Powerline Communication Link and below Layers
|
|
- Damon Boone
- 5 years ago
- Views:
Transcription
1 Powerline Communication Link and below Layers Notes by Rui Wang June 11, 2008 Introduction 2 Introduction Introduction Frequency-Shift Keying (FSK) Schemes 5 FSK Modulationthe transmitter side FSK Demodulationthe receiver side Questions for Consideration Spread Spectrum 9 Introduction My View Point From Simple to Complex Assumptions Interference The Vote Strategy Towards the Limit Another Viewpoint on Widening the Data Bit Maximize Code Distance Comparison between Code 1 and Code Temporary Conclusion Packet Synchronization 21 Terminologies and Assumptions The idea The Requirements of the Basic Idea Example 1: α = Example 3: α = Other Examples Bit Synchronization 28 What Why How Remark The Data Bit Recognition Algorithm The Data Bit Recognition and Synchronization Algorithm
2 Introduction 2 / 34 Introduction This talk will be about the principles and technologies below the Network Layer (NL) in our Power Line Communication Networks. Topics included in this talk are: Frequency-Shift Keying (FSK) modulation scheme. Direct-Sequence Spread Spectrum (DSSS). Synchronization. MAC Layer (ML). Link Layer (LL). Please note that I am not an expert in those topics. Up to now, I have not touch any standard textbook or literature about modulation schemes or spread spectrum. I only know what and how FSK and DSSS do algorithmically. For why, my view point may be different from standard and popular understanding. R. EastSoft The Lower Layers in PLC Networks 3 / 34 Introduction For me, talking about the communication techniques is just like waving nife in front of Guangong, like shooting at obscure moving target. The road to becoming an electronic communication wizard is long and arduous, I have not yet take even a small step on that road. Most of you are already at near or more than half way of the road, far advanced than me. Still, I want to give this talk in the hope that inspiring a intensive disputation and discussion about the principles and techniques. you will have fewer struggle and greater pleasure on the way to competent PLC experts. R. EastSoft The Lower Layers in PLC Networks 4 / 34 2
3 Frequency-Shift Keying (FSK) Schemes 5 / 34 FSK Modulation the transmitter side Frequency-Shift Keying (FSK) is a modulation scheme in which digital information is transmitted through discrete frequency changes of a carrier wave. The simplest FSK is binary FSK (BFSK). As suggest by the name, it uses two discrete frequencies to transmit binary (0 s and 1 s) data. The 1 is called the master frequency and the 0 the space frequency. Fig 2.1 illustrates the idea of BFSK. Figure 2.1: Binary Frequency-Shift Keying Modulation Schemes at transmitter side. R. EastSoft The Lower Layers in PLC Networks 6 / 34 FSK Demodulation the receiver side On the receiver side, there is a demodulation circuit (demodulator) to detect the signal of either of the two frequencies. The demodulator output 1 signal level in detecting 1 frequency, and 0 signal level in detect 0 frequency. Note that there is no third output, even if actually there is no signal frequency. These two electricity levels are feeded to CPU for it to sample. Figure 2.2: BFSK Demodulation Schemes at receiver side. R. EastSoft The Lower Layers in PLC Networks 7 / 34 3
4 Questions for Consideration The above is just an abstract model for FSK. In what ideal circumstance can it work, i.e, in which situation if the transmitter transmits 10101, the receiver will indeed get 10101? What might us have to do additionally in real practice (e.g., in power line channel) to implement the idea of the model? What in FSK schemes should be quantified and parameterized in order for further analysis? R. EastSoft The Lower Layers in PLC Networks 8 / 34 Spread Spectrum 9 / 34 Introduction Spread Spectrum techniques are methods to generate more energy for each data bit in transmission. These techniques are used for variety reasons, including for examples: 1. preventing detection by hiding the fact that communication is taking place. 2. the establishment of secure communications 3. increasing resistance to natural interference and jamming. R. EastSoft The Lower Layers in PLC Networks 10 / 34 My View Point I personally don t very agree with that spread spectrum techniques give us more information security in communication. I do agree with that the techniques can provide us with ability to resist noise. This can be explained from more than one points of view, such as energy, processing gain, and error correction code. I also believe that spread spectrum techniques offer us a way to synchronize. In fact the Pseudo Noise code (PN code) or the Pseudo Random Noise code (PRN code) used in the techniques is designed under the constraint to facilitate synchronization. R. EastSoft The Lower Layers in PLC Networks 11 / 34 4
5 From Simple to Complex Spread Spectrum is independent of modulation schemes. That is, Spread Spectrum is not necessarily base on FSK, it can also be implemented the top of other schemes like PSK, ASK, etc. The whole Spread Spectrum technique consists of many contents and thus hard to swallow at once. A system, whatever complicated, is sprouted from a simple seed and experienced a long history of growing during which new facilities shoot out like weeds to tackle practice problems the prototype model does not takes into account. I don t know the development history of Spread Spectrum, I believe there is a such one from simple to complex. In this presentation, I will try to follow a development history I guess or imagine, just for easying your understanding. R. EastSoft The Lower Layers in PLC Networks 12 / 34 Assumptions Let us first assume the following assumptions for FSK: The receiver and the transmitter have been synchronized, i.e., the receiver knows exactly when the transmitter will start to shout out the data. At the transmitter side, a 0 or 1 frequency always last for w seconds. So, at the receiver side, the the pulse produced by the demodulator to represent 0 or 1 has a width of w seconds. The CPU of the receiver samples the pules at a rate of s points per second. Thus, the receiver s CPU gets w/s sample points per data bit. E.g., in Fig. 2.1, the CPU samples at a rate of 8 points/data bit. Next we consider the situation of noisy channels. R. EastSoft The Lower Layers in PLC Networks 13 / 34 Interference If there is no interference caused by the noise or other factors, then knowing the time the transmitter begin to send data out, the receiver can begin to sample at (better at s/2 seconds after) the starting time. Then every successive w/s points would must be either or , representing a 0 or 1 corresponding data bit transmitted by the transmitter. But, practically, some of the points may be flipped, due to the noise interference existing in the channel, the timing difference between the transmitter and the receiver. This will happen in practice because there is no global clock, the local clock may tick at different rates and the synchronization mechanism can only give the receiver an approximate staring-time, leading to the first or the last sample point to be in great danger of being sampled at the pules boundary. R. EastSoft The Lower Layers in PLC Networks 14 / 34 5
6 The Vote Strategy Can the interference and the time-difference mentioned in the previous slide be thoroughly eliminated? not really. We can only try to work correctly in their existence. So, a basic strategy to deal with the interference is by votes. Count the number of 0 points and the number of the 1 points among the w/s points corresponding to a data bit. If there are more 0 points than 1 points then the data bit is reconstructed as 0, if equal we can detect errors but not correct them, otherwise we conclude the data bit is 1. If the interference flips less than half of the sample points of each data bit, the Vote strategy is able to correct all the errors. Otherwise, data bit will be flipped. R. EastSoft The Lower Layers in PLC Networks 15 / 34 Towards the Limit Clearly, that half of the width w of a data bit pulse being interfered is a limit for Vote strategy to work correctly. Theoretically, The Vote strategy needs to sample enough number of points within a data bit to reach the ability limit. However, the CPU used to sample imposes practical limit on sampling rate. A alternate solution is to widen the data bit so that each bit can accommodate more sample points. For example, by doubling the time for 0 and 1 frequencies, the number of sample points for each data bit is doubled. R. EastSoft The Lower Layers in PLC Networks 16 / 34 Another Viewpoint on Widening the Data Bit Doubling the frequency time can be equivalently viewed as before the modulation, each data bit 0 is replaced with 00 and each 1 with 11, i.e., each data bit is repeated in the information, or more generally, considering that we code every data bit with a string, 0 with 00 and 1 with 11. This perspective, though simple, raises more questions for us to consider, and provides us with more space for further investigation and study. R. EastSoft The Lower Layers in PLC Networks 17 / 34 6
7 Maximize Code Distance Available choices for code one bit into two are (symmetric cases omitted): for 0 and 11 for for 0 and 01 for for 0 and 10 for 1 Why repeat?, i.e., why the first?, why not the other two? Code 2 can be eliminated from our consideration because it has a shorter distance between the 0 and the 1 codes. The Hamming distance between two strings of equal length is the number of positions for which the corresponding symbols are different. Larger Hamming distance gives larger possibility to be distinguished. We should select the code in which one code is the complementary of the other. Both Code 1 and Code 3 satisfy the requirement. R. EastSoft The Lower Layers in PLC Networks 18 / 34 Comparison between Code 1 and Code 2 Both has its own advantages and disadvantages. Code 1 just repeats the bits it is to code, there are no changes from 1 to 0 and/or from 0 to 1 within the code. Advantage: Require less exact synchronization. Disadvantage: Unbalance, the transportation ability for data bit 0 is not the same as that for data bit 1, because practical environment and devices are often unbalance, for example, the channel tends to disturb the 0 and 1 frequencies with different strength. Code 3 has the same number of 1 s and 0 s, there are 0-1 and 1-0 changes. Advantage: Balanced, sensitive to bad synchronization. Disadvantage: A small time error in synchronization may lead to some sample points evaluated error values. R. EastSoft The Lower Layers in PLC Networks 19 / 34 Temporary Conclusion To resist interference, a practical solution is to code data bit with strings of reasonable length k. Let s term the strings PN Code. The PN Code for 1 and that for 0 should be complementary so that they have a maximum Hamming distance k. The PN code should have (near) the same number of 0 s and 1 s. For receiving, minimize the number of appearances of 01 and 10 in the PN Code, For synchronization, maximize the number. However, as discussed shortly, there are other requirements from synchronization for PN Codes. R. EastSoft The Lower Layers in PLC Networks 20 / 34 7
8 Packet Synchronization 21 / 34 Terminologies and Assumptions In this section, we adopt the following assumptions and terminologies. Let α denote the PN code for data bit 1 and α the PN code for 0. Call a bit in α or α a chip (bit). The sample rate is s points/second, in the term of chip, c points/chip. R. EastSoft The Lower Layers in PLC Networks 22 / 34 The idea The basic idea for packet synchronization is as follows. The transmitter sends a block S of consecutive 1 s. Typically S 4 B(ytes), called Synchronization head. On the chip level, S = αα... αα, containing S α chips, each data bits being coded into α chips. On the sample point level, we view a data bit as a tring consisting of α c points. This is because each chip generates c points, and each data bit α c points. We will let β be the binary string consisting of the sample points for data bit 1 (i.e., α). The receiver samples α s points, get a binary string γ of length α c = β, equal to the number of points for one data bit. Expecting that γ is a substring of ββ, i.e., a cyclic rotation of string β, the receiver search for the starting position i of γ s appearance in ββ. The starting time the transmitter send out the data bit is where b is time the receiver samples the first ponit and b (i 1)s, 1 i β = γ = α s. R. EastSoft The Lower Layers in PLC Networks 23 / 34 The Requirements of the Basic Idea The position for γ to appear in ββ must be unique. Put another way, every substring of length β of ββ should be distinct, or equivalently, every cyclic rotation of β results in a different string. Note that there are β cyclic rotations of the string β. Considering there are noise interference, we will no longer hope that γ is an exact cyclic rotation of β, Instead we just look among the β rotations for the one most similar to γ. Here the similarity is measured by the Hamming distance. So, it is highly desirable that β should be such that the minimum distance of pairs of the β rotations is maximized. The above requirement is also applicable to the PN code α. That is, we should select such a string α as PN code that the minimum distance between the α rotations is maximized. In the above sense, is certainly not qualified to be a PN code. R. EastSoft The Lower Layers in PLC Networks 24 / 34 8
9 Example 1: α = 3 Figure 4.3: Three-Bit Binary Strings. We can let α = 011, which has cyclic rotations 011, 110, and 101, with that every pair of the rotations has a distance of 2. R. EastSoft The Lower Layers in PLC Networks 25 / 34 Example 3: α = 4 Figure 4.4: 4-Bit Binary Strings. We can let α = 1100, which has cyclic rotations 1100, 1001, 0011, and 0110, with that every pair of the rotations has a distance of 2. One flaw for 1100 being a PN code is that 1100 = 0011 is one of its cyclic rotations. R. EastSoft The Lower Layers in PLC Networks 26 / 34 Other Examples α = 7: α = , which has cyclic rotations , , , , , , and , distance 2 between any two rotations. α = 15: α = The 15 cyclic rotations are , , , , ,..., Distance 8, 0-1 appearances 8. α = 31: α = The 31 cyclic rotations are , , ,..., Distance 16, 0-1 appearances 16. α = 63: α = There are 63 cyclic rotations with distance 32, 0-1 appearances 32. R. EastSoft The Lower Layers in PLC Networks 27 / 34 9
10 Bit Synchronization 28 / 34 What Bit synchronization is proposed to fine tune the (synchronization) time in the process of receiving every data bit of the packet body. That is, after recognized a data bit, bit synchronization may adjust (delay or advance) beginning time for sampling the next data bit by a time interval of a few sample points. R. EastSoft The Lower Layers in PLC Networks 29 / 34 Why When beginning to recognize the packet body, the receiver has been synchronized with the transmitter via the block S traveling ahead of the packet body. However, there may still be some time difference between the two sides (the transmitter and the receiver). The time error left by the packet synchronization. As the basic unit for time adjustment is s seconds, packet synchronization can only theoretically guarantee that the time error is no larger than s/2 seconds. The local clock respective in the transmitter and the receiver are generally tick at different rate, accumulating larger and larger time error between the two sides. The time error can cause sample points error. With a PN code of q 01 and 10 appearances, a time error of r sample points will lead to rq points being flipped. Such error in effect is the as the error cause by noise interference, therefore it weakens the ability of resisting interference. So, it is important to narrow the time error as small as possible, as what be done by bit synchronization. R. EastSoft The Lower Layers in PLC Networks 30 / 34 How There are several ways to do bit synchronization. For Examples: 1. Let the transmitter insert a synchronization block S = 11 between every two successive data bits in the packet body. The receiver can use that block to re-synchronize its time with the transmitter. 2. After Recognizing a data bit x, the receiver try to see whether by advancing or delaying the sample points for that bit x will result in a sample string more similar to β (if x = 1) or β (if x = 0), if yes, advance or delay the starting time to sample the next data bit. R. EastSoft The Lower Layers in PLC Networks 31 / 34 10
11 Remark The first method needs to do work both on the transmitting program and on the receiving program, with heavy computation for synchronization and with extra cost to transport more data bits (the length of the packet is tripled). The second idea is more neat, without the cost on communication. The computation, though seems heavy, can be on-line implemented with high skill and art. Our method is the second. R. EastSoft The Lower Layers in PLC Networks 32 / 34 The Data Bit Recognition Algorithm To save time, Data Bit Synchronization is designed to interleave with Data Bit Recognition algorithm. Alg. 1 on the right describes the Data Bit Recognition in high level, implement details are omitted. It is on line. The basic idea in Alg. 1 is to guess the data bit being transmitted is 1 : on getting the ith sample point x, compare x with the ith bit in the standard sample string β for data bit 1, the ith point contributes 1 to the guess if equal, no contribution otherwise. When finishing the sample for the data bit, check if the total contribute at least half of the total number of sample points, it is 1 if yes and 0 otherwise. Algorithm 1 DataBitRcgntn Require: B is the number of points to be sample within a data bit; A timer has been set to the time for sampling the first point of the current data bit. Ensure: Recognize and write down the data bit transmitted currently. 1: x = 0 2: for 1 i B do 3: Wait for the sample time 4: Sample a point p 5: Set the time to sample the next point 6: if p = β[i] then 7: x = x + 1 8: end if 9: end for [ 10: if x > B 2 11: print 1 12: else 13: print 0 14: end if ] then R. EastSoft The Lower Layers in PLC Networks 33 / 34 11
12 The Data Bit Recognition and Synchronization Algorithm Algorithm 2 Data Bit Recognition and Synchronization Ensure: Recognize and write down the current data bit; and adjust sample time (at most one sample point time) properly. 1: x 1 = x 0 = x +1 = 0 2: for 1 i B do 3: Wait for the sample time 4: Sample a point p 5: Set the time to sample the next point 6: if p = β[i] then 7: x 0 = x : end if 9: if p = β[i 1] then 10: x 1 = x : end if 12: if p = β[i + 1] then 13: x +1 = x : end if 15: end for 16: if x 0 > [ B 2 ] then 17: print 1 18: if max{x 1, x 0, x +1 } = x 1 then 19: delay the timer by one sample time 20: else if max{x 1, x 0, x +1 } = x +1 then 21: advance the timer by one sample time 22: end if 23: else 24: print 0 25: if min{x 1, x 0, x +1 } = x 1 then 26: delay the timer by one sample time 27: else if min{x 1, x 0, x +1 } = x +1 then 28: advance the timer by one sample time 29: end if 30: end if R. EastSoft The Lower Layers in PLC Networks 34 / 34 12
Chapter 7 Spread-Spectrum Modulation
Chapter 7 Spread-Spectrum Modulation Spread Spectrum Technique simply consumes spectrum in excess of the minimum spectrum necessary to send the data. 7.1 Introduction Definition of spread-spectrum modulation
More informationTime division multiplexing The block diagram for TDM is illustrated as shown in the figure
CHAPTER 2 Syllabus: 1) Pulse amplitude modulation 2) TDM 3) Wave form coding techniques 4) PCM 5) Quantization noise and SNR 6) Robust quantization Pulse amplitude modulation In pulse amplitude modulation,
More informationChapter 7 Spread-Spectrum Modulation
Chapter 7 Spread-Spectrum Modulation Spread Spectrum Technique simply consumes spectrum in excess of the minimum spectrum necessary to send the data. 7.1 Introduction o Definition of spread-spectrum modulation
More informationLecture 3 Concepts for the Data Communications and Computer Interconnection
Lecture 3 Concepts for the Data Communications and Computer Interconnection Aim: overview of existing methods and techniques Terms used: -Data entities conveying meaning (of information) -Signals data
More informationCHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )
CHAPTER 2 Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication (2170710) Syllabus Chapter-2.4 Spread Spectrum Spread Spectrum SS was developed initially for military and intelligence
More informationSpread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access
Spread Spectrum Chapter 18 FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Single Carrier The traditional way Transmitted signal
More informationChapter 2 Direct-Sequence Systems
Chapter 2 Direct-Sequence Systems A spread-spectrum signal is one with an extra modulation that expands the signal bandwidth greatly beyond what is required by the underlying coded-data modulation. Spread-spectrum
More informationLecture 9: Spread Spectrum Modulation Techniques
Lecture 9: Spread Spectrum Modulation Techniques Spread spectrum (SS) modulation techniques employ a transmission bandwidth which is several orders of magnitude greater than the minimum required bandwidth
More informationKINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK. Subject Name: Digital Communication Techniques
KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK Subject Code: EC1351 Year/Sem: III/IV Subject Name: Digital Communication Techniques UNIT I PULSE MODULATION
More informationCOMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES
COMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES Encoding Coding is the process of embedding clocks into a given data stream and producing a signal that can be transmitted over a selected medium.
More informationThus there are three basic modulation techniques: 1) AMPLITUDE SHIFT KEYING 2) FREQUENCY SHIFT KEYING 3) PHASE SHIFT KEYING
CHAPTER 5 Syllabus 1) Digital modulation formats 2) Coherent binary modulation techniques 3) Coherent Quadrature modulation techniques 4) Non coherent binary modulation techniques. Digital modulation formats:
More informationSpread Spectrum Techniques
0 Spread Spectrum Techniques Contents 1 1. Overview 2. Pseudonoise Sequences 3. Direct Sequence Spread Spectrum Systems 4. Frequency Hopping Systems 5. Synchronization 6. Applications 2 1. Overview Basic
More informationSpread Spectrum (SS) is a means of transmission in which the signal occupies a
SPREAD-SPECTRUM SPECTRUM TECHNIQUES: A BRIEF OVERVIEW SS: AN OVERVIEW Spread Spectrum (SS) is a means of transmission in which the signal occupies a bandwidth in excess of the minimum necessary to send
More informationLecture 3. Direct Sequence Spread Spectrum Systems. COMM 907:Spread Spectrum Communications
COMM 907: Spread Spectrum Communications Lecture 3 Direct Sequence Spread Spectrum Systems Performance of DSSSS with BPSK Modulation in presence of Interference (Jamming) Broadband Interference (Jamming):
More informationYear : TYEJ Sub: Digital Communication (17535) Assignment No. 1. Introduction of Digital Communication. Question Exam Marks
Assignment 1 Introduction of Digital Communication Sr. Question Exam Marks 1 Draw the block diagram of the basic digital communication system. State the function of each block in detail. W 2015 6 2 State
More informationCode Division Multiple Access.
Code Division Multiple Access Mobile telephony, using the concept of cellular architecture, are built based on GSM (Global System for Mobile communication) and IS-95(Intermediate Standard-95). CDMA allows
More informationPULSE CODE MODULATION TELEMETRY Properties of Various Binary Modulation Types
PULSE CODE MODULATION TELEMETRY Properties of Various Binary Modulation Types Eugene L. Law Telemetry Engineer Code 1171 Pacific Missile Test Center Point Mugu, CA 93042 ABSTRACT This paper discusses the
More informationClass 4 ((Communication and Computer Networks))
Class 4 ((Communication and Computer Networks)) Lesson 5... SIGNAL ENCODING TECHNIQUES Abstract Both analog and digital information can be encoded as either analog or digital signals. The particular encoding
More informationBy Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor
Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings
More informationKINGS DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING DIGITAL COMMUNICATION TECHNIQUES YEAR/SEM: III / VI BRANCH : ECE PULSE MODULATION
KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING SUB.NAME : EC1351 DIGITAL COMMUNICATION TECHNIQUES BRANCH : ECE YEAR/SEM: III / VI UNIT I PULSE MODULATION PART A (2
More informationDesign of Simulcast Paging Systems using the Infostream Cypher. Document Number Revsion B 2005 Infostream Pty Ltd. All rights reserved
Design of Simulcast Paging Systems using the Infostream Cypher Document Number 95-1003. Revsion B 2005 Infostream Pty Ltd. All rights reserved 1 INTRODUCTION 2 2 TRANSMITTER FREQUENCY CONTROL 3 2.1 Introduction
More informationChapter 2 Overview - 1 -
Chapter 2 Overview Part 1 (last week) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (today) Modulation, Coding, Error Correction Part 3 (next
More informationError Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria
Error Control Coding Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria Topics Introduction The Channel Coding Problem Linear Block Codes Cyclic Codes BCH and Reed-Solomon
More informationSpread Spectrum Communications and Jamming Prof. Kutty Shajahan M G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur
Spread Spectrum Communications and Jamming Prof. Kutty Shajahan M G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur Lecture - 06 Tutorial I Hello friends, welcome to this
More informationSpreading Codes and Characteristics. Error Correction Codes
Spreading Codes and Characteristics and Error Correction Codes Global Navigational Satellite Systems (GNSS-6) Short course, NERTU Prasad Krishnan International Institute of Information Technology, Hyderabad
More informationRep. ITU-R BO REPORT ITU-R BO SATELLITE-BROADCASTING SYSTEMS OF INTEGRATED SERVICES DIGITAL BROADCASTING
Rep. ITU-R BO.7- REPORT ITU-R BO.7- SATELLITE-BROADCASTING SYSTEMS OF INTEGRATED SERVICES DIGITAL BROADCASTING (Questions ITU-R 0/0 and ITU-R 0/) (990-994-998) Rep. ITU-R BO.7- Introduction The progress
More informationSyllabus. osmania university UNIT - I UNIT - II UNIT - III CHAPTER - 1 : INTRODUCTION TO DIGITAL COMMUNICATION CHAPTER - 3 : INFORMATION THEORY
i Syllabus osmania university UNIT - I CHAPTER - 1 : INTRODUCTION TO Elements of Digital Communication System, Comparison of Digital and Analog Communication Systems. CHAPTER - 2 : DIGITAL TRANSMISSION
More informationQUESTION BANK SUBJECT: DIGITAL COMMUNICATION (15EC61)
QUESTION BANK SUBJECT: DIGITAL COMMUNICATION (15EC61) Module 1 1. Explain Digital communication system with a neat block diagram. 2. What are the differences between digital and analog communication systems?
More informationEfficient UMTS. 1 Introduction. Lodewijk T. Smit and Gerard J.M. Smit CADTES, May 9, 2003
Efficient UMTS Lodewijk T. Smit and Gerard J.M. Smit CADTES, email:smitl@cs.utwente.nl May 9, 2003 This article gives a helicopter view of some of the techniques used in UMTS on the physical and link layer.
More informationDepartment of Electronics and Communication Engineering 1
UNIT I SAMPLING AND QUANTIZATION Pulse Modulation 1. Explain in detail the generation of PWM and PPM signals (16) (M/J 2011) 2. Explain in detail the concept of PWM and PAM (16) (N/D 2012) 3. What is the
More informationResearch on Development & Key Technology of PLC
Research on Development & Key Technology of PLC Jie Chen a, Li Wang b College of Electronic Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China; avircochen@foxmail.com,
More informationPartial overlapping channels are not damaging
Journal of Networking and Telecomunications (2018) Original Research Article Partial overlapping channels are not damaging Jing Fu,Dongsheng Chen,Jiafeng Gong Electronic Information Engineering College,
More informationSEN366 Computer Networks
SEN366 Computer Networks Prof. Dr. Hasan Hüseyin BALIK (5 th Week) 5. Signal Encoding Techniques 5.Outline An overview of the basic methods of encoding digital data into a digital signal An overview of
More informationEE 460L University of Nevada, Las Vegas ECE Department
EE 460L PREPARATION 1- ASK Amplitude shift keying - ASK - in the context of digital communications is a modulation process which imparts to a sinusoid two or more discrete amplitude levels. These are related
More informationSpread Spectrum: Definition
Spread Spectrum: Definition refers to the expansion of signal bandwidth, by several orders of magnitude in some cases, which occurs when a key is attached to the communication channel an RF communications
More informationData transmission - Transmission modes
Data transmission - Transmission modes Transmission modes A given transmission on a communications channel between two machines can occur in several different ways. The transmission is characterised by:
More informationIntroduction to Error Control Coding
Introduction to Error Control Coding 1 Content 1. What Error Control Coding Is For 2. How Coding Can Be Achieved 3. Types of Coding 4. Types of Errors & Channels 5. Types of Codes 6. Types of Error Control
More informationFrequency-Hopped Spread-Spectrum
Chapter Frequency-Hopped Spread-Spectrum In this chapter we discuss frequency-hopped spread-spectrum. We first describe the antijam capability, then the multiple-access capability and finally the fading
More informationEncoding and Framing
Encoding and Framing EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Tuesday Nov 2, 2004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Questions
More informationDE63 DIGITAL COMMUNICATIONS DEC 2014
Q.2 a. Draw the bandwidth efficiency curve w.r.t E b /N o. Compute the value of E b /N o required to achieve the data rate equal to the channel capacity if the channel bandwidth tends to infinity b. A
More informationEncoding and Framing. Questions. Signals: Analog vs. Digital. Signals: Periodic vs. Aperiodic. Attenuation. Data vs. Signal
Questions Encoding and Framing Why are some links faster than others? What limits the amount of information we can send on a link? How can we increase the capacity of a link? EECS 489 Computer Networks
More informationSpread Spectrum Modulation
Spread Spectrum Modulation A collective class of signaling techniques are employed before transmitting a signal to provide a secure communication, known as the Spread Spectrum Modulation. The main advantage
More informationPhysical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1
Wireless Networks: Physical Layer: Modulation, FEC Guevara Noubir Noubir@ccsneuedu S, COM355 Wireless Networks Lecture 3, Lecture focus Modulation techniques Bit Error Rate Reducing the BER Forward Error
More informationECS455: Chapter 4 Multiple Access
ECS455: Chapter 4 Multiple Access 4.4 DS/SS 1 Dr.Prapun Suksompong prapun.com/ecs455 Office Hours: BKD 3601-7 Wednesday 15:30-16:30 Friday 9:30-10:30 Spread spectrum (SS) Historically spread spectrum was
More informationMultiple Access Schemes
Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many
More informationChapter 4 Investigation of OFDM Synchronization Techniques
Chapter 4 Investigation of OFDM Synchronization Techniques In this chapter, basic function blocs of OFDM-based synchronous receiver such as: integral and fractional frequency offset detection, symbol timing
More informationMultiplexing Module W.tra.2
Multiplexing Module W.tra.2 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Multiplexing W.tra.2-2 Multiplexing shared medium at
More informationEECS 122: Introduction to Computer Networks Encoding and Framing. Questions
EECS 122: Introduction to Computer Networks Encoding and Framing Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
More informationStudy on the UWB Rader Synchronization Technology
Study on the UWB Rader Synchronization Technology Guilin Lu Guangxi University of Technology, Liuzhou 545006, China E-mail: lifishspirit@126.com Shaohong Wan Ari Force No.95275, Liuzhou 545005, China E-mail:
More informationLecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday
Lecture 4: Wireless Physical Layer: Channel Coding Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Channel Coding Modulated waveforms disrupted by signal propagation through wireless channel leads
More informationECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013
ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 17 Today: Spread Spectrum: (1) Frequency Hopping, (2) Direct Sequence Reading: Today Molisch 18.1, 18.2. Thu: MUSE Channel
More informationLecture on Sensor Networks
Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU
More informationDigital Image Watermarking by Spread Spectrum method
Digital Image Watermarking by Spread Spectrum method Andreja Samčovi ović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Belgrade, november 2014. I Spread Spectrum Techniques
More informationPerformance Analysis of DSSS and FHSS Techniques over AWGN Channel
Performance Analysis of DSSS and FHSS Techniques over AWGN Channel M. Katta Swamy, M.Deepthi, V.Mounika, R.N.Saranya Vignana Bharathi Institute of Technology, Hyderabad, and Andhra Pradesh, India. Corresponding
More informationUniversitas Sumatera Utara
Amplitude Shift Keying & Frequency Shift Keying Aim: To generate and demodulate an amplitude shift keyed (ASK) signal and a binary FSK signal. Intro to Generation of ASK Amplitude shift keying - ASK -
More informationCross Spectral Density Analysis for Various Codes Suitable for Spread Spectrum under AWGN conditions with Error Detecting Code
Cross Spectral Density Analysis for Various Codes Suitable for Spread Spectrum under AWG conditions with Error Detecting Code CH.ISHATHI 1, R.SUDAR RAJA 2 Department of Electronics and Communication Engineering,
More informationWireless Communication in Embedded System. Prof. Prabhat Ranjan
Wireless Communication in Embedded System Prof. Prabhat Ranjan Material based on White papers from www.radiotronix.com Networked embedded devices In the past embedded devices were standalone Typically
More informationChapter 2 Overview - 1 -
Chapter 2 Overview Part 1 (last week) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (today) Modulation, Coding, Error Correction Part 3 (next
More informationBandwidth Utilization:
CHAPTER 6 Bandwidth Utilization: In real life, we have links with limited bandwidths. The wise use of these bandwidths has been, and will be, one of the main challenges of electronic communications. However,
More informationWireless Networks. Why Wireless Networks? Wireless Local Area Network. Wireless Personal Area Network (WPAN)
Wireless Networks Why Wireless Networks? rate MBit/s 100.0 10.0 1.0 0.1 0.01 wired terminals WMAN WLAN CORDLESS (CT, DECT) Office Building stationary walking drive Indoor HIPERLAN UMTS CELLULAR (GSM) Outdoor
More informationLecture 13. Introduction to OFDM
Lecture 13 Introduction to OFDM Ref: About-OFDM.pdf Orthogonal frequency division multiplexing (OFDM) is well-known to be effective against multipath distortion. It is a multicarrier communication scheme,
More informationSingle Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors
Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate
More informationIntroduction to Coding Theory
Coding Theory Massoud Malek Introduction to Coding Theory Introduction. Coding theory originated with the advent of computers. Early computers were huge mechanical monsters whose reliability was low compared
More informationLaboratory 5: Spread Spectrum Communications
Laboratory 5: Spread Spectrum Communications Cory J. Prust, Ph.D. Electrical Engineering and Computer Science Department Milwaukee School of Engineering Last Update: 19 September 2018 Contents 0 Laboratory
More informationWireless Medium Access Control and CDMA-based Communication Lesson 08 Auto-correlation and Barker Codes
Wireless Medium Access Control and CDMA-based Communication Lesson 08 Auto-correlation and Barker Codes 1 Coding Methods in CDMA Use distinctive spreading codes to spread the symbols before transmission
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #4 Physical Layer Threats; Jamming 2016 Patrick Tague 1 Class #4 PHY layer basics and threats Jamming 2016 Patrick Tague 2 PHY 2016 Patrick Tague
More informationCommunications Theory and Engineering
Communications Theory and Engineering Master's Degree in Electronic Engineering Sapienza University of Rome A.A. 2018-2019 TDMA, FDMA, CDMA (cont d) and the Capacity of multi-user channels Code Division
More informationT325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.
T305 T325 B BLOCK 3 4 PART III T325 Summary Session 11 Block III Part 3 Access & Modulation [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Prepared by:
More information2016 Canadian Computing Olympiad Day 2, Problem 1 O Canada
Time Limit: second 06 Canadian Computing Olympiad Day, Problem O Canada Problem Description In this problem, a grid is an N-by-N array of cells, where each cell is either red or white. Some grids are similar
More informationRECOMMENDATION ITU-R BS
Rec. ITU-R BS.1194-1 1 RECOMMENDATION ITU-R BS.1194-1 SYSTEM FOR MULTIPLEXING FREQUENCY MODULATION (FM) SOUND BROADCASTS WITH A SUB-CARRIER DATA CHANNEL HAVING A RELATIVELY LARGE TRANSMISSION CAPACITY
More informationWireless Networks (PHY): Design for Diversity
Wireless Networks (PHY): Design for Diversity Y. Richard Yang 9/20/2012 Outline Admin and recap Design for diversity 2 Admin Assignment 1 questions Assignment 1 office hours Thursday 3-4 @ AKW 307A 3 Recap:
More informationVariable Step-Size LMS Adaptive Filters for CDMA Multiuser Detection
FACTA UNIVERSITATIS (NIŠ) SER.: ELEC. ENERG. vol. 7, April 4, -3 Variable Step-Size LMS Adaptive Filters for CDMA Multiuser Detection Karen Egiazarian, Pauli Kuosmanen, and Radu Ciprian Bilcu Abstract:
More informationSwedish College of Engineering and Technology Rahim Yar Khan
PRACTICAL WORK BOOK Telecommunication Systems and Applications (TL-424) Name: Roll No.: Batch: Semester: Department: Swedish College of Engineering and Technology Rahim Yar Khan Introduction Telecommunication
More informationEvaluation of Code Division Multiplexing on Power Line Communication
Evaluation of Code Division Multiplexing on Power Line Communication Adriano Favaro and Eduardo Parente Ribeiro Department of Electrical Engineering, Federal University of Parana CP 90, CEP 853-970 - Curitiba,
More informationDigital data (a sequence of binary bits) can be transmitted by various pule waveforms.
Chapter 2 Line Coding Digital data (a sequence of binary bits) can be transmitted by various pule waveforms. Sometimes these pulse waveforms have been called line codes. 2.1 Signalling Format Figure 2.1
More informationCH 5. Air Interface of the IS-95A CDMA System
CH 5. Air Interface of the IS-95A CDMA System 1 Contents Summary of IS-95A Physical Layer Parameters Forward Link Structure Pilot, Sync, Paging, and Traffic Channels Channel Coding, Interleaving, Data
More information(Refer Slide Time: 3:11)
Digital Communication. Professor Surendra Prasad. Department of Electrical Engineering. Indian Institute of Technology, Delhi. Lecture-2. Digital Representation of Analog Signals: Delta Modulation. Professor:
More informationPearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world
Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world Visit us on the World Wide Web at: www.pearsoned.co.uk Pearson Education Limited 2014
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationHY448 Sample Problems
HY448 Sample Problems 10 November 2014 These sample problems include the material in the lectures and the guided lab exercises. 1 Part 1 1.1 Combining logarithmic quantities A carrier signal with power
More informationLecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 2004.
EE29C - Spring 24 Advanced Topics in Circuit Design High-Speed Electrical Interfaces Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 24. Announcements Project phase 1 is posted
More informationRF Basics 15/11/2013
27 RF Basics 15/11/2013 Basic Terminology 1/2 dbm is a measure of RF Power referred to 1 mw (0 dbm) 10mW(10dBm), 500 mw (27dBm) PER Packet Error Rate [%] percentage of the packets not successfully received
More informationAN INTRODUCTION TO ERROR CORRECTING CODES Part 2
AN INTRODUCTION TO ERROR CORRECTING CODES Part Jack Keil Wolf ECE 54 C Spring BINARY CONVOLUTIONAL CODES A binary convolutional code is a set of infinite length binary sequences which satisfy a certain
More informationHarmonic Distortion Levels Measured at The Enmax Substations
Harmonic Distortion Levels Measured at The Enmax Substations This report documents the findings on the harmonic voltage and current levels at ENMAX Power Corporation (EPC) substations. ENMAX is concerned
More informationMobile & Wireless Networking. Lecture 2: Wireless Transmission (2/2)
192620010 Mobile & Wireless Networking Lecture 2: Wireless Transmission (2/2) [Schiller, Section 2.6 & 2.7] [Reader Part 1: OFDM: An architecture for the fourth generation] Geert Heijenk Outline of Lecture
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 3: Antennas, Propagation, and Spread Spectrum September 30, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Antennas and
More informationUsing Modern Design Tools To Evaluate Complex Communication Systems: A Case Study on QAM, FSK and OFDM Transceiver Design
Using Modern Design Tools To Evaluate Complex Communication Systems: A Case Study on QAM, FSK and OFDM Transceiver Design SOTIRIS H. KARABETSOS, SPYROS H. EVAGGELATOS, SOFIA E. KONTAKI, EVAGGELOS C. PICASIS,
More informationSynchronization using Insertion/Deletion Correcting Permutation Codes
Synchronization using Insertion/Deletion Correcting Permutation Codes Ling Cheng, Theo G. Swart and Hendrik C. Ferreira Department of Electrical and Electronic Engineering Science University of Johannesburg,
More informationDATE: June 14, 2007 TO: FROM: SUBJECT:
DATE: June 14, 2007 TO: FROM: SUBJECT: Pierre Collinet Chinmoy Gavini A proposal for quantifying tradeoffs in the Physical Layer s modulation methods of the IEEE 802.15.4 protocol through simulation INTRODUCTION
More informationLab/Project Error Control Coding using LDPC Codes and HARQ
Linköping University Campus Norrköping Department of Science and Technology Erik Bergfeldt TNE066 Telecommunications Lab/Project Error Control Coding using LDPC Codes and HARQ Error control coding is an
More informationSpread Spectrum Communications and Jamming Prof. Debarati Sen G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur
Spread Spectrum Communications and Jamming Prof. Debarati Sen G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur Lecture 07 Slow and Fast Frequency Hopping Hello students,
More informationAverage Delay in Asynchronous Visual Light ALOHA Network
Average Delay in Asynchronous Visual Light ALOHA Network Xin Wang, Jean-Paul M.G. Linnartz, Signal Processing Systems, Dept. of Electrical Engineering Eindhoven University of Technology The Netherlands
More informationTIMA Lab. Research Reports
ISSN 292-862 TIMA Lab. Research Reports TIMA Laboratory, 46 avenue Félix Viallet, 38 Grenoble France ON-CHIP TESTING OF LINEAR TIME INVARIANT SYSTEMS USING MAXIMUM-LENGTH SEQUENCES Libor Rufer, Emmanuel
More informationECE 435 Network Engineering Lecture 4
ECE 435 Network Engineering Lecture 4 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 12 September 2016 Announcements Homework 2 was posted late, due next Monday Homework 1 grades
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #4 OMNET++ Intro; Physical Layer Threats 2015 Patrick Tague 1 Class #4 OMNET++ Intro PHY layer basics and threats 2015 Patrick Tague 2 Intro to
More informationChapter 1 Acknowledgment:
Chapter 1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. Manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts
More informationPerformance Evaluation of different α value for OFDM System
Performance Evaluation of different α value for OFDM System Dr. K.Elangovan Dept. of Computer Science & Engineering Bharathidasan University richirappalli Abstract: Orthogonal Frequency Division Multiplexing
More informationAdaptive CDMA Cell Sectorization with Linear Multiuser Detection
Adaptive CDMA Cell Sectorization with Linear Multiuser Detection Changyoon Oh Aylin Yener Electrical Engineering Department The Pennsylvania State University University Park, PA changyoon@psu.edu, yener@ee.psu.edu
More informationCIS 632 / EEC 687 Mobile Computing. Mobile Communications (for Dummies) Chansu Yu. Contents. Modulation Propagation Spread spectrum
CIS 632 / EEC 687 Mobile Computing Mobile Communications (for Dummies) Chansu Yu Contents Modulation Propagation Spread spectrum 2 1 Digital Communication 1 0 digital signal t Want to transform to since
More informationElectrical signal types
Electrical signal types With BogusBus, our signals were very simple and straightforward: each signal wire (1 through 5) carried a single bit of digital data, 0 Volts representing "off" and 24 Volts DC
More information