566.digital Communication - April 2017
566.digital Communication - April 2017
566.digital Communication - April 2017
• The effect of distortion, noise, and interference is much less in digital signals
as they are less affected.
• Digital circuits are more reliable.
• Digital circuits are easy to design and cheaper than analog circuits.
• The hardware implementation in digital circuits, is more flexible than analog.
• The occurrence of cross-talk is very rare in digital communication.
• The signal is un-altered as the pulse needs a high disturbance to alter its
properties, which is very difficult.
•.
Advantages of Digital Communication---
Cont
• Signal processing functions such as encryption and compression are employed in
digital circuits to maintain the secrecy of the information.
• The probability of error occurrence is reduced by employing error detecting and error
correcting codes.
• Spread spectrum technique is used to avoid signal jamming.
• Combining digital signals using Time Division Multiplexing (TDM) is easier than
combining analog signals using Frequency Division Multiplexing (FDM).
• The configuring process of digital signals is easier than analog signals.
• Digital signals can be saved and retrieved more conveniently than analog signals.
• Many of the digital circuits have almost common encoding techniques and hence
similar devices can be used for a number of purposes.
• The capacity of the channel is effectively utilized by digital signals
Elements of Digital Communication
Sections of the digital communication system
• Source
The source can be an analog signal. Example: A Sound signal
• Input Transducer
This is a transducer which takes a physical input and converts it to an
electrical signal (Example: microphone). This block also consists of an analog
to digital converter where a digital signal is needed for further processes.
A digital signal is generally represented by a binary sequence.
• Source Encoder
The source encoder compresses the data into minimum number of bits. This
process helps in effective utilization of the bandwidth. It removes the
redundant bits (unnecessary excess bits, i.e., zeroes).
Sections of the digital communication
system-
• Channel Encoder
• The channel encoder, does the coding for error correction. During the transmission of
the signal, due to the noise in the channel, the signal may get altered and hence to
avoid this, the channel encoder adds some redundant bits to the transmitted data.
These are the error correcting bits.
• Digital Modulator
• The signal to be transmitted is modulated here by a carrier. The signal is also converted
to analog from the digital sequence, in order to make it travel through the channel or
medium.
• Channel
• The channel or a medium, allows the analog signal to transmit from the transmitter
end to the receiver end.
Sections of the digital communication
system-
• Digital Demodulator
This is the first step at the receiver end. The received signal is
demodulated as well as converted again from analog to digital. The
signal gets reconstructed here.
• Channel Decoder
The channel decoder, after detecting the sequence, does some error
corrections. The distortions which might occur during the transmission,
are corrected by adding some redundant bits. This addition of bits
helps in the complete recovery of the original signal.
• Source Decoder
The resultant signal is once again digitized by sampling and quantizing so that the
pure digital output is obtained without the loss of information. The source
decoder recreates the source output.
• Output Transducer
This is the last block which converts the signal into the original physical form,
which was at the input of the transmitter. It converts the electrical signal into
physical output (Example: loud speaker).
• Output Signal
This is the output which is produced after the whole process. Example − The
sound signal received.
Pulse Code Modulation
Modulation is the process of varying one or more parameters of a carrier
signal in accordance with the instantaneous values of the message signal.
• The message signal is the signal which is being transmitted for
communication and the carrier signal is a high frequency signal which
has no data, but is used for long distance transmission.
• There are many modulation techniques, which are classified according
to the type of modulation employed. Of them all, the digital
modulation technique used is Pulse Code Modulation (PCM).
• A signal is pulse code modulated to convert its analog information into
a binary sequence, i.e., 1s and 0s. The output of a PCM will resemble a
binary sequence. The following figure shows an example of PCM output
with respect to instantaneous values of a given sine wave.
An Analog Signal Being Digitised
• Instead of a pulse train, PCM produces a series of numbers or digits,
and hence this process is called as digital. Each one of these digits,
though in binary code, represent the approximate amplitude of the
signal sample at that instant.
• In Pulse Code Modulation, the message signal is represented by a
sequence of coded pulses. This message signal is achieved by
representing the signal in discrete form in both time and amplitude.
Basic Elements of PCM
• The type of modulation, where the sampling rate is much higher and
in which the stepsize after quantization is of a smaller value Δ.
Features of Delta Modulation
• 1-bit quantizer
• Very easy design of the modulator and the
demodulator
• However, there exists some noise in DM.
• Slope Over load distortion (when Δ is small)
• Granular noise (when Δ is large)
Adaptive Delta Modulation (ADM)
• There are mainly two types of multiplexers, namely analog and digital.
They are further divided into FDM, WDM, and TDM.
Analog Multiplexing -
Frequency Division Multiplexing (FDM)
• Unipolar
• Polar
• Bi-polar
Properties of Line Coding
Polar NRZ
• In this type of Polar signaling, a High in data is represented by a
positive pulse, while a Low in data is represented by a negative pulse
Advantages
• The advantages of Polar NRZ are −
• It is simple.
• No low-frequency components are present.
Disadvantages
• The disadvantages of Polar NRZ are −
• No error correction.
• No clock is present.
• The signal droop is caused at the places where the signal is non-zero
at 0 Hz.
Polar RZ
The data encoding technique is divided into the following types, depending upon the
type of data conversion.
• Analog data to Analog signals − The modulation techniques such as Amplitude
Modulation, Frequency Modulation and Phase Modulation of analog signals, fall under
this category.
• Analog data to Digital signals − This process can be termed as digitization, which is
done by Pulse Code Modulation (PCM). Hence, it is nothing but digital modulation. As
we have already discussed, sampling and quantization are the important factors in
this. Delta Modulation gives a better output than PCM.
• Digital data to Analog signals − The modulation techniques such as Amplitude Shift
Keying (ASK), Frequency Shift Keying (FSK), Phase Shift Keying (PSK), etc., fall under this
category. These will be discussed in subsequent chapters.
• Digital data to Digital signals − These are in this section. There are several ways to
map digital data to digital signals.
Non Return to Zero (NRZ)
• NRZ Codes has 1 for High voltage level and 0 for Low voltage level.
• The main behavior of NRZ codes is that the voltage level remains
constant during bit interval.
• The end or start of a bit will not be indicated and it will maintain the
same voltage state, if the value of the previous bit and the value of the
present bit are same.
Two variations in NRZ
NRZ - L (NRZ – LEVEL)
• There is a change in the polarity of the signal, only when the incoming
signal changes from 1 to 0 or from 0 to 1. It is the same as NRZ, however,
the first bit of the input signal should have a change of polarity.
NRZ - I (NRZ – INVERTED)
• If a 1 occurs at the incoming signal, then there occurs a transition at the
beginning of the bit interval. For a 0 at the incoming signal, there is no
transition at the beginning of the bit interval.
• NRZ codes has a disadvantage that the synchronization of the
transmitter clock with the receiver clock gets completely disturbed, when
there is a string of 1s and 0s. Hence, a separate clock line needs to be
provided.
Bi-phase Encoding
4B/5B Encoding
• In Manchester encoding, to send the data, the clocks with double speed is
required rather than NRZ coding.
• Here, as the name implies, 4 bits of code is mapped with 5 bits, with a
minimum number of 1 bits in the group.
• The clock synchronization problem in NRZ-I encoding is avoided by
assigning an equivalent word of 5 bits in the place of each block of 4
consecutive bits.
• These 5-bit words are predetermined in a dictionary.
• The basic idea of selecting a 5-bit code is that, it should have one leading
0 and it should have no more than two trailing 0s.
• Hence, these words are chosen such that two transactions take place per
block of bits.
8B/6T Encoding
• We have used two voltage levels to send a single bit over a single
signal.
• But if we use more than 3 voltage levels, we can send more bits per
signal.
• For example, if 6 voltage levels are used to represent 8 bits on a single
signal, then such encoding is termed as 8B/6T encoding.
• Hence in this method, we have as many as 729 (3^6) combinations for
signal and 256 (2^8) combinations for bits.
• These are the techniques mostly used for converting digital data into
digital signals by compressing or coding them for reliable transmission
of data.
Pulse Shaping
• The simplest FSK is binary FSK (BFSK). BFSK uses a pair of discrete
frequencies to transmit binary (0s and 1s) information.
• With this scheme, the "1" is called the mark frequency and the "0" is
called the space frequency.
The time domain of an FSK modulated carrier is illustrated below
Phase-shift keying (PSK)
• is a digital modulation scheme that conveys data by changing (modulating) the phase of
a reference signal (the carrier wave).
• The modulation occurs by varying the sine and cosine inputs at a precise time.
• It is widely used for wireless LANs, RFID and Bluetooth communication.
• Any digital modulation scheme uses a finite number of distinct signals to represent
digital data.
• PSK uses a finite number of phases, each assigned a unique pattern of binary digits.
• Usually, each phase encodes an equal number of bits.
• Each pattern of bits forms the symbol that is represented by the particular phase.
• The demodulator, which is designed specifically for the symbol-set used by the
modulator, determines the phase of the received signal and maps it back to the symbol
it represents, thus recovering the original data.
• This requires the receiver to be able to compare the phase of the received signal to a
reference signal — such a system is termed coherent (and referred to as CPSK).
Binary phase-shift keying (BPSK)
• BPSK (also sometimes called PRK, phase reversal keying, or 2PSK) is the
simplest form of phase shift keying (PSK).
• It uses two phases which are separated by 180° and so can also be
termed 2-PSK.
• It does not particularly matter exactly where the constellation points are
positioned, and in this figure they are shown on the real axis, at 0° and
180°.
• This modulation is the most robust of all the PSKs since it takes the
highest level of noise or distortion to make the demodulator reach an
incorrect decision.
• It is, however, only able to modulate at 1 bit/symbol (as seen in the
figure) and so is unsuitable for high data-rate applications.
• In the presence of an arbitrary phase-shift introduced by the
communications channel, the demodulator is unable to tell which
constellation point is which.
• As a result, the data is often differentially encoded prior to
modulation.
• BPSK is functionally equivalent to 2-QAM modulation.
Quadrature phase-shift keying (QPSK)
• Sometimes this is known as quadriphase PSK, 4-PSK, or 4-QAM.
(Although the root concepts of QPSK and 4-QAM are different, the
resulting modulated radio waves are exactly the same.)
• QPSK uses four points on the constellation diagram, equi-spaced
around a circle.
• With four phases, QPSK can encode two bits per symbol, shown in the
diagram with Gray coding to minimize the bit error rate (BER) —
sometimes misperceived as twice the BER of BPSK.
Advantage and Disadvantage of QPSK over BPSK
Advantage of QPSK over BPSK:
• QPSK transmits twice the data rate in a given bandwidth compared to
BPSK - at the same BER.
Disadvantage of QPSK over BPSK:
• The engineering penalty that is paid is that QPSK transmitters and
receivers are more complicated than the ones for BPSK.
Differential Phase Shift Keying (DPSK)
• The phase of the modulated signal is shifted relative to the previous signal
element.
• No reference signal is considered here.
• The signal phase follows the high or low state of the previous element.
• This DPSK technique doesn’t need a reference oscillator.
• It is seen from the above figure that, if the data bit is Low i.e., 0, then
the phase of the signal is not reversed, but continued as it was.
• If the data is a High i.e., 1, then the phase of the signal is reversed, as
with NRZI, invert on 1 (a form of differential encoding).
• If we observe the above waveform, we can say that the High state
represents an M in the modulating signal and the Low state
represents a W in the modulating signal.
DPSK Modulator
• In DPSK demodulator, the phase of the reversed bit is compared with the
phase of the previous bit.
• From the below figure, it is evident that the balance modulator is given
the DPSK signal along with 1-bit delay input.
• That signal is made to confine to lower frequencies with the help of LPF.
• Then it is passed to a shaper circuit, which is a comparator or a Schmitt
trigger circuit, to recover the original binary data as the output.
A Block Diagram of DPSK Demodulator
Information Theory
• Information is the source of a communication system, whether it is analog or
digital. Information theory is a mathematical approach to the study of coding
of information along with the quantification, storage, and communication of
information.
• Conditions of Occurrence of Events
• If we consider an event, there are three conditions of occurrence.
• If the event has not occurred, there is a condition of uncertainty.
• If the event has just occurred, there is a condition of surprise.
• If the event has occurred, a time back, there is a condition of having some
information.
• These three events occur at different times. The difference in these conditions
help us gain knowledge on the probabilities of the occurrence of events.
Channel Capacity
• The noise present in a channel creates unwanted errors between the input and
the output sequences of a digital communication system.
• The error probability should be very low, nearly ≤ 10-6 for a reliable
communication.
• The channel coding in a communication system, introduces redundancy with a
control, so as to improve the reliability of the system.
• The source coding reduces redundancy to improve the efficiency of the system.
• Channel coding consists of two parts of action.
• Mapping incoming data sequence into a channel input sequence.
• Inverse Mapping the channel output sequence into an output data sequence.
• The final target is that the overall effect of the channel noise should be
minimized.
• The mapping is done by the transmitter, with the help of an encoder, whereas
the inverse mapping is done by the decoder in the receiver.
Error Control Coding
• Noise or Error is the main problem in the signal, which disturbs the
reliability of the communication system. Error control coding is the
coding procedure done to control the occurrences of errors. These
techniques help in Error Detection and Error Correction.
• There are many different error correcting codes depending upon the
mathematical principles applied to them. But, historically, these codes
have been classified into Linear block codes and Convolution codes.
Linear Block Codes
• In the linear block codes, the parity bits and message bits have a linear
combination, which means that the resultant code word is the linear
combination of any two code words.
• Let us consider some blocks of data, which contains k bits in each block.
These bits are mapped with the blocks which has n bits in each block. Here
n is greater than k. The transmitter adds redundant bits which are (n-k) bits.
The ratio k/n is the code rate. It is denoted by r and the value of r is r < 1.
• The (n-k) bits added here, are parity bits. Parity bits help in error detection
and error correction, and also in locating the data. In the data being
transmitted, the left most bits of the code word correspond to the message
bits, and the right most bits of the code word correspond to the parity bits.
Systematic Code
• Any linear block code can be a systematic code, until it is altered. Hence,
an unaltered block code is called as a systematic code.
• Following is the representation of the structure of code word, according
to their allocation.
• If the message is not altered, then it is called as systematic code. It means,
the encryption of the data should not change the data.
Convolution Codes
• The linearity property of the code word is that the sum of two code words is
also a code word.
• Hamming codes are the type of linear error correcting codes, which can
detect up to two bit errors or they can correct one bit errors without the
detection of uncorrected errors.
• While using the hamming codes, extra parity bits are used to identify a
single bit error.
• To get from one-bit pattern to the other, few bits are to be changed in the
data. Such number of bits can be termed as Hamming distance.
• If the parity has a distance of 2, one-bit flip can be detected. But this can't
be corrected. Also, any two bit flips cannot be detected.
• However, Hamming code is a better procedure than the previously discussed
ones in error detection and correction.
BCH Codes
• BCH codes are named after the inventors Bose, Chaudari and
Hocquenghem.
• During the BCH code design, there is control on the number of symbols
to be corrected and hence multiple bit correction is possible. BCH codes
is a powerful technique in error correcting codes.
• For any positive integers m ≥ 3 and t < 2m-1 there exists a BCH binary
code. Following are the parameters of such code.
• Block length n = 2m-1
• Number of parity-check digits n - k ≤ mt
• Minimum distance dmin ≥ 2t + 1
• This code can be called as t-error-correcting BCH code.
Cyclic Codes
• The cyclic property of code words is that any cyclic-shift of a code word is
also a code word. Cyclic codes follow this cyclic property.
• For a linear code C, if every code word i.e., C = (C1, C2, ...... Cn) from C has
a cyclic right shift of components, it becomes a code word. This shift of
right is equal to n-1 cyclic left shifts.
• Hence, it is invariant under any shift. So, the linear code C, as it is invariant
under any shift, can be called as a Cyclic code.
• Cyclic codes are used for error correction. They are mainly used to correct
double errors and burst errors.
• Hence, these are a few error correcting codes, which are to be
detected at the receiver.
• These codes prevent the errors from getting introduced and disturb
the communication.
• They also prevent the signal from getting tapped by unwanted
receivers.
• There is a class of signaling techniques to achieve this, which are
discussed in the next chapter.
Spread Spectrum Modulation
With these features, the spread spectrum signals are highly resistant to
interference or jamming. Since multiple users can share the same
spread spectrum bandwidth without interfering with one another,
these can be called as multiple access techniques.
FHSS and DSSS / CDMA
• Spread spectrum multiple access techniques uses signals which have a transmission
bandwidth of a magnitude greater than the minimum required RF bandwidth.
• These are of two types.
1. Frequency Hopped Spread Spectrum (FHSS)
2. Direct Sequence Spread Spectrum (DSSS)