Powerline Communication Link and below Layers

Size: px
Start display at page:

Download "Powerline Communication Link and below Layers"

Transcription

1 Powerline Communication Link and below Layers Notes by Rui Wang June 11, 2008 Introduction 2 Introduction Introduction Frequency-Shift Keying (FSK) Schemes 5 FSK Modulationthe transmitter side FSK Demodulationthe receiver side Questions for Consideration Spread Spectrum 9 Introduction My View Point From Simple to Complex Assumptions Interference The Vote Strategy Towards the Limit Another Viewpoint on Widening the Data Bit Maximize Code Distance Comparison between Code 1 and Code Temporary Conclusion Packet Synchronization 21 Terminologies and Assumptions The idea The Requirements of the Basic Idea Example 1: α = Example 3: α = Other Examples Bit Synchronization 28 What Why How Remark The Data Bit Recognition Algorithm The Data Bit Recognition and Synchronization Algorithm

2 Introduction 2 / 34 Introduction This talk will be about the principles and technologies below the Network Layer (NL) in our Power Line Communication Networks. Topics included in this talk are: Frequency-Shift Keying (FSK) modulation scheme. Direct-Sequence Spread Spectrum (DSSS). Synchronization. MAC Layer (ML). Link Layer (LL). Please note that I am not an expert in those topics. Up to now, I have not touch any standard textbook or literature about modulation schemes or spread spectrum. I only know what and how FSK and DSSS do algorithmically. For why, my view point may be different from standard and popular understanding. R. EastSoft The Lower Layers in PLC Networks 3 / 34 Introduction For me, talking about the communication techniques is just like waving nife in front of Guangong, like shooting at obscure moving target. The road to becoming an electronic communication wizard is long and arduous, I have not yet take even a small step on that road. Most of you are already at near or more than half way of the road, far advanced than me. Still, I want to give this talk in the hope that inspiring a intensive disputation and discussion about the principles and techniques. you will have fewer struggle and greater pleasure on the way to competent PLC experts. R. EastSoft The Lower Layers in PLC Networks 4 / 34 2

3 Frequency-Shift Keying (FSK) Schemes 5 / 34 FSK Modulation the transmitter side Frequency-Shift Keying (FSK) is a modulation scheme in which digital information is transmitted through discrete frequency changes of a carrier wave. The simplest FSK is binary FSK (BFSK). As suggest by the name, it uses two discrete frequencies to transmit binary (0 s and 1 s) data. The 1 is called the master frequency and the 0 the space frequency. Fig 2.1 illustrates the idea of BFSK. Figure 2.1: Binary Frequency-Shift Keying Modulation Schemes at transmitter side. R. EastSoft The Lower Layers in PLC Networks 6 / 34 FSK Demodulation the receiver side On the receiver side, there is a demodulation circuit (demodulator) to detect the signal of either of the two frequencies. The demodulator output 1 signal level in detecting 1 frequency, and 0 signal level in detect 0 frequency. Note that there is no third output, even if actually there is no signal frequency. These two electricity levels are feeded to CPU for it to sample. Figure 2.2: BFSK Demodulation Schemes at receiver side. R. EastSoft The Lower Layers in PLC Networks 7 / 34 3

4 Questions for Consideration The above is just an abstract model for FSK. In what ideal circumstance can it work, i.e, in which situation if the transmitter transmits 10101, the receiver will indeed get 10101? What might us have to do additionally in real practice (e.g., in power line channel) to implement the idea of the model? What in FSK schemes should be quantified and parameterized in order for further analysis? R. EastSoft The Lower Layers in PLC Networks 8 / 34 Spread Spectrum 9 / 34 Introduction Spread Spectrum techniques are methods to generate more energy for each data bit in transmission. These techniques are used for variety reasons, including for examples: 1. preventing detection by hiding the fact that communication is taking place. 2. the establishment of secure communications 3. increasing resistance to natural interference and jamming. R. EastSoft The Lower Layers in PLC Networks 10 / 34 My View Point I personally don t very agree with that spread spectrum techniques give us more information security in communication. I do agree with that the techniques can provide us with ability to resist noise. This can be explained from more than one points of view, such as energy, processing gain, and error correction code. I also believe that spread spectrum techniques offer us a way to synchronize. In fact the Pseudo Noise code (PN code) or the Pseudo Random Noise code (PRN code) used in the techniques is designed under the constraint to facilitate synchronization. R. EastSoft The Lower Layers in PLC Networks 11 / 34 4

5 From Simple to Complex Spread Spectrum is independent of modulation schemes. That is, Spread Spectrum is not necessarily base on FSK, it can also be implemented the top of other schemes like PSK, ASK, etc. The whole Spread Spectrum technique consists of many contents and thus hard to swallow at once. A system, whatever complicated, is sprouted from a simple seed and experienced a long history of growing during which new facilities shoot out like weeds to tackle practice problems the prototype model does not takes into account. I don t know the development history of Spread Spectrum, I believe there is a such one from simple to complex. In this presentation, I will try to follow a development history I guess or imagine, just for easying your understanding. R. EastSoft The Lower Layers in PLC Networks 12 / 34 Assumptions Let us first assume the following assumptions for FSK: The receiver and the transmitter have been synchronized, i.e., the receiver knows exactly when the transmitter will start to shout out the data. At the transmitter side, a 0 or 1 frequency always last for w seconds. So, at the receiver side, the the pulse produced by the demodulator to represent 0 or 1 has a width of w seconds. The CPU of the receiver samples the pules at a rate of s points per second. Thus, the receiver s CPU gets w/s sample points per data bit. E.g., in Fig. 2.1, the CPU samples at a rate of 8 points/data bit. Next we consider the situation of noisy channels. R. EastSoft The Lower Layers in PLC Networks 13 / 34 Interference If there is no interference caused by the noise or other factors, then knowing the time the transmitter begin to send data out, the receiver can begin to sample at (better at s/2 seconds after) the starting time. Then every successive w/s points would must be either or , representing a 0 or 1 corresponding data bit transmitted by the transmitter. But, practically, some of the points may be flipped, due to the noise interference existing in the channel, the timing difference between the transmitter and the receiver. This will happen in practice because there is no global clock, the local clock may tick at different rates and the synchronization mechanism can only give the receiver an approximate staring-time, leading to the first or the last sample point to be in great danger of being sampled at the pules boundary. R. EastSoft The Lower Layers in PLC Networks 14 / 34 5

6 The Vote Strategy Can the interference and the time-difference mentioned in the previous slide be thoroughly eliminated? not really. We can only try to work correctly in their existence. So, a basic strategy to deal with the interference is by votes. Count the number of 0 points and the number of the 1 points among the w/s points corresponding to a data bit. If there are more 0 points than 1 points then the data bit is reconstructed as 0, if equal we can detect errors but not correct them, otherwise we conclude the data bit is 1. If the interference flips less than half of the sample points of each data bit, the Vote strategy is able to correct all the errors. Otherwise, data bit will be flipped. R. EastSoft The Lower Layers in PLC Networks 15 / 34 Towards the Limit Clearly, that half of the width w of a data bit pulse being interfered is a limit for Vote strategy to work correctly. Theoretically, The Vote strategy needs to sample enough number of points within a data bit to reach the ability limit. However, the CPU used to sample imposes practical limit on sampling rate. A alternate solution is to widen the data bit so that each bit can accommodate more sample points. For example, by doubling the time for 0 and 1 frequencies, the number of sample points for each data bit is doubled. R. EastSoft The Lower Layers in PLC Networks 16 / 34 Another Viewpoint on Widening the Data Bit Doubling the frequency time can be equivalently viewed as before the modulation, each data bit 0 is replaced with 00 and each 1 with 11, i.e., each data bit is repeated in the information, or more generally, considering that we code every data bit with a string, 0 with 00 and 1 with 11. This perspective, though simple, raises more questions for us to consider, and provides us with more space for further investigation and study. R. EastSoft The Lower Layers in PLC Networks 17 / 34 6

7 Maximize Code Distance Available choices for code one bit into two are (symmetric cases omitted): for 0 and 11 for for 0 and 01 for for 0 and 10 for 1 Why repeat?, i.e., why the first?, why not the other two? Code 2 can be eliminated from our consideration because it has a shorter distance between the 0 and the 1 codes. The Hamming distance between two strings of equal length is the number of positions for which the corresponding symbols are different. Larger Hamming distance gives larger possibility to be distinguished. We should select the code in which one code is the complementary of the other. Both Code 1 and Code 3 satisfy the requirement. R. EastSoft The Lower Layers in PLC Networks 18 / 34 Comparison between Code 1 and Code 2 Both has its own advantages and disadvantages. Code 1 just repeats the bits it is to code, there are no changes from 1 to 0 and/or from 0 to 1 within the code. Advantage: Require less exact synchronization. Disadvantage: Unbalance, the transportation ability for data bit 0 is not the same as that for data bit 1, because practical environment and devices are often unbalance, for example, the channel tends to disturb the 0 and 1 frequencies with different strength. Code 3 has the same number of 1 s and 0 s, there are 0-1 and 1-0 changes. Advantage: Balanced, sensitive to bad synchronization. Disadvantage: A small time error in synchronization may lead to some sample points evaluated error values. R. EastSoft The Lower Layers in PLC Networks 19 / 34 Temporary Conclusion To resist interference, a practical solution is to code data bit with strings of reasonable length k. Let s term the strings PN Code. The PN Code for 1 and that for 0 should be complementary so that they have a maximum Hamming distance k. The PN code should have (near) the same number of 0 s and 1 s. For receiving, minimize the number of appearances of 01 and 10 in the PN Code, For synchronization, maximize the number. However, as discussed shortly, there are other requirements from synchronization for PN Codes. R. EastSoft The Lower Layers in PLC Networks 20 / 34 7

8 Packet Synchronization 21 / 34 Terminologies and Assumptions In this section, we adopt the following assumptions and terminologies. Let α denote the PN code for data bit 1 and α the PN code for 0. Call a bit in α or α a chip (bit). The sample rate is s points/second, in the term of chip, c points/chip. R. EastSoft The Lower Layers in PLC Networks 22 / 34 The idea The basic idea for packet synchronization is as follows. The transmitter sends a block S of consecutive 1 s. Typically S 4 B(ytes), called Synchronization head. On the chip level, S = αα... αα, containing S α chips, each data bits being coded into α chips. On the sample point level, we view a data bit as a tring consisting of α c points. This is because each chip generates c points, and each data bit α c points. We will let β be the binary string consisting of the sample points for data bit 1 (i.e., α). The receiver samples α s points, get a binary string γ of length α c = β, equal to the number of points for one data bit. Expecting that γ is a substring of ββ, i.e., a cyclic rotation of string β, the receiver search for the starting position i of γ s appearance in ββ. The starting time the transmitter send out the data bit is where b is time the receiver samples the first ponit and b (i 1)s, 1 i β = γ = α s. R. EastSoft The Lower Layers in PLC Networks 23 / 34 The Requirements of the Basic Idea The position for γ to appear in ββ must be unique. Put another way, every substring of length β of ββ should be distinct, or equivalently, every cyclic rotation of β results in a different string. Note that there are β cyclic rotations of the string β. Considering there are noise interference, we will no longer hope that γ is an exact cyclic rotation of β, Instead we just look among the β rotations for the one most similar to γ. Here the similarity is measured by the Hamming distance. So, it is highly desirable that β should be such that the minimum distance of pairs of the β rotations is maximized. The above requirement is also applicable to the PN code α. That is, we should select such a string α as PN code that the minimum distance between the α rotations is maximized. In the above sense, is certainly not qualified to be a PN code. R. EastSoft The Lower Layers in PLC Networks 24 / 34 8

9 Example 1: α = 3 Figure 4.3: Three-Bit Binary Strings. We can let α = 011, which has cyclic rotations 011, 110, and 101, with that every pair of the rotations has a distance of 2. R. EastSoft The Lower Layers in PLC Networks 25 / 34 Example 3: α = 4 Figure 4.4: 4-Bit Binary Strings. We can let α = 1100, which has cyclic rotations 1100, 1001, 0011, and 0110, with that every pair of the rotations has a distance of 2. One flaw for 1100 being a PN code is that 1100 = 0011 is one of its cyclic rotations. R. EastSoft The Lower Layers in PLC Networks 26 / 34 Other Examples α = 7: α = , which has cyclic rotations , , , , , , and , distance 2 between any two rotations. α = 15: α = The 15 cyclic rotations are , , , , ,..., Distance 8, 0-1 appearances 8. α = 31: α = The 31 cyclic rotations are , , ,..., Distance 16, 0-1 appearances 16. α = 63: α = There are 63 cyclic rotations with distance 32, 0-1 appearances 32. R. EastSoft The Lower Layers in PLC Networks 27 / 34 9

10 Bit Synchronization 28 / 34 What Bit synchronization is proposed to fine tune the (synchronization) time in the process of receiving every data bit of the packet body. That is, after recognized a data bit, bit synchronization may adjust (delay or advance) beginning time for sampling the next data bit by a time interval of a few sample points. R. EastSoft The Lower Layers in PLC Networks 29 / 34 Why When beginning to recognize the packet body, the receiver has been synchronized with the transmitter via the block S traveling ahead of the packet body. However, there may still be some time difference between the two sides (the transmitter and the receiver). The time error left by the packet synchronization. As the basic unit for time adjustment is s seconds, packet synchronization can only theoretically guarantee that the time error is no larger than s/2 seconds. The local clock respective in the transmitter and the receiver are generally tick at different rate, accumulating larger and larger time error between the two sides. The time error can cause sample points error. With a PN code of q 01 and 10 appearances, a time error of r sample points will lead to rq points being flipped. Such error in effect is the as the error cause by noise interference, therefore it weakens the ability of resisting interference. So, it is important to narrow the time error as small as possible, as what be done by bit synchronization. R. EastSoft The Lower Layers in PLC Networks 30 / 34 How There are several ways to do bit synchronization. For Examples: 1. Let the transmitter insert a synchronization block S = 11 between every two successive data bits in the packet body. The receiver can use that block to re-synchronize its time with the transmitter. 2. After Recognizing a data bit x, the receiver try to see whether by advancing or delaying the sample points for that bit x will result in a sample string more similar to β (if x = 1) or β (if x = 0), if yes, advance or delay the starting time to sample the next data bit. R. EastSoft The Lower Layers in PLC Networks 31 / 34 10

11 Remark The first method needs to do work both on the transmitting program and on the receiving program, with heavy computation for synchronization and with extra cost to transport more data bits (the length of the packet is tripled). The second idea is more neat, without the cost on communication. The computation, though seems heavy, can be on-line implemented with high skill and art. Our method is the second. R. EastSoft The Lower Layers in PLC Networks 32 / 34 The Data Bit Recognition Algorithm To save time, Data Bit Synchronization is designed to interleave with Data Bit Recognition algorithm. Alg. 1 on the right describes the Data Bit Recognition in high level, implement details are omitted. It is on line. The basic idea in Alg. 1 is to guess the data bit being transmitted is 1 : on getting the ith sample point x, compare x with the ith bit in the standard sample string β for data bit 1, the ith point contributes 1 to the guess if equal, no contribution otherwise. When finishing the sample for the data bit, check if the total contribute at least half of the total number of sample points, it is 1 if yes and 0 otherwise. Algorithm 1 DataBitRcgntn Require: B is the number of points to be sample within a data bit; A timer has been set to the time for sampling the first point of the current data bit. Ensure: Recognize and write down the data bit transmitted currently. 1: x = 0 2: for 1 i B do 3: Wait for the sample time 4: Sample a point p 5: Set the time to sample the next point 6: if p = β[i] then 7: x = x + 1 8: end if 9: end for [ 10: if x > B 2 11: print 1 12: else 13: print 0 14: end if ] then R. EastSoft The Lower Layers in PLC Networks 33 / 34 11

12 The Data Bit Recognition and Synchronization Algorithm Algorithm 2 Data Bit Recognition and Synchronization Ensure: Recognize and write down the current data bit; and adjust sample time (at most one sample point time) properly. 1: x 1 = x 0 = x +1 = 0 2: for 1 i B do 3: Wait for the sample time 4: Sample a point p 5: Set the time to sample the next point 6: if p = β[i] then 7: x 0 = x : end if 9: if p = β[i 1] then 10: x 1 = x : end if 12: if p = β[i + 1] then 13: x +1 = x : end if 15: end for 16: if x 0 > [ B 2 ] then 17: print 1 18: if max{x 1, x 0, x +1 } = x 1 then 19: delay the timer by one sample time 20: else if max{x 1, x 0, x +1 } = x +1 then 21: advance the timer by one sample time 22: end if 23: else 24: print 0 25: if min{x 1, x 0, x +1 } = x 1 then 26: delay the timer by one sample time 27: else if min{x 1, x 0, x +1 } = x +1 then 28: advance the timer by one sample time 29: end if 30: end if R. EastSoft The Lower Layers in PLC Networks 34 / 34 12

Chapter 7 Spread-Spectrum Modulation

Chapter 7 Spread-Spectrum Modulation Chapter 7 Spread-Spectrum Modulation Spread Spectrum Technique simply consumes spectrum in excess of the minimum spectrum necessary to send the data. 7.1 Introduction Definition of spread-spectrum modulation

More information

Time division multiplexing The block diagram for TDM is illustrated as shown in the figure

Time division multiplexing The block diagram for TDM is illustrated as shown in the figure CHAPTER 2 Syllabus: 1) Pulse amplitude modulation 2) TDM 3) Wave form coding techniques 4) PCM 5) Quantization noise and SNR 6) Robust quantization Pulse amplitude modulation In pulse amplitude modulation,

More information

Chapter 7 Spread-Spectrum Modulation

Chapter 7 Spread-Spectrum Modulation Chapter 7 Spread-Spectrum Modulation Spread Spectrum Technique simply consumes spectrum in excess of the minimum spectrum necessary to send the data. 7.1 Introduction o Definition of spread-spectrum modulation

More information

Lecture 3 Concepts for the Data Communications and Computer Interconnection

Lecture 3 Concepts for the Data Communications and Computer Interconnection Lecture 3 Concepts for the Data Communications and Computer Interconnection Aim: overview of existing methods and techniques Terms used: -Data entities conveying meaning (of information) -Signals data

More information

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( ) CHAPTER 2 Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication (2170710) Syllabus Chapter-2.4 Spread Spectrum Spread Spectrum SS was developed initially for military and intelligence

More information

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Spread Spectrum Chapter 18 FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Single Carrier The traditional way Transmitted signal

More information

Chapter 2 Direct-Sequence Systems

Chapter 2 Direct-Sequence Systems Chapter 2 Direct-Sequence Systems A spread-spectrum signal is one with an extra modulation that expands the signal bandwidth greatly beyond what is required by the underlying coded-data modulation. Spread-spectrum

More information

Lecture 9: Spread Spectrum Modulation Techniques

Lecture 9: Spread Spectrum Modulation Techniques Lecture 9: Spread Spectrum Modulation Techniques Spread spectrum (SS) modulation techniques employ a transmission bandwidth which is several orders of magnitude greater than the minimum required bandwidth

More information

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK. Subject Name: Digital Communication Techniques

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK. Subject Name: Digital Communication Techniques KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK Subject Code: EC1351 Year/Sem: III/IV Subject Name: Digital Communication Techniques UNIT I PULSE MODULATION

More information

COMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES

COMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES COMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES Encoding Coding is the process of embedding clocks into a given data stream and producing a signal that can be transmitted over a selected medium.

More information

Thus there are three basic modulation techniques: 1) AMPLITUDE SHIFT KEYING 2) FREQUENCY SHIFT KEYING 3) PHASE SHIFT KEYING

Thus there are three basic modulation techniques: 1) AMPLITUDE SHIFT KEYING 2) FREQUENCY SHIFT KEYING 3) PHASE SHIFT KEYING CHAPTER 5 Syllabus 1) Digital modulation formats 2) Coherent binary modulation techniques 3) Coherent Quadrature modulation techniques 4) Non coherent binary modulation techniques. Digital modulation formats:

More information

Spread Spectrum Techniques

Spread Spectrum Techniques 0 Spread Spectrum Techniques Contents 1 1. Overview 2. Pseudonoise Sequences 3. Direct Sequence Spread Spectrum Systems 4. Frequency Hopping Systems 5. Synchronization 6. Applications 2 1. Overview Basic

More information

Spread Spectrum (SS) is a means of transmission in which the signal occupies a

Spread Spectrum (SS) is a means of transmission in which the signal occupies a SPREAD-SPECTRUM SPECTRUM TECHNIQUES: A BRIEF OVERVIEW SS: AN OVERVIEW Spread Spectrum (SS) is a means of transmission in which the signal occupies a bandwidth in excess of the minimum necessary to send

More information

Lecture 3. Direct Sequence Spread Spectrum Systems. COMM 907:Spread Spectrum Communications

Lecture 3. Direct Sequence Spread Spectrum Systems. COMM 907:Spread Spectrum Communications COMM 907: Spread Spectrum Communications Lecture 3 Direct Sequence Spread Spectrum Systems Performance of DSSSS with BPSK Modulation in presence of Interference (Jamming) Broadband Interference (Jamming):

More information

Year : TYEJ Sub: Digital Communication (17535) Assignment No. 1. Introduction of Digital Communication. Question Exam Marks

Year : TYEJ Sub: Digital Communication (17535) Assignment No. 1. Introduction of Digital Communication. Question Exam Marks Assignment 1 Introduction of Digital Communication Sr. Question Exam Marks 1 Draw the block diagram of the basic digital communication system. State the function of each block in detail. W 2015 6 2 State

More information

Code Division Multiple Access.

Code Division Multiple Access. Code Division Multiple Access Mobile telephony, using the concept of cellular architecture, are built based on GSM (Global System for Mobile communication) and IS-95(Intermediate Standard-95). CDMA allows

More information

PULSE CODE MODULATION TELEMETRY Properties of Various Binary Modulation Types

PULSE CODE MODULATION TELEMETRY Properties of Various Binary Modulation Types PULSE CODE MODULATION TELEMETRY Properties of Various Binary Modulation Types Eugene L. Law Telemetry Engineer Code 1171 Pacific Missile Test Center Point Mugu, CA 93042 ABSTRACT This paper discusses the

More information

Class 4 ((Communication and Computer Networks))

Class 4 ((Communication and Computer Networks)) Class 4 ((Communication and Computer Networks)) Lesson 5... SIGNAL ENCODING TECHNIQUES Abstract Both analog and digital information can be encoded as either analog or digital signals. The particular encoding

More information

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings

More information

KINGS DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING DIGITAL COMMUNICATION TECHNIQUES YEAR/SEM: III / VI BRANCH : ECE PULSE MODULATION

KINGS DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING DIGITAL COMMUNICATION TECHNIQUES YEAR/SEM: III / VI BRANCH : ECE PULSE MODULATION KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING SUB.NAME : EC1351 DIGITAL COMMUNICATION TECHNIQUES BRANCH : ECE YEAR/SEM: III / VI UNIT I PULSE MODULATION PART A (2

More information

Design of Simulcast Paging Systems using the Infostream Cypher. Document Number Revsion B 2005 Infostream Pty Ltd. All rights reserved

Design of Simulcast Paging Systems using the Infostream Cypher. Document Number Revsion B 2005 Infostream Pty Ltd. All rights reserved Design of Simulcast Paging Systems using the Infostream Cypher Document Number 95-1003. Revsion B 2005 Infostream Pty Ltd. All rights reserved 1 INTRODUCTION 2 2 TRANSMITTER FREQUENCY CONTROL 3 2.1 Introduction

More information

Chapter 2 Overview - 1 -

Chapter 2 Overview - 1 - Chapter 2 Overview Part 1 (last week) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (today) Modulation, Coding, Error Correction Part 3 (next

More information

Error Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria

Error Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria Error Control Coding Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria Topics Introduction The Channel Coding Problem Linear Block Codes Cyclic Codes BCH and Reed-Solomon

More information

Spread Spectrum Communications and Jamming Prof. Kutty Shajahan M G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur

Spread Spectrum Communications and Jamming Prof. Kutty Shajahan M G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur Spread Spectrum Communications and Jamming Prof. Kutty Shajahan M G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur Lecture - 06 Tutorial I Hello friends, welcome to this

More information

Spreading Codes and Characteristics. Error Correction Codes

Spreading Codes and Characteristics. Error Correction Codes Spreading Codes and Characteristics and Error Correction Codes Global Navigational Satellite Systems (GNSS-6) Short course, NERTU Prasad Krishnan International Institute of Information Technology, Hyderabad

More information

Rep. ITU-R BO REPORT ITU-R BO SATELLITE-BROADCASTING SYSTEMS OF INTEGRATED SERVICES DIGITAL BROADCASTING

Rep. ITU-R BO REPORT ITU-R BO SATELLITE-BROADCASTING SYSTEMS OF INTEGRATED SERVICES DIGITAL BROADCASTING Rep. ITU-R BO.7- REPORT ITU-R BO.7- SATELLITE-BROADCASTING SYSTEMS OF INTEGRATED SERVICES DIGITAL BROADCASTING (Questions ITU-R 0/0 and ITU-R 0/) (990-994-998) Rep. ITU-R BO.7- Introduction The progress

More information

Syllabus. osmania university UNIT - I UNIT - II UNIT - III CHAPTER - 1 : INTRODUCTION TO DIGITAL COMMUNICATION CHAPTER - 3 : INFORMATION THEORY

Syllabus. osmania university UNIT - I UNIT - II UNIT - III CHAPTER - 1 : INTRODUCTION TO DIGITAL COMMUNICATION CHAPTER - 3 : INFORMATION THEORY i Syllabus osmania university UNIT - I CHAPTER - 1 : INTRODUCTION TO Elements of Digital Communication System, Comparison of Digital and Analog Communication Systems. CHAPTER - 2 : DIGITAL TRANSMISSION

More information

QUESTION BANK SUBJECT: DIGITAL COMMUNICATION (15EC61)

QUESTION BANK SUBJECT: DIGITAL COMMUNICATION (15EC61) QUESTION BANK SUBJECT: DIGITAL COMMUNICATION (15EC61) Module 1 1. Explain Digital communication system with a neat block diagram. 2. What are the differences between digital and analog communication systems?

More information

Efficient UMTS. 1 Introduction. Lodewijk T. Smit and Gerard J.M. Smit CADTES, May 9, 2003

Efficient UMTS. 1 Introduction. Lodewijk T. Smit and Gerard J.M. Smit CADTES, May 9, 2003 Efficient UMTS Lodewijk T. Smit and Gerard J.M. Smit CADTES, email:smitl@cs.utwente.nl May 9, 2003 This article gives a helicopter view of some of the techniques used in UMTS on the physical and link layer.

More information

Department of Electronics and Communication Engineering 1

Department of Electronics and Communication Engineering 1 UNIT I SAMPLING AND QUANTIZATION Pulse Modulation 1. Explain in detail the generation of PWM and PPM signals (16) (M/J 2011) 2. Explain in detail the concept of PWM and PAM (16) (N/D 2012) 3. What is the

More information

Research on Development & Key Technology of PLC

Research on Development & Key Technology of PLC Research on Development & Key Technology of PLC Jie Chen a, Li Wang b College of Electronic Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China; avircochen@foxmail.com,

More information

Partial overlapping channels are not damaging

Partial overlapping channels are not damaging Journal of Networking and Telecomunications (2018) Original Research Article Partial overlapping channels are not damaging Jing Fu,Dongsheng Chen,Jiafeng Gong Electronic Information Engineering College,

More information

SEN366 Computer Networks

SEN366 Computer Networks SEN366 Computer Networks Prof. Dr. Hasan Hüseyin BALIK (5 th Week) 5. Signal Encoding Techniques 5.Outline An overview of the basic methods of encoding digital data into a digital signal An overview of

More information

EE 460L University of Nevada, Las Vegas ECE Department

EE 460L University of Nevada, Las Vegas ECE Department EE 460L PREPARATION 1- ASK Amplitude shift keying - ASK - in the context of digital communications is a modulation process which imparts to a sinusoid two or more discrete amplitude levels. These are related

More information

Spread Spectrum: Definition

Spread Spectrum: Definition Spread Spectrum: Definition refers to the expansion of signal bandwidth, by several orders of magnitude in some cases, which occurs when a key is attached to the communication channel an RF communications

More information

Data transmission - Transmission modes

Data transmission - Transmission modes Data transmission - Transmission modes Transmission modes A given transmission on a communications channel between two machines can occur in several different ways. The transmission is characterised by:

More information

Introduction to Error Control Coding

Introduction to Error Control Coding Introduction to Error Control Coding 1 Content 1. What Error Control Coding Is For 2. How Coding Can Be Achieved 3. Types of Coding 4. Types of Errors & Channels 5. Types of Codes 6. Types of Error Control

More information

Frequency-Hopped Spread-Spectrum

Frequency-Hopped Spread-Spectrum Chapter Frequency-Hopped Spread-Spectrum In this chapter we discuss frequency-hopped spread-spectrum. We first describe the antijam capability, then the multiple-access capability and finally the fading

More information

Encoding and Framing

Encoding and Framing Encoding and Framing EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Tuesday Nov 2, 2004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Questions

More information

DE63 DIGITAL COMMUNICATIONS DEC 2014

DE63 DIGITAL COMMUNICATIONS DEC 2014 Q.2 a. Draw the bandwidth efficiency curve w.r.t E b /N o. Compute the value of E b /N o required to achieve the data rate equal to the channel capacity if the channel bandwidth tends to infinity b. A

More information

Encoding and Framing. Questions. Signals: Analog vs. Digital. Signals: Periodic vs. Aperiodic. Attenuation. Data vs. Signal

Encoding and Framing. Questions. Signals: Analog vs. Digital. Signals: Periodic vs. Aperiodic. Attenuation. Data vs. Signal Questions Encoding and Framing Why are some links faster than others? What limits the amount of information we can send on a link? How can we increase the capacity of a link? EECS 489 Computer Networks

More information

Spread Spectrum Modulation

Spread Spectrum Modulation Spread Spectrum Modulation A collective class of signaling techniques are employed before transmitting a signal to provide a secure communication, known as the Spread Spectrum Modulation. The main advantage

More information

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1 Wireless Networks: Physical Layer: Modulation, FEC Guevara Noubir Noubir@ccsneuedu S, COM355 Wireless Networks Lecture 3, Lecture focus Modulation techniques Bit Error Rate Reducing the BER Forward Error

More information

ECS455: Chapter 4 Multiple Access

ECS455: Chapter 4 Multiple Access ECS455: Chapter 4 Multiple Access 4.4 DS/SS 1 Dr.Prapun Suksompong prapun.com/ecs455 Office Hours: BKD 3601-7 Wednesday 15:30-16:30 Friday 9:30-10:30 Spread spectrum (SS) Historically spread spectrum was

More information

Multiple Access Schemes

Multiple Access Schemes Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many

More information

Chapter 4 Investigation of OFDM Synchronization Techniques

Chapter 4 Investigation of OFDM Synchronization Techniques Chapter 4 Investigation of OFDM Synchronization Techniques In this chapter, basic function blocs of OFDM-based synchronous receiver such as: integral and fractional frequency offset detection, symbol timing

More information

Multiplexing Module W.tra.2

Multiplexing Module W.tra.2 Multiplexing Module W.tra.2 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Multiplexing W.tra.2-2 Multiplexing shared medium at

More information

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions EECS 122: Introduction to Computer Networks Encoding and Framing Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

Study on the UWB Rader Synchronization Technology

Study on the UWB Rader Synchronization Technology Study on the UWB Rader Synchronization Technology Guilin Lu Guangxi University of Technology, Liuzhou 545006, China E-mail: lifishspirit@126.com Shaohong Wan Ari Force No.95275, Liuzhou 545005, China E-mail:

More information

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Lecture 4: Wireless Physical Layer: Channel Coding Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Channel Coding Modulated waveforms disrupted by signal propagation through wireless channel leads

More information

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 17 Today: Spread Spectrum: (1) Frequency Hopping, (2) Direct Sequence Reading: Today Molisch 18.1, 18.2. Thu: MUSE Channel

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU

More information

Digital Image Watermarking by Spread Spectrum method

Digital Image Watermarking by Spread Spectrum method Digital Image Watermarking by Spread Spectrum method Andreja Samčovi ović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Belgrade, november 2014. I Spread Spectrum Techniques

More information

Performance Analysis of DSSS and FHSS Techniques over AWGN Channel

Performance Analysis of DSSS and FHSS Techniques over AWGN Channel Performance Analysis of DSSS and FHSS Techniques over AWGN Channel M. Katta Swamy, M.Deepthi, V.Mounika, R.N.Saranya Vignana Bharathi Institute of Technology, Hyderabad, and Andhra Pradesh, India. Corresponding

More information

Universitas Sumatera Utara

Universitas Sumatera Utara Amplitude Shift Keying & Frequency Shift Keying Aim: To generate and demodulate an amplitude shift keyed (ASK) signal and a binary FSK signal. Intro to Generation of ASK Amplitude shift keying - ASK -

More information

Cross Spectral Density Analysis for Various Codes Suitable for Spread Spectrum under AWGN conditions with Error Detecting Code

Cross Spectral Density Analysis for Various Codes Suitable for Spread Spectrum under AWGN conditions with Error Detecting Code Cross Spectral Density Analysis for Various Codes Suitable for Spread Spectrum under AWG conditions with Error Detecting Code CH.ISHATHI 1, R.SUDAR RAJA 2 Department of Electronics and Communication Engineering,

More information

Wireless Communication in Embedded System. Prof. Prabhat Ranjan

Wireless Communication in Embedded System. Prof. Prabhat Ranjan Wireless Communication in Embedded System Prof. Prabhat Ranjan Material based on White papers from www.radiotronix.com Networked embedded devices In the past embedded devices were standalone Typically

More information

Chapter 2 Overview - 1 -

Chapter 2 Overview - 1 - Chapter 2 Overview Part 1 (last week) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (today) Modulation, Coding, Error Correction Part 3 (next

More information

Bandwidth Utilization:

Bandwidth Utilization: CHAPTER 6 Bandwidth Utilization: In real life, we have links with limited bandwidths. The wise use of these bandwidths has been, and will be, one of the main challenges of electronic communications. However,

More information

Wireless Networks. Why Wireless Networks? Wireless Local Area Network. Wireless Personal Area Network (WPAN)

Wireless Networks. Why Wireless Networks? Wireless Local Area Network. Wireless Personal Area Network (WPAN) Wireless Networks Why Wireless Networks? rate MBit/s 100.0 10.0 1.0 0.1 0.01 wired terminals WMAN WLAN CORDLESS (CT, DECT) Office Building stationary walking drive Indoor HIPERLAN UMTS CELLULAR (GSM) Outdoor

More information

Lecture 13. Introduction to OFDM

Lecture 13. Introduction to OFDM Lecture 13 Introduction to OFDM Ref: About-OFDM.pdf Orthogonal frequency division multiplexing (OFDM) is well-known to be effective against multipath distortion. It is a multicarrier communication scheme,

More information

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate

More information

Introduction to Coding Theory

Introduction to Coding Theory Coding Theory Massoud Malek Introduction to Coding Theory Introduction. Coding theory originated with the advent of computers. Early computers were huge mechanical monsters whose reliability was low compared

More information

Laboratory 5: Spread Spectrum Communications

Laboratory 5: Spread Spectrum Communications Laboratory 5: Spread Spectrum Communications Cory J. Prust, Ph.D. Electrical Engineering and Computer Science Department Milwaukee School of Engineering Last Update: 19 September 2018 Contents 0 Laboratory

More information

Wireless Medium Access Control and CDMA-based Communication Lesson 08 Auto-correlation and Barker Codes

Wireless Medium Access Control and CDMA-based Communication Lesson 08 Auto-correlation and Barker Codes Wireless Medium Access Control and CDMA-based Communication Lesson 08 Auto-correlation and Barker Codes 1 Coding Methods in CDMA Use distinctive spreading codes to spread the symbols before transmission

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #4 Physical Layer Threats; Jamming 2016 Patrick Tague 1 Class #4 PHY layer basics and threats Jamming 2016 Patrick Tague 2 PHY 2016 Patrick Tague

More information

Communications Theory and Engineering

Communications Theory and Engineering Communications Theory and Engineering Master's Degree in Electronic Engineering Sapienza University of Rome A.A. 2018-2019 TDMA, FDMA, CDMA (cont d) and the Capacity of multi-user channels Code Division

More information

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen. T305 T325 B BLOCK 3 4 PART III T325 Summary Session 11 Block III Part 3 Access & Modulation [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Prepared by:

More information

2016 Canadian Computing Olympiad Day 2, Problem 1 O Canada

2016 Canadian Computing Olympiad Day 2, Problem 1 O Canada Time Limit: second 06 Canadian Computing Olympiad Day, Problem O Canada Problem Description In this problem, a grid is an N-by-N array of cells, where each cell is either red or white. Some grids are similar

More information

RECOMMENDATION ITU-R BS

RECOMMENDATION ITU-R BS Rec. ITU-R BS.1194-1 1 RECOMMENDATION ITU-R BS.1194-1 SYSTEM FOR MULTIPLEXING FREQUENCY MODULATION (FM) SOUND BROADCASTS WITH A SUB-CARRIER DATA CHANNEL HAVING A RELATIVELY LARGE TRANSMISSION CAPACITY

More information

Wireless Networks (PHY): Design for Diversity

Wireless Networks (PHY): Design for Diversity Wireless Networks (PHY): Design for Diversity Y. Richard Yang 9/20/2012 Outline Admin and recap Design for diversity 2 Admin Assignment 1 questions Assignment 1 office hours Thursday 3-4 @ AKW 307A 3 Recap:

More information

Variable Step-Size LMS Adaptive Filters for CDMA Multiuser Detection

Variable Step-Size LMS Adaptive Filters for CDMA Multiuser Detection FACTA UNIVERSITATIS (NIŠ) SER.: ELEC. ENERG. vol. 7, April 4, -3 Variable Step-Size LMS Adaptive Filters for CDMA Multiuser Detection Karen Egiazarian, Pauli Kuosmanen, and Radu Ciprian Bilcu Abstract:

More information

Swedish College of Engineering and Technology Rahim Yar Khan

Swedish College of Engineering and Technology Rahim Yar Khan PRACTICAL WORK BOOK Telecommunication Systems and Applications (TL-424) Name: Roll No.: Batch: Semester: Department: Swedish College of Engineering and Technology Rahim Yar Khan Introduction Telecommunication

More information

Evaluation of Code Division Multiplexing on Power Line Communication

Evaluation of Code Division Multiplexing on Power Line Communication Evaluation of Code Division Multiplexing on Power Line Communication Adriano Favaro and Eduardo Parente Ribeiro Department of Electrical Engineering, Federal University of Parana CP 90, CEP 853-970 - Curitiba,

More information

Digital data (a sequence of binary bits) can be transmitted by various pule waveforms.

Digital data (a sequence of binary bits) can be transmitted by various pule waveforms. Chapter 2 Line Coding Digital data (a sequence of binary bits) can be transmitted by various pule waveforms. Sometimes these pulse waveforms have been called line codes. 2.1 Signalling Format Figure 2.1

More information

CH 5. Air Interface of the IS-95A CDMA System

CH 5. Air Interface of the IS-95A CDMA System CH 5. Air Interface of the IS-95A CDMA System 1 Contents Summary of IS-95A Physical Layer Parameters Forward Link Structure Pilot, Sync, Paging, and Traffic Channels Channel Coding, Interleaving, Data

More information

(Refer Slide Time: 3:11)

(Refer Slide Time: 3:11) Digital Communication. Professor Surendra Prasad. Department of Electrical Engineering. Indian Institute of Technology, Delhi. Lecture-2. Digital Representation of Analog Signals: Delta Modulation. Professor:

More information

Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world

Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world Visit us on the World Wide Web at: www.pearsoned.co.uk Pearson Education Limited 2014

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

HY448 Sample Problems

HY448 Sample Problems HY448 Sample Problems 10 November 2014 These sample problems include the material in the lectures and the guided lab exercises. 1 Part 1 1.1 Combining logarithmic quantities A carrier signal with power

More information

Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 2004.

Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 2004. EE29C - Spring 24 Advanced Topics in Circuit Design High-Speed Electrical Interfaces Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 24. Announcements Project phase 1 is posted

More information

RF Basics 15/11/2013

RF Basics 15/11/2013 27 RF Basics 15/11/2013 Basic Terminology 1/2 dbm is a measure of RF Power referred to 1 mw (0 dbm) 10mW(10dBm), 500 mw (27dBm) PER Packet Error Rate [%] percentage of the packets not successfully received

More information

AN INTRODUCTION TO ERROR CORRECTING CODES Part 2

AN INTRODUCTION TO ERROR CORRECTING CODES Part 2 AN INTRODUCTION TO ERROR CORRECTING CODES Part Jack Keil Wolf ECE 54 C Spring BINARY CONVOLUTIONAL CODES A binary convolutional code is a set of infinite length binary sequences which satisfy a certain

More information

Harmonic Distortion Levels Measured at The Enmax Substations

Harmonic Distortion Levels Measured at The Enmax Substations Harmonic Distortion Levels Measured at The Enmax Substations This report documents the findings on the harmonic voltage and current levels at ENMAX Power Corporation (EPC) substations. ENMAX is concerned

More information

Mobile & Wireless Networking. Lecture 2: Wireless Transmission (2/2)

Mobile & Wireless Networking. Lecture 2: Wireless Transmission (2/2) 192620010 Mobile & Wireless Networking Lecture 2: Wireless Transmission (2/2) [Schiller, Section 2.6 & 2.7] [Reader Part 1: OFDM: An architecture for the fourth generation] Geert Heijenk Outline of Lecture

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 3: Antennas, Propagation, and Spread Spectrum September 30, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Antennas and

More information

Using Modern Design Tools To Evaluate Complex Communication Systems: A Case Study on QAM, FSK and OFDM Transceiver Design

Using Modern Design Tools To Evaluate Complex Communication Systems: A Case Study on QAM, FSK and OFDM Transceiver Design Using Modern Design Tools To Evaluate Complex Communication Systems: A Case Study on QAM, FSK and OFDM Transceiver Design SOTIRIS H. KARABETSOS, SPYROS H. EVAGGELATOS, SOFIA E. KONTAKI, EVAGGELOS C. PICASIS,

More information

Synchronization using Insertion/Deletion Correcting Permutation Codes

Synchronization using Insertion/Deletion Correcting Permutation Codes Synchronization using Insertion/Deletion Correcting Permutation Codes Ling Cheng, Theo G. Swart and Hendrik C. Ferreira Department of Electrical and Electronic Engineering Science University of Johannesburg,

More information

DATE: June 14, 2007 TO: FROM: SUBJECT:

DATE: June 14, 2007 TO: FROM: SUBJECT: DATE: June 14, 2007 TO: FROM: SUBJECT: Pierre Collinet Chinmoy Gavini A proposal for quantifying tradeoffs in the Physical Layer s modulation methods of the IEEE 802.15.4 protocol through simulation INTRODUCTION

More information

Lab/Project Error Control Coding using LDPC Codes and HARQ

Lab/Project Error Control Coding using LDPC Codes and HARQ Linköping University Campus Norrköping Department of Science and Technology Erik Bergfeldt TNE066 Telecommunications Lab/Project Error Control Coding using LDPC Codes and HARQ Error control coding is an

More information

Spread Spectrum Communications and Jamming Prof. Debarati Sen G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur

Spread Spectrum Communications and Jamming Prof. Debarati Sen G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur Spread Spectrum Communications and Jamming Prof. Debarati Sen G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur Lecture 07 Slow and Fast Frequency Hopping Hello students,

More information

Average Delay in Asynchronous Visual Light ALOHA Network

Average Delay in Asynchronous Visual Light ALOHA Network Average Delay in Asynchronous Visual Light ALOHA Network Xin Wang, Jean-Paul M.G. Linnartz, Signal Processing Systems, Dept. of Electrical Engineering Eindhoven University of Technology The Netherlands

More information

TIMA Lab. Research Reports

TIMA Lab. Research Reports ISSN 292-862 TIMA Lab. Research Reports TIMA Laboratory, 46 avenue Félix Viallet, 38 Grenoble France ON-CHIP TESTING OF LINEAR TIME INVARIANT SYSTEMS USING MAXIMUM-LENGTH SEQUENCES Libor Rufer, Emmanuel

More information

ECE 435 Network Engineering Lecture 4

ECE 435 Network Engineering Lecture 4 ECE 435 Network Engineering Lecture 4 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 12 September 2016 Announcements Homework 2 was posted late, due next Monday Homework 1 grades

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #4 OMNET++ Intro; Physical Layer Threats 2015 Patrick Tague 1 Class #4 OMNET++ Intro PHY layer basics and threats 2015 Patrick Tague 2 Intro to

More information

Chapter 1 Acknowledgment:

Chapter 1 Acknowledgment: Chapter 1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. Manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts

More information

Performance Evaluation of different α value for OFDM System

Performance Evaluation of different α value for OFDM System Performance Evaluation of different α value for OFDM System Dr. K.Elangovan Dept. of Computer Science & Engineering Bharathidasan University richirappalli Abstract: Orthogonal Frequency Division Multiplexing

More information

Adaptive CDMA Cell Sectorization with Linear Multiuser Detection

Adaptive CDMA Cell Sectorization with Linear Multiuser Detection Adaptive CDMA Cell Sectorization with Linear Multiuser Detection Changyoon Oh Aylin Yener Electrical Engineering Department The Pennsylvania State University University Park, PA changyoon@psu.edu, yener@ee.psu.edu

More information

CIS 632 / EEC 687 Mobile Computing. Mobile Communications (for Dummies) Chansu Yu. Contents. Modulation Propagation Spread spectrum

CIS 632 / EEC 687 Mobile Computing. Mobile Communications (for Dummies) Chansu Yu. Contents. Modulation Propagation Spread spectrum CIS 632 / EEC 687 Mobile Computing Mobile Communications (for Dummies) Chansu Yu Contents Modulation Propagation Spread spectrum 2 1 Digital Communication 1 0 digital signal t Want to transform to since

More information

Electrical signal types

Electrical signal types Electrical signal types With BogusBus, our signals were very simple and straightforward: each signal wire (1 through 5) carried a single bit of digital data, 0 Volts representing "off" and 24 Volts DC

More information