Access Technique

Download as pdf or txt
Download as pdf or txt
You are on page 1of 104

Y

Lectures

NO C P
on

CO Y
O
Satellite Communications

OP
PY
Systems
DO NO T C
Assoc. Professor PhD Stefan Zhelev
Shumen University
Faculty of Technical Sciences
DO NO
T
Com
man
d satellitte
Uplin
satellitte k
T
Tele
metr
Dow y
transport nlilink
Tracking,
Telemetry,
DO

Command &
Monitoring

wire wire
fiber fiber
cable cable
users
video receiving
transmitting voice data
da graund
graund station
station

PR EIRP  GR  LFS , dB
Y
NO C P
CO Y
O
OP
PY
DO NO T C
DO NO
T
T
DO

ISBN 978-954-577-637-3
ɟɥɟɤɬɪɨɧɧɨ ɢɡɞɚɧɢɟ
© ɋɬɟɮɚɧ ɀɟɥɟɜ – ɚɜɬɨɪ
© ɒɭɦɟɧɫɤɢ ɭɧɢɜɟɪɫɢɬɟɬ “ȿɩɢɫɤɨɩ
ȿɩɢɫɤɨɩ Ʉɨɧɫɬɚɧɬɢɧ ɉɪɟɫɥɚɜɫɤɢ”
ɒɭɦɟɧ, 2012
Contents

Lecture 1. Introduction to Satellite Communications

Y
1. A little History of Satellite Communications
2. Satellite Communications Segments
3. Satellite Orbits

NO C P
4. Frequency Band

CO Y
4.1. Regulatory Process
4.2. The electromagnetictic frequency spectrum

O
5. Signal processing elements in satellite communications

OP
PY
Lecture 2. A Link Budget Calculation and Analysis
1. The quality of signal transmission
DO NO T C
2. Elements of the link
2.1. Effective Isotropic Radiated Power
2.2. Power flux density
2.3. Antenna Gain
2.4 Free-Space Path Loss
2.5. System Noise
2.6. Link Performance Parameters
DO NO

3. Link Budget
T
3.1. Frequency Translation Satellite
3.2. The on-board processing satellite

Correcting in Satellite Communications


Lecture 3. Forward Error Correcting
T
1. The necessity of channel coding
2. Types of error control
3. Concept of Hamming Weight and Hamming Distance
DO

4. Reed Solomon code


4.1. Reed Solomon coding
4.2. Reed Solomon decoding
5. Interleaving
6. Convolution code
6.1. Coder and coding.
6.2. State representation and state diagram
6.3. The Viterbi Decoding Algorithm
6.4. Implementation of the Viterbi Decoder
6.5. Recursive Systematic Convolutional Encoder

Lecture 4. Multiple Access in Satellite Communications


1. Introduction of Multiple Access in Satellite Communications
2. Frequency Division Multiple Access
2.1. Frequency Division Multiple Access with PCM/TDM/PSK application
2.2. Frequency Division Multiple Access
ss with PCM/SCPC/PSK application
3. Time Division Multiple Access
ss with PCM/TDM/PSK application
3.1. Time Division Multiple Access
3.2. TDMA Frame Efficiency

Y
3.3. TDMA capacity
3.4. Switching in satellite TDMA
4. Code Division Multiple Access

NO C P
CO Y
4.1. Direct Sequencee Spread Spectrum
4.2. Frequency Hopping Spread Spectrum.

O
OP
Problems

PY
DO NO T C
DO NO
T
T
DO
Satellite Communications Systems
Lecture 1.
Introduction to Satellite Communications

Y
1. A little History of Satellite Communications
2. Satellite Communications
ations Segments
3. Satellite Orbits

NO C P
4. Frequency Band

CO Y
4.1. Regulatory Process
tic frequency spectrum
4.2. The electromagnetic

O
5. Signal processing elements in satellite communications

OP
PY
1. A little History of Satellite Communications
DO NO T C
The unique feature of communications by satellites is there ability to provide
distance insensitive point to multipoint communications.
communications. These links can be between
fixed terminals, mobile terminals
terminals and both fixed and mobile terminals on lend, on the
air, and at sea as it is shown in Figure 1.

C om
mand
DO NO

Uplin satellitte
satellitte k
T
Tele
metr
D ow y
transport
ort nlink
Tracking,
Telemetry,
Command &
T
Monitoring

wire wire
fiber fiber
cable cable
DO

users
user
u
video
eo receiving
transmitting voice
ce data graund
graund station
station
Figure 1. The idea of a communications
communications satellite network

number of features that are not readily


Communications by satellites offers a numb
available with alternative modes of transmission,
transmission, such as terrestrial microwave, cable,
or fiber networks.
Some of the advantages of satellite communications are:
Networks. The typical communications satellite can see large
Diverse User Networks.
areas of the earth, and link together ma
many users simultaneously. Satellites are particu-
larly useful for accessing remote areas or communities not otherwise accessible by
terrestrial means.
High Capacity.. Satellite communications links operate with high carrier fre-
quencies, with large information bandwidths. Capacities of typical communications

1
satellites are very high (above 100Mbps ), and can provide services for several hundred
video channels or several tens of thousands of voice or data links.
Low Error Rates.. Bit Error Rate (BER) is a measmeasure of quality. Bit errors on
a digital satellite link tend to be random, allowing statistical detection and error cor-

Y
rection techniques to be used. Error rates can be routinely achieved efficiently and
reliably with standard equipment.
Distance Independent Costs.. The cost of satellite transmission is independent

NO C P
itting and receiving earth stations.
of the distance between the transmitting

CO Y
Fixed Broadcast Costs.. The cost of satellite broadcast transmission, that is,
transmission from one transmit ground terminal to a number of receiving ground ter-

O
minals, is independent of the number of ground terminals receiving the transmission.

OP
PY
A little History of Satellite Communications
The first idea of communications by satellite was given by Arthur C. Clarke in
DO NO T C
terrestrial Relays”, 1945 1 .
his classic paper “Extraterrestrial
Satellite communications began in October
October 1957 with the launch by the former
called
USSR a small satellite calle d Sputnik 1 (4.10.1957), then
then 3.11.1957 was launched
Sputnik 2 with Laika.
The first communications by artificial satellite was accomplished by
SCORE (Signal Communicating by Orbiting Relay Equipment), launched by the Air
Force, USA into a low (160 by 1280 km) or orbit
bit in December 1958. SCORE relayed a
DO NO

recorded voice message, from one earth station


station to another. SCORE
SCORE broadcast a mes-
T
sage from President Eisenhower to stations
stations around the world. The maximum message
length was four minutes, and the relay operated on a 150MHz uplink and 108MHz
downlink. SCORE, powered by battery only, operated for 12 days before its battery
failed, and decayed out of orbit 22 days later 2 .
T
1960’s – First satellite communications:
x 1960 First passive communication satellite
satellite (Large balloons, ECHO satel-
DO

lites 1 and 2, launched by the National Aeronautics and Space Administration


(NASA) in August 1960 and Ja nuary 1964, respectively).
January
x 1962: First active communication satellite
satellite (The TELSTAR Satellites 1 and
2, launched into low orbits by NASA for AT&T/Bell Telephone La Laboratories in July
1962 and May 1963, were the first active wideband communications satellites
satellites).
x 1963,1964: First satellite into geostationary
geostati (GEO) orbit (Syncom 1 failed,
SYNCOM 2 and 3 were placed in orbit in July 1963 and July 1964, Syncom, with
frequencie employed two 500 KHz channels for
7,4GHz uplink and 1,8GHz downlink frequencies,
two-way narrowband communications, and one 5MHz channel for one-way wideband
transmission).
x 1964: International Telecomm. Satellite Organization (INTELSAT) created.
x 1965 First successful communications GEO GE (Early Bird / INTELSAT 1).

1
A.C. Clarke, ‘Extraterrestrial Relays,’Wireless World, Vol. 51, pp. 305 308, October 1945.
2
M.I. Davis and G.N. Krassner, ‘SCORE First Communications Satellite,’ Journal of American Rocket Society,
Vol. 4, May 1959.

2
1970’s – GEO Applications Development, DBS:
x 1972 First domestic satellite system operational
operational (ANIKA launched in No-
vember 1972 by NASA for Telsat Canada, was the first domestic commercial com-
munications satellite.. Two later ANIKAs were launched
launche in April 1973 and May 1975.

Y
mpany, operated at C-band and had 12
The satellites, built by HughesAircraft Company,
transponders, each 36MHz wide).
x 1975 First successful direct broadcast experiment (USA-India).

NO C P
x 1977 A plan for direct broadcast sattellites (DBS) assigned by the ITU

CO Y
x 1979 International Mobile Satellite Organization
Organization (Inmarsat) established.
1980’s – GEO Applications Expanded, Mobile:

O
x 1981 First reusable launch vehicle flight.

OP
x 1982 International maritime communications
communications made operational.

PY
x 1984 First direct-to-home broadcast
broadcast system operational (Japan).
x 1987 Successful trials of land-mobile
DO NO T C
land-mobile communications (Inmarsat).
x 1987 TVSAT: First DBS-satellite (Direct
(Direct Broadcast Satellite, Television-
broadcasts directly to home)
x 1989-90 Global mobile communication service
service extended to land mobile and
aeronautical use (Inmarsat)
1990+’s NGSO applications development and GEO expansion
x 1990-95:
DO NO

- Proposals of non-geostationary (NGSO) systems for mobile communications.


T
- Continuing growth of VSATs (Very Small Aperture Terminal) around the
world.
- Spectrum allocation for non-GEO systems.
- Continuing growth of DBS. DirectTV created.
T
x 1997:
for hand-held terminals (Iridium).
- Launch of first batch of LEO for
paging-service pocket size mobile terminals
- Voice-service portables and paging-service
DO

launched (Inmarsat).
x 1998-2000: Mobile LEO systems initiate service and fail afterwards (Irid-
ium, Globalstar).

Communications Segments
2. Satellite Communications
The satellite communications have two areas or segments: the space segment
and the ground (or earth) segment.
earth segment.
The space segment includes the satellite (or satellites) in orbit in the system,
provides the operational control of the satellite(s) in orbit.
and the ground station that provides
The ground station is variously
variously referred to as the Tracking, Telemetry, Command
(TT&C) or the Tracking, Telemetry, Command and Monitoring (TTC&M) station.
Two elements of the space segment of a communications satellite system are shown
on Figure 2 - the satellite and TTC&M station.
A communications satellite is an orbiting artificial earth satellite. It receives a
communications signal from a transmitting ground station, amplifies or processes it,
and transmits it back to the ground stations for reception.

3
The TTC&M station provides essential spacecraft management and control
functions to keep the satellite operating safely in orbit. The TTC&M links between
the spacecraft and the ground are usually separate from the user communications
links and links may operate in the same frequency bands or in other bands. The space

Y
segment equipment carried aboard thee satellite has two subsystems: the bus and the
payload.

NO C P
Co
mm

CO Y
Up and
link
Te
le
Do metr
wn y

O
link

OP
PY
Graund Station
Tracking,
DO NO T C
Telemetry,
Command &
Monitoring

Figure 2. The space segment for a communications satellite network

The bus has the subsystems that support the satellite: the physical structure,
power subsystem, attitude and orbital cont rol subsystem, thermal control subsystem,
control
and command and telemetry subsystem.
The payload on a satellite is the equipmen
equipmentt that provides the services, and con-
DO NO

sists of the communications equipment that that provides the relay link between the up-
T
and downlinks from the ground. That equipment is called the transponder
transponder. The an-
tennas on the satellite and the transponder receives the the uplink signal, amplifies (or
processes the signal), and then reformats and transmits the signal back to the ground
T
received station.
That portion of the link from the earth station to the satesatellite is called the up-
link,, and another - from the satellite
link satellite to the ground is called the downlink.
DO

The ground segment terminals consist of three basic types:


- fixed (in-place) terminals;
- transportable terminals;
- mobile terminals.
The TTC&M ground station are not included in the ground segment.
Fixed terminals may be providing different
differen types of services, but they are de-
signed to access the satellite while fixed in in-place on the ground. Small terminals used
in private networks (VSATs) are examples of fixed terminals, or terminals mounted
on residence buildings used to receive broadcast satellite signals.
Transportable terminals are designed to be movable. Examples of the trans-
portable terminal are satellite news gatheri
gathering (SGN) trucks, which move to locations,
stop in place, and then deploy an ante
antenna to establish links to the satellite.
Mobile terminals are designed to communicate
commun with the satellite while in mo-
tion. They are further defined as land mob mobile, aeronautical mobile, or maritime mo-
bile, depending on their locations.

4
3. Satellite Orbits
mmonly used orbits in satellite communications.
There are four most commonly
Geostationary (Geosynchronous) Earth Orbit (GEO)
The satellite remains fixed (or approximately
imately fixed) over one point on the

Y
equator. The parameters for the evaluation of the GEO link are:
Range (distance) from the earth station
ation (ES) to the satellite, in km
Geostationary Radius: rS 42164,17km ;

NO C P
Geostationary Height (Altitude): hGSO rs  re 35786,43km ;

CO Y
Equatorial Radius: re 6378,14km ;
Advantages of Geostationary Earth Orbit:

O
- The period of revolution for the geostati onary orbit is 23 h 56 min 4,091 s, so
geostationary

OP
PY
the visibility of the satellite is 24 h;
h
- A satellite in GSO sees about one-third of the earth’s surface, so three GEO
DO NO T C
satellites, placed 1200 apart in the equatorial plane, could provide global coverage;
- An antennas on the ground, once aimed at the satellite, need not continue to
rotate.
Disadvantages of the GEO are:
- the gravity of the sun and moon disturb the orbit;
capacity and satellites using the same frequen-
- the geostationary orbit’s finite capacity
cies must be separated to prevent mutual interference;
- providing coverage of high latitudes (above 800 ) is generally not possible, so
DO NO

the polar aeries cannot be achieved with a geostationary constellation.


constellation.
T
Low Earth Orbit (LEO)
LEO satellites move faster than the rota rotation
tion of earth. The typically altitudes are
T
from 160 to 2500 km. The satellite is not at a fixed location in the sky and the visibil-
ity of the satellite is 5 y 15 min , so it needed many satellites to see the earth’s surface.
Some current LEO satellite networks operate with 12, 24, or 66 satellites to achieve
DO

the desired coverage.


Applications of LEO satellites are: Communications; Military surveillance;
Weather; Atmospheric studies; Earth observation.

Medium Earth Orbit (MEO)


Satellites at Medium Earth Orbit (MEO) operate in the range between LEO and
GSO, typically at altitudes of 10 000 to 15 000 km.
meteorological remote sensing and position location
Applications: used for meteorological,
applications (GPS).

High Elliptic Earth Orbit (HEO)


Satellites operating in high elliptical (high eccentricity) orbits (HEO) are used
to provide coverage to high latitude areas not reachable by GSO, and those that re-
sa
quire longer contact periods than available with LEO satellites. Russian use of Mol-
nya and Tundra elliptical orbits for satellite television to the high northern latitude

5
Russian states is well known. These orbits have a perigee altitude of about 1000 km,
and an apogee altitude of nearly 40 000 km.
Satellite orbits that are not synchronous, such as the LEO, MEO, or HEO, are
often referred to as non-geosynchronous
ronous orbit (NGSO) satellites.

Y
Orbital parameters are:
- Apogee – the point farthest from earth;
- Perigee – the point of closest approach to earth;

NO C P
- Line of Apsides – the line joining the perigee and apogee through the center

CO Y
of the earth;
- Ascending Node – the point where the orbit cro sses the equatorial plane, go-
crosses

O
ing from south to north;

OP
- Descending Node – the point where the orbit crosses
crosses the equatorial plane, go-

PY
ing from north to south;
- Line of Nodes – the line joining the ascending and descending nodes through
DO NO T C
the center of the earth;
- Argument of Perigee – the angle from ascending node to perigee, measured in
the orbital plane;
- Right Ascension of the Ascending Node,Node, – the angle measured eastward, in
the equatorial plane, from the line to the first point of Aries (Y) to the ascending node.
Table 1. The characteristics of satellite orbits
LEO ɆȿɈ GEO ɇȿɈ
DO NO

Altitude, km 500÷3 000 10 000÷14 000 35 786 500÷50 000


T
23 h 56 min. 4,091s
Period, h 1÷3 6÷8 3÷24
one sidereal day
Delay, ms 6÷30 70÷120 240÷280 50÷320
Visibility 5÷15 min. some hours 24 h 2÷12 h
T
Tracking, Telemetry,
complexity less complexity simply complexity
Command & Monitoring
Outlay for launch a satel-
low high high high
lite into orbit
Numbers of satellites to
DO

66 <24 3
cover the earth
- telephony;
- Communications;
- Broadcasting;
- Military surveillance;
- Point to multi-point
Applications - Weather; GPS
communications;
- Atmospheric studies;
- Mobile services;
- Earth observation.
- Weather observation.

The parameters for the evaluation of the GEO link are:


- Range (d-distance) from the earth station (ES) to the satellite, in km;
- Azimuth angle ( 4 ) from the ES to the satellite, in degrees. The azimuth angle
is the angle measured in the horizontal plan
plane of the location between the direction of
geographic north and the intersection of the plane containing the point considered, the
satellite and the centre of the earth.
- Elevation angle ( M ) from the ES to the satellite, in degrees. The elevation an-
gle is the angle between the horizon at the point considered and the satellite, meas-

6
ured in the plane containing the point considered, the satellite and the centre of the
earth.
Additional parameters are:
Equatorial Radius: re 6378,14km ; Eccentricity of the earth: ee 0,08182 ; Differ-

Y
ential longitude, B le  ls - the difference between the earth ear station and satellite longi-
tudes; le earth station longitude, in degrees; ls satellite longitude, in degrees; LE earth
station latitude, in degrees; LS satellite latitude, in degrees; H earth station altitude

NO C P
CO Y
above sea level, in km.
Longitudes east of the Greenwich eenwich Meridian and latit
latitudes
udes north of the Equator
are positive; longitudes west of the Greenwich Greenwich Meridian and latitudes south of the

O
OP
Equator are negative.

PY
The distance between earth station and satellite can be calculated as 3 :
R 2  rs  2 R.rs . cos\ E . cos B , km
2
d ((1)
DO NO T C
§ ·
where R l2  z2 ; l ¨ re
 H ¸. cos( LE ) ;
¨ 1  e 2 . sin 2 ( L ) ¸
© e E ¹
§ re (1  ee2 ) · §z·
z ¨  H ¸. sin( LE ) ; \E tg 1 ¨ ¸ .
¨ 1  e 2 sin 2 ( L ) ¸ ©l¹
© e E ¹
Elevation angle to the satellite:
§r h
DO NO

·
M cos 1 ¨ e 1
1  cos 2 ( B). cos 2 ( LE ) ¸ . (2)
T
© d ¹
Azimuth angle to the satellite:
The azimuth angle is determined from the intermediate angle A from one of
four possible conditions, based on the relativ
relativee location of the earth station and the
T
subsatellite point on the earth’s surface. The
The condition is determined
determin by standing at
the direction of the subsatellite point (SS) 4 (Fig-
the earth station (ES) and looking in the
ure 3).
DO

§ sin( B ) ·
$ sin 1 ¨¨ ¸,
¸ (3)
© sin E ¹
where E cos 1 >cos( B). cos( LE )@ , B le  l s .
N N N N

4 4
ES ES
SS SS SS SS

4 4
ES ES
a) b) c) d)

Figure 3. Determination of azi


azimuth angle to the satellite

3
Ippolito, Louis J., Satellite communications systems engineering: atmospheric effects, satellite link design, and system
Performance, 2008 JohnWiley & Sons Ltd.
4
Ippolito, Louis J., Satellite communications systems engineering: atmospheric effects, satellite link design, and system
Performance, 2008 JohnWiley & Sons Ltd.

7
The resulting equation to determine the azimuth angle 4 for each of the four
conditions is given in Table 2.

Table 2. Determination of azimuth angle from intermediate angle A


Condition SS point of ES 4 Figure

Y
rtheast $
northeast 1ɚ
northwest 3600  $ 1b
southeast 1800  $ 1c

NO C P
southwest 1800  $

CO Y
1d

More then four possible conditions,


conditions, there are two additional cases:

O
OP
- If the earth station is located at the same longitude as the subsatellite point,

PY
the azimuth angle will be 1800 if the earth station is in the northern hemisphere and 0ƕ
if the earth station is in the southern hemisphere.
DO NO T C
- If the earth station is located on th 90ƕ if
thee equator, the azimuth angle will be 90ƕ
0
the earth station is west of the subsatellite point and 270 if the earth station is east of
the subsatellite point.

Example 1. The earth station is locate located d at Coventry, England.


Latitude: LE =52°25'=52.42 , N=+52.42; Longitude: 010 28'W 1.47W , le 1.47 ;
0

Altitude: H=0km.
Satellite: Longitude: 19.20 E, lS 19,2 .
DO NO

azimuth angle ( 4 ) and elevation angle ( M ).


T
Find the rang, azimuth
1) Determine the differential longitude
B le  ls 1.47  19.2 20,67 ;
2) Determine the earth radius at the earth station, R, for the calculation of the range
T
§ · § ·
l ¨ re ¸
 H . cos(LE ) ¨ 6378,14
 0 ¸. cos(52,42) 3897,8km
¨ 1  e .sin ( L ) ¸ ¨ ¸
© 1  0,08182 .sin (52,42)
2 2 2 2
© e E ¹ ¹
DO

§ re (1  ee2 ) · § 6378,14.0,9933 ·
z ¨  H ¸. sin( LE ) ¨  0 ¸.0,7925 5030,87 km
¨ 1  e 2 . sin 2 ( L ) ¸ © 0,998 ¹
© e E ¹
§z·
\ E tg 1 ¨ ¸ 52,230 ; R l 2  z 2 6364,15 km
© ¹l
3) Determine the range
R 2  rs  2 R.rs . cos\ E ..cos
2
d cos B
6367,84 2  42164,17 2  2.6367,84. 42164,17. 0,6125. 0,9356 38866,9km
4) Determine the elevation angle
§r h ·
M cos 1 ¨ e 1  cos 2 ( B). cos 2 ( LE ) ¸ 27,010
© d ¹
5) Determine the azimuth angle
E cos 1 >cos( B). cos( LE )@ cos 1 (0,9356.0,6099) 55,210
§ sin( B ) · § 0,353 ·
$ sin 1 ¨¨ ¸¸ sin 1 ¨ ¸ 25,47 0
© sin E ¹ © 0,821 ¹

8
Since the subsatellite point SS is southeast of the earth station ES according Table 2:
4 1800  A 154,530 .

4. Frequency Band

Y
4.1. Regulatory Process
The satellite communications system parameters
parameters that are under the regulatory
include:

NO C P
- choice of radiating frequency;

CO Y
- maximum allowable radiated power;
- orbit locations (slots) for GSO.

O
The allocation and regulation of thethe frequency spectrum is colled spectrum (or

OP
frequency) management.

PY
The Europe countries have active organizations
organizations involved with spectrum man-
development of satellite systems or the provi-
agement. They are responsible for the development
DO NO T C
sion off satellite based services. Besides national organizations
organizations there is international
International Telecommunications
management by the International Telecommunications Union (ITU), with headquar-
ters in Geneva, Switzerland. The ITU was formed in 1932 from from the International
Nations Specialized Agency, cur-
Telegraph Union, created in 1865. It is a United Nations
rently with over 190 members.
The ITU has three primary functions:
- allocations and use of the radio-frequency spectrum;
DO NO

- telecommunications standardization;
T
expansion of worldwide telecommunications.
- development and expansion
According to these three functions the ITU have three sectors:
(ITU-R), responsible for frequency alloca-
- the Radiocommunications Sector (ITU-R),
tions and use of the radio-frequency spectrum;
T
- the Telecommunications Standards SectorSector (ITU-T), responsible for telecom-
munications standards; and
- the Telecommunications Development Sector (ITU-D), responsible for the
DO

development and expansion of worldwide telecommunications.


regulatory factors for a particular satel-
The specific frequency bands and other regulatory
lite system have two performances:
- service(s) to be provided by the satellite system/network; and
- location(s) of the satellite system/network ground terminals.
They both together determine the freque
frequency band, or bands, where the satellite
system may operate.

4.2. The electromagnetic


electromagnetic frequency spectrum
The wavelength of the free space path signal
signa is the principal parameter that de-
termines the interaction effects of the at
atmosphere, and the resulting link path degra-
dations.
Communications systems employ the electromagnetic frequency spectrum
shown in Table 3 and Figure 3 (according to International Telecommunication Union
ITU).

9
Table 3. Electromagnetic frequency spectrum
Range Frequency Length of the wave
Extremely low frequency ELF 3 ÷ 30 Hz 100000 ÷10000 km
Super low frequency SLF 30 ÷ 300 Hz 10000 ÷1000 km
Ultra low frequency ULF 300 ÷ 3000 Hz 1000 ÷100 km

Y
Very Low frequency VLF 3 ÷ 30
30 kHz 100 ÷10 km
Low frequency LF 30 kHz
kHz ÷ 300 kHz 10
0 km ÷1 km
Medium frequency MF 300 kHz ÷ 3 MHz 1 km ÷100 m
High frequency HF 3 MHz ÷ 30 MHz
M 100 m ÷10 m

NO C P
Very high frequency VHF 30 MHz ÷ 300 MMHz 10 m ÷ 1 m

CO Y
Ultra high frequency UHF 300 MHz ÷ 3 GHz 1 m ÷ 10 cm
Super high frequency SHF 3 GHz ÷ 30 GHz 10 cm ÷ 1 cm

O
Extremely high frequency EHF 30 GHz ÷ 300 GHz 1 cm ÷ 1 mm

OP
Terahertz THz 300GHz ÷3000GHz
÷3000GHz 1 mm ÷ 0.1 mm

PY
Infrared IR 3000GHz ÷ 400THz 0,1mm÷0,75ȝm
0,1mm÷0,75
Visible 400 THz ÷ 750 THz 0,75ȝ
0,75 ȝm÷0,4
0,75ȝm÷0,4ȝm
Ultraviolet UV 750 THz ÷ 3 PHz 0,4ȝ
0,4 ȝm÷0,1
0,4ȝm÷0,1ȝm
DO NO C
T
T
DO

8
Figure 3. Electromagnetic frequency spectrum ( O c | 3.10 m / s )
Q 1/ s
DO

The frequencies used for satellite communications are accommodated between


satellite
Super high frequency and Extremely high frequency bands (radio waves) as shown in
Table 4.
Table 4. Range of frequencies us
used for satellite communications
Bandwidth,
Range Carrier, GHz Direction Service
MHz
1,5-1,6 Downlink Mobile 100
L
1,6-1,7 Uplink Mobile 100
S 2,5-2,6 Downlink Broadcast 100
3,4-4,2 Downlink Fixed 800
C 4,5-4,8 Downlink Fixed 300
5,9-7 Uplink Fixed 1100
7,2-7,7 Downlink Army 500
X
7,9-8,4 Uplink Army 500

10
10,7-11,7 Downlink Fixed 1000
11,7-12,5 Downlink Broadcast 800
12,5-12,75
5 Downlink Fixed (trade) 250
Ku
12,75-13,25 Uplink Fixed (trade) 250
14-14,8 Uplink Fixed 800

Y
17,3-18,3 Uplink Fixed 1000
17,7-20,2 Downlink Fixed 2500
20,2-21,2 Downlinkk Mobile 1000
Ka 22,5-23 Downlinkk
Downlin Broadcast 500

NO C P
27-30 Uplink Fixed 3000

CO Y
30 - 31 Uplink Mobile 1000

O
Most commercial communications satellites now operate with a 500 MHz band-

OP
downlink. They use a frequency spectrum
width both on the uplink and on the downlink.

PY
6 / 4GHz and 14 / 12GHz (uplink/downlink). The typical 500 MHz satellite bandwidth can
be segmented into many satellite transponders bandwidths. For example, eight trans-
DO NO T C
ponders can be provided, each with a 54 MHz nominal bandwidth and center-to-center
frequency spacing 61MHzMHz . The C-band Fixed Satellite Se
Servic
rvices (FSS) operate with a
500MHz bandwidth. A typical design would would accommodate 12 transponders, each
with a bandwidth of 36 MHz, with guard bands of 4MHz between each (Figure 4). A
typical commercial communications satellite today can have 24 to 48 transponders,
operating in the C-band, Ku-band, or Ka-bands.
DO NO

500MHz
T
vertical plarization
4 36
6105 6145
T
Ɇ
ɆHz

6085 6125 6165


horizontal polarization

Figure 4. A 500MHz bandwidth accommodate 12 transponders,


transponders, each with a bandwidth of 36
DO

MHz, with guard bands of 4MHz

Modern communications satellites also employ polarization frequency reuse to


number of transponders:
increase (doubled) the number transponders: two carriers are used at the same fre-
quency, but with orthogonal polarization. Both linear polarization (horizontal and
vertical sense) and circular polarization (right-hand and left-hand sense) have been
used.

5. Signal processing elements in satellite communications


proce
Figure 5 shows a the basic signal processing elements in satellite communica-
tions and the techniques available for the provision of baseband formatting, source
combining, and carrier modulation in satellite communications systems.
Acronyms:
SSB/SC single sideband suppressed carrier
DSB/SC double sideband suppressed carrier
FDM frequency division multiplexing

11
TDM time division multiplexing
FM/FDM frequency division multiplex
SCPC single channel per carrier
MCPC multiple channel per carrier
FSK frequency shift keying

Y
BPSK binary phase shift keying
QPSK quadrature phase shift keying
QAM quadrature amplitude modulation
FDMA frequency division multiple access

NO C P
CO Y
TDMA time division multiple access
CDMA code division multiple access
NIC nearly instantaneous compounding

O
CVSD continuously variable slope delta modulation

OP
ADPCM adaptive differential pulse code modulation

PY
Baseband Source Carrier Multiple Transmission
Formating Combin
Combining Modulation Access Channel
DO NO T C
Analog: FM/FDM
FM/FD
Voice SSB/SC SCPC, FDMA
Video DSB/SC FDM MCPC TDMA

PCM FSK
Digital: BPSK
NIC FDMA
Data QPSK
CVSD TDMA
Voice/Video
ADPCM TDM QAM CDMA
Source Multiple
Source
Multi-Plexer modulator Transmiter
Coding Access

uplink
DO NO
T
Satellite

downlink

Source Demulti- De- Multiple


T
Receiver
Destination Decoder Plexer modulator Access

The same signal processing

The same signal processing


DO

Figure 5. The basic signal processing elements


elements in satellite communications

The Source information may be analog or digital. The first three elements
(baseband formatting, source combining, and
and carrier modulation) prepare the signal
for introduction to the transmission channel
channel (the ground-to-satellite-to-ground RF
Destination location is subjected to a reverse se-
channel). The received signal at the Destination
quence of processing.

5.1. Analog Systems


In early generation satellites analog transmission has dominated satellite com-
munications since its inception. Even to today many satellite systems still transmit te-
lephony and television signals using
us frequency modulation.
Baseband Formatting - Analog Signals
Analog baseband voice spectrum is typically reduced to the band 300–3400 Hz
for electronic transmission. The voice signals are placed on sub-carriers to allow for
propagation through the network (figure 6). The sub-carrier format is either Single

12
Sideband Suppressed Carrier (SSB/SC) or Double Sideband Suppressed Carrier
(DSB/SC).

Amp
SSB/SC

Y
Amp

Ɇix filter
16,6 19,7 20 KHz

300 3400 Hz

Amp
NO C P
CO Y
20KHz DSB/SC

16,6 19,7 20 20,3 23,4 KHz

O
Figure 6. Analog voice baseband formats

OP
PY
DO NO T C
video

aud
dio

color
DO NO

PAL
P A chanal spectrum
T
ǴHz
7,5ǴHz
7,5Ǵ
7,5

-10

-20
T
-30

-40

-50
DO

-60

ǴHz
5,5ǴHz
5,5Ǵ
5,5 ǴHz
Video
info 4,436618 ǴHz
4,436618ǴHz
4,436618Ǵ Color Audio
info info

Figure 7. Analog video NTSC and PAL


PA composite baseband signal spectrum

Analog video baseband consists of a cocomposite signal that includes video,


Th specific format of the components de-
color, and audio information (figure 7). The
s
pends on the standard employed for color sub-carrier modulation. Three standards are
in use: NTSC (National Television System Comm.), PAL (Phase Alternation Line),
sa
SECAM. A modulation format for the satellite channel is a frequency modulation
(FM). The composite NTSC signal and all audio channel sub-carriers are combined
and the resulting signal frequency modulates the RF carrier, resulting in a total RF
spectrum of approximately 36 MHz. It is shown in figure 8.

13
COMPOSITE NTSC 4,2MHz

audio 1

C
O

Y
M
6,2MHz fC =±18MHz
B
audio 2 I
N
E fC

NO C P
R

CO Y
6,8MHz
audio 3

O
OP
PY
7,2MHz

spectrum
Figure 8. Signal processing format and spectrum for analog video satellite transmission
DO NO T C
Source Combining - Analog Signals
Source combining involves the combining of multiple sources into a single
signal, which then modulates an RF carri
carrier
er for transmission through the communica-
tions channel. The preferred combining method
method for analog data is Frequency Division
Multiplex (FDM).
The ITU-T FDM standard for FDM is shown in figure 9.
Group 12 Voice Channels,
DO NO

....
.. 4 kHz separation,
60-108KHz
T
+ + +
SuperGroup 60 Voice Channels,
... 312-552KHz
ȝ5

Basic MasterGroup
T
... 300 Voice Channels,
ȝ5 812-2044KHz

Super MasterGroup
900 Voice Channels,
DO

ȝ3 8516-12388KHz

Figure 9. ITU-T FDM standard for analog


analog voice frequency di
division multiplexing

Carrier Modulation - Analog Signals


Amplitude modulation (AM) was the first firs method to carry communications on
an RF carrier. AM is still us ed in satellite communications for voice and data com-
used
munications. Amplitude modulation is produced
prod by mixing the information signal
with the RF carrier in a product modulator (mixer) providing a modulated RF carrier
where the amplitude envelope is proportional
proportional to the information signal.
Suppressed carrier amplitude modulation is the preferred AM modulation im-
plementation for satellite communications. Both single sideband suppressed carrier
AM (AM-SSB/SC) and double sideband suppressed carrier AM (AM-DSB/SC) are
components in satellite communications.
used for subcarrier component
Another technique to modulate carrier of analog signal is Frequency modula-
tion (FM). FM was used extensively in satellite communications for telephony and
14
video transmissions on early generation analog based systems, many of which are
still in use.

5.2. Digital Signals

Y
Baseband Formatting
Digital signals dominate satellite commun mmunications
ications systems, for data, voice, im-
aging, and video applications. Digital formatted
formatted signals allow for more comprehen-

NO C P
sive processing capabilities regarding coding, error correction, and data reformatting.

CO Y
The basis for digital communications is the binary digital (2-level) format. There are
many of binary waveforms used for the encoding of baseband data - unipolar NRZ

O
and polar NRZ, polar RZ, split phase (Manchester)
(Manchester) coding, alternate mark inversion

OP
(AMI) and etc.

PY
A measure the quality of digital signals is Bit Error Rate (BER). The bit error
rate or bit error ratio is the number of bit errors divided
divided by the total number of trans-
DO NO T C
ferred bits during a studied time interval. BER is an unitless performance measure,
often expressed as a percentage number. The BER is often expressed as a function of
the Eb / N 0 , (energy per bit to noise po
power
wer spectral density ratio).
A second step in digital baseband formatting
formatting is multi-level coding, where the
binary bit stream is combined into groups, called symbols. symbols. It reduces the required
bandwidth. When two consecutive bits are are combined, they are forming a group of
two bits, there are four possible combinations
combinations of the two bits, resulting in quaternary
DO NO

encoding.. If three consecutive bits are combined,


combined, forming a group of three bits, there
T
are eight possible combinations, resulting in 8-level encoding.
The number of possible levels for “m-ary signal” is
m 2N b
(1)
The number of bits per symbol is
T
N b log 2 m (2)
The symbol duration is N b times the bit duration Tb , i.e.,
DO

TS Tb .N b (3)
The symbol rate is
Rb
RS (4)
Nb
where Rb is the bit rate.
The symbol rate is often expre ssed in units of baud, i.e., the baud rate. A
expressed
transmission rate of RS simbols / s is the same as a rate of RS baud . The baud rate is
equal to the bit rate only for N b 1 , that is, for binary signals.
The second possibility is when the origin original source data is analog (voice or
video). Conversion to digital form is required
requir before digital formatting is performed.
The most popular baseband formatting ttechnique for analog source data is Pulse
Code Modulation (PCM).
In addition to conventional PCM there are some other digital voice source cod-
ing techniques used for the communications systems, as:
Adaptive differential PCM (ADPCM)

15
ADPCM also uses differential encoding, but takes the mean-square value in the
wer coding bits than PCM
sampling process. It requires fewer PCM.
Adaptive delta modulation (ADM) or continuously
ontinuously variable slope delta modu-
lation (CVSD)

Y
ADM uses differential encoding – only changes are transmitted. ADM pro-
vides acceptable voice at 24–32 kbps, providing
providing a more spectral efficient option.
Nearly instantaneous compounding (NIC)

NO C P
taking advantage of short-term redundancy
NIC achieves bit-rate reduction by taking

CO Y
rates approaching 1/2 that required for PCM,
in human speech. It can achieve data rates
because of a more efficient use of the frequency spectrum.

O
OP
Source Combining

PY
ivision multiplex (TDM).
Digital satellite communications systems use Time ddivision
This technique combines multiple digitally encoded signals into a composite signal at
DO NO T C
a bit rate equal to or greater than the sum of the input rates. Multiple PCM bit streams
are combined in a TDM multiplexer, which which generates a TDM composite
composite bit sequence
that drives the RF modulator (Figure 10). 10). Because PCM samples the incoming sig-
nals 8000 times per second, each sample occupies 1 / 8000s ( 125Ps ). According rec-
ommendation G.702 ITU-T TDM is organized into a well structured hierarchy.
hierarchy
PCM
Binary
Sequence
DO NO

PCM
T
Modulator TDM
MULTIPLEXER

Composite
alog Signals

PCM Sequence
Modulator
To RF
…...
Analog

Modulator
An

T
PCM
Modulator

Figure 10. Time division multiplexing source combining process


DO

Two TDM standards for voice circuits are in global use: DS or T-carrier TDM
signalling and CEPT TDM signalling.
signalling. Each hierarchy starts with 64 kbps analog
consist of different combinations, as shown in
voice, but the subsequent TDM levels consist
Figure 12. The systems used in Europe and North America are different (Figure 12).
The North American standard is based on a 24-channel PCM system, whereas the
European system is based on 30/32 channels. This system contains 30 speech chan-
nels, a synchronisation channel and a signalling channel, and the gross line bit rate of
the system is 2.048 Mbps (32 x 64 Kbps).
Kbps The system can be adapted for common
channel signalling,
signalling, providing 31 data channels and
an employing a single synchronisa-
tion channel.
The following details refer to the European
Eur system (Figure 11). The 30/32
channel system uses a frame and multiframe structure, with each frame consisting of
32 pulse channel time slots numbered
numbere 0-31. Slot 0 contains the Frame Alignment
Word (FAW) and Frame Service Word (FSW). Slots 1-15 and 17-31 are used for
digitised speech (channels 1-15 and 16-30 respectively). In each digitised speech
16
channel, the first bit is used to signify the polarity of the sample, and the remaining
bits represent the amplitude of the sample.. The duration of each bit on a PCM system
is 0,488Ps . Each time slot is therefore 3,904Ps ( 8bits * 0,488Ps ). Each frame therefore
occupies 125Ps ( 32 *3,904Ps ).

O PY
PY
DO NO T C

CO
DO NO
T
Figure 11. The frame and multiframe structures for a 30/32 channel PCM system
T
Japan Europe
NO

USA
DO

397200 kbit/s 564992 kbit/s

*4 *4
139264 kbit/s
97728 kbit/s 274176 kbit/s
1920 channels
*6 *3
*3 *4
34368 kbit/s
32064 kbit/s 44736 kbit/s
480 channels
*5 *7 *4
8448 kbit/s
6312 kbit/s 120 channels
*3 *4
*4
2048 kbit/s
1544 kbit/s 30 channels

*24 *30
64 kbit/s
ISDN
Figure 12. Standardized TDM structures

17
In order for signalling information (dial pulses) for all 30 channels to be trans-
mitted, the multiframe consists of 16 frames numbered 0-15. In frame 0, slot 16 con-
tains the Multiframe Alignment Word (MFAW) FAW) and Multiframe Service Word
(MFSW). In frames 1-15, slot 16 contains signalling information
info for two channels.

Y
The frame and multiframe structure are shown below. The duration of each multi-
frame is 2ms ( 125Ps *16 ). A TDM multiplexer can provide Bit multiplexing, Byte (8
bits symbol) multiplexing and block multiplexing.

NO C P
CO Y
Forward Error Correcting (FEC)
The purpose of Forward Error Correcting (FEC)
(FEC) is to improve the capacity of a

O
transmission channel by adding to the source data
data redundant information. It is a proc-

OP
ess known as channel coding.. Channel coding consists:

PY
Reed Solomon coding;
Interleaving;
DO NO T C
Convolution code.
The place of channel coding is between
between multiplexing and modulating process,
as shown in Figure 13.

video
audio TV cod
coder

M
DO NO

video U f
audio TV coder
T
L
T PA
I
..................

P RS Convoluti QPSK
L interleaving
coder on coding modulater
E
X
T
DVB-S
E
R
video
audio TV coder

MPEG
DO

coder

Ɏɢɝ.. 13. Transmitter digital sat TV.


Ɏɢɝ

Channel coding is described in more detail in lecture 3.

Carrier Modulation - Digital Signals


Carrier
Digital modulation is accomplished by amplitude, frequency, or phase modula-
tion of the carrier by the binary (or m  ary ) bit stream.
The major modulation formats used in satellite communications are:
- Binary Phase Shift Keying (BPSK) - polarity changes in binary signal used to
produce 180° carrier phase change;
- Differential Phase Shift Keying (DPSK) – phase shift keying where carrier
phase is changed only if current bit differs from preceding bit. A reference bit must
be sent at start of message
ge for synchronization;
- Quadrature Phase Shift Keying (QPSK) – phase shift keying for a 4-symbol
waveform. Data bit streams are converted to two bit streams, I and Q, and then binary

18
phase shifted as in BPSK. The adjacent phase shifts are equi-spaced by 900 . BPSK
only requires one-half the bandwidth of BPSK;
- M-ary Phase Shift Keying (MPSK) – phase shift keying for m  ary symbol
waveform;

Y
- Minimum Shift Keying (MSK) – phase shift keying with additional process-
ng in reduced bandwidth requirements;
ing to smooth data transitions, resulting
- Quadrature Amplitude Modulation (QA (QAM) – multilevel (higher than binary)

NO C P
modulation; it is a combination of amplitude and phase modulations.

CO Y
BPSK and QPSK are the most widely
widely used in satellite systems.
In the simplest case PSK is based on phase switching signal to 1800

O
when changing from a logic “0” to “1” and “1” to “0”, but the amplitude

OP
and frequency remain constant.. The change of phase state is finding relatively simple.

PY
It is shown in figure 14.
DO NO T C
carrier

Digital
0 1 1 0 signal
t
PSK
modulated
DO NO

t signal
T
Figure 14. PSK modulation

Quadrature Phase Shift Keying (QPSK)


T
In QPSK the phase of the carrier is shshifted
ifted between four positions that are 90
degrees apart. The binary data stream is converted into 2-bit symbols, which are used
to phase modulate the carrier. The serial-to-parallel
serial-to-parallel process used to generate the two
parallel encoded bit streams
streams is shown in figure 15. Odd numbered bits in the original
data sequence p((t ) are sent to the i (in-phase) channel, producing the sequence pi (t ) .
Even numbered bits are sent to the q (quadrature) channel, producing the sequence
pq ((tt ) . The bit duration is doubled in the i and q channels, reducing the bit rate to ½
the original data bit rate (Figure 16).
pi(t) pi (t ) cos Z 0 (t )
+

pi(t)
a i cos Z0 (t )
c e g t
p(t) Serial to
QPSK
a b d h i
Parallel
Converter 900
+ modulated
c e f g t signal

 sin Z0 (t )
b d h
+

pq(t)
f pq(t) t  p q (t ) sin Z 0 (t )

Figure 15. QPSK modulator Figure 16. Generation of the QPSK waveform

19
The in-phase signal is mixed directly with the carrier frequency cos(Z0t ) , while
the quadrature signal is mixed with a 900 phase shifted carrier
( cos(Z0t  900 )  sin(Z0t ) ). The output of the two mixers is summed to produce the
modulator output signal:

Y
s (t ) pi (t ) cos(Z0t )  pq (t ) sin(Z0t ) (5)
The phase state of s(t ) depend on the bit values that compose the in-phase and
quadrature component signals. Figure 17 and Table 5 show the four possible combi-

NO C P
CO Y
nations of bits and the resulting s (t ) and the phase state diagram for the four bit se-
quences, plotted pi (t ) and pq (t ) . The symbol phases are orthogonal, 900 apart from

O
each other, with one in each quadrant.

OP
The symbol rate is two bit per symbol, Es 2 Eb , an and
d QPSK requires half the

PY
transmission bandwidth of BPSK.
DO NO T C
s (t ) I(t) Q(t) QPSK ɢɡɯɨɞ
11 1/ 2 1/ 2 cos(Z0t )  sin(Z0t ) 2 cos(Z0t  450 )

10 1/ 2 1/ 2 cos(Z0t )  sin(Z0t ) 2 cos(Z0t  450 )


01 1/ 2 1/ 2  cos(Z0t )  sin(Z0 t ) 2 cos(Z0t  1350 )
Q(t)
00 1/ 2 1/ 2  cos(Z0 tt))  sin(
si Z0t ) 2 cos(Z0t  1350 ) 1350 450
01 11
si(t) 00 1
11 10 01 1/ 2
DO NO

+1
T
0
1/ 2 I(t)
t

-1 00 10
0
? i(t) -135
-13 -450
T
1350

450

-450 t
DO

0
-13
-135

Figure 17. The four possible combinations of bits and the resulting s (t ) and the phase state
diagram

pi(t)
+

cos Z0 (t ) LPF

Serial to p(t)
QPSK
Parallel
modulated
900 Converter
signal

 sin Z0 (t )
+

pq(t)
LPF

Figure 18. QPSK demodulator

20
The QPSK demodulator reverses the process as shown in Figure 18. The input
cations channel, is split into two chan-
signal, which has passed through the communications
nels. Each channel is essentially
ntially a BPSK demodulator and the demodulation process
produces the in-phase and quadrature components pi ((tt ) and pq (t ) , which are then

Y
parallel-to-serial converted to produce
oduce the original data stream p(t ) .
Higher Order Phase Modulation
Higher Order Phase Modulations can achieve
achieve further reduction in symbol rate,

NO C P
and the required transmission bandwidth. For example, 8-phase shift keying (8PSK),

CO Y
which combines groups of three bits per per symbol, requires a transmission channel
bandwidth of 1/3 BPSK, with the phase state
state diagram as shown in Figure 19.

O
OP
PY
010 001

100 000
DO NO T C
111 011

110 101

Figure 19. 8PSK phase state diagram

Disadvantage of 8PSK is requirement of twice the power over BPSK or QPSK


DO NO

to achieve the same overall performance. 8PSK


8PSK Modulation is important in satellite
T
communications systems because the additional bit in the symbol can be used for er-
ror correction coding, allowing an additional
additional approximately 3 dB of coding gain.
10
BER values exceeding 1.10 .
T
Multiple Access
A multi-user system achieves a specific point in the capacity region depending
on how the multi-user channel is shared by the users, which depends on the multiple
DO

access technique or Multiple Access (MA). It is the last technique before signal trans-
mitting.
Satellite links are designed to provide desired link av
availability for average con-
ditions. Satellite MA techniques interconnect ground stations through multiple satel-
lite transponders with the goal of optimizing several system attributes such as: spec-
tral efficiency; power efficiency; reduced latency; and increased throughput.
The MA methods available to the satellite system designer
de can be categorized
into three fundamental techniques:
x Frequency Division Multiple Access (FDMA);
x Time Division Multiple Access (TDMA);
x Code Division Multiple Access (CDMA).
FDMA systems consist of multiple carriers that are separated by frequency in
nsponder. The transmissions can be anal
the transponder. analog or digital, or combinations of both.
In TDMA the multiple carriers are separated by time in the transponder, presenting
only one carrier at any time to the transponder. TDMA is most practical for digital

21
data only, because the transmissions are in a burst mode to provide the time division
separation It is the
capability. CDMA is a combination of both frequency and time separation.
most complex technique, requiring severall levels of synchronization at both the
transmission and reception levels. CDMA is implemented for digital data only, and

Y
ffers the highest power and spectral efficiency operation of the three fundamental
offers
techniques.
Multiple Access is described in more detail in lecture 4.

NO C P
CO Y
References

O
1. A.C. Clarke, “Extraterrestrial Relays”,Wireless
Relays”,Wireless World
World,, Vol. 51, pp. 305 308,

OP
October 1945.

PY
2. Bernard Sklar, Digital Communications:
Communications: Fundamentals and Applications,
Second Edition, Prentice-Hall, 2001
DO NO T C
3. Dennis Roddy,, Satellite communications, McGraw-Hill Professional, 2001 -
569 p.
4. Deffebach H. L. and Frost W. O., A survey of digital baseband signaling
techniques. NASA Technical Memo randum NASATM X-64615, June, 1971.
Memorandum
5. Gérard Maral,
Maral Michel Bousquet
Bousquet,, Satellite communications systems: systems,
techniques, and technology, John Wiley and Sons, 2002 – 757p.
6. Ippolito, Louis J., Satellite communications
communications systems engineering:
DO NO

atmospheric effects, satellite


satellite link design, and system Performance, 2008 JohnWiley
T
& Sons Ltd, 396 p.
7. International Telecommunications Union, www.itu.int
www.itu.int.
8. Korn I., Digital Communications.
Communications. Van Nostrand Reinhold Company, New
York, 1985.
T
9. Lathi B. P., Modern digital and an alog communications systems, Third Edi-
analog
tion, Oxford University Press, 1998, 781 ɫɬɪ.ɫɬɪ.
Kolawole, Satellite communication engineering, Marcel
10. Michael O. Kolawole,
DO

Dekker, 2002 - 263 p.


11. Rappaport T. S., Wireless Communications,
Communications, Chapter 3 and 4, Prentice Hall,
Upper Saddle River, New Jersey, 1996.
12. Zhili Sun, Satellite networking principles and protocols, John Wiley &
Sons, 2005. 342 p.

22
Satellite Communications Systems
Lecture 2.
Link Budget Calculation and Analysis

Y
1. The quality of signal transmission
2. Elements of the link
2.1. Effective Isotropic Radiated Power

NO C P
2.2. Power flux density

CO Y
2.3. Antenna Gain
2.4 Free-Space Path Loss

O
2.5. System Noise

OP
2.6. Link Performance Parameters

PY
3. Link Budget
3.1. Frequency Translation Satellite
DO NO T C
3.2. The on-board processing satellite

The goal of satellite communications is to provide links between fixed termi-


nals, mobile terminals and both
both fixed and mobile terminals on lend, on the air, and at
sea.
A link budget is the sum of all gains and losses in the radio connection be-
end, including antenna's, feed lines and the path be-
tween two terminals from end to end,
DO NO

tween the antenna's, but also the relevant portions of the transmitter and the receiver.
T
G G

Tx Rt
T
PT
Losses
dBm in feeder
DO

PR

Free space loss

distance d, km

Figure 1. Gains and losses in the radio


ra connection between two terminals

1. The quality of signal transmission


The quality of digital signals (digital links) is measured by the Bit Error Rate
(BER)
(BER). The bit error rate or bit error ratio is the number of bit errors divided by the
total number of transferred bits during a studied time interval
interval. BER is a unitless per-
formance measure.
The BER is often expressed as a function of the Eb / N 0 , (energy per bit to noise
power spectral density ratio).
1
BER erfc ( Eb N 0 ) , (1)
2
where the function erfc is called a complimentary error function, it is tabulated.
1
The relation between BER and Eb N 0 is shown in Figure 2.
BER
1.10 -1

1.10 -2

Y
1.10 -3

1.10 -4

NO C P
CO Y
1.10 -5

1.10 -6

O
1 2 3 4 5 6 7 8 9 10 E b /N 0

OP
Figure 2. The relation between BER and Eb N 0

PY
DO NO T C
Higher Eb N 0 means better quality
quality.
The parameter Eb N 0 is the most co common
mmon to compare
compare the digital communica-
ystems, even they have differing bit rates or modulation. The quantity Eb is a
tion systems,
thee average signal power and bit rate:
measure of bit energy, a ratio of th
Pavg W
Eb , . (2)
Rb bit / s
DO NO

Example 1: A signal has power 15W, his bit rate is 200bps. What is the bit energy in deci-
T
bels?
Eb 10 log15  10 log 200 11,25dB

The quantity N 0 is called the noise power density (or noise power spectral den-
T
sity). It is the total noise power in the frequency
frequency band of the signal divided by the
bandwidth of the signal:
PN W
DO

N0 , (3)
BN Hz

Example 2: A signal has a noise power 3W, the signal bandwidth is 500 Hz,
Eb 11,25dB . What is N 0 and Eb N 0 ?
Eb
N 0 10 log 3  10 log 500 22,22dB , (11,25)  (22,22) 10,97 dB
N0

The ratio (3) shows, that if bandwidth of the signal decreases noise power den-
sity increases (the same amount of noise occupies a smaller signal space) and the pa-
rameter Eb N 0 decreases. It also decreases when the bit rate increases.
The quality of analog signals is meas
measured by the carrier to noise ratio C N or
by the carrier to noise power spectral density ratio C N 0 . The ratio C N is the carrier
eable bandwidth, where C N 0 is the carrier power per unit
power in the whole useable
bandwidth.
The relation between C N , C N 0 and Eb N 0 is the power of carrier C Eb .Rb .
2
C Eb §C · Eb
. Rb , in dB: ¨¨ ¸¸  Rb , (4)
N0 N0 © N 0 ¹ dB N0
C Eb Rb §C· Eb
. , in dB: ¨ ¸  Rb  B , (5)
N N0 B © N ¹ dB N0

Y
2. Elements of the link
A link consists of three parts with specific
specific parameters: transmitter, receiver and

NO C P
medium, as shown in figure 3.

CO Y
d

O
pt pr

OP
Transmitter Receiver

PY
gt gr
pfdr
DO NO T C
Figure 3. The three parts of link.

The parameters of the link are:


pT - transmitted power (in watts);
pR - received power (in watts);
gT - transmit antenna gain;
g R - receive antenna gain, and
DO NO

d - path distance (km).


T
2.1. Effective Isotropic Radiated Power
An important parameter in the evaluation of the RF link is the effective iso-
tropic radiated power (EIRP). The EIRP, using the parameters parameters introduced in Figure 3,
T
is defined as
EIRP pT .g T , W , (6)
EIRP 10 log PT  10 log GT , dBW , (7)
DO

where pT - transmitted power (in watts); gT - transmit antenna gain.


EIRP evaluate the energy pot potential
ential of the transmitter.
Requirements for the values of EIRP are usually
- EIRP 50 y 100 dBW of the ground transmitter;
- EIRP 45 y 65dBW of the satellite transponder.
Equations (6) and (7) do not account Transmitter Feeder loss LC and Antenna
Pointing Loss LPointing due to incorrect orientation of the antenna to the satellite.
For precise calculations equation (7) is:
EIRP 10 log PT  10 log GT  10 log LC  10 log LPointing dBW , (7a)

2.2. Power flux density


A specific parameter is the power flux density (power density pPFD ). It is a
measure of energy that can be gathering from a particular source (figure 3) and it is
expressed in watts / m 2 .

3
pT gT EIRP
pPFD , W / m2 , (8)
4Sd 2
4Sd 2

where d - path distance (km).


PPFD EIRP  10 log 4Sd 2 EIRP  20 log d  10 log 4S
(9)
EIRP  20 log d  10,99 dB

Y
function between transmitted and received
The power flux density gives the function
power. The power flux density limited service area of the satellite:

NO C P
- for Direct Broadcast System (DBS), (DBS), like TV-Sat, TDF, Olimpus

CO Y
PPFD t 103dBW / m ;2

- for multifunctional systems (Astra, Eutelsat, Intelsat)

O
PPFD t (113 y 116)dBW / m .
2

OP
PY
Example 3: The transmitted power of Earth station is 10W , a distance to satellite is
d 37500km . The antenna gain is 50dB . What is the power flux density?
DO NO T C
EIRP 10 log PT  50 10  50 60, dBW
EIRP  10 log 37500  10,99 60  20 log(37500)  10,99
2
PPFD
60  91,48  10,99 42,47dB

2.3. Antenna Gain


Diagram of the broadcast antenna means th that
at compared with an isotropic radia-
DO NO

tor, it concentrates more electromagnetic


electromagnetic energy in a definitely direction then to an-
T
other. In this sense antenna gives “gain” the signal in that direction.
direction The gain of the
antenna shows how much more is the gain compared to isotropic antenna gain.
In physical antennas some energy is reflreflected
ected away by the structure, and some
energy is absorbed by lossy components (feeds, struts, subreflectors). In this reason to
T
account for this, an effective aperture Aeff is defined in terms of an aperture efficiency
K suc
such that Aeff K . A , ((A is antenna area).
§ S .D ·
2
4.S . Aeff
DO

g K .¨ ¸ , (10)
© O ¹ O2
K 0,55 y 0,65 ; O c f (wave length is the distance from one wave point to the next

wave point); c - speed of the light, c 3.108 m / s ; f is the frequency.


ª § S .D · 2 º
G 10 log «K .¨ ¸ » 10 logK .(10,47. f .D) , dBi
2
(11)
«¬ © O ¹ ¼»
Table 1 gives example for the values of gain depending on frequency and an-
tenna’s diameter D .

Table 1. The values of antenna gain


f, GHz 17,5 11,5 3,9 2,6 0,72
D, m \ Ȝ,, m 0,017 0,026 0,0,77 0,115 0,417
0,6 38,7 35,0 25,5 22,1 10,9
2,0 49,1 45,4 36,0 32,5 21,3
5,0 57,1 43,9 43,9 30,5 29,3

4
Figure 4 shows a typical directional antenna pattern for a circular parabolic re-
flector antenna. The antenna pattern shows the gain as a function of the distance from
the boresight direction. The boresight direction
ection is a direction of maximum gain, for

Y
which the value g is determined from (11) equation. The 1/2 power beamwidth is the
contained conical angle D for which the gain has dropped to 1/2 the value at bore-
sight, the power is 3 dB down from
m the boresight gain value.

NO C P
The antenna beamwidth for a parabolic reflector
reflector antenna can be approximately

CO Y
determined in degree from
75.O 22,5
D# , in degree . (12)

O
D D. f

OP
0

PY
-450 450
0,7Emax
DO NO T C
D

900

-1350 1800 1350

F (M )
DO NO
T
F 2 (M )
T
-1800 -1350 -900 -450 0 450 900 1350 1800

Figure 4. The typical antenna bandwidth


DO

Most antennas have sidelobes. Its are regions where the gain may increase due
to physical structure elements or the characteristics of the antenna design. It is also
possible that some energy may be present behind the physical antenna reflector.
Sidelobes are a possible source for noise and interference, for example, when the sat-
other antennas or sources of power in the
ellite ground antenna is located near to other
same frequency band as the satellite link.
Because of antenna beamwidth for satellite links is very small (much less than
D  1 ), it is requiring careful antenna pointi
0
pointing and control to maintain the link.

2.4 Free-Space Path Loss


When signals are transmitting between th the transmitting and receiving antennas
signal fade in space. This is due to loss of energy dissipation in the propagation. For
range is from 195 to 213 dB for 4 / 30 GHz.
GEO orbits satellites the attenuation rang
According to figure 3 the power pR got by the receiving antenna will be
pR pPFD . Aeff , (13)

5
GR .O2
where Aeff .
4S
Replacing Aeff and pPFD (8) in equation (13),
§ O ·
2
pT .gT .g R
pR pT .gT .g R ¨ ¸

Y
, (14)
© 4Sd ¹ lFS
16S 2 d 2 (4S . f .d ) 2
where lFS is a free space path loss.
2
O c2

NO C P
CO Y
In dB:
§ 4.S .d · § 4S . f .d ·
LFS 20 log¨ ¸ 20 log¨ ¸ (15)
© O ¹ © c ¹

O
OP
PY
Example 4: The frequency uplink uplink is 6,175GHz, a distance to satellite is d 37500km .
What is the free space path loss?
(4S . f .d ) 2 4S . f .d
DO NO T C
4.3,14.6,175.109.37,5.106
LFS 20
20log
log 20
20ll og 199,73 dB
c2 c 3.108

Equation for Received Power (14) in dB


PR EIRP  GR  LFS , dB (16)
gives the basic link equation, sometimes referred to as the Link Power Budget Equa-
DO NO

tion,, for a satellite communications link,


link, and is the design equation from which satel-
T
lite design and performance evaluations proceed.

Example 5: What is the power flux density pPFD and power of received signal pR if both
the transmit and receive parabolic antennas
antennas have a diameter of 3 m, D 3m , the transmit power is
12 watts, pT 12W , the antenna efficiency is 55% for both antennas, K 0,55 . The satellite is in a
T
GSO location, with a range of d 37500km . The frequency of operation is 12 GHz.
First have to estimate antenna
antenna gain (equation 11)
GdB 10 logK .(10,47. f .D) 2 10 log 0,55.109,66.144.9 48,93 , dBi
DO

Then EIRP is: EIRP 10 log PT  GT 10,79  48,93 59,72 dB


The free space path loss, in dB is (Equation 15)
(4S . f .d ) 2 4S . f .d
LFS 10log
10 log 2
20 log 215,05 dB
c c
The received power, in db, is then
then found from the Equation (16):
PR EIRP  GR  L 59,72  48,93  215,05 106,4 dB
power in watts:
The received power
106.4
PR 10 10 2,29.10 11 W
The power flux density, in db, is then found from the Equation (9):
PPFD EIRP  20 log d  10,99 59,72  20 log 37,5.106  10,99 102,75 dB .
rece
The calculation shows, that the received power is very, very low.

6
2.5. System Noise
Noise is a parasitic undesired red signal, superimposed on the
t useful signal, caus-
ing adverse effects in the processing of signals. According to the physical character,
the noises are: Thermal noise, Shot noise and Flicker noise.
noise

Y
Sources
ources of noise and there frequency domains are different, but in the micro-
wave range (above 300 MHz) matter have two main sources sources.. One of them is related
to random changes in the currents of the mediaa in transitions of semiconductor struc-

NO C P
tures (shot noise), and the other - with occasional changes voltages, primarily related

CO Y
to the thermal motion of carriers in the volume of in the wires (thermal noise)
noise). Ther-
mal noise is called “white noise” and is a basic in RF band.

O
The noise introduced by each device in the system is quantified by the intro-

OP
duction of an equivalent noise temperature t E . It is defined as the temperature of a

PY
passive resistor producing a noise power per unit bandwidth.
Solid state theory gives the following value of noise voltage
DO NO T C
u N2 4k .t E .r.bN , V 2 (17)
where u N is a noise voltage;
r is a resistance, which occurs
occurs on the noise voltage;
­k 1,37.10 23 Ws / deg,
°
k is Boltzmann’s constant: ®k 198dBm / K / Hz, ;
°k 228,6dBW / K / Hz
¯
DO NO

temper re in degree Kelvin;


t E equivalent noise temperatu
T
bN - noise bandwidth.
The noise power is
u N2
nN k .t E .bN , W (18)
T
2r
The noise bandwidth is the RF bandwidth of the information-bearing signal –
us
usually
ually it is the filtered bandwidth of the
the final detector/demodulator of the link.
DO

A noise power density (noise power spectral density) is


nN
n0 k .t E , W / Hz (19)
bN

2.5.1. Noise figure


The noise figure NF is defined by considering the ratio of the desired signal
power to noise power ratio at the input of the device, to the signal power to noise
power ratio at the output of the device
( p / n) IN
nff (20)
( p / n)OUT
In other wise
pIN
( p / n) IN k .t0 .b t0  t E tE
nf 1 (21)
( p / n)OUT g . pIN t0 t0
g .k .(t0  t E ).b

7
where t0 is the input reference temperature, usually set at 290 K , and b is the noise
bandwidth.
§ t ·
NF 10 log¨¨1  E ¸¸, dB (22)
© t0 ¹

Y
§ t ·
The term in brackets, ¨¨1  E ¸¸ , is sometimes referred to as the noise factor,
t © 0 ¹

NO C P
when expressed as a numerical value.

CO Y
Corollary:
nout nf .g .nIN (23)

O
tE t0 .(nf  1), K (24)

OP
NF

PY
tE t0 .(10 10
 1), dB (25)
nN k .t0 .(nf  1).bN , W (26)
DO NO T C
2.5.2. Noise Temperature
Noise temperature concern three types of devices: active devices, passive de-
vices, and the receiver antenna system.
Active devices in the communications system are amplifiers and other compo-
nents (upconverters, downconverters,
converters, mixers, active filters, modulators, demodulators,
and etc.). They provide an output power that is greater than the input power (increase
DO NO

the signal level and input noise, g>1).


T
For active devices noise temperature can be expressed by equations (24) and
(25).
Passive devices are waveguides, diplexers, ffilters,
ilters, and switches. They reduce
the level of the power passing through the device (decrease the signal level, g<1).
T
A passive device is defined by the loss factor:
factor
pIN
l (27)
pOUT
DO

where pIN and pout are the powers into and out of the device, respectively.
The input to the ideal amplifier noise contribution of the passi
passive device will be
t E t0 .(l  1) 290.(l  1), K (28)

2.5.3. Receiver Antenna Noise


There are two possible ways to introduce noise into the system at the receiver
antenna: from the physical antenna structure (main reflector, subreflector, struts, etc.),
it is called antenna losses,
losses, and from the radio path - radio noise or sky noise.
The antenna loss is usually included as part of the antenna aperture efficiency,
K 0,55 y 0,65 , and does not need to be included in link power budget calculations di-
rectly.
Radio noise can be introduced into the tran
transmission path from both natural and
human induced sources. This noise power w will add to the system noise through an
increase in the antenna temperature of the receiver.
The natural components present in radio noise on a satellite link are:

8
- Galactic noise: | 2,4 K for frequencies above about 1GHz ;
- Atmospheric constituents that absorbss the radiowave and will emit energy in
the form of noise, like oxygen, water vapor, clouds, and rain ((most severe for fre-
quencies above about 10 GHz).

Y
- Extraterrestrial sources - the moon, sun, and planets.
Human sources of radio noise consist of interference noise in the same infor-
mation bandwidth induced from:

NO C P
- communications links, both satellite and terrestrial;

CO Y
- machinery;
- other electronic devices that may be in the vicinity of the ground terminal.

O
For the antenna pointing to the sky (ground station antenna) the output noise

OP
power from the antenna has two components which are represented by the sky tem-

PY
perature, Tsky , and the earth temperature Tearth .
DO NO T C
Sky temperature, Tsky is due to noise originating in the atmosphere. It varies
with frequency and the elevation angle M of the antenna. The sky temperature is
higher for M 00 (antenna pointing to the horizon) because of the longer path of the
radiation through the atmosphere. Elevation
Elevation angles of less than 10° are usually
avoided.
Figure 5 show Tsky for different frequency ranges 1 .
DO NO
T
Tsky ij=00
T
ij=650

ij=800
DO

ij=87
=870

ij=900

wa vapour concentration (ij is the


Figure 5. Sky noise for clear air and 7.5 g/m3 of water
elevation angle)

The earth temperature Tearth interference noise enter the system through the
antenna, it is often difficult to quantify
sidelobes or backlobes of the ground receiver antenna
interference noise directly.
For the antenna pointing to the earth (s
(satellite antenna) the noise temperatutre
of the antenna is about 290K, the physical temperature of the earth.

1
J P Silver. Satellite Communications Tutorial, E-mail: [email protected]

9
2.5.4 System Noise Temperature
The noise contributions of each device in the communications transmission
path, including sky noise, will combine to produce a total system noise temperature.
Consider a typical satellite receiver system
em with the components shown in Fig-

Y
ure 6: an antenna with a noise temperature of t A ; a low noise amplifier (LNA) with a
gain of g RF and noise temperature of t RF ; a cable with a line loss of 1 / l and noise
temperature of tC ; a downconverter (mixer) with a gain of g M and noise temperature

NO C P
of t M ; and finally an intermediatete frequen
frequency (I.F.) filter and am
amplifier
plifier with a gain of

CO Y
g IF and t IF .

O
OP
Receiver
Down

PY
Converter
line (Mixer)
DO NO T C
1/l
1/l gM IF Filter IF Amplifier
tA tC LNA
gRF tM
tRF gIF
tIF

Figure 6. Receiver System Components

The receiver system noise temperature will be


DO NO

tM t IF
tR t RF   , (28)
T
g RF g RF .g M

Example 6: A receiver with a low noise amplifier (LNA) with a gain of GRF 23dB
( g RF 200 ) and noise temperature of t RF 50 K ; a downconverter
downconver (mixer) with a gain of
T
GM 10dB ( g M 0,1 ) and noise temp erature of t M 500 K , an intermediate frequency
temperature fr (I.F.)
unit: t IF 1000 K , GIF 30dB ( g IF 1000 ).What is the receiver
recei r system noise temp
temperature.
t t IF 500 1000
t R t RF  M  50   102,5 K .
DO

g RF g RF .g M 200 200.0,1

The total system noise temperature will be


tA
1 § 1·
tS (t A  tC )  t R
 t 0 ¨1  ¸  t R , (29)
ll © l¹
The system noise temperature t S represents the noise present at the antenna
terminals from all the front-end devices.

2.5.5. The quality of the receiver


The ratio of receiver antenna gain to the receiver system noise temperature
GR / t S indicates figure of merit.
G
GR  TS , dB / K (30)
T

10
Example 7: Calculate Receiver G/T (dB/K) of a satellite having antenna gain 42 , over all
receiver noise temperature t S 75K .
G
GR  10 log t S 42  18,75 23,25 dB / K
T

Y
The minimum values for sat TV are:
- 6dB / K for an individual receiver;
- 14dB / K for a joint receiver.

NO C P
CO Y
2.6. Link Performance Parameters
2.6.1. Carrier-to-Noise Ratio

O
The average RF carrier power to noise power ratio C N is carrier power in the

OP
whole useable bandwidth.

PY
The C N can be expressed in terms
terms of the ei
eirp,
rp, G/T, and othe
otherr link parameters
developed earlier
DO NO T C
pR §C· pT .gT .g R
¨ ¸ ; (31)
nR © N ¹ k .t S .bN .(lFS .lad )
where lad is sum of all other losses. The other losses could be from the free
space path itself, such as rain attenuation, atmospheric attenuation, etc., or from
antenna feeds, line losses, etc.
hardware elements such as antenna
§C·
 LFS  Lad  228,6  10 log bN , dB ,
GR
¨ ¸ EIRP  (32)
©N¹
DO NO

TS
T
where the EIRP is in dBW , the bandwidth BN is in dBHz , and
k 228,6 dBW / K / Hz .
The larger the ratio C N is the better
better.. Typical communications links require
minimum C N values of 6 to 10 dB for acceptable
acceptable performance. The performance of
T
two ways: if the carrier power c, is reduced, and/or if the
the link will be degraded in two
noise power nB , increases.
DO

2.6.2. Carrier-to-Noise Density


The carrier-to-noise density is defined in terms of noise
noi power density, defined
by Equation (19):
nN k .t S .bN
n0 k .t S (33)
bN bN
Equation (4) and (5) give the relation between C N and C N 0 by the band-
width BN .
c c 1 §C· § C ·
. , ¨ ¸ ¨¨ ¸¸  BN , dB . (34)
n n0 bN © N ¹ dB © 0¹
N
c c §C · §C·
. bN , ¨¨ ¸¸ ¨ ¸  BN , dBHz , (35)
n0 n © N 0 ¹ dB ©N¹
The carrier-to-noise density behaves similarly to the carrier-to-noise ratio in
terms of system performance. The larger value C N 0 - better performance.

11
2.6.3. Energy-Per-Bit to Noise Density
For digital communications systems, the bit energy, eb , is more useful than car-
rier power in describing the performance of the link. The bit energy is related to the
carrier power c eb .rb (or eb c.Tb , Tb is the bit duration).

Y
The ratio eb n0 is related to c n0 :
§ eb · §c· 1 §c·
¨¨ ¸¸ ¨¨ ¸¸ . ¨¨ ¸¸.Tb , (36)
© n0 ¹ © n0 ¹ rb © n0 ¹

NO C P
CO Y
§ eb · § c · bN
¨¨ ¸¸ ¨ ¸. , (37)
© n0 ¹ © n ¹ rb

O
The eb n0 will be numerically equal to the c n when the bit rate ( rb , bps ) is

OP
PY
equal to the noise bandwidth ( bN , Hz ).
DO NO T C
Example 8. 2 :
There is a satellite with a range 40,000 km (range); transmitted power pT 2W ( 3 dB ); an-
tenna gain gT 17 dB ( 50 ); channel system noise temperature t S 152 K and bandwidth
bN 500MHz of the satellite channel; Frequency = 11GHz.
What are:
a) Power Flux Density pPFD to the received terminal;
b) Received power pR to the received terminal w
with
ith antenna effective aperture Aeff 10m 2 .
DO NO

c) Received antenna gain g R ;


T
d) Received ratio c n
Results:
esults:
a) Power Flux D Density
ensity by (8) and (9):
gT pT 2.50
pPFD 4,97.10 15 ,W / m 2 ;
T
4Sd 2
4S .(4.107 ) 2
PPFD 3  17  11  152 143dBW / m 2
DO

b) Received power pR by (13):


pR pPFD . Aeff 4.97.10 15.10 4.97.10 14 W
PR 4.97.1014 W 133dBW

c) Gain of receiving antenna g R by (10):


O (c / f ) 3.108 / 11.109 0.0273 ,
4S . Ae 4.3,14.10 125.6
GR 167467; GR 52,24dB
O 2
0,0273 2
7,5.10 4
d) Carrier-to-Noise Ratio
It can determinate noise power first
p N n k .t0 .bN 1,37.10 23.152.500.106 104,12.10 20 ,
PN 119,8 dBW .
Received power is PR C 4.97.10 14 W 133dBW ;

2
Mohamed Khedr, Ʌɟɤɰɢɹ: Satellite Communication Systems, http://webmail.aast.edu/~khedr

12
C
Carrier-to-Noise Ratio: 133  (119.8) 13.2dBW .
N

3. Link Budget

Y
The link budget determines transmitter itter power needed to obtain suffi-
cient strong signal in the receiver. The quality of the satellite link is estimated by the
Carrier-to-Noise Ratio in the receiving earth station or terms of energy per bit to

NO C P
noise density.

CO Y
Path noise is added to the signal at the uplink and downlink. Path noise is the
sum of additive noise effects such as noise caused by atmospheric gases, clouds, rain,

O
depolarization, surface emissions, or extra-terrestrial sources. Path losses are intro-

OP
duced in the uplink and the downlink signal paths. Path loss is the sum of signal

PY
power losses caused by effects such as gaseous
gaseous attenuation, rain or cloud attenuation,
scintillation loss, angle of arrival loss, or antenna gain degradation.
DO NO T C
The total system carrier-to-noise ratio, (c n) S , is determined by developing the
system equations for the total link, including
including the path degradation parameters.
The parameters used in the link calculations
calculations are shown in Figure 7.

nfNSR, pSR, gSR pST, gST


2 3
stelitte
dD
U

, fD
L
U,

,L
DO NO
,f

D
dU

T
1 4
pGT, gGT nfNGR, pGR, gGR
Transmit Receive
terminal terminal

used
Figure 7. The parameters used in the link calculations
T
The
T he communications satellite transponder is implemented in one of two gen-
eral types:
DO

1) the conventional frequency translation (FT) satellite


satellite, which receives the up-
link signal, amplifies, and then reformats and transmits the signal back to the ground
received station, and
2) the on-board processing (OBP) satellite,
satellite which utilizes on-board detection
and remodulation to provide two independent
independent communications links (uplink and
downlink). Because of that satellite link is assessed in two ways depending on the
type of transponder.

3.1. Frequency Translation (FT) Satellite


c
Figure 8 shows an example of the conventional frequency translation trans-
ponder. In the direct transponder, the uplink
upli frequency is converted to the downlink
frequency, and after one or more stages of amplificati
amplification, re-transmitted to the ground.
Signal degradations and noise introduced on the uplink are translated to the downlink,
and thee total performance of the syst
system will be dependent on both links.

13
1 1
2 IFA
2
up 3 3 down
converter 4 4 converter

multiplexer
demultiplexer
Ɇix 5 IFA 5 Ɇix
6

……...
6
reseiver
7

Y
fif 7
fup 8 8 fdwn PA
9 9
10 10
11 11
LO LO
12 12

NO C P
IFA

CO Y
Figure 8. An example of conventional
conventional frequency translation transponder
transpo

O
3.1.1. Uplink

OP
To calculate uplink it is starting at the
the transmit terminal (point 1, Figure 7).

PY
The eirp of the ground transmit terminal is:
eirp pGT .g GT , W , (38)
DO NO T C
The carrier power received at th thee satellite antenna (point 2) is
pGT .g GT .g SR
cSR , (39)
lUfs .lUad
where lUfs is the uplink free space path loss, a lUad is the uplink path loss, and gGT , g SR
are the transmit and receive antenna
antenna gains, respectively.
The noise power at the sate llite antenna, point (2), is
satellite
DO NO

1
nSR k .tU (1  ).bU  k .t SA .bU  k .290.(nf NSR  1).bU , (40)
T
lUad
where k is Boltzmann’s constant, bU is the uplink information bandwidth, t SA is the
satellite receiver antenna temperature, nf NSR is the satellite rece
receiver noise figure, and
tU is the mean temperature of the uplink atmospheric path.
T
The uplink carrier-to-noise ratio, at point (2), is given:
§c· cSR pGT .g GT .g SR
¨ ¸ . (41)
© n ¹U nSR ª 1 º
DO

lUfs .lUad .k .«tU (1  )  t SA  290.(nf NSR  1)».bU


¬ lUad ¼
This result (41) gives the uplink carrier-to-noise
carrier-to-noise ratio.

3.1.2. Downlink
The procedure is the same th at was used for the uplink.
that
The carrier power received at the re
received terminal (point 4) is
pST .g ST .g GR
cGR , (42)
lDfs .lDad
The noise power at the satellite
satellite antenna, (point 4), is
1
nGR k .t D (1  ).bD  k .tGA .bD  k .290.(nf NGR  1).bD . (43)
lDad
The downlink carrier-to-noise ratio, at point (4), is:

14
§c· cGR pST .g ST .g GR
¨ ¸ . (44)
© n ¹D nGR ª 1 º
lDfs .lDad .k .«t D (1  )  tGA  290.(nf NGR  1)».bD
¬ lDad ¼
This result (44) gives the downlink carrier-to-noise ratio.

Y
3.1.3. Determination the carrier-to-noise
-to-noise ratio of total link
important conditions specific to the FT
Consideration should be given to two important

NO C P
satellite:

CO Y
- the downlink transmits power, pST , for a frequency translation satellite will
contain both the desired carrier component, cST , and noise introduced by the uplink

O
OP
and by the satellite system itself, nST :

PY
pST cST  nST ; (45)
- since there is no on-board processing of the information signal, the satellite
DO NO T C
input carrier-to-noise ratio must equal the satellite output carrier-to-noise
carrier-to-noise ratio:
§c· §c· , (46)
¨ ¸ ¨ ¸
© n ¹ IN © n ¹OUT
that is to say that all noise introduced by the satellite system is accounted for by nf SR .
So, in terms of the link parameters
§c· cST cSR
¨ ¸ (47)
© n ¹U nST nSR
DO NO

Replacing nST in Equation (47) with the


the Equation (45) condition,
T
§c· cST cST 1
¨ ¸ ,
© n ¹U nST pST  cST pST
1
cST
T
consequently
consequently
1 pST
1 . (48)
§c· cST
¨ ¸
DO

© n ¹U
From (48) solving for cST , and next replacing cST in Equation (47) with the
Equation (45) condition:
pST §c· cST pST  nST
cST , ¨ ¸ (49)
1
1 © n ¹U nST nST
§c·
¨ ¸
© n ¹U
The (49) is transforming and solving for nST ,
§c· pST pST
¨ ¸ 1 , nST . (50)
© n ¹U nST §c·
1 ¨ ¸
© n ¹U
Next should calculate the necessary carrier power, which must be acceptably
the ground station (point 4) for overall link.
The desired carrier power received at the satellite antenna (point 4) is

15
cST .g ST .g GR
c'GR , (51)
lDfs .lDad
Replacing cST from (49) in (51) the result will be

Y
pST .g ST .g GR
c'GR , (52)
1
1 lDfs .lDad
§c·
¨ ¸

NO C P
© n ¹U

CO Y
consequently
cGR
c'GR , (53)

O
1
1

OP
§c·

PY
¨ ¸
© n ¹U
DO NO T C
The total noise power received on the ground, n'GR , will be the sum of the noise
introduced on the downlink, Equation (43), and the noise transferred from the uplink,
Equation (50), and after some transformation
cGR
n'GR nGR  . (54)
§c·
1 ¨ ¸
© n ¹U
The total carrier-to-noise ratio for the frequency translation transponder is then
DO NO

found as the ratio of


T
§c· c'GR
¨ ¸ . (55)
© n ¹6 n'GR
Replacing nn''GR from (54) and cc''GR from (53) in (55) can get the total carrier-to-
noise ratio
T
cGR
1
1
§c·
¨ ¸
DO

§c· © n ¹U
¨ ¸ (56)
© n ¹6 nGR 
cGR
§c·
1 ¨ ¸
© n ¹U
cGR §c·
After transforming (56) and allude that ¨ ¸ result for the FT satellite is:
nGR © n ¹D
§c· §c·
FD ¨ ¸ .¨ ¸
§c· © n ¹U © n ¹ D
¨ ¸ (57)
© n ¹6 §c· §c·
1 ¨ ¸  ¨ ¸
© n ¹U © n ¹ D

If both §¨ ·¸ !! 1 and §¨ ·¸ !! 1 , equation (57) reduces to


c c
© n ¹D © n ¹U
1 1 1
ª§ c · FD º ª§ c · º ª§ c · º
«¨ ¸ » | «¨ ¸ »  «¨ ¸ » (58)
¬«© n ¹6 ¼» ¬© n ¹U ¼ ¬© n ¹ D ¼

16
This result is usually acceptable for satellite link analysis, because §¨ ·¸ and
c
© n ¹D
§c·
¨ ¸ are generally much greater than 1.
© n ¹U

Y
noise density ratio of total link
3.1.4. Determination the carrier-to-noise
The total carrier-to-noise density, c n0 , can easily be shown to be of the same

NO C P
form as Equation (57)

CO Y
§c · §c ·
FD ¨¨ ¸¸ .¨¨ ¸¸
§c · © n0 ¹U © n0 ¹ D ,

O
¨¨ ¸¸ (59)
§c · §c ·

OP
© n0 ¹ 6 1  ¨¨ ¸¸  ¨¨ ¸¸

PY
© n0 ¹U © n0 ¹ D
1 1 1
ª§ c · FD º ª§ c · º ª§ c · º
DO NO T C
«¨¨ ¸¸ » | «¨¨ ¸¸ »  «¨¨ ¸¸ » , (60)
¬«© 0 ¹ 6 ¼» «¬© n0 ¹U ¼» ¬«© n0 ¹ D ¼»
n
where
§c · pGT .g GT .g SR
¨¨ ¸¸ ,
© n0 ¹U ª 1 º
lUfs .lUad .k .«tU (1  )  t SA  290.(nf NSR  1)»
¬ lUad ¼
§c ·
DO NO

pST .g ST .g GR
¨¨ ¸¸ .
ª º
T
© n0 ¹ D lDfs .lDad .k .«t D (1 
1
)  tGA  290.(nf NGR  1)»
¬ lDad ¼

3.1.5. Determination the ener


energy-per-bit
gy-per-bit to noise density
T
The ratio eb n0 is related to c n0 :
§ eb · §c· 1 §c·
¨¨ ¸¸ ¨¨ ¸¸ . ¨¨ ¸¸.Tb , (61)
© n0 ¹ © n0 ¹ rb © n0 ¹
DO

Inserting Equation (61) into Equation (59) the energy-


energy-per-bit to noise density
can be found:
§ eb · § eb ·
FD ¨¨ ¸¸ .¨¨ ¸¸
§ eb · © n0 ¹U © n0 ¹ D ,
¨¨ ¸¸ (62)
© n0 ¹6 §e · §e ·
1  ¨¨ b ¸¸  ¨¨ b ¸¸
© n0 ¹U © n0 ¹ D
1 1 1
ª§ e · FD º ª§ e · º ª§ e · º
«¨¨ b ¸¸ » | «¨¨ b ¸¸ »  «¨¨ b ¸¸ » . (63)
«¬© n0 ¹6 »¼ «¬© n0 ¹U »¼ «¬© n0 ¹ D »¼
Equations (62) and (63) give the probability
proba of error for the overall end-to-end
digital link.

3.2. The on-board processing (OBP) satellite


The on-board processing satellite utilizes on-board detection and remodulation
to provide two independent communications links (uplink and downlink). The infor-
17
mation signal on the uplink at a carrier frequency, fU , after passing through a low
noise receiver, is demodulated, and the baseband signal, at f BB , is amplified and en-
hanced by one or more signal processing techniques. The proceprocessed baseband signal
link, at the carrier frequency, f D , for transmission to
is then re-modulated on the downlink,

Y
the downlink ground terminal. Figure 9 shows an example of the on-board processing
satellite.

NO C P
CO Y
BASEBAND
De-
receiver PROCESSOR Modulator
modulator
fup Amplify
fbaseband fbaseband fdwnPA
Error correction

O
Coding

OP
LO Switching
LO

PY
...

Ɏɢɝ.. 9. The on-board processing transponder.


Ɏɢɝ
DO NO T C
compensated for by the on-board processing,
Degradations on the uplink can be compensated
and are not transferred to the downlink, consequently, satellites employing on-board
separate the uplink and downlink. Noise induced on the uplink
processing essentially separate
waveform is reduced to baseband and re-
does not degrade the downlink because the waveform
generated for downlink transmission.
DO NO

3.2.1 Uplink and Downlink for OBP satellite


The downlink carrier-to-noise ratio, c n D , or energy-per-bit to noise density,
T
eb n0 D , for an onboard processing satellite system
system is essentially independent of the
uplink carrier-to-noise ratio. Therefore the link equations (41) and (44) for c n U and
c n D previously developed for the frequency translation
translation transponde
transponder, are applicable
T
to the OBP satellite uplink and downlink.
OBP
§c· pGT .g GT .g SR
¨ ¸ . (64)
ª º
DO

© n ¹U 1
lUfs .lUad .k .«tU (1  )  t SA  290.(nf NSR  1)».bU
¬ lUad ¼
OBP
§c· pST .g ST .g GR
¨ ¸ . (65)
© n ¹D ª 1 º
lDfs .lDad .k .«t D (1  )  tGA  290.(nf NGR  1)».bD
¬ lDad ¼
Similarly, it can estimate satellite link by the ratio energy-per-bit to noise den-
sity.
OBP
§ eb · 1 pGT .g GT .g SR
¨¨ ¸¸ . (66)
© n0 ¹U rU ª 1 º
lUfs .lUad .k .«tU (1  )  t SA  290.(nf NSR  1)»
¬ lUad ¼
OBP
§e · 1 pST .g ST .g GR
¨¨ b ¸¸ . (67)
© n0 ¹ D rD ª 1 º
lDfs .lDad .k .«t D (1  )  tGA  290.(nf NGR  1)»
¬ lDad ¼
where rU and rD are the uplink and downlink data rates, respectively.

18
3.2.2 Composite OBP Performance
The overall composite link performance for the OBP satellite is described by
its bit error performance, or the probability of error, error PE . The overall error perform-

Y
ance of the on-board processing transponder onder will depend on both the uplink and
downlink error probabilities. A bit will be correct in the total link if either the bit is
correct on both the uplink and downlink, or if it is in error error on both links. The overall

NO C P
3
probability that a bit is correct, PCOR , is therefore

CO Y
PCOR (1  PU ).(1  PD )  PU .PD 1  ( PU  PD )  2 PU .PD , (68)
where PU is the probability of a bit error on the up uplink,
link, PD is the probability of a

O
bit error on the downlink; (1  PU ) is the probability of correct bit on uplink, (1  PD ) is

OP
PY
the probability of correct bit on downlink.
The probability of a bit error on the total link is
DO NO T C
PEOBP 1  PCOR PU  PD  2 PU .PD . (69)
The composite link probability of errorr will be dependent on the uplink and
downlink parameters and their impact on the eb n0 for each link. A specific modula-
tion must be specified to determine the relationship
relationship between the bit error probability
and the eb n0 for each link. For example, the procedure procedure for the determination of the
composite error performance for an on-bo on-board
ard processing transponder system will be
frequency-shiftt keying (BFSK) system with noncoherent
demonstrated for a binary frequency-shif
DO NO

detection. The bit error probab ility is given by Equ


probability ation (70) 4
Equation
T
1 § Eb ·
1  2 ¨¨© N0 ¸¸¹
PE e (70)
2
Equations (69) and (70) give the bit
bit error probability for the total link
T
1 § Eb · 1 § Eb · 1 ª § Eb · § Eb · º
1  2 ¨©¨ N0 ¸¹¸U 1  2 ¨©¨ N0 ¸¹¸D 1  2 «¬«¨©¨ N0 ¸¸¹U ©¨¨ N0 ¸¸¹D »»¼
PE e  e  e (71)
2 2 2
§ · § · §c· § c·
DO

e c 1
The ratio eb n0 is related to c n0 by (61): ¨¨ b ¸¸ ¨¨ ¸¸ . ¨¨ ¸¸.Tb , and ¨¨ ¸¸ can
© n0 ¹ © n0 ¹ rb © n0 ¹ © n0 ¹
c eirp.g R
be expressed as , therefore,
n0 l fs .lad .k .t
­ 1 §¨ EIRPU .§¨© g t ·¸ ·
¸
¹U ¸
§ EIRP .§ g · ·
¨ U ¨ t ¸ ¸
© ¹D ¸ 1 «
ª EIRP .§ g ·
U ¨ t ¸
© ¹U
EIRPU .§¨ g ·¸
© t ¹D
º
» ½
°  2.k .rU ¨¨ l fs .lad °
1 ¨
  «  »
¸ 2.k .rD ¨ ¸
§ eb · ° ¨ ¸ ¨
l fs .l ad
¸
2 k « rU .l fs . Lad
«¬
rD .l fs . Lad »
»¼ °
¨¨ ¸¸ 2. ln ®e © ¹U
e © ¹D
e ¾ (72)
© n0 ¹6 ° °
° °
¯ ¿

The result (72) is available for the OBP satellite with the binary frequency-shift
keying system.

3
Ippolito, Louis J., Satellite communications systems engineering: atmospheric effects, satellite link design, and system
Performance, 2008 JohnWiley & Sons Ltd, 396 p.
4
B. Sklar, Digital Communications – Fundamentals and Applications, Prentice Hall, Englewood Cliffs, NJ, 1988.

19
References
undamentals and Applications, Second Edition,
1. Bernard Sklar, Digital Communications: Fundam
Prentice-Hall, 2001.
2. Broadcom Corporation and Cisco Systems, Digital Transmission: Carrier-to-Noise Ratio,

Y
Signal-to-Noise Ratio, and Modulation Error Ratio.
http://www.broadcom.com/docs/general/Broadcom-Cisco_CNR-SNR-MER.pdf
3. Dennis Roddy, Satellite communications, McGraw-Hill Professional, 2001 - 569 p.

NO C P
4. Intuitive Guide to Principles of Communications, Link Budgets, www.complextoreal.com

CO Y
5. Ippolito, Louis J., Satellite communications systems engineering: atmospheric effects,
rmance, 2008 JohnWiley & Sons Ltd, 396 p.
satellite link design, and system Performance,
6. Mohamed Khedr, Lecture: Satellite Communication Systems,

O
http://webmail.aast.edu/~khedr

OP
7. RPC Telecommunications Ltd., http://www.satcom.co.uk/

PY
Communications Tutorial, E-mail: [email protected]
8. Silver J. P., Satellite Communications
DO NO T C
DO NO
T
T
DO

20
Satellite Communications Systems

Lecture 3.
Forward Error Correcting in Satellite Communications

Y
1. The necessity of channel coding

NO C P
2. Types of error control

CO Y
3. Concept of Hamming Weight and Hamming Distance
4. Reed Solomon code

O
4.1. Reed Solomon coding

OP
4.2. Reed Solomon decoding

PY
5. Interleaving
6. Convolution code
DO NO T C
6.1. Coder and coding.
6.2. State representation and state diagram
6.3. The Viterbi Decoding Algorithm
6.4. Implementation of the Viterbi Decoder
6.5. Recursive Systematic Convolutional Encoder
DO NO
T
T
DO

1
1. The necessity of channel coding.
The designation of Source Coding is to get a multiplexing and compressing in-
formation. The purpose of Channel Coding is decreasing of errors when signals are
transmitted by noisy channel. The capabilities of Channel Coding were investigated

Y
0.04.1916–24.02.2001) and written
by Claude Elwood Shannon (30.04.1916–24.02.2001) wr in “A mathemati-
1
cal theory of communication” .
A measure the quality of digital signals is Bit Error Rate (BER). The bit error

NO C P
rate or bit error ratio is the number of bit errors divided
divided by the total number of trans-

CO Y
ferred bits during a studied time interval. BER is a unitless performance measure, of-
ten expressed as a percentage number. The BER is often expressed as a function of

O
the Eb / N 0 , (energy per bit to noise power spectra
spectrall density ratio). Figure
Figure 1 is shows a

OP
comparison of typical coded versus uncoded error performance. If it is needed to pro-

PY
Eb
vide BER 1.105 , the uncoded signal needs a ratio 9.4 dB , but coded 1 / 7 - only
N0
DO NO T C
Eb
4.6 dB . The deference between
between values of ratio Eb N 0 coded and uncoded signal
N0
is called Coding Gain (G).
§ Eb · § Eb ·
G ¨¨ ¸¸  ¨¨ ¸¸ , dB (1)
© N 0 ¹U © N 0 ¹C
DO NO

BER
T
1.10-1

1.10-2
un
co
co

de
co

1.10-3
de

d
de

T
d1
d1

/7
/5

1.10-4

gain
DO

1.10-5

1.10-6
1 2 3 4 5 6 7 8 9 10 Eb/N0

Figure 1. Comparison of typical ceded versus uncoded error performance.

2. Types of error control.


There are two basic methods for error control:
- Error detection and retransmission utilizes parity bits to detect an error (parity
bits are redundant bits added to the data);
- Forward Error Correction (FEC) - by parity bits it can detect and correct the
errors.
By first method the receiver detect that an error has been made, but does not at-
tempt to correct the error, it requests the transmitter retransmits the information. The
first method required two-way link for dialdialog between the transmitter and receiver.

1
C. E. Shannon, A mathematical theory of communication, Bell Syst. Tech., 1948.

2
That technique is known as Automatic Repeat Request (ARQ). It can be realize by
three ways:
- stop and wait ARQ - the transmitter waits for acknowledgement of each
transmission before the next transmission; if some of the message is received with an

Y
error, the receiver responds with negativee acknowledgement and transmitter repeats
this message;
- continuous ARQ with pullback - both the transmitter and receiver work si-

NO C P
multaneously, the transmitter is sending messages and receiver is sending acknowl-

CO Y
edgement data; if some of the message is received with an error, the receiver re-
ledgement and transmitter retransmits all messages
sponds with negative acknowledgement

O
started with the corrupted message to thethe moment of the negative
negative acknowledgement;

OP
- continuous ARQ with selective repeat - this method is the same as the first,

PY
but the transmitter retransmits only the corrupted message.
Which ARQ procedure to choice is a tr trade-off
ade-off between the requirements for
DO NO T C
the efficient of the communication resources.
Therefore, there are developed methods for error correction by encoding the
digital signal (ERC error correction coding).
coding). ERC has already been used in all types
of satellite links. General of the various methods
methods of error correction is the addition of
information surplus, called a control feature (additional information) to the basic flow
of data through which some errors can be eliminated during signal reception. The re-
ceiving system detect and possibly correct errors caused by corruption from the
DO NO

channel. This is called Forward Error Correcting


Correcting (FEC). The purpose of FEC is to
T
improve the capacity of a transmission channel
channel by adding to the source data redun-
dant information. It is a process known as channel coding
coding.. Channel coding consists:
Reed Solomon coding;
coding;
Interleaving;
Interleaving
T
Convolution code.
code
Reed Solomon codes operate on multi-bit symbolssymbols rather than individual bits
like binary codes. They are a “block” coding
coding technique requiring the addition of re-
DO

dundant parity symbols to the data to enable


enable error correction. The block code oper-
processed as a single unit by both the encoder
ates on a block of bits. Each block is processed
and decoder. Using a preset algorithm, to a group of bits and it add a coded part to
make a larger block. This block is checked at the receiver. The receiver
r then makes a
decision about the validity of the received sequence.
Convolutional codes are referred to as continuous codes as they operate on a
certain number of bits continuously.
Interleaving has mitigating properties forfo fading channels and works well in
types of coding. Standard interleavers
conjunction with these two types interl scramble code bits
among multiple blocks so that they are not contiguous when transmitted; as a result,
corrupti are spread out, into more-random er-
any bursty errors caused by channel corruption
rors after deinterleaving.
Vi
For years, convolutional coding with Viterbi decoding has been the predomi-
nant FEC technique used in space communications, particularly
particul in geostationary sat-
ellite communication networks, such as VSAT (very small aperture terminal) net-
works. Then, convolutional coding with Viterbi decoding has begun to be supple-
3
mented in the satellite communications with Reed-Solomon coding as serially con-
nal coding. Typically, the information
catenated block and convolutional in to be transmit-
ted is first encoded with the Reed-Solomon on code, then with the convolutional code.
On the receiving end, Viterbi
rbi decoding is performed first,
fi followed by Reed-Solomon

Y
ed in most of the direct-broadcast satellite
decoding. This is the technique that is used
systems and in several of the newer VSAT products.
In 1993, Claude Berrou developed
veloped the turbo code, aand
nd now it is the most pow-

NO C P
erful forward error-correction systemss with a turbo code can
on code. Communication system

CO Y
approach the theoretical limit of channel
channel capacity, called Shannon Limit. The turbo
coder-decoder configuration must include some arrangement of at least two compo-

O
nent encoders that are separated by an interleaver.
interleaver. The interleaver in a turbo encoder

OP
serves a different purpose than interleavers used by other parts of a communication

PY
system. The interleaver in a turbo encoder is designed that the second
second encoder gets an
interleaved version of the same data block that went into the first encoder; thus, the
DO NO T C
second encoder generates an independent set of code bits.
The place of channel coding is between
between multiplexing and modulating process,
as shown in Figure 2.

video
audio TV coder

M
DO NO

video U f
audio TV coder
T
L
T PA
I
..................

P QPSK
RS Convolution
L interleaving
coder coding modulater
E
X
T
Channel coding
E
R
video
audio TV coder
DO

MPEG
coder

Figure 2. Transmitter digital sat TV.

3. Concept of Hamming Weight and Hamming Distance


The Hamming weight is the largest number of ones in a valid codeword.
Euclidean concepts such as lengths, angles
Ordinarily, distance is measured by Euclid
and vectors. In the digital world, distances
distan are measured between two binary words
by the Hamming distance.
distance. The Hamming distance is the number of disagreements
between two binary sequences of the same size. It is a measure of how apart binary
objects are.
Example 1: The Hamming distance between sequences A 001 and B 101 is d ( A, B) 1 .
The Hamming distance between sequences A 00101101 and B 10110101 is d ( A, B) 3 . The
Hamming weight of a sequence A 00101101 is 4; Hamming weight of a sequence B 10110101 is
5.
The Hamming distance can be search not only between two binary sequences,
but also between all binary words in the same code space. The comparison will give
4
different Hamming distances. The minimum number of symbols that differs the
words in the same code space is called the minimum Hamming distance. The number
of detected errors depending on the minimum Hamming distance.
t d min  1 , d min t t  1 , (2)

Y
i.e. to detect one error the code hass to contain the minimum
minimum Hamming distance d 2 ,
to detect two errors - d 3 , …
To correct the errors codes have to get more parity bits or symbols. For exam-

NO C P
ple, for a sequence of 6 bits, there are 6 different
different ways to get a 1 bit error and there

CO Y
6!
are 15 different ways we can get 2-bit errors ( 15 ). The number of errors that
2!.4!

O
can be correct is:

OP
d min  1

PY
t , d min t 2t  1 , (3)
2
DO NO T C
i.e. to correct one error the code has
has to contain the minimum
minimum Hamming distance d 3 .

4. Reed Solomon code


In 1960, Irving Reed and Gus Solomon published a paper in the Journal of the
Society for Industrial and Applied Mathematics.
Mathematics. This paper described a new class of
error-correcting codes that are now called Reed-Solomon (R-S) codes.
codes. Reed Solomon
codes are linear block nonbinary cyclic codes with symbols made up of m-bit se-
DO NO

quences, where m is any positive integer having a value greater than 2. R-S ((n, k)
T
codes on m -bit symbols exist for all n and k for which
m-bit
k  n  2m  2 , (4)
where k is the number of data symbols being encoded, and n is the total number of
code symbols in the encoded block, n  k 2t is the number of parity symbols.
T
For Reed-Solomon codes, the code minimum distance is given by 2
dmin = n - k + 1. (5)
If combine Equation (3) and (5) can be express
express the number of errors that can
DO

be correct
d min  1 n  k
t , (6)
2 2
nk nk
where is the largest integer not to exceed ; a Reed–Solomon code can cor-
2 2
rect up to half as many errors as there are redundant symbols added to the block.

2t = 16 parity
k=188 information symbols
symbols
Block of n=204 symbols

Figure 3. Block of RS (204,188) code - 204 symbols

information surplus about 8% and BER 104 y 1011 .


Reed Solomon codes have info
For example, RS (204,188) code for DVB systems uses 8 bits symbols, and blocks

2
Gallager, R. G., Information Theory and Reliable Communication, New York: John Wiley and Sons, 1968.

5
have a length 188 information symbols and 16 parity symbols, as it is shown in Fig-
ure 3.
Reed Solomon codes are based on finite fields, called Galois fields (GF)
with 2 m elements. Every finite field can be representing by a fixed length binary

Y
word. For any number p there exists a finite field GF ( p) that contains p elements. It
can extend to a field of p m elements, where m is a nonzero positive integer. The new
field is called an extension field of GF ( p) , and denoted by GF ( p m ) . GF ( p m ) contains

NO C P
as a subset the elements of GF ( p) . Symbols from the extension field GF ( p m ) are used

CO Y
in the construction of Reed-Solomon (R-S) codes.
The binary field GF ( p) is a subfield of the extension field GF ( p m ) . Besides the

O
numbers 0 and 1, there are additional unique elements in the extension field that will

OP
PY
be represented with a new symbol D . Each nonzero element in GF ( p m ) can be repre-
sented by a power of D . An infinite set of elements, F F,, is formed by starting with the
elements ^0 ,1, D ` , and generating additional elements
DO NO T C
elements by progressively multiplying
the last entry by D :
F ^0,1, D , D 2 , D 3 ,.., D j ,...` ^0, D 0 , D 1 , D 2 , D 3 ,.., D j ,...`. (7)
The condition that closes the set of field field elements under multiplication is char-
acterized by the irreducible polynomial shown below:
D (2 1)
1 0
m
DO NO

or
T
D (2 1)
1 D0.
m
(8)
field
Using this polynomial constraint, any fiel d element that has a power equal to or
greater than 2  1 can be reduced to an element with a power less than 2m  1 :
m
T
D (2 n )
D (2 1)
.D ( n1) D ( n1) .
m m
(9)
Thus, Equation (8) can be used to form the finite sequence F * from the infinite
sequence F
^0,1,D ,D ,D ,..,D ` ^0,D ,D ,D ,D ,..,D `
DO

2m  2
, D 2 1 , D 2 ,... 2m 2
, D 0 , D 1 , D 2 ,...
m m
2 3 0 1 2 3
F* (10)
From Equation (10) the elements of the finite field GF(2
GF(2m) are
GF (2 m ) ^0,D ,D ,D ,D ,..,D ` .
0 1 2 3 2m  2
(11)
Each of the 2 m elements of the finite field, GF ( p m ) , can be represented as a
distinct polynomial of degree (m - 1) or less where at least one of the m coefficients
of ai ( X ) is nonzero. The degree of a polynomial is the value of its highest-order ex-
ponent.
D i ai ( X ) ai ,0  ai ,1 X  ai , 2 X 2  ...  ai ,m1 X m1 , (12)
where i 0,1, 2, ..., 2m  2 .

Example 2: Table 1 shows the possible ni nine elements of field GF (23 ) , m 3 , where every
row contain values of coefficients ai ,0 , ai ,1 ɢ ai , 2 of Equation (12). Seven elements ^ai ` are differ
each other and zero D 0 , D 1 , D 2 , D 3 , D 4 , D 5 , D 6 , because from (8) D ( 2 1)
D ( 2 1) D0 .
m 3

6
Table 1. Mapping field elements in terms of basis elements for GF(8) with 1  X  X 3
Basic elements
0
X X1 X2

Y
0 0 0 0
D0 1 0 0

Elements of the field


D1 0 1 0
D2

NO C P
0 0 1

CO Y
D3 1 1 0
D4 0 1 1

O
D5 1 1 1

OP
D6 1 0 1

PY
D 7 =D 0 1 0 0
DO NO T C
One of the benefits of using extension field elements ^ai ` in place of binary
elements is the compact notation that fac ilitates the mathematical representation of
facilitates
nonbinary encoding and decoding processes. Addition of two elements of the finite
field is then defined as the modulo-2 sum of each of the polynomial coefficients of
equal powers
D i  D j (ai ,0  a j , 0 )  (ai ,1  a j ,1 ) X  ...  (ai ,m1  a j ,m1 ) X m1 (13)
DO NO

Table 2 shows some of primitive polynomials.


polynomials. A class of polynomials called
T
primitive polynomials define the finite fields GF ( p m ) .

Table 2. Some of primitive polynomials


m m
T
3 1 X  X 3 14 1  X  X 6  X 10  X 14
4 1 X  X 4
15 1  X  X 15
5 1 X 2  X 5 16 1  X  X 3  X 12  X 16
DO

6 1 X  X 6 17 1  X 3  X 17
7 1 X 3  X 7 18 1  X 7  X 18
8 1 X 2  X 3  X 4  X 8 19 1  X  X 2  X 5  X 19
9 1 X 4  X 9 20 1  X 3  X 20
10 1  X 3  X 10 21 1  X 2  X 21
11 1  X 2  X 11 22 1  X  X 22
12 1  X  X 4  X 6  X 12 23 1  X 5  X 23
13 1  X  X 3  X 4  X 13 24 1  X  X 2  X 7  X 24

First of them f ( X ) 1  X  X 3 defines finite field GF (23 ) . There are 23 8 ele-


ments in the field defined by f ( X ) . Now the roots of f ( X ) 0 must be found. The
familiar binary elements, 1 and 0, do not satisfy (are not roots of) the polynomial
f ( X ) 1  X  X 3 , since f (1) 1 and f (0) 0 (using modulo-2). A fundamental theo-
rem of algebra states that a polynom
polynomial of degree m must have precisely m roots,

7
consequently f ( X ) 0 has three roots, and if D is a root of the polynomial f ( X ) it is
possible to write the following:
1  D  D 3 0 , D 3 1  D 1  D , (14)
because of  1 1 in the binary field.

Y
Thus, D 3 is expressed as a weighted sum of D  terms having lower orders. In
fact all powers of D can be so expressed.
D 4 D .D 3 D .(1  D ) D  D 2 ,

NO C P
CO Y
D 5 D .D 4 D 2  D 3 1  D  D 2
D 6 D .D 5 D (1  D  D 2 ) D  D 2  D 3 1  D 2

O
D 7 D .D 6 D (1  D 2 ) D  D 3 1 D 0 . (15)

OP
PY
Therefore the eight finite field elements of GF (23 ) are
^0,D 0
, D 1 , D 2 , D 3 , D 4 , D 5 , D 6 `. (16)
DO NO T C
4.1. Reed Solomon coding
The generating polynomial for an R-S code in terms terms of the parameters n,
n, kk, t,
and any positive integer m ! 2 is
g ( X ) g 0  g1 X  g 2 X 2  ...  a2t 1 X 2t 1  X 2t . (17)
where n  k 2t is the number of parity symbols, and t is the symbol-error correcting
DO NO

capability of the code.


T
Since the generator polynomial is of degree 2 2t,, there must be precisely 2t
2 suc-
cessive powers of D that are roots of the polynomia polynomial.l. We designate the roots of g ( X )
as D 1 , D 2 , D 3 ,...,D 2t . It is not necessary to start with the root D ; starting with any power
of D is possible.
T
For example, there is the (7, 3) R-S code, t 2 . The generator polynomial in
terms of its 22t = n - k = 4 roots can be described, as follows:
g( X ) ( X  D ).(
).(XX  D 2 ).( X  D 3 ).( X  D 4 ) X 4 D 3 X 3  D 0 X 2 D1X  D 3
DO

g( X ) D 3  D1X  D 0 X 2  D 3 X 3  X 4 . (18)
R-S codes are cyclic codes and encoding in systematic form is analogous to the
binary encoding procedure. The information information message (a polynomial, m( X ) ) can be
n k
multiplied by X so that it is right-shifted n  k positions and then appending a par-
ity polynomial, p( X ) , by placing it in the leftmost n  k stages. Then it can divide
X n  k .m( X ) by the generator polynomial g ( X ) , which is written in the following form:
m( X ).x nk q( X ).g ( X )  p ( X ) , (19)
where q( X ) and p( X ) are quotient and remainder polynomials, respectively.
As in the binary case, the remainder p( X ) is the parity. Equation (19) can also
be expressed as follows:
p ( X ) m( X ).x n  k † g ( X ) . (20)
The resulting codeword polynomial, U ( X ) can be written as
U(X ) p( X )  m( X ). X nk . (21)

8
Example 3: There is a message that consist three ee symbols 010 110 111, and it has to be
coded by RS(7,3) code with the generator polynomial (18): g ( X ) D 3  D 1 X  D 0 X 2  D 3 X 3  X 4 .
First, according to table 1 these three symbols are D 1 , D 3 , D 5 . The information message

Y
polynomial is m( X ) D 1  D 3 X  D 5 X 2 , it has to multiply by X k X 4 . The result is
X 4 .m( X ) D 1 X 4  D 3 X 5  D 5 X 6 . Next, it has to divide this upshifted
upshifted message polynomial by the
generator polynomial (18) to get a parity polynomial, p ( X ) D 0  D 2 X  D 4 X 2  D 6 X 3 . Then,

NO C P
from Equation (21), the codeword polynomial is:

CO Y
U ( X ) D 0  D 2 X  D 4 X 2  D 6 X 3  D1X 4  D 3 X 5  D 5 X 6 .

O
The circuit to encode a symbol sequence in systematic form with the (n, k) R-S

OP
ynomial requires the implementation of a linear feedback
code with the generator polynomial

PY
shift register (LFSR) circuit. The linear feedback
feedback shift register is a dynamic memory
DO NO T C
of binary 0 and 1. The memory consist a number of cages that determines the mem-
ory. When in the most left stage enters a new symbol all next shift to the right, and
this one that is the rightmost go out of the register.
Figure 4 shows a circuit of LFSR forfor RS (7,3) code from example 3.
switch 1

D3 D1 D0 D3
DO NO

Register Register Register Register


T
A Q1 A Q1 A Q1 A Q1
To output
symbols
D Q4
+ D Q4
+ D Q4
+ D Q4
+ register
ENB ENB ENB ENB

2
010 110 111(D , D , D )
1 3 5

input message symbol 1


T
sequence switch 2

Figure 4. A linear feedback shift register of RS (7,3) code


DO

The encoder forms codewords in the steps, as follows:


1) Switch 1 is closed during the first k clock cycles to allow shifting the mes-
sage symbols into the (n  k )  stage shift register.
2) Switch 2 is in the position 1 during the first k clock cycles in order to allow
simultaneous transfer of the message symbols symbol directly to an output register (not
shown in Figure 4).
3) After 3rd clock cycle all
all message symbols are tran
transferred to the output reg-
ister, switch 1 is opened and switch
switch 2 is moved to the position 2.
4) The remaining (n  k ) clock cycles the parity symbols contained in the shift
register are moved to the output register.
5) The total number of clock cycles is equal to n , and the contents of the out-
put register is the codeword polynomial U ( X ) p( X )  m( X ). X nk , where p( X ) is the
parity polynomial and m( X ) the information message in polynomial form.

9
During the transfer time the rightmost symbol of the information sequence is
the earliest symbol, and the rightmost bit is the earliest bit. Table 3 shows the opera-
tional steps during the first k 3 shifts of the encoding circuit of Figure 4.

Y
Table 3. The operational steps to shift symbols in the register
ɜɯɨɞɧɚ ɩɨɫɥɟ- ɬɚɤɬ ɫɴɞɴɪɠɚɧɢɟ ɧɚ ɪɟɝɢɫɬɴɪɚ ɨɛɪɚɬɧɚ ɜɪɴɡɤɚ
ɞɨɜɚɬɟɥɧɨɫɬ
D1 D 3 D 5 0 0 0 0 0 D5

NO C P
D1 D 3 1 D1 D6 D5 D1 D 0 (D 1 † D 3 )

CO Y
D1 2 D3 0 D2 D2 D 4 (D 2 † D 1 )
D0 D2 D4 D6

O
- 3 -

OP
PY
Explanations:
D 5 .D 3 D 8 D 1.D 7 D 1..11 D 1 - first clock, first register;
DO NO T C
D 5 .D 1 D 6 - first clock, second register;
D 5 .D 0 D 5 .1 D 5 - first clock, third register;
D 5 .D 3 D 8 D 1.D 7 D 1.1 D 1 - first clock, forth register;
D 0 .D 3 † D 5 1.D 3 † D 5 D 2 (001) - second clock, first register;
D 0 .D 0 † D 6 1.1 † D 6 1 † 1 † D 2 D 2 (001) - second clock, second register;
D 0 .D 1 † D 1 1.D 1 † D 1 0 (000) - second clock, third register;
D 0 .D 3 1.D 3 D 3 (110) - second clock, forth register;
DO NO

.................................................................................................
T
register
Thus, after the third clock cycle, the regi ster contents are the four parity sym-
bols, D , D , D ,D . Then, switch 1 of the circuit is opened, switch 2 is moved to the
0 2 4 6
T
register are shifted to the output. The out-
position 2, and the parity symbols from the register
put codeword, U ( X ) , is:
U ( X ) D 0  D 2 X  D 4 X 2  D 6 X 3  D1X 4  D 3 X 5  D 5 X 6
(22)
DO

(100)  (001) X  (011) X 2  (101) X 3  (010) X 4  (110) X 5  (111) X 6

4.2. Reed Solomon decoding 3


The presence of noise in the communication
ommunication channel causes errors in the in-
formation and the received message message can be different from original message. For in-
stant, assume that during transmission the codeword (22) becomes corrupted so that
two symbols are received in error. Remember that the number nu of errors corresponds
to the maximum error-correcting capability of the code. The receiver will get a mes-
sage:
r ( X ) U ( X )  e( X ) , (23)
where e( X ) is a polynomial
polynomial of error.
For this example of seven-symbol codeword, the error pattern, e( X ) , can be
described in polynomial form as:

3
Bernard Sklar, Digital Communications: Fundamentals and Applications, Second Edition, Prentice-Hall, 2001.

10
6
e( X ) ¦ e .X
n 0
n
n
. (24)

Assume that corrupted symbols are forth


h and fifth, polynomial of error is:
e( X ) 0  0X  0X 2 D 2 X 3 D 5X 4  0X 5  0X 6

Y
(25)
000  000 X  000 X 2  001X 3  111X 4  000 X 5  000 X 6
received message will be (using modulo-2 on
According to Equation (23) the received

NO C P
Equations (22) and (25)):

CO Y
r ( X ) 100  001X  011X 2  100 X 3  101X 4  110 X 5  111X 6
, (26)
(
D 0  D 2 X  D 4 X 2  D 0 X 3  D 6 X 4  D 3 X 5D 5 X 6

O
because of 101 † 001 100 D 0 (forth symbol) and 010 † 111 101 D 6 ( fifth symbol).

OP
PY
In this example, there are four unknowns—two error locations and two error
values. Therefore, four equations are required for their solution.
DO NO T C
The decoding order is as follows:
- Syndrome Computation;
- Error Location;
- Error Values Computation;
- Correcting the Received Polynomial with Estimates of the Error Polynomial.

1) Syndrome Computation
The syndrome is the result of a verification on r ( X ) to determine whether r ( X )
DO NO
T
is a valid member of the codeword set. The syndrome S has value 0 when r ( X ) is a
member. Any nonzero value of S indicates the presence of errors. The syndrome S is
made up of n  k symbols, ^Si ` (i 1,..., n  k ) . Thus, for (7,3)RS code, there are four
symbols in every syndrome vector; their va values
lues can be computed from the received
T
polynomial, r ( X ) . It can be made by the structure of the code
U (X ) m( X ).g ( X ) . (27)
This structure shows that every valid codeword polynomial U ( X ) is a multiple
of the generator polynomial g ( X ) . Consequently, the roots of g ( X ) must also be the
roots of U ( X ) . Thus, each of the roots of g ( X ) should yield zero r ( X ) (received mes-
sage) only when it is a valid codeword. Any Any errors will give a nonzero result in one
or more of the computations. The comput utation of a syndrome symbol can be de-
scribed as follows:
Si r ( X ) X D r (D i ), i 1, 2, ..., n  k ( i 1,2,3,4 for example )
i (28)
In the examp
example, r ( X ) contain two corrupted by eerror symbols (Equation 25).
The computation of the four syndrome symbols is:
S1 r (D ) D 0  D 3  D 6  D 3  D 10  D 8  D 11
(29)
D 0  D 3  D 6  D 3 D 2  D1  D 4 D3
S2 r (D 2 ) D 0  D 4  D 8  D 6  D 14  D 13  D 17
(30)
D D D D D D D
0 4 1 6 0 6 3
D 5

11
S3 r (D 3 ) D 0  D 5  D 10  D 9  D 18  D 18  D 23
(31)
D0 D5 D3 D2 D4 D4 D2 D6
S4 r (D 4 ) D 0  D 6  D 12  D 12  D 22  D 23  D 29
(32)
D 0  D 6  D 5  D 5  D1  D 2  D 2 0

Y
The result shows, that received codeword contains errors.

2) Error Location

NO C P
CO Y
Suppose there are v errors in the codeword at location X J , X J ,..., X J . Then, 1 2 v

the error polynomial e( X ) shown in Equations (24) and (25) can be written as fol-

O
lows:

OP
e( X ) e j X J  e j X J  ...  e j X J . (33)

PY
1 2 v
1 2 v

The indices 1,2,..., v refer to the first, second, …, v th errors, and the index j re-
DO NO T C
codeword, each error value e jl and
fers to the error location. To correct the corrupted codeword,
its location X jl , ( l 1,2,..., v ) must be determined. An eerrror locator number can be
mark as E l D l . Next, by substituting D i into the received polynomial for i 1,2,...,2t
j

can be obtaining the n  k 2t syndrome symbols:


S1 r (D ) e j1 E1  e j2 E 2  ...  e jv E v
S2 r (D 2 ) e j1 E 12  e j2 E 22  ...  e jv E v2
DO NO
T
...
S 2t r (D 2t ) e j1 E 12t  e j2 E 22t  ...  e jv E v2t (34)
There are 2t unknowns ( t error values and t locations), and 2t 2 simultaneous
T
equations. However, these 2t simultaneous equations cannot be solved in the usual
way because they are nonlinear (as some of the unknowns have exponents). Any
technique that solves this systemsystem of equations is known as a Reed-Solomon decoding
algorithm.
algorithm
DO

If a nonzero syndrome vector (one or more of its symbols are nonzero) has
been computed, that signifies that an error has been received. Next, it is necessary to
learn the location of the error or errors. An error-locator polynomial, V ( X ) , can be
defined as
V ( X ) (1  E1 X )(1  E 2 X )...(1  E v X ) 1  V 1 X  V 2 X 2  ...  V v X v . (35)
1 1 1
roots of V ( X ) are
The roots , ,..., . The reciprocal values of the roots of V ( X )
E1 E 2 Ev
show the error-location numbers of the error polynomial e(X ) . Then, using autore-
gressive modelling techniques 4 [7], it can form a matrix from the syndromes, where
the first t syndromes are used to pr
predict the next syndrome.

4
Blahut, R. E., Theory and Practice of Error Control Codes (Reading, MA: Addison-Wesley, 1983)

12
ª S1 S 2 S3 ... St 1 St º ªV t º ª St 1 º
«S S S 4 ... St St 1 »» ««V t 1 »» « S »
« 2 3 « t 2 »
«... » «... » «... ». (36)
« »« » « »
« St 1 St St 1 ... S 2t 3 S 2t 2 » «V 2 » « S 2t 1 »

Y
« St St 1 St 2 ... S 2t 2 S 2t 1 »¼ «¬V 1 »¼ « S 2t »
¬ ¬ ¼
For the (7, 3) RS code, the matrix size is 2 × 2, and the model is written as:

NO C P
ª S1 S 2 º ªV 2 º ª S3 º
(37)

CO Y
« S S » «V » «S »
¬ 2 3 ¼¬ 1¼ ¬ 4¼
ªD 3 D 5 º ªV 2 º ªD 6 º

O
« 5 6 »« » « » (38)
»¼ ¬V 1 ¼

OP
«¬D D ¬0 ¼

PY
To solve for the coefficients V 1 and V 2 and of the error-locator polynomial,
V ( X ) (35), first can take the inverse of the matrix in Equation (38). The inverse rule
DO NO T C
of a matrix >A@ is:
cofactor > A@
Inv > A@ .
det > A@
Consequently,
ªD 3 D 5 º
» D D D D D 9  D 10 D 2 D3 D5
3 6 5 5
det « 5 6
«¬D D »¼
DO NO

ªD 3 D 5 º ªD 6 D 5 º
T
cofactor « 5 6 » « 5 3 »
«¬D D »¼ «¬D D »¼
ªD 6 D 5 º
« 5 3 »
ªD 3 D 5 º ¬«D D »¼ ªD 6 D 5 º ªD 6 D 5 º ªD 8 D 7 º ªD 1 D 0 º
T
Inv « 5 6 » D « 5 3 »
5
D « 5 3 »
2
« 7 5 » « 0 5 » (39)
¬«D D »¼ D5 «¬D D »¼ ¬«D D »¼ ¬«D D »¼ ¬«D D »¼
Verification: If the inversion was performed
performed correctly, the multiplication of the
DO

original matrix by the inverted matr ix should yield an identity matrix.


matrix
ªD 3 D 5 º ªD 1 D 0 º ªD 4  D 5 D 3  D 10 º ª1 0 º
« 5 6 »« 0 5 » « 6 11 » «0 1 » . (40)
«¬D D »¼ «¬D D »¼ «¬D  D D  D »¼ ¬ ¼
6 5

The coefficients V 1 and V 2 of the error-locator polynomial, V ( X ) , are solving


from Equation (38)
ªV 2 º ªD 1 D 0 º ªD 6 º ªD 7 º ªD 0 º
«V » « 0 5 »« » « 6» « 6» (41)
¬ 1¼ «¬D D »¼ ¬0 ¼ «¬D »¼ «¬D »¼
From Equations (41) and (35) it can represent V ( X ) :
V ( X ) 1  V1 X  V 2 X 2 1  D 6 X  D 0 X 2 (42)
The roots of V ( X ) are the reciprocals of the error locations. Once these roots
are located, the error locations will be known. Because of each of the field elements
can be root of V ( X ) (if it yields V ( X ) 0 ), it has to solve the V ( X ) polynomial with
each of the field elements:

13
V (D 0 ) D 0  D 6  D 0 D6 z 0
V (D 1 ) D 0  D 7  D 2 D2 z 0
V (D 2 ) D 0  D 8  D 4 D6 z 0
V (D 3 ) D 0  D 9  D 6 0 Ÿ error

Y
V (D 4 ) D 0  D 10  D 8 0 Ÿ error
V (D 5 ) D 0  D 11  D 10 D2 z 0

NO C P
V (D 6 ) D 0  D 12  D 12 D 0 z 0

CO Y
According to Equation (35), the error locations are at the inverse of the roots of

O
the polynomial. Therefore V (D 3 ) 0 indicates that one root exits at 1 El D 3 . Thus,

OP
E l 1 / D 3 D 4 . Similarly, V (D 4 ) 0 indicates that another root exits at 1 E l ' D 4 . Thus,

PY
E l ' 1 / D 4 D 3 , where l , l ' ,..., l v refer to the first, second, …, v th error. Therefore, in this
DO NO T C
example, there are two-symbol errors, so th at the error polynomial is of the following
that
form:
e( X ) e j X J  e j X J
1
1
2
2
(43)
Thus, the two errors were found at locations D 3 and D 4 , i.e. E1 D j 1
D 3 and
E2 D j D4 .
2

2) Error Values Computation


DO NO

calculate the error value in the location E1 D 3 and E 2 D 4 can be used any
To calculate
T
of the four syndrome equations (34).
(34). For instance, assume
assume that are S1 and S2
S1 r (D ) e1E1  e2 E 2
S2 r (D 2 ) e1E 12  e2 E 22 , (44)
T
where indexes of the errors are 1 and 2, be cause they are associated with locations
because
E1 D and E 2 D .
3 4
DO

These equations in matrix form are:


ª E1 E 2 º ªe1 º ª S1 º
« 2 2 »« » «S » (45)
¬ E1 E 2 ¼ ¬e2 ¼ ¬ 2¼
ªD 3 D 4 º ªe1 º ªD 3 º
« 6 8 »« » « 5» (46)
¬«D D »¼ ¬e2 ¼ «¬D ¼»
To solve for the error values e1 and e2, the matrix in Equation (46) is inverted
ªD 1 D 4 º ªD 1 D 4 º
« 6 3 » « 6 3 »
ªD 3 D 4 º «¬D D »¼ «¬D D »¼ ªD 1 D 4 º ªD 1 D 4 º
inv « 6 8 » D « 6 3 »
6
D « 6 3 »
1

«¬D D »¼ D D  D D D 4 D3 «¬D D »¼ «¬D D »¼


3 1 6 4
(47)
ªD 2 D 5 º ªD 2 D 5 º
« 7 4 » « 0 4 »
«¬D D »¼ «¬D D »¼
It can calculate the error value from Equations (47) and (46)

14
ªe1 º ªD 2 D 5 º ªD 3 º ªD 5  D 10 º ªD 5  D 3 º ªD 2 º
«e » « 0 4 » « 5» « 3 9 » « 3 2» « 5» (48)
¬ 2¼ «¬D D »¼ «¬D »¼ «¬D  D »¼ «¬D  D »¼ «¬D »¼

4) Correcting the Received Polynomial with with Estimates of the Error Polynomial

Y
Using Equations (43) and (48) thee estimated error polynomial is

e ( X ) e1 X J  e2 X J D 2 X 3  D 5 X 4
1 2
(49)

NO C P
The algorithm that can repair the received polynomial is

CO Y
  
U ( X ) r ( X )  e ( X ) U ( X )  e( X )  e ( X ) (50)
r ( X ) 100  001X  011X 2  100 X 3  101X 4  110 X 5  111X 6

O


OP
e ( X ) 000  000 X  000 X 2  001X 3  111X 4  000 X 5  000 X 6

PY

U ( X ) 100  001X  011X 2  101X 3  010X 4  110 X 5  111X 6
(51)
D 0  D 2 X  D 4 X 2  D 6 X 3  D 1 X 4  D 3 X 5D 5 X 6
DO NO T C
Thus, received information message th at is located in the rightmost
that rightmost k 3 sym-
bols is the same as transmitted 010 110 111 o D D D .
1 3 5

Advantages of RS codes:
- The RS code achieves the largest possible code minimum distance for any
linear code with the same encoder
encoder input and output block lengths.
- The RS code can be configured with longlong block lengths (in bits) with less de-
DO NO

coding time than other codes of similar lengths;


lengths; This is because the decoder logic
T
works with symbol-based rath er than bit-based arithmetic.
rather
- R-S Codes Perform Well Against Burst Noise.

5. Interleaving
T
Interleaving is a powerful technique that can be used in digital communications
systems to enhance the random error corr ecting capabilities of block codes such as
correcting
Reed-Solomon codes to the point that they can be effective in a burst noise environ-
DO

ment. Interleaving is helpful when


when burst errors are present.
The transmitted message can be received with errors because of system’s noise
environment. Errors which can be cl assified into three broad categories 5 :
classified
1) Random errors - the bit errors are independent of each other. Additive noise
typically causes random errors.
2) Burst errors - the bit errors occur sequentia
sequentially in time and as groups.
3) Impulse errors - large blocks of the data are full of errors.
Random errors occur in a channel when individual bits in the transmitted mes-
sage are corrupted by noise. They can be de described as some single erroneous bits in
communications channels is the main cause for ran-
the message. Thermal noise in communicati
designed specifically for correcting random er-
dom errors. Reed-Solomon codes are designe
rors. If the number of errors per
per data block is small, (up to 4% byte errors) they can
be totally corrected by Reed-Solomon codes.

5
Interleaving for Burst Error Correction, AHA products groop, Moscow, Idaho, USA, www.aha.com.

15
Burst errors are characterized as a series of adjacent erroneous bits in a signal.
They can be caused by fading in a communication channel and its can be difficult to
correct for some codes. However, block codes (in particular Reed-Solomon codes)
can handle burst noises effectively. The ability of a block code to correct burst errors

Y
depends upon the number of errors in the signal. Interleaving can be used to extend
the error correcting capability of the Reed-Solomon code.
Impulse errors can cause catastrophic failures in the communications system.

NO C P
In general, all coding systems fail to reconstruct
reconstruct the message in the presence of catas-

CO Y
trophic errors. However, certain codes like the
the R-S codes can detect the presence of a
catastrophic error by examining g the received message.

O
The interleaver subsystem rearranges the the encoded symbols over multiple code

OP
blocks. This effectively spreads out long burst noise sequences so they appear to the

PY
decoder as independent random
ndom symbol errors or shorter burst errors.
As it was shown in charter 4, (n, k) Reed Solomon codes are linear block non-
DO NO T C
binary cyclic codes with symbols, where k is the number of data symbols being en-
coded, and n is the total number of code sy mbols in the encoded block, n  k 2t is
symbols
the number of parity symbols. This encoded block of length n symbols is called a
d min  1 nk
codeword. The number of errors
errors that can be correct is t .
2 2
Suppose there are number of p corrupted by errors symbols in the block. If
p d t errors will be located and corrected. If bursts of length p ! t the error correcting
DO NO

code will fail. Let assume that t  p d t * i , where i is called a interleaving depth (it is
T
an integer):
it p , (52)
t
The Reed-Solomon (n,k((n,k)
n,k)) code can be used if we can
n,k can spread the burst error se-
T
quence over several code blocks so that each block has no more than t errors which
can then be corrected. This can be accomplished
accomplished using block interleaving.
DO

Example 4: There is RS (255,235) code with t 10 , i 5 . Without interleaver the data


bytes output from the Reed-Solomon encoder wouldwould appear as shown below in Figure 5, where
the parity check bytes.
bytes numbered 0 to 234 are the data bytes and bytes 235 to 254 are th

a0...a254 b0...b254 c0...c254 d0...d254 e0...e254

Figure 5. Data bytes output from the encoder for RS (255,235) code

The sequence of bytes enters in inte


interleaver RAM row by row to build an i * k
data table as shown in Figure 6.

16
Data bytes Parity bytes

codeword A a0 a1 a2 ... a234 a235 a236 ... a254

codeword B b0 b1 b2 ... b234 b235 b236 ... b254

Y
codeword C c0 c1 c2 ... c234 c235 c236 ... c254

codeword D d0 d1 d2 ... d234 d235 d236 ... d254

codeword E e0 e1 e2 ... e234 e235 e236 ... e254

NO C P
CO Y
Figure 6. Interleaver Table – Data Bytes are
are Input Row by Row and Output Column by
Column

O
OP
To interleave the data bytes its is sent to the output devise column by column

PY
as it is shown in Figure 7.
DO NO T C
a0 b0 c0 d0 e0 a1 b1 ... a254 b254 c254 d254 e254

Figure 7. Data Bytes Output from the Block Interleaver

6. Convolution code
convolutional
Possibilities of convoluti onal coding have been introduced
introduced by Peter Elias
(1923-2001) in 1955. Convolutional coding of fers an alternative to block codes for
offers
DO NO

transmission over a noisy channel (Convolutional


(Convolutional encoding with Viterbi decoding is a
T
Forward Error Correcting technique that is particularly suited to a channel in which
the transmitted signal is corrupted mainly by additive white gaussian noise). It has
been used in space communications and wireless communications. An advantage of
convolutional coding is that it ca
cann be applied to a continuous data stream as well as to
T
blocks of data.
Convolutional codes are commonly characterized
characterized by parameters: n, k, K, and r,
where
DO

n is a number of outputs bits;


k is a number of inputs bits;
K is a constraint length which equals the shift regist
register stages of the encoder,
i.e. the number of information bits in the register memory, which take a part in cod-
ing process;
r is a ratio of information bits to transmitted bits k / n , called a code rate; it is a
Smalle coding rate gives more powerful code due
measure of efficiency of the code. Smaller
to extra redundancy and less bandwidth efficiency.
The principle of “overlap” is extensivel
extensively used in convolutional codes. For ex-
ample, in a rate k / n convolutional code, each input is “overlapped” with several pre-
encoded symbols. It is not able to divide coded
vious inputs to produce each pair of encode
sequence into blocks as each coded symbol pair is inte interlocked with its neighbours.
Longer constraint lengths produce
produce more powerful codes, but the complexity of de-
coding operations increases exponentially
exponen with constraint length.

17
6.1. Coder and coding.
A convolutional encoder is a Mealy 6 machine, where the output is a function of
the current state and the current input. Figure 8 shows a ( n, k , m ) convolutional en-
coder.

Y
A A xor B
1 3 n B

input output
A B A xor B

NO C P
Output 0 0 0
k input

CO Y
codeword 1
information data 0 1
U=U1, U2,.., Un
1 2 3 ... m 1 0 1
Sfift register 1 1 0

O
2 ...

OP
PY
DO NO T C
Figure 8. ( n, k , m ) convolutional encoder

It consists of one or more shift regi sters, multiple XOR gates and an output
registers,
flows in to the shift register from one end and
switch. The stream of information bits flows
clock time. XOR gates are connected to some
is shifted out at the other end every clock
the output. There is no theoretical basis for the
stages of the shift registers to generate the
optimal location of the shift register stages to be connected to XOR gates. It is based
on an empirical approach. The location of stagesstages as well as the number of memory
DO NO

elements determines the minimum Hamming Hamming distance. The minimum Hamming dis-
T
tance determines the maximal number of correctable bits.
The output switch consecutively reads th thee outputs of XOR gagates and generates
the output codeword U i G ((m mi ) . Frequency clock switching depends on code rate
T
r k / n . Thus, the frequency clock switching has to be n times higher by comparison
with input clock frequency. In practical use there are systematic
systematic and non-systematic
convolutional codes depending polynomial. For example, if the gen-
depending on the generator polynomia
DO

erator polynomials g1 ( x) 1 or g 2 ( x) 1 for a rate 1/2 code, the information sequence


would appear directly in the output and the the code becomes systematic. Figure 9 shows
idea of systematic convolutional code, figure 10 shows encoder of non-systematic
convolutional code.
m(t) output u1

Multiplexer u
S1 D
m(t)
m(n) m(n-1) m(n-2) S2

Shift register
C ENB
synchronization

output u2

Figure 9. Coder of systematic convolutional code

6
George H. Mealy „A Method for Synthesizing Sequential Circuits". 1955, Bell Systems Technical Journal 34: pp.
1045–1079.

18
XOR
output u1

Double
speed
m input Multiplexer
output
information bit S1 D
u

Y
stream
m(n) m(n-1) m(n-2) S2
Shift register
C ENB
synchronization

output u2

NO C P
CO Y
XOR

Figure 10. Coder of non-systematic convolutional code

O
OP
One of the advantages of a systematic code is that it is simple to extract the in-

PY
formation sequence for a decoder.
The encoder shown in figure
figure 10 has a code rate r 1 / 2 . This means there are
DO NO T C
two output bits for each input bit. Here the output bits are transmitted one after an-
other, two per clock cycle. The two output can be represent as binary vectors >111@
and >101@ are known as the generating vectors or generating polynomials for the code:
g1 ( x) 1  x  x 2
g 2 ( x) 1  x 2 . (53)
where m(n) is a last entered bit, m(n  1) is a bit one clock time older than m(n) , and
DO NO

m(n  2) is a bit two clock times older than m(n) .


T
After every clock time two bits appear in output: the first from output u1 and
the second from output u2
u1 m(n) † m(n  1) † m(n  2)
T
u2 m(n) † m(n  2) . (54)
The correlation encoder can be described as a Mealy machine.ma The state is the
DO

two bits in the shift register. Let the first input bit to the shift register be m(n) 1 , and
let the flip-flops be reset to zero so m(n  1) 0 and m((nn  2) 0 . This state is
S0 00 >m(n  1), m(n  2)@ .
The output is
u1 m(n) † m(n  1) † m(n  2) 1 † 0 † 0 1 ,
u2 m ( n ) † m ( n  2) 1 † 0 1 ,
u >u1 , u2 @ 11
After the clock, state bit m(n  1) 0 will shift right into m(n  2) , the input
m(n) 1 will shift right into m( 1) , and the next state will be S1 10 >m(n), m(n  1)@ .
m(n  1)
In the first stage can enter m(n  1) 0 or m(n  1) 1 with equal probability.
If there is m(n  1) 0 the output is
u1 m(n  1) † m(n) † m(n  1) 0 † 1 † 0 1,
u2 m(n  1) † m(n  1) 0†0 0,

19
u >u1 , u2 @ 10 ,
if there is m(n  1) 1 the output is
u1 m(n  1) † m(n) † m(n  1) 1 † 1 † 0 0,
u2 m(n  1) † m(n  1) 1 † 0 1 ,

Y
u >u1 , u2 @ 01 .
In a clock time 3 the bit m(n  1) 0 out of register, the bit m((nn) 1 will be

NO C P
moved to right in the third register, the bit m(n  1) 0 or 1 will move in the second

CO Y
stage. In the first enters new bit m(n  2) , which can also be 0 or 1. The states in a
clock 3 are S 2 01 >m(n  1), m(n)@ or S3 11 >m(n  1), m(n)@ . The output can be

O
OP
If m(n  2) 0 , m(n  1) 0 :

PY
u1 m(n  2) † m(n  1) † m(n) 0 † 0 †1 1 ,
m ( n  2) † m ( n ) 0 †1 1,
DO NO T C
u2
u >u1 , u2 @ 11 ,
If m(n  2) 1 , m((nn  1) 0 :
u1 m(n  2) † m(n  1) † m(n) 1 † 0 † 1 0 ,
u2 m ( n  2) † m ( n ) 1 † 1 0 ,
u >u1 , u2 @ 00 .
DO NO

If m((nn  2) 0 , m((nn  1) 1 :
T
u1 m(n  2) † m(n  1) † m(n) 0 †1†1 0 ,
u2 m ( n  2) † m ( n ) 0 †1 1,
u >u1 , u2 @ 01 .
T
If m(n  2) 1 , m((nn  1) 1 :
u1 m(n  2) † m(n  1) † m(n) 1 † 1 † 1 1 ,
DO

u2 m ( n  2) † m ( n ) 1 † 1 0 ,
u >u1 , u2 @ 10 .

Example 5: Let the information data consist three bits m >101@ . The encoder structure is
the shift register are reset and the first
shown in Fig. 10. The stages of the fi bit received (clock time 1) is
m(n) 1 . So in the first cycle in the output will
u1 1 † 0 † 0 1 , u2 1† 0 1, u >u1 , u2 @ 11 .
After the clock a bit m((nn  1) 0 enters. The result is
u1 0 † 1 † 0 1 , u2 0†0 0, u >u1 , u2 @ 10 .
Then (at time 3) a bit m(n  2) 1 enters. The result is
u1 1 † 0 † 1 0 , u2 1†1 0 , u >u1 , u2 @ 00 .
After that a tail of two zero-bits is appended to data bits to clear out the memory after encod-
ing the last bit (all-zero); the result is two more pairs of output symbols:
t 4 : u >u1 , u2 @ 10 ,

20
t 5 : u >u1 , u2 @ 11 .
The output coded message is 11 10 00 10 11 .

L
The ratio Reff is called effective code rate, where L is the
n[( L / k )  ( K  1)]

Y
number of data bits. For example 5: L 3 , n 2 , k 1 , K 3 and
L 3 3
Reff which is less than r 1 / 2 .

NO C P
n[( L / k )  ( K  1)] 2[(3 / 1)  (3  1)] 10

CO Y
The effective code rate falls below code rate r because the added zero-bits do
not carry information.

O
OP
Example 6: Let the information data consist three bits m >101@ . The encoder structure is

PY
shown in Fig. 11. This is a coder with a constraint length K 3 and code rate r 1 / 3 .
The memory of the shift register is clean aand
nd the first bit received (clock time 1) is m(n) 1 .
DO NO T C
So in the first cycle in the output will
u1 1 † 0 † 0 1 , u2 1 † 0 1 , u3 0 † 0 0 u >u1 , u2 , u3 @ 110 .
After the clock a bit m((nn  1) 0 enters. The result is
u1 0 † 1 † 0 1 , u2 0 † 0 0 , u3 1 † 0 1 u >u1 , u2 , u3 @ 101 101..
When t 3 m(n  2) 1 enters. The output result is
u1 1 † 0 † 1 0 , u2 1 † 1 0 , u3 0 † 1 1 u >u1 , u2 , u3 @ 001 .
DO NO
T
m input output u1
information bit
stream output u2 u
T
m(n) m(n-1) m(n-2)
output u3

synchronization
DO

Figure 11. Coder with a constraint length K 3 and code rate r 1/ 3

After that a tail of two zero-bits is appended to data bits to clear out the memory after encod-
ing the last bit (all-zero).
t 4 : u1 0 † 1 † 0 1 , u2 0 † 0 0 , u3 1 † 0 1 u >u1 , u2 , u3 @ 101 .
t 5 : u1 0 † 0 † 1 1 , u2 0 † 1 1 , u3 0 † 1 1 u >u1 , u2 , u3 @ 111 .
The output coded message is 110 101 001 101 111 .

The coder is represented by set of generator polynomials, one for each of the n
modulo-2 adders. Each polynomial is of degree K  1 or less and describes the con-
nection of the shift register to that modulo-2 adder. The coefficients
coe can be either 1 or
0. The value 1 means that connection exists between the stage of shift register and the
modulo-2 adder. The value 0 means that connection does not exist. For instant, the

21
encoder shown in figure 10 can be representing by generator polynomials (53), the
presenting by generator polynomials
encoder shown in figure 11 can be representing
g1 ( x) 1  x  x 2
g 2 ( x) 1  x 2

Y
g 3 ( x) x  x2 . (55)
The information message from Example 5 can be representing by generator
polynomial m( x) 1  x 2 . The output u1 is formed by multiplication of g1 ( x) with m( x) :

NO C P
CO Y
g1 ( x).m( x) (1  x  x 2 ).(1  x 2 ) 1  x  x 3  x 4 ,
and

O
g 2 ( x).m( x) (1  x 2 ).(1  x 2 ) 1  x 4 .

OP
represent with coefficients:
These Equations can represent

PY
g1 ( x).m( x) 1  1.x  0.x 2  1.x 3  1.x 4 ;
g 2 ( x).m( x) 1  0.x  0.x 2  0.x 3  1.x 4 ;
DO NO T C
U ( x) (1,1)  (1,0).x  (0,0).x 2  (1,0).x 3  (1,1).x 4 ;
U G (m) 11 10 00 10 11 .
The result of U ( x) is the same as that in Example 5.
For Example 6:
g1 ( x).m( x) (1  x  x 2 ).(1  x 2 ) 1  1.x  0.x 2  1.x 3  1.x 4
g 2 ( x).m( x) (1  x 2 ).(1  x 2 ) 1  0.x  0.x 2  0.x 3  1.x 4
DO NO

g 3 ( x).m( x) ( x  x 2 ).(1  x 2 ) 0  1.x  1.x 2  1.x 3  1.x 4


T
U 110 101 001 101 111 .

Example 7: Let the information data consist three bits m >1011@ . The encoder structure is
shown in Fig. 10. This is a coder with a constraint length K 3 and code rate r 1 / 2 .
T
The work of the encoder to create a codeword can be presented in tabular form, as it is
shown below.
DO

ʋ of Input bit, Contents of the State, cycle i State, cycle u1 u2 u


cicle cycle i register i 1
000 S0 00 S 0 00 - - -
1 1 100 S0 00 S1 10 1 1 11
2 0 010 S1 10 S 2 01 1 0 10
3 1 101 S 2 01 S1 10 0 0 00
4 1 110 S1 10 S3 11 0 1 01
5 0 011 S3 11 S2 01 0 1 01
6 0 001 S2 01 S0 00 1 1 11

The output codeword is 11 10 00 01 01 11 .

6.2. State representation and state diagram


A convolutional encoder is a Mealy machmachine (finite-state machine), where the
output is a function of the current state and the current input. There are a finite num-
ber of states that the machine can encounter. The state consists of the smallest quan-
22
tity of information that with a current input bit can predict the output of the machine.
For a rate 1 / n convolutional encoder the state is represented by contents of ( K  1)
rightmost stages.
There are some
ome alternative ways of describing
ribing a convolutional code. It can be

Y
expressed as a state diagram, a tree diagram,, or a trellis diagram
diagram.
A State Diagram shows all possible present states of the encoder as well all the
possible state transitions that may occur. In order to create the state diagram, a state

NO C P
transition table may first be made, showing
showing the next state for each possible combina-

CO Y
tion of the present state and input to the decoder. For example it can draw the table
for the encoder shown in figure 10.

O
OP
Table 4: State Transition Table

PY
Next State if
Current State
Sta
input m 0 input m 1
DO NO T C
00 00 10
10 01 11
01 00 10
11 01 11

Table 5 shows the change in output for each combination of input and previous
output.
Table 5: Output Table
DO NO

Current out- Output simbols if


T
put input m 0 input m 1
00 00 11
10 10 01
01 11 00
T
11 01 10

The state diagram is created using the information from Table 4 and Table 5,
DO

as shown in Figure 12.

m = 0;u=00

00
1

S0
=1

m
;u

=0
=1

;u
m

=1
1

m = 1 ;u = 00
10 01
S1 S2
m = 0 ;u= 10
m

01
=1

=
;u

;u
=0

=0

11
1

S3

m = 1;u= 10

Figure 12. State Diagram (coder Ʉ=3, R 1/ 2 , Figure 10)

23
For each state, there can be two outgoing transitions; one corresponding to a
‘0’ input bit and the other corresponding to a ‘1’ input bit. The values inside the cir-
cles indicate the state (contents of ( K  1) rightmost stages). The values on the arrows
indicate the output of the encoder. A solid line corresponds to input 0, a dotted line –

Y
to input 1. The State Diagram m shows an entire picture the all possible states and their
output code words. The disadvantage of the state diagram is the lack of measurement
of time, i.e. it is not clear what state of the encoder in which time is obtained.

NO C P
A Tree Diagram shows the passage of time. In each cycle coding procedure is

CO Y
described in a passage in the branches from left to right as each branch shows the
codeword. If the input bit is 1, the codeword is found by moving to the next right and

O
below branch, if the input bit is zero - the
the right and above. Any input sequence can be

OP
which forms the corresponding code word. This
traced through a path in this diagram which

PY
path can also be called the code word path. path. For instance, Figure 13 shows a tree dia-
gram of coder, shown in Figure 10.
DO NO T C
00 S 0 00
00 S0 11
11 S 1 10
00 S0 01
10 S 2 11
11 S 1 00
01 S 3 01
00 S0 10
11 S 0 00
DO NO

10 S 2 11
T
00 S 1 10
11 S 1 01
01 S 2 11
01 S 3 00
10 S 3 01
10
0
T
1 00
00 S 0
11 S 0 11
10
11 S 1
DO

10 S 2 01
10 S 2 11
00 S 1 00
01
01 S 3
11 S 1 10
00
11 S 0
01 S 2 11
10
00 S 1
01 S 3 01
01 S 2 11
10 S 3 00
10 S 3 01
10

Figure 13. Tree Diagram of coder, shown in Figure 10

incr
The disadvantage is the progressive increase in the branches if information
message bits (input) are too much. After the
th first K branches (constraint length) tree
is repeated.
Trellis Encoding Diagram present the sequence of events in linear time in a
compact form. In constructing the chart along the horizontal axis has time clocks and
24
the vertical - all possible states. Figure 14 shows first two clocks of a trellis diagram
for the encoder given in Figure 10.
0;00
S0 S0
1;1
1

Y
ɜɯɨɞ m ; ɢɡɯɨɞ u
m=1

11
S1 S1

0;
m=0

00
1;
NO C P 0;
10

CO Y
1;
S2 S2

01
1
0 ;0

O
1;10

OP
S3 S3

PY
t=n t=n+1

Figure 14. Trellis structure for R=1/2, k=


k=33 convolutional code (first two clocks)
DO NO T C
In the trellis diagram, nodes correspond to the states of the encoder. From an
transitions to the next states for each
initial state ( S0 ) the trellis records the possible transitions
trellis diagram for the encoder given in Fig-
possible input pattern. Figure 15 shows a trellis
ure 10 and input message m 101100 .
0;00 0;00 0;00 0;00 0;00 0;00
S0 S0 S0 S0 S0 S0 S0
DO NO
1;

1;
1;

1;
1;
1;
11

11

11
11

11
11

1
1

0;1
1

0;1
0;1

0;1

S1 S1 S1 S1 S1 S1 S1
00

00

00

00
1;

1;

1;

1;
T 0;

0;

0;
0;

0;

10

10

10
10
10

S2 S2 S2 S2 S2 S2 S2
1;0
1; 0
DO

1;0
1;0

01

1;0
01

01

01
0;
1
1

1
1
0;

1
0;

0;

1;10 1;10 1;10 1;10


S3 S3 S3 S3 S3 S3 S3

t=1 t=2 t=3 t=4 t=5 t=6 t=7

Figure 15. Trellis Diagram for the encoder


encode given in Figure 10 and input message
m 101100

For this code, there are four possible en


encoder states. Each row of nodes is rep-
resenting the same state of the encoder at different time steps. The first row nodes
shows the state S0 00 , the second - S1 10 , the third - S 2 01 , and fifth - S3 11 .
Thus, the trellis diagram requires 2 K 1 nodes to represent 2 K 1 possible encoder states.
Each of the states can be entered from either of two pr preceding states. At every time
step there are two branches
anches output from each node wherwhere an input “0” to the encoder
corresponds to the upper branch and a “1” input to the lower branch. Since the initial
condition of the encoder is S0 00 , and the two memory flushing bits are zeroes, the
lines start out at S0 00 and end up at the same state. For example, the input sequence
25
1 0 1 1 0 0 corresponds to the particular path, shown with thick red lines, through the
trellis. The output codeword is 11 10 00 01 01 11 , and states are S 0 , S1 , S 2 , S1 , S3 , S 2 , S0 .

6.3. The Viterbi Decoding Algorithm

Y
There are two types of decoding algorithms
algorithms used with convolutional encoding:
sequential decoding and Viterbi rbi decoding algorithm. Sequential
Sequential decoding has the ad-
vantage that it can perform very well with long-constraint-length
long-constraint-length convolutional codes,

NO C P
but it has a variable decoding time. The ViterbiViterbi decoding algorithm
algorithm was developed by

CO Y
7
Andrew J. Viterbi in 1967. This algorithm perform performss a maximum likelihood decoding
(maximum likelihood detector). Viterbi decoding has the advantage advantage that it has a fixed

O
decoding time and it has good performance in hardware. Disadvantage is exponential

OP
growth of its computational requirements as a function of the constraint length. In

PY
limited to constraint lengths of K 9 or less.
this reason, it is usually limited
The algorithm includes calculating a di stance between received signal at time
distance
DO NO T C
ti , i 1,2,3,... and all trellis paths entering each state at time ti . The metric of calculat-
ing is the Hamming distance between the received received channel symbol pair and the all
possible channel symbol pairs. The Hamming Hamming distance is computed by counting how
many bits are different between the received received channel symbol pair and the possible
channel symbol pairs (see part 3). The re sults can be zero, one, ... The Hamming dis-
results
tance values is computing at each time inst ant for the paths between the states at the
instant
previous time instant and the states at the current time instant are called branch met-
DO NO

rics. When the encoding process is presented with trellis diagram it shows that the
T
coded output word is formed as a path through through the states of the encoder at any clock
time linear in time. The decoder receives th thee sequence of bits of the codeword and
must determine the path through the states that will determine the decoded sequence
T
of bits. Since it is unknown whether the recei ved sequence without error,
received e the path in
trellis diagram is chosen according to the smallest Hamming distance.
Figure 16 shows how to choice the path in trellis diagram according to the
smallest Hamming distance measured in every every clock time. Suppose the received bits
DO

have an error so instead of 11 10 , one receives 11 11 . The lines start out at S0 00 and
according to two possible outputs (00 and 11) the path can only go through state
S 0 00 or state S1 10 . Suppose at t 1 , it is received 11. The only possible channel
symbol pairs that could have received are 00 and 11. The Hammi Hamming distance between
11 and 11 is zero. The Hamming distance between 11 and 00 is two. The Hamming
distance between the received input and the bbits for the transition is shown in box.
The choice is S0 o S1 because of less Hamming distance. The next iinput has an error.
Possible paths, 10 or 01, are at Hamming distance 1. At t 2 it can going from S3 to
state S3 (Hamming distance is 1) or from S3 to state S 2 (Hamming distance is 1, too), or
from S 2 to state S1 (Hamming distance is 0) and from S 2 to state S0 (Hamming distance
is 2). Thus at t 1 the proper path was not obvious, at t 2 , the choice is clearer. The
choice is a path through the trellis based on the path Hamming distance or path metric,

7
Viterbi A. J., Error Bounds for Convolutional Codes and an Asymptotically Optimum Decoding Algorithm", IEEE
Transactions on Information Theory, Volume IT-13, pages 260-269, April, 1967.

26
which is the sum of the Hamming distances as one steps along a path through the trel-
lis. The path S0 o S1 o S 2 o S1 has a Hamming distances sum equal to 1. The Ham-
ming distances sums of other paths are higher then this one. At t 3 it can going from
S1 to state S3 (Hamming distance is 0) or to S 2 (Hamming distance is 2). Thus, the

Y
choice is going according to minimum Hamming
mming distance in every clock time.
Transmitted
11 10 00 01 01 11 codeword
error
Received

NO C P
11 11 00 01 01 11
sequence

CO Y
0;00 2
S0 S0 S0 S0 S0 S0 S0
1;
11

Hamming

O
0

distance

1 2

OP
0
0;1
S1 S1 S1 S1 S1 S1 S1

PY
0;1

2
0

00
00

1;
1;
0;

0;
10

10
DO NO T C 1

2
1;0
S2 S2 S2 S2 S2 S2 S2

1
0

0
1
1;0

01
01

0;
1

0;
1

1;10 1 1;10 2
S3 S3 S3 S3 S3 S3 S3

t=0 t=1 t=2 t=3 t=4 t=5 t=6


0 Decoded
1 0 1 1 0
word

Figure 16. To choice the path in trellis diagram according to the smallest Hamming distance
DO NO
T
Figure 17 illustrates how to choice the path in trellis diagram according to the
smallest sum of the Hamming distances
distances that is called path metric.
Transmitted
11 10 00 01 01 11 codeword
error
T
Received
11 11 00 01 01 11 sequence
5
0;00 2 0;00 1 0;00 1 0;00 2
S0 S0 S0 S0 S0 S0 S0
1;

1
11
1;

1;
1;
DO

11
11

11
1

1
0

1 1
2

0
1 1
1
0;1

0;1

S1 S1 S1
1

S1 S1 S1 S1
0;1

3
0;1
1

1
0

2
0

00
1;
00

00
1;
1;
0;

1;
0;
0;

0;
10

10
10

10
1;0

2
1

S2 S2 S2 S2 S2 S2 S2
0

4
0
1

0
1;0
1;0

1;0
10
01

01

01
1

0;
1

1
0;

0;

0;
0
1

1;10 1 1;10 2 1;10 2 1;10 1 4


S3 S3 S3 S3 S3 S3 S3

t=0 t=1 t=2 t=3 t=4 t=5 t=6


Decoded
1 0 1 1 0 0
word

Figure 17. The choice the path according to the smallest sum of the Hamming distances
(path metric)

At t 6 , one path has a total distance of 1 from the input data. The others have
a distance of 3, 4 or 5. Thus the most likely path is S 0 , S1 , S 2 , S1 , S3 , S 2 , S0 with a path

27
distance of 1, and the corresponding output decoded word is 101100 . In decoders
where the input is an analog signal, the distance between the actual and expected
voltage may be measured, and the sum of the squares of the errors might be used for
the branch metric.

Y
The minimal path metric is the rule that the Viterbi decoder exploits to recover
the original message. It is the maximum-likelihood path.

NO C P
6.4. Implementation of the Viterbi Decoder

CO Y
A Viterbi decoding algorithm consists of the three major parts, shown in Fig-
ure 18:

O
1. Branch metric calculation – calculation of a distance between the input pair

OP
of bits and the other possible pairs (“00”, “01”, “10”, “11”).

PY
2. Path metric calculation – for every encoder state, calculate a metric for the
minimum metric) ending in this state.
survivor path (a path with the minimum
DO NO T C
3. Traceback (survivor path decoding) – it is necessary for hardware imple-
mentations that don't store full information about the survivor paths, but store only
survivor path is selected from the two.
one bit decision every time when one survivor
Received Branch metric Path metric Traceback Decoded
sequence calculation calculation word

Figure 18. The major parts of the Viterbi decoding algorithm


DO NO
T
The Branch metric unit (BMU) receives input data from from the channel and com-
putes a metric for each state and input combination. Branch metric calculation is dif-
ferent for hard decision and soft decision decoders. For a hard decision decoder, a
branch metric is a Hamming distance betwee n the received pair of bits and the
between
T
“ideal” pair. Therefore, for every input pair a branch metric can take values of 0, 1
and 2. For a soft decision decoder, the received code words words are quantised into differ-
ent levels according to the signal strengt strengthh then the BMU maps the levels of code
words into BMs according to their likelihood. For a soft decision decoder, a branch
metric is measured usi ng the Euclidean distance:
using
Bm ( x  x0 )  ( y  y0 ) 2 ,
2
(56)
where x is the first received bit in the pair, y – the second, x0 and y0 – the “ideal”
values.
Path metric is calculated by a number of un units called “Add-Compare-Select”
(ACS). The ACS unit adds the current metric to the accumulated metric for each path
and determines the least metric
metric for each state of the tre trellis. The ACS retrieves the ac-
cumulated metric from the register register files, and then adds th
the current metric. The result
is stored back in the register files. This procedure is rep repeated for every encoder state.
- Add – a new value of the state metrics has to be computed at each time in-
stant; for a given state are known two states on the previous step which can move to
co
this state, and the output bit pairs that correspond to these transitions. To calculate
new path metrics, it has to add the previous prev path metrics with the corresponding
branch metrics, i.e. the state metrics have to be updated every clock cycle.

28
- Compare and select – There are two paths, ending in a given state. One of
them (with greater metric) is rejected.
As there are 2 K 1 encoder states, we have 2 K 1 survivor paths at any given time.
The traceback unit (TBU) traces back the trellis after a block of data (deter-

Y
ocessed by the ACS. First, the TBU estab-
mined by the trace back length) has been processed
lishes an optimal path by starting from thee node of minimum metric and traces back
the path in the trellis all the way to the beginning of the trellis diagram. Then, the

NO C P
original data is determined.

CO Y
6.5. Recursive Systematic Convolutional Encoder

O
The recursive systematic convolutional (RSC) encoder is produced from the

OP
nonrecursive nonsystematic (conventional) convolutional encoder by feeding back

PY
one of its encoded outputs to its input. Figure 19a,b shows an example of conven-
recursive systematic convolutional encoder.
tional convolutional encoder and recursive
DO NO T C
MF(X)
F(X)
F(X)

M(X) e e e
M(X) M0(X) e e e
e(n) e(n)
(n-1) (n-2) (n-...) (n-1) (n-2) (n-...)

U(X) U(X)
DO NO

G(X))
G(X G(X)
T
a) b)
convolutional encoder and recursive systematic convo-
Figure 19. Example of conventional convolutional
lutional encoder.
T
These encoders are represented by: M ( X ) is a polynomial of information mes-
sage; U ( X ) is a coded message (word); G ( X ) is a nonrecursive generator polynomial;
DO

F ( X ) is a feedback polynomial. The output transfer


transfer function for the encoder, shown
in Figure 19a, is
U ( X ) M ( X ).G( X ) , (57)
for the recursive encoder
GR ( X ) U ( X ) / M ( X ) , (58)
M0(X ) M (X )  M F (X ) , M F (X ) M 0 ( X ).F ( X ) ,
M0(X ) M ( X )  M 0 ( X ).F ( X ) o M ( X ) M 0 ( X )[1  F ( X )] , U ( X ) M 0 ( X ).G ( X )
From Equations (57) and (58) the recursive polynomial is
GR ( X ) U ( X ) / M ( X ) G ( X ) /[1  F ( X )] , (59)
i.e. the recursive polynomial depends on the nonrecursive generator polynomial G ( X )
and the feedback polynomial F ( X ) .
It has been proven that the feedback polynomial F ( X ) has to be a primitive
polynomial as a condition for stable operation of the recursive encoder.

29
Advantages of the recursive systematic convolutional encoder (the positive ef-
fect of the feedback) are:
- Reducing the number of states of the encoder,
encoder which increases the efficiency
of decoding algorithm, for example, if thee degree of the nonrecursive generator poly-
nomial G ( X ) is p , the degree of the feedback polynomial F ( X ) is q and q  p , af-

Y
ter division the degree of the recursive polynomial
polynomial decreases, which
which reduces the con-
straint length of recursive code; this allows for synthesis of recursive code with a

NO C P
small number of states and simplified decoding algorithm;

CO Y
- Increasing the average distance between output code sequences (increasing
the code Hemming weight), which achieves
achieves better results for error correction.

O
OP
PY
References
DO NO T C
1. Bernard Sklar, Digital Communications: F undamentals and Applications, Second Edi-
Fundamentals
tion, Prentice-Hall, 2001.
2. Berrou C., Glavieux A., Thitimajshima P., NearNear Shannon Limit Error-Correcting Coding
and Decoding: Turbo Codes // Proc. of the Intern. Conf. on Commun (Geneva, Switzerland). May
1993, pp.1064–1070.
3. Berrou C., Glavieux A., Near Optimum ErrorError Correcting Coding and Decoding: Turbo-
Codes, IEEE Trans. On Comm., Vol. 44, No. 10, October 1996.
4. Blahut, R. E., Theory and Practice of Error Control Codes, MA: Addison-Wesley, 1983.
DO NO

5. C. E. Shannon, A mathematical theory of communication, Bell Syst. Tech., 1948.


T
6. Dennis Roddy,
Roddy, Satellite communications, McGraw -Hill Professional, 2001 - 569 p.
McGraw-Hill
7. Fred Daneshgaran, Massimiliano Laddomada, and Marina Mondin, High-Rate Recursive
Convolutional Codes for Concatenated Channel Codes, IEEE Transactions on Communications,
Vol. 52, No. 11, november 2004.
8. Fred Ma, John Knight, Convolution Codes, http://read.pudn.com/
http://read.pudn.com/, 2001.
T
9. Forney G., D., The Viterby algorithm. IEEE, vol. 61, n. 3, Marsh, 1978, pp. 268-278.
10. Gallager, R. G., Information Theory aand
nd Reliable Communication, New York: John
Wiley and Sons, 1968.
11. Gérard Maral,
Maral Michel Bousquet,
Bousquet, Satellite communications systems: systems, techniques,
DO

Wiley and Sons, 2002 - 757 pp.


and technology, John Wiley
12. George H. Mealy „A Method for Synthesizing
Synthesizing Sequential Circuits". 1955, Bell Systems
Technical Journal 34: pp. 1045–1079.
Coding Method Using Error Correcting Codes.
13. Imai H., Hirakawa S., A New Multilevel Coding
IEEE Trans. Info Theory, vol. IT-23, n. 3, pp. 371–377, May 1977.
14. Intuitive Guide to Principles of Communications,
Communications, Coding Concepts and Block Coding,
www.complextoreal.com
15. Interleaving for Burst Error Correction, AHA products groop,
gr Moscow, Idaho, USA,
www.aha.com.
16. International Telecommunications Union, www.itu.int.
17. Ippolito, Louis J., Satellite communications systems engineering: atmospheric effects,
Perform
satellite link design, and system Performance, JohnWiley & Sons Ltd, 2008, 396 p.
18. Mealy, George H., A Method for Synthesizi
Synthesizing Sequential Circuits, Bell Systems Tech-
nical Journal 34,1955: pp. 1045–1079.
19. Michael Kolawole,
Kolawole, Satellite communication engineer
engineering, Marcel Dekker, 2002, 263 p.
20. RPC Telecommunications Ltd., http://www.satcom.co.uk/.
21. Soleymani M. R., Yingzi Gao, Vilaipornsawai U., Turbo coding for satellite and wire-
less communications. Kluwer Academic Publishers, Dordrecht. 2002. 214 pp.

30
22. Stewart Robert W., Daniel Garsia-Alis, Concise DSP Tutorial from Digital Communica-
tions: Fundamentals and Applications, Blue Box Multimedia, 2001, http://www.DSPedia.com
23. Viterbi A. J., Convolutional codes and their performance in communication systems,
IEEE Trans. Commun., vol. 10, pp. 751–772, Oct. 1971.
24. Viterbi A. J., Error Bounds for Convolutional Codes and an Asymptotically Optimum

Y
Decoding Algorithm", IEEE Transactions
actions on Information Theory, Volume IT-13, pages 260-269,
April, 1967.

NO C P
CO Y
O
OP
PY
DO NO T C
DO NO
T
T
DO

31
Satellite Communications Systems

Lecture 4.

Y
Multiple Access in Satellite Communications
1. Introduction of Multiple Access in Satellite Communications
2. Frequency Division Multiple Access

NO C P
Access with PCM/TDM/PSK application
2.1. Frequency Division Multiple Access

CO Y
Access with PCM/SCPC/PSK application
2.2. Frequency Division Multiple Access
3. Time Division Multiple Access

O
3.1. Time Division Multiple Access
Access with PCM/TDM/PSK application

OP
PY
3.2. TDMA Frame Efficiency
3.3. TDMA capacity
DO NO T C
3.4. Switching in satellite TDMA
4. Code Division Multiple Access
Sequencee Spread Spectrum
4.1. Direct Sequenc
4.2. Frequency Hopping Spread Spectrum.

1. Introduction of Multiple Access in Satellite Communications


A multi-user system achieves a specific point in the capacity region depending
DO NO

on how the multi-user channel is shared by the users, which depends on the multiple
T
access technique or Multiple Access (MA). It is the last technique before signal
transmitting.
Satellite links are designed to provide desired link availability for average
conditions. Satellite Multiple Access
Access techniques interconnect ground stations through
T
multiple satellite transponders. The goal is optimizing some of system parameters
such as power efficiency; spectral efficiency and etc. These techniques are applicable
to both fixed and mobile users. The satellitesatellite transponder mamay have different
DO

configurations, depending on the application and the satellite payload design.


basicc multiple access configurations 1 .
Figure 1 illustrates four basi
The first configuration is single channel
channel per carrier and single carrier per
transponder (a). Single baseband channel modulate an RF carrier. carri The baseband
channel could be analog (voice or video) or a digital (data, voice, or video).The
modulation could be analog (amplitude or frequency modulation), or digital
(frequency shift keying or various forms of phase shift keying). The second
ca
possibility is multiple channels per carrier and multiple carriers per transponder (b).
am
To avoid intermodulation noise, the final amplifier in the transponder is usually
operated in a power backoff mode. The next case (c) shows that multiple baseband
channels are multiplexed onto a single data stream before carrier modulation
(multiple channels per carrier, single carrier per transponder). The last case consists

1
Ippolito, Louis J., Satellite communications systems engineering : atmospheric effects, satellite link design, and
system Performance, 2008 JohnWiley & Sons Ltd, 396 pp.

1
of multiple multiplexed basebandnd channels modulating multiple RF carriers, with the
multiple carriers per single transponder (d). This case also requires operating in a
power backoff mode to avoid intermodulation on noise. Cases (a) and (c) is called single
carrier per transponder. The final amplifierr can operate in full power, and provide

Y
high power efficiency. When configuration is multiple carriers per transponder (b and
resulting in lower power efficiency in
d) power backoff can be several dB, resulting
comparison with cases (a) and (c).

NO C P
CO Y
BBC carrier
BBC carrier BBC carrier
BBC carrier
ɚ) b)

O
OP
BBC
BBC carrier

PY
BBC
BBC
BBC BBC carrier
BBC carrier BBC
DO NO T C
BBC
BBC
BBC carrier
BBC
c) d)

BB – Baseband channel;
Carrier – Modulated Radio Frequency Carrier;
Trans ponder.
– Satellite Transponder.

Figure 1. Illustration of the four basic multiple access configurations


DO NO

categorized into three mainly


The satellite multiple access methods can be categorized
T
three conventional techniques:
x Frequency Division Multiple Access (FDMA);
x Time Division Multiple Access (TDMA);
x Code Division Multiple Access (CDMA).
T
FDMA system separates multiple carriers in the transponder by frequency. The
transmissions can be analog or digital, or combinations of both. TDMA system
separates the multiple carriers by time in the transponder, presenting only one carrier
DO

transponder. TDMA is most practical for


at any time to the transponder. fo digital data only, because
the transmissions are in a burst mode to provide the time division capability. CDMA
separation As the most complex
is a combination of both frequency and time separation.
several levels of synchronization at both the transmission
technique, CDMA requires several
di
and reception levels and it is implemented for digital data only. CDMA offers the
highest power and spectral efficiency operation of all three techniques.
On the base of these three fundamental techniques are developed some
which are putting into practice:
secondary access techniques which
9 Demand Assigned Multiple Access (DAMA) - changes signal configuration
FD
to respond to changes in user demand. FDMA or TDMA networks can be operated as
an assigned-on-demand DAMA network. CDMA is a DAMA network by design,
because it is a random access system by its implementation.
9 Space Division Multiple Access (SDMA) - is a promising multiple access
technology for improving capacity by the spatial filtering capability of adaptive

2
antennas. It spatially separated
rated physical links by different
differe antenna beams, cells,
sectored antennas, signal polarization, etc. It is employable with any of the three
basic multiple access techniques. s. SDMA is an essential element
el of mobile satellite
networks, which employ multibeam satellites and it can be applied to all other

Y
multiple access schemes.
9 Satellite Switched TDMA (SS/TDMA)(SS/TDMA) - employs sequenced beam
switching to add an additional level of multiple access in a frequency translation

NO C P
CO Y
satellite. The switching is accomplished at radio
radio frequency (RF) or at an intermediate
frequency (IF).
9 Orthogonal frequency division division

O
division multiple access
access (OFDMA) - a

OP
special form of multicarrier modulation, can be used for multiplexing for multiple

PY
users. An OFDMA system is defined as one in which each user occupies a subset of
subcarriers, and each carrier is assigned exclusively
exclusively to only one user at any time.
DO NO T C
Advantages of OFDMA over OFDM-TDMA and OFDM-CDMA include elimination
exploitation of network/multiuser diversity.
of intracell interference and exploitation

2. Frequency Division Multiple Access


Frequency division multiple access (FDMA) was the first technique
implemented on satellite systems. FDMA divides all frequency band into many
frequency channels andand assigns a separate frequency
frequency channel on demand to each
DO NO

earth station. Figure 2 shows functions of FDMA process.


T
f
Friquency
band 3 ^ ES 3 f1
Friquency
^
T
ES 2
band 2 f2
f3 ES 1

band 1 ^
Friquency f1 f2 f3
ES 1
ES 2
t ES 3
DO

Figure 2. Principle of the Frequency Division Multiple Access

Figure 2 shows an example for three earth earth (ground) stations (ES) accessing a
single frequency translation satellite transponder.
transponder. Each station is assigned a specific
frequency band for its uplink ( f1 , f 2 and f 3 ). Frequency guard bands are used to avoid
interference between the user slots. All stations receive total spectrum on downlink.
The receiving station must be able to re receive the full spectrum and can select the
desired carrier for demodulation or detection.
The main advantages of this technique are:
- independent of the channels;
- no framing or synchronization bits needed;
- simplicity;
- transmissions can be analog or di digital, or combinations of both;
- FDMA is most useful for applications where a full time channel is desired –
for example, video distribution;

3
- the least expensive to implement technique.
The main disadvantages are:
- lower power efficiency because of thee multiple carriers in the transponder
final power amplifier requires power backoff koff operation to avoid intermodulation

Y
noise;
conf
- lower flexibility if it is necessary another system configuration (change
frequency plan);

NO C P
CO Y
- when number of users increase system efficiency decrease.
Multiple access system performance must must be analyzed by considered the

O
specific signal processing used in the satellite
satellite communications for both analog and

OP
digital signals.

PY
2.1. Frequency Division Multiple Acce ss with PCM/TDM/PSK application.
Access
DO NO T C
Some of the most common technique techniquess in satellite communications are a
PCM/TDM (pulse code modulation/time division division multiplexed). Its application used
for voice communications. By PSM analog signals are converted into digital and
combined using TDM hierarchy according ITU-R Recommendation. The first level
consists of 30 channels which of them with 64kbit / s , multiplexed to a 2,048Mbit / s
TDM bit rate. The carrier modulation is phase shift keying (BPSK or QPSK).
One of the most important parameter fo forr evaluation is the capacity of the
DO NO

multiple access system. It determines the maximum number of users that can access
T
the basis for decisions on demand access options on the link.
the satellite and serves as the
The capacity for the PCM/TDM/PSK/FDMA digital multiple channel per carrier
(MCPC) system is determined by the following steps 2 .
1) Determine the composite carrier-to-
carrier-to-noise
noise density available on the RF link
T
C N 0 T .
2) Determine the required carrier-to-noise ratio C N t required to support each
carrier at the desired BER
individual MCPC carrier
DO

§ Eb ·
, §¨ ·¸
C Eb Rb C
. ¨¨ ¸¸  Rb  WN  M i  M A , dB , (1)
N N 0 WN © N ¹t © N 0 ¹t
where Rb is a data rate of digital signal, in dB; WN - noise bandwidth of carrier, in dB;
§ ·
C - carrier power; ¨¨ Eb ¸¸ - the ratio, required for the threshold BER; M i - MODEM
© N 0 ¹t
implementation margin, in dB ( | (1 y 3)dB ); M A - Adjacent Channel Interference
margin, in dB | (1 y 2)dB .
The bit rate required to support each channel depends on the specific PCM
baseband formatting: PCM: 64 kbps/voice ch
channel, ADPCM: 32 kbps/voice channel.
The noise bandwidth depends on the carrier modulation

2
Ippolito, Louis J., Satellite communications systems engineering : atmospheric effects, satellite link design, and
system Performance, 2008 JohnWiley & Sons Ltd, 396 pp.

4
for BPSK WN (1,2 * TDM bit rate)  20% ,
TDM bit rate
for QPSK WN (1,2 * )  20% . (2)
2

Y
The coefficient 1,2 account for diff differences
erences between real and ideal
characteristics of bandpass filterr and the 20% factor is included to account for guard
bands.

NO C P
For example, the first level of hierarchy structure for 64kbit / s PCM voice,

CO Y
TDM bit rate is 2,048Mbit / s , then
BPSK WN (1,2 * 2048)  0,2(1,2 * 2048) 2,949 MHz ,

O
OP
2048 2048
QPSK WN (1,2 * )  0,2(1,2 * ) 1,474MHz .

PY
2 2
DO NO T C
3) Determine the required carrier-to-noise density for each carrier:
§C · §C·
¨¨ ¸¸ ¨ ¸  WN , dB (3)
© 0 ¹t
N © N ¹t
4) Compare C N 0 t with the total available RF link carrier-to-noise
ratio C N 0 T from 1) to determine the number of carriers, n p , that can be supported:
§C · §C ·
¨¨ ¸¸ ¨¨ ¸¸  10log (4)
DO NO

10 log n p
© N 0 ¹T © N 0 ¹t
T
From equation (4) it can be determinate the number of carriers, which can be
supported:
§ C · § C ·
¨¨ ¸¸ ¨¨ ¸¸
T
© N 0 ¹T © N0 ¹t
np 10 10
(5)
This result (5) has to round to the next lowest integer. It gives the power
limited capacity of the system.
DO

5) Determine the bandwidth limited capacity of the system, nW , from


wTR
nW , (6)
wN
where wTR is a satellite transponder bandwidth, wN - noise bandwidth (including guard
bands).
The result (6) (rounded to the next
ne lowest integer), gives the bandwidth limited
capacity of the system.
6) Determine the system capacity, C, from the lower of the values of n p or nW :
C n p or nB (7)
The result C from (7) is the maximum number of carriers that can be used in
the PCM/TDM/PSK/FDMA link, within the pow power and bandwidth limitations of the
system.

5
2.2. Frequency Division Multiple
ltiple Access with PCM/SCPC/PSK
PCM/SC application.
PCM/SCPC/PSK is a digital baseband nd single carrier per channel (SCPC)
system used for data and voice applications.. It is not necessity of multiplexing. Each
incoming signal is analog to digital converted,d, and modulated RF carrier by BPSK or

Y
QPSK for transmission over the satellite channel.
channel. A pair of channel
channel frequencies is
used for voice communications, one for each direction of transmission.
One advantage of this SCPC FDMA approach approach is that it can operate as a

NO C P
CO Y
demand assignment access, where the carrier is turned off when not in use. The
system can also use voice activation,
activation, which makes use of the statistics of voice

O
conversations to share the SCPC carrier with multiple users.

OP
It is known, that a typical voice channel
channel conversation is active only about 40%

PY
of the time in any one direction. A voice activation factor (VA) is used to quantify
the improvement possible in the network. For example, a 36MHz 36MHz transponder has a
DO NO T C
bandwidth limited capacity of 800 SCPC channels, using 45 KHz channel spacing:
36.103 / 45 800 . The 800 channels correspond to 400 simultaneous conversations.
PCM/SCPC/PSK/FDMA are similar to the
The capacity calculations for PCM/SCPC/PSK/FDMA
previous section 1.1. Single channel carrier noise
procedure, which is discussed in the previous
bandwidths and data rates performance.
rates are used to determine perform ance. The VA factor, if used,
is applied to increase the power limited capacity, n p , (4)). The bandwidth limited
capacity, nW , (5) is determined from
DO NO
T
wTR
nB , (8)
wC
where wTR is a satellite transponder bandwidth, wC - individual channel bandwidth
T
(including guard bands).
lower value of n p or nW determines the capacity C of the system.
The lower
The representative FDMA wireless cellu cellular standards include Advanced
DO

Mobile Phone System (AMPS) in the United United States, Nordic Mobile Telephones
(NMT) in Europe, and Total Access Communications
Communications System (TACS) in the United
Kingdom . Long Term Evolution 4 (LTE) implements Orthogonal Frequency
3

Division Multiplexing (OFDM) for its downlink and Single-Carrier


Single- Frequency-
(SC-FDMA)
Division Multiple Access (S C-FDMA) for its uplink.

3. Time Division Multiple Access


Time Division Multiple Access (TDMA) is another multiple access technique
employed in the digital wireless communication systems. This method has been
applied in the late 1980s. The frequency band for the each station is the same, and the
separation of the carriers in the transponder is done in time (time intervals), and only

3
Kiseon Kim, Insoo Koo, CDMA Systems Capacity Engineering. Artech House INC., 2005, 201 pp.
4
3rd Generation Partnership Project Long Term Evolution – standard improving Universal Mobile Telecommunications
System (UMTS)

6
one user is allowed to either transmit or receive the information data in each interval
(slot).
Figure 3 shows a principle of the TDMA process as three ground stations
accessing a single frequency translation satellite
llite transponder. Defined time frames are

Y
formatting all the transmission time. Each frame is divided into time intervals (time
possible access. Equal time intervals in each
slots), which are at least as much as possible
frame are designed for individual stations. Each
Each station can transmit in a specific time

NO C P
CO Y
interval (slot) for its uplink transmission of a burst of data in sequence and each
station has use of the full transponder bandwidth
bandwidth during its time slot. The time slot

O
can be changed on demand. Guard bands are are used between the time slots to avoid

OP
interference.

PY
f frame Time
DO NO T C
slot
fra
m e
ES 3

ES 3
ES 1

ES 2

ES 1

ES 2

ES 1
^
^
^

slot 1 slot 2 slot 3 t ES 2


ES 3

Figure 3. Principle of the Time Division Multiple Access


DO NO
T
The information that has been sent in a time slots is called sequence. During
an active connection the information is transmitted
transmitted as sequence, not continuously. At
synchronization, control and user information.
each time frame can be transmitted synchronization,
TDMA is a convenient method for transmitting
transmitting digital data because by using digital
T
buffer memory it is converted into time slots slots and then the receiver restores them. The
buffer is determined by:
required capacity of the buffer
cBuf rb .t F (9)
DO

where rb is a bite rate, t F is a period of the time slots.


Downlink transmission consists of interleaved set of packets from all the
ground stations. A receiving station detectsdetects and demultiplexes bursts and delivers
information to the users. A reference station
stati is used to establish the synchronization
reference clock and provide burst time operational da data to the network.
Figure 4 shows a typical time frame. The range of the frame is from 1 to 20 ms.
Each station burst contains a preamble and traffic data. The preamble contains
synchronization and station identification data. The reference burst, from the
reference station, is usually at the star start of each frame, and provides the network
synchronization and operational information.
Station bursts do not need to be identical in duration. Its can be longer for
heavier traffic stations or during higher use periods. The specific allocation of burst
times for each of the stations within the frame is called the burst time plan. The burst
time plan can be changed to adap adapt for changing traffic patterns.

7
Gard bands

TDMA frame

Reference station station station

Y
burst 1 2 n

Service

NO C P
User information
information

CO Y
Frequency
Gard Service
and time Identification

O
band channel
control

OP
Figure 4. Example of the typical time frame.

PY
DO NO T C
Advantages of TDMA:
- TDMA can easily adapt to transmission of data as well as voice
communication; it has an ability to carry 64 kbps to 120 Mbps of data rates and this
allows the operator to do services
services like multimedia and videoconferencing,
videoconferencing, fax, voice;
- TDMA provides no interference from simultaneous transmissions because it
separates users according to time;
extended battery life, since it transmits only
- TDMA provides users with an extended
DO NO

portion of the time during conversations;


T
- less stringent power control due to reduced interference between users;
technology to convert an analog system to
- TDMA is the most cost effective technology
digital..
digital
Disadvantages of TDMA:
T
- higher synchronization overhead;
- the user might be disconnected - because
because of the users has a predefined time
slot when they moving from one cell site to other,
other, if all the time slots in this cell are
DO

full;
- the user could not receive a dial tone, if all the time slots in the cell in which
the user is currently in are already occupied;
- multipath distortion - to overcome distortion,
distortion, a time limit can be used on the
expired the signal can be ignored.
system, once the time limit is expired

3.1. Time Division Multiple Access with PCM/TDM/PSK application.


One of the most common structures fo found applications in VSAT networks,
fo
consists of a PCM or ADPCM baseband formatting technique (period of the frame
has to be multiple of 125Ps ), TDM multiplexing and modul
modulation by binary PSK or
quadrature QPSK. The information is uploaded
uploa to one carrier, covering the entire
transponder bandwidth. The data rates are usually 60Mbps when the bandwidth is
36 MHz or 130Mbps when the bandwidth is 72 MHz . The synchronization of the frame

8
is maintained by using the codeword includes
cludes a sequence of 24 to 48 bits. The
codeword is repeated in each frame.
The preamble consists of some components, each with a specific purpose in the
TDMA process. Typical components of the TDMA preamble and reference burst are

Y
summarized in Table 1 for a representative
tive operational system, the INTELSAT
TDMA system, deployed on many early INTELSAT satellites 5 . The INTELSAT
TDMA system consists of two reference bursts per frame and operates with a 2 ms

NO C P
CO Y
frame period.
Table 1. Intelsat TDMA preamble and reference burst structure.

O
Components Description
ption Number

OP
PY
of bits
Preamble
CBR Carrier and synchronizing signal for detector 352
DO NO T C
bit-timing recovery
UW Unique word burst code word 48
TTY Teletype operational data
ta comm
communications
unications between 16
stations
SC Service channel carries netw
network
ork protocol and alarm messages 16
VOW Voice order wire voice communications
communicacations
tions between stations 2*64
(*2)
Reference
Reference Burst
DO NO

CBR Carrier and synchronizing signal for detector 352


T
bit-timing recover
recovery
UW Unique word burst code w
word
ord 48
TTY Teletype operational data
data communications between 16
stations
T
SC Service channel carries netw
network
ork protocol and alarm messages 16
VOW Voice order wire voice communications
communi tions between stations 2*64
(*2)
CDC Coordination and used to tr
transfer
ansfer acquisition, synchronization, 16
DO

delay channel monitoring info to stations


control, and monitoring

Total number of bits in the preamble is 560, the reference burst consists 576
bits.

3.2. TDMA Frame Efficiency


The efficiency of the TDMA frame is defined as the ratio of number of bits
available for traffic and total number of bits in frame 6

5
Dennis Roddy, Satellite communications, McGraw-Hill
Mc Professional, 2001, 569 pp.
6
Ippolito, Louis J., Satellite communications systems engineering: atmospheric effects, satellite link design, and system
Performance, JohnWiley & Sons Ltd, 2008, 396 pp.

9
number of bits available for the traffic
KF
total number of bits in the frame
(10)
number of overhead bits
1

Y
total number of bits in the frame

nr .br  nt .bp  (nr  nt )bg


KF 1 , (11)
rT .t F

NO C P
CO Y
where t F is the TDMA frame time, in s; s; rT is the total TDMA bit rate, in bps; nr -
number of reference stations; nt - number of traffic bursts; br - number of bits in

O
reference burst; bp - number of bits in the preamble; bg - number of bits in guard band.

OP
PY
The frame efficiency shows how mach of the frame is in used. It will change
when increase the total number of bits (a longer frame time) or lowering the overhead
DO NO T C
in the frame (no traffic bits). The optimum operating structure occurs by providing
the longest possible frame time with the lowest total number bits allocated to
overhead functions, but the longest frame time needs of largest memory buffers,
which increases the overall delay of the signal.

Example 1. How calculate the frame efficiency, if TDMA frame has a frame shows in Table
1 with length 2ms , a total number of bits in the preamble is bp 560bits , in the reference burst -
DO NO

br 576bits , number of bits in guard band - bg 206bits , there are two reference stations, each
T
transmitting a reference burst in the frame nr 2 .
Evaluate the TDMA network in terms of the maximum number of traffic terminals and the
operating TDMA date rate for a desired minimum frame efficiency of K F 0,95 .
From Equation 11 the frame efficiency is
T
n .b  n .b  (nr  nt )bg 2.576  nt .560  (2  nt )206 1564  766nt
KF 1  r r t p 1 1 .
rT .t F rT .0,002 rT .0,002
1) If the TDMA data rate is set at 120 Mbps, the number of terminals that could be
DO

supported at a 95% frame efficiency is


1564  766nt
0,95 1  Ÿ nt 13,6; nt | 13 traffic terminals.
120.106.0,002
2) for a network with a 13 traffic terminals (13 time slots) and K F 0,95 it can be achieved
data rate of
1564  766.13
0,95 1  Ÿ rT 115,22Mbps .
rT .0,002
The result chows, if the number of traffic terminals
te is fixed, network performance can be
optimized by setting the data rate rT at the minimum value to achieve the desired efficiency K F .
Therefore the network ground terminals can op operate with variable TDMA data rates.

3.3. TDMA capacity


To evaluate a capacity for aany type of data source bit stream (voice, video, data
cha
or combination of these) the network channel capacity for a TDMA network can be
evaluated in terms of an equivalent voice-channel capacity, nC . The equivalent voice

10
channel capacity is defined as ratio of available information bit rate, ri and equivalent
voice channel bit rate, rC
ri
nC (12)

Y
rC
The available information bit rate, ri , represents that part of the total bit rate

NO C P
available for information (the total bit rate minus the bit rate allocated to overhead

CO Y
functions). The equivalent voice ce channel bit rate is usually defined as the standard
PCM bit rate rC 64kbps .

O
Order for determination of TDMA capacity:

OP
carrier-to-noise
1) Determine the composite carrier-to- noise ratio available on the RF link

PY
C N 0 T .
carrier-to-noise ratio required to achieve the threshold BER
2) Determine the carrier-to-noise
DO NO T C
desired for the TDMA network
§C· § Eb ·
¨ ¸ ¨¨ ¸¸  RT  WN  M i  M A , dB , (13)
© N ¹t © 0 ¹t
N
where RT is the TDMA data rate at the desired frame efficiency, K F , in dB; N 0 -
power flux density for a unit bandwidth, in dB; WN - noise bandwidth of carrier, in
§ Eb ·
DO NO

dB; C - power of carrier, in dB; ¨¨ ¸¸ - the ratio, required for the threshold BER; M i
© N 0 ¹t
T
- modem implementation margin (the deviation deviation of modem performance from the
ideal), in dB, | (1 y 3)dB ; M A - adjacent channel interference margin | (1 y 2)dB .
3) Determine the TDMA data rate from
T
§C· §C·
¨ ¸ t¨ ¸ . (14)
© N ¹ t © N ¹T
4) Determine the TDMA capacity from (12)
DO

The frame parameters for the reference bursts, traffic bursts, and guard bands
defined are: t F - the TDMA frame time, in s;s; rT - the total TDMA bit rate, in bps; nr -
number of reference stations; nt - number of traffic bursts; br - number of bits in
reference burst; bT - number of bits in total TDMA frame; bp - number of bits in the
preamble; bg - number of bits in guard band.
Therefore, it can determinate
determinate the follow bit rates:
bT
Total TDMA Bit Rate : rT
tF
bp
Reference Burst Bit Rate : rp
tF
br
Reference Burst Bit Rate : rr
tF

11
bg
Guard Time Bit Rate : rg
tF
The available bit traffic rate is

Y
ri rT  nr ( rr  rg )  nt ( rp  rg ) (15)
Therefore
rT  nr (rr  rg )  nt (rp  rg )

NO C P
ri
nC (16)

CO Y
rC rC
This result provides the number of equivalent
equivalent voice channels that can be

O
supported by the TDMA network for the specified TDMA bit rate, TDMA frame

OP
efficiency, and frame parameters.

PY
DO NO T C
Example 2. To calculate the TDMA capacity in number of equivalent voice channel nC
There is standard PCM bit rate rC 64kbps and first level of digital
with data from Example 1. There
plesiochronous hierarchy structure rC 2048kbps .
First define the following data rates in bps:
bT
Total TDMA Bit Rate : rT 115,22Mbps ;
tF
bp 560
Reference Burst Bit Rate : rp 280kbps ;
t F 0,002
DO NO
T
576
Reference Burst Bit Rate : rr br 288kbps ;
t F 0,002
bg 206
Guard Time Bit Rate : rg 103kbps .
t F 0,002
T
The available bit traffic rate
ri rT  nr (rr  rg )  nt (rp  rg ) 115,22.106  2.(288103).103 13.(280103).103 112,818Mbps
For standard PCM bit rate rC 64kbps the number of equivalent voice channel is:
DO

ri 112,818.106
nC 1762,8; Ÿ nC 1762 channels .
rC 64.103
For bit rate rC 2048kbps the number of equivalent voice channel is:
ri 112,818.106
nC 55,1; Ÿ nC 55 channels .
rC 2048.103
This number of equivalent voice channels can be supported to maintain a frame efficiency of
KF 0,95 .

3.4. Switching in satellite TDMA.


Switching in satellite TDMA (Satellite Switched TDMA) TD lies in the rapid
reconfiguration of the diagram of satellite
satel antenna to improve the possibilities for
traditiona TDMA system. Satellite Switched TDMA
providing additional access to traditional
a
adds antenna beam switching to provide additional multiple access capability to adapt
to changing demand requirements. The on-board switching is accomplished at

12
intermediate frequency with an nu n switch matrix. Switching is done in
synchronization with the TDMA bursts from the ground stations.
Figure 5 shows example for configuration of a 3u 3 satellite switched TDMA

Y
architecture. The network consists of three regional beams, designa
designated as A, B, and C
beams. The switch matrix mode is shown on the right of the figure, labeled Mode 1,
Mode 2, or Mode 3. The options for switching in this case are nS 6 (showing only

NO C P
three of them). Table 2 shows the number of full versions of switching time for this

CO Y
example.

O
OP 3

PY
DO NO T C

2
1
A1 A2 B1 B2 C1 C2

Figure 5. Example of a 3u 3 satellite switched TDMA architecture


DO NO
T
Table 2. The number of full versions of switching time for 3u 3 satellite switched TDMA
architecture.
Downlink beam
Uplink
Switch Switch Switch Switch Switch Switch
T
beam
position 1 position 2 position 3 position 4 position 5 position 6
Ⱥ ȼ ɋ Ⱥ Ⱥ ȼ ɋ
ȼ Ⱥ ȼ ɋ ȼ ɋ Ⱥ
DO

ɋ ɋ Ⱥ ȼ ɋ Ⱥ ȼ

For N number of Regions (beams) nS N! . As N increases, the number of


switch positions becomes quite large, for example:
N 3 : nS 6;
N 4 : nS 24 ;
N 5 : nS 120 …
The switch consists of coaxial cables or waveguides. Switching elements are
ferrites, diodes or FET transistors and dua
dual-gate FET. The architecture is usually
limited to three or four beams. For larger matrices grow much weight and dimensions
of the switching matrix.

13
The major TDMA standards contain Globall System Mobile (GSM) in Europe
IS-54/136) in North America 7 . GSM was developed in
and Interim Standard 54/136 (IS-54/136)
on (2G) digital cellular mobile communications in Europe.
1990 for second generation
Systems based on this standard were first deployed in 18 European countries in 1991.

Y
By the end of 1993, it was adopted in nine more European countries, as well as
Australia, Hong Kong, much of Asia, South
South America, and now the United States.

NO C P
CO Y
4. Code Division Multiple Access
The third technique Code Division Multiple Access (CDMA) uses basic

O
ious methods. It is a combination of both frequency and
principles of the two previous

OP
time separation. The station has all the bandwidth as in TDMA all in the time, as in

PY
FDMA.
CDMA, and. The main characteristics
characteristics of the CDMA are:
DO NO T C
- Works with digital formatted data only;
- Offers the highest power and spectral
spectral efficiency operation of the three
fundamental techniques;
- All users use same frequency and may transmit simultaneously;
- Narrowband message signal multiplied by wideband spreading signal, or
codeword;
- Each user has its own pseudo-codeword (orthogonal to others) and receivers
DO NO

detect only the desired codeword,


codeword, all others appear as noise.
T
transmitted to the satellite using the same carrier
In this method, each signal is transmitted
entire bandwidth of the transponder,
frequency and occupies the entire transponder, but carriers differ in
the way of coding, i.e. they are modulated with a separate code. The receiver on the
other side must recognize this particular code;
code; otherwise it can not choose the desired
T
signal. Code modulation used in CDMA is different from channel coding and
modulation.
DO

each uplink station is assigned


f time slot and frequency band

^
in coded sequence
band 3 ES 3 ES 1 ES 2
slot

^
fra
m e
band 2 ES 2 ES 3 ES 1

band 1 ^ ES 1 ES 2 ES 3

ES 3
ES 1

t
slot 1 slot 2 slo 3
slot ES 2
downlink receiver must know
code to detect the signal

Figure 6. Principle of the Code Division Multiple Access

Figure 6 shows the principle of the Code Division Multiple Access. At each
station is given time interval (time slot) aand bandwidth. The information is sent to the

7
Rappaport, T. S., Wireless Communications, Englewood Cliffs, NJ: Prentice-Hall, 2002.

14
satellite (“uplink”) as a coded
oded sequence as a series. From satellite to terminals
rleaved, how it is shown in Figure 6. The
(“downlink”) information packages are interleaved,
ground station must know the number and frequency of its tim time interval to adopt its
number of information packets. The ground station station separates useful signal from the

Y
noise.
The used code sequence has to meet two two conditions: to prevent unauthorized
access and to be short enough because there can be problems with synchronization or

NO C P
CO Y
delay of the signal. The most appropriate code sequence that that satisfies these conditions
is a pseudorandom sequence of binary symbols. It is a binary binary sequence with a final

O
length in which the position of each bit is random. The autocorrelation of the pseudo-

OP
autocorrelation of white noise. Therefore, this
random sequence is similar to the autocorrelation

PY
sequence is called pseudonoise, PN. What is the difference between random and
pseudorandom signal? A random signal cannot be predicted, its future value can be
DO NO T C
described statistical. A pseudorandom signal is not random at all; it is defined as
deterministic periodic signal that is known to both transmitter and receiver. It must
comply with three conditions:
- Balance property – in each period of the the sequence the number of binary ones
binary zeroes by at most one digit;
differs from the number of binary
sequence consist sequences of a same type
- Run property - the pseudorandom sequence
of binary digits (for example, only ones ones or only zeroes); the appearance of the
DO NO

opposite digit in a sequence starts a new run; run; the length of the run is equal of the
T
number of digits in the run;
- correlation property – if the period of the sequence is compared term by term
with any cyclic shift of itself, the numbe
numberr of agreements has to differ from the
number of disagreements by not more than one count.
T
The PN sequence used in CDMA systems systems is generated usiusing sequential logic
circuits and a n-stage feedback shift regist er. Figure 7 shows an example of a 4-stage
register.
feedback shift register and table of contents in order of a clock, used to generate the
DO

PN sequence. At each clock pulse the binary binary sequences are shifted through the shift
registers one stage to the right. The feedback
feedback logic consists of exclusive-OR gates
generated by a unique algorithm. The output of the stages are logi logically combined and
fed back as input, generating a PN sequence at the final output. Since the last state
1000 corresponds to the initial one, it is obviou
obviously that the register repeats foregoing
sequence after 15 clock times. The output sequence of the example on Figure 7 is
000111101011001, where the left digits are the earliest.
The output sequences can be classified as either maximal length (ML) or non
maximal length (NML). The num number
ber of non-zero states that are possible for this
linear PN sequence generator, called its maximal length will be
p ML 2 n  1 . (17)
The sequence has a maximal length if for an n-stage linear feedback shift
register the sequence repetition period p is (17).

15
Register 1 Register 2 Register 3 Register 4 Output
A Q1 A Q1 A Q1 A Q1 pseudorandom
D Q4 D Q4 D Q4
+ D Q4
sequence

Y
000111101011001
ENB ENB ENB ENB

1 1 0 0 0
2 0 1 0 0
3 0 0 1 0

NO C P
4 0 0 0 1

CO Y
5 1 0 0 1
6 1 1 0 1
7 1 1 1 1
8 1 1 1 0

O
9 0 1 1 1

OP
10 1 0 1 0

PY
11 0 1 0 1
12 1 0 1 1
13 1 1 0 0
14 0 1 1 0
DO NO T C
15 0 0 1 1
16 1 0 0 0
clock
Contents of registers

Figure 7. An example of a 4-stage feedback shift register and table of contents in order of a
clock

It can test the sequence for the randomness properties. First is balance property.
DO NO

The sequence has seven zeroes and eighth ones,


ones, consequently the
the sequence meets the
T
balance condition. Second condition,
condition, the sequence consists of regularly repeated
same number (in Fig. 7 they are separated by verti
vertical
cal lines). The number of digits is
eight. Four of them (50%) have one digit, two (25%) - two digits, and the other with
more than two digits. So the run property is met. Third condition: It was found that
T
normalized autocorrelation function of periodic pulse signal with a period ML 2n  1
is as follows:
1
R (W ) .'k , (18)
DO

ML
where 'k is a difference between the number of agreements and the number of
disagreements when comparing part of the sequence and its shifted copy.
It is obviously, when W 0 (the signal and its ccopy match) autocorrelation
function is one R(W ) 1 . After shifting the copy off less than ML autocorrelation
1
function is R(W )  . A comparison of the signal and its copy shifted by one
ML
register to the right gives the following result:

0 0 0 1 1 1 1 0 1 0 1 1 0 0 1
1 0 0 0 1 1 1 1 0 1 0 1 1 0 0
no yes yes no yes yes yes no no no no yes no yes no

There are seven agreements and eight disagreements. From Equation (18)

16
1 1
R(W ) .(7  8) 
15 15
So, the third condition is done. If the copy of the signal is shifted by two or
more register (but not more than 15) is obtained the same result. The synthesis of an

Y
quence generator depends
appropriate structure of pseudorandom sequence depends on the meeting
the conditions for randomness. Not every structure can maximize the length and
satisfy these randomness properties.

NO C P
CO Y
The generated PN sequence of binary symbols is combined with digital's data
to obtain the number of pseudorandom sequence of binary data. Figure 8 shows the
process used to generate thee PN data stream. Two digital
digital signals are entering in the

O
OP
modulator: the input digital data stream m(t ) at a rate rb 1 tb and pseudorandom

PY
sequence of binary symbols pPN (t ) at a chip rate rCH 1 tCH . A PN cycle is called chip
clock.
DO NO T C
PN chip clock
A A xor B
t B
1 bit
period
input output
0 1 0 0 A B A xor B
m(t) 0 0 0
0 1 1
DO NO

1 0 1
1 0 1 1 0 0 1 00
0 11
1 1 0
T
chip
period pPN(t)

1 01 1 0 0 11
s(t)
T
Figure 8. An example of the ge
generation
neration a PN sequence of data

The PN sequence is modulo-2 added to the data sequence m(t) to produce the
DO

data stream
s (t ) m(t ) † pPN (t ) . (19)
Figure 8 shows that the PN data stream is at the chip rate rCH 1 tCH , which is
higher than the original data rate rb 1 tb , that is rCH !! rb . In the example shown on
the figure rCH 6rb .
The condition rCH !! rb is very important for the successful implementation of
CDMA. It is the reason that CDMA is often referred to as spread spectrum or spread
origin data sequence is “spread” out over a
spectrum multiple access, because the original
much greater frequency band in the transmission channel.
The chip rate is selected so as to extend the signal over the total available
channel bandwidth. Large spreading ratios are typical, for example, in mobile
satellite voice networks, the original 16 kbps voice data stream may be spread at a
chip rate to produce a PN data stream that operates over an 8MHz RF channel

17
bandwidth. This is a spreading factor of 500, assuming 1 bit/Hz modulation such as
BPSK.
What is Spreading Factor, SF? The ratio of both chip and bit rates indicates
how many times spectrum of producing data stream has extended
ex compared with the

Y
Spreading Factor or a processing gain when
input digital data stream and it is called Spreading
is calculated in dB:
§r ·

NO C P
rCH
SF ; gain BPSK 10 log ¨¨ CH ¸¸ , (20)

CO Y
rb © rb ¹
because for a 1bps / Hz modulation system, such as BPSK, WRF | rch ; chip rate

O
rCH 1 tCH , data rate rb 1 tb , tb n.tch .

OP
PY
For example shown on the figure 8 rCH 6rb ,
rCH 6rb
DO NO T C
SF 6,
rb rb
§r · § 6rb ·
gain BPSK 10 log¨¨ CH ¸¸ 10 log¨¨ r ¸¸ 10 log 6 7,78 dB .
© rb ¹ © b ¹
For example, the standard IS-95, which
which was introduced as a second generation
(2G) wireless cellular communications in 1990 in North America, and later in Japan
and Korea, has a chip rate rch 1,2288 and spreading factor SF 64 .
DO NO

From equation (19) follow spreading the bandwidth needed for transmission of
T
information. Therefore, this access method is often called spread spectrum multiple
access. The spread spectrum is defined as a communication method in which the
signal occupies a bandwidth, greater th than
an the minimum required to transmit
independent of the transmitted information.
information and that spreading code is independent
T
There are three basic types of CDMA:
- Direct Sequence Spread Spectrum, DS-SS - digital data directly recode with
binary symbols (Fig. 8);
pseudo-random sequence of binary
DO

- Frequency Hopping Spread Spectrum, FH-SS FH-SS - change of carrier frequency,


i.e. useful signals are transmitted on diff erent carrier frequencies
different frequencie generated pseudo
manner;
- Time Hopping, TH - intermittent switching
switching time interval defined by pseudo-
random sequence.
In commercial communications are primar primarily used the first two methods. The
third method, TH-CDMA is used in cases of intentional spread of disturbance as
possible to hide the details of the signal from the enemy.

4.1. Direct Sequence


Sequence Spread Spectrum
The structure of the system with dirdirect sequence spread spectrum (DS-SS) is
shown in Figure 9. It includes a phase modulator, PN code modulator, balanced
demodulator with bandpass filter in the receiver and demodulator phase.

18
sm(t) smp(t)
Data in Phase PN Cod Balanced Phase Data
Mod Mod Demod Demod out

Y
m(t)

pPN(t) pPN(t)

2 E cos(Z 0 t ) PN PN 2 E cos(Z 0 t )

NO C P
CO Y
Figure 9. A structure of the system with direct sequence spread spectrum (DS-SS)

O
The information bitstream is phase modulated
modulated onto a carrier (phase modulator),

OP
then enter in the PN Code Modulator which which phase modulates the RF carrier to

PY
through the satellite channel, the signal is
produce the spread signal. After passing through
‘despread’ with a balanced modulator, then then phase demodulated to produce the
DO NO T C
original data bitstream.
After phase modulation with a carrier in Phase Modulator input data stream
m(t ) with the rate rb 1 tb and bandwidth WRb is as follows:
s m (t ) 2 E cos[Z 0 t  \ m (t )], 0 d t d T ,
where \ (t ) is the information bbearing
earing phase modulation.
The PN Code Modulator phase modul modulates
ates the data modulated signal sm (t ) with
DO NO

the PN sequence pPN (t ) with chip rate rCH . The output of the PN modulator is
T
smp (t ) 2 E cos[Z 0 t  \ m (t )  \ p (t )] , (21)
Thus, the signal to be transmitted to the receiver over the satellite is spread in
frequency by the PN sequence
sequence to a bandwidth of WR . CH
T
It is known that ideal suppressed carrier
carrier binary phase sh
shift keying (BPSK)
0
phase is taking M 2 discrete values, i.e. it switches to 180 according to a logic “0”
and “1”. Then the expression (21) can be written as a multiplication of the carrier and
DO

m((t ) information antipodes impulses with a values  1 or  1 :


s m (t ) 2 E .m (t ) cos(Z 0 t ) . (22)
The PN sequence pPN (t ) is also antipodal pulse stream with a values  1 or  1 ,
Equation (22) can be written as
smp (t ) 2 E .m (t ). p PN (t ) cos(Z 0 t ) . (23)
The phase of the carrier equals \ m (t ) \ p (t ) 1800 , if the modulo 2 sum of data
and code is binary 1 ( m (t )  p PN (t ) 1 ); and the phase of the carrier is zero
\ m (t ) \ p (t ) 0 0 when the modulo 2 sum of da data and code is binary 0 ( m (t )  p PN (t ) 0 ).
Figure 10 shows the structure according to Equation (23)

19
s*mp(t) s*m(t) m*(t)
sm(t) smp(t)
Data in Phase Phase
m(t) + Mod + Mod
BPF

Y
pPN(t) pPN(t)

2 E cos(Z 0 t ) 2 E cos(Z 0 t )

NO C P
ɚ)) b)

CO Y
Figure 10. An elements of the modulator (a) and demodulator (b) of the direct sequence
spread spectrum system

O
OP
The received spread signal is multiplied by a stored replica of pPN (t ) (Fig.

PY
10,b). The output of the balanced demodulator is then
2
(t ) cos(Z 0 t ) . (24)
DO NO T C
s *mp (t ) 2 E .m (t ). p PN
2
Since the pPN (t ) is a binary signal, therefore, pPN (t ) 1 and
s *m (t ) 2 E .m (t ). cos(Z 0 t ) (25)
or
sm* (t ) 2 E cos[Z 0 t  \ *m (t )] , (26)
and the information \ m* (t ) can be recovered through th
thee final phase demodulator.
DO NO

If the receiver PN code differs from th at of the transmitter, random phase


that
T
modulation occurs and spread spectrum signal looks as noise. The bandpass filter
(with bandwidth WRb ) removes high frequency
frequency sidebands.
Figure 11 shows an example of the direct sequence spread spectrum
modulation and demodulation,
demodulation, shown in Figure 10.
T
In Fig. 11a, b are shown input data sequence m(t ( ) with the bit rate rb 1 tb and
bandwidth
bandw idth WRb , and pseudorandom sequence of binary symbols pPN (t ) at a chip rate
DO

rCH 1 tCH . In Fig. 11c is shown the result of modulo-2 addition of the data sequence
m(t ) and code sequence pPN (t ) . Fig. 11d shows the value of the phase of spread
spectrum signal that is S if the modulo 2 sum of data and code is binary 1; and it is a
zero when the modulo 2 sum of data data and code is binary 0.
The demodulation of a signal begins with dispreading
dispre of the spectrum by
lying the received signal with a synchronized replica of the code \ *p (t ) as the
multiplying
antipodal phase shift.
phase
The carrier pha se is determined as a reresult of modulo-2 addition of d) and e)
1f). Fig. 11g shows the result of rrecovering the data waveform by the use of
(Fig. 11f).
BPSK demodulator.

20
1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0
1
a) m(t)
t

Y
-1
1
1 0 1 1 0 1 0 0 0 1 1 0 0 1 1 1 0 1 0 0 1 1 0 0
b) pPN(t)
t

NO C P
-1

CO Y
0 1 0 0 1 0 1 1 1 0 0 1 0 1 1 1 0 1 0 0 1 1 0 0
c) m(t).pPN(t)
t

O
d) \ m (t ) \ p (t ) 0 S 0 0 S 0 S S S 0 0 S 0 S S S 0 S 0 0 S S 0 0

OP
t
\ *p (t ) S S S 0 S 0 0 0 S S 0 0 S S S 0 S 0 0 S S 0 0

PY
e) 0
t
\ m* (t ) S S S S S S S S S S S S
f) 0 0 0 0 0 0 0 0 0 0 0 0
DO NO T C
t
1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0
1
g)
m*(t)
t
-1

Figure 11. An example of the direct sequence


sequence spread spectrum modulation and
demodulation
DO NO
T
4.2. Frequency Hopping Spread Spectrum.
The main point in Frequency Hopping Spread Spread Spectrum, FH-SS, is that the
carrier frequency is changed in accordance of a PN sequence, producing a sequence
of modulated data bursts with time varying pseudorandom carrier frequencies.
T
The all possible carriers frequencies av ailable for frequency hopping in FH-SS
available
is called the hop set
set.. Each of the hopped channels contains
contains adequate RF bandwidth
for the modulated information, usually a form of frequency shift keying (FSK).
DO

There are two bandwidths de fined in FH-SS operation:


defined
- Instantaneous Bandwidth, wbb – the baseband bandwidth of the channel used
in the hopset.
- Total Hopping Bandwidth, wRF – the total RF bandwid
bandwidth over which hopping
occurs.
As larger the ratio of wRF to wbb , so better the spread spectrum performance of
the FH-SS system. Figure 12 shows the el elements of the FH-SS satellite system.

21
Data Carrier Trans Carrier Data
MFSK

Y
in MFSK Receiver Demod
Mod mitter out
fC
sequence
Frequency Frequency Synchronization

NO C P
Syntesizer Syntesizer System

CO Y
pPN(t) pPN(t)

PN

O
PN

OP
Figure 12. The elements of the FH-SS system.

PY
This technique commonly used M-ar M-aryy frequency shift keying MFSK where
DO NO T C
k log 2 M information bits are used to determ
determine
ine which frequency of all M is to be
transmitted. There are two steps of m modulation
odulation - data modulation
modulation and frequency
hopping modulation. The data modulated signal
signal is PN modulated with a PN sequence
of carrier frequencies, f C , generated from the PN sequence pPN (t ) . The frequency-
hopped signal is transmitted th through
rough the satellite channel. Receiver reverses the
signal processing steps. The received signal is frequency hopping demodulated in the
demodulator using a stored replica of the PN sequence. Then the the dehopped signal is
DO NO

demodulated by the data demodulator to develop the input data stream. Commonly in
T
used is noncoherent detector because it is difficultly to keep the
the phase coherence in
the frequency hopping.

Example 3. A hopping bandwidth is 840 MHz and frequency step size is 'f 100 Hz .
T
What is the minimum number of PN chips
chips required for each frequency word?
WRF 840.106
The number of frequency are M 84.105 ;
'f 100
DO

Minimum number of chips log 2 84.105 23 .

22
References
1. Bernard Sklar, Digital Communications: Fundamentals and Applications,
Second Edition, Prentice-Hall, 2001.

Y
2. Broadcom Corporation and Cisco Systems,
Systems, Digital Transmission: Carrier-
to-Noise Ratio, Signal-to-Noise Ratio, and Modulation Error Ratio.
http://www.broadcom.com/docs/general/Broadcom-Cisco_CNR-SNR-MER.pdf
docs/general/Broadcom-Cisco_CNR-SNR-MER.pdf

NO C P
CO Y
3. Gilhousen, K. S., et al.,., On the Capacity of a Cellular CDMA System, IEEE
Trans. On Vehicular Technology,, 1991, pp. 303–312.

O
4. Dennis Roddy, Satellite communications,
communications, McGraw-Hill Professional, 2001,

OP
pp.569.

PY
5. Intuitive Guide to Principles of Communications,
Communications, CDMA: The Concept of
signal spreading and its uses in communications, www.complextoreal.com
DO NO T C
communications systems engineering:
6. Ippolito, Louis J., Satellite communications
atmospheric effects, satellite link design, and system Performance, JohnWiley &
Sons Ltd, 2008, pp.396.
7. Kiseon Kim, Insoo Koo, CDMA Systems Systems Capacity Engineering. Artech
House INC., 2005, pp.201.
8. Kim, K. I., Handbook of CDMA System Design, Engineering and
Optimization, Englewood Cliffs, NJ: Prentice Hall, 2000.
DO NO

9. Koo, I., et al, Sensitivity Analysis for Capacity Increase on the DS-CDMA
T
System, Proc.of JCCI
JCCI,, 1997, pp. 447–451.
10.Pickholtz
10. Pickholtz R. L., Schilling D. L., Milstein L. B., Theory of Spread Spectrum
Transaction on Communications, Vol. com-30,
Communications: A Tutorial. IEEE Transaction
No. 5, May 1982.
T
Milstein L. B., Revisions to Theory of
11. Pickholtz R. L., Schilling D. L., Milstein
Spread Spectrum Communications: A Tutorial. IEEE Transaction on
Communications, Vol. com-32, No. 2, February 1984.
DO

12.Zhili
12. Zhili Sun, Satellite networking principles and protocols, John Wiley & Sons,
2005. pp. 342.

Problems and questions


1. What are the similarities and differen
differences between multiple access and multiplexing?
2. What are the benefits of CDMA versus FDMA and TDMA?
3. Determine the maximum number of us users that can access the satellite for the
PCM/TDM/PSK/FDMA digital multiple channels per carrier system.
4. Calculate the capacity for
for PCM/SCPC/PSK/FDMA system.
5. A TDMA system operates on 100 Mbps with a 2ms frame time. Assume that all slots are
equal length and guard lines between slots are 1Ps . Calculate the efficiency for the case of 1, 5 and
50 slots per frame. Calculate the efficiency
efficiency again if it is required 500bits preamble for each slot.
6. The TDMA frame consists of two reference bursts per frame, with a variable number of
traffic bursts, depending on load demand and service area coverage. QPSK modulation (2

23
bits/symbol) is used, with a total frame length of 120832 symbols. The preamble in each traffic
rol and delay channel is 8 symbols,
burst is 280 symbols long, the control symbol and the guard band interval
is 103 symbols. Calculate the frame efficiency for a frame consisting of 14 traffic bursts per frame.
7. Determine the voice-channel capacity forr the TDMA frame of problem 6.The voice

Y
channel is the standard PCM format (64 kbps) with ith QPSK modulation. Th The frame period is 2 ms.
Assume a speech activity factor of 1.
8. Describe randomness properties that make
make pseudorandom sequence to be random.
§ · § ·

NO C P
9. What is the average BER for the network with an ¨¨ Eb ¸¸ 3dB and ¨¨ Eb ¸¸ 30dB if the PN

CO Y
© N0 ¹ © N0 ¹
spectrum network operates at 512 chips per symbol
sequence for a BPSK direct sequence spread spectrum

O
period? The network consists of 150 users with
with equal received power at the demodulator.

OP
PY
DO NO T C
DO NO
T
T
DO

24
Problems

1. Satellite Communications Segments are:…?

Y
2. Why Geostationary Earth Orbit (GEO) is called Geosynchronous?
3. Find the rang, azimuth angle and elevation
elevation angle if the earth station is
located at: (a) Coventry, England; (b) (b) Riga, Latvija; (c) Istambul, Turkey.

NO C P
CO Y
0
Satellite Longitude is 19.2 E.
4. Which type of satellite orbit provides the best performance for each of

O
the following characteristics: (a) Minimum
Minimum latency (time delay) for voice and

OP
overage of high latitude locations;
data networks; (b) Best coverage locations; (c) Minimum free

PY
space path loss; (d) Ground terminals with minimum antenna tracking required.
5. The frequencies used for satellite communications are accommodated
DO NO T C
between…?
6. Why communications satellites also employ polarization frequency
reuse?
7. What is a satellite comm unications link budget?
communications
8. A signal has power 20W, his bit rate is 600bps. What is the bit energy
in decibels?
9. Describe the relation between C N , C N 0 and Eb N 0 .
DO NO

10. The transmitted power of Earth station is 20W , a distance to satellite


T
is d 37500km . The antenna gain is 45dB . What is the power flux density?
11. How the values of antenna gain gain is depending on frequency and
antenna’s diameter?
6,175GHz, a distance to satellite is
12. The frequency uplink is 6,175GHz,
T
d 37500km . What is the free space path loss?
13. What is the power flux density and power of received signal if both
the transmit and receive parabolic antennas have a diameter of 3 m, the transmit
DO

power is 15 watts, the antenna efficiency is 55% for both antennas. The satellite
is in a GSO location, with a range of d 37500km . The frequency of operation is
6 GHz.
14. A receiver with a low noise amplifier with a gain of GRF 23dB and
noise temperature of t RF 50 K ; a downconverter with a gain of GM 10dB and
noise temperature of t M 500 K , an intermediate frequency unit: t IF 1000 K ,
GIF 30dB .What is the receiver system noise temperature.
15. Calculate Receiver G/T (dB/K) of a satellite having antenna gain 45 ,
over all receiver noise temperature t S 70 K .
16. A fixed service satellite uplink operating
opera at 14 GHz consists of a 3m
antenna diameter ground terminal with a 1kW transmitter. The receiver on the
GSO satellite has a 2m antenna
antenna and a receive system noise temperature of 500 K.
The free space path loss for the link is 2202,5 dB. Assume an efficiency of 55%
for both antennas. What is the carrier-to-noise density for the uplink under clear
sky conditions with a gaseous attenuation loss of 2,5 dB on the link?
17. There is a satellite with a range d 37500km ; transmitted power
pT 2W ; antenna gain gT 22 dB ; channel system noise temperature t S 160 K

Y
and bandwidth bN 500MHz of the satellite channel; Frequency = 12GHz. What
are: (a) Power Flux Density to the received ed terminal; (b) Received power to the

NO C P
received terminal with antenna tenna effective aperture Aeff 10m 2 ; (c) Received

CO Y
antenna gain g R ; (d) Received ratio c n .
18. A satellite network operatesoperates with a frequency translation transponder

O
and provides a 64 kbps BFSK data link. The requirement for the link BER is

OP
PY
5.105 . (a) What is the required composite Eb N 0 for the link? (b) The downlink
C N 0 for the link is 60 dBHz. What uplink C N 0 would be required to maintain
DO NO T C
the BER requirement?
19. What are the main differences, advantages and disadvantages
between: (a) FDMA and TDMA; TDMA; (b) TDMA and CDMA?
20. A communications satellite transponder with a 42MHz usable
bandwidth operates with with multiple FDMA carriers. Each FDMA carrier requires
a bandwidth of 7,5MHz and an EIRP of 16 dBw. The total available EIRP for
the link is 24 dBw. Determine the maximum maximum number of carriers that can access
DO NO

the wireless link if assume 10% guard bands and neglect implementation
T
margins.
21. A direct-sequence spread spectrum CDMA satellite network operates
with 8 kbps voice channels. The interfering interfering noise density on the network is
measured as 6 dB above the thermal noise level. Determine the processing gain
T
for a 6MHz spread spectrum bandwidth.
22. A hopping bandwidth is 820 MHz MHz and frequency step size is
'
'ff 50 Hz . What is the minimum number of PN chips required for each
DO

frequency word?
23. The Hamming distance between sequences A 00101101 and
B 10110101 is …?.…? The Hamming weight of a sequence A 00101101 is…?
24. What is the symbol error correctingcorrecting capabilities of a RS(7,3) code.
Now many bits are there per symbol?
25. What is the codeword polynomial of a message that consist three
symbols 010 110 111 and has to be coded by RS(7,3) code with the generator
polynomial g ( X ) D 3  D 1 X  D 0 X 2  D 3 X 3  X 4 ?
26. Use the generator polynomial for the th RS(7,3) code to encode the
massage 10110101 .
27. Convolutional codes are commonly characterized by parameters…?
28. Draw the trellis diagram for the K=3, code rate r 1 / 3 code generated
by g1 ( x) 1  x  x 2 , g 2 ( x) 1  x 2 and g3 ( x) x  x 2 .
29. Describe the generator polynomials of the coder in Figure P1(a) and
(b).
30. What is the output coded message generated by enc
encoders, shown in
Figure P1 (a) and (b)?

Y
m(t) output u1

Multiplexer u
m input output u1
m(t) S1 D

NO C P
information bit
m(n) m(n-1) m(n-2) S2 output u2 u

CO Y
stream
Shift register m(n) m(n-1) m(n-2)
C ENB
synchronization output u3

synchronization
output u2

O
OP
a) b)

PY
Figure P1. Coders of convolutional code
DO NO T C
31. What is a trellis diagram for the encoder given in Figure P1(b) and
input message m 101100 .
32. Choice the path in trellis diagram for the output coded message
generated by encoder, shown
shown in Figure P1(b).
33. What are the main differences, advantages
advantages and disadvantages between
recursive and nonrecursive systematic
systematic convolutional
convolutional encoder.
DO NO
T
T

You might also like