding modulater
E
X
T
DVB-S
E
R
video
audio TV coder
MPEG
DO
coder
18
phase shifted as in BPSK. The adjacent phase shifts are equi-spaced by 900 . BPSK
only requires one-half the bandwidth of BPSK;
- M-ary Phase Shift Keying (MPSK) – phase shift keying for m ary symbol
waveform;
Y
- Minimum Shift Keying (MSK) – phase shift keying with additional process-
ng in reduced bandwidth requirements;
ing to smooth data transitions, resulting
- Quadrature Amplitude Modulation (QA (QAM) – multilevel (higher than binary)
NO C P
modulation; it is a combination of amplitude and phase modulations.
CO Y
BPSK and QPSK are the most widely
widely used in satellite systems.
In the simplest case PSK is based on phase switching signal to 1800
O
when changing from a logic “0” to “1” and “1” to “0”, but the amplitude
OP
and frequency remain constant.. The change of phase state is finding relatively simple.
PY
It is shown in figure 14.
DO NO T C
carrier
Digital
0 1 1 0 signal
t
PSK
modulated
DO NO
t signal
T
Figure 14. PSK modulation
pi(t)
a i cos Z0 (t )
c e g t
p(t) Serial to
QPSK
a b d h i
Parallel
Converter 900
+ modulated
c e f g t signal
sin Z0 (t )
b d h
+
pq(t)
f pq(t) t p q (t ) sin Z 0 (t )
Figure 15. QPSK modulator Figure 16. Generation of the QPSK waveform
19
The in-phase signal is mixed directly with the carrier frequency cos(Z0t ) , while
the quadrature signal is mixed with a 900 phase shifted carrier
( cos(Z0t 900 ) sin(Z0t ) ). The output of the two mixers is summed to produce the
modulator output signal:
Y
s (t ) pi (t ) cos(Z0t ) pq (t ) sin(Z0t ) (5)
The phase state of s(t ) depend on the bit values that compose the in-phase and
quadrature component signals. Figure 17 and Table 5 show the four possible combi-
NO C P
CO Y
nations of bits and the resulting s (t ) and the phase state diagram for the four bit se-
quences, plotted pi (t ) and pq (t ) . The symbol phases are orthogonal, 900 apart from
O
each other, with one in each quadrant.
OP
The symbol rate is two bit per symbol, Es 2 Eb , an and
d QPSK requires half the
PY
transmission bandwidth of BPSK.
DO NO T C
s (t ) I(t) Q(t) QPSK ɢɡɯɨɞ
11 1/ 2 1/ 2 cos(Z0t ) sin(Z0t ) 2 cos(Z0t 450 )
+1
T
0
1/ 2 I(t)
t
-1 00 10
0
? i(t) -135
-13 -450
T
1350
450
-450 t
DO
0
-13
-135
Figure 17. The four possible combinations of bits and the resulting s (t ) and the phase state
diagram
pi(t)
+
cos Z0 (t ) LPF
Serial to p(t)
QPSK
Parallel
modulated
900 Converter
signal
sin Z0 (t )
+
pq(t)
LPF
20
The QPSK demodulator reverses the process as shown in Figure 18. The input
cations channel, is split into two chan-
signal, which has passed through the communications
nels. Each channel is essentially
ntially a BPSK demodulator and the demodulation process
produces the in-phase and quadrature components pi ((tt ) and pq (t ) , which are then
Y
parallel-to-serial converted to produce
oduce the original data stream p(t ) .
Higher Order Phase Modulation
Higher Order Phase Modulations can achieve
achieve further reduction in symbol rate,
NO C P
and the required transmission bandwidth. For example, 8-phase shift keying (8PSK),
CO Y
which combines groups of three bits per per symbol, requires a transmission channel
bandwidth of 1/3 BPSK, with the phase state
state diagram as shown in Figure 19.
O
OP
PY
010 001
100 000
DO NO T C
111 011
110 101
access technique or Multiple Access (MA). It is the last technique before signal trans-
mitting.
Satellite links are designed to provide desired link av
availability for average con-
ditions. Satellite MA techniques interconnect ground stations through multiple satel-
lite transponders with the goal of optimizing several system attributes such as: spec-
tral efficiency; power efficiency; reduced latency; and increased throughput.
The MA methods available to the satellite system designer
de can be categorized
into three fundamental techniques:
x Frequency Division Multiple Access (FDMA);
x Time Division Multiple Access (TDMA);
x Code Division Multiple Access (CDMA).
FDMA systems consist of multiple carriers that are separated by frequency in
nsponder. The transmissions can be anal
the transponder. analog or digital, or combinations of both.
In TDMA the multiple carriers are separated by time in the transponder, presenting
only one carrier at any time to the transponder. TDMA is most practical for digital
21
data only, because the transmissions are in a burst mode to provide the time division
separation It is the
capability. CDMA is a combination of both frequency and time separation.
most complex technique, requiring severall levels of synchronization at both the
transmission and reception levels. CDMA is implemented for digital data only, and
Y
ffers the highest power and spectral efficiency operation of the three fundamental
offers
techniques.
Multiple Access is described in more detail in lecture 4.
NO C P
CO Y
References
O
1. A.C. Clarke, “Extraterrestrial Relays”,Wireless
Relays”,Wireless World
World,, Vol. 51, pp. 305 308,
OP
October 1945.
PY
2. Bernard Sklar, Digital Communications:
Communications: Fundamentals and Applications,
Second Edition, Prentice-Hall, 2001
DO NO T C
3. Dennis Roddy,, Satellite communications, McGraw-Hill Professional, 2001 -
569 p.
4. Deffebach H. L. and Frost W. O., A survey of digital baseband signaling
techniques. NASA Technical Memo randum NASATM X-64615, June, 1971.
Memorandum
5. Gérard Maral,
Maral Michel Bousquet
Bousquet,, Satellite communications systems: systems,
techniques, and technology, John Wiley and Sons, 2002 – 757p.
6. Ippolito, Louis J., Satellite communications
communications systems engineering:
DO NO
22
Satellite Communications Systems
Lecture 2.
Link Budget Calculation and Analysis
Y
1. The quality of signal transmission
2. Elements of the link
2.1. Effective Isotropic Radiated Power
NO C P
2.2. Power flux density
CO Y
2.3. Antenna Gain
2.4 Free-Space Path Loss
O
2.5. System Noise
OP
2.6. Link Performance Parameters
PY
3. Link Budget
3.1. Frequency Translation Satellite
DO NO T C
3.2. The on-board processing satellite
tween the antenna's, but also the relevant portions of the transmitter and the receiver.
T
G G
Tx Rt
T
PT
Losses
dBm in feeder
DO
PR
distance d, km
1.10 -2
Y
1.10 -3
1.10 -4
NO C P
CO Y
1.10 -5
1.10 -6
O
1 2 3 4 5 6 7 8 9 10 E b /N 0
OP
Figure 2. The relation between BER and Eb N 0
PY
DO NO T C
Higher Eb N 0 means better quality
quality.
The parameter Eb N 0 is the most co common
mmon to compare
compare the digital communica-
ystems, even they have differing bit rates or modulation. The quantity Eb is a
tion systems,
thee average signal power and bit rate:
measure of bit energy, a ratio of th
Pavg W
Eb , . (2)
Rb bit / s
DO NO
Example 1: A signal has power 15W, his bit rate is 200bps. What is the bit energy in deci-
T
bels?
Eb 10 log15 10 log 200 11,25dB
The quantity N 0 is called the noise power density (or noise power spectral den-
T
sity). It is the total noise power in the frequency
frequency band of the signal divided by the
bandwidth of the signal:
PN W
DO
N0 , (3)
BN Hz
Example 2: A signal has a noise power 3W, the signal bandwidth is 500 Hz,
Eb 11,25dB . What is N 0 and Eb N 0 ?
Eb
N 0 10 log 3 10 log 500 22,22dB , (11,25) (22,22) 10,97 dB
N0
The ratio (3) shows, that if bandwidth of the signal decreases noise power den-
sity increases (the same amount of noise occupies a smaller signal space) and the pa-
rameter Eb N 0 decreases. It also decreases when the bit rate increases.
The quality of analog signals is meas
measured by the carrier to noise ratio C N or
by the carrier to noise power spectral density ratio C N 0 . The ratio C N is the carrier
eable bandwidth, where C N 0 is the carrier power per unit
power in the whole useable
bandwidth.
The relation between C N , C N 0 and Eb N 0 is the power of carrier C Eb .Rb .
2
C Eb §C · Eb
. Rb , in dB: ¨¨ ¸¸ Rb , (4)
N0 N0 © N 0 ¹ dB N0
C Eb Rb §C· Eb
. , in dB: ¨ ¸ Rb B , (5)
N N0 B © N ¹ dB N0
Y
2. Elements of the link
A link consists of three parts with specific
specific parameters: transmitter, receiver and
NO C P
medium, as shown in figure 3.
CO Y
d
O
pt pr
OP
Transmitter Receiver
PY
gt gr
pfdr
DO NO T C
Figure 3. The three parts of link.
3
pT gT EIRP
pPFD , W / m2 , (8)
4Sd 2
4Sd 2
Y
function between transmitted and received
The power flux density gives the function
power. The power flux density limited service area of the satellite:
NO C P
- for Direct Broadcast System (DBS), (DBS), like TV-Sat, TDF, Olimpus
CO Y
PPFD t 103dBW / m ;2
O
PPFD t (113 y 116)dBW / m .
2
OP
PY
Example 3: The transmitted power of Earth station is 10W , a distance to satellite is
d 37500km . The antenna gain is 50dB . What is the power flux density?
DO NO T C
EIRP 10 log PT 50 10 50 60, dBW
EIRP 10 log37500 10,99 60 20 log(37500) 10,99
2
PPFD
60 91,48 10,99 42,47dB
g K .¨ ¸ , (10)
© O ¹ O2
K 0,55 y 0,65 ; O c f (wave length is the distance from one wave point to the next
4
Figure 4 shows a typical directional antenna pattern for a circular parabolic re-
flector antenna. The antenna pattern shows the gain as a function of the distance from
the boresight direction. The boresight direction
ection is a direction of maximum gain, for
Y
which the value g is determined from (11) equation. The 1/2 power beamwidth is the
contained conical angle D for which the gain has dropped to 1/2 the value at bore-
sight, the power is 3 dB down from
m the boresight gain value.
NO C P
The antenna beamwidth for a parabolic reflector
reflector antenna can be approximately
CO Y
determined in degree from
75.O 22,5
D# , in degree . (12)
O
D D. f
OP
0
PY
-450 450
0,7Emax
DO NO T C
D
900
F (M )
DO NO
T
F 2 (M )
T
-1800 -1350 -900 -450 0 450 900 1350 1800
Most antennas have sidelobes. Its are regions where the gain may increase due
to physical structure elements or the characteristics of the antenna design. It is also
possible that some energy may be present behind the physical antenna reflector.
Sidelobes are a possible source for noise and interference, for example, when the sat-
other antennas or sources of power in the
ellite ground antenna is located near to other
same frequency band as the satellite link.
Because of antenna beamwidth for satellite links is very small (much less than
D 1 ), it is requiring careful antenna pointi
0
pointing and control to maintain the link.
5
GR .O2
where Aeff .
4S
Replacing Aeff and pPFD (8) in equation (13),
§ O ·
2
pT .gT .g R
pR pT .gT .g R ¨ ¸
Y
, (14)
© 4Sd ¹ lFS
16S 2 d 2 (4S . f .d ) 2
where lFS is a free space path loss.
2
O c2
NO C P
CO Y
In dB:
§ 4.S .d · § 4S . f .d ·
LFS 20 log¨ ¸ 20 log¨ ¸ (15)
© O ¹ © c ¹
O
OP
PY
Example 4: The frequency uplink uplink is 6,175GHz, a distance to satellite is d 37500km .
What is the free space path loss?
(4S . f .d ) 2 4S . f .d
DO NO T C
4.3,14.6,175.109.37,5.106
LFS 20
20log
log 20
20ll og 199,73 dB
c2 c 3.108
Example 5: What is the power flux density pPFD and power of received signal pR if both
the transmit and receive parabolic antennas
antennas have a diameter of 3 m, D 3m , the transmit power is
12 watts, pT 12W , the antenna efficiency is 55% for both antennas, K 0,55 . The satellite is in a
T
GSO location, with a range of d 37500km . The frequency of operation is 12 GHz.
First have to estimate antenna
antenna gain (equation 11)
GdB 10 logK .(10,47. f .D) 2 10 log 0,55.109,66.144.9 48,93 , dBi
DO
6
2.5. System Noise
Noise is a parasitic undesired red signal, superimposed on the
t useful signal, caus-
ing adverse effects in the processing of signals. According to the physical character,
the noises are: Thermal noise, Shot noise and Flicker noise.
noise
Y
Sources
ources of noise and there frequency domains are different, but in the micro-
wave range (above 300 MHz) matter have two main sources sources.. One of them is related
to random changes in the currents of the mediaa in transitions of semiconductor struc-
NO C P
tures (shot noise), and the other - with occasional changes voltages, primarily related
CO Y
to the thermal motion of carriers in the volume of in the wires (thermal noise)
noise). Ther-
mal noise is called “white noise” and is a basic in RF band.
O
The noise introduced by each device in the system is quantified by the intro-
OP
duction of an equivalent noise temperature t E . It is defined as the temperature of a
PY
passive resistor producing a noise power per unit bandwidth.
Solid state theory gives the following value of noise voltage
DO NO T C
u N2 4k .t E .r.bN , V 2 (17)
where u N is a noise voltage;
r is a resistance, which occurs
occurs on the noise voltage;
k 1,37.10 23 Ws / deg,
°
k is Boltzmann’s constant: ®k 198dBm / K / Hz, ;
°k 228,6dBW / K / Hz
¯
DO NO
7
where t0 is the input reference temperature, usually set at 290 K , and b is the noise
bandwidth.
§ t ·
NF 10 log¨¨1 E ¸¸, dB (22)
© t0 ¹
Y
§ t ·
The term in brackets, ¨¨1 E ¸¸ , is sometimes referred to as the noise factor,
t © 0 ¹
NO C P
when expressed as a numerical value.
CO Y
Corollary:
nout nf .g .nIN (23)
O
tE t0 .(nf 1), K (24)
OP
NF
PY
tE t0 .(10 10
1), dB (25)
nN k .t0 .(nf 1).bN , W (26)
DO NO T C
2.5.2. Noise Temperature
Noise temperature concern three types of devices: active devices, passive de-
vices, and the receiver antenna system.
Active devices in the communications system are amplifiers and other compo-
nents (upconverters, downconverters,
converters, mixers, active filters, modulators, demodulators,
and etc.). They provide an output power that is greater than the input power (increase
DO NO
where pIN and pout are the powers into and out of the device, respectively.
The input to the ideal amplifier noise contribution of the passi
passive device will be
t E t0 .(l 1) 290.(l 1), K (28)
8
- Galactic noise: | 2,4 K for frequencies above about 1GHz ;
- Atmospheric constituents that absorbss the radiowave and will emit energy in
the form of noise, like oxygen, water vapor, clouds, and rain ((most severe for fre-
quencies above about 10 GHz).
Y
- Extraterrestrial sources - the moon, sun, and planets.
Human sources of radio noise consist of interference noise in the same infor-
mation bandwidth induced from:
NO C P
- communications links, both satellite and terrestrial;
CO Y
- machinery;
- other electronic devices that may be in the vicinity of the ground terminal.
O
For the antenna pointing to the sky (ground station antenna) the output noise
OP
power from the antenna has two components which are represented by the sky tem-
PY
perature, Tsky , and the earth temperature Tearth .
DO NO T C
Sky temperature, Tsky is due to noise originating in the atmosphere. It varies
with frequency and the elevation angle M of the antenna. The sky temperature is
higher for M 00 (antenna pointing to the horizon) because of the longer path of the
radiation through the atmosphere. Elevation
Elevation angles of less than 10° are usually
avoided.
Figure 5 show Tsky for different frequency ranges 1 .
DO NO
T
Tsky ij=00
T
ij=650
ij=800
DO
ij=87
=870
ij=900
The earth temperature Tearth interference noise enter the system through the
antenna, it is often difficult to quantify
sidelobes or backlobes of the ground receiver antenna
interference noise directly.
For the antenna pointing to the earth (s
(satellite antenna) the noise temperatutre
of the antenna is about 290K, the physical temperature of the earth.
1
J P Silver. Satellite Communications Tutorial, E-mail: [email protected]
9
2.5.4 System Noise Temperature
The noise contributions of each device in the communications transmission
path, including sky noise, will combine to produce a total system noise temperature.
Consider a typical satellite receiver system
em with the components shown in Fig-
Y
ure 6: an antenna with a noise temperature of t A ; a low noise amplifier (LNA) with a
gain of g RF and noise temperature of t RF ; a cable with a line loss of 1 / l and noise
temperature of tC ; a downconverter (mixer) with a gain of g M and noise temperature
NO C P
of t M ; and finally an intermediatete frequen
frequency (I.F.) filter and am
amplifier
plifier with a gain of
CO Y
g IF and t IF .
O
OP
Receiver
Down
PY
Converter
line (Mixer)
DO NO T C
1/l
1/l gM IF Filter IF Amplifier
tA tC LNA
gRF tM
tRF gIF
tIF
tM t IF
tR t RF , (28)
T
g RF g RF .g M
Example 6: A receiver with a low noise amplifier (LNA) with a gain of GRF 23dB
( g RF 200 ) and noise temperature of t RF 50 K ; a downconverter
downconver (mixer) with a gain of
T
GM 10dB ( g M 0,1 ) and noise temp erature of t M 500 K , an intermediate frequency
temperature fr (I.F.)
unit: t IF 1000 K , GIF 30dB ( g IF 1000 ).What is the receiver
recei r system noise temp
temperature.
t t IF 500 1000
t R t RF M 50 102,5 K .
DO
g RF g RF .g M 200 200.0,1
10
Example 7: Calculate Receiver G/T (dB/K) of a satellite having antenna gain 42 , over all
receiver noise temperature t S 75K .
G
GR 10 log t S 42 18,75 23,25 dB / K
T
Y
The minimum values for sat TV are:
- 6dB / K for an individual receiver;
- 14dB / K for a joint receiver.
NO C P
CO Y
2.6. Link Performance Parameters
2.6.1. Carrier-to-Noise Ratio
O
The average RF carrier power to noise power ratio C N is carrier power in the
OP
whole useable bandwidth.
PY
The C N can be expressed in terms
terms of the ei
eirp,
rp, G/T, and othe
otherr link parameters
developed earlier
DO NO T C
pR §C· pT .gT .g R
¨ ¸ ; (31)
nR © N ¹ k .t S .bN .(lFS .lad )
where lad is sum of all other losses. The other losses could be from the free
space path itself, such as rain attenuation, atmospheric attenuation, etc., or from
antenna feeds, line losses, etc.
hardware elements such as antenna
§C·
LFS Lad 228,6 10 log bN , dB ,
GR
¨ ¸ EIRP (32)
©N¹
DO NO
TS
T
where the EIRP is in dBW , the bandwidth BN is in dBHz , and
k 228,6 dBW / K / Hz .
The larger the ratio C N is the better
better.. Typical communications links require
minimum C N values of 6 to 10 dB for acceptable
acceptable performance. The performance of
T
two ways: if the carrier power c, is reduced, and/or if the
the link will be degraded in two
noise power nB , increases.
DO
11
2.6.3. Energy-Per-Bit to Noise Density
For digital communications systems, the bit energy, eb , is more useful than car-
rier power in describing the performance of the link. The bit energy is related to the
carrier power c eb .rb (or eb c.Tb , Tb is the bit duration).
Y
The ratio eb n0 is related to c n0 :
§ eb · §c· 1 §c·
¨¨ ¸¸ ¨¨ ¸¸ . ¨¨ ¸¸.Tb , (36)
© n0 ¹ © n0 ¹ rb © n0 ¹
NO C P
CO Y
§ eb · § c · bN
¨¨ ¸¸ ¨ ¸. , (37)
© n0 ¹ © n ¹ rb
O
The eb n0 will be numerically equal to the c n when the bit rate ( rb , bps ) is
OP
PY
equal to the noise bandwidth ( bN , Hz ).
DO NO T C
Example 8. 2 :
There is a satellite with a range 40,000 km (range); transmitted power pT 2W ( 3 dB ); an-
tenna gain gT 17 dB ( 50 ); channel system noise temperature t S 152 K and bandwidth
bN 500MHz of the satellite channel; Frequency = 11GHz.
What are:
a) Power Flux Density pPFD to the received terminal;
b) Received power pR to the received terminal w
with
ith antenna effective aperture Aeff 10m 2 .
DO NO
2
Mohamed Khedr, Ʌɟɤɰɢɹ: Satellite Communication Systems, http://webmail.aast.edu/~khedr
12
C
Carrier-to-Noise Ratio: 133 (119.8) 13.2dBW .
N
3. Link Budget
Y
The link budget determines transmitter itter power needed to obtain suffi-
cient strong signal in the receiver. The quality of the satellite link is estimated by the
Carrier-to-Noise Ratio in the receiving earth station or terms of energy per bit to
NO C P
noise density.
CO Y
Path noise is added to the signal at the uplink and downlink. Path noise is the
sum of additive noise effects such as noise caused by atmospheric gases, clouds, rain,
O
depolarization, surface emissions, or extra-terrestrial sources. Path losses are intro-
OP
duced in the uplink and the downlink signal paths. Path loss is the sum of signal
PY
power losses caused by effects such as gaseous
gaseous attenuation, rain or cloud attenuation,
scintillation loss, angle of arrival loss, or antenna gain degradation.
DO NO T C
The total system carrier-to-noise ratio, (c n) S , is determined by developing the
system equations for the total link, including
including the path degradation parameters.
The parameters used in the link calculations
calculations are shown in Figure 7.
, fD
L
U,
,L
DO NO
,f
D
dU
T
1 4
pGT, gGT nfNGR, pGR, gGR
Transmit Receive
terminal terminal
used
Figure 7. The parameters used in the link calculations
T
The
T he communications satellite transponder is implemented in one of two gen-
eral types:
DO
13
1 1
2 IFA
2
up 3 3 down
converter 4 4 converter
multiplexer
demultiplexer
Ɇix 5 IFA 5 Ɇix
6
……...
6
reseiver
7
Y
fif 7
fup 8 8 fdwn PA
9 9
10 10
11 11
LO LO
12 12
NO C P
IFA
CO Y
Figure 8. An example of conventional
conventional frequency translation transponder
transpo
O
3.1.1. Uplink
OP
To calculate uplink it is starting at the
the transmit terminal (point 1, Figure 7).
PY
The eirp of the ground transmit terminal is:
eirp pGT .g GT , W , (38)
DO NO T C
The carrier power received at th thee satellite antenna (point 2) is
pGT .g GT .g SR
cSR , (39)
lUfs .lUad
where lUfs is the uplink free space path loss, a lUad is the uplink path loss, and gGT , g SR
are the transmit and receive antenna
antenna gains, respectively.
The noise power at the sate llite antenna, point (2), is
satellite
DO NO
1
nSR k .tU (1 ).bU k .t SA .bU k .290.(nf NSR 1).bU , (40)
T
lUad
where k is Boltzmann’s constant, bU is the uplink information bandwidth, t SA is the
satellite receiver antenna temperature, nf NSR is the satellite rece
receiver noise figure, and
tU is the mean temperature of the uplink atmospheric path.
T
The uplink carrier-to-noise ratio, at point (2), is given:
§c· cSR pGT .g GT .g SR
¨ ¸ . (41)
© n ¹U nSR ª 1 º
DO
3.1.2. Downlink
The procedure is the same th at was used for the uplink.
that
The carrier power received at the re
received terminal (point 4) is
pST .g ST .g GR
cGR , (42)
lDfs .lDad
The noise power at the satellite
satellite antenna, (point 4), is
1
nGR k .t D (1 ).bD k .tGA .bD k .290.(nf NGR 1).bD . (43)
lDad
The downlink carrier-to-noise ratio, at point (4), is:
14
§c· cGR pST .g ST .g GR
¨ ¸ . (44)
© n ¹D nGR ª 1 º
lDfs .lDad .k .«t D (1 ) tGA 290.(nf NGR 1)».bD
¬ lDad ¼
This result (44) gives the downlink carrier-to-noise ratio.
Y
3.1.3. Determination the carrier-to-noise
-to-noise ratio of total link
important conditions specific to the FT
Consideration should be given to two important
NO C P
satellite:
CO Y
- the downlink transmits power, pST , for a frequency translation satellite will
contain both the desired carrier component, cST , and noise introduced by the uplink
O
OP
and by the satellite system itself, nST :
PY
pST cST nST ; (45)
- since there is no on-board processing of the information signal, the satellite
DO NO T C
input carrier-to-noise ratio must equal the satellite output carrier-to-noise
carrier-to-noise ratio:
§c· §c· , (46)
¨ ¸ ¨ ¸
© n ¹ IN © n ¹OUT
that is to say that all noise introduced by the satellite system is accounted for by nf SR .
So, in terms of the link parameters
§c· cST cSR
¨ ¸ (47)
© n ¹U nST nSR
DO NO
© n ¹U
From (48) solving for cST , and next replacing cST in Equation (47) with the
Equation (45) condition:
pST §c· cST pST nST
cST , ¨ ¸ (49)
1
1 © n ¹U nST nST
§c·
¨ ¸
© n ¹U
The (49) is transforming and solving for nST ,
§c· pST pST
¨ ¸ 1 , nST . (50)
© n ¹U nST §c·
1 ¨ ¸
© n ¹U
Next should calculate the necessary carrier power, which must be acceptably
the ground station (point 4) for overall link.
The desired carrier power received at the satellite antenna (point 4) is
15
cST .g ST .g GR
c'GR , (51)
lDfs .lDad
Replacing cST from (49) in (51) the result will be
Y
pST .g ST .g GR
c'GR , (52)
1
1 lDfs .lDad
§c·
¨ ¸
NO C P
© n ¹U
CO Y
consequently
cGR
c'GR , (53)
O
1
1
OP
§c·
PY
¨ ¸
© n ¹U
DO NO T C
The total noise power received on the ground, n'GR , will be the sum of the noise
introduced on the downlink, Equation (43), and the noise transferred from the uplink,
Equation (50), and after some transformation
cGR
n'GR nGR . (54)
§c·
1 ¨ ¸
© n ¹U
The total carrier-to-noise ratio for the frequency translation transponder is then
DO NO
§c· © n ¹U
¨ ¸ (56)
© n ¹6 nGR
cGR
§c·
1 ¨ ¸
© n ¹U
cGR §c·
After transforming (56) and allude that ¨ ¸ result for the FT satellite is:
nGR © n ¹D
§c· §c·
FD ¨ ¸ .¨ ¸
§c· © n ¹U © n ¹ D
¨ ¸ (57)
© n ¹6 §c· §c·
1 ¨ ¸ ¨ ¸
© n ¹U © n ¹ D
16
This result is usually acceptable for satellite link analysis, because §¨ ·¸ and
c
© n ¹D
§c·
¨ ¸ are generally much greater than 1.
© n ¹U
Y
noise density ratio of total link
3.1.4. Determination the carrier-to-noise
The total carrier-to-noise density, c n0 , can easily be shown to be of the same
NO C P
form as Equation (57)
CO Y
§c · §c ·
FD ¨¨ ¸¸ .¨¨ ¸¸
§c · © n0 ¹U © n0 ¹ D ,
O
¨¨ ¸¸ (59)
§c · §c ·
OP
© n0 ¹ 6 1 ¨¨ ¸¸ ¨¨ ¸¸
PY
© n0 ¹U © n0 ¹ D
1 1 1
ª§ c · FD º ª§ c · º ª§ c · º
DO NO T C
«¨¨ ¸¸ » | «¨¨ ¸¸ » «¨¨ ¸¸ » , (60)
¬«© 0 ¹ 6 ¼» «¬© n0 ¹U ¼» ¬«© n0 ¹ D ¼»
n
where
§c · pGT .g GT .g SR
¨¨ ¸¸ ,
© n0 ¹U ª 1 º
lUfs .lUad .k .«tU (1 ) t SA 290.(nf NSR 1)»
¬ lUad ¼
§c ·
DO NO
pST .g ST .g GR
¨¨ ¸¸ .
ª º
T
© n0 ¹ D lDfs .lDad .k .«t D (1
1
) tGA 290.(nf NGR 1)»
¬ lDad ¼
Y
the downlink ground terminal. Figure 9 shows an example of the on-board processing
satellite.
NO C P
CO Y
BASEBAND
De-
receiver PROCESSOR Modulator
modulator
fup Amplify
fbaseband fbaseband fdwnPA
Error correction
O
Coding
OP
LO Switching
LO
PY
...
© n ¹U 1
lUfs .lUad .k .«tU (1 ) t SA 290.(nf NSR 1)».bU
¬ lUad ¼
OBP
§c· pST .g ST .g GR
¨ ¸ . (65)
© n ¹D ª 1 º
lDfs .lDad .k .«t D (1 ) tGA 290.(nf NGR 1)».bD
¬ lDad ¼
Similarly, it can estimate satellite link by the ratio energy-per-bit to noise den-
sity.
OBP
§ eb · 1 pGT .g GT .g SR
¨¨ ¸¸ . (66)
© n0 ¹U rU ª 1 º
lUfs .lUad .k .«tU (1 ) t SA 290.(nf NSR 1)»
¬ lUad ¼
OBP
§e · 1 pST .g ST .g GR
¨¨ b ¸¸ . (67)
© n0 ¹ D rD ª 1 º
lDfs .lDad .k .«t D (1 ) tGA 290.(nf NGR 1)»
¬ lDad ¼
where rU and rD are the uplink and downlink data rates, respectively.
18
3.2.2 Composite OBP Performance
The overall composite link performance for the OBP satellite is described by
its bit error performance, or the probability of error, error PE . The overall error perform-
Y
ance of the on-board processing transponder onder will depend on both the uplink and
downlink error probabilities. A bit will be correct in the total link if either the bit is
correct on both the uplink and downlink, or if it is in error error on both links. The overall
NO C P
3
probability that a bit is correct, PCOR , is therefore
CO Y
PCOR (1 PU ).(1 PD ) PU .PD 1 ( PU PD ) 2 PU .PD , (68)
where PU is the probability of a bit error on the up uplink,
link, PD is the probability of a
O
bit error on the downlink; (1 PU ) is the probability of correct bit on uplink, (1 PD ) is
OP
PY
the probability of correct bit on downlink.
The probability of a bit error on the total link is
DO NO T C
PEOBP 1 PCOR PU PD 2 PU .PD . (69)
The composite link probability of errorr will be dependent on the uplink and
downlink parameters and their impact on the eb n0 for each link. A specific modula-
tion must be specified to determine the relationship
relationship between the bit error probability
and the eb n0 for each link. For example, the procedure procedure for the determination of the
composite error performance for an on-bo on-board
ard processing transponder system will be
frequency-shiftt keying (BFSK) system with noncoherent
demonstrated for a binary frequency-shif
DO NO
e c 1
The ratio eb n0 is related to c n0 by (61): ¨¨ b ¸¸ ¨¨ ¸¸ . ¨¨ ¸¸.Tb , and ¨¨ ¸¸ can
© n0 ¹ © n0 ¹ rb © n0 ¹ © n0 ¹
c eirp.g R
be expressed as , therefore,
n0 l fs .lad .k .t
1 §¨ EIRPU .§¨© g t ·¸ ·
¸
¹U ¸
§ EIRP .§ g · ·
¨ U ¨ t ¸ ¸
© ¹D ¸ 1 «
ª EIRP .§ g ·
U ¨ t ¸
© ¹U
EIRPU .§¨ g ·¸
© t ¹D
º
» ½
° 2.k .rU ¨¨ l fs .lad °
1 ¨
« »
¸ 2.k .rD ¨ ¸
§ eb · ° ¨ ¸ ¨
l fs .l ad
¸
2 k « rU .l fs . Lad
«¬
rD .l fs . Lad »
»¼ °
¨¨ ¸¸ 2. ln ®e © ¹U
e © ¹D
e ¾ (72)
© n0 ¹6 ° °
° °
¯ ¿
The result (72) is available for the OBP satellite with the binary frequency-shift
keying system.
3
Ippolito, Louis J., Satellite communications systems engineering: atmospheric effects, satellite link design, and system
Performance, 2008 JohnWiley & Sons Ltd, 396 p.
4
B. Sklar, Digital Communications – Fundamentals and Applications, Prentice Hall, Englewood Cliffs, NJ, 1988.
19
References
undamentals and Applications, Second Edition,
1. Bernard Sklar, Digital Communications: Fundam
Prentice-Hall, 2001.
2. Broadcom Corporation and Cisco Systems, Digital Transmission: Carrier-to-Noise Ratio,
Y
Signal-to-Noise Ratio, and Modulation Error Ratio.
http://www.broadcom.com/docs/general/Broadcom-Cisco_CNR-SNR-MER.pdf
3. Dennis Roddy, Satellite communications, McGraw-Hill Professional, 2001 - 569 p.
NO C P
4. Intuitive Guide to Principles of Communications, Link Budgets, www.complextoreal.com
CO Y
5. Ippolito, Louis J., Satellite communications systems engineering: atmospheric effects,
rmance, 2008 JohnWiley & Sons Ltd, 396 p.
satellite link design, and system Performance,
6. Mohamed Khedr, Lecture: Satellite Communication Systems,
O
http://webmail.aast.edu/~khedr
OP
7. RPC Telecommunications Ltd., http://www.satcom.co.uk/
PY
Communications Tutorial, E-mail: [email protected]
8. Silver J. P., Satellite Communications
DO NO T C
DO NO
T
T
DO
20
Satellite Communications Systems
Lecture 3.
Forward Error Correcting in Satellite Communications
Y
1. The necessity of channel coding
NO C P
2. Types of error control
CO Y
3. Concept of Hamming Weight and Hamming Distance
4. Reed Solomon code
O
4.1. Reed Solomon coding
OP
4.2. Reed Solomon decoding
PY
5. Interleaving
6. Convolution code
DO NO T C
6.1. Coder and coding.
6.2. State representation and state diagram
6.3. The Viterbi Decoding Algorithm
6.4. Implementation of the Viterbi Decoder
6.5. Recursive Systematic Convolutional Encoder
DO NO
T
T
DO
1
1. The necessity of channel coding.
The designation of Source Coding is to get a multiplexing and compressing in-
formation. The purpose of Channel Coding is decreasing of errors when signals are
transmitted by noisy channel. The capabilities of Channel Coding were investigated
Y
0.04.1916–24.02.2001) and written
by Claude Elwood Shannon (30.04.1916–24.02.2001) wr in “A mathemati-
1
cal theory of communication” .
A measure the quality of digital signals is Bit Error Rate (BER). The bit error
NO C P
rate or bit error ratio is the number of bit errors divided
divided by the total number of trans-
CO Y
ferred bits during a studied time interval. BER is a unitless performance measure, of-
ten expressed as a percentage number. The BER is often expressed as a function of
O
the Eb / N 0 , (energy per bit to noise power spectra
spectrall density ratio). Figure
Figure 1 is shows a
OP
comparison of typical coded versus uncoded error performance. If it is needed to pro-
PY
Eb
vide BER 1.105 , the uncoded signal needs a ratio 9.4 dB , but coded 1 / 7 - only
N0
DO NO T C
Eb
4.6 dB . The deference between
between values of ratio Eb N 0 coded and uncoded signal
N0
is called Coding Gain (G).
§ Eb · § Eb ·
G ¨¨ ¸¸ ¨¨ ¸¸ , dB (1)
© N 0 ¹U © N 0 ¹C
DO NO
BER
T
1.10-1
1.10-2
un
co
co
de
co
1.10-3
de
d
de
T
d1
d1
/7
/5
1.10-4
gain
DO
1.10-5
1.10-6
1 2 3 4 5 6 7 8 9 10 Eb/N0
1
C. E. Shannon, A mathematical theory of communication, Bell Syst. Tech., 1948.
2
That technique is known as Automatic Repeat Request (ARQ). It can be realize by
three ways:
- stop and wait ARQ - the transmitter waits for acknowledgement of each
transmission before the next transmission; if some of the message is received with an
Y
error, the receiver responds with negativee acknowledgement and transmitter repeats
this message;
- continuous ARQ with pullback - both the transmitter and receiver work si-
NO C P
multaneously, the transmitter is sending messages and receiver is sending acknowl-
CO Y
edgement data; if some of the message is received with an error, the receiver re-
ledgement and transmitter retransmits all messages
sponds with negative acknowledgement
O
started with the corrupted message to thethe moment of the negative
negative acknowledgement;
OP
- continuous ARQ with selective repeat - this method is the same as the first,
PY
but the transmitter retransmits only the corrupted message.
Which ARQ procedure to choice is a tr trade-off
ade-off between the requirements for
DO NO T C
the efficient of the communication resources.
Therefore, there are developed methods for error correction by encoding the
digital signal (ERC error correction coding).
coding). ERC has already been used in all types
of satellite links. General of the various methods
methods of error correction is the addition of
information surplus, called a control feature (additional information) to the basic flow
of data through which some errors can be eliminated during signal reception. The re-
ceiving system detect and possibly correct errors caused by corruption from the
DO NO
Y
ed in most of the direct-broadcast satellite
decoding. This is the technique that is used
systems and in several of the newer VSAT products.
In 1993, Claude Berrou developed
veloped the turbo code, aand
nd now it is the most pow-
NO C P
erful forward error-correction systemss with a turbo code can
on code. Communication system
CO Y
approach the theoretical limit of channel
channel capacity, called Shannon Limit. The turbo
coder-decoder configuration must include some arrangement of at least two compo-
O
nent encoders that are separated by an interleaver.
interleaver. The interleaver in a turbo encoder
OP
serves a different purpose than interleavers used by other parts of a communication
PY
system. The interleaver in a turbo encoder is designed that the second
second encoder gets an
interleaved version of the same data block that went into the first encoder; thus, the
DO NO T C
second encoder generates an independent set of code bits.
The place of channel coding is between
between multiplexing and modulating process,
as shown in Figure 2.
video
audio TV coder
M
DO NO
video U f
audio TV coder
T
L
T PA
I
..................
P QPSK
RS Convolution
L interleaving
coder coding modulater
E
X
T
Channel coding
E
R
video
audio TV coder
DO
MPEG
coder
Y
i.e. to detect one error the code hass to contain the minimum
minimum Hamming distance d 2 ,
to detect two errors - d 3 , …
To correct the errors codes have to get more parity bits or symbols. For exam-
NO C P
ple, for a sequence of 6 bits, there are 6 different
different ways to get a 1 bit error and there
CO Y
6!
are 15 different ways we can get 2-bit errors ( 15 ). The number of errors that
2!.4!
O
can be correct is:
OP
d min 1
PY
t , d min t 2t 1 , (3)
2
DO NO T C
i.e. to correct one error the code has
has to contain the minimum
minimum Hamming distance d 3 .
quences, where m is any positive integer having a value greater than 2. R-S ((n, k)
T
codes on m -bit symbols exist for all n and k for which
m-bit
k n 2m 2 , (4)
where k is the number of data symbols being encoded, and n is the total number of
code symbols in the encoded block, n k 2t is the number of parity symbols.
T
For Reed-Solomon codes, the code minimum distance is given by 2
dmin = n - k + 1. (5)
If combine Equation (3) and (5) can be express
express the number of errors that can
DO
be correct
d min 1 n k
t , (6)
2 2
nk nk
where is the largest integer not to exceed ; a Reed–Solomon code can cor-
2 2
rect up to half as many errors as there are redundant symbols added to the block.
2t = 16 parity
k=188 information symbols
symbols
Block of n=204 symbols
2
Gallager, R. G., Information Theory and Reliable Communication, New York: John Wiley and Sons, 1968.
5
have a length 188 information symbols and 16 parity symbols, as it is shown in Fig-
ure 3.
Reed Solomon codes are based on finite fields, called Galois fields (GF)
with 2 m elements. Every finite field can be representing by a fixed length binary
Y
word. For any number p there exists a finite field GF ( p) that contains p elements. It
can extend to a field of p m elements, where m is a nonzero positive integer. The new
field is called an extension field of GF ( p) , and denoted by GF ( p m ) . GF ( p m ) contains
NO C P
as a subset the elements of GF ( p) . Symbols from the extension field GF ( p m ) are used
CO Y
in the construction of Reed-Solomon (R-S) codes.
The binary field GF ( p) is a subfield of the extension field GF ( p m ) . Besides the
O
numbers 0 and 1, there are additional unique elements in the extension field that will
OP
PY
be represented with a new symbol D . Each nonzero element in GF ( p m ) can be repre-
sented by a power of D . An infinite set of elements, F F,, is formed by starting with the
elements ^0 ,1, D ` , and generating additional elements
DO NO T C
elements by progressively multiplying
the last entry by D :
F ^0,1, D , D 2 , D 3 ,.., D j ,...` ^0, D 0 , D 1 , D 2 , D 3 ,.., D j ,...`. (7)
The condition that closes the set of field field elements under multiplication is char-
acterized by the irreducible polynomial shown below:
D (2 1)
1 0
m
DO NO
or
T
D (2 1)
1 D0.
m
(8)
field
Using this polynomial constraint, any fiel d element that has a power equal to or
greater than 2 1 can be reduced to an element with a power less than 2m 1 :
m
T
D (2 n )
D (2 1)
.D ( n1) D ( n1) .
m m
(9)
Thus, Equation (8) can be used to form the finite sequence F * from the infinite
sequence F
^0,1,D ,D ,D ,..,D ` ^0,D ,D ,D ,D ,..,D `
DO
2m 2
, D 2 1 , D 2 ,... 2m 2
, D 0 , D 1 , D 2 ,...
m m
2 3 0 1 2 3
F* (10)
From Equation (10) the elements of the finite field GF(2
GF(2m) are
GF (2 m ) ^0,D ,D ,D ,D ,..,D ` .
0 1 2 3 2m 2
(11)
Each of the 2 m elements of the finite field, GF ( p m ) , can be represented as a
distinct polynomial of degree (m - 1) or less where at least one of the m coefficients
of ai ( X ) is nonzero. The degree of a polynomial is the value of its highest-order ex-
ponent.
D i ai ( X ) ai ,0 ai ,1 X ai , 2 X 2 ... ai ,m1 X m1 , (12)
where i 0,1, 2, ..., 2m 2 .
Example 2: Table 1 shows the possible ni nine elements of field GF (23 ) , m 3 , where every
row contain values of coefficients ai ,0 , ai ,1 ɢ ai , 2 of Equation (12). Seven elements ^ai ` are differ
each other and zero D 0 , D 1 , D 2 , D 3 , D 4 , D 5 , D 6 , because from (8) D ( 2 1)
D ( 2 1) D0 .
m 3
6
Table 1. Mapping field elements in terms of basis elements for GF(8) with 1 X X 3
Basic elements
0
X X1 X2
Y
0 0 0 0
D0 1 0 0
NO C P
0 0 1
CO Y
D3 1 1 0
D4 0 1 1
O
D5 1 1 1
OP
D6 1 0 1
PY
D 7 =D 0 1 0 0
DO NO T C
One of the benefits of using extension field elements ^ai ` in place of binary
elements is the compact notation that fac ilitates the mathematical representation of
facilitates
nonbinary encoding and decoding processes. Addition of two elements of the finite
field is then defined as the modulo-2 sum of each of the polynomial coefficients of
equal powers
D i D j (ai ,0 a j , 0 ) (ai ,1 a j ,1 ) X ... (ai ,m1 a j ,m1 ) X m1 (13)
DO NO
6 1 X X 6 17 1 X 3 X 17
7 1 X 3 X 7 18 1 X 7 X 18
8 1 X 2 X 3 X 4 X 8 19 1 X X 2 X 5 X 19
9 1 X 4 X 9 20 1 X 3 X 20
10 1 X 3 X 10 21 1 X 2 X 21
11 1 X 2 X 11 22 1 X X 22
12 1 X X 4 X 6 X 12 23 1 X 5 X 23
13 1 X X 3 X 4 X 13 24 1 X X 2 X 7 X 24
7
consequently f ( X ) 0 has three roots, and if D is a root of the polynomial f ( X ) it is
possible to write the following:
1 D D 3 0 , D 3 1 D 1 D , (14)
because of 1 1 in the binary field.
Y
Thus, D 3 is expressed as a weighted sum of D terms having lower orders. In
fact all powers of D can be so expressed.
D 4 D .D 3 D .(1 D ) D D 2 ,
NO C P
CO Y
D 5 D .D 4 D 2 D 3 1 D D 2
D 6 D .D 5 D (1 D D 2 ) D D 2 D 3 1 D 2
O
D 7 D .D 6 D (1 D 2 ) D D 3 1 D 0 . (15)
OP
PY
Therefore the eight finite field elements of GF (23 ) are
^0,D 0
, D 1 , D 2 , D 3 , D 4 , D 5 , D 6 `. (16)
DO NO T C
4.1. Reed Solomon coding
The generating polynomial for an R-S code in terms terms of the parameters n,
n, kk, t,
and any positive integer m ! 2 is
g ( X ) g 0 g1 X g 2 X 2 ... a2t 1 X 2t 1 X 2t . (17)
where n k 2t is the number of parity symbols, and t is the symbol-error correcting
DO NO
g( X ) D 3 D1X D 0 X 2 D 3 X 3 X 4 . (18)
R-S codes are cyclic codes and encoding in systematic form is analogous to the
binary encoding procedure. The information information message (a polynomial, m( X ) ) can be
n k
multiplied by X so that it is right-shifted n k positions and then appending a par-
ity polynomial, p( X ) , by placing it in the leftmost n k stages. Then it can divide
X n k .m( X ) by the generator polynomial g ( X ) , which is written in the following form:
m( X ).x nk q( X ).g ( X ) p ( X ) , (19)
where q( X ) and p( X ) are quotient and remainder polynomials, respectively.
As in the binary case, the remainder p( X ) is the parity. Equation (19) can also
be expressed as follows:
p ( X ) m( X ).x n k g ( X ) . (20)
The resulting codeword polynomial, U ( X ) can be written as
U(X ) p( X ) m( X ). X nk . (21)
8
Example 3: There is a message that consist three ee symbols 010 110 111, and it has to be
coded by RS(7,3) code with the generator polynomial (18): g ( X ) D 3 D 1 X D 0 X 2 D 3 X 3 X 4 .
First, according to table 1 these three symbols are D 1 , D 3 , D 5 . The information message
Y
polynomial is m( X ) D 1 D 3 X D 5 X 2 , it has to multiply by X k X 4 . The result is
X 4 .m( X ) D 1 X 4 D 3 X 5 D 5 X 6 . Next, it has to divide this upshifted
upshifted message polynomial by the
generator polynomial (18) to get a parity polynomial, p ( X ) D 0 D 2 X D 4 X 2 D 6 X 3 . Then,
NO C P
from Equation (21), the codeword polynomial is:
CO Y
U ( X ) D 0 D 2 X D 4 X 2 D 6 X 3 D1X 4 D 3 X 5 D 5 X 6 .
O
The circuit to encode a symbol sequence in systematic form with the (n, k) R-S
OP
ynomial requires the implementation of a linear feedback
code with the generator polynomial
PY
shift register (LFSR) circuit. The linear feedback
feedback shift register is a dynamic memory
DO NO T C
of binary 0 and 1. The memory consist a number of cages that determines the mem-
ory. When in the most left stage enters a new symbol all next shift to the right, and
this one that is the rightmost go out of the register.
Figure 4 shows a circuit of LFSR forfor RS (7,3) code from example 3.
switch 1
D3 D1 D0 D3
DO NO
2
010 110 111(D , D , D )
1 3 5
9
During the transfer time the rightmost symbol of the information sequence is
the earliest symbol, and the rightmost bit is the earliest bit. Table 3 shows the opera-
tional steps during the first k 3 shifts of the encoding circuit of Figure 4.
Y
Table 3. The operational steps to shift symbols in the register
ɜɯɨɞɧɚ ɩɨɫɥɟ- ɬɚɤɬ ɫɴɞɴɪɠɚɧɢɟ ɧɚ ɪɟɝɢɫɬɴɪɚ ɨɛɪɚɬɧɚ ɜɪɴɡɤɚ
ɞɨɜɚɬɟɥɧɨɫɬ
D1 D 3 D 5 0 0 0 0 0 D5
NO C P
D1 D 3 1 D1 D6 D5 D1 D 0 (D 1 D 3 )
CO Y
D1 2 D3 0 D2 D2 D 4 (D 2 D 1 )
D0 D2 D4 D6
O
- 3 -
OP
PY
Explanations:
D 5 .D 3 D 8 D 1.D 7 D 1..11 D 1 - first clock, first register;
DO NO T C
D 5 .D 1 D 6 - first clock, second register;
D 5 .D 0 D 5 .1 D 5 - first clock, third register;
D 5 .D 3 D 8 D 1.D 7 D 1.1 D 1 - first clock, forth register;
D 0 .D 3 D 5 1.D 3 D 5 D 2 (001) - second clock, first register;
D 0 .D 0 D 6 1.1 D 6 1 1 D 2 D 2 (001) - second clock, second register;
D 0 .D 1 D 1 1.D 1 D 1 0 (000) - second clock, third register;
D 0 .D 3 1.D 3 D 3 (110) - second clock, forth register;
DO NO
.................................................................................................
T
register
Thus, after the third clock cycle, the regi ster contents are the four parity sym-
bols, D , D , D ,D . Then, switch 1 of the circuit is opened, switch 2 is moved to the
0 2 4 6
T
register are shifted to the output. The out-
position 2, and the parity symbols from the register
put codeword, U ( X ) , is:
U ( X ) D 0 D 2 X D 4 X 2 D 6 X 3 D1X 4 D 3 X 5 D 5 X 6
(22)
DO
3
Bernard Sklar, Digital Communications: Fundamentals and Applications, Second Edition, Prentice-Hall, 2001.
10
6
e( X ) ¦ e .X
n 0
n
n
. (24)
Y
(25)
000 000 X 000 X 2 001X 3 111X 4 000 X 5 000 X 6
received message will be (using modulo-2 on
According to Equation (23) the received
NO C P
Equations (22) and (25)):
CO Y
r ( X ) 100 001X 011X 2 100 X 3 101X 4 110 X 5 111X 6
, (26)
(
D 0 D 2 X D 4 X 2 D 0 X 3 D 6 X 4 D 3 X 5D 5 X 6
O
because of 101 001 100 D 0 (forth symbol) and 010 111 101 D 6 ( fifth symbol).
OP
PY
In this example, there are four unknowns—two error locations and two error
values. Therefore, four equations are required for their solution.
DO NO T C
The decoding order is as follows:
- Syndrome Computation;
- Error Location;
- Error Values Computation;
- Correcting the Received Polynomial with Estimates of the Error Polynomial.
1) Syndrome Computation
The syndrome is the result of a verification on r ( X ) to determine whether r ( X )
DO NO
T
is a valid member of the codeword set. The syndrome S has value 0 when r ( X ) is a
member. Any nonzero value of S indicates the presence of errors. The syndrome S is
made up of n k symbols, ^Si ` (i 1,..., n k ) . Thus, for (7,3)RS code, there are four
symbols in every syndrome vector; their va values
lues can be computed from the received
T
polynomial, r ( X ) . It can be made by the structure of the code
U (X ) m( X ).g ( X ) . (27)
This structure shows that every valid codeword polynomial U ( X ) is a multiple
of the generator polynomial g ( X ) . Consequently, the roots of g ( X ) must also be the
roots of U ( X ) . Thus, each of the roots of g ( X ) should yield zero r ( X ) (received mes-
sage) only when it is a valid codeword. Any Any errors will give a nonzero result in one
or more of the computations. The comput utation of a syndrome symbol can be de-
scribed as follows:
Si r ( X ) X D r (D i ), i 1, 2, ..., n k ( i 1,2,3,4 for example )
i (28)
In the examp
example, r ( X ) contain two corrupted by eerror symbols (Equation 25).
The computation of the four syndrome symbols is:
S1 r (D ) D 0 D 3 D 6 D 3 D 10 D 8 D 11
(29)
D 0 D 3 D 6 D 3 D 2 D1 D 4 D3
S2 r (D 2 ) D 0 D 4 D 8 D 6 D 14 D 13 D 17
(30)
D D D D D D D
0 4 1 6 0 6 3
D 5
11
S3 r (D 3 ) D 0 D 5 D 10 D 9 D 18 D 18 D 23
(31)
D0 D5 D3 D2 D4 D4 D2 D6
S4 r (D 4 ) D 0 D 6 D 12 D 12 D 22 D 23 D 29
(32)
D 0 D 6 D 5 D 5 D1 D 2 D 2 0
Y
The result shows, that received codeword contains errors.
2) Error Location
NO C P
CO Y
Suppose there are v errors in the codeword at location X J , X J ,..., X J . Then, 1 2 v
the error polynomial e( X ) shown in Equations (24) and (25) can be written as fol-
O
lows:
OP
e( X ) e j X J e j X J ... e j X J . (33)
PY
1 2 v
1 2 v
The indices 1,2,..., v refer to the first, second, …, v th errors, and the index j re-
DO NO T C
codeword, each error value e jl and
fers to the error location. To correct the corrupted codeword,
its location X jl , ( l 1,2,..., v ) must be determined. An eerrror locator number can be
mark as E l D l . Next, by substituting D i into the received polynomial for i 1,2,...,2t
j
If a nonzero syndrome vector (one or more of its symbols are nonzero) has
been computed, that signifies that an error has been received. Next, it is necessary to
learn the location of the error or errors. An error-locator polynomial, V ( X ) , can be
defined as
V ( X ) (1 E1 X )(1 E 2 X )...(1 E v X ) 1 V 1 X V 2 X 2 ... V v X v . (35)
1 1 1
roots of V ( X ) are
The roots , ,..., . The reciprocal values of the roots of V ( X )
E1 E 2 Ev
show the error-location numbers of the error polynomial e(X ) . Then, using autore-
gressive modelling techniques 4 [7], it can form a matrix from the syndromes, where
the first t syndromes are used to pr
predict the next syndrome.
4
Blahut, R. E., Theory and Practice of Error Control Codes (Reading, MA: Addison-Wesley, 1983)
12
ª S1 S 2 S3 ... St 1 St º ªV t º ª St 1 º
«S S S 4 ... St St 1 »» ««V t 1 »» « S »
« 2 3 « t 2 »
«... » «... » «... ». (36)
« »« » « »
« St 1 St St 1 ... S 2t 3 S 2t 2 » «V 2 » « S 2t 1 »
Y
« St St 1 St 2 ... S 2t 2 S 2t 1 »¼ «¬V 1 »¼ « S 2t »
¬ ¬ ¼
For the (7, 3) RS code, the matrix size is 2 × 2, and the model is written as:
NO C P
ª S1 S 2 º ªV 2 º ª S3 º
(37)
CO Y
« S S » «V » «S »
¬ 2 3 ¼¬ 1¼ ¬ 4¼
ªD 3 D 5 º ªV 2 º ªD 6 º
O
« 5 6 »« » « » (38)
»¼ ¬V 1 ¼
OP
«¬D D ¬0 ¼
PY
To solve for the coefficients V 1 and V 2 and of the error-locator polynomial,
V ( X ) (35), first can take the inverse of the matrix in Equation (38). The inverse rule
DO NO T C
of a matrix >A@ is:
cofactor > A@
Inv > A@ .
det > A@
Consequently,
ªD 3 D 5 º
» D D D D D 9 D 10 D 2 D3 D5
3 6 5 5
det « 5 6
«¬D D »¼
DO NO
ªD 3 D 5 º ªD 6 D 5 º
T
cofactor « 5 6 » « 5 3 »
«¬D D »¼ «¬D D »¼
ªD 6 D 5 º
« 5 3 »
ªD 3 D 5 º ¬«D D »¼ ªD 6 D 5 º ªD 6 D 5 º ªD 8 D 7 º ªD 1 D 0 º
T
Inv « 5 6 » D « 5 3 »
5
D « 5 3 »
2
« 7 5 » « 0 5 » (39)
¬«D D »¼ D5 «¬D D »¼ ¬«D D »¼ ¬«D D »¼ ¬«D D »¼
Verification: If the inversion was performed
performed correctly, the multiplication of the
DO
13
V (D 0 ) D 0 D 6 D 0 D6 z 0
V (D 1 ) D 0 D 7 D 2 D2 z 0
V (D 2 ) D 0 D 8 D 4 D6 z 0
V (D 3 ) D 0 D 9 D 6 0 error
Y
V (D 4 ) D 0 D 10 D 8 0 error
V (D 5 ) D 0 D 11 D 10 D2 z 0
NO C P
V (D 6 ) D 0 D 12 D 12 D 0 z 0
CO Y
According to Equation (35), the error locations are at the inverse of the roots of
O
the polynomial. Therefore V (D 3 ) 0 indicates that one root exits at 1 El D 3 . Thus,
OP
E l 1 / D 3 D 4 . Similarly, V (D 4 ) 0 indicates that another root exits at 1 E l ' D 4 . Thus,
PY
E l ' 1 / D 4 D 3 , where l , l ' ,..., l v refer to the first, second, …, v th error. Therefore, in this
DO NO T C
example, there are two-symbol errors, so th at the error polynomial is of the following
that
form:
e( X ) e j X J e j X J
1
1
2
2
(43)
Thus, the two errors were found at locations D 3 and D 4 , i.e. E1 D j 1
D 3 and
E2 D j D4 .
2
calculate the error value in the location E1 D 3 and E 2 D 4 can be used any
To calculate
T
of the four syndrome equations (34).
(34). For instance, assume
assume that are S1 and S2
S1 r (D ) e1E1 e2 E 2
S2 r (D 2 ) e1E 12 e2 E 22 , (44)
T
where indexes of the errors are 1 and 2, be cause they are associated with locations
because
E1 D and E 2 D .
3 4
DO
14
ªe1 º ªD 2 D 5 º ªD 3 º ªD 5 D 10 º ªD 5 D 3 º ªD 2 º
«e » « 0 4 » « 5» « 3 9 » « 3 2» « 5» (48)
¬ 2¼ «¬D D »¼ «¬D »¼ «¬D D »¼ «¬D D »¼ «¬D »¼
4) Correcting the Received Polynomial with with Estimates of the Error Polynomial
Y
Using Equations (43) and (48) thee estimated error polynomial is
e ( X ) e1 X J e2 X J D 2 X 3 D 5 X 4
1 2
(49)
NO C P
The algorithm that can repair the received polynomial is
CO Y
U ( X ) r ( X ) e ( X ) U ( X ) e( X ) e ( X ) (50)
r ( X ) 100 001X 011X 2 100 X 3 101X 4 110 X 5 111X 6
O
OP
e ( X ) 000 000 X 000 X 2 001X 3 111X 4 000 X 5 000 X 6
PY
U ( X ) 100 001X 011X 2 101X 3 010X 4 110 X 5 111X 6
(51)
D 0 D 2 X D 4 X 2 D 6 X 3 D 1 X 4 D 3 X 5D 5 X 6
DO NO T C
Thus, received information message th at is located in the rightmost
that rightmost k 3 sym-
bols is the same as transmitted 010 110 111 o D D D .
1 3 5
Advantages of RS codes:
- The RS code achieves the largest possible code minimum distance for any
linear code with the same encoder
encoder input and output block lengths.
- The RS code can be configured with longlong block lengths (in bits) with less de-
DO NO
5. Interleaving
T
Interleaving is a powerful technique that can be used in digital communications
systems to enhance the random error corr ecting capabilities of block codes such as
correcting
Reed-Solomon codes to the point that they can be effective in a burst noise environ-
DO
5
Interleaving for Burst Error Correction, AHA products groop, Moscow, Idaho, USA, www.aha.com.
15
Burst errors are characterized as a series of adjacent erroneous bits in a signal.
They can be caused by fading in a communication channel and its can be difficult to
correct for some codes. However, block codes (in particular Reed-Solomon codes)
can handle burst noises effectively. The ability of a block code to correct burst errors
Y
depends upon the number of errors in the signal. Interleaving can be used to extend
the error correcting capability of the Reed-Solomon code.
Impulse errors can cause catastrophic failures in the communications system.
NO C P
In general, all coding systems fail to reconstruct
reconstruct the message in the presence of catas-
CO Y
trophic errors. However, certain codes like the
the R-S codes can detect the presence of a
catastrophic error by examining g the received message.
O
The interleaver subsystem rearranges the the encoded symbols over multiple code
OP
blocks. This effectively spreads out long burst noise sequences so they appear to the
PY
decoder as independent random
ndom symbol errors or shorter burst errors.
As it was shown in charter 4, (n, k) Reed Solomon codes are linear block non-
DO NO T C
binary cyclic codes with symbols, where k is the number of data symbols being en-
coded, and n is the total number of code sy mbols in the encoded block, n k 2t is
symbols
the number of parity symbols. This encoded block of length n symbols is called a
d min 1 nk
codeword. The number of errors
errors that can be correct is t .
2 2
Suppose there are number of p corrupted by errors symbols in the block. If
p d t errors will be located and corrected. If bursts of length p ! t the error correcting
DO NO
code will fail. Let assume that t p d t * i , where i is called a interleaving depth (it is
T
an integer):
it p , (52)
t
The Reed-Solomon (n,k((n,k)
n,k)) code can be used if we can
n,k can spread the burst error se-
T
quence over several code blocks so that each block has no more than t errors which
can then be corrected. This can be accomplished
accomplished using block interleaving.
DO
Figure 5. Data bytes output from the encoder for RS (255,235) code
16
Data bytes Parity bytes
Y
codeword C c0 c1 c2 ... c234 c235 c236 ... c254
NO C P
CO Y
Figure 6. Interleaver Table – Data Bytes are
are Input Row by Row and Output Column by
Column
O
OP
To interleave the data bytes its is sent to the output devise column by column
PY
as it is shown in Figure 7.
DO NO T C
a0 b0 c0 d0 e0 a1 b1 ... a254 b254 c254 d254 e254
6. Convolution code
convolutional
Possibilities of convoluti onal coding have been introduced
introduced by Peter Elias
(1923-2001) in 1955. Convolutional coding of fers an alternative to block codes for
offers
DO NO
17
6.1. Coder and coding.
A convolutional encoder is a Mealy 6 machine, where the output is a function of
the current state and the current input. Figure 8 shows a ( n, k , m ) convolutional en-
coder.
Y
A A xor B
1 3 n B
input output
A B A xor B
NO C P
Output 0 0 0
k input
CO Y
codeword 1
information data 0 1
U=U1, U2,.., Un
1 2 3 ... m 1 0 1
Sfift register 1 1 0
O
2 ...
OP
PY
DO NO T C
Figure 8. ( n, k , m ) convolutional encoder
It consists of one or more shift regi sters, multiple XOR gates and an output
registers,
flows in to the shift register from one end and
switch. The stream of information bits flows
clock time. XOR gates are connected to some
is shifted out at the other end every clock
the output. There is no theoretical basis for the
stages of the shift registers to generate the
optimal location of the shift register stages to be connected to XOR gates. It is based
on an empirical approach. The location of stagesstages as well as the number of memory
DO NO
elements determines the minimum Hamming Hamming distance. The minimum Hamming dis-
T
tance determines the maximal number of correctable bits.
The output switch consecutively reads th thee outputs of XOR gagates and generates
the output codeword U i G ((m mi ) . Frequency clock switching depends on code rate
T
r k / n . Thus, the frequency clock switching has to be n times higher by comparison
with input clock frequency. In practical use there are systematic
systematic and non-systematic
convolutional codes depending polynomial. For example, if the gen-
depending on the generator polynomia
DO
Multiplexer u
S1 D
m(t)
m(n) m(n-1) m(n-2) S2
Shift register
C ENB
synchronization
output u2
6
George H. Mealy „A Method for Synthesizing Sequential Circuits". 1955, Bell Systems Technical Journal 34: pp.
1045–1079.
18
XOR
output u1
Double
speed
m input Multiplexer
output
information bit S1 D
u
Y
stream
m(n) m(n-1) m(n-2) S2
Shift register
C ENB
synchronization
output u2
NO C P
CO Y
XOR
O
OP
One of the advantages of a systematic code is that it is simple to extract the in-
PY
formation sequence for a decoder.
The encoder shown in figure
figure 10 has a code rate r 1 / 2 . This means there are
DO NO T C
two output bits for each input bit. Here the output bits are transmitted one after an-
other, two per clock cycle. The two output can be represent as binary vectors >111@
and >101@ are known as the generating vectors or generating polynomials for the code:
g1 ( x) 1 x x 2
g 2 ( x) 1 x 2 . (53)
where m(n) is a last entered bit, m(n 1) is a bit one clock time older than m(n) , and
DO NO
two bits in the shift register. Let the first input bit to the shift register be m(n) 1 , and
let the flip-flops be reset to zero so m(n 1) 0 and m((nn 2) 0 . This state is
S0 00 >m(n 1), m(n 2)@ .
The output is
u1 m(n) m(n 1) m(n 2) 1 0 0 1 ,
u2 m ( n ) m ( n 2) 1 0 1 ,
u >u1 , u2 @ 11
After the clock, state bit m(n 1) 0 will shift right into m(n 2) , the input
m(n) 1 will shift right into m( 1) , and the next state will be S1 10 >m(n), m(n 1)@ .
m(n 1)
In the first stage can enter m(n 1) 0 or m(n 1) 1 with equal probability.
If there is m(n 1) 0 the output is
u1 m(n 1) m(n) m(n 1) 0 1 0 1,
u2 m(n 1) m(n 1) 00 0,
19
u >u1 , u2 @ 10 ,
if there is m(n 1) 1 the output is
u1 m(n 1) m(n) m(n 1) 1 1 0 0,
u2 m(n 1) m(n 1) 1 0 1 ,
Y
u >u1 , u2 @ 01 .
In a clock time 3 the bit m(n 1) 0 out of register, the bit m((nn) 1 will be
NO C P
moved to right in the third register, the bit m(n 1) 0 or 1 will move in the second
CO Y
stage. In the first enters new bit m(n 2) , which can also be 0 or 1. The states in a
clock 3 are S 2 01 >m(n 1), m(n)@ or S3 11 >m(n 1), m(n)@ . The output can be
O
OP
If m(n 2) 0 , m(n 1) 0 :
PY
u1 m(n 2) m(n 1) m(n) 0 0 1 1 ,
m ( n 2) m ( n ) 0 1 1,
DO NO T C
u2
u >u1 , u2 @ 11 ,
If m(n 2) 1 , m((nn 1) 0 :
u1 m(n 2) m(n 1) m(n) 1 0 1 0 ,
u2 m ( n 2) m ( n ) 1 1 0 ,
u >u1 , u2 @ 00 .
DO NO
If m((nn 2) 0 , m((nn 1) 1 :
T
u1 m(n 2) m(n 1) m(n) 0 11 0 ,
u2 m ( n 2) m ( n ) 0 1 1,
u >u1 , u2 @ 01 .
T
If m(n 2) 1 , m((nn 1) 1 :
u1 m(n 2) m(n 1) m(n) 1 1 1 1 ,
DO
u2 m ( n 2) m ( n ) 1 1 0 ,
u >u1 , u2 @ 10 .
Example 5: Let the information data consist three bits m >101@ . The encoder structure is
the shift register are reset and the first
shown in Fig. 10. The stages of the fi bit received (clock time 1) is
m(n) 1 . So in the first cycle in the output will
u1 1 0 0 1 , u2 1 0 1, u >u1 , u2 @ 11 .
After the clock a bit m((nn 1) 0 enters. The result is
u1 0 1 0 1 , u2 00 0, u >u1 , u2 @ 10 .
Then (at time 3) a bit m(n 2) 1 enters. The result is
u1 1 0 1 0 , u2 11 0 , u >u1 , u2 @ 00 .
After that a tail of two zero-bits is appended to data bits to clear out the memory after encod-
ing the last bit (all-zero); the result is two more pairs of output symbols:
t 4 : u >u1 , u2 @ 10 ,
20
t 5 : u >u1 , u2 @ 11 .
The output coded message is 11 10 00 10 11 .
L
The ratio Reff is called effective code rate, where L is the
n[( L / k ) ( K 1)]
Y
number of data bits. For example 5: L 3 , n 2 , k 1 , K 3 and
L 3 3
Reff which is less than r 1 / 2 .
NO C P
n[( L / k ) ( K 1)] 2[(3 / 1) (3 1)] 10
CO Y
The effective code rate falls below code rate r because the added zero-bits do
not carry information.
O
OP
Example 6: Let the information data consist three bits m >101@ . The encoder structure is
PY
shown in Fig. 11. This is a coder with a constraint length K 3 and code rate r 1 / 3 .
The memory of the shift register is clean aand
nd the first bit received (clock time 1) is m(n) 1 .
DO NO T C
So in the first cycle in the output will
u1 1 0 0 1 , u2 1 0 1 , u3 0 0 0 u >u1 , u2 , u3 @ 110 .
After the clock a bit m((nn 1) 0 enters. The result is
u1 0 1 0 1 , u2 0 0 0 , u3 1 0 1 u >u1 , u2 , u3 @ 101 101..
When t 3 m(n 2) 1 enters. The output result is
u1 1 0 1 0 , u2 1 1 0 , u3 0 1 1 u >u1 , u2 , u3 @ 001 .
DO NO
T
m input output u1
information bit
stream output u2 u
T
m(n) m(n-1) m(n-2)
output u3
synchronization
DO
After that a tail of two zero-bits is appended to data bits to clear out the memory after encod-
ing the last bit (all-zero).
t 4 : u1 0 1 0 1 , u2 0 0 0 , u3 1 0 1 u >u1 , u2 , u3 @ 101 .
t 5 : u1 0 0 1 1 , u2 0 1 1 , u3 0 1 1 u >u1 , u2 , u3 @ 111 .
The output coded message is 110 101 001 101 111 .
The coder is represented by set of generator polynomials, one for each of the n
modulo-2 adders. Each polynomial is of degree K 1 or less and describes the con-
nection of the shift register to that modulo-2 adder. The coefficients
coe can be either 1 or
0. The value 1 means that connection exists between the stage of shift register and the
modulo-2 adder. The value 0 means that connection does not exist. For instant, the
21
encoder shown in figure 10 can be representing by generator polynomials (53), the
presenting by generator polynomials
encoder shown in figure 11 can be representing
g1 ( x) 1 x x 2
g 2 ( x) 1 x 2
Y
g 3 ( x) x x2 . (55)
The information message from Example 5 can be representing by generator
polynomial m( x) 1 x 2 . The output u1 is formed by multiplication of g1 ( x) with m( x) :
NO C P
CO Y
g1 ( x).m( x) (1 x x 2 ).(1 x 2 ) 1 x x 3 x 4 ,
and
O
g 2 ( x).m( x) (1 x 2 ).(1 x 2 ) 1 x 4 .
OP
represent with coefficients:
These Equations can represent
PY
g1 ( x).m( x) 1 1.x 0.x 2 1.x 3 1.x 4 ;
g 2 ( x).m( x) 1 0.x 0.x 2 0.x 3 1.x 4 ;
DO NO T C
U ( x) (1,1) (1,0).x (0,0).x 2 (1,0).x 3 (1,1).x 4 ;
U G (m) 11 10 00 10 11 .
The result of U ( x) is the same as that in Example 5.
For Example 6:
g1 ( x).m( x) (1 x x 2 ).(1 x 2 ) 1 1.x 0.x 2 1.x 3 1.x 4
g 2 ( x).m( x) (1 x 2 ).(1 x 2 ) 1 0.x 0.x 2 0.x 3 1.x 4
DO NO
Example 7: Let the information data consist three bits m >1011@ . The encoder structure is
shown in Fig. 10. This is a coder with a constraint length K 3 and code rate r 1 / 2 .
T
The work of the encoder to create a codeword can be presented in tabular form, as it is
shown below.
DO
Y
expressed as a state diagram, a tree diagram,, or a trellis diagram
diagram.
A State Diagram shows all possible present states of the encoder as well all the
possible state transitions that may occur. In order to create the state diagram, a state
NO C P
transition table may first be made, showing
showing the next state for each possible combina-
CO Y
tion of the present state and input to the decoder. For example it can draw the table
for the encoder shown in figure 10.
O
OP
Table 4: State Transition Table
PY
Next State if
Current State
Sta
input m 0 input m 1
DO NO T C
00 00 10
10 01 11
01 00 10
11 01 11
Table 5 shows the change in output for each combination of input and previous
output.
Table 5: Output Table
DO NO
The state diagram is created using the information from Table 4 and Table 5,
DO
m = 0;u=00
00
1
S0
=1
m
;u
=0
=1
;u
m
=1
1
m = 1 ;u = 00
10 01
S1 S2
m = 0 ;u= 10
m
01
=1
=
;u
;u
=0
=0
11
1
S3
m = 1;u= 10
23
For each state, there can be two outgoing transitions; one corresponding to a
‘0’ input bit and the other corresponding to a ‘1’ input bit. The values inside the cir-
cles indicate the state (contents of ( K 1) rightmost stages). The values on the arrows
indicate the output of the encoder. A solid line corresponds to input 0, a dotted line –
Y
to input 1. The State Diagram m shows an entire picture the all possible states and their
output code words. The disadvantage of the state diagram is the lack of measurement
of time, i.e. it is not clear what state of the encoder in which time is obtained.
NO C P
A Tree Diagram shows the passage of time. In each cycle coding procedure is
CO Y
described in a passage in the branches from left to right as each branch shows the
codeword. If the input bit is 1, the codeword is found by moving to the next right and
O
below branch, if the input bit is zero - the
the right and above. Any input sequence can be
OP
which forms the corresponding code word. This
traced through a path in this diagram which
PY
path can also be called the code word path. path. For instance, Figure 13 shows a tree dia-
gram of coder, shown in Figure 10.
DO NO T C
00 S 0 00
00 S0 11
11 S 1 10
00 S0 01
10 S 2 11
11 S 1 00
01 S 3 01
00 S0 10
11 S 0 00
DO NO
10 S 2 11
T
00 S 1 10
11 S 1 01
01 S 2 11
01 S 3 00
10 S 3 01
10
0
T
1 00
00 S 0
11 S 0 11
10
11 S 1
DO
10 S 2 01
10 S 2 11
00 S 1 00
01
01 S 3
11 S 1 10
00
11 S 0
01 S 2 11
10
00 S 1
01 S 3 01
01 S 2 11
10 S 3 00
10 S 3 01
10
incr
The disadvantage is the progressive increase in the branches if information
message bits (input) are too much. After the
th first K branches (constraint length) tree
is repeated.
Trellis Encoding Diagram present the sequence of events in linear time in a
compact form. In constructing the chart along the horizontal axis has time clocks and
24
the vertical - all possible states. Figure 14 shows first two clocks of a trellis diagram
for the encoder given in Figure 10.
0;00
S0 S0
1;1
1
Y
ɜɯɨɞ m ; ɢɡɯɨɞ u
m=1
11
S1 S1
0;
m=0
00
1;
NO C P 0;
10
CO Y
1;
S2 S2
01
1
0 ;0
O
1;10
OP
S3 S3
PY
t=n t=n+1
1;
1;
1;
1;
1;
11
11
11
11
11
11
1
1
0;1
1
0;1
0;1
0;1
S1 S1 S1 S1 S1 S1 S1
00
00
00
00
1;
1;
1;
1;
T 0;
0;
0;
0;
0;
10
10
10
10
10
S2 S2 S2 S2 S2 S2 S2
1;0
1; 0
DO
1;0
1;0
01
1;0
01
01
01
0;
1
1
1
1
0;
1
0;
0;
Y
There are two types of decoding algorithms
algorithms used with convolutional encoding:
sequential decoding and Viterbi rbi decoding algorithm. Sequential
Sequential decoding has the ad-
vantage that it can perform very well with long-constraint-length
long-constraint-length convolutional codes,
NO C P
but it has a variable decoding time. The ViterbiViterbi decoding algorithm
algorithm was developed by
CO Y
7
Andrew J. Viterbi in 1967. This algorithm perform performss a maximum likelihood decoding
(maximum likelihood detector). Viterbi decoding has the advantage advantage that it has a fixed
O
decoding time and it has good performance in hardware. Disadvantage is exponential
OP
growth of its computational requirements as a function of the constraint length. In
PY
limited to constraint lengths of K 9 or less.
this reason, it is usually limited
The algorithm includes calculating a di stance between received signal at time
distance
DO NO T C
ti , i 1,2,3,... and all trellis paths entering each state at time ti . The metric of calculat-
ing is the Hamming distance between the received received channel symbol pair and the all
possible channel symbol pairs. The Hamming Hamming distance is computed by counting how
many bits are different between the received received channel symbol pair and the possible
channel symbol pairs (see part 3). The re sults can be zero, one, ... The Hamming dis-
results
tance values is computing at each time inst ant for the paths between the states at the
instant
previous time instant and the states at the current time instant are called branch met-
DO NO
rics. When the encoding process is presented with trellis diagram it shows that the
T
coded output word is formed as a path through through the states of the encoder at any clock
time linear in time. The decoder receives th thee sequence of bits of the codeword and
must determine the path through the states that will determine the decoded sequence
T
of bits. Since it is unknown whether the recei ved sequence without error,
received e the path in
trellis diagram is chosen according to the smallest Hamming distance.
Figure 16 shows how to choice the path in trellis diagram according to the
smallest Hamming distance measured in every every clock time. Suppose the received bits
DO
have an error so instead of 11 10 , one receives 11 11 . The lines start out at S0 00 and
according to two possible outputs (00 and 11) the path can only go through state
S 0 00 or state S1 10 . Suppose at t 1 , it is received 11. The only possible channel
symbol pairs that could have received are 00 and 11. The Hammi Hamming distance between
11 and 11 is zero. The Hamming distance between 11 and 00 is two. The Hamming
distance between the received input and the bbits for the transition is shown in box.
The choice is S0 o S1 because of less Hamming distance. The next iinput has an error.
Possible paths, 10 or 01, are at Hamming distance 1. At t 2 it can going from S3 to
state S3 (Hamming distance is 1) or from S3 to state S 2 (Hamming distance is 1, too), or
from S 2 to state S1 (Hamming distance is 0) and from S 2 to state S0 (Hamming distance
is 2). Thus at t 1 the proper path was not obvious, at t 2 , the choice is clearer. The
choice is a path through the trellis based on the path Hamming distance or path metric,
7
Viterbi A. J., Error Bounds for Convolutional Codes and an Asymptotically Optimum Decoding Algorithm", IEEE
Transactions on Information Theory, Volume IT-13, pages 260-269, April, 1967.
26
which is the sum of the Hamming distances as one steps along a path through the trel-
lis. The path S0 o S1 o S 2 o S1 has a Hamming distances sum equal to 1. The Ham-
ming distances sums of other paths are higher then this one. At t 3 it can going from
S1 to state S3 (Hamming distance is 0) or to S 2 (Hamming distance is 2). Thus, the
Y
choice is going according to minimum Hamming
mming distance in every clock time.
Transmitted
11 10 00 01 01 11 codeword
error
Received
NO C P
11 11 00 01 01 11
sequence
CO Y
0;00 2
S0 S0 S0 S0 S0 S0 S0
1;
11
Hamming
O
0
distance
1 2
OP
0
0;1
S1 S1 S1 S1 S1 S1 S1
PY
0;1
2
0
00
00
1;
1;
0;
0;
10
10
DO NO T C 1
2
1;0
S2 S2 S2 S2 S2 S2 S2
1
0
0
1
1;0
01
01
0;
1
0;
1
1;10 1 1;10 2
S3 S3 S3 S3 S3 S3 S3
Figure 16. To choice the path in trellis diagram according to the smallest Hamming distance
DO NO
T
Figure 17 illustrates how to choice the path in trellis diagram according to the
smallest sum of the Hamming distances
distances that is called path metric.
Transmitted
11 10 00 01 01 11 codeword
error
T
Received
11 11 00 01 01 11 sequence
5
0;00 2 0;00 1 0;00 1 0;00 2
S0 S0 S0 S0 S0 S0 S0
1;
1
11
1;
1;
1;
DO
11
11
11
1
1
0
1 1
2
0
1 1
1
0;1
0;1
S1 S1 S1
1
S1 S1 S1 S1
0;1
3
0;1
1
1
0
2
0
00
1;
00
00
1;
1;
0;
1;
0;
0;
0;
10
10
10
10
1;0
2
1
S2 S2 S2 S2 S2 S2 S2
0
4
0
1
0
1;0
1;0
1;0
10
01
01
01
1
0;
1
1
0;
0;
0;
0
1
Figure 17. The choice the path according to the smallest sum of the Hamming distances
(path metric)
At t 6 , one path has a total distance of 1 from the input data. The others have
a distance of 3, 4 or 5. Thus the most likely path is S 0 , S1 , S 2 , S1 , S3 , S 2 , S0 with a path
27
distance of 1, and the corresponding output decoded word is 101100 . In decoders
where the input is an analog signal, the distance between the actual and expected
voltage may be measured, and the sum of the squares of the errors might be used for
the branch metric.
Y
The minimal path metric is the rule that the Viterbi decoder exploits to recover
the original message. It is the maximum-likelihood path.
NO C P
6.4. Implementation of the Viterbi Decoder
CO Y
A Viterbi decoding algorithm consists of the three major parts, shown in Fig-
ure 18:
O
1. Branch metric calculation – calculation of a distance between the input pair
OP
of bits and the other possible pairs (“00”, “01”, “10”, “11”).
PY
2. Path metric calculation – for every encoder state, calculate a metric for the
minimum metric) ending in this state.
survivor path (a path with the minimum
DO NO T C
3. Traceback (survivor path decoding) – it is necessary for hardware imple-
mentations that don't store full information about the survivor paths, but store only
survivor path is selected from the two.
one bit decision every time when one survivor
Received Branch metric Path metric Traceback Decoded
sequence calculation calculation word
28
- Compare and select – There are two paths, ending in a given state. One of
them (with greater metric) is rejected.
As there are 2 K 1 encoder states, we have 2 K 1 survivor paths at any given time.
The traceback unit (TBU) traces back the trellis after a block of data (deter-
Y
ocessed by the ACS. First, the TBU estab-
mined by the trace back length) has been processed
lishes an optimal path by starting from thee node of minimum metric and traces back
the path in the trellis all the way to the beginning of the trellis diagram. Then, the
NO C P
original data is determined.
CO Y
6.5. Recursive Systematic Convolutional Encoder
O
The recursive systematic convolutional (RSC) encoder is produced from the
OP
nonrecursive nonsystematic (conventional) convolutional encoder by feeding back
PY
one of its encoded outputs to its input. Figure 19a,b shows an example of conven-
recursive systematic convolutional encoder.
tional convolutional encoder and recursive
DO NO T C
MF(X)
F(X)
F(X)
M(X) e e e
M(X) M0(X) e e e
e(n) e(n)
(n-1) (n-2) (n-...) (n-1) (n-2) (n-...)
U(X) U(X)
DO NO
G(X))
G(X G(X)
T
a) b)
convolutional encoder and recursive systematic convo-
Figure 19. Example of conventional convolutional
lutional encoder.
T
These encoders are represented by: M ( X ) is a polynomial of information mes-
sage; U ( X ) is a coded message (word); G ( X ) is a nonrecursive generator polynomial;
DO
29
Advantages of the recursive systematic convolutional encoder (the positive ef-
fect of the feedback) are:
- Reducing the number of states of the encoder,
encoder which increases the efficiency
of decoding algorithm, for example, if thee degree of the nonrecursive generator poly-
nomial G ( X ) is p , the degree of the feedback polynomial F ( X ) is q and q p , af-
Y
ter division the degree of the recursive polynomial
polynomial decreases, which
which reduces the con-
straint length of recursive code; this allows for synthesis of recursive code with a
NO C P
small number of states and simplified decoding algorithm;
CO Y
- Increasing the average distance between output code sequences (increasing
the code Hemming weight), which achieves
achieves better results for error correction.
O
OP
PY
References
DO NO T C
1. Bernard Sklar, Digital Communications: F undamentals and Applications, Second Edi-
Fundamentals
tion, Prentice-Hall, 2001.
2. Berrou C., Glavieux A., Thitimajshima P., NearNear Shannon Limit Error-Correcting Coding
and Decoding: Turbo Codes // Proc. of the Intern. Conf. on Commun (Geneva, Switzerland). May
1993, pp.1064–1070.
3. Berrou C., Glavieux A., Near Optimum ErrorError Correcting Coding and Decoding: Turbo-
Codes, IEEE Trans. On Comm., Vol. 44, No. 10, October 1996.
4. Blahut, R. E., Theory and Practice of Error Control Codes, MA: Addison-Wesley, 1983.
DO NO
30
22. Stewart Robert W., Daniel Garsia-Alis, Concise DSP Tutorial from Digital Communica-
tions: Fundamentals and Applications, Blue Box Multimedia, 2001, http://www.DSPedia.com
23. Viterbi A. J., Convolutional codes and their performance in communication systems,
IEEE Trans. Commun., vol. 10, pp. 751–772, Oct. 1971.
24. Viterbi A. J., Error Bounds for Convolutional Codes and an Asymptotically Optimum
Y
Decoding Algorithm", IEEE Transactions
actions on Information Theory, Volume IT-13, pages 260-269,
April, 1967.
NO C P
CO Y
O
OP
PY
DO NO T C
DO NO
T
T
DO
31
Satellite Communications Systems
Lecture 4.
Y
Multiple Access in Satellite Communications
1. Introduction of Multiple Access in Satellite Communications
2. Frequency Division Multiple Access
NO C P
Access with PCM/TDM/PSK application
2.1. Frequency Division Multiple Access
CO Y
Access with PCM/SCPC/PSK application
2.2. Frequency Division Multiple Access
3. Time Division Multiple Access
O
3.1. Time Division Multiple Access
Access with PCM/TDM/PSK application
OP
PY
3.2. TDMA Frame Efficiency
3.3. TDMA capacity
DO NO T C
3.4. Switching in satellite TDMA
4. Code Division Multiple Access
Sequencee Spread Spectrum
4.1. Direct Sequenc
4.2. Frequency Hopping Spread Spectrum.
on how the multi-user channel is shared by the users, which depends on the multiple
T
access technique or Multiple Access (MA). It is the last technique before signal
transmitting.
Satellite links are designed to provide desired link availability for average
conditions. Satellite Multiple Access
Access techniques interconnect ground stations through
T
multiple satellite transponders. The goal is optimizing some of system parameters
such as power efficiency; spectral efficiency and etc. These techniques are applicable
to both fixed and mobile users. The satellitesatellite transponder mamay have different
DO
1
Ippolito, Louis J., Satellite communications systems engineering : atmospheric effects, satellite link design, and
system Performance, 2008 JohnWiley & Sons Ltd, 396 pp.
1
of multiple multiplexed basebandnd channels modulating multiple RF carriers, with the
multiple carriers per single transponder (d). This case also requires operating in a
power backoff mode to avoid intermodulation on noise. Cases (a) and (c) is called single
carrier per transponder. The final amplifierr can operate in full power, and provide
Y
high power efficiency. When configuration is multiple carriers per transponder (b and
resulting in lower power efficiency in
d) power backoff can be several dB, resulting
comparison with cases (a) and (c).
NO C P
CO Y
BBC carrier
BBC carrier BBC carrier
BBC carrier
ɚ) b)
O
OP
BBC
BBC carrier
PY
BBC
BBC
BBC BBC carrier
BBC carrier BBC
DO NO T C
BBC
BBC
BBC carrier
BBC
c) d)
BB – Baseband channel;
Carrier – Modulated Radio Frequency Carrier;
Trans ponder.
– Satellite Transponder.
2
antennas. It spatially separated
rated physical links by different
differe antenna beams, cells,
sectored antennas, signal polarization, etc. It is employable with any of the three
basic multiple access techniques. s. SDMA is an essential element
el of mobile satellite
networks, which employ multibeam satellites and it can be applied to all other
Y
multiple access schemes.
9 Satellite Switched TDMA (SS/TDMA)(SS/TDMA) - employs sequenced beam
switching to add an additional level of multiple access in a frequency translation
NO C P
CO Y
satellite. The switching is accomplished at radio
radio frequency (RF) or at an intermediate
frequency (IF).
9 Orthogonal frequency division division
O
division multiple access
access (OFDMA) - a
OP
special form of multicarrier modulation, can be used for multiplexing for multiple
PY
users. An OFDMA system is defined as one in which each user occupies a subset of
subcarriers, and each carrier is assigned exclusively
exclusively to only one user at any time.
DO NO T C
Advantages of OFDMA over OFDM-TDMA and OFDM-CDMA include elimination
exploitation of network/multiuser diversity.
of intracell interference and exploitation
band 1 ^
Friquency f1 f2 f3
ES 1
ES 2
t ES 3
DO
Figure 2 shows an example for three earth earth (ground) stations (ES) accessing a
single frequency translation satellite transponder.
transponder. Each station is assigned a specific
frequency band for its uplink ( f1 , f 2 and f 3 ). Frequency guard bands are used to avoid
interference between the user slots. All stations receive total spectrum on downlink.
The receiving station must be able to re receive the full spectrum and can select the
desired carrier for demodulation or detection.
The main advantages of this technique are:
- independent of the channels;
- no framing or synchronization bits needed;
- simplicity;
- transmissions can be analog or di digital, or combinations of both;
- FDMA is most useful for applications where a full time channel is desired –
for example, video distribution;
3
- the least expensive to implement technique.
The main disadvantages are:
- lower power efficiency because of thee multiple carriers in the transponder
final power amplifier requires power backoff koff operation to avoid intermodulation
Y
noise;
conf
- lower flexibility if it is necessary another system configuration (change
frequency plan);
NO C P
CO Y
- when number of users increase system efficiency decrease.
Multiple access system performance must must be analyzed by considered the
O
specific signal processing used in the satellite
satellite communications for both analog and
OP
digital signals.
PY
2.1. Frequency Division Multiple Acce ss with PCM/TDM/PSK application.
Access
DO NO T C
Some of the most common technique techniquess in satellite communications are a
PCM/TDM (pulse code modulation/time division division multiplexed). Its application used
for voice communications. By PSM analog signals are converted into digital and
combined using TDM hierarchy according ITU-R Recommendation. The first level
consists of 30 channels which of them with 64kbit / s , multiplexed to a 2,048Mbit / s
TDM bit rate. The carrier modulation is phase shift keying (BPSK or QPSK).
One of the most important parameter fo forr evaluation is the capacity of the
DO NO
multiple access system. It determines the maximum number of users that can access
T
the basis for decisions on demand access options on the link.
the satellite and serves as the
The capacity for the PCM/TDM/PSK/FDMA digital multiple channel per carrier
(MCPC) system is determined by the following steps 2 .
1) Determine the composite carrier-to-
carrier-to-noise
noise density available on the RF link
T
C N 0 T .
2) Determine the required carrier-to-noise ratio C N t required to support each
carrier at the desired BER
individual MCPC carrier
DO
§ Eb ·
, §¨ ·¸
C Eb Rb C
. ¨¨ ¸¸ Rb WN M i M A , dB , (1)
N N 0 WN © N ¹t © N 0 ¹t
where Rb is a data rate of digital signal, in dB; WN - noise bandwidth of carrier, in dB;
§ ·
C - carrier power; ¨¨ Eb ¸¸ - the ratio, required for the threshold BER; M i - MODEM
© N 0 ¹t
implementation margin, in dB ( | (1 y 3)dB ); M A - Adjacent Channel Interference
margin, in dB | (1 y 2)dB .
The bit rate required to support each channel depends on the specific PCM
baseband formatting: PCM: 64 kbps/voice ch
channel, ADPCM: 32 kbps/voice channel.
The noise bandwidth depends on the carrier modulation
2
Ippolito, Louis J., Satellite communications systems engineering : atmospheric effects, satellite link design, and
system Performance, 2008 JohnWiley & Sons Ltd, 396 pp.
4
for BPSK WN (1,2 * TDM bit rate) 20% ,
TDM bit rate
for QPSK WN (1,2 * ) 20% . (2)
2
Y
The coefficient 1,2 account for diff differences
erences between real and ideal
characteristics of bandpass filterr and the 20% factor is included to account for guard
bands.
NO C P
For example, the first level of hierarchy structure for 64kbit / s PCM voice,
CO Y
TDM bit rate is 2,048Mbit / s , then
BPSK WN (1,2 * 2048) 0,2(1,2 * 2048) 2,949 MHz ,
O
OP
2048 2048
QPSK WN (1,2 * ) 0,2(1,2 * ) 1,474MHz .
PY
2 2
DO NO T C
3) Determine the required carrier-to-noise density for each carrier:
§C · §C·
¨¨ ¸¸ ¨ ¸ WN , dB (3)
© 0 ¹t
N © N ¹t
4) Compare C N 0 t with the total available RF link carrier-to-noise
ratio C N 0 T from 1) to determine the number of carriers, n p , that can be supported:
§C · §C ·
¨¨ ¸¸ ¨¨ ¸¸ 10log (4)
DO NO
10 log n p
© N 0 ¹T © N 0 ¹t
T
From equation (4) it can be determinate the number of carriers, which can be
supported:
§ C · § C ·
¨¨ ¸¸ ¨¨ ¸¸
T
© N 0 ¹T © N0 ¹t
np 10 10
(5)
This result (5) has to round to the next lowest integer. It gives the power
limited capacity of the system.
DO
5
2.2. Frequency Division Multiple
ltiple Access with PCM/SCPC/PSK
PCM/SC application.
PCM/SCPC/PSK is a digital baseband nd single carrier per channel (SCPC)
system used for data and voice applications.. It is not necessity of multiplexing. Each
incoming signal is analog to digital converted,d, and modulated RF carrier by BPSK or
Y
QPSK for transmission over the satellite channel.
channel. A pair of channel
channel frequencies is
used for voice communications, one for each direction of transmission.
One advantage of this SCPC FDMA approach approach is that it can operate as a
NO C P
CO Y
demand assignment access, where the carrier is turned off when not in use. The
system can also use voice activation,
activation, which makes use of the statistics of voice
O
conversations to share the SCPC carrier with multiple users.
OP
It is known, that a typical voice channel
channel conversation is active only about 40%
PY
of the time in any one direction. A voice activation factor (VA) is used to quantify
the improvement possible in the network. For example, a 36MHz 36MHz transponder has a
DO NO T C
bandwidth limited capacity of 800 SCPC channels, using 45 KHz channel spacing:
36.103 / 45 800 . The 800 channels correspond to 400 simultaneous conversations.
PCM/SCPC/PSK/FDMA are similar to the
The capacity calculations for PCM/SCPC/PSK/FDMA
previous section 1.1. Single channel carrier noise
procedure, which is discussed in the previous
bandwidths and data rates performance.
rates are used to determine perform ance. The VA factor, if used,
is applied to increase the power limited capacity, n p , (4)). The bandwidth limited
capacity, nW , (5) is determined from
DO NO
T
wTR
nB , (8)
wC
where wTR is a satellite transponder bandwidth, wC - individual channel bandwidth
T
(including guard bands).
lower value of n p or nW determines the capacity C of the system.
The lower
The representative FDMA wireless cellu cellular standards include Advanced
DO
Mobile Phone System (AMPS) in the United United States, Nordic Mobile Telephones
(NMT) in Europe, and Total Access Communications
Communications System (TACS) in the United
Kingdom . Long Term Evolution 4 (LTE) implements Orthogonal Frequency
3
3
Kiseon Kim, Insoo Koo, CDMA Systems Capacity Engineering. Artech House INC., 2005, 201 pp.
4
3rd Generation Partnership Project Long Term Evolution – standard improving Universal Mobile Telecommunications
System (UMTS)
6
one user is allowed to either transmit or receive the information data in each interval
(slot).
Figure 3 shows a principle of the TDMA process as three ground stations
accessing a single frequency translation satellite
llite transponder. Defined time frames are
Y
formatting all the transmission time. Each frame is divided into time intervals (time
possible access. Equal time intervals in each
slots), which are at least as much as possible
frame are designed for individual stations. Each
Each station can transmit in a specific time
NO C P
CO Y
interval (slot) for its uplink transmission of a burst of data in sequence and each
station has use of the full transponder bandwidth
bandwidth during its time slot. The time slot
O
can be changed on demand. Guard bands are are used between the time slots to avoid
OP
interference.
PY
f frame Time
DO NO T C
slot
fra
m e
ES 3
ES 3
ES 1
ES 2
ES 1
ES 2
ES 1
^
^
^
7
Gard bands
TDMA frame
Y
burst 1 2 n
Service
NO C P
User information
information
CO Y
Frequency
Gard Service
and time Identification
O
band channel
control
OP
Figure 4. Example of the typical time frame.
PY
DO NO T C
Advantages of TDMA:
- TDMA can easily adapt to transmission of data as well as voice
communication; it has an ability to carry 64 kbps to 120 Mbps of data rates and this
allows the operator to do services
services like multimedia and videoconferencing,
videoconferencing, fax, voice;
- TDMA provides no interference from simultaneous transmissions because it
separates users according to time;
extended battery life, since it transmits only
- TDMA provides users with an extended
DO NO
full;
- the user could not receive a dial tone, if all the time slots in the cell in which
the user is currently in are already occupied;
- multipath distortion - to overcome distortion,
distortion, a time limit can be used on the
expired the signal can be ignored.
system, once the time limit is expired
8
is maintained by using the codeword includes
cludes a sequence of 24 to 48 bits. The
codeword is repeated in each frame.
The preamble consists of some components, each with a specific purpose in the
TDMA process. Typical components of the TDMA preamble and reference burst are
Y
summarized in Table 1 for a representative
tive operational system, the INTELSAT
TDMA system, deployed on many early INTELSAT satellites 5 . The INTELSAT
TDMA system consists of two reference bursts per frame and operates with a 2 ms
NO C P
CO Y
frame period.
Table 1. Intelsat TDMA preamble and reference burst structure.
O
Components Description
ption Number
OP
PY
of bits
Preamble
CBR Carrier and synchronizing signal for detector 352
DO NO T C
bit-timing recovery
UW Unique word burst code word 48
TTY Teletype operational data
ta comm
communications
unications between 16
stations
SC Service channel carries netw
network
ork protocol and alarm messages 16
VOW Voice order wire voice communications
communicacations
tions between stations 2*64
(*2)
Reference
Reference Burst
DO NO
Total number of bits in the preamble is 560, the reference burst consists 576
bits.
5
Dennis Roddy, Satellite communications, McGraw-Hill
Mc Professional, 2001, 569 pp.
6
Ippolito, Louis J., Satellite communications systems engineering: atmospheric effects, satellite link design, and system
Performance, JohnWiley & Sons Ltd, 2008, 396 pp.
9
number of bits available for the traffic
KF
total number of bits in the frame
(10)
number of overhead bits
1
Y
total number of bits in the frame
NO C P
CO Y
where t F is the TDMA frame time, in s; s; rT is the total TDMA bit rate, in bps; nr -
number of reference stations; nt - number of traffic bursts; br - number of bits in
O
reference burst; bp - number of bits in the preamble; bg - number of bits in guard band.
OP
PY
The frame efficiency shows how mach of the frame is in used. It will change
when increase the total number of bits (a longer frame time) or lowering the overhead
DO NO T C
in the frame (no traffic bits). The optimum operating structure occurs by providing
the longest possible frame time with the lowest total number bits allocated to
overhead functions, but the longest frame time needs of largest memory buffers,
which increases the overall delay of the signal.
Example 1. How calculate the frame efficiency, if TDMA frame has a frame shows in Table
1 with length 2ms , a total number of bits in the preamble is bp 560bits , in the reference burst -
DO NO
br 576bits , number of bits in guard band - bg 206bits , there are two reference stations, each
T
transmitting a reference burst in the frame nr 2 .
Evaluate the TDMA network in terms of the maximum number of traffic terminals and the
operating TDMA date rate for a desired minimum frame efficiency of K F 0,95 .
From Equation 11 the frame efficiency is
T
n .b n .b (nr nt )bg 2.576 nt .560 (2 nt )206 1564 766nt
KF 1 r r t p 1 1 .
rT .t F rT .0,002 rT .0,002
1) If the TDMA data rate is set at 120 Mbps, the number of terminals that could be
DO
10
channel capacity is defined as ratio of available information bit rate, ri and equivalent
voice channel bit rate, rC
ri
nC (12)
Y
rC
The available information bit rate, ri , represents that part of the total bit rate
NO C P
available for information (the total bit rate minus the bit rate allocated to overhead
CO Y
functions). The equivalent voice ce channel bit rate is usually defined as the standard
PCM bit rate rC 64kbps .
O
Order for determination of TDMA capacity:
OP
carrier-to-noise
1) Determine the composite carrier-to- noise ratio available on the RF link
PY
C N 0 T .
carrier-to-noise ratio required to achieve the threshold BER
2) Determine the carrier-to-noise
DO NO T C
desired for the TDMA network
§C· § Eb ·
¨ ¸ ¨¨ ¸¸ RT WN M i M A , dB , (13)
© N ¹t © 0 ¹t
N
where RT is the TDMA data rate at the desired frame efficiency, K F , in dB; N 0 -
power flux density for a unit bandwidth, in dB; WN - noise bandwidth of carrier, in
§ Eb ·
DO NO
dB; C - power of carrier, in dB; ¨¨ ¸¸ - the ratio, required for the threshold BER; M i
© N 0 ¹t
T
- modem implementation margin (the deviation deviation of modem performance from the
ideal), in dB, | (1 y 3)dB ; M A - adjacent channel interference margin | (1 y 2)dB .
3) Determine the TDMA data rate from
T
§C· §C·
¨ ¸ t¨ ¸ . (14)
© N ¹ t © N ¹T
4) Determine the TDMA capacity from (12)
DO
The frame parameters for the reference bursts, traffic bursts, and guard bands
defined are: t F - the TDMA frame time, in s;s; rT - the total TDMA bit rate, in bps; nr -
number of reference stations; nt - number of traffic bursts; br - number of bits in
reference burst; bT - number of bits in total TDMA frame; bp - number of bits in the
preamble; bg - number of bits in guard band.
Therefore, it can determinate
determinate the follow bit rates:
bT
Total TDMA Bit Rate : rT
tF
bp
Reference Burst Bit Rate : rp
tF
br
Reference Burst Bit Rate : rr
tF
11
bg
Guard Time Bit Rate : rg
tF
The available bit traffic rate is
Y
ri rT nr ( rr rg ) nt ( rp rg ) (15)
Therefore
rT nr (rr rg ) nt (rp rg )
NO C P
ri
nC (16)
CO Y
rC rC
This result provides the number of equivalent
equivalent voice channels that can be
O
supported by the TDMA network for the specified TDMA bit rate, TDMA frame
OP
efficiency, and frame parameters.
PY
DO NO T C
Example 2. To calculate the TDMA capacity in number of equivalent voice channel nC
There is standard PCM bit rate rC 64kbps and first level of digital
with data from Example 1. There
plesiochronous hierarchy structure rC 2048kbps .
First define the following data rates in bps:
bT
Total TDMA Bit Rate : rT 115,22Mbps ;
tF
bp 560
Reference Burst Bit Rate : rp 280kbps ;
t F 0,002
DO NO
T
576
Reference Burst Bit Rate : rr br 288kbps ;
t F 0,002
bg 206
Guard Time Bit Rate : rg 103kbps .
t F 0,002
T
The available bit traffic rate
ri rT nr (rr rg ) nt (rp rg ) 115,22.106 2.(288103).103 13.(280103).103 112,818Mbps
For standard PCM bit rate rC 64kbps the number of equivalent voice channel is:
DO
ri 112,818.106
nC 1762,8; nC 1762 channels .
rC 64.103
For bit rate rC 2048kbps the number of equivalent voice channel is:
ri 112,818.106
nC 55,1; nC 55 channels .
rC 2048.103
This number of equivalent voice channels can be supported to maintain a frame efficiency of
KF 0,95 .
12
intermediate frequency with an nu n switch matrix. Switching is done in
synchronization with the TDMA bursts from the ground stations.
Figure 5 shows example for configuration of a 3u 3 satellite switched TDMA
Y
architecture. The network consists of three regional beams, designa
designated as A, B, and C
beams. The switch matrix mode is shown on the right of the figure, labeled Mode 1,
Mode 2, or Mode 3. The options for switching in this case are nS 6 (showing only
NO C P
three of them). Table 2 shows the number of full versions of switching time for this
CO Y
example.
O
OP 3
PY
DO NO T C
2
1
A1 A2 B1 B2 C1 C2
ɋ ɋ Ⱥ ȼ ɋ Ⱥ ȼ
13
The major TDMA standards contain Globall System Mobile (GSM) in Europe
IS-54/136) in North America 7 . GSM was developed in
and Interim Standard 54/136 (IS-54/136)
on (2G) digital cellular mobile communications in Europe.
1990 for second generation
Systems based on this standard were first deployed in 18 European countries in 1991.
Y
By the end of 1993, it was adopted in nine more European countries, as well as
Australia, Hong Kong, much of Asia, South
South America, and now the United States.
NO C P
CO Y
4. Code Division Multiple Access
The third technique Code Division Multiple Access (CDMA) uses basic
O
ious methods. It is a combination of both frequency and
principles of the two previous
OP
time separation. The station has all the bandwidth as in TDMA all in the time, as in
PY
FDMA.
CDMA, and. The main characteristics
characteristics of the CDMA are:
DO NO T C
- Works with digital formatted data only;
- Offers the highest power and spectral
spectral efficiency operation of the three
fundamental techniques;
- All users use same frequency and may transmit simultaneously;
- Narrowband message signal multiplied by wideband spreading signal, or
codeword;
- Each user has its own pseudo-codeword (orthogonal to others) and receivers
DO NO
^
in coded sequence
band 3 ES 3 ES 1 ES 2
slot
^
fra
m e
band 2 ES 2 ES 3 ES 1
band 1 ^ ES 1 ES 2 ES 3
ES 3
ES 1
t
slot 1 slot 2 slo 3
slot ES 2
downlink receiver must know
code to detect the signal
Figure 6 shows the principle of the Code Division Multiple Access. At each
station is given time interval (time slot) aand bandwidth. The information is sent to the
7
Rappaport, T. S., Wireless Communications, Englewood Cliffs, NJ: Prentice-Hall, 2002.
14
satellite (“uplink”) as a coded
oded sequence as a series. From satellite to terminals
rleaved, how it is shown in Figure 6. The
(“downlink”) information packages are interleaved,
ground station must know the number and frequency of its tim time interval to adopt its
number of information packets. The ground station station separates useful signal from the
Y
noise.
The used code sequence has to meet two two conditions: to prevent unauthorized
access and to be short enough because there can be problems with synchronization or
NO C P
CO Y
delay of the signal. The most appropriate code sequence that that satisfies these conditions
is a pseudorandom sequence of binary symbols. It is a binary binary sequence with a final
O
length in which the position of each bit is random. The autocorrelation of the pseudo-
OP
autocorrelation of white noise. Therefore, this
random sequence is similar to the autocorrelation
PY
sequence is called pseudonoise, PN. What is the difference between random and
pseudorandom signal? A random signal cannot be predicted, its future value can be
DO NO T C
described statistical. A pseudorandom signal is not random at all; it is defined as
deterministic periodic signal that is known to both transmitter and receiver. It must
comply with three conditions:
- Balance property – in each period of the the sequence the number of binary ones
binary zeroes by at most one digit;
differs from the number of binary
sequence consist sequences of a same type
- Run property - the pseudorandom sequence
of binary digits (for example, only ones ones or only zeroes); the appearance of the
DO NO
opposite digit in a sequence starts a new run; run; the length of the run is equal of the
T
number of digits in the run;
- correlation property – if the period of the sequence is compared term by term
with any cyclic shift of itself, the numbe
numberr of agreements has to differ from the
number of disagreements by not more than one count.
T
The PN sequence used in CDMA systems systems is generated usiusing sequential logic
circuits and a n-stage feedback shift regist er. Figure 7 shows an example of a 4-stage
register.
feedback shift register and table of contents in order of a clock, used to generate the
DO
PN sequence. At each clock pulse the binary binary sequences are shifted through the shift
registers one stage to the right. The feedback
feedback logic consists of exclusive-OR gates
generated by a unique algorithm. The output of the stages are logi logically combined and
fed back as input, generating a PN sequence at the final output. Since the last state
1000 corresponds to the initial one, it is obviou
obviously that the register repeats foregoing
sequence after 15 clock times. The output sequence of the example on Figure 7 is
000111101011001, where the left digits are the earliest.
The output sequences can be classified as either maximal length (ML) or non
maximal length (NML). The num number
ber of non-zero states that are possible for this
linear PN sequence generator, called its maximal length will be
p ML 2 n 1 . (17)
The sequence has a maximal length if for an n-stage linear feedback shift
register the sequence repetition period p is (17).
15
Register 1 Register 2 Register 3 Register 4 Output
A Q1 A Q1 A Q1 A Q1 pseudorandom
D Q4 D Q4 D Q4
+ D Q4
sequence
Y
000111101011001
ENB ENB ENB ENB
1 1 0 0 0
2 0 1 0 0
3 0 0 1 0
NO C P
4 0 0 0 1
CO Y
5 1 0 0 1
6 1 1 0 1
7 1 1 1 1
8 1 1 1 0
O
9 0 1 1 1
OP
10 1 0 1 0
PY
11 0 1 0 1
12 1 0 1 1
13 1 1 0 0
14 0 1 1 0
DO NO T C
15 0 0 1 1
16 1 0 0 0
clock
Contents of registers
Figure 7. An example of a 4-stage feedback shift register and table of contents in order of a
clock
It can test the sequence for the randomness properties. First is balance property.
DO NO
ML
where 'k is a difference between the number of agreements and the number of
disagreements when comparing part of the sequence and its shifted copy.
It is obviously, when W 0 (the signal and its ccopy match) autocorrelation
function is one R(W ) 1 . After shifting the copy off less than ML autocorrelation
1
function is R(W ) . A comparison of the signal and its copy shifted by one
ML
register to the right gives the following result:
0 0 0 1 1 1 1 0 1 0 1 1 0 0 1
1 0 0 0 1 1 1 1 0 1 0 1 1 0 0
no yes yes no yes yes yes no no no no yes no yes no
There are seven agreements and eight disagreements. From Equation (18)
16
1 1
R(W ) .(7 8)
15 15
So, the third condition is done. If the copy of the signal is shifted by two or
more register (but not more than 15) is obtained the same result. The synthesis of an
Y
quence generator depends
appropriate structure of pseudorandom sequence depends on the meeting
the conditions for randomness. Not every structure can maximize the length and
satisfy these randomness properties.
NO C P
CO Y
The generated PN sequence of binary symbols is combined with digital's data
to obtain the number of pseudorandom sequence of binary data. Figure 8 shows the
process used to generate thee PN data stream. Two digital
digital signals are entering in the
O
OP
modulator: the input digital data stream m(t ) at a rate rb 1 tb and pseudorandom
PY
sequence of binary symbols pPN (t ) at a chip rate rCH 1 tCH . A PN cycle is called chip
clock.
DO NO T C
PN chip clock
A A xor B
t B
1 bit
period
input output
0 1 0 0 A B A xor B
m(t) 0 0 0
0 1 1
DO NO
1 0 1
1 0 1 1 0 0 1 00
0 11
1 1 0
T
chip
period pPN(t)
1 01 1 0 0 11
s(t)
T
Figure 8. An example of the ge
generation
neration a PN sequence of data
The PN sequence is modulo-2 added to the data sequence m(t) to produce the
DO
data stream
s (t ) m(t ) pPN (t ) . (19)
Figure 8 shows that the PN data stream is at the chip rate rCH 1 tCH , which is
higher than the original data rate rb 1 tb , that is rCH !! rb . In the example shown on
the figure rCH 6rb .
The condition rCH !! rb is very important for the successful implementation of
CDMA. It is the reason that CDMA is often referred to as spread spectrum or spread
origin data sequence is “spread” out over a
spectrum multiple access, because the original
much greater frequency band in the transmission channel.
The chip rate is selected so as to extend the signal over the total available
channel bandwidth. Large spreading ratios are typical, for example, in mobile
satellite voice networks, the original 16 kbps voice data stream may be spread at a
chip rate to produce a PN data stream that operates over an 8MHz RF channel
17
bandwidth. This is a spreading factor of 500, assuming 1 bit/Hz modulation such as
BPSK.
What is Spreading Factor, SF? The ratio of both chip and bit rates indicates
how many times spectrum of producing data stream has extended
ex compared with the
Y
Spreading Factor or a processing gain when
input digital data stream and it is called Spreading
is calculated in dB:
§r ·
NO C P
rCH
SF ; gain BPSK 10 log ¨¨ CH ¸¸ , (20)
CO Y
rb © rb ¹
because for a 1bps / Hz modulation system, such as BPSK, WRF | rch ; chip rate
O
rCH 1 tCH , data rate rb 1 tb , tb n.tch .
OP
PY
For example shown on the figure 8 rCH 6rb ,
rCH 6rb
DO NO T C
SF 6,
rb rb
§r · § 6rb ·
gain BPSK 10 log¨¨ CH ¸¸ 10 log¨¨ r ¸¸ 10 log 6 7,78 dB .
© rb ¹ © b ¹
For example, the standard IS-95, which
which was introduced as a second generation
(2G) wireless cellular communications in 1990 in North America, and later in Japan
and Korea, has a chip rate rch 1,2288 and spreading factor SF 64 .
DO NO
From equation (19) follow spreading the bandwidth needed for transmission of
T
information. Therefore, this access method is often called spread spectrum multiple
access. The spread spectrum is defined as a communication method in which the
signal occupies a bandwidth, greater th than
an the minimum required to transmit
independent of the transmitted information.
information and that spreading code is independent
T
There are three basic types of CDMA:
- Direct Sequence Spread Spectrum, DS-SS - digital data directly recode with
binary symbols (Fig. 8);
pseudo-random sequence of binary
DO
18
sm(t) smp(t)
Data in Phase PN Cod Balanced Phase Data
Mod Mod Demod Demod out
Y
m(t)
pPN(t) pPN(t)
2 E cos(Z 0 t ) PN PN 2 E cos(Z 0 t )
NO C P
CO Y
Figure 9. A structure of the system with direct sequence spread spectrum (DS-SS)
O
The information bitstream is phase modulated
modulated onto a carrier (phase modulator),
OP
then enter in the PN Code Modulator which which phase modulates the RF carrier to
PY
through the satellite channel, the signal is
produce the spread signal. After passing through
‘despread’ with a balanced modulator, then then phase demodulated to produce the
DO NO T C
original data bitstream.
After phase modulation with a carrier in Phase Modulator input data stream
m(t ) with the rate rb 1 tb and bandwidth WRb is as follows:
s m (t ) 2 E cos[Z 0 t \ m (t )], 0 d t d T ,
where \ (t ) is the information bbearing
earing phase modulation.
The PN Code Modulator phase modul modulates
ates the data modulated signal sm (t ) with
DO NO
the PN sequence pPN (t ) with chip rate rCH . The output of the PN modulator is
T
smp (t ) 2 E cos[Z 0 t \ m (t ) \ p (t )] , (21)
Thus, the signal to be transmitted to the receiver over the satellite is spread in
frequency by the PN sequence
sequence to a bandwidth of WR . CH
T
It is known that ideal suppressed carrier
carrier binary phase sh
shift keying (BPSK)
0
phase is taking M 2 discrete values, i.e. it switches to 180 according to a logic “0”
and “1”. Then the expression (21) can be written as a multiplication of the carrier and
DO
19
s*mp(t) s*m(t) m*(t)
sm(t) smp(t)
Data in Phase Phase
m(t) + Mod + Mod
BPF
Y
pPN(t) pPN(t)
2 E cos(Z 0 t ) 2 E cos(Z 0 t )
NO C P
ɚ)) b)
CO Y
Figure 10. An elements of the modulator (a) and demodulator (b) of the direct sequence
spread spectrum system
O
OP
The received spread signal is multiplied by a stored replica of pPN (t ) (Fig.
PY
10,b). The output of the balanced demodulator is then
2
(t ) cos(Z 0 t ) . (24)
DO NO T C
s *mp (t ) 2 E .m (t ). p PN
2
Since the pPN (t ) is a binary signal, therefore, pPN (t ) 1 and
s *m (t ) 2 E .m (t ). cos(Z 0 t ) (25)
or
sm* (t ) 2 E cos[Z 0 t \ *m (t )] , (26)
and the information \ m* (t ) can be recovered through th
thee final phase demodulator.
DO NO
rCH 1 tCH . In Fig. 11c is shown the result of modulo-2 addition of the data sequence
m(t ) and code sequence pPN (t ) . Fig. 11d shows the value of the phase of spread
spectrum signal that is S if the modulo 2 sum of data and code is binary 1; and it is a
zero when the modulo 2 sum of data data and code is binary 0.
The demodulation of a signal begins with dispreading
dispre of the spectrum by
lying the received signal with a synchronized replica of the code \ *p (t ) as the
multiplying
antipodal phase shift.
phase
The carrier pha se is determined as a reresult of modulo-2 addition of d) and e)
1f). Fig. 11g shows the result of rrecovering the data waveform by the use of
(Fig. 11f).
BPSK demodulator.
20
1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0
1
a) m(t)
t
Y
-1
1
1 0 1 1 0 1 0 0 0 1 1 0 0 1 1 1 0 1 0 0 1 1 0 0
b) pPN(t)
t
NO C P
-1
CO Y
0 1 0 0 1 0 1 1 1 0 0 1 0 1 1 1 0 1 0 0 1 1 0 0
c) m(t).pPN(t)
t
O
d) \ m (t ) \ p (t ) 0 S 0 0 S 0 S S S 0 0 S 0 S S S 0 S 0 0 S S 0 0
OP
t
\ *p (t ) S S S 0 S 0 0 0 S S 0 0 S S S 0 S 0 0 S S 0 0
PY
e) 0
t
\ m* (t ) S S S S S S S S S S S S
f) 0 0 0 0 0 0 0 0 0 0 0 0
DO NO T C
t
1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0
1
g)
m*(t)
t
-1
21
Data Carrier Trans Carrier Data
MFSK
Y
in MFSK Receiver Demod
Mod mitter out
fC
sequence
Frequency Frequency Synchronization
NO C P
Syntesizer Syntesizer System
CO Y
pPN(t) pPN(t)
PN
O
PN
OP
Figure 12. The elements of the FH-SS system.
PY
This technique commonly used M-ar M-aryy frequency shift keying MFSK where
DO NO T C
k log 2 M information bits are used to determ
determine
ine which frequency of all M is to be
transmitted. There are two steps of m modulation
odulation - data modulation
modulation and frequency
hopping modulation. The data modulated signal
signal is PN modulated with a PN sequence
of carrier frequencies, f C , generated from the PN sequence pPN (t ) . The frequency-
hopped signal is transmitted th through
rough the satellite channel. Receiver reverses the
signal processing steps. The received signal is frequency hopping demodulated in the
demodulator using a stored replica of the PN sequence. Then the the dehopped signal is
DO NO
demodulated by the data demodulator to develop the input data stream. Commonly in
T
used is noncoherent detector because it is difficultly to keep the
the phase coherence in
the frequency hopping.
Example 3. A hopping bandwidth is 840 MHz and frequency step size is 'f 100 Hz .
T
What is the minimum number of PN chips
chips required for each frequency word?
WRF 840.106
The number of frequency are M 84.105 ;
'f 100
DO
22
References
1. Bernard Sklar, Digital Communications: Fundamentals and Applications,
Second Edition, Prentice-Hall, 2001.
Y
2. Broadcom Corporation and Cisco Systems,
Systems, Digital Transmission: Carrier-
to-Noise Ratio, Signal-to-Noise Ratio, and Modulation Error Ratio.
http://www.broadcom.com/docs/general/Broadcom-Cisco_CNR-SNR-MER.pdf
docs/general/Broadcom-Cisco_CNR-SNR-MER.pdf
NO C P
CO Y
3. Gilhousen, K. S., et al.,., On the Capacity of a Cellular CDMA System, IEEE
Trans. On Vehicular Technology,, 1991, pp. 303–312.
O
4. Dennis Roddy, Satellite communications,
communications, McGraw-Hill Professional, 2001,
OP
pp.569.
PY
5. Intuitive Guide to Principles of Communications,
Communications, CDMA: The Concept of
signal spreading and its uses in communications, www.complextoreal.com
DO NO T C
communications systems engineering:
6. Ippolito, Louis J., Satellite communications
atmospheric effects, satellite link design, and system Performance, JohnWiley &
Sons Ltd, 2008, pp.396.
7. Kiseon Kim, Insoo Koo, CDMA Systems Systems Capacity Engineering. Artech
House INC., 2005, pp.201.
8. Kim, K. I., Handbook of CDMA System Design, Engineering and
Optimization, Englewood Cliffs, NJ: Prentice Hall, 2000.
DO NO
9. Koo, I., et al, Sensitivity Analysis for Capacity Increase on the DS-CDMA
T
System, Proc.of JCCI
JCCI,, 1997, pp. 447–451.
10.Pickholtz
10. Pickholtz R. L., Schilling D. L., Milstein L. B., Theory of Spread Spectrum
Transaction on Communications, Vol. com-30,
Communications: A Tutorial. IEEE Transaction
No. 5, May 1982.
T
Milstein L. B., Revisions to Theory of
11. Pickholtz R. L., Schilling D. L., Milstein
Spread Spectrum Communications: A Tutorial. IEEE Transaction on
Communications, Vol. com-32, No. 2, February 1984.
DO
12.Zhili
12. Zhili Sun, Satellite networking principles and protocols, John Wiley & Sons,
2005. pp. 342.
23
bits/symbol) is used, with a total frame length of 120832 symbols. The preamble in each traffic
rol and delay channel is 8 symbols,
burst is 280 symbols long, the control symbol and the guard band interval
is 103 symbols. Calculate the frame efficiency for a frame consisting of 14 traffic bursts per frame.
7. Determine the voice-channel capacity forr the TDMA frame of problem 6.The voice
Y
channel is the standard PCM format (64 kbps) with ith QPSK modulation. Th The frame period is 2 ms.
Assume a speech activity factor of 1.
8. Describe randomness properties that make
make pseudorandom sequence to be random.
§ · § ·
NO C P
9. What is the average BER for the network with an ¨¨ Eb ¸¸ 3dB and ¨¨ Eb ¸¸ 30dB if the PN
CO Y
© N0 ¹ © N0 ¹
spectrum network operates at 512 chips per symbol
sequence for a BPSK direct sequence spread spectrum
O
period? The network consists of 150 users with
with equal received power at the demodulator.
OP
PY
DO NO T C
DO NO
T
T
DO
24
Problems
Y
2. Why Geostationary Earth Orbit (GEO) is called Geosynchronous?
3. Find the rang, azimuth angle and elevation
elevation angle if the earth station is
located at: (a) Coventry, England; (b) (b) Riga, Latvija; (c) Istambul, Turkey.
NO C P
CO Y
0
Satellite Longitude is 19.2 E.
4. Which type of satellite orbit provides the best performance for each of
O
the following characteristics: (a) Minimum
Minimum latency (time delay) for voice and
OP
overage of high latitude locations;
data networks; (b) Best coverage locations; (c) Minimum free
PY
space path loss; (d) Ground terminals with minimum antenna tracking required.
5. The frequencies used for satellite communications are accommodated
DO NO T C
between…?
6. Why communications satellites also employ polarization frequency
reuse?
7. What is a satellite comm unications link budget?
communications
8. A signal has power 20W, his bit rate is 600bps. What is the bit energy
in decibels?
9. Describe the relation between C N , C N 0 and Eb N 0 .
DO NO
power is 15 watts, the antenna efficiency is 55% for both antennas. The satellite
is in a GSO location, with a range of d 37500km . The frequency of operation is
6 GHz.
14. A receiver with a low noise amplifier with a gain of GRF 23dB and
noise temperature of t RF 50 K ; a downconverter with a gain of GM 10dB and
noise temperature of t M 500 K , an intermediate frequency unit: t IF 1000 K ,
GIF 30dB .What is the receiver system noise temperature.
15. Calculate Receiver G/T (dB/K) of a satellite having antenna gain 45 ,
over all receiver noise temperature t S 70 K .
16. A fixed service satellite uplink operating
opera at 14 GHz consists of a 3m
antenna diameter ground terminal with a 1kW transmitter. The receiver on the
GSO satellite has a 2m antenna
antenna and a receive system noise temperature of 500 K.
The free space path loss for the link is 2202,5 dB. Assume an efficiency of 55%
for both antennas. What is the carrier-to-noise density for the uplink under clear
sky conditions with a gaseous attenuation loss of 2,5 dB on the link?
17. There is a satellite with a range d 37500km ; transmitted power
pT 2W ; antenna gain gT 22 dB ; channel system noise temperature t S 160 K
Y
and bandwidth bN 500MHz of the satellite channel; Frequency = 12GHz. What
are: (a) Power Flux Density to the received ed terminal; (b) Received power to the
NO C P
received terminal with antenna tenna effective aperture Aeff 10m 2 ; (c) Received
CO Y
antenna gain g R ; (d) Received ratio c n .
18. A satellite network operatesoperates with a frequency translation transponder
O
and provides a 64 kbps BFSK data link. The requirement for the link BER is
OP
PY
5.105 . (a) What is the required composite Eb N 0 for the link? (b) The downlink
C N 0 for the link is 60 dBHz. What uplink C N 0 would be required to maintain
DO NO T C
the BER requirement?
19. What are the main differences, advantages and disadvantages
between: (a) FDMA and TDMA; TDMA; (b) TDMA and CDMA?
20. A communications satellite transponder with a 42MHz usable
bandwidth operates with with multiple FDMA carriers. Each FDMA carrier requires
a bandwidth of 7,5MHz and an EIRP of 16 dBw. The total available EIRP for
the link is 24 dBw. Determine the maximum maximum number of carriers that can access
DO NO
the wireless link if assume 10% guard bands and neglect implementation
T
margins.
21. A direct-sequence spread spectrum CDMA satellite network operates
with 8 kbps voice channels. The interfering interfering noise density on the network is
measured as 6 dB above the thermal noise level. Determine the processing gain
T
for a 6MHz spread spectrum bandwidth.
22. A hopping bandwidth is 820 MHz MHz and frequency step size is
'
'ff 50 Hz . What is the minimum number of PN chips required for each
DO
frequency word?
23. The Hamming distance between sequences A 00101101 and
B 10110101 is …?.…? The Hamming weight of a sequence A 00101101 is…?
24. What is the symbol error correctingcorrecting capabilities of a RS(7,3) code.
Now many bits are there per symbol?
25. What is the codeword polynomial of a message that consist three
symbols 010 110 111 and has to be coded by RS(7,3) code with the generator
polynomial g ( X ) D 3 D 1 X D 0 X 2 D 3 X 3 X 4 ?
26. Use the generator polynomial for the th RS(7,3) code to encode the
massage 10110101 .
27. Convolutional codes are commonly characterized by parameters…?
28. Draw the trellis diagram for the K=3, code rate r 1 / 3 code generated
by g1 ( x) 1 x x 2 , g 2 ( x) 1 x 2 and g3 ( x) x x 2 .
29. Describe the generator polynomials of the coder in Figure P1(a) and
(b).
30. What is the output coded message generated by enc
encoders, shown in
Figure P1 (a) and (b)?
Y
m(t) output u1
Multiplexer u
m input output u1
m(t) S1 D
NO C P
information bit
m(n) m(n-1) m(n-2) S2 output u2 u
CO Y
stream
Shift register m(n) m(n-1) m(n-2)
C ENB
synchronization output u3
synchronization
output u2
O
OP
a) b)
PY
Figure P1. Coders of convolutional code
DO NO T C
31. What is a trellis diagram for the encoder given in Figure P1(b) and
input message m 101100 .
32. Choice the path in trellis diagram for the output coded message
generated by encoder, shown
shown in Figure P1(b).
33. What are the main differences, advantages
advantages and disadvantages between
recursive and nonrecursive systematic
systematic convolutional
convolutional encoder.
DO NO
T
T