Professional Documents
Culture Documents
ECE4601
Communication Systems
Week 15
& %
0
c
2011, Georgia Institute of Technology (lect15 1)
' $
Error Detection
• A linear block code can detect all error patterns of dmin − 1 or fewer errors.
• If e 6= 0 is a codeword, then no errors are detected
• There are 2k−1 undetectable error patterns, but there are 2n − 1 possible
nonzero error patterns.
• The number of detectable error patterns is
2n − 1 − (2k − 1) = 2n − 2k
& %
0
c
2010, Georgia Institute of Technology (lect15 3)
' $
Weight Distribution
A0 = 1, A3 = 7, A4 = 7, A7 = 1
A(z) = 1 + 7z 3 + 7z 4 + z 7
& %
0
c
2010, Georgia Institute of Technology (lect15 4)
' $
Pe (U ) = P ( e is a nonzero codeword)
n
X
= Ai P (w(e) = i)
i=1
& %
0
c
2010, Georgia Institute of Technology (lect15 5)
' $
Error Correction
• A linear block code can correct all error patterns of t or fewer errors, where
dmin − 1
t=⌊ ⌋
2
and ⌊x⌋ is the largest integer ≤ x.
• A code is usually capable of correcting many error patterns of t + 1 or more
errors, but not all of them. In fact, up to 2n−k error patters may be corrected,
equal to the number of syndromes.
• The probability of error for a binary symmetric channel is
& %
0
c
2010, Georgia Institute of Technology (lect15 6)
' $
& %
0
c
2010, Georgia Institute of Technology (lect15 7)
' $
Example
1 1 0 0
G=
0 1 0 1
0000 1100 0101 1001
e2 0001 1101 0100 1000
e3 0010 1110 0111 1011
e4 0011 1111 0110 1010
Property: every n-tuple appears once and only once in the array.
& %
0
c
2010, Georgia Institute of Technology (lect15 8)
' $
Error Correction
& %
0
c
2010, Georgia Institute of Technology (lect15 9)
' $
Syndrome Decoding
• Fact: all 2k n-tuples in the same row have the same syndrome.
& %
0
c
2010, Georgia Institute of Technology (lect15 10)
' $
e s
0000000 000
0000001 101
0000010 111
0000100 011
0001000 110
0010000 001
0100000 010
1000000 100
Example: Receive y = (1110000). Compute s = yHT = (111). Decode y into
c = (1110000) + (0000010) = (1110010).
& %
0
c
2010, Georgia Institute of Technology (lect15 11)
' $
Rate-1/2 Encoder
(1)
b
+
input output
a b
+
(2)
b
& %
0
c
2010, Georgia Institute of Technology (lect15 12)
' $
Rate-2/3 Encoder
(1)
b
+
a(1)
(2) output
input b b
a +
a(2) b
(3)
& %
0
c
2010, Georgia Institute of Technology (lect15 13)
' $
Generator Sequences
g(1) = (1, 1, 1)
g(2) = (1, 0, 1)
& %
0
c
2010, Georgia Institute of Technology (lect15 14)
' $
State Description
̺ℓ = (aℓ−1, · · · , aℓ−ν )
& %
0
c
2010, Georgia Institute of Technology (lect15 15)
' $
Rate-1/2 code
1/10
(3)
σ
1/01 0/01
1/00
(1) (2)
σ σ
0/10
1/11 0/11
(0)
σ
0/00
& %
0
c
2010, Georgia Institute of Technology (lect15 16)
' $
DNL
(3)
σ
DNL DL
2
NL 2
(0)
D NL (1) (2)
DL (0)
σ σ σ σ
DL
& %
0
c
2010, Georgia Institute of Technology (lect15 7)
' $
Transfer Function
• Any appropriate technique can be used to obtain the transfer function, such
as Mason’s formula
• For the rate-1/2 code example
D 5 N L3
T (D, N, L) =
1 − DN L(L + 1)
= D5 L3N + D6 N 2 L4(L + 1) + D7 N 3 L5(L + 1)2
+ · · · + Dk+5N k+1Lk+3(L + 1)k + · · ·
• The term Dk+5N k+1Lk+3(L + 1)k means there are 2k paths at Hamming
distance k+5 from the all-zeroes path, caused by k + 1 input ones. Of these
2k paths, nk have length k + n + 3.
• Free Hamming distance dfree = 5. This the smallest weight non-zero weight
codeword.
& %
0
c
2010, Georgia Institute of Technology (lect15 18)
' $
Trellis Diagram
epoch
0 1 2 3 4 5 6 7 8
state
(0) 00 00 00 00 00 00 00 00
σ
11 11 11 11 11 11 11 11
11 11 11 11 11 11
(1)
σ
00 00 00 00 00 00
10 10 10 10 10 10 10
σ
(2) 01 01 01 01 01 01 01
(3)
01 01 01 01 01 01
σ 10 10 10 10 10 10
input 1 input 0
& %
0
c
2010, Georgia Institute of Technology (lect15 19)