bajbkjaj

© All Rights Reserved

15 views

bajbkjaj

© All Rights Reserved

- CVEN 4402 - Workshop - Week 7
- MATLAB-BERTool
- Drop Reasons
- Bass Paper 1
- Iterative method for improvement of coding and decryption
- Performance of Wimax Physical Layer with Variations in Channel Coding and Digital Modulation under Realistic Channel Conditions
- Channel Coding Exercise
- 60 GHz 5G Radio-over-Fiber Using UF-OfDM With Optical Heterodyning
- Non Dept Odd Sem Syllabus 2019
- 02ifacpcsurvey
- On the Complexity of Sphere Decoding
- Performance Bounds for Unequally Punctured
- Solutions to Free MasterClass Home Assignments - 1
- impC29.02
- Banker Algorithm.
- TM-500_600 manual-2009-2
- NON DEPT.xlsx
- Shams (2)
- Slide Sidang Meilki
- Optical Installation Planning

You are on page 1of 38

3 Convolutional codes

p. 1

Convolutional codes offer an approach to error control

coding substantially different from that of block codes.

A convolutional encoder:

encodes the entire data stream, into a single codeword.

maps information to code bits sequentially by convolving a

sequence of information bits with generator sequences.

does not need to segment the data stream into blocks of fixed

size (Convolutional codes are often forced to block structure by periodic

truncation).

is a machine with memory.

This fundamental difference imparts a different nature to the design

and evaluation of the code.

Block codes are based on algebraic/combinatorial techniques.

Convolutional codes are based on construction techniques.

o Easy implementation using a linear finite-state shift register

p. 2

A convolutional code is specified by three parameters

( n, k , K ) or ( k / n, K ) where

k inputs and n outputs

In practice, usually k=1 is chosen.

Rc = k / n is the coding rate, determining the number of data

bits per coded bit.

K is the constraint length of the convolutinal code (where the

encoder has K-1 memory elements).

p. 3

Convolutional encoder

p. 4

The performance of a convolutional code depends on

the coding rate and the constraint length

Longer constraint length K

More powerful code

More coding gain

Coding gain: the measure in the difference between the signal to

noise ratio (SNR) levels between the uncoded system and coded

system required to reach the same bit error rate (BER) level

More decoding delay

More powerful code due to extra redundancy

Less bandwidth efficiency

p. 5

5.7dB

4.7dB

p. 6

Convolutional encoder (rate , K=3)

3 shift-registers, where the first one takes the incoming

data bit and the rest form the memory of the encoder.

u1

Input data bits

u1 ,u2

u2

p. 7

m = (101)

Message sequence:

Time

Output

(Branch word)

Time

Output

(Branch word)

u1

u1

t1

u1 u 2

1 0 0

1 1

t2

0 1 0

u2

0 0

u2

p. 8

u1

u1 u 2

1 0 1

1 0

u2

u1

t3

u1 u 2

t4

u1 u 2

0 1 0

1 0

u2

Time

Output

(Branch word)

Time

Output

(Branch word)

u1

t5

u1

u1 u 2

0 0 1

1 1

t6

u2

m = (101)

0 0 0

0 0

u2

U = (11 10 00 10 11)

Encoder

Reff

p. 9

u1 u 2

3

1

=

< Rc =

10

2

ELEC 7073 Digital Communications III, Dept. of E.E.E., HKU

Initialize the memory before encoding the first bit (all-zero)

Clear out the memory after encoding the last bit (all-zero)

Hence, a tail of zero-bits is appended to data bits.

data

tail

Encoder

codeword

L is the number of data bits, L should be divisible by k

Reff =

L

< Rc

n [ L / k + ( K 1)]

Example: m=[101]

n=2, K=3, k=1, L=3

Reff=3/[2(3+3-1)]=0.3

p. 10

Vector representation:

Define n vectors, each with Kk elements (one vector for each

modulo-2 adder). The i-th element in each vector, is 1 if the

i-th stage in the shift register is connected to the

corresponding modulo-2 adder, and 0 otherwise.

Examples: k=1

u1

Input

u1 u 2

u2

U = m g1 interlaced with m g 2

g1 = (111)

g 2 = (101)

p. 11

g1 = (100)

Generator matrix

with n vectors

g 2 = (101)

g 3 = (111)

Polynomial representation (1):

Define n generator polynomials, one for each modulo-2 adder.

Each polynomial is of degree Kk-1 or less and describes the

connection of the shift registers to the corresponding modulo2 adder.

Examples: k=1

u1

u1 u 2

u2

U( X ) = m( X )g1 ( X ) interlaced with m( X )g 2 ( X )

= m( X )g1 ( X ) + Xm( X )g 2 ( X )

p. 12

Polynomial representation (2):

Example: m=(1 0 1)

m( X )g1 ( X ) = (1 + X 2 )(1 + X + X 2 ) = 1 + X + X 3 + X 4

m( X )g 2 ( X ) = (1 + X 2 )(1 + X 2 ) = 1 + X 4

m ( X ) g 1 ( X ) = 1 + X + 0. X 2 + X 3 + X 4

m( X )g 2 ( X ) = 1 + 0. X + 0. X 2 + 0. X 3 + X 4

U( X ) = (1,1) + (1,0) X + (0,0) X 2 + (1,0) X 3 + (1,1) X 4

U = 11

10

00

10

11

p. 13

One method to describe a convolutional code

Example: k=1

K=3, k=1, n=3 convolutional encoder

stages of the shift register:

a=00;

b=01;

c=10;

d=11

Output bits:

111 001 100

p. 14

stages in this example).

ELEC 7073 Digital Communications III, Dept. of E.E.E., HKU

Example: k=2

g1 = (1011)

g 2 = (1101)

g 3 = (1010)

Input bit: 10 11

Output bits:

111 000

p. 15

stages of the shift register:

a=00;

b=01;

c=10;

d=11

ELEC 7073 Digital Communications III, Dept. of E.E.E., HKU

A convolutional encoder is a finite-state machine:

The state is represented by the content of the memory, i.e., the (K1)k previous bits, namely, the (K-1)k bits contained in the first (K1)k stages of the shift register. Hence, there are 2 (K-1)k states.

Example: 4-state encoder

The states of

the encoder:

a=00;

b=01;

c=10;

d=11

and the state of the encoder.

p. 16

A state diagram is simply a graph of the possible states

of the encoder and the possible transitions from one

state to another. It can be used to show the relationship

between the encoder state, input, and output.

The stage diagram has 2 (K-1)k nodes, each node

standing for one encoder state.

Nodes are connected by branches

Every node has 2k branches entering it and 2k branches

leaving it.

The branches are labeled with c, where c is the output.

When k=1

The solid branch indicates that the input bit is 0.

The dotted branch indicates that the input bit is 1.

p. 17

The possible transitions:

0

1

a

a; a

c

Initial state

0

1

b

a; b

c

0

1

c

b; c

d

0

1

d

b; d

d

Output bits:

111 001 100

p. 18

Initial state

Input bit: 10 11

Output bits:

111 000

p. 19

The state diagram can be modified to yield information

on code distance properties.

How to modify the state diagram:

Split the state a (all-zero state) into initial and final states,

remove the self loop

Label each branch by the branch gain Di, where i denotes the

Hamming weight of the n encoded bits on that branch

Each path connecting the initial state and the final state

represents a non-zero codeword that diverges from and

re-emerges with state a (all-zero state) only once.

p. 20

p. 21

Transfer function (which represents the input-output

equation in the modified state diagram) indicates the

distance properties of the convolutional code by

T ( X ) = ad D

d

from the initial state to the final

state having a distance d.

The minimum weight of all the paths in the modified state

diagram that diverge from and re-emerge with the all-zero

state a.

The lowest power of the transfer function T(X)

p. 22

d free = 6

X c = D X a + DX b

3

X b = DX c + DX d

X d = D2 X c + D2 X d

Xe = D Xb

2

p. 23

T ( X ) = X e X a = D 6 (1 2 D 2 )

= D 6 + 2 D 8 + 4 D10 + 8D12 + "

= ad D d

d =6

2( d 6) / 2

ad =

0

(even d )

(odd d )

Trellis Diagram

Trellis diagram is an extension of state diagram which

explicitly shows the passage of time.

All the possible states are shown for each instant of time.

Time is indicated by a movement to the right.

The input data bits and output code bits are represented by a

unique path through the trellis.

The lines are labeled with c, where c is the output.

After the second stage, each node in the trellis has 2k

incoming paths and 2k outgoing paths.

When k=1

The solid line indicates that the input bit is 0.

The dotted line indicates that the input bit is 1.

p. 24

Initial state

i =1

i=2

i=3

i=4

i=5

Output bits:

111 001 100 001 011

p. 25

K=2, k=2, n=3 convolutional code

Initial state

i =1

i=2

i=3

i=4

Input bit: 10 11 00

Output bits:

111 000 011

p. 26

Given the received code word r, determine the most

likely path through the trellis. (maximizing p(r|c'))

Compare r with the code bits associated with each path

Pick the path whose code bits are closest to r

Measure distance using either Hamming distance for harddecision decoding or Euclidean distance for soft-decision

decoding

Once the most likely path has been selected, the estimated

data bits can be read from the trellis diagram

Noise

p. 27

Convolutional

Encoder

Channel

c

Convolutional

Decoder

hard-decision

Received sequence

Hamming distance of 2

path

00000

00100

01000

01100

10000

10100

00 00 00 00 00

5

00 00 11 10 11

6

00 11 10 11 00

2

00 11 01 01 11

7

11 10 11 00 00

6

11 10 00 10 11

7

1 1 0 0 0 11 01 01 11 00

1 1 1 0 0 11 01 10 01 11

p. 28

3

4

A breakthrough in communications in the late 60s

Guaranteed to find the ML solution

However the complexity is only O(2K)

Complexity does not depend on the number of original data bits

Used in satellites, cell phones, modems, etc

Example: Qualcomm Q1900

p. 29

Takes advantage of the structure of the trellis:

Goes through the trellis one stage at a time

At each stage, finds the most likely path leading into each

state (surviving path) and discards all other paths leading

into the state (non-surviving paths)

Continues until the end of trellis is reached

At the end of the trellis, traces the most probable path from

right to left and reads the data bits from the trellis

Note that in principle whole transmitted sequence must be

received before decision. However, in practice storing of

stages with length of 5K is quite adequate

p. 30

Implementation:

1.

2.

Initialization:

Let Mt(i) be the path metric at the i-th node, the t-th stage in

trellis

corresponding to unlikely paths

At stage (t+1),

p. 31

time t to states at time (t+1)

received bits and the code bits corresponding to that branch:

p(r(t+1)|c'(t+1))

ELEC 7073 Digital Communications III, Dept. of E.E.E., HKU

Implementation (contd):

2.

At stage (t+1),

p. 32

between the received bits and the code bits

For each branch connecting the states at time t to states at time

(t+1), add the branch metric to the corresponding partial path

metric Mt(i)

Trellis update

At each state, pick the most likely path which has the largest

metric and delete the other paths

p. 33

Implementation (contd):

3.

4.

Trace back

The most probable path leading into the last all-zero state in

the trellis has the largest metric

Hard-decision

2 b

p = Q

N0

p. 34

Non-surviving paths are denoted by dashes lines.

Path metrics

Correct decoding

p. 35

Non-surviving paths are denoted by dashes lines.

Path metrics

Error event

(

c ' = (111

p. 36

An error event happens when an erroneous path is

selected at the decoder

Error-event probability:

Pe

d = d free

ad P2 ( d )

P2 ( d ) probability of the path with the Hamming distance of d

Depending on the modulation scheme, hard or soft decision

p. 37

BER is obtained by multiplying the error-event

probability by the number of data bit errors associated

with each error event.

BER is upper bounded by:

Pb

d = d free

f ( d )ad P2 ( d )

the erroneous path with the Hamming distance of d

p. 38

- CVEN 4402 - Workshop - Week 7Uploaded byzhunshean
- MATLAB-BERToolUploaded byMeonghun Lee
- Drop ReasonsUploaded byDeepak Nagaraj
- Bass Paper 1Uploaded byNaresh Bopparathi
- Iterative method for improvement of coding and decryptionUploaded byAIRCC - IJNSA
- Performance of Wimax Physical Layer with Variations in Channel Coding and Digital Modulation under Realistic Channel ConditionsUploaded byMandy Diaz
- Channel Coding ExerciseUploaded bySalman Shah
- 60 GHz 5G Radio-over-Fiber Using UF-OfDM With Optical HeterodyningUploaded byashutosh199625
- Non Dept Odd Sem Syllabus 2019Uploaded bysukantakundu11
- 02ifacpcsurveyUploaded bySyed Shujaat Ali
- On the Complexity of Sphere DecodingUploaded byapi-3851401
- Performance Bounds for Unequally PuncturedUploaded byInternational Journal of Research in Engineering and Technology
- Solutions to Free MasterClass Home Assignments - 1Uploaded byRajesh
- Banker Algorithm.Uploaded byAbraham Cabrera
- impC29.02Uploaded byapi-19790923
- TM-500_600 manual-2009-2Uploaded byKay Yusuff
- NON DEPT.xlsxUploaded bysukantakundu11
- Shams (2)Uploaded byshamstouhid
- Slide Sidang MeilkiUploaded byDimaz Hendratno
- Optical Installation PlanningUploaded byBudi Agus Setiawan
- Amplify-And-Forward Relay Networks Under Received Power ConstraintUploaded bylevanxem1986
- nphoton.2013.109-s1Uploaded byJohann Mercado Leon
- 05062297.pdfUploaded byAditya Rai
- 4_Frequency Planning.pptUploaded bysoufiane
- DCT ProjectUploaded byShubham Sarkar
- data log 0xa0 1203587685Uploaded bygmemon
- bch.docxUploaded bySaketh Ravirala
- 04317702Uploaded bya4648208
- Headings.pptxUploaded bymkmanojdevil
- RapportUploaded byHichem Chouaibi

- Date Sheet 2014-2015 7th SemUploaded byShivamPandey
- c99 (4)Uploaded byRajat Sharma
- Digital Signal Processing Dec 09Uploaded byRajat Sharma
- Digital Signal Processing May 10Uploaded byRajat Sharma
- Digital Signal Processing Dec 10Uploaded byRajat Sharma
- Lockedr Code.docUploaded byRajat Sharma
- EC-4th-yearUploaded byRajat Sharma

- information theoryUploaded byFathima Rashmi
- Modbus ASCII vs Modbus RTUUploaded byMarcela Sanchez
- B_Tech (All)(1)Uploaded bykanika_khosla30_4784
- melodoslog64Uploaded bylps Sun set
- turbo codesUploaded byIshan Upadhyay
- Problems Linear Block Code.pdfUploaded byFatima Ahsan
- 10-ErrorUploaded byベラ ジェーク
- The Effectiveness of ChecksumsUploaded byArcot Sneha
- Ch2 Information TheoryUploaded byRaviKiran
- Units of Computer StorageUploaded bykerrykay
- Mobile and Wireless Communication Complete Lecture Notes #12Uploaded byStudent Lecture Notes
- Kernel Methods for Pattern AnalysisUploaded byKienking Khansultan
- Digital Image CompressionUploaded byRitu Pareek
- Error CorrectionUploaded bymyoneslove
- Predictive CodingUploaded bySabir Bhati
- 091004Uploaded byvol1no1
- Informational OntologyUploaded bykoseleko
- TD8_2018Uploaded byChahoub Chahhoub
- RebolloEURASIPSigProc2006Uploaded byJuvie227
- Chapter 10 Error-Control CodingUploaded byrichard_ooi
- Vector QuantizationUploaded byshobha81080
- (ebook - PDF - Mathematics) Coding and CryptographyUploaded byapi-3744003
- NarayananCIS616hw3Uploaded bymirandamon
- HammingCodes_noAudioUploaded byIsak Foshay
- EROR DETECTION AND CORRECTIONUploaded byBagasRikoBoritto
- Lie Gonzalez Ch8 pptUploaded byfmail701
- 1st rv ppt.pptxUploaded byAshokkumar Ganesan
- S7_Hand-outUploaded byThomas cherian
- week7.pdfUploaded byKurt Mk-Jim
- Measuring Project Complexity a Project Manager s ToolUploaded byRoberto Castro