You are on page 1of 14

IEEE COMMUNICATIONS MAGAZINE

A Structured Overview of Digital


Communications-a Tutorialu
Review-Part I
BERNARD SKLAR

of digital communications.
Part I of a two-part overview

A
N IMPRESSIVE assortment of communications symbol be represented by transmitting a corresponding
signal processing techniques has arisen during the waveformsl(t),s2(t), . . . , sM(t).Thesymbol(ormessage)
past two decades. This two-partpaper presents an m iis sent by transmitting the digital waveform s i ( t ) for T
overview of some of these techniques, particularly as they seconds, thesymbol period. The next symbol is sent over the
relate to digital satellite communications. The material is next period. Since theM symbols can be represented by k =
developed in the context of a structure used to trace the log2M binary digits (bits), the data rate can expressed
be as
processing steps from the information source to the informa-
R = ( l / T ) log,M = k/T b/s.
tion
sink. Transformations are organized accordingto
functional classes: formatting and source coding, modulation, Data rateis usually expressed in bits per second (b/s) whether
channel coding,multiplexing and multiple access, frequency or not binary digits are actually involved. A binary symbol is
spreading,encryption,and synchronization. The paper the special case characterizedby M = 2 and k = 1. A digital
begins by treating formatting, source coding, modulation, waveform is taken to mean a voltage or current waveform
and potential trade-offs for power-limited systems ' and representing a digital symbol. The waveform is endowed with
bandwidth-limited systems. specially chosen amplitude, frequency, or phase characteris-
Communications via satellites have two unique charac- tics that allow the selection of a distinct-waveform for each
teristics: the ability to cover the globe with a flexibility that symbol from a finite set of symbols. At various points along
cannot be duplicated with terrestrial links, and theavailability the signal route, noise corrupts the waveforms s(t) so that its
of bandwidth exceeding anything previously available for reception must be termed an estimate i(t). Such noise, and its
intercontinental communications [ 11. Most satellite commu- deleterious effect on system performance, will be treated in
nications systemstodatehave been analog in nature. Part I1 of this paper, which will appear in the October. 1983
.
However, digital communications is becoming increasingly IEEE Communications Magazine.
attractivebecause of the ever-growing demand for data
communication, and because digital transmission offers data Signal Processing Steps
processing options and flexibilities not available with analog The functional block diagram shown in Fig.1 illustrates the
transmission [2]. data flow through the DCS. The upper blocks, which are
This paper presentsa n overview of digital communications labeled format,sourceencode,encrypt,channelencode,
in general; for the mostpart, however, the treatment is in the multiplex, modulate, frequency spread, andmultiple access,
context of a satellite communications link. The key feature of dictatethe signal transformations from the sourceto the
a digital communications system(DCS) is that it sends only a transmitter. The lower blocks dictate the signal transforma-
finite set of messages, in contrast to an analog communica- tions from the receiver back to the source; thelower blocks
tions system, which can send an infinite set of messages. In a essentially reverse the signal processing steps performed by
DCS, the objective at the receiver is nottoreproduce a the upperblocks. The blocks within the dashedlines initially
waveform with precision; it is instead to determine from a consisted only of the modulator and demodulator functions,
noise-perturbed signal which of the finite set of waveforms hence the name MODEM. During the past two decades,
had been sent by the transmitter. An important measure of other signal processing functionswere frequently incorporated
system performance is the average number of erroneous within the sameassembly as the modulatorand dem.odulator.
decisions made, or the probability of error ( P E ) . Consequently,the term MODEM often encompasses the
Figure 1 illustrates a typical DCS. Let there beM symbols processing steps shown within the dashed lines of Fig. 1.
or messages m l , m2, . , . , mM to be transmitted. Let each When this is the case,the MODEM can be thoughtof as the

.OO0 1983 IEEE


0163-6804/83/0800-0004$01
AUGUST 1983

“brains” of the system,and the transmitter and receiver as the prior to modulation, or-with a two-step modulation process
“muscles.” While the transmitter^ ,consists of a frequency (subcarrier and carrier)-it can be performed between the two
up-conversion stage, a high-power amplifier, and anantenna, steps. Similarly, spreading can take place anywhere along
the receiver portion is occupied by an antenna, a low-noise the transmission chain; its precise location depends on the
front-end amplifier, and a down-converter stage, typically to particular technique used. Figure 1 illustrates the reciprocal
an intermediate frequency (IF). aspect of the procedure; any signal processing steps which
Of all the signal processing steps, only formatting, take place in the transmitting chain must be reversed in the
modulation, and demodulation are essential for all DCS’s; the receiving chain. The figure also indicates that,from the
other processing steps within the MODEM are considered source to the modulator, a message takes theform of a bit
design options for various system needs. Source encoding, as stream, also called a baseband signal. After modulation, the
defined here, removes information redundancy and performs message takes the form of a digitally encoded sinusoid (digital
analog-to-digital (A/D) conversion. Encryption prevents waveform). Similarly, in the reverse direction, a received
unauthorized users from understanding messages and from message appears asa digital waveform until it is demodu-
injecting false messages into the system. Channel coding can, lated. Thereafter it takes theform of a bit stream for all further
for a given data rate, improve the PE performance at the signal processing steps.
expense of power or bandwidth, reduce thesystem bandwidth Figure 2 shows the basic signal processing functions, which
requirement at the expense of power o r PE performance, or may be viewed as transformations from one signal space to
reduce thepower requirement at the expenseof bandwidth or another. The transformations are classified into seven basic
PEperformance. Frequency spreading renders the signal less groups:
vulnerable to interference (both natural and intentional) and 0 formatting and source coding

canbe used to afford privacy tothecommunicators. 0 modulation

Multiplexing and multiple access combine signals that might 0 channel coding

have different characteristicsor originate fromdifferent, multiplexing and multiple access


sources. 0 spreading

The flow of the signal processing steps shown in Fig. 1 0 encryption

represents a typical arrangement; however, the blocks are 0 synchronization

sometimes implemented in a different order. For example, The organization has some inherent overlap, but neverthe-
multiplexing cantakeplace prior tochannel encoding, less provides a useful structure for this overview.The text by

INFORMATION I SOURCE I
SINK
OPTIONAL L - - - - - - ----
BITS
- - - - - - - - - - _JI
0 ESSENTIAL T 3 OTHER
DESTINATIONS

I Fig. 1. Block diagram of a typical digital communication system.

5
IEEE COMMUNICATIONS MAGAZINE

." >

MODUU\TION
COHERENT FORMARING
COOING / SOURCE NONCOHERENT . ".

CHARACTER CODING
r PHASESHIFT
SAMPLING DELTA
(DM)MODULATION KEYING(PSK) SHIFT KEYING (DPSK)
QUANTIZATION
CONTINUOUS
VARIABLE SLOPE D M (CVSD) FREQUENCY SHIFT FREQUENCY SHIFT
KEYING(FSK) KEYING(FSK)
PARTIAL RESPONSE CODING
HUFFMAN
CODING AMPLITUDESHIFT AMPLITUDE S H I F I
x , . ,
KEYINGIASK) KEYING(ASK)
' ' . I )
HY BR I DS HYBRIDS
OFFSET QPSK
(OQPSKI
.. M I N I M U M SHIFT
. KEYING(MSK)
CHANNELCODING ' L
. .
SEaUEMCES .MULTIPLEXING/ MULTIPLE
ACCESS SPREAOING
M-ARYSIGNALING
ORTHOGONAL FREQUENCY DIVISION(FDMIFDMAI DIRECTSEQUENCING(DS)
BLOCK
BIORTHOGONAL TIMEDIVISION(TDMITDMA) FREQUENCY HOPPING (FHI
CONVOLUTIONAL
TRANSORTHOGONAL CODE DIVISION(CDMICDMA) TIMEHOPPING
SPACE D I V I S I O N (SDMs) HYBRIDS
POLARIZATIONDIVISION(PDMA)

. . , .
. ..i
. . 'ENCRYPTION
. .
CARRIERSYNCHRONIZATION
, . . SYMBOLSYNCHRONIZATION
FRAME SYNCHRONIZATION
NETWORK SYNCHRONIZATION
I I

- Fig. 2. Basic digital communication traneformationo.

Lindsey and Simon [3] is an excellent reference for the insures perfect reconstruction of the analog signal; under-
modulation, coding, and synchronization transformations sampling results in a phenomenon called aliasing, which
treated here. The comprehensive books by Spilker [4] and introduces errors. However, the minimum sampling rate can
Bhargava et a]. 151specifically address digital communica- be less than 21, if the lowest signal frequency contained in the
tions by satellite. The seven basic transformations will now be waveform is nonzero [6]. Quantization of the time samples
treated individually, in the general order of their importance allows each sample to be expressed .as a level from a finite
rather than in the order of the blocks shown in Fig. 1. number of predetermined levels; each such level can be
represented by a digital symbol. After quantization,the
Formatting and Source Coding analog waveform can still be recovered, but not precisely;
The first essential processing, step, formatting, renders the improved reconstruction fidelity of the analog waveform can
communicated data compatible for digital processing. For- be achieved by increasing the number of quantization levels
matting is definedas any operation that transforms data into (requiring increased transmission bandwidth).
digital symbols. Source coding means data compression in Pulse code modulation (PCM), the classical and most
addition to formatting. Some authorsconsider formatting to widely used digital format, converts the quantized samples
be a special case of sourcecoding (for which thedata into code groups of two-level pulses using fixed amplitudes.
compression amounts to zero), instead of making a distinction Each pulse group represents a quantized amplitude value
between the two. The source of most communicated data expressed in binary notation. Thereareseveral PCM
(except for computer-to-computer transmissions already in subformats(such as nonreturn to zero, Manchester, and
digital form) is either textual or analog in nature. If the data Miller), each providing some special feature, such as self-
consists of alphanumeric text, it is character-encoded with clocking or a compact spectral signature [3]. Duobinary, or
one of several standard formats, such as American Standard partial response coding (also called correlative coding), is a
Code for Information Interchange (ASCII), Extended Binary formatting technique that improves bandwidth efficiency by
Coded Decimal Interchange Code (EBCDIC), or Baudot, introducing controlled interference between symbols. The
and is thereby renderedinto digital form. If the data is analog, technique a1s.o provides error-detecting capabilities without
the (band-limited) waveform must first be sampledat a rate of introducing redundancy into the data stream[7-91.
a t least 21, Hz (the Nyquist frequency), where 1, is the Both source encoding and formatting mean.encoding the
highest frequency containedin the waveform. Such sampling source data with a digital format (A/D conversion); in this
6
L J
AUGUST 1983

sense alone,the two are identical. However, the term “source digital formatting of speech, see Crochiere and Flanagan
encoding” has taken on additional meaning in DCS usage. ~41.
Besides digital formatting, “source encoding” has also’come Some source coding techniques employ code sequencesof
to denote data compression (or data rate reduction). With unequal length so as to minimize the averagenumber of bits
standard A/D conversion using PCM, datacompression can required per data sample. A useful coding procedure, called
only be achieved by lowering the sampling rate or reducing Huffman coding [ 15,161, can be usedfor effecting data
the numberof quantization levels per sample, each of which compression upon any symbol set, provided the Q priori
increases the mean squarederror of the reconstructed signal. probability of symbol occurrence is known and not equally
Source encoding techniques accomplish rate reduction by likely. Huffman coding generates a binary sequence for each
removing the redundancythat is indigenous to most message symbol so as to achieve the smallest average number of bits
transmissions; without sacrificing reconstruction fidelity. A per sample, for thegiven Q priori probabilities. The technique
digital data source is said topossessredundancy if the involves assigning shorter code sequences to the symbols of
symbols are not equally likely or if. they are not statistically higher probability, and longer code sequences to those of
independent. Source encoding can reduce the data rate if lowerprobability. The pricepaidfor achieving data rate
either of these conditions exists. A few descriptions of reduction in this’wayis a commensurate increasein decoder
common source coding techniques follow. complexity. Inaddition, there is a tendency for symbol errors,
Differential,PCM (DPCM) utilizes the differences between once made, to propagate for several symbol periods.
samples ratherthan their actual amplitude. For most data,‘the
average amplitude variation from sample to sample is much
less than the total ‘amplitude variation; therefore, fewer bits Digital Modulation Formats
are needed to describe the difference. DPCM systems Modulation, in general, is the process bywhich some
actually encode the difference between a current amplitude characteristic of a waveform is varied in accordance with
sample and a predicted amplitude value estimated from past another waveform. A sinusoid has just three features which
samples. The decoder utilizes a similar algorithm for can be used to distinguish it from other sinusoids-phase,
decoding. Delta modulation (DM) is the name given to the frequency, and amplitude. For the purpose of radio trans-
special case of DPCM where the quantization level of the mission, modulation is defined as the process whereby the
output is taken to be one bit. Although DM can be easily phase, frequency, or amplitude of a radio frequency (RF)
implemented, it suffers from“slope overload,” a condition in carrier wave is varied in accordance with the information to
which the incoming signal slope exceedsthe system’s be transmitted. Figure 3 illustrates examples of digital
capability to follow the analog source closely at the given modulation formats: phase shiftkeying (PSK), frequency
sampling rate. To improve performance whenever slope shift keying (FSK), amplitude shiftkeying (ASK), and a
overload is detected, the gain of the system can be varied hybrid combination of ASK and PSK sometimes called
according to a predetermined algorithm known tothe quadrature amplitude modulation (QAM). The first column
receiver. If the systemis designed to adaptively.vary the gain lists the analytic expression, the secondis a pictorial of the ’
over a continuous range, the modulation is termed continuous waveform, and thethird is a vectorial picture. In the general
variable slope delta (CVSD) modulation, or adaptive delta M-ary signaling case, theprocessor accepts k source bits at a
modulation (ADM). Speech coding of good quality has been time, and instructs the modulator to produce one of an
demonstrated with CVSD at bit rates less than 25 kb/s, a
notable data ratereduction when compared with the 56-kb/s
PCM used with commercial telephone systems [lo].
ANALnlC WAVEFORM VECTOR
-
Anotherexample of source coding is linearpredictive
coding (LPC). This technique is useful where the waveform
results from a process thatcan bemodeled as a linear system.
Rather than encode samples of the waveform, significant
features of the process are encoded. For speech, these include
gain, pitch, and voiced or unvoiced information. Whereas in
PCM each sample is processed independently, a predictive
system such as DPCM uses a weighted sum of the n-past
samples topredict each present sample; it then transmits the
“error” signal. The weights are calculated to minimize the
average energy in the error signal that represents the
M-8 *2lII
difference between the predicted andactual amplitude.
For speech, the weights are calculated over short waveform
segments of 10 to 30 ms, and thus change as the speech
statistics vary. The LPC technique has been used to produce
acceptable speech quality at a data rateof 2.4 kb/s, andhigh Fig. 3. Digital modulation formats.
quality at 7.2 kb/s [ 1 1- 131. For \current perspectives in
7
IEEE COMMUNICATIONS MAGAZINE

available set of M = 2k waveform types. Binary modulation, trade-off. Figure 2 shows that the modulation types listed in
where k = 1, is just a special caseof M-ary modulation. For the noncoherent column almost identically replicate those in
the binary PSK (BPSK) example in Fig. 3 , M is equal totwo the coherent column. The only difference isthat there cannot
waveform types (2-ary).For the FSK example, M is equal’to be “noncoherent PSK” because noncoherentmeans without
three waveform types (3-ary);note thatthis M = 3 choice for using phase information. However, there is a “pseudo PSK’
FSK has been chosen toemphasize themutually perpendicu- technique termed differential PSK (DPSK) that utilizes RF
lar axes. In practice, M is usually a nonzero power of two phase information of the prior symbol as a phase reference for
(2,4,8,16, ...).For the ASK example, M equals two waveform detecting the current symbol (described in the section titled
types; for the ASK/PSK example, M equals eight waveform “Demodulation”).
types (8-ary). The vectorial picture for each modulation type Two digital modulation schemes of special interest for use
(except FSK) is characterizedon a plane whose polar on nonlinear bandlimited channels are called staggered (or
coordinates represent signal amplitude and phase. Signal sets offset)quadraphase PSK (SQPSKorOQPSK), and
that canbe depicted with opposing vectors(phase difference minimum shift keying (MSK). Both techniques retain low-
equals 180O) on sucha plane, for example BPSK, are called spectral sidelobe levelswhileallowing’efficient detection
antipodal signals. In thecase of FSK modulation,the performance. The generation of both can be represented as
vectorial picture is characterized by Cartesian coordinates, two orthogonal, antipodal binary systems with the symbol
such thateach of the mutually perpendicular axes represents timing in the two channels offset by one-half of a symbol
a different transmission frequency. Signal sets that can be duration. OQPSK uses rectangular pulse shapes, and MSK
characterized with such orthogonal axes arecalled orthogonal uses half-cycle sinusoid pulse shapes.Because of the
signals. sinusoidal pulse shaping in MSK, it can be viewed as
Modulation was defined as that process wherein a carrier continuous-phase FSK with a frequency deviation equal to
or subcarrier waveform is varied by a baseband signal; the one-half the bit rate [17,18].
hierarchy for digitalmodulation is shown in Fig. 2. When the
receiver exploits knowledge of thecarrier wave’s phase Demodulation
reference to detect the signals, the process is called coherent The analysis of all coherent demodulation or detection
detection; when it does not have phasereference information, schemes involves theconcept of distance between an
the processis called noncoherent. In ideal coherent detection, unknown received waveform and a set of known waveforms.
prototypes of the possible arriving signals are available at the Euclidean-like distance measurements are easily formulated
receiver. These prototype waveforms exactly replicate the in a signal spacedescribed by mutually perpendicular axes. It
signal set in every respect, even RF phase. The receiver is can beshown [ 191that any arbitraryfinite set of waveforms
then saidtobe phase-lockedtothe transmitter. During si(t), where si(t) is physically realizable and of duration T,
detection, the receiver multiplies and integrates (correlates) can be expressed as a linear combination of N orthonormal
the incoming signal with each of its prototype replicas. Under waveforms +l(t), +*(t), ... , +N(t), such that
the heading of coherent rnodulaton (see Fig. 2) PSK, FSK,
and ASK are listed, as well as hybrid combinations.
N
si(t) = aij +j(t) (1)
Noncoherent modulation refers to systems designed .to j=l
operate with no knowledge of phase;phase estimation
where
processing is not required. Reduced complexity is the
advantage over coherent systems, and increased PE is the
a II. .=J’si(t; +j(t) dt <
i = 1,2, . . . ,M 0.G t ~ ( 2 )
0 j = 1,2, . . . ,N
NGM

and

I T

0
c$i(t) +j(t) dt = 1
=0
(for i = j )
(otherwise) (3)

Additive white Gaussian noise (AWG,N) cansimilarly be


expressed as a linear combination of orthonormal waveforms
N
n(t) = nj+j(t) + ;(t)
j= 1
where

Fig. 4. Two-dimensional signa!space.


1 nj =JoTn(t)dt +j(t) (4)

8
or vector view of signals and noise facilitates the discussion of
digital signal detection. The vectors s I and 8 2 are fixed, since
the waveforms sl(t) and s2(t) are nonrandom. The vector or
point n is a random vector; hence, r is also a random vector.
The detector’s task after receiving r is to decide whether
signal s l or s2 wasactuallytransmitted. The method is
usually to decide upon the signal classification that yields the
minimum PE, although other strategies are possible [20].For
the case where M equals two signal classes, with S I and s2
being equally likely andthe noise being AWGN, the
minimum-error decision rule turns out to be: Whenever the
received signal r lands in region 1, choose signal s1 ; when it
lands in region2, choose signal s2 (see Fig. 4). An equivalent
statement is: Choose the signal class such that the distance
d(r,si)= I( r - s i 11 is minimal, where 11 x 11 is called the
For the signal detection problem, the noise can be partitioned ‘‘norm” of.vector x and generalizes the concept of length.
into two components
n(t) = ;I(t) + ii(t) Detection of Coherent PSK
The receiver structure implied by the above ruleis
where illustrated in Fig. 5. There is one product integrator
N (correlator) for each prototype waveform (M inall); the
Yt) =
nj 4i(t) (5) correlators are followed by a decision stage. The received
j=l signal is correlated with each prototype waveform known
is taken to be the noisewithin the signal space,orthe receiver. The decision stage chooses thesignal
a priori to the
projection of the noise components on thesignal axes 4 1(t), belonging to thecorrelator with the largest output
(largest z i ) .
For example, let:
42(t), . . . , @N(t), and
s I(t) = sin w t
ii(t) = n(t) - ii(t)
s p(t) = - sin w t
is defined as the noise outside the signal space. In other words, n(t)= a random processwith zero mean and
Gaussian
h(t) may be thought of a s the noise that is effectively tuned distribution
out by the detector.The symbol i(t) represents the noise that
will interfere withthe detection process, and it will henceforth Assume s l(t) was transmitted, so that:
be referred to simply as n(t). Once a convenient set of N
orthonormal functions has been adopted (note that @(t) is not
constrained to any specific form), each of the transmitted
signal waveforms si(t) is completely determined by the vector
r(t) = sl(t)
I’
+ n(t) and z i = r(t) si(t) i t i = 1,2

of its coefficients
s i = ( a i l , ai2,. . . , a i N ) i = I, 2, ...,M
Similarly, the noise n(t) can be expressed by the vector of its
coefficients
n = (nl, n2, . . . , nN)
where n is a random vector with zero mean and Gaussian
distribution.
Since any arbitrary waveform set, as well as noise, can be
represented as a linear combination of orthonormal wave-
forms (see(1)-(5)), we are justified in using (Euclidean-like)
distance in such an orthonormal space, as a decision
criterion for the detection of any signal set in the presenceof
AWGN.
Detection in the Presence of A WCN
Figure 4 illustrates a two-dimensional signal space, the
locus of two noise-perturbed prototype binary signals (sI n ) +
+
and ( s2 n ) , and a received signal r. The received signal in
vector notationis: r=si +n, where i= 1 or 2. This geometric
9
si(t) = ,/i?cos(2mi/M) +,(t) + fis i n ( 2 d M ) + d t ) (7)
The decision rule for the detector (see Fig. 6) is to decide
that s ,(t) was transmitted if the received signal point fallsin
region 1, that sp(t) was transmitted if the received signal point
fallsin region 2, and so forth. In other words, the decision rule
is to choose the ith waveform with the largest value of
correlator output z i (see Fig. 5).
Detection of Coherent FSK
FSK modulation is characterized by the information being
contained in the frequency of the carrier wave. A typical set of
signal waveforms is described by
si(t)=dmcoswit (forO<t<T) i=1,2, ..., M
=O (otherwise)
Fig. 7. Signal space and decision regions for 3-ary coherent where E is the energycontent of si(t), and ( w ~ +-~a i )is a n
FSK detection. integral multiple of Z.rr/T. The most useful form for the
orthonormal coordinates +l(t), &(t) , . . . , +N(t) is
The expectedvalues of theproductintegrators, as +j(t) = @cos wjt j = I , 2, . .’., N
illustrated in Fig. 5, are found as follows:
and, from (2)

,,
a , .= jI COS wit J2/Tcos wjt dt.

{
E zz(t = T ) = E} ut + n(t) sin wt dt Therefore
aij= fl (for.i = j )
where E is the statistical average. =O (otherwise)
The decision stage mustdecide which signal was
In other words, the ith signal point is located on the ith
transmitted by measuring its location within the signal space.
coordinate axis ata displacement *from the origin of the
The decision rule is to choose thesignal with the largest value
signal space. Figure 7 illustrates the signal vectors (points)
of zi. Unless the noise is large and of a nature liable to cause
and the decision regions for a 3-ary coherent FSK modulation
an error, the received signal is judged to be s ,(t). Note that in
the presence of noise this process is statistical; the optimal
( M =3). In this scheme, the distancebetween any two signal
points si and si is constant
detector is one that makes the fewest errors on the average.
The only strategy thatthe detectorcan employ is to “guess” d(s,sj) = 11 si - s j 11 = (for i # j )
using some;optimized decision rule.
As in the coherentPSK case, the signal space is partitioned
Figure 6 shows the detection process with the signal space
into M distinct regions, each containing one prototype signal
in mind. It represents a coherent four-level (4-ary) PSK or
point. The optimum decision rule is to decide that the
quadraphase shift keying (QPSK) system. In the terms we
transmitted signalbelongs to the classwhose index number is
used earlier for M-ary signaling; k = 2 and M = 22 = 4.
the same as the region where the received signal was found. In
Binary source digits are collected two at a time, and for each
Fig. 7, a received signal point r is shown in region 2. Using the
symbol interval the two sequential digits instruct the
decision rule, the detector classifies it as signal s2. Since the
modulator as to which of the four waveforms to produce. In
general, for coherent M-aryPSK (MPSK) systems, si(t) can
be expressed as
si(t)= d m c o s ( w o t - 27ri/M) <<
(for 0 t T )
‘I
i 1,2, ... , M

Here, E is the energy content of s,(t), and w o is an integral


multiple of Z.rr/T. We can choose a convenient set of
orthogonal axes scaled to fulfill (3) as follows
4,(t) = m c o s wot (6)
, . +’(t) = m s i n wot
Now si(t) canbe writ&..in, terms of theseorthogonal Fig. 8. Signal space for DPSK detection.
coordinates, giving: . .

10
noise is a random vector, there is a probability greater than
of r is due to some signalother than s2.
zero that the location
For example, if the transmitter sent82, then r.is the sum of
s2+ n,, and the decisionto choose s2 is correct; however,if
the transmitter actually sents3,then r must be the sum of s3i
nb (see Fig. 7),and the decision to select $2 is an error.

Detection of DPSK
With noncoherent systems, no provision is made to phase-
synchronize the receiver if the
with the transmitter. Therefore,
transmitted wavefohn is
Si(t) =Jrncos(w($ + +i) i=1,2, ...,M
the received signal can be characterized by
r(t) = J m c o s (wet + chi + a) + n(t) exploiting phasemeasurements. For
this reason, it is
implemented with twice as many channel branches as the
where CY is unknown and is assumed to be randomly
coherentdetector. Figure 9 illustrates the in-phase (1)
distributed between zero and 27~.
channels and quadrature ( Q ) channels used to detect the
For coherentdetection, product integrators(or their
signal set noncoherently. Another possible implementation
equivalents) are used; for noncoherent detection,this practice
uses filters followed by envelope detectors; the detectors are
is generally inadequatebecausetheoutput of aproduct
matchedtothesignalenvelopesand not to thesignals
integrator is a functionof the unknown angle CY.However, if
themselves. The phase of the carrier is of no importance in
we assume that CY varies slowly enough to be considered
defining +e envelope; hence,no phase information is used. In
constantover two,period times (ZT), therelativephase
the case of binary FSK, the decisionas to whether a “1” or a
difference between two successive waveforms is independent
of a,that is,
“0”was transmittedis made on the basisof which of the two
envelope detectors has the largest amplitudeat the moment of
measurement. Similarly, for a multifrequency shift keying
(M-ary FSK, or MFSK) system, the decision as to which of
This is the basisfor DPSK modulation. The carrier phaseof the M signals was transmitted is made on the basisof which of
the previous signaling interval is usedas a phase reference for the M envelope detectors hasmaximum output.
demodulation. Its use requires differential encoding of the
message sequenceat the transmitter sincethe informationis Probability of Error
carried by the difference in phase between two successive The calculations for probabilityof error (PE),which can be
waveforms. To send the ith message (i= 1 , 2 , .. . ,M), the viewed geometrically (see Fig. 4), involve finding the
current signal waveform must have its phase advanced by probability that given a particular signal, say s l , the noise
Zrri/M radians over the previous waveform. The detector vector n will give rise toa received signal fallingoutside region
can then calculate the coordinates of the incoming signal by 1; all PE calculations have this goal. For the general M-ary
product-integrating it with the locally generated waveforms signaling case, the probability of making an incorrect decision
m c o s wot and m s i n wgt. In this way it measures the is termed the probability of symbol error, or simply (PE). It is
angle between the current and the previously received signal oftenconvenient tospecify systemperformance by the
points (see Fig., 8)[ 191. probability of bit error (PB), even when decisions are made
One way of viewing the difference between coherent PSK on the basisof symbols for whichk> 1. PEand PB are related
and DPSK is that the former compares the received signal as follows: For orthogonal signals [21],
with a clean reference; in the latter however,two noisysignals
pB/pE = (2 k- ‘)/(2 - 1).
are compared with each other. Thus, we might say there is
twice as much noise in DPSK as in PSK. Consequently, For nonorthogonal schemes, such as MPSK signaling, one
DPSK manifests a degradationof approximately 3 dB when often uses a binary-to-M-ary code such that binary sequences
compared with PSK; this number decreases rapidlywith corresponding to adjacent symbols (phase shifts) differin only
increasing signal-to-noise ratio. In general, the errors tend to one bit position; one such codeis the Gray code. Whenan
propagate (to adjacent period times) due to the correlation M-ary symbol error occurs,it is more likely that only one of
between signalingwaveforms. The trade-offforthis per- the k input bits will be in error. For such signals [3],
formance loss is reduced system complexity.
Ps P,/log,M = PE/k (for PE<< I)
Detection of Noncoherent FSK For convenience, this discussion is restricted toBPSK (k=
A noncoherent FSK detector can be implemented with 1, M = 2) modulation. For the binarycase, the symbol error
correlators such as those shown inFig. 5 However,the probability equalsthe bit error probability. Assume that
hardware must be configured as anenergy detector,without signal s I(t) has been transmitted and that +
r(t) = s 1 ( t ) n(t).
11
IEEE COMMUNICATIONS MAGAZINE.

Assumingequally likely signals, and recalling that the TABLE 1


decision of region 1 versus region 2 depends on the product PROBABILITY OF BITERROR BINARY
FOR SELECTED MODULATION
SCHEMES

1
integrators and the decision stage (seeFig. 5 ) , we can write
.Modulation

E J binary
= PB = Pr
0
r(t)sz(t) dt > Coherent PSK

for 0
to be
< t<
lo7(t)s I(*) dt I r(t) = s I(t)

T. The solution forthe PBexpression canbe shown


1
+ n(t)

where -=
Coherent FSK

Eb Lergy/Bit
~

PB = I/Jz;;j 00

exp(-u2/2) du
No Noise

'S
Density

Signal Power
Eb/No(l -cos 6 ) -
_-=
NOR NoiseDensity X Bit Rate
where Eb is the signal energyper bit injoules, N o is thenoise
density at the receiver in watts per Hz, and 0 is the angle
and Q(x) = -
&J-x:xp(."2/2)d"
between s I and sz (see Fig. 4). When 8 = T,the signals are
termed antipodal, and thePBbecomes
t
/-w where S = averagemodulating
signal power
T = bit time duration
R = 1/T= bit rate
The same kind of analysis is pursued in finding the PB N =NOW
expressions for the other types
of modulation. The parameter The dimensionless ratio Eb/No (requiredtoachievea
Eb/No in ( 8 )can be expressedas the ratioof average signal specified P a , isuniformly used for characterizing digital
power to average noise power, S / N (or SNR). By arbitrarily communications system performance. Note that optimum
'introducing the baseband signal bandwidth W, we can write digital signal detectionimplies a correlator (or matched filter)
the following identities, showing therelationship between implementation, in which case the signalbandwidth is equal
& / N o and SNR to the noise bandwidth. Often we are faced with a system
model for which this is not the case (less than optimum);in
practice, wejustreflect a factor into the required Eb/No
parameterthat'accounts for thesuboptimaldetection
performance. Therefore, required Eb/No can be considered a
metric that characterizes the performance of onesystem
versus another; the smaller the required &/NO, the more
efficient the system modulation and detection process.
The PB expressions for the binary modulation schemes
discussed above are listedin Table I and are graphically
compared in Fig. 10. At largeSNRs, it can be seen that there
is approximately a 4-dB difference between the best (coherent
PSK) and the worst (noncoherent FSK).In some cases,4 dB
is a small price to pay for the implementation simplicity
gained in going from a coherent PSK to a noncoherent FSK;
however, for some applications,even a 1-dB saving is
worthwhile. There are other considerations besides PB and
systemcomplexity; for example, in some cases (such as
randomlyfadingpropagationconditions), a noncoherent
system is more robust and desirable because there may be
difficulty in establishing a coherent reference.
An exceptionto Table I and Fig. 10 is worth mentioning, in
light of today'sbandwidth efficient modulationschemes.
MSK modulation, which can be regarded as coherent FSK,
manifestserror-rateperformanceequalto BPSK when
detected with the appropriate receiver[ 181.
Digital TransmissionTrade-offs
System trade-offs are fundamental all
to digital communi-
cationsdesigns.Thegoals of thedesignerare: (1) to
12
AUGUST 1983

maximize transmission bit rate R, (2) to minimize probability error-rate plane. Possible trade-offs can beviewed as changes
of bit error PB, (3)to minimize requiredpower, or relatedly,to in the operating point on oneof the curves, oras changes in
minimize required bit energy per noise density Eb/No, (4) to the operating point from one curve to another curve of the
minimize required system bandwidth W, ( 5 ) to maximize family. Such potential trade-offs areseen in Figs. 1l(a) and
system utilization, that is, to provide reliable service for a 1 1(b) as changes in operating point in the direction shown by
maximumnumber of users, withminimum delay and the arrows. Movement of the operating point along line 1,
maximum resistance to interference, and (6) tominimize between points a and b, can be viewed as trading PB versus
system complexity, computational load, and system cost. &/No performance (with w
fixed).Similarly, movement
The designer usually seekstoachieve all these goals. along line 2, between points c and d, is seen as trading PB
However, goals(1) and(2) are clearly in conflict withgoals versus Wperformance(with Eb/No fixed). Finally,movement
(3) and (4); they call for simultaneously maximizing R, while along line 3, between points e and f, illustrates trading W
minimizing f B , Eb/No, and w. There areseveral constraints versus E b / N o performance (with PB fixed). Movement along
and theoretical limitations that necessitate the trading-off of line 1 is effectedsimplyby increasing ordecreasing the
any one requirement with each of the others. Some of the available Eb/No. Movement alongline 2 or line 3 is effected
constraints are: the Nyquist theoretical minimum bandwidth through an appropriate change to thesystem modulation or
requirement, theShannon-Hartleycapacity theorem, the , coding scheme.
Shannon limit, government regulations (for example, fre-
quency allocations), technological limitations (for example,
state-of-the-artcomponents), and othersystem requirements The Nyquist and Shannon Constraints
(for example, satellite orbits). Symbol detection in a realizable system, even in the
absence of noise, suffers from intersymbol interference, ISI;
M-ary Signaling and the Error-Rate Plane the tail of one pulse spillsover into adjacent symbol intervals
so as to interferewith correct detection:Nyquist [22,23]
Figure 11(a) illustrates the family of waterfall-like curves
showed that the theoretical minimum bandwidth needed to
characterizing f~ versus & , / N o for orthogonal signaling.
transmit x symbols per second (Symbols/s) without IS1 is
Figure 11(b) illustrates similarcurves for multiphase signaling
x / 2 Hz; thisis a basic theoretical constraint, limiting the
[3]. ASdescribed in the earlier section on “Digital Modulation
designer’s goal to expendas little bandwidth as possible. In
Formats”, the signaling is called M a r y for modulation or
practice, ittypicallyrequires x Hz bandwidth for the
coding schemes that process k bits at a time. The system
transmission of x symbols/s. In other words, typical digital
directs the modulator to chooseone of its M = zkwaveforms
communication throughput without IS1 is limited to 1
for each k bit sequence, where Mis the symbol-set size, and k
symbol/s/Hz. For a fixed bandwidth, as k (and M) Increases,

is the number of binary digits that each symbol represents.
the bandwidth efficiency R/W, measured in b/s/Hz, in-
Figure 1l(a) illustrates potential PB improvement as k (or
creases. For example, movement along line 3, from point toe
M) increases. For orthogonal signal sets,such as FSK
point f, in Fig. 11(b) representstrading & , / N o for a reduced
modulation, M-ary signaling, comparedto binary, can
bandwidth requirement; in other words, with the same system
provide an improved Ps performance or a reduced Eb/No
bandwidth one cantransmit at anincreased data rate,hence
requirement, at the cost of an increased bandwidth require-
at anincreased R/W.
ment. Figure 1l(b) illustrates potential PB degradation as k
(or M) increases. For nonorthogonal signal sets, such as
multiphase shift keying (MPSK) modulation, M-ary signaling,
comparedtobinary, can provide a reduced bandwidth
requirement, a t the cost of a degraded-PB performance or an HOGONAL SIGNALING
increased &,/No requirement. The appropriate Fig. 11 curve,
from thefamily of curves depicting system performance, is a
function of the system designer’s choice of the parameter k =
log2M. We shall refer to either of these curve families (Fig.
11(a) or Fig. 11(b)) as error-rate performance curves, and to
the plane upon which they are plotted as an error-rate plane.
Such a plane describes the locus of operating points available
for a particular type of modulation and coding. For a given
system, each curve in the plane can be associated with a
different fixed bandwidth; therefore, the set,of curves can be
termed equi-bandwidth curves. As the curves move in the
direction of the ordinate,the required bandwidth grows, until NORMALIZED ENERGY PER INFORMATION BIT $ I N ~ I ~ B I
it goes to infinity in the limit. As the curves move in the
obposite direction, the required bandwidth decreases. Oncea (a) (b)
modulation, coding scheme,and available Eb/No are chosen, Fig. 11. The error-rateplane.
system operation is characterized by a particular point inthe
13
IEEE COMMUNICATIONS MAGAZlNE

band-limited channels, which means that no signal power


whatever is allowed outside the defined band. We are faced
with the dilemma that strictly band-limited signals are not
realizable since they. imply infinite transmission-time delay;

I
~~

non-band-limited signals, having energy at arbitrarily high


frequencies,appear just as unreasonable [26].It is no wonder
that there is no single universal, definitionof bandwidth.
All criteria of bandwidth have in common the attempt to
specify a measure of the width W of a non-negative real-
valued spectral densitydefined for all frequencies I f 1 < m.
Figure 12 illustrates some of the most commondefinitions of
bandwidth; in general, the various criteria are not inter-
changable [27]. The power spectral densityS(f) for a single
pulse takes the analytical form

I Fig. 12. Various bandwidth crfterfa.


I
Shannon [24] showed that the system capacity C , for where f, is the carrier frequency and Tis the symbol duration.
channels perturbed by AWCN, is a function of the average This same spectral density, whose general appearance is
received signalpower S ; the average noise power N ; and the sketched inFig. 12, characterizes a sequence of random
bandwidth W. The capacity relationship (Shannon-Hartley digital data, assuming the averaging time is long, relative to
theorem) can be stated as: the symbol duration [28]. The spectraldensity plot consists of
a main lobe and smaller symmetricalside lobes. The general
shape of the plot is valid formost digital modulation formats;
some formats, however, do not have well defined lobes [28].
The bandwidth criteria depicted in Fig. 1 2 are:
It is possible to transmit information over sucha channel at a
<
rate R, where R C, with an arbitrarily small error rateby 1) Half-Power Bandwidth: This is the interval between
using a sufficiently complicated coding scheme. For a rate frequenciesat which S(f) has dropped to half
power, or
R > C , it is not possibleto find a codewhich can achieve an 3 dB below the peak value.
arbitrarily small error rate. Shannon'swork showed that the
2) EquivalentRectangular or Noise EquivalentBand-
values of S, N,and W set a limit on transmission rate,not on
width: The noise equivalent bandwidth was originally
accuracy. It can also be shown,from (lo), that the required
conceived to permit rapid computation of output noise-
Eb/No approaches the Shannon limit of -1.6 dB as W
power from an amplifier with a wide-band noise input;
increases without bound. At the Shannon limit, shown in Fig.
theconceptcan similarlybe applied to a signal
1 1(a), andPB curve is discontinuous, goingfrom a value of
bandwidth. The noise equivalent bandwidthof a signal
PB = 1/2 to P B = 0. It is not possible to reach the Shannon
is defined as the value of bandwidth which satisfies the
limit, because, as k increases without bound, the bandwidth\
relationship P = WN S(f,), where P is the total signal
requirement and delay become infinite and the implementa-
power over all frequencies, WN is the noise equivalent
tion complexity increases without bound. Shannon's work
bandwidth, and S(fJ is the value of S(f) at the band
predicted the existence of codes that could improve the PB
center (assumed to be the maximum value over all
performance or reduce the Eb/No required from the levels of
frequencies).
the uncoded binary modulation schemes up to the limiting
curve. For P B = BPSK modulation requires an 3) Null-to-Null Bandwidth: The most popular measureof
&/No of 9.6 dB(the optimum uncodedbinarycase). bandwidth is the width of the main spectral lobe,where
Shannon's work therefore promised a theoretical performance most of the signal power is contained. This criterion
improvement of 11.2 dB over the performanceof optimum lackscompletegeneralitysince some modulation
uncodedbinarymodulation,throughtheuse of coding formats lack well-defined lobes.
techniques. Today, most of that promised improvement 4) Fractional Power ContainmentBandwidth: This band-
(approximately 7 dB) is realizable [25]. Optimum system width criterion has beenadopted by theFederal
design canbest bedescribed as a search for rational Communications Commission (FCC Rules and Regula-
compromises or trade-offs amongst the various constraints tionsSection2.202)andstates that theoccupied
and conflicting goals. bandwidth is theband which leavesexactly 0.5%
of the signal power above the upper band limit and
Bandwidth of Digital Data exactly 0.5%of the signalpower below the lower band
The theorems of Nyquist and Shannon, though concise limit. Thus, 99% of the signal power isinside the
and fundamental, are based on the assumption of strictly occupied band.
14
5) Bounded Power Spectral Density: A popular method signals, transmitted onwaveforms orthogonal to one another
of specifying bandwidth is to state that everywhere and having the same spectral occupancy. This same feature
outside the specified band S(f) must have fallen at is illustrated in Fig. 1 I(b), where it can be seen that QPSK
leastto a certain stated levelbelowthatfound at (k = 2) signaling has the same PB (not the same symbol
the band center. Typical attenuation levels might be error rate) as does BPSK ( k = 1) signaling. Each of the
35 or 50 dB. two orthogonal BPSK signals comprising QPSK yields
half the bit rate andhalf the signal power of the QPsK signal;
The Bandwidth-Efficiency Plane hence the required &/No for a given PB is identicalfor BPSK
Equation (1 0)can bewritten as and QPSK. Also plotted on thebandwidth-efficiency plane of
Fig. 13 are theoperating points for noncoherent MFSK
Eb/No = w/c (2'Iw - I). (1 1) modulation at a BER of Notice that the position of the
Equation (1 1)has been plotted on the R/W versus Eb/No MFSK points indicates that binary FSK, BFSK ( M =2) and
plane in Fig. 13. W e shall term this plane the bandwidth- quarternary FSK (QFSK (M = 4)) have the same band-
efficiency plane. The ordinate R/W is a measure of how widthefficiency, even though the formerrequires greater
much data can'betransmitted in a specified bandwidth within E b / N o for the same error rate. The bandwidthefficiency
a given time;it therefore reflects how efficiently
the bandwidth varies with the modulation index; if we assume that an equal
resource is utilized. The abscissa is &/No in decibels. For increment of bandwidth is required for each MFSK tone the
C = R in (1 l ) , the plotted curve in the plane represents a system must support,it can beseen that for M = 2, R/W
boundary that separatesparameter combinations supporting 1 b/s/2 Hz = 1/2; andfor M = 4, similarly, R/ W = 2 b/s/4
potential error-free communication from regions where such Hz = 1/2.
communication is not possible. Upon the bandwidth-efficiency The bandwidth-efficiency plane in Fig. 13 is analogous to
plane of Fig. 13 are plotted the operating points for MPSK the error-rate plane shown in Fig. 1 1. The Shannon limit of
and MFSK modulation, eachat PB = Notice that for the Fig. 1 1 plane is.analogous to the capacity boundary of the
MPSK modulation, R/W increases with increasing M ; Fig. 13 plane. The curves in Fig. 1 1 were referred to as
however, for MFSK modulation, R / W . decreases with equi-bandwidth curves. InFig. 13, we can analogously
increasing M. Notice also that the location of the MPSK describe equi-error-probability curves for various modulation
points indicate that BPSK ( M = 2) and QPSK (M = 4) and coding schemes. The curves labeled F B I , PBn, and P B ~
require the sameEb/No. That is, forthe samevalue of &,/NO, are hypothetical constructions for some arbitrarymodulation
QPSK has a bandwidth efficiency of 2 b/s/Hz, compared to and coding scheme; the PSI curve representsthe largest error
1 b/s/Hz for BPSK. This unique feature stems from the probability of the three curves, and the PB3 curve represents
fact that QPSK is effectively a composite of two BPSK the smallest. The general direction in which the curves move
for improved P B is indicated on the figure.
Just as potential trade-offs amongst PB,& , / N o , and w
REGION FOR were considered for the error-rate plane,so too we can view
the same trade-offs on the bandwidth-efficiency plane. Such
16 -CAPACITY. BOUNDARY
potential trade-offs are seen in Fig.13 as changes in operating
point in the direction shown by the arrows. Movement of the
operating point along line 1 can be viewed as trading Ps
versus & , / N o performance, with R/W fixed.Similarly,
' movement along line 2 is seen as trading P B versus W (or

R / W ) performance, with & , / N o fixed. Finally, movement


along line 3 illustrates trading w (or R / W ) versus E b / N o
performance, with PB fixed.In Fig. 13, as 'inFig. 11,
movement along line 1 is effected simply by increasing or
decreasing the available Eb/No. Movement along line 2 or
line 3 is effected through appropriate changes to the system
modulation or coding scheme.

1,pi; ~6 0 MPSK pB =
m MFSK (noncoherent) pB= lo->
Power-Limited Systems and Bandwidth-Limited Systems
For the case of power-limited systems, in which power is
scarce but system bandwidth is available (for example, a
space communication link), the following tradeoffsmight be
LIMITED
t REGION I made:

Fig. 13. The bandwidth-ettlciency plane. Improved P B performance can.. be achieved by ex-
pending bandwidth (for a given Eb/No).

15
Required Eb/No can be reduced by expending band- increased, the capacity boundary curve flattens out, and
width (for a given PB). ever-increasing amounts of & , / N o are required to achieve
The error-rateplane of Fig. 1 (a)1 is most useful for examining improvement in R/W. A similar law of nature seemsto be at
such potential trade-offs.It is on this plane that we can verify work in the power-limitedregion. Here,a savings in &/No is
whether or not a candidatecode offers improvement in desired, but thecapacity boundary curve is steep; to achieve a
required Eb/No (coding gain) for a specified PB (or whether small relief in required Eb/No requires a large reduction in
the code offers improvement in PB for a given E i / N o ) . R/W (increase in bandwidth for a given data rate).
Any digital scheme that transmits R = logzM bits in T
seconds, using a bandwidth of W Hz, always operatesat a Digital Communication Tradeoffs
bandwidth efficiency of R/W = (logZM)/ WT b/s/Hz. From Figure 14 hasbeen configured for pointing out analogies
this expression, it can be seen that signals with small WT between the two performance planes, the error-rate planeof
products are mostbandwidth-efficient.Suchsignals are Fig. 11, andthebandwidth-efficiencyplane of Fig. 13.
generally associatedwith bandwidth-limited systems in which Figures 14(a) and 14(b) represent ‘the same planes as Figs.
channel bandwidthis constrained butpower is abundant. For 1 and
1 13,respectively. They havebeen redrawn, purposely
this case, the usual objective’ is to design the link SO as to symmetrical, by choosing appropriate scales. The arrows and
maximize the transmitted data rate over the band-limited their labels, in eachcase, describethegeneral effect of
channel, at theexpense of E b / N o (while maintaining a moving an operating point in the direction of the arrow by
specified Ps performance level). For band-limited operation, means of appropriate modulation and coding techniques. The
bandwidth efficiencyis a useful criterion of systemper- notations C, C, and F stand for the trade-off considerations
formance, and the bandwidth-efficiency plane of Fig. ‘13is “Gained or achieved,” “Cost or expended,” and “Fixed or
useful for examining potential trade-offs, suchas Eb/No for unchanged,’’ respectively.The parameters being traded are
improved R/W, or degraded PB for improved R/W. PB, W, R/W, and P(power or S/N). Just as the movement of
The bandwidth-limited and power-limited regions are an operating point toward the Shannon limit in Fig. 14(a)
shown on the bandwidth-efficiency planeof Fig. 13. Notice gains improved P B or lower transmitter power at the cost of
that the desirable trade-offs associated with each of these bandwidth, so toodoesmovementtowardthecapacity
regions are not equitable. For the bandwidth-limited region, boundary in Fig.14(b) gain improved bandwidth efficiency at
large R/W is desired;however as Eb/No is continually the cost of increased power or degraded P B .

16
~ ~ ~~

AUGUST 1983

Most often, such trade-offs are examined with a fixed P B [7] A. Lender, “The duobinary technique for high speed data transmis-
sion,” IEEE Trans. Commun. Electron., vol. 82, pp. 214-218, May
(constrained by the system requirement) in mind. Therefore, 1963.
the most interesting arrows are those having fixed bit-error [8] E.R. Kretzmer, “Generalization of a technique for binary data
probability (marked F: PB).There are four such arrowsin Fig. communication,” IEEE Trans. Commun. Tech., pp. 67, 68, Feb.
1966.
,l4, two on the error-rate plane and two on the bandwidth- [9] S. Pasupathy, “Correlative coding: a bandwidth-efficient signaling
efficiency plane. System operation can be characterized by scheme,” IEEE Communications Magazine, pp. 4-1 1, July 1977.
either of these two planes. The planes represent two ways of [ 101 N.S. Jayant, “Digital coding of speech waveforms: PCM, DPCM, and
DM quantizers,” Proc. IEEE, vol. 62, no. 5, pp. 611-632, May 1974.
looking at some of the key system parameters; each plane [ 111 B.S. Atal and S.L. Hanover, “Speech analysis and synthesis by linear
highlightsslightlydifferent aspects of the overall design prediction of the speech wave,” J. Acoust. SOC.Am.,vol. 50, pp.
problem. The error-rate plane tends to find most use with 637-655, 1971.
[ 121 J.W. Bayless, S.J. Campanella, andA.J. Coldberg, “Voice signals: bit
power-limited systems; here, as we move from curve to curve,
by bit,” IEEE Spectrum, vol. 10, pp. 28-39, October 1973.
the bandwidth requirements are only inferred, but the PB is [13] J.L. Flanagan, Speech Analysis, Synthesis, and Perception, 2nd ed.,
clearly displayed. The bandwidth-efficiency plane is generally New York, NY: Springer-Verlag, 1972.
[14] R.E. Crochiere and J.L. Flanagan, “Current perspectives in digital
more useful for examining bandwidth-limited systems; here, speech,” IEEE Communications Magazine, vol. 21, no. 1, pp. 32-40,
as we move from curve to curve, P B is only inferred, but January 1983.
the bandwidth requirements are explicit, since the ordinate [15] D. Huffman,“A method for constructing minimum redundancy
codes,” Proc. IRE, vol. 40, pp. 1098-1101, May 1952.
is RIW. [IS] R.C. Callager, Information Theory and Reliable Communication,
New York, NY: John Wiley and Sons Inc., 1968.
Additional Constraints [17] S.A. Groaemeyerand A.L. McBride, “MSK and offset QPSK
modulation,” IEEE Trans. Commun., August 1976.
We are not as free to make trade-offs as we might like; [18] S. Pasupathy, “Minimum Shift Keying: a spectrally efficient modula-
Government regulations dictate choice of frequencies, tion,” IEEE Communications Magazine, pp. 14-22, July 1979.
bandwidths, transmission power levels, and-in the case o f [ 191 E. Arthurs and H. Dym, “On the optimum detection of digital signals in
satellites, orbit selection. The satellite orbit and geometry of the presence of white gaussian noise-a geometric interpretation of
three basic data transmission systems,” IRE Trans. Commun. Syst.,
coverage fixes the satellite antenna gain. Technological December 1962.
state-of-the-artconstrains such items as satellite powertrans- .---
1201 H.L. Van Trees. Detection. Estimation, and Modulation Theory-
Part I, New York, NY: John Wiley and Sons, 1968.
mission and earth station antenna gain. There may be other 1211 A.J. Viterbi, Principlesof Coherent Communications, New York, NY:
system requirements (for example, the need to operateunder McCraw-Hill Book Co., 1966.
scintillation or interference conditions) that caninfluence the [22] H.Nyquist, “Certain factors affecting telegraph speed,” Bell Syst.
Tech. J., vol. 3, pp. 324-326, April 1924.
choice of modulation and coding. The effect of these [23]H. Nyquist, “Certain topics on telegraph transmission theory,”
additional constraints3 to limit the regions of realizable Trans. AIEE, vol. 47, pp. 617-644, April i928.
.operation within the error-rate plane and the bandwidth- [24] C.E. Shannon, “Amathematical theory of communication,” Bell Syst.
Tech. J., vol. 27, pp. 379-423 and 623-656, 1948. ’
efficiency plane. 1251 J.P. Odenwalder, Error Control Coding Handbook, San Diego, CA:
Linkabit Corporation, July 15, 1976.
Conclusion [26] D. Slepian, “On bandwidth,”Proc.IEEE, vol. 64, no. 3, pp. 292-300,
In the first part of this paper, we have generated a structure March 1976.
[27] R.A. Scholtz, “How do you define bandwidth,” Proc. Int. Telemetering
and hierarchy of key signal processing transformations. We Conf., Los Angeles, CA, vol. 8, pp. 281-288, October 1972.
have used this structure as a guide foroverviewing the [28] F. Amoroso,“The bandwidth of digital data signals,” IEEE
formatting, source coding, and modulation steps. We have Communications Magazine, vol. 18, no. 6, pp. 13-24,November
1980.
also examinedpotential trade-offs for power-limitedsystems
and bandwidth-limited systems. In Part I1 we will continue to
examine the remainder of the signal processing steps outlined
in Figs. 1 and 2. Also in Part 11, we will review fundamental Bernard Sklar was born in’New York, NY on September 11, 1927. He
link analysis relationships in the contextof a satellite repeater received the B.S. degree in mathematics and.sciencefrom the University of
Michigan, AnnArbor, MI, in 1949; the M.S.E.E. degree from the
channel. Polytechnic Institute of New York, Brooklyn, NY, in 1958; and the Ph.D.
degree in engineering from the University of California, Los Apgeles, CA, in
References 1971.
Dr. Sklar has30 years of experience with the aerospace/defense industry
[l] W.L. Pritchard, “Satellite communication-an overview of the
problems and programs,” Proc. IEEE, vol. 65, pp. 294-307, March in a variety of technical design and management positions: from 1953 to
1977. 1958 he was a research engineer with RepublicAviation Corp., Farmingdale,
[2] M.P. Ristenbatt, “Alternatives in digital communications,” Proc. NY; from 1958 to 1959 he was a member of the technical staff at Hughes
IEEE, June 1973. Aircraft Co., Culver City, CA; andfrom 1959 to 1968 he was a senior staff
[3] W.C. Lindsey, and M.K. Simon, Telecommunication Systems engineer at Litton Systems, Inc., Canoga Park, CA.In 1968 he joined The
Engineering, Englewood Cliffs, NJ: Prentice-Hall, 1973. Aerospace Corp., El Segundo, CA, where he is currently employed. As
[4] J.J. Spilker, Jr., Digital Communications by Satellite, Englewood Manager of System Analysis, he is involved in the development of satellite
Cliffs, NJ: Prentice-Hall, 1977. communication systems.
[5] V.K. Bhargava, D. Haccoun, R. Matyas, and P.P. Nuspl, Digital
Hehastaught engineering courses during the past 2 5 yyars at the
Communications bg Satellite, New York, NY: John Wiley and Sons,
1981. University of California, Los Angeles and lrvine: the University of Southern
[6] C.B. Feldman’and W.R. Bennett, “Band width and transmission California, Los Angeles; and WestCoast University, Los Angeles. Dr. Sklar
performance,”Bell Syst. Tech. J., vol. 28, appendix V, pp. 594-595, is a past chairmanof the Los Angeles Council IEEE Education Committee,
1949. and
has been a Senior Member of the IEEE since 1958. rn

17.

You might also like