Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

Similar documents
Mobile & Wireless Networking. Lecture 2: Wireless Transmission (2/2)

Chapter 2 Overview - 1 -

Chapter 2 Overview - 1 -

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK. Subject Name: Digital Communication Techniques

QUESTION BANK EC 1351 DIGITAL COMMUNICATION YEAR / SEM : III / VI UNIT I- PULSE MODULATION PART-A (2 Marks) 1. What is the purpose of sample and hold

Department of Electronics and Communication Engineering 1

ICT 5305 Mobile Communications. Lecture - 3 April Dr. Hossen Asiful Mustafa

Chapter 2: Wireless Transmission. Mobile Communications. Spread spectrum. Multiplexing. Modulation. Frequencies. Antenna. Signals

UNIT I Source Coding Systems

Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 2004.

KINGS DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING DIGITAL COMMUNICATION TECHNIQUES YEAR/SEM: III / VI BRANCH : ECE PULSE MODULATION

Chapter 7. Multiple Division Techniques

Revision of Lecture Eleven

Wireless Networks (PHY): Design for Diversity

Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX

Performance of Reed-Solomon Codes in AWGN Channel

BER Performance Analysis of QAM Modulation Techniques in MIMO Rayleigh Channel for WCDMA System

Introduction to Wireless and Mobile Networking. Hung-Yu Wei g National Taiwan University

Outline. Communications Engineering 1

Chapter 7 Multiple Division Techniques for Traffic Channels

Wireless Transmission & Media Access

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

UNIVERSITY OF SOUTHAMPTON

Spread Spectrum Techniques

Syllabus. osmania university UNIT - I UNIT - II UNIT - III CHAPTER - 1 : INTRODUCTION TO DIGITAL COMMUNICATION CHAPTER - 3 : INFORMATION THEORY

QUESTION BANK SUBJECT: DIGITAL COMMUNICATION (15EC61)

Objectives. Presentation Outline. Digital Modulation Revision

Orthogonal Frequency Division Multiplexing (OFDM) based Uplink Multiple Access Method over AWGN and Fading Channels

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

Lecture 9: Spread Spectrum Modulation Techniques

TSTE17 System Design, CDIO. General project hints. Behavioral Model. General project hints, cont. Lecture 5. Required documents Modulation, cont.

Lecture 3: Wireless Physical Layer: Modulation Techniques. Mythili Vutukuru CS 653 Spring 2014 Jan 13, Monday

Multiple Access Schemes

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Hybrid ARQ Schemes for Non-Orthogonal Space-Time Block Codes

CDMA Mobile Radio Networks

DIGITAL COMMINICATIONS

Spreading Codes and Characteristics. Error Correction Codes

Digital Television Lecture 5

Digital Modulation Schemes

Multi-carrier Modulation and OFDM

Frequency-Hopped Spread-Spectrum

Outline. Wireless Networks (PHY): Design for Diversity. Admin. Outline. Page 1. Recap: Impact of Channel on Decisions. [hg(t) + w(t)]g(t)dt.

Fundamentals of Digital Communication

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

ECE 6640 Digital Communications

Comparative Analysis of the BER Performance of WCDMA Using Different Spreading Code Generator

Wireless Transmission:

SPREAD SPECTRUM (SS) SIGNALS FOR DIGITAL COMMUNICATIONS

Contents Preview and Introduction Waveform Encoding

Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System

CDMA Tutorial April 29, Michael Souryal April 29, 2006

EC6501 Digital Communication

RADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology

Computer Networks - Xarxes de Computadors

ATSC 3.0 Physical Layer Overview

Techniques to Mitigate Fading Effects

BER Analysis of BPSK for Block Codes and Convolution Codes Over AWGN Channel

Performance Analysis of OFDM System with QPSK for Wireless Communication

Wireless Communication: Concepts, Techniques, and Models. Hongwei Zhang

Signal Encoding Criteria

Swedish College of Engineering and Technology Rahim Yar Khan

Robust Reed Solomon Coded MPSK Modulation

ECE 6640 Digital Communications

ERROR CONTROL CODING From Theory to Practice

Wireless Communications

COMMUNICATION SYSTEMS

CS434/534: Topics in Networked (Networking) Systems

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Error Control Coding

TCM-coded OFDM assisted by ANN in Wireless Channels

Performance Evaluation of Error Correcting Techniques for OFDM Systems


Datacommunication I. Layers of the OSI-model. Lecture 3. signal encoding, error detection/correction

Mobile Communications Chapter 2: Wireless Transmission

Problem Sheet 1 Probability, random processes, and noise

B SCITEQ. Transceiver and System Design for Digital Communications. Scott R. Bullock, P.E. Third Edition. SciTech Publishing, Inc.

Channel Coding RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology

CSE4214 Digital Communications. Bandpass Modulation and Demodulation/Detection. Bandpass Modulation. Page 1

Part 3. Multiple Access Methods. p. 1 ELEC6040 Mobile Radio Communications, Dept. of E.E.E., HKU

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

PROJECT 5: DESIGNING A VOICE MODEM. Instructor: Amir Asif

2: Diversity. 2. Diversity. Some Concepts of Wireless Communication

CDMA Systems Engineering Handbook

Digital modulation techniques

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Course Developer: Ranjan Bose, IIT Delhi

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

Year : TYEJ Sub: Digital Communication (17535) Assignment No. 1. Introduction of Digital Communication. Question Exam Marks

Receiver Designs for the Radio Channel

1. INTRODUCTION II. SPREADING USING WALSH CODE. International Journal of Advanced Networking & Applications (IJANA) ISSN:

Typical Wireless Communication System

Study of Turbo Coded OFDM over Fading Channel

Lecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr.

Chapter 4. Part 2(a) Digital Modulation Techniques

Chapter 3 Convolutional Codes and Trellis Coded Modulation

Detection and Estimation of Signals in Noise. Dr. Robert Schober Department of Electrical and Computer Engineering University of British Columbia

About Homework. The rest parts of the course: focus on popular standards like GSM, WCDMA, etc.

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Improved concatenated (RS-CC) for OFDM systems

Wireless Communication

Transcription:

Wireless Networks: Physical Layer: Modulation, FEC Guevara Noubir Noubir@ccsneuedu S, COM355 Wireless Networks Lecture 3,

Lecture focus Modulation techniques Bit Error Rate Reducing the BER Forward Error Correction Block codes Convolutional codes S, COM355 Wireless Networks Lecture 3,

Modulation What is modulation? Mapping a digital sequence of information bits into an analog signal suitable for transmission over the communication medium (channel) Process during which the amplitude, frequency, or the phase of a carrier changes in accordance with the information to be transmitted Modulation associates each n bits to a signal S i (t) chosen among M = n signals Baseband transmission versus carrier modulation transmission Baseband: signal within [, f s ] (eg, cable) Carrier modulation: signal within [f-f s, ff s ] Basic modulation schemes: Amplitude modulation, Phase modulation, Frequency modulation S, COM355 Wireless Networks Lecture 3, 3

Fourier Transforms Any function s(t) can be represented as a superposition of complex sinusoids of weight: S(f) Fourier transform S ( f ) j π ft = s ( t ) e d t Inverse Fourier transform s ( t ) j π ft = S ( f ) e d f Cos and Sin are orthogonal => can be used to independently modulate sequences of symbols => I (In-phase) and Q (Quadrature phase) channels S, COM355 Wireless Networks Lecture 3, 4

Modulation Schemes Analog: Amplitude modulation Frequency modulation Main digital modulation schemes: Amplitude modulation: On-Off Keying (OOK): simplest modulation scheme (AM): carrier amplitude is or depending on the value of the information to be transmitted Pulse Amplitude Modulation (PAM): use M = m amplitudes Frequency-Shift Keying (FSK): BFSK: use two different tones (frequencies) f, f Use f to transmit a information bit, and f to transmit an information bit equal to MFSK: generalized to M = m frequencies to transmit m bits simultaneously Phase-Shift Keying (PSK): BPSK: use two signals shifted by 8 degrees: s, and s MPSK: use signals with different phases and amplitudes: QPSK etc S, COM355 Wireless Networks Lecture 3, 5

Modulation Schemes Phase Shift Keying: Frequency Shift Keying: s i E ( t ) = cos[ w t T t T ; i =,, M ; φ i φ E s i ( t ) = cos[ w it φ ] T t T ; i =,, M ( t i ) ( t = )] π i M Amplitude Shift Keying: Amplitude Phase Keying: E i s i ( t ) = cos[ w t φ T t T ; i =,, M E i s i ( t ) = cos[ w t φ i T t T ; i =,, M ] ( t )] S, COM355 Wireless Networks Lecture 3, 6

Choosing the Modulation Scheme Compactness of the power spectrum density: minimize interference on adjacent channels (6-8dB) Good performance in terms of BER Envelope properties: constant envelope to avoid problems caused by non-linear amplifiers S, COM355 Wireless Networks Lecture 3, 7

Additive White Gaussian Noise Noise: As previously seen, noise has several sources Thermal noise source is the motion of electrons in amplifiers and circuits Its statistics were determined using quantum mechanics It is flat for all frequencies up to Hz We generally call it: Additive White Gaussian Noise (AWGN) Its probability density function (pdf) (zero mean noise voltage): n exp = ) n ( p σ π σ S, COM355 Wireless Networks Lecture 3, 8

S, COM355 Wireless Networks Lecture 3, 9 Bit Error Rate [Sklar988] BER for coherently detected BPSK: BER for coherently detected BFSK: ) / ( ) exp( / N E Q P du u P b B N E B b = = π ) / ( ) exp( / N E Q P du u P b B N E B b = = π

Error Control Two main techniques: Forward Error Correction Automatic Repeat request In practice: Combinations: Hybrid ARQ I and Hybrid ARQ II ARQ: Stop&Wait, GoBackN, Selective Repeat FEC: Block codes, convolutional codes S, COM355 Wireless Networks Lecture 3,

Block Codes Information bits (word): u = (u, u,, u k ) Code word (n>k): v = (v, v,, v n ) Systematic versus non-systematic Binary versus Non-Binary Use of codes: Error detection, error correction, erasure correction How to build codes with high error correction capability? Examples: Hamming code, BCH codes, RS codes S, COM355 Wireless Networks Lecture 3,

Hamming Distance for Block Codes The Hamming distance between two code words is the number of places where they differ The Hamming distance d of a Block code is the minimum distance between two code words t Error Detection: ribitrary n-tuples A code word Upto d- errors Error Correction: d d Upto code word Combine: d λl code words spheres S, COM355 Wireless Networks Lecture 3,

Coding Gain Definition: The coding gain is the amount of additional SNR that would be required to provide the same BER performance for an uncoded signal If the code is capable of correcting at most t errors and P UC is the BER of the channel without coding, then the probability that a bit is in error using coding is: i n n i i P P CB UC ( UC n i = t i n ) P S, COM355 Wireless Networks Lecture 3, 3

Example of Binary Block Code (7, 4) Any two different code words are different on at least three different coordinates This code has Hamming distance 3 Message block Code word ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) Notice that the last 4 bits of the code word are the same as the message This is a systematic coding The other 3 bits are redundancy bits S, COM355 Wireless Networks Lecture 3, 4

#!!! Linear Block A block code of length n and k code words is called a linear (n, k) code iff its k code words form a k-dimensional subspace of the vector space of all n- tuples over the field GF() Informal Meaning: linear combinations of codewords are also codewords The linear code is completely specified by k independent codewords (G generator matrix) The encoder needs only to store the matrix G Example: Linear code (7, 4)! " = G To encode u = ( ): v = g g g g 3 S, COM355 Wireless Networks Lecture 3, 5

Parity-Check Matrix (H) For every kxn generator matrix G (with k linearly independent rows), there exists a (n-k)xn matrix H (with (n-k) linearly independent rows) called parity check matrix such that: any vector in the row space of G is orthogonal to any row of H and any vector that is orthogonal to all the rows of H is in the row space of G: v = ug vh T = The n-k combinations of the rows of H form an (n-k)- dimensional subspace It is the null space of C the (n, k) code generated by G It is called the dual space of C and noted C d For any v in C and w in C d we have v w = S, COM355 Wireless Networks Lecture 3, 6

S, COM355 Wireless Networks Lecture 3, 7 Systematic Coding A linear block code is called systematic iff the code words can be divided into two parts: Message part (k bits), and a redundancy checking part (n-k bits) Systematic code generator matrix: G = [P I k ]; H = [I n-k P T ]; GH T = Redundant Checking part Message part n-k digits k digits $ $ $ $ $ $ $ $ $ $ % & ' ' ' ' ' ' ' ' ' ' ( ) = $ $ $ $ $ $ $ % & ' ' ' ' ' ' ' ( ) = * * * ** *, - * * * * * * * * * * * *, - identity matrix parity matrix ) ( :,,,,,,,,,,,,,, kxk k n kx P k n k k k k k n k n k n k p p p p p p p p p p p p p p g g g G

/ 5 3 3 Hamming Codes ( m -, m -m-) Parameters of Hamming codes (m>): Code length: n = m - Number of information bits: k = m -m- Number of parity check bits: n-k = m Minimum distance: 3 = (3-)/ Error-correcting capability: t = Parity check matrix of a Hamming code: H = [I m Q] I m is the identity matrix mxm Q consists of m -m- columns which are the m-tuples of weight or more Example: 3 4 H = S, COM355 Wireless Networks Lecture 3, 8

Minimum Distance of Block Codes The minimum distance d min of a block code is the minimum distance between any two code words: d min = min {d(v, w), st v, w C, v w} d min = min {w(v w), st v, w C, v w} d min = min {w(x), st x C, x } (because C is a vector sub-space) Example: Minimum Distance of Hamming Codes? S, COM355 Wireless Networks Lecture 3, 9

Cyclic Block Codes Definition: An (n, k) linear code C is called a cyclic code if every cyclic shift of a code vector in C is also a code vector Codewords can be represented as polynomials of degree n For a cyclic code all codewords are multiple of some polynomial g() modulo n such that g() divides n g() is called the generator polynomial Examples: Hamming codes, Golay Codes, BCH codes, RS codes BCH codes were independently discovered by Hocquenghem (959) and by Bose and Chaudhuri (96) Reed-Solomon codes (non-binary BCH codes) were independently introduced by Reed-Solomon S, COM355 Wireless Networks Lecture 3,

S, COM355 Wireless Networks Lecture 3, Systematic Cyclic Codes Data bits: Polynomial representation: The CRC is also viewed as a polynomial: The transmitted frame can be represented as:,,,, s s s s K K ) ( s s s s S K K K K = ) ( c c c c C L L L L = ) ( ) ( ) ( ) ( c c c c s s V c s V L L L L L K L K L = =

Systematic Cyclic Codes The CRC is the remainder of dividing the information polynomial S(D) by a generator polynomial g(d) s ( D c ( D ) = Remainder[ g ( ) D D ) L ] Example: divide D 5 D 3 by D 3 D S, COM355 Wireless Networks Lecture 3,

Cyclic Block Codes A cyclic Hamming code of length m - with m> is generated by a primitive polynomial p() of degree m Hamming code (3, 6) g() = 5, l = 3 Golay Code: cyclic code (3, ) minimum distance 7 generator polynomials: either g () or g () g g ( ) = ( ) = 5 4 6 5 7 6 9 S, COM355 Wireless Networks Lecture 3, 3

Bose Chaudhuri and Hocquenghem (BCH) Codes For any positive integer m (m>) and t (t< m- ), there exists a BCH code: Block length: m - Parity bits: n - k mt Minimum distance: d min t generator polynomial is the lowest-degree polynomial over GF() such that: α, α, α 3,, α t are its roots α is the primitive root of unity in the extension field GF( n ) Such a BCH code is capable of correcting t errors The generator polynomial is: g() = LCM{φ (), φ (),, φ t ()} for i = i l, φ i () = φ i () (because α i and α i are conjugates), thus g() = LCM{φ (), φ 3 (),, φ t- ()} Since any minimal polynomial has degree m or less, then degree (n - k) of g is at most mt If t =, then g is a primitive polynomial and we have a Hamming code S, COM355 Wireless Networks Lecture 3, 4

Convolutional codes (n, k, K) convolutional code: inputs k bits, outputs n bits and has register depth K Rate: k/n Example of binary convolutional encoder n =, k =, K = 3 Rate ½ Representations: State, Tree, Trellis Decoding: Soft decision vs Hard decision Viterbi Algorithm, sequential decoding, feedback decoding S, COM355 Wireless Networks Lecture 3, 5

Representations of Convolutional Codes State Coding: K- registers input => state diagram (finite state machine) Input = Input = Input bit m i Registers State at t i State at t i Output - - S, COM355 Wireless Networks Lecture 3, 6

Representations of Convolutional Codes Trellis representation: States S, COM355 Wireless Networks Lecture 3, 7

Viterbi Decoding Algorithm Principle: Computes a measure of similarity (distance) between the received signal and all potential trellis paths For each state keeps only one more likely path Algorithm: For each input For each state: Determine the distance/weight of the branches leading to it Keep only the best branch If all surviving paths at time t i pass through some state S at time t i-j then commit to S(t i-j ) S, COM355 Wireless Networks Lecture 3, 8

Viterbi Decoding States Input: Codeword: Received: S, COM355 Wireless Networks Lecture 3, 9

Other Techniques Equalization: Reason: multi-path generates Inter-Symbol Interference (ISI) An equalizer is a filter that inverts the effect of the channel Generally uses training sequences to estimate the channel Interleaving: Reason: in some channels errors occur in bursts and channel coding is only efficient when errors are randomly distributed Goal: transforms a burst of errors into randomly distributed errors Types: bit level, frame level Drawbacks: delay How: matrix bit-interleaving Bits enter on the rows and are output column by column S, COM355 Wireless Networks Lecture 3, 3

Other Techniques (Cont d) Diversity techniques: Micro-diversity: Time diversity: transmit at different moments (separated by channel coherence time: inverse of the Doppler frequency) Generally combined with ARQ and FEC Drawback may reduce throughput Space diversity: Use multiple antennas separated by 5λ and/or 8λ: ~3dB gain Drawback: requires equipment to process multiple input signals Polarization: orthogonally polarized signals are uncorrelated Multiple polarization achieves 6-dB gain Frequency diversity: Use frequencies separated by a value higher than the coherence bandwidth (=> frequency hopping schemes) Smart antennas S, COM355 Wireless Networks Lecture 3, 3

Spread Spectrum Technology Problem of radio transmission: frequency dependent fading can wipe out narrow band signals for duration of the interference; multi-path fading; eavesdropping; collisions; time imprecision Solution: spread the narrow band signal into a broad band signal using a special code protection against narrow band interference power power interference spread signal detection at receiver signal spread interference f f protection against narrowband interference Side effects: coexistence of several signals without dynamic coordination (CDMA); tapproof, fine time resolution (GPS); clock recovery Techniques: Direct Sequence, Frequency Hopping, (Time Hopping) S, COM355 Wireless Networks Lecture 3, 3

Effects of Spreading and Interference i) P P f ii) sender P P f user signal broadband interference narrowband interference P iii) f iv) receiver v) f f S, COM355 Wireless Networks Lecture 3, 33

Spreading and Frequency Selective Fading channel quality narrow band signal 3 4 guard space 5 6 frequency narrowband channels channel quality spread spectrum channels spread spectrum frequency S, COM355 Wireless Networks Lecture 3, 34

DSSS (Direct Sequence Spread Spectrum) OR of the signal with pseudo-random number (chipping sequence) many chips per bit (eg, 8) result in higher bandwidth of the signal Examples: Barker code: (IEEE8), Hadamard, Kazami codes Advantages reduces frequency selective fading in cellular networks base stations can use the same frequency range several base stations can detect and recover the signal soft handover Disadvantages precise power control necessary user data OR chipping sequence resulting signal S, COM355 Wireless Networks Lecture 3, 35 t b t c t b : bit period t c : chip period =

DSSS (Direct Sequence Spread Spectrum) user data spread spectrum signal modulator transmit signal chipping sequence radio carrier transmitter received signal demodulator lowpass filtered signal correlator products integrator sampled sums decision data radio carrier chipping sequence receiver S, COM355 Wireless Networks Lecture 3, 36

FHSS (Frequency Hopping Spread Spectrum) I Discrete changes of carrier frequency sequence of frequency changes determined via pseudo random number sequence Two versions Fast Hopping: several frequencies per user bit Slow Hopping: several user bits per frequency Advantages frequency selective fading and interference limited to short period simple implementation uses only small portion of spectrum at any time Disadvantages not as robust as DSSS simpler to detect S, COM355 Wireless Networks Lecture 3, 37

FHSS (Frequency Hopping Spread Spectrum) t b user data f f 3 f f t d t slow hopping (3 bits/hop) f t d t f 3 f f fast hopping (3 hops/bit) t t b : bit period t d : dwell time S, COM355 Wireless Networks Lecture 3, 38

FHSS (Frequency Hopping Spread Spectrum) user data modulator narrowband signal modulator spread transmit signal transmitter frequency synthesizer hopping sequence received signal demodulator narrowband signal demodulator data hopping sequence frequency synthesizer receiver S, COM355 Wireless Networks Lecture 3, 39