6. FUNDAMENTALS OF CHANNEL CODER

Size: px
Start display at page:

Download "6. FUNDAMENTALS OF CHANNEL CODER"

Transcription

1 82 6. FUNDAMENTALS OF CHANNEL CODER 6.1 INTRODUCTION The digital information can be transmitted over the channel using different signaling schemes. The type of the signal scheme chosen mainly depends on the signal to noise ratio of the channel to be used, signal to noise ratio at the input of the receiver and the data rate to be transmitted. In practical systems the maximal signal power and the bandwidth of the channel are restricted and noise power spectral density is also fixed for a particular operating environment. Hence with all these constraints it often becomes difficult to arrive at the signaling scheme which will yield the acceptable probability of error for any given application. The only practical alternative to reduce the probability of the error is to use the channel coding technique [35]. Channel coding [37] is a viable method to reduce information rate through the channel and increase reliability. This goal is achieved by adding redundancy to the information symbol vector. The resulting symbol vector is a long coded vector of symbols that are distinguishable at the output of the channel. This is to improve the capacity of a channel by adding carefully designed redundant information to the data being transmitted through the channel. The process of adding the redundant information is known as channel coding. The channel coding is also known as error control coding where in calculated number of redundancy bits are added to the message bits. These bits doesn t carry any information but are used only for error detection and correction. The channel encoder systematically adds digits to the transmitted message digits and these digits make the channel decoder to detect and correct errors in the information bearing digits. The error detection and correction lowers the over all probability of error.

2 83 By using the speech compression technique the redundancy bits present in the message are removed and this is basically called the source encoder. The channel encoder adds the redundancy bits to lower the overall probability of error to the desired value. The basic block diagram for transmitting the digital data over the channel can be represented as shown in the block schematic below in figure 6.1 Source encoder Channel encoder Modulator Noisy Channel Source decoder Channel decoder Demodulator Fig: 6.1 Basic block diagram for digital communication system In the above blocks the source encoder converts any input data into the binary data and removes any redundancy present in the data. The binary data is given to the channel encoder to add up the redundancy bits. These bits are mainly used for the error detection and correction. The type of error detection and correction technique to be used mainly depends on the type of application, available bandwidth, signal to noise ratio and probability of error. The different types of channel coding techniques are Forward acting error detection: In this technique the decoder checks the received message if the received message is erroneous then it reject the message and request the transmitter to retransmit the message. This procedure repeats until the receiver receives the errorless information. This method requires a reverse channel hence there is wastage of bandwidth, so this technique is not preferred in

3 84 wireless communication because of scarcity of bandwidth. To overcome this disadvantage we choose the next technique. Forward-acting error correction method: In this technique the receiver on receiving the data checks for the error if the received message is erroneous then it automatically does the correction without requesting the transmitter to retransmit the data. In this method no reverse channel is required. Hence is preferred in wireless communication because the required bandwidth is less. The channel coders can be classified into two types, they are Block coder Convolutional coder Block codes are based rigorously on finite field arithmetic and abstract algebra. This coder can be used for only error detection or error detection and correction [38]. The block coder accepts a block of k information bits and produces a block of n coded bits. In case of block codes (n-k) number of redundant bits or check bits will be added. These (n-k) bits are derived from the k information bits. At the receiver these check bits are used to detect and correct errors which may occur in the block of n bits. These coder are commonly referred as (n,k) block coder. The basic block coding techniques are Linear coding technique Cyclic coding technique The Convolutional coders are most widely used channel coders in practical communications systems. These are primarily used for real time error detection and error correction. In this code the check bits are continuously interleaved with information bits. These check bits not only correct a particular coded block but all other blocks as well

4 85 [39]. The Convolutional coders convert the entire data stream into one single codeword. The encoded bits depend not only on the current K input bits but also on the past input bits [37]. In Convolutional codes the Viterbi algorithm provides the basis for the main decoding strategy. The channel coders used in this thesis are Binary cyclic coder and the Convolutional coder. 6.2 BINARY CYCLIC CODES: This forms the subclass of linear block codes. These codes are attraction for two reasons as mentioned below: The encoding and syndrome calculation procedures can be easily implemented The constructional methodology is simple and hence makes it possible to design codes with useful error correcting properties. In cyclic code the theory of Galois field has been used to spot a good code. Cyclic codes are very important because of their underlying Galois field description that leads to encoding and decoding procedures that are algorithmic and computationally efficient Definition of a cyclic code Let c be the codeword in a linear block code of length n. The cyclic code over GF(q) are class of linear codes of block length n if the code obtained after right shift or left shift is also a codeword. Therefore the linear code c is cyclic precisely when it is invariant under all cyclic shifts [38]. These cyclic codes are based on the Galois field and their structure is strongly related to Galois field because of this encoding and decoding algorithms are computationally efficient.

5 Polynomial Description of cyclic code A linear code C over GF(q) is called a cyclic code if c=(c 0,c 1,c 2,c 3,c 4,...c n-1 ) is a code in C then the cyclic shifted value of c be c =(c n-1,c 0,c 1,c 2,c 3,...c n-2 ) is also a code in C. Every cyclic code is a special kind of subspace because it has cyclic property. Each vector in Galois field is represented as a polynomial in x of degree of less than or equal to (n-1). This set of polynomials have ring structure and are defined as GF(q)[x]/[x n -1]. Hence if the code words of a code are denoted by a polynomial and the code is a subset of GF(q)[x]/[x n -1]. Then code is a cyclic code if x.c(x) is a codeword polynomial whenever c(x) is a codeword polynomial [40]. In a (n, k) cyclic code there exist a generator polynomial of degree (n-k). This is a unique polynomial from which all the code word polynomials can be generated. For an (n, k) binary cyclic code the generator polynomial can be written as g(x)=g n-k x n-k +g n-k-1 x n-k g 1 x 1 +g In the above equation the coefficients g n-k, g n-k-1...g 1 and g 0 can take the values either 0 or 1. The term x n-k is always present in the generator polynomial and there are no higher order terms, hence the degree of the generator polynomial is always n-k. The degree of g(x) is equal to the number of parity check bits of the code [41] Encoding cyclic codes The cyclic codes can be encoded in two different ways Nonsystematic encoding: This is the easiest way of encoding. In this technique the message polynomial i(x) is multiplied with the generator polynomial g(x) to get the codeword polynomial c(x).

6 87 c( x) i( x) g( x) 6.2 Systematic encoding: The check bits are generated by dividing the message polynomial i(x) by the generator polynomial g(x). The remainder obtained will be used as check bits. i( x) x rx ( ) gx ( ) nk 6.3 c( x) i( x) r( x) 6.4 The encoder circuit for the cyclic code can be designed using the set of shift registers. The number of registers or flip-flops required will be equal to the degree of the generator polynomial. The division circuit using the flip-flops is designed as shown below in the figure 6.2 for the generator polynomial g(x) g(x)=g n-k x n-k +g n-k-1 x n-k g 1 x 1 +g ON g g g g r 0 r r 2 r n-k Check bit Input message bits To channel Fig: 6.2 Binary Cyclic encoder circuit

7 88 The encoding operation consists of two steps [31] 1. Initially the channel switch will be in position 1 where the message bits are shifted into the register and also into the communication channel simultaneously. As soon the k information bits are shifted into the register, the register contains parity check bits from r 0, r 1, r 2,.r n-k Once all the k message bits are transferred the AND gate is turned off and the switch is moved to the position 2, this in turn shifts the contents of the encoder circuit into the channel. The design of this encoder is much easier than that of linear block encoder where the portion of the G or H matrix have to be stored Decoding cyclic codes Decoding can be done using the linear feedback shift registers [41]. Both systematic and non-systematic codes have got the generator polynomial g(x) as a factor. Let the code vector received over the noisy channel be v(x). The received polynomial may or may not be similar to the transmitted polynomial c(x). The function of the decoder is to check for the error present in the received polynomial by calculating the syndrome. A zero syndrome indicates errorless transmission and a nonzero syndrome indicates the erroneous transmission. If the received polynomial v(x) is similar to that of the transmitted codeword polynomial c(x) in a (n, k) linear cyclic code then v(x) is divisible by the generator polynomial g(x).i.e. the remainder r(x) will be equal to zero. The error detection at the receiver is done by checking whether the received polynomial is divisible by g(x), if yes then v(x) is equal to c(x) else v(x) is not equal to c(x). The

8 89 nonzero remainder obtained indicates the presence of error and is called the syndrome polynomial represented by s(x). vx ( ) sx ( ) 6.6 gx ( ) Where s(x) is the remainder obtained by dividing v(x) and g(x). The degree of the syndrome polynomial is (n-k-1) or less. The corrected codeword c(x) can be obtained from the received polynomial v(x) using the equation given below c( x) v( x) e( x) 6.7 Where e(x) is the error polynomial and is related to the syndrome polynomial s(x) as mentioned in the equation below e( x) [ q( x) m( x)] g( x) s( x) 6.8 G11 ON g 0 g 1 g g + s 0 s 1 s 2 s n-k-1 G2 + + Input received bits Syndrome bits + Output Fig: 6.3 Binary cyclic syndrome calculation circuit for an (n, k) cyclic code Where e(x) is the error polynomial, g(x) generator polynomial, m(x) is the message polynomial and s(x) is the syndrome polynomial. The term q(x) is the quotient obtained by dividing the received polynomial by the generator polynomial. The s(x) contains the information about the error pattern. Hence the syndrome calculation circuit can be accomplished using divider circuit shown in the figure 6.3 The syndrome calculations are carried out as follows [35]:

9 90 1. The register is first initialized by turning the gate 2 ON and the gate 1 OFF then the received vector is entered into the shift register. 2. After the entire vector is shifted into the register, the contents of the register will be the syndrome. Now the gate 2 is turned off and gate 1 is turned ON to shift out the content of the register. Once the contents are shifted the syndrome circuit is ready for processing the next received vector. The implementation of the cyclic decoder is easy compared to the non-cyclic linear binary coder. To perform the correction the decoder has to determine a correctable error pattern e(x) from the syndrome using the following operations performed in the decoder block given in the figure 6.4 The error correction procedure consists of the following steps: 1. The received vector is shifted into the buffer register and the syndrome register. 2. The syndrome of the received vector is calculated and is placed in the syndrome register. This in turn is read into the detector. The detector is the combinational circuit designed to output 1 if the syndrome obtained corresponds to the correctable error pattern with the error at the highest position x n-k. 3. If the detector output is 0 then the received vector is assumed to be correct. 4. The first received digit is shifted out of the buffer and at the same time the syndrome register is shifted right once. If the first received digit is erroneous then the detector output will be 1 and will be used to correct the first received digit. The output of the detector is fed to syndrome register to modify the syndrome. This result in a new syndrome corresponding to the received vector shifted to the right by one place.

10 91 5. The obtained new syndrome is used to check whether the second received digit which is at right most stage of the buffer register is erroneous. The above 3 rd and 4 th steps are repeated. 6. The decoder operates on the received vector digit by digit until the entire received vector is shifted out of the buffer. + + Feedback Syndrome connection register Input Error pattern detector S out s in Buffer register Received vector input s in s out Corrected vector Fig: 6.4 Decoder for cyclic codes + This above decoder can be used for decoding any cyclic code. This is less expensive and less complex. The cyclic coder is basically used in this thesis to correct single or double error pattern. These cyclic coders are very efficient to correct single and double error pattern but not preferred to correct multiple error corrections as complexity of the algorithm increases. As the complexity of the algorithm increases the processing time required will also increase. Hence to overcome this drawback we use cyclic coding technique for less erroneous channels or for errorless channels.

11 CONVOLUTIONAL CODING In case of block coder the block of n digits generated by the encoder mainly depends only on the k message within the particular time unit. In case of Convolutional coder the n code bits generated mainly depends not only on the k message bit with in particular time slot but also on the previous blocks of message bits. These codes can be designed to detect and correct the errors. Encoding in case of Convolutional coder can be accomplished using simple shift register and decoding can be done using many practical procedures. Recent studies have shown that the Convolutional coders perform better than that of block coders in many error control applications [35]. The Convolutional coders are mainly used to achieve reliable data transfer in different applications like digital video, mobile communication and satellite communication. The Convolutional codes can be either systematic codes or non systematic codes. Systematic codes are those where in the message bits are in a separate sub block and the check bit are in a separate sub block. The systematic Convolutional codes are preferred as the implementation is easier than that of non-systematic codes. The very important advantage of systematic code is that it prevents the propagation of error. The error correction property of both the coding methodology is the same Convolutional encoder A Convolutional encoder takes sequence of message as inputs and generates sequence of code digits as outputs. At any time unit k message bits are fed into the encoder and the encoder generates a code block consisting of n code digits. The code generated by this encoder is called an (n, k) Convolutional code of constraint length nn digits, where n is the size of the codeword generated and N is the total number of message blocks. The rate efficiency of the code can be written as k/n. The convolutional

12 93 encoders are mainly designed using shift registers and modulo-2 adders. The working of the encoder is as given below. Initially the shift registers are cleared. Then the first bit is entered into the flipflop F1, during this period the commutator samples the modulo-2 adder output c1, c2, c3. Thus a single input bit yield to three output bits. When the next message sequence enters into the D1 flip-flop, the information bit present previously in D1 gets shifted into the next flip-flop. The new bit in turn adds three more output bits. + Input message bits D1 D2 D3 D4 Coded output data + Fig 6.5 Convolutional Encoder This above process repeats until the last message bits are shifted into the last flipflop. The convolutional encoder operates on the message stream in a continuous manner, hence the convolutional coder requires less buffering compared to the block codes. The selection of which bits are to be added mainly depends on the generator polynomial g(x). Each and every polynomial will have unique error correction property. The convolutional

13 94 coder is as shown in the figure 6.5. The Convolutional codes can be generated by the following techniques as mentioned below Time domain approach Transfer domain approach Time Domain approach In time domain approach a binary convolutional encoder can be defined by a set of n impulse response. The impulse response will characterize its behavior in time domain. This method is as explained below: Let generator sequence be denoted as g 1, g 2, g 3,......g m+1. These also denote the impulse response. In an encoder number of generator sequence will be equal to the number of modulo-2 adders. Let the message sequence be represented as d 1, d 2,...d L. These are given as input to the encoder one bit at a time. Then the encoder generates the output sequence denoted as c 1, c The number of output sequence will be equal to the number of modulo-2 adders or number of output nodes. The output sequence can be written as c d g 1 1 c d g and so on From the definition of discrete convolution we can find c using the equation given l below: m c d g l l1 i1 i0 6.11

14 95 In the above equation m is the total number of flipflops. The l varies from 1 to L+m, where L is the number of message sequence. After finding different values of c then these output sequences are multiplexed into a single sequence called codeword [38]. The codeword at the output of the convolutional encoder is given by the equation c l Transfer domain approach: The linear filter operation in time domain is replaced by the multiplication of Fourier transforms in the frequency domain. The advantage of transfer domain over the time domain is due to its less complex computation. In transfer domain the impulse response of each path is replaced by polynomial whose coefficients are represented by the elements of the impulse response. If the convolutional encoder has m number of flip-flops with j number of output terminals then its generator polynomial and its code sequence for each output terminal can be written as given below g x g x g x g x... g x j j 0 j 1 j 2 j m m The corresponding output sequence for the adder is given by j c ( x) d( x) g ( x) j 6.13 After getting the polynomials at the output of each adder, the final encoder polynomials can be obtained from the equation 6.14 c x c x xc x x c x x c x 1 n 2 n 2 3 n n1 n n ( ) ( ) ( ) ( )... ( )

15 96 The indeterminate x can be regarded as a unit-delay operator and the power of x defining the number of time units by which the associated bit is delayed with respect to the initial bit in the sequence[42] : Structural properties of Convolutional codes: The Convolutional codes can be viewed as a finite state machine and in fact this is a sequential circuit. The structural properties of a Convolutional encoder can be portrayed in graphical manner using any of the three equivalent diagrams like State diagram, Code tree and Trellis The state of the encoder is defined as its shift register contents. For an (n, k, m) code where n is the number of output terminals, k is the number of input terminals and m is the number of flip-flops. With k > 1, the i th shift register contains k i previous information bits. The number of different states an encoder can be mainly depends on the number of flip-flops. Hence total number of states for single input encoder can be written as 2 m and with k inputs causes transition to a new state. These transitions can be graphically represented by a state diagram. The procedure to draw the state diagram consists of three parts [42]. 1. Identify the different possible states. 2. Draw state transition table clearly showing the present state, next state, input bits and the corresponding output bits. 3. The state diagram is drawn showing all the states of the flip-flops. Using the state diagram we can draw the code tree and also the Trellis

16 97 The procedure to draw Code tree and the Trellis: Using the state diagram the code tree is drawn by considering the upward path if the input is 0 and if input is 1 the lower path is followed. Each state in the code tree is represented by a node and the transition from one state to the other is represented by the lines called branches. The output codeword for each input is shown on the branches. The length of the tree to be constructed must be equal to n(l+ m). Hence to obtain the complete code sequence corresponding to an information sequence of length kl the tree must be extended by n(m-1) time units and this extended part is called the tail f the tree and the 2 kl is the right most node and is called the terminal codes of the tree. Once the tree is drawn we can see that the tree becomes repetitive after first three branches, hence we may collapse the tree graph into a new form called a Trellis. This is so called because it is a tree like structure with remerging branches. The Trellis diagram contains (L+m+1) levels and is also called the depth of the Trellis and are labeled as 0 to (L+m). The convention followed while drawing the trellis is that a code branch produced by an input 0 is shown by a solid line while that produced by 1 as dotted lines. This is widely preferred because the buffer space required to store the Trellis is comparatively very less Free distance and error distribution: The minimum free distance is denoted as d free. The d free is the minimum Hamming distance between any obtained codes. The error detecting and correcting capability of a code mainly depends on the minimum free distance. The error detecting capability can be calculated as

17 98 t d f ree The correcting capability can be written as t d f ree In case convolutional codes the processing is done in a continuous manner instead on a block, hence the value of t applies to a quantity of errors located relatively near to each other. Free distance is also interpreted as the minimal length of an erroneous burst at the output of the convolutional decoder. The convolutional coders are mainly designed to correct multiple error patterns. There are different methodologies in convolutional codes to correct the multiple or burst error patterns [43] Convolutional decoder There are several different techniques to decode the convolutional codes and these are grouped into Sequential decoding Maximum likely hood decoding The Sequential decoding algorithm allows both forward and backward movement in the Trellis. The decoder keeps the track of its decision and each time and each time it makes the ambiguous decision it compares with the threshold value stored. If the computed value is greater than the threshold then that particular path is given-up by the decoder and comes to the previous path where the computed value is less than the threshold value. In the sequential decoding the number steps will very much greater than (L+m). The number of computation increases with the level of noise present in the channel, hence is not preferred for the real time application. If the E b /N is greater than the

18 99 decoder threshold then decoding will be done at a faster rate else the delay in decoding increases. The different sequential decoding algorithms [41] are Fano decoding algorithm Stack decoding algorithm The maximum likely hood decoding algorithm computes the metric value for 2 k number of paths and selects the path with highest metric value. The same computation is followed until the number of levels are less than (L+m). The number of computation does not depend on the noise level present in the channel, hence the computation time remains constant irrespective of the noise present in the channel. Due to this advantage this is used for real time implementation. One of different maximum likelyhood decoding algorithms is Viterbi decoding algorithm. There are many different decoding algorithms to decode Convolutional codes.one such decoding algorithm is the Viterbi algorithm. This is widely used algorithm as it is very easy to implement and also provides maximum likely hood performance. This algorithm provides the basis for the main decoding strategy of Convolutional codes. The Viterbi decoding algorithm mainly is a graphical portrayal of Convolutional codes and uses the maximum likely-hood decoding technique to decode the received data. This decoder logically explores every possible user data sequence to decode hence for this reason this is also known as maximum likelihood decoder [44]. The procedure used by the Viterbi algorithm to decode is as given below: Let the information sequence U=(u 1,u 2,u 3,.u L ) be of length kl and let this sequence be encoded into a codeword V=(v 1,v 2,v 3, v L+m ) of length N, where N=n(L+m). Let the received sequence at the receiver be R=(r 1,r 2,r 3,r r L+m ). By maximum

19 100 likelihood technique we need to find the estimated ˆ V from the received vector R at the receiver.the decoding rule for choosing the estimate value ˆ V given the received vector R is optimum when the probability of decoding error is minimum. For equiprobable messages the probability of error will be minimum if the estimated value will maximizes the log-likelihood function. Hence the basic rule is to choose the estimate ˆ V which maximizes the ln PR V becomes maximum when d free becomes minimum. value. Hence we can conclude that the log-likely hood function The procedure to decode using the Viterbi decoding algorithm is as follows [42]: Start with the initial level. Compute the partial metric for the single path entering each node. Store the path and its metric for each state. Increment the present level by one and compute the partial metric for all the paths entering a state by adding the branch metric to the metric of the connecting survivor at the preceding unit. Store the path with the largest metric. If the number of levels are less than (L+m) repeat the above step. Note that although we use the tree graph for the decoding procedure the number of nodes at any level of the Trellis does not continue to grow as the number of incoming message bits but remains constant at 2 m.the decoding procedure is very advantageous for smaller message bits hence is widely preferred. The Viterbi algorithm is widely used in many commercial satellite systems. For shorter codes this performs better against noise. The main advantage of the Viterbi algorithm is its constant executing speed or processing speed regardless of the received signal-to- noise ratio. Hence this makes the algorithm attractive for real time, delay limited application. This algorithm is chosen in this thesis because of the following reasons

20 101 This is more tolerant to the channel errors than sequential decoders. These are easy to implement. The processing delay is very less compared to the sequential decoders under any condition hence is preferred for real time applications. Constructional feature of Viterbi is very simple as its uses only simple operator like addition, compare and select 6.4. SUMMARY In this chapter we study about the importance of channel coding techniques for mobile communication along with the different types of channel coding techniques. In this thesis we are designing the adaptive channel coding technique using cyclic coder and the convolutional coder. This chapter comments on choosing these above said coders.

Outline. Communications Engineering 1

Outline. Communications Engineering 1 Outline Introduction Signal, random variable, random process and spectra Analog modulation Analog to digital conversion Digital transmission through baseband channels Signal space representation Optimal

More information

Revision of Lecture Eleven

Revision of Lecture Eleven Revision of Lecture Eleven Previous lecture we have concentrated on carrier recovery for QAM, and modified early-late clock recovery for multilevel signalling as well as star 16QAM scheme Thus we have

More information

Chapter 3 Convolutional Codes and Trellis Coded Modulation

Chapter 3 Convolutional Codes and Trellis Coded Modulation Chapter 3 Convolutional Codes and Trellis Coded Modulation 3. Encoder Structure and Trellis Representation 3. Systematic Convolutional Codes 3.3 Viterbi Decoding Algorithm 3.4 BCJR Decoding Algorithm 3.5

More information

Maximum Likelihood Sequence Detection (MLSD) and the utilization of the Viterbi Algorithm

Maximum Likelihood Sequence Detection (MLSD) and the utilization of the Viterbi Algorithm Maximum Likelihood Sequence Detection (MLSD) and the utilization of the Viterbi Algorithm Presented to Dr. Tareq Al-Naffouri By Mohamed Samir Mazloum Omar Diaa Shawky Abstract Signaling schemes with memory

More information

Chapter 1 Coding for Reliable Digital Transmission and Storage

Chapter 1 Coding for Reliable Digital Transmission and Storage Wireless Information Transmission System Lab. Chapter 1 Coding for Reliable Digital Transmission and Storage Institute of Communications Engineering National Sun Yat-sen University 1.1 Introduction A major

More information

Spreading Codes and Characteristics. Error Correction Codes

Spreading Codes and Characteristics. Error Correction Codes Spreading Codes and Characteristics and Error Correction Codes Global Navigational Satellite Systems (GNSS-6) Short course, NERTU Prasad Krishnan International Institute of Information Technology, Hyderabad

More information

Intro to coding and convolutional codes

Intro to coding and convolutional codes Intro to coding and convolutional codes Lecture 11 Vladimir Stojanović 6.973 Communication System Design Spring 2006 Massachusetts Institute of Technology 802.11a Convolutional Encoder Rate 1/2 convolutional

More information

Department of Electronics and Communication Engineering 1

Department of Electronics and Communication Engineering 1 UNIT I SAMPLING AND QUANTIZATION Pulse Modulation 1. Explain in detail the generation of PWM and PPM signals (16) (M/J 2011) 2. Explain in detail the concept of PWM and PAM (16) (N/D 2012) 3. What is the

More information

Digital Communications I: Modulation and Coding Course. Term Catharina Logothetis Lecture 12

Digital Communications I: Modulation and Coding Course. Term Catharina Logothetis Lecture 12 Digital Communications I: Modulation and Coding Course Term 3-8 Catharina Logothetis Lecture Last time, we talked about: How decoding is performed for Convolutional codes? What is a Maximum likelihood

More information

RADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology

RADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology RADIO SYSTEMS ETIN15 Lecture no: 7 Channel Coding Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2016-04-18 Ove Edfors - ETIN15 1 Contents (CHANNEL CODING) Overview

More information

IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING.

IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING. IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING. COMPACT LECTURE NOTES on COMMUNICATION THEORY. Prof. Athanassios Manikas, version Spring 22 Digital

More information

EE521 Analog and Digital Communications

EE521 Analog and Digital Communications EE521 Analog and Digital Communications Questions Problem 1: SystemView... 3 Part A (25%... 3... 3 Part B (25%... 3... 3 Voltage... 3 Integer...3 Digital...3 Part C (25%... 3... 4 Part D (25%... 4... 4

More information

International Journal of Scientific & Engineering Research Volume 9, Issue 3, March ISSN

International Journal of Scientific & Engineering Research Volume 9, Issue 3, March ISSN International Journal of Scientific & Engineering Research Volume 9, Issue 3, March-2018 1605 FPGA Design and Implementation of Convolution Encoder and Viterbi Decoder Mr.J.Anuj Sai 1, Mr.P.Kiran Kumar

More information

Channel Coding RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology

Channel Coding RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology RADIO SYSTEMS ETIN15 Lecture no: 7 Channel Coding Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2012-04-23 Ove Edfors - ETIN15 1 Contents (CHANNEL CODING) Overview

More information

PROJECT 5: DESIGNING A VOICE MODEM. Instructor: Amir Asif

PROJECT 5: DESIGNING A VOICE MODEM. Instructor: Amir Asif PROJECT 5: DESIGNING A VOICE MODEM Instructor: Amir Asif CSE4214: Digital Communications (Fall 2012) Computer Science and Engineering, York University 1. PURPOSE In this laboratory project, you will design

More information

Block code Encoder. In some applications, message bits come in serially rather than in large blocks. WY Tam - EIE POLYU

Block code Encoder. In some applications, message bits come in serially rather than in large blocks. WY Tam - EIE POLYU Convolutional Codes In block coding, the encoder accepts a k-bit message block and generates an n-bit code word. Thus, codewords are produced on a block-by-block basis. Buffering is needed. m 1 m 2 Block

More information

Performance of Reed-Solomon Codes in AWGN Channel

Performance of Reed-Solomon Codes in AWGN Channel International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 4, Number 3 (2011), pp. 259-266 International Research Publication House http://www.irphouse.com Performance of

More information

Lecture 3 Data Link Layer - Digital Data Communication Techniques

Lecture 3 Data Link Layer - Digital Data Communication Techniques DATA AND COMPUTER COMMUNICATIONS Lecture 3 Data Link Layer - Digital Data Communication Techniques Mei Yang Based on Lecture slides by William Stallings 1 ASYNCHRONOUS AND SYNCHRONOUS TRANSMISSION timing

More information

Convolutional Coding Using Booth Algorithm For Application in Wireless Communication

Convolutional Coding Using Booth Algorithm For Application in Wireless Communication Available online at www.interscience.in Convolutional Coding Using Booth Algorithm For Application in Wireless Communication Sishir Kalita, Parismita Gogoi & Kandarpa Kumar Sarma Department of Electronics

More information

Error Control Codes. Tarmo Anttalainen

Error Control Codes. Tarmo Anttalainen Tarmo Anttalainen email: tarmo.anttalainen@evitech.fi.. Abstract: This paper gives a brief introduction to error control coding. It introduces bloc codes, convolutional codes and trellis coded modulation

More information

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate

More information

Techniques to Mitigate Fading Effects

Techniques to Mitigate Fading Effects Chapter 7 Techniques to Mitigate Fading Effects 7.1 Introduction Apart from the better transmitter and receiver technology, mobile communications require signal processing techniques that improve the link

More information

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

International Journal of Digital Application & Contemporary research Website:   (Volume 1, Issue 7, February 2013) Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform

More information

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 18 Today: (1) da Silva Discussion, (2) Error Correction Coding, (3) Error Detection (CRC) HW 8 due Tue. HW 9 (on Lectures

More information

International Journal of Engineering Research in Electronics and Communication Engineering (IJERECE) Vol 1, Issue 5, April 2015

International Journal of Engineering Research in Electronics and Communication Engineering (IJERECE) Vol 1, Issue 5, April 2015 Implementation of Error Trapping Techniqe In Cyclic Codes Using Lab VIEW [1] Aneetta Jose, [2] Hena Prince, [3] Jismy Tom, [4] Malavika S, [5] Indu Reena Varughese Electronics and Communication Dept. Amal

More information

UNIVERSITY OF SOUTHAMPTON

UNIVERSITY OF SOUTHAMPTON UNIVERSITY OF SOUTHAMPTON ELEC6014W1 SEMESTER II EXAMINATIONS 2007/08 RADIO COMMUNICATION NETWORKS AND SYSTEMS Duration: 120 mins Answer THREE questions out of FIVE. University approved calculators may

More information

Lecture 9b Convolutional Coding/Decoding and Trellis Code modulation

Lecture 9b Convolutional Coding/Decoding and Trellis Code modulation Lecture 9b Convolutional Coding/Decoding and Trellis Code modulation Convolutional Coder Basics Coder State Diagram Encoder Trellis Coder Tree Viterbi Decoding For Simplicity assume Binary Sym.Channel

More information

Forward Error Correction for experimental wireless ftp radio link over analog FM

Forward Error Correction for experimental wireless ftp radio link over analog FM Technical University of Crete Department of Computer and Electronic Engineering Forward Error Correction for experimental wireless ftp radio link over analog FM Supervisor: Committee: Nikolaos Sidiropoulos

More information

QUESTION BANK EC 1351 DIGITAL COMMUNICATION YEAR / SEM : III / VI UNIT I- PULSE MODULATION PART-A (2 Marks) 1. What is the purpose of sample and hold

QUESTION BANK EC 1351 DIGITAL COMMUNICATION YEAR / SEM : III / VI UNIT I- PULSE MODULATION PART-A (2 Marks) 1. What is the purpose of sample and hold QUESTION BANK EC 1351 DIGITAL COMMUNICATION YEAR / SEM : III / VI UNIT I- PULSE MODULATION PART-A (2 Marks) 1. What is the purpose of sample and hold circuit 2. What is the difference between natural sampling

More information

ERROR CONTROL CODING From Theory to Practice

ERROR CONTROL CODING From Theory to Practice ERROR CONTROL CODING From Theory to Practice Peter Sweeney University of Surrey, Guildford, UK JOHN WILEY & SONS, LTD Contents 1 The Principles of Coding in Digital Communications 1.1 Error Control Schemes

More information

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Lecture 4: Wireless Physical Layer: Channel Coding Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Channel Coding Modulated waveforms disrupted by signal propagation through wireless channel leads

More information

ECE 6640 Digital Communications

ECE 6640 Digital Communications ECE 6640 Digital Communications Dr. Bradley J. Bazuin Assistant Professor Department of Electrical and Computer Engineering College of Engineering and Applied Sciences Chapter 8 8. Channel Coding: Part

More information

Synchronization of Hamming Codes

Synchronization of Hamming Codes SYCHROIZATIO OF HAMMIG CODES 1 Synchronization of Hamming Codes Aveek Dutta, Pinaki Mukherjee Department of Electronics & Telecommunications, Institute of Engineering and Management Abstract In this report

More information

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Error Control Coding

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Error Control Coding ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2005 Lecture 9: Error Control Coding Chapter 8 Coding and Error Control From: Wireless Communications and Networks by William Stallings,

More information

Basics of Error Correcting Codes

Basics of Error Correcting Codes Basics of Error Correcting Codes Drawing from the book Information Theory, Inference, and Learning Algorithms Downloadable or purchasable: http://www.inference.phy.cam.ac.uk/mackay/itila/book.html CSE

More information

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use? Digital Transmission using SECC 6.02 Spring 2010 Lecture #7 How many parity bits? Dealing with burst errors Reed-Solomon codes message Compute Checksum # message chk Partition Apply SECC Transmit errors

More information

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 18 Today: (1) da Silva Discussion, (2) Error Correction Coding, (3) Error Detection (CRC) HW 8 due Tue. HW 9 (on Lectures

More information

Digital Television Lecture 5

Digital Television Lecture 5 Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during

More information

DIGITAL COMMINICATIONS

DIGITAL COMMINICATIONS Code No: R346 R Set No: III B.Tech. I Semester Regular and Supplementary Examinations, December - 23 DIGITAL COMMINICATIONS (Electronics and Communication Engineering) Time: 3 Hours Max Marks: 75 Answer

More information

Study of Turbo Coded OFDM over Fading Channel

Study of Turbo Coded OFDM over Fading Channel International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 3, Issue 2 (August 2012), PP. 54-58 Study of Turbo Coded OFDM over Fading Channel

More information

Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System

Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System Anshu Aggarwal 1 and Vikas Mittal 2 1 Anshu Aggarwal is student of M.Tech. in the Department of Electronics

More information

Department of Electronic Engineering FINAL YEAR PROJECT REPORT

Department of Electronic Engineering FINAL YEAR PROJECT REPORT Department of Electronic Engineering FINAL YEAR PROJECT REPORT BEngECE-2009/10-- Student Name: CHEUNG Yik Juen Student ID: Supervisor: Prof.

More information

Design of Reed Solomon Encoder and Decoder

Design of Reed Solomon Encoder and Decoder Design of Reed Solomon Encoder and Decoder Shital M. Mahajan Electronics and Communication department D.M.I.E.T.R. Sawangi, Wardha India e-mail: mah.shital@gmail.com Piyush M. Dhande Electronics and Communication

More information

VARDHAMAN COLLEGE OF ENGINEERING (AUTONOMOUS) Affiliated to JNTUH, Hyderabad ASSIGNMENT QUESTION BANK

VARDHAMAN COLLEGE OF ENGINEERING (AUTONOMOUS) Affiliated to JNTUH, Hyderabad ASSIGNMENT QUESTION BANK VARDHAMAN COLLEGE OF ENGINEERING (AUTONOMOUS) Affiliated to JNTUH, Hyderabad ASSIGNMENT QUESTION BANK Name of the subject: Digital Communications B.Tech/M.Tech/MCA/MBA Subject Code: A1424 Semester: VI

More information

AN INTRODUCTION TO ERROR CORRECTING CODES Part 2

AN INTRODUCTION TO ERROR CORRECTING CODES Part 2 AN INTRODUCTION TO ERROR CORRECTING CODES Part Jack Keil Wolf ECE 54 C Spring BINARY CONVOLUTIONAL CODES A binary convolutional code is a set of infinite length binary sequences which satisfy a certain

More information

DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK. Subject Name: Information Coding Techniques UNIT I INFORMATION ENTROPY FUNDAMENTALS

DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK. Subject Name: Information Coding Techniques UNIT I INFORMATION ENTROPY FUNDAMENTALS DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Subject Name: Year /Sem: II / IV UNIT I INFORMATION ENTROPY FUNDAMENTALS PART A (2 MARKS) 1. What is uncertainty? 2. What is prefix coding? 3. State the

More information

Simulink Modeling of Convolutional Encoders

Simulink Modeling of Convolutional Encoders Simulink Modeling of Convolutional Encoders * Ahiara Wilson C and ** Iroegbu Chbuisi, *Department of Computer Engineering, Michael Okpara University of Agriculture, Umudike, Abia State, Nigeria **Department

More information

Detecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson

Detecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson Detecting and Correcting Bit Errors COS 463: Wireless Networks Lecture 8 Kyle Jamieson Bit errors on links Links in a network go through hostile environments Both wired, and wireless: Scattering Diffraction

More information

ECE 6640 Digital Communications

ECE 6640 Digital Communications ECE 6640 Digital Communications Dr. Bradley J. Bazuin Assistant Professor Department of Electrical and Computer Engineering College of Engineering and Applied Sciences Chapter 8 8. Channel Coding: Part

More information

EFFECTIVE CHANNEL CODING OF SERIALLY CONCATENATED ENCODERS AND CPM OVER AWGN AND RICIAN CHANNELS

EFFECTIVE CHANNEL CODING OF SERIALLY CONCATENATED ENCODERS AND CPM OVER AWGN AND RICIAN CHANNELS EFFECTIVE CHANNEL CODING OF SERIALLY CONCATENATED ENCODERS AND CPM OVER AWGN AND RICIAN CHANNELS Manjeet Singh (ms308@eng.cam.ac.uk) Ian J. Wassell (ijw24@eng.cam.ac.uk) Laboratory for Communications Engineering

More information

Error Detection and Correction

Error Detection and Correction . Error Detection and Companies, 27 CHAPTER Error Detection and Networks must be able to transfer data from one device to another with acceptable accuracy. For most applications, a system must guarantee

More information

2018/11/1 Thursday. YU Xiangyu

2018/11/1 Thursday. YU Xiangyu 2018/11/1 Thursday YU Xiangyu yuxy@scut.edu.cn Introduction ARQ FEC Parity Check Block Codes Cyclic Codes CRC (Cyclic Redundancy Check) Convolutional Codes Interleaving Turbo Codes LDPC Information to

More information

Page 1. Outline. Basic Idea. Hamming Distance. Hamming Distance Visual: HD=2

Page 1. Outline. Basic Idea. Hamming Distance. Hamming Distance Visual: HD=2 Outline Basic Concepts Physical Redundancy Error Detecting/Correcting Codes Re-Execution Techniques Backward Error Recovery Techniques Basic Idea Start with k-bit data word Add r check bits Total = n-bit

More information

BER Analysis of BPSK for Block Codes and Convolution Codes Over AWGN Channel

BER Analysis of BPSK for Block Codes and Convolution Codes Over AWGN Channel International Journal of Pure and Applied Mathematics Volume 114 No. 11 2017, 221-230 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu BER Analysis

More information

AN IMPROVED NEURAL NETWORK-BASED DECODER SCHEME FOR SYSTEMATIC CONVOLUTIONAL CODE. A Thesis by. Andrew J. Zerngast

AN IMPROVED NEURAL NETWORK-BASED DECODER SCHEME FOR SYSTEMATIC CONVOLUTIONAL CODE. A Thesis by. Andrew J. Zerngast AN IMPROVED NEURAL NETWORK-BASED DECODER SCHEME FOR SYSTEMATIC CONVOLUTIONAL CODE A Thesis by Andrew J. Zerngast Bachelor of Science, Wichita State University, 2008 Submitted to the Department of Electrical

More information

Introduction to Error Control Coding

Introduction to Error Control Coding Introduction to Error Control Coding 1 Content 1. What Error Control Coding Is For 2. How Coding Can Be Achieved 3. Types of Coding 4. Types of Errors & Channels 5. Types of Codes 6. Types of Error Control

More information

SYNTHESIS OF CYCLIC ENCODER AND DECODER FOR HIGH SPEED NETWORKS

SYNTHESIS OF CYCLIC ENCODER AND DECODER FOR HIGH SPEED NETWORKS SYNTHESIS OF CYCLIC ENCODER AND DECODER FOR HIGH SPEED NETWORKS MARIA RIZZI, MICHELE MAURANTONIO, BENIAMINO CASTAGNOLO Dipartimento di Elettrotecnica ed Elettronica, Politecnico di Bari v. E. Orabona,

More information

A GSM Simulation Platform using MATLAB

A GSM Simulation Platform using MATLAB A GSM Simulation Platform using MATLAB Mr. Suryakanth.B*, Mr. Shivarudraiah.B*, Mr. Sree Harsha H.N** *Asst Prof, Dept of ECE, BMSIT Bangalore, India **Asst Prof, Dept of EEE, CMR Institute of Technology,

More information

a) Abasebanddigitalcommunicationsystemhasthetransmitterfilterg(t) thatisshowninthe figure, and a matched filter at the receiver.

a) Abasebanddigitalcommunicationsystemhasthetransmitterfilterg(t) thatisshowninthe figure, and a matched filter at the receiver. DIGITAL COMMUNICATIONS PART A (Time: 60 minutes. Points 4/0) Last Name(s):........................................................ First (Middle) Name:.................................................

More information

b. When transmitting a message through a transmission medium, the equipment which receives the message should first find out whether it has received

b. When transmitting a message through a transmission medium, the equipment which receives the message should first find out whether it has received b. When transmitting a message through a transmission medium, the equipment which receives the message should first find out whether it has received the message correctly. If there is an error the receive

More information

4. Which of the following channel matrices respresent a symmetric channel? [01M02] 5. The capacity of the channel with the channel Matrix

4. Which of the following channel matrices respresent a symmetric channel? [01M02] 5. The capacity of the channel with the channel Matrix Send SMS s : ONJntuSpeed To 9870807070 To Recieve Jntu Updates Daily On Your Mobile For Free www.strikingsoon.comjntu ONLINE EXMINTIONS [Mid 2 - dc] http://jntuk.strikingsoon.com 1. Two binary random

More information

Communications Theory and Engineering

Communications Theory and Engineering Communications Theory and Engineering Master's Degree in Electronic Engineering Sapienza University of Rome A.A. 2018-2019 Channel Coding The channel encoder Source bits Channel encoder Coded bits Pulse

More information

Implementation of Reed-Solomon RS(255,239) Code

Implementation of Reed-Solomon RS(255,239) Code Implementation of Reed-Solomon RS(255,239) Code Maja Malenko SS. Cyril and Methodius University - Faculty of Electrical Engineering and Information Technologies Karpos II bb, PO Box 574, 1000 Skopje, Macedonia

More information

Digital Communication Systems ECS 452

Digital Communication Systems ECS 452 Digital Communication Systems ECS 452 Asst. Prof. Dr. Prapun Suksompong prapun@siit.tu.ac.th 5. Channel Coding 1 Office Hours: BKD, 6th floor of Sirindhralai building Tuesday 14:20-15:20 Wednesday 14:20-15:20

More information

FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY

FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY 1 Information Transmission Chapter 5, Block codes FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY 2 Methods of channel coding For channel coding (error correction) we have two main classes of codes,

More information

Intuitive Guide to Principles of Communications By Charan Langton Coding Concepts and Block Coding

Intuitive Guide to Principles of Communications By Charan Langton  Coding Concepts and Block Coding Intuitive Guide to Principles of Communications By Charan Langton www.complextoreal.com Coding Concepts and Block Coding It s hard to work in a noisy room as it makes it harder to think. Work done in such

More information

Advanced channel coding : a good basis. Alexandre Giulietti, on behalf of the team

Advanced channel coding : a good basis. Alexandre Giulietti, on behalf of the team Advanced channel coding : a good basis Alexandre Giulietti, on behalf of the T@MPO team Errors in transmission are fowardly corrected using channel coding e.g. MPEG4 e.g. Turbo coding e.g. QAM source coding

More information

Time division multiplexing The block diagram for TDM is illustrated as shown in the figure

Time division multiplexing The block diagram for TDM is illustrated as shown in the figure CHAPTER 2 Syllabus: 1) Pulse amplitude modulation 2) TDM 3) Wave form coding techniques 4) PCM 5) Quantization noise and SNR 6) Robust quantization Pulse amplitude modulation In pulse amplitude modulation,

More information

Performance Evaluation of Error Correcting Techniques for OFDM Systems

Performance Evaluation of Error Correcting Techniques for OFDM Systems Performance Evaluation of Error Correcting Techniques for OFDM Systems Yasir Javed Qazi Email: p060059@gmail.com Safwan Muhammad Email:safwan.mu11@gmail.com Jawad Ahmed Malik Email: reply.jawad@gmail.com

More information

Versuch 7: Implementing Viterbi Algorithm in DLX Assembler

Versuch 7: Implementing Viterbi Algorithm in DLX Assembler FB Elektrotechnik und Informationstechnik AG Entwurf mikroelektronischer Systeme Prof. Dr.-Ing. N. Wehn Vertieferlabor Mikroelektronik Modelling the DLX RISC Architecture in VHDL Versuch 7: Implementing

More information

Error-Correcting Codes

Error-Correcting Codes Error-Correcting Codes Information is stored and exchanged in the form of streams of characters from some alphabet. An alphabet is a finite set of symbols, such as the lower-case Roman alphabet {a,b,c,,z}.

More information

International Journal of Computer Trends and Technology (IJCTT) Volume 40 Number 2 - October2016

International Journal of Computer Trends and Technology (IJCTT) Volume 40 Number 2 - October2016 Signal Power Consumption in Digital Communication using Convolutional Code with Compared to Un-Coded Madan Lal Saini #1, Dr. Vivek Kumar Sharma *2 # Ph. D. Scholar, Jagannath University, Jaipur * Professor,

More information

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1.

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1. EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code Project #1 is due on Tuesday, October 6, 2009, in class. You may turn the project report in early. Late projects are accepted

More information

Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction

Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction Okeke. C Department of Electrical /Electronics Engineering, Michael Okpara University of Agriculture, Umudike, Abia State,

More information

Hybrid ARQ Schemes for Non-Orthogonal Space-Time Block Codes

Hybrid ARQ Schemes for Non-Orthogonal Space-Time Block Codes Hybrid ARQ Schemes for Non-Orthogonal Space-Time Block Codes Rui Lin, B.E.(Hons) A thesis submitted in partial fulfilment of the requirements for the degree of Master of Engineering in Electrical and Electronic

More information

Hybrid ARQ Using Serially Concatenated Block Codes for Real-Time Communication - An Iterative Decoding Approach

Hybrid ARQ Using Serially Concatenated Block Codes for Real-Time Communication - An Iterative Decoding Approach Hybrid ARQ Using Serially Concatenated Block Codes for Real-Time Communication - An Iterative Decoding Approach ELISABETH UHLEMANN School of Information Science, Computer and Electrical Engineering, Halmstad

More information

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1 Wireless Networks: Physical Layer: Modulation, FEC Guevara Noubir Noubir@ccsneuedu S, COM355 Wireless Networks Lecture 3, Lecture focus Modulation techniques Bit Error Rate Reducing the BER Forward Error

More information

Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes

Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes Weimin Liu, Rui Yang, and Philip Pietraski InterDigital Communications, LLC. King of Prussia, PA, and Melville, NY, USA Abstract

More information

Syllabus. osmania university UNIT - I UNIT - II UNIT - III CHAPTER - 1 : INTRODUCTION TO DIGITAL COMMUNICATION CHAPTER - 3 : INFORMATION THEORY

Syllabus. osmania university UNIT - I UNIT - II UNIT - III CHAPTER - 1 : INTRODUCTION TO DIGITAL COMMUNICATION CHAPTER - 3 : INFORMATION THEORY i Syllabus osmania university UNIT - I CHAPTER - 1 : INTRODUCTION TO Elements of Digital Communication System, Comparison of Digital and Analog Communication Systems. CHAPTER - 2 : DIGITAL TRANSMISSION

More information

Error Protection: Detection and Correction

Error Protection: Detection and Correction Error Protection: Detection and Correction Communication channels are subject to noise. Noise distorts analog signals. Noise can cause digital signals to be received as different values. Bits can be flipped

More information

Using TCM Techniques to Decrease BER Without Bandwidth Compromise. Using TCM Techniques to Decrease BER Without Bandwidth Compromise. nutaq.

Using TCM Techniques to Decrease BER Without Bandwidth Compromise. Using TCM Techniques to Decrease BER Without Bandwidth Compromise. nutaq. Using TCM Techniques to Decrease BER Without Bandwidth Compromise 1 Using Trellis Coded Modulation Techniques to Decrease Bit Error Rate Without Bandwidth Compromise Written by Jean-Benoit Larouche INTRODUCTION

More information

Hardware Implementation of BCH Error-Correcting Codes on a FPGA

Hardware Implementation of BCH Error-Correcting Codes on a FPGA Hardware Implementation of BCH Error-Correcting Codes on a FPGA Laurenţiu Mihai Ionescu Constantin Anton Ion Tutănescu University of Piteşti University of Piteşti University of Piteşti Alin Mazăre University

More information

B. Tech. (SEM. VI) EXAMINATION, (2) All question early equal make. (3) In ease of numerical problems assume data wherever not provided.

B. Tech. (SEM. VI) EXAMINATION, (2) All question early equal make. (3) In ease of numerical problems assume data wherever not provided. " 11111111111111111111111111111111111111111111111111111111111111III *U-3091/8400* Printed Pages : 7 TEC - 601! I i B. Tech. (SEM. VI) EXAMINATION, 2007-08 DIGIT AL COMMUNICATION \ V Time: 3 Hours] [Total

More information

REVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY

REVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 REVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY P. Suresh Kumar 1, A. Deepika 2 1 Assistant Professor,

More information

TABLE OF CONTENTS CHAPTER TITLE PAGE

TABLE OF CONTENTS CHAPTER TITLE PAGE TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS i i i i i iv v vi ix xi xiv 1 INTRODUCTION 1 1.1

More information

UNIT I Source Coding Systems

UNIT I Source Coding Systems SIDDHARTH GROUP OF INSTITUTIONS: PUTTUR Siddharth Nagar, Narayanavanam Road 517583 QUESTION BANK (DESCRIPTIVE) Subject with Code: DC (16EC421) Year & Sem: III-B. Tech & II-Sem Course & Branch: B. Tech

More information

Disclaimer. Primer. Agenda. previous work at the EIT Department, activities at Ericsson

Disclaimer. Primer. Agenda. previous work at the EIT Department, activities at Ericsson Disclaimer Know your Algorithm! Architectural Trade-offs in the Implementation of a Viterbi Decoder This presentation is based on my previous work at the EIT Department, and is not connected to current

More information

Decoding of Block Turbo Codes

Decoding of Block Turbo Codes Decoding of Block Turbo Codes Mathematical Methods for Cryptography Dedicated to Celebrate Prof. Tor Helleseth s 70 th Birthday September 4-8, 2017 Kyeongcheol Yang Pohang University of Science and Technology

More information

UNIT-1. Basic signal processing operations in digital communication

UNIT-1. Basic signal processing operations in digital communication UNIT-1 Lecture-1 Basic signal processing operations in digital communication The three basic elements of every communication systems are Transmitter, Receiver and Channel. The Overall purpose of this system

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 03 ELECTRONICS AND COMMUNICATION ENGINEERING TUTORIAL QUESTION BANK Name : DIGITAL COMMUNICATIONS Code : A6020 Class : III -

More information

Contents Chapter 1: Introduction... 2

Contents Chapter 1: Introduction... 2 Contents Chapter 1: Introduction... 2 1.1 Objectives... 2 1.2 Introduction... 2 Chapter 2: Principles of turbo coding... 4 2.1 The turbo encoder... 4 2.1.1 Recursive Systematic Convolutional Codes... 4

More information

Lab/Project Error Control Coding using LDPC Codes and HARQ

Lab/Project Error Control Coding using LDPC Codes and HARQ Linköping University Campus Norrköping Department of Science and Technology Erik Bergfeldt TNE066 Telecommunications Lab/Project Error Control Coding using LDPC Codes and HARQ Error control coding is an

More information

TSTE17 System Design, CDIO. General project hints. Behavioral Model. General project hints, cont. Lecture 5. Required documents Modulation, cont.

TSTE17 System Design, CDIO. General project hints. Behavioral Model. General project hints, cont. Lecture 5. Required documents Modulation, cont. TSTE17 System Design, CDIO Lecture 5 1 General project hints 2 Project hints and deadline suggestions Required documents Modulation, cont. Requirement specification Channel coding Design specification

More information

Forward Error Correction Technique using Convolution Encoder & Viterbi Decoder

Forward Error Correction Technique using Convolution Encoder & Viterbi Decoder Forward Error Correction Technique using Convolution Encoder & Viterbi Decoder Awantika Vishwakarma 1, Pankaj Gulhane 2 Dept. of VLSI & Embeded System, Electronics & tele Communication, Disha Institute

More information

Lecture 6: Reliable Transmission"

Lecture 6: Reliable Transmission Lecture 6: Reliable Transmission" CSE 123: Computer Networks Alex C. Snoeren HW 2 out Wednesday! Lecture 6 Overview" Cyclic Remainder Check (CRC) Automatic Repeat Request (ARQ) Acknowledgements (ACKs)

More information

Chapter-1: Introduction

Chapter-1: Introduction Chapter-1: Introduction The purpose of a Communication System is to transport an information bearing signal from a source to a user destination via a communication channel. MODEL OF A COMMUNICATION SYSTEM

More information

Implementation of Reed Solomon Encoding Algorithm

Implementation of Reed Solomon Encoding Algorithm Implementation of Reed Solomon Encoding Algorithm P.Sunitha 1, G.V.Ujwala 2 1 2 Associate Professor, Pragati Engineering College,ECE --------------------------------------------------------------------------------------------------------------------

More information

SCHEME OF COURSE WORK. Course Code : 13EC1114 L T P C : ELECTRONICS AND COMMUNICATION ENGINEERING

SCHEME OF COURSE WORK. Course Code : 13EC1114 L T P C : ELECTRONICS AND COMMUNICATION ENGINEERING SCHEME OF COURSE WORK Course Details: Course Title : DIGITAL COMMUNICATIONS Course Code : 13EC1114 L T P C 4 0 0 3 Program Specialization Semester Prerequisites Courses to which it is a prerequisite :

More information

Know your Algorithm! Architectural Trade-offs in the Implementation of a Viterbi Decoder. Matthias Kamuf,

Know your Algorithm! Architectural Trade-offs in the Implementation of a Viterbi Decoder. Matthias Kamuf, Know your Algorithm! Architectural Trade-offs in the Implementation of a Viterbi Decoder Matthias Kamuf, 2009-12-08 Agenda Quick primer on communication and coding The Viterbi algorithm Observations to

More information