Professional Documents
Culture Documents
Telemetry
L1: Introduction
12
Transmitter
• For example, in AM radio broadcast, the information signal
that is transmitted is contained in the amplitude variations of
the sinusoidal carrier, which is the center frequency in the
frequency band allocated to the radio transmitting station.
13
AM Transmission
14
Transmitter
• In FM radio broadcast, the information signal that is
transmitted is contained in the frequency variations of
the sinusoidal carrier.
15
Transmitter
• Thus, through the process of modulation, the
information signal is translated in frequency to match
the allocation of the channel.
16
Channel
• The communications channel is the physical
medium that is used to send the signal from the
transmitter to the receiver.
17
Channel
• Whatever the physical medium for signal transmission,
the essential feature is that the transmitted signal is
corrupted in a random manner by a variety of possible
mechanisms.
18
Channel
• In wireless transmission, additional additive
disturbances are man-made noise, and atmospheric
noise picked up by a receiving antenna.
19
Channel
• In the design of a communication system, the system
designer works with mathematical models that
statistically characterize the signal distortion
encountered on physical channels.
20
Receiver
• The function of the receiver is to recover the message
signal contained in the received signal.
21
Receiver
• Besides performing the primary function of signal
demodulation, the receiver also performs a number of
peripheral functions, including signal filtering and
noise suppression.
22
Receiver
• Since the signal demodulation is performed in the
presence of additive noise and possibly other signal
distortion, the demodulated message signal is
generally degraded to some extent by the presence of
these distortions in the received signal.
23
THE END
Thank you
L2# Modulation
By substitution
Therefore The full AM signal may be written as
Where,
- modulation index
Using,
Frequency spectrum of Amplitude Modulation
Fourier transform of a cosine signal cos (ωct) consists of
two impulses at ωc and –ωc as
cos(ct ) [ ( c ) ( c )]
So, Ac cos(ct ) Ac [ ( c ) ( c )]
In general, AM wave :
S (t ) Ac . cos(ct ) sm (t ). cos(ct )
sm (t ) Sm ( )
1 jct
sm (t ). cos(ct ) sm (t ) e e
jct
2
sm (t ). cos(c t ) S m ( c ) S m ( c )
1
2
Frequency spectrum of Amplitude Modulation
S ( ) S m ( c ) S m ( c ) Ac [ ( c ) ( c )
1
2
mAc
S ( ) Ac [ ( c ) ( c ) { (c m )} { (c m )}
2
mAc
{ (c m )} { (c m )}
2
Frequency spectrum of Amplitude Modulation
S(ω)
πAc
mπAc/2 BW=2fm
LSB
USB
BW
• Frequency spectrum of AM comprises of:
• Carrier frequency ωc .
• A lower side band whose highest frequency component is present at ωc-ωm
• An upper side band whose highest frequency component is present at ωc+ωm
Because of the two side bands in the frequency spectrum it is often called Double
Sideband -full carrier(DSB-FC)
The information in the base band (information) signal is duplicated in the LSB and USB and
the carrier conveys no information.
Modulation index or percentage of modulation
Amax Amin
Am
2
Amax Amin Amax Amin
Ac Amax Am Amax
2 2
Amax Amin
m
Amax Amin
Effect of Modulation Index
2
Acar ( Ac / 2 ) 2 Ac2
Pc
R R 2R 2
ASB (mAc / 2 2 ) 2 m 2 Ac2
PLSB / USB
R R 8R
Power distribution in AM
The percentage of total power carried by the sidebands is called the transmission efficiency.
2. As m PSB ( m P )
2
c , But Pc remain same as it is
4
independent of m
Pt=(3/2)*100=150
Pt=150 W
Numerical Problems
P2. For an AM signals, total side band power=200 W with
50 % of modulation. Find the total transmitted AM power.
Solution:
m=0.5
Pt=PC+PSB
=0.2
200
0.2
PT
Pt=1000 W
THANK YOU
L#4: Generation of AM
Methods of AM Generation
Therefore,
Where, a and b are constant.
Square law modulator
Square law modulator
The LC tuned circuit acts as a band pass filter. The circuit
is tuned to frequency fc and its bandwidth is equal to
2fm.
Hence the output voltage contains only two useful terms:
Let, m(t) be the message signal
Modulated signal
Where
The resulting load voltage V2(t) is
Thus the load voltage V2(t) varies periodically between the values V1(t) and zero at
a rate equal to the carrier frequency fc.
Switching modulator
• Thus, assuming the modulating signal to be weak compared with the
carrier wave, we have effectively replaced the non-linear behaviour of
the diode by an approximately equivalent pice-wire linear time
varying operation.
Where gp(t) is a periodic pulse train of duty cycle equal to one half,
and period To = 1/fc as shown in fig
Switching modulator
The function gT0(t) can be expressed in Fourier series as
Switching modulator
The function gp(t) can be expressed in Fourier series as
Therefore,
Observations:
Thank you
L#5: Demodulation of AM signal
2. Envelope detectors
SQUARE-LAW DEMODULATOR
The Square law detector circuit is used for detecting modulated
signal of small magnitude, so that the operating region may be
restricted to the non-linear portion of V-I characteristic of the
device.
It may be observed that the circuit is very similar to the square law
modulator. The only difference lies in the filter circuit.
In a square law modulator, the filter used is a BPF (Band pass
filter), where as in a square law detector , low pass filter (LPF) is
used.
SQUARE-LAW DEMODULATOR
In the circuit, the DC supply voltage VAA is used to get the fixed operating point
in the non-linear portion of the diode V-I characteristic, since the operation is
limited to the non-linear region of the diode characteristic, the lower portion of
the modulated wave form is compressed.
• The produce envelope applied distortion. Due to this, the average value of the
diode current is no longer constant.
SQUARE-LAW DEMODULATOR
i=av(t)+bv2(t)
SQUARE-LAW DEMODULATOR
i=av(t)+bv2(t) v(t)=Ac (1+m cosωm t) cosωc t
e vc (1 m. cos wmt )
The rate of charge of this envelope is
d
(e) vc .m.wm . sin wm t
dt
The negative slope indicated the decay of the voltage.
The slope at the instant to will be
de
dt vc .m.wm . sin wmt0
t t0
d e0
(ec )t t0
dt RC
Putting the value of e0 from eqn
de
(ec ) vc
dt (1 m. cos wm t 0 )
t t0 RC
To avoid diagonal clipping the slope of the discharge curve at t=t0, the
above eqn must be equal to or greater than the envelope decay rate
eqn
vc
(1 m. cos wm t0 ) vc .m.wm . sin wm t0
RC
1 wm .m. sin wm t 0
RC 1 m. cos wm t 0
1 wm .m
RC 1 m 2
1
wm .m For m<<1
RC
Advantages
It is simple to implement.
Demodulation of AM signals can be done using simple circuits consisting of
diodes
AM receivers are very cheap as no specialized components are needed.
AM waves can travel a long distance.
AM wave have low bandwidth.
Disadvantages
An AM signal is not efficient in terms of its power usage. Power wastage takes
place in DSB-FC transmission.
It is not efficient in terms of its bandwidth. It requires a bandwidth equal to
twice that of the highest audio frequency. In AM sidebands contain the signal. The
power in sidebands is the only useful power. For 100 % modulation, the power
carried by sidebands is only 33.33 %. The power carried by the AM wave
decreases with the decreases in modulation index.
AM detectors are sensitive to noise hence an amplitude modulated signal is
prone to high levels of noise.
Reproduction is not high fidelity. For high fidelity (stereo) transmission
bandwidth should be 40 kHz. To avoid interference the actual bandwidth used by
AM transmission is 10 kHz.
Thank you
L#6: Double sideband suppressed
carrier (DSB-SC)
From AM Spectrum:
s (t ) Ac cos(c t ) Am cos(m t )
Ac Am cos(c t ) cos(m t )
sc (t ) Ac cos ct
Sm(t) S1(t)
AM Modulator 1
Sm(t) Accos(ct)
S(t)
Carrier
DSB-SC
Accos(ct)
AM Modulator 2
-Sm(t) S2(t)
BALANCED MODULATOR
s1 (t ) Ac (1 m cos( mt )) cos(ct )
s2 (t ) Ac (1 m cos( mt )) cos(ct )
s(t ) s1 (t ) s2 (t )
2mAc cos( mt ) cos( ct )
Balanced modulator
A circuit which can produce an output which is the product of two
signals input to it is called product modulator. Such an output
when the inputs are the modulating signals and carrier signal is a
DSB-SC. One such product modulator is a balanced modulator.
Balanced modulator
Now,
1
ed (t ) x(t ){cos[( )t ] cos[(2c )t ]}
2
Now, when this signal is allowed to pass through a low
pass filter (LPF) having a cut-off frequency ωm the terms
centered around ±2ωc are filtered out.
Mathematical Expression
So, 1
e0 (t ) x(t ) cos[( )t ]
2
Limitation
The costa’s receiver cases phase control when there is no
modulation i.e., x(t)=0. The phase control re-establishes itself on
the reappearance of modulation. However, the reestablishment is so
fast that distortion is not perceptible in case of voice
communication.
Squaring Loop
the receiver signal is squared by a squaring circuit as shown in figure.
The output of the squarer will be given as
For simplicity let us assume that x(t) is a single tone sinusoidal denoted as cosmt i.e.,
x(t ) cos mt
Squaring Loop
Then the output of the squarer becomes
[ A cos ct. cos mt ]2 A2 cos 2mt (t ) cos 2ct
A2
(1 cos 2m )(1 cos 2ct )
4
A2
(1 cos 2mt cos 2ct cos 2ct cos 2mt )
4
r (t ) s (t ) c' (t )
A sin
(t ) tan [
1
]
x(t ) A cos
e(t ) A x(t )
Hence, modulating signal x(t) can be recovered
from r(t) using an enveloped detector since the r(t)
is basically a conventional AM wave given by
HOW?
Double sideband(DSB) even with a suppressed carrier
occupies twice the bandwidth of the modulating signal.
This is wasteful of the available frequency spectrum.
QAM places two independent double sideband
suppressed carrier signals in the same spectrum as one
ordinary double sideband suppressed carrier signal.
TYPES OF QAM
It exists in both analogue and digital formats.
The analogue versions of QAM are typically used to
allow multiple analogue signals to be carried on a single
carrier.
It combines phase modulation and amplitude modulation
in a form of modulation known as quadrature amplitude
modulation, QAM.
Digital formats of QAM are often referred to as
“Quantised QAM”.
It combines phase shift keying and amplitude keying in a
form of modulation known as quadrature amplitude
modulation, QAM .
QAM THEORY
Quadrature amplitude theory states that both
amplitude and phase change within a QAM signal.
The basic way in which a QAM signal can be
generated is to generate two signals that are 90°
out of phase with each other and then sum them.
This will generate a signal that is the sum of both
waves, which has a certain amplitude resulting from
the sum of both signals and a phase which again is
dependent upon the sum of the signals.
QAM THEORY….
• As there are two RF carrier signals that can be
modulated, these are referred to as the I – (In-)
phase and Q - Quadrature signals.
• The I and Q signals can be represented by the
equations below:
I = A cos(Ψ)
Q = A sin(Ψ)
It can be seen that the I and Q components are
represented as cosine and sine. This is because the
two signals are 90° out of phase with one another.
QAM MODULATOR
• The modulator is used to encode the signal, often
data, onto the radio frequency carrier that is to be
transmitted.
• The QAM modulator essentially follows the idea
that can be seen from the basic QAM theory where
there are two carrier signals with a phase shift of
90° between them.
• These are then amplitude modulated with the two
data streams known as the I or In-phase and the Q
or quadrature data streams.
QAM MODULATOR
sin mt cos( mt )
sin c t cos(c t )
2 2
• Thus the sine terms can be obtained from the
corresponding cosine terms, by giving a phase
shift of (-/2).
• Thus, in a general modulating signal x(t); if all
frequency components are shifted by (-/2), it
may lead to SSB-SC signal.
s(t ) SSBSC x(t ) cos ct xh (t ) sin ct
Where xh(t) is a signal obtained by shifting the phase of
every component present in x(t) by (-/2).
+sign for LSB and –sign for USB.
Hilbert Transform
When the phase angles of all frequency components of a
given signal are shifted by 900, the resulting frequency in
the time domain is known as the Hilbert Transform of the
signal.
It should be noted Hilbert Transfrom of a signal does not
change the domain as compared to Forward Transform
which changes the signal from time domain to frequency
domain.
H/W
x(t) (-/2 Phase shifter) xh(t) Here x(t) signal is
x(w) xh(w)
passed through phase
shifter H(W) and the
o/p is xh(t).
Block diagram of Hilbert Transform
The characteristics of the system are given by:
(i) The magnitude of the frequency components present in
x(t) remains unchanged, when it passed through the system
i.e., |h(w)|=1 and
(ii) The phase of the positive frequency components is
shifted by -/2 and Phase of the negative frequency
components is shifted by +/2. |h(w)| and Q() are plated
in fig below by continuous and doted line respectively.
H()
|H()|
+/2
Q()
-/2
iQ( ) iQ( )
H ( ) | H ( ) |e 1.e
Now,
Q( ) ; 0
2
; 0
2
j
H ( ) e 2 j for 0
j
e 2
j for 0
Hence, H ( )
1 0
J
1 0
-sgn( )
H ( ) j sgn( )
1
sgn( )
j t
h(t ) F 1[-j sgn( )]
1
t
And x(t) x(w)
Then, 1 1
xh (t ) [ x(t ) ]
t
1 x( ) Which is the Hilbert
d
t Transform of x(t)
Properties if Hilbert Transform
• (i) A signal x(t) and its Hilbert Transform xh(t)
have the same energy density spectrum.
• (ii) A signal x(t) and its Hilbert Transform xh(t)
have the same auto correction function.
• (iii) A signal x(t) and its Hilbert Transform xh(t)
are mutually orthogonal, i.e.
x(t ) x (t )dt 0
h
• (iv) It xh(t) is Hilbert Transform of x(t), then the
Hilbert Transform of xh(t) is –x(t). That is if
H [ x(t )] xh (t )
then
H [ xh (t )] -x(t)
Application of Hilbert Transform
• Hilbert Transform are used:
• (i) Generation of SSB signal
• (ii) Design of minimum phase type filters.
• (iii) Representation of band pass signals.
Power saving in SSB-SC
for the upper sideband
m2 m2
Pc 1 1
4 4
% of power saving 2
2
83 .33 %, for m 1
m m
Pc 1 1
2 2
Bandwidth of SSB-SC Wave
First generate DSB-SC wave with the help of the product modulator. Then,
apply this DSB-SC wave as an input of band pass filter. This band pass filter
produces an output, which is SSB-SC wave.
Select the frequency range of band pass filter as the spectrum of the
desired SSB-SC wave. This means the band pass filter can be tuned to either
upper sideband or lower sideband frequencies to get the respective SSB-SC
wave having upper sideband or lower sideband.
Limitations of Frequency Discrimination Method
Such a phase distortion does not have serious effects with the
voice communication. But it will have untolerable effects in the
transmission of video.
THANK YOU
L#11:Vestigial Sideband
Transmission
Disadvantages
•Bandwidth is more when compared to SSBSC wave.
•Demodulation is complex.
Applications
• The most prominent and standard application
of VSBSC is for the transmission of television
signals.
• Also, this is the most convenient and efficient
technique when bandwidth usage is
considered.
Generation of VSBSC
Generation of VSBSC wave is similar to the generation of SSBSC wave.
The modulating signal m(t) and carrier signal Ac.cos(2πfct) are applied as inputs to the product
modulator. Hence, the product modulator produces an output, which is the product of these
two inputs.
Therefore, the output of the product modulator is
Apply Fourier transform on both sides
S(f)=P(f).H(f)
Let the VSB-SC wave be s(t) and the carrier signal is Ac.cos(2πfct).
So,
In the above equation, the first term represents the scaled version of the desired message
signal frequency spectrum. It can be extracted by passing the above signal through a low pass
filter.
P1: A Modulating signal 10 sin(2 x 103t) is used
to modulate a carrier signal 20 sin(2 x 104t).
Determine the modulation index, percentage
modulation, frequencies of the seideband
components and their amplitude. What will be
the band with of the modulated signal?
Solution:
(i) The modulating signal vm= 10 sin(2 x 103t)
Let us compare this with the following expression
vm= Vm 10 sin(2 x fmt)
Then, we get,Vm= 10volt, fm= 1 x 103 Hz = 1 kHz
(ii) The carrier signal vc = 20 sin(2 x 104t)
Comparing this with the expression
vc = Vc sin(2fct), we obtain
Solution:
It is given that It1 = 10 amp, m1 = 0.3, It2 = 11 amp.
2
I t1 m12
1
Ic 2
Therefore
I t1 10
Ic 1/ 2
1/ 2
9.78
m 2
(0.3) 2
1 2 1 2
1
2
It2 2 11 2
Or, mt 2[( ) 1] 2[( ) 1]
Ic 9.78
Therefore mt 0.73
mt [m m ]2
1
2 1/ 2
2
Solution:
The total power transmitted by the AM broadcast
station is given by
Pc (1 Px ) 50 kW
Where Pc is the carrier power and
1
Px (0.707 ) 0.25
2
2
Thus, Pc (1 0.25) 50 kW
50
Or, Pc 40 kW
1.25
(ii) The transmission efficiency, , is given by
Pc .Px Px 0.25
0.2 or 20%
Pc Pc Px 1 Px 1.25
(iii) Also, carrier power, Ac2
Pc 40 10 3W
2 50
Therefore, peak carrier amplitude,
io 10 kVi k Vi mA
' 2
Where Vi is input in volts, and
io 10 kVi k Vi ' 2
0. 2
m 0. 1 modulation depth will be 10 %
2
THANK YOU
Angle modulation
Thus:
• Varying the frequency fc
Frequency modulation
Instantaneous phase
Frequency modulation
• It is a type of angle modulation in which
the instantaneous frequency varied linearly
in accordance to baseband or modulating
signal.
Frequency modulation
The instantaneous frequency is
0
FREQUENCY DEVIATION
The maximum change in
instantaneous frequency from
the average frequency ωc is
called frequency deviation.
Δω
Angle modulation viewed as PM or FM
Relationship between PM and FM
Expression for PM wave is:
PM using FM
Summary
• Radio Broadcasting
• Two way mobile radio
• Microwave communication
• TV sound transmission
• Cellular radio
• Satellite communication
Comparing Frequency Modulation to
Phase Modulation
FM PM
Frequency deviation is proportional to Phase deviation is proportional to
modulating signal m(t) modulating signal m(t)
Noise immunity is superior to PM (and of
Noise immunity better than AM but not FM
course AM)
Signal-to-noise ratio (SNR) is better than in Signal-to-noise ratio (SNR) is not as good as
PM in FM
FM is widely used for commercial broadcast PM is primarily for some mobile radio
radio (88 MHz to 108 MHz) services
Modulation index is proportional to
Modulation index is proportional to
modulating signal m(t) as well as modulating
modulating signal m(t)
frequency fm
For practical implementation reasons, analog FM is easier to generate than PM, and FM
provides better performance in most common environments. However, analog PM has
been (and continues to be) used for a few, isolated systems.
FM VS AM
1. Reduction to noise: The main advantage of frequency modulation is a reduction in
noise. As most noise is amplitude based, this can be removed by running the received signal
through a limiter so that only frequency variations remain.
FM is considered to be superior to AM.
Does not require linear amplifiers in the transmitter: As only frequency changes
contain the information carried, amplifiers in the transmitter need not be linear.
Resilient to signal strength variations: In the same way that amplitude noise can be
removed, so too can signal variations due to channel degradation because it does not suffer
from amplitude variations as the signal level varies. This makes FM ideal for use in mobile
applications where signal levels constantly vary.
The stronger signal will be capture and eliminate the weaker.
In AM, the weaker signal can be heard in the background.
Enables greater efficiency : The use of non-linear amplifiers (e.g., class C and class D/E
amplifiers) means that transmitter efficiency levels can be higher. This results from linear
amplifiers being inherently inefficient.
Disadvantages of FM
Requires more complicated demodulator: One of
the disadvantages is that the demodulator is a more
complicated, and hence more expensive than the very
simple diode detectors used in AM.
f=β.f m =5x199=995 Hz
1 3 3 1 5 5
sin( mt ) sin mt sin mt ......
3 5
1 3 3 1 5 5
i (t ) c t sin mt sin mt sin mt .....
3 5
Thus a NBFM consists of residual AM and harmonic PM
which can be reduced to a negligible value by restricting β
to a small value.
Ac
S (t ) Ac cos c t [cos(c m )t cos(c m )t ]
2
It is interesting to note that this wave is similar to an AM
wave for the same modulating signal. For a single tone
sinusoidal modulation, the corresponding AM signal takes
the form.
mAc
S AM (t ) Ac cos c t [cos(c m )t cos(c m )t ]
2
we find that in case of sinusoidal modulating wave, the basic
difference between an AM wave and NBFM wave is that the sign of
the lower side frequency in the NBFM is reversed. Thus NBFM
essentially requires the same bandwidth (2fm) as the AM wave.
n β; β >>1
2
B.W 2.nm 2 n .m
m [ ]
m
2( ) radiana
B.W 2(f ) Hz.
Thus, the approximate bandwidth of a wideband FM system
is given as twice the frequency deviation.
Universal Bandwidth curve
Schwartz developed a graph for determining the bandwidth
of an FM signal if the modulation index is known.
any frequency component with a signal strength (voltage) less than 1%
of that of the unmodulated carrier will be considered too small to be
significant. This curve is also called universal curve which shows the
variation of the BW ‘β’ normalized with respect to f against β.
Now, we can make the carrier frequency ωc to vary in accordance with the baseband
or modulating signal x(t) if L or C is varied according to x(t).
An oscillator circuit whose frequency is controlled by a modulating
voltage is called voltage controlled oscillator (VCO).
The frequency of VCO is varied according to the modulating signal
simply by putting a shunt voltage variable capacitor with its tuned
circuit.
This voltage variable capacitor is called varactor or varicap.
Working Operation
The varactor diode is reverse biased by the negative dc source –Vb.
The modulating AF voltage appears in series with the negative supply voltage. Hence, the
voltage applied across the varactor diode varies in proportion with the modulating voltage.
This will vary the junction capacitance of the varactor diode.
The varactor diode appears in parallel with the oscillator tuned circuit.
Hence the oscillator frequency will change with change in varactor diode capacitance and
FM wave is produced.
The RFC will connect the dc and modulating signal to the varactor diode but it offers a very
high impedance at high oscillator frequency. Therefore, the oscillator circuit is isolated
from the dc bias and modulating signal.
Working Operation
The capacitance Cd of the varactor diode is given by the following relation
k
cd k .(VD ) 1/ 2
VD k is constant of proportionality.
Where VD is the total instantaneous voltage across the varactor diode and is given
by
VD V0 x(t )
The oscillator frequency is
1
c
LC
Now, the capacitance of the oscillator tank circuit will be Co+Cd and thus the
instantaneous frequency of oscillation i is given as:
1
i
L0 (C0 Cd )
substituting the value of Cd ,
1
i
L0 (C0 k .Vd ) 1/ 2
where
we obtain
Base band
Freqn Freqn RF
signal Narrow
Integrator Multiplier Mixer Multiplier Amplier
band PM
x(t) X1 X2
fc=100 MHz
Crystal Crystal f = 75 kHz
oscillator oscillator
75000
7500
10
A straightforward frequency multiplication equal to this value will
lead to a very high value of carrier frequency than the desired 100
MHz. In order to achieve the desired deviation and carrier frequency,
we take help of a two-stage frequency multiplier. This arrangement
uses two multiplies and a mixer. The mixer enables one to translate
the carrier frequency suitable without altering f. The final stage
multiplier gives the desired carrier frequency and deviation.
Let 1 and 2 are the multiplication factors for the two multipliers, so
that,
f 75000
1 . 2 7500
f1 10
100
8.5 0.11
2
Solving
1 = 100 and 2 = 75
THANK YOU
FM Demodulation
fr
fc
fr>>fc
Detuned Amplifier circuit Envelope detector
Limitations:
(i) Even though linearity is good, it is not good enough.
(ii) This circuit is difficult to tune since the three tuned circuits are
to be tuned at different frequencies, and
(iii) Amplitude limiting is not provided.
Foster-Seeley Discriminator
(Phase Discriminator)
Primary and secondary windings both are tuned to the center frequency ‘fc’ of the
incoming signal.
Although the individual component voltages will be the same at diode inputs at all
frequencies, but the vector sum will differ with the phase difference between
primary and secondary windings.
As CC & C2 are coupling & RF Bypass capacitors respectively,
therefore VL3≈ VIN So
Voltage across diode= VIN + Secondary voltage/2
Output voltage= V01-V02
Continued…
Circuit Operation:
(i) When fin = fc:
Primary and secondary voltages are exactly 90
out of phase.
As shown in vector diagram,
Input at D1 = Input at D2
V01 = V02
Vo = 0
Continued…
(ii) When fin > fc:
Primary and secondary voltages are less than
90 out of phase.
Input at D1 >Input at D2
V01 >V02
Vo is positive.
(iii) When fin < fc:
Primary and secondary voltages are more than
90 out of phase.
Input at D2 > Input at D1
V02 > V01
Vo2 is Positive.
Continued… Frequency response of Phase Discriminator
Advantages:
(i) Tuning procedure is simpler than balanced slope detector, because it
contains only two tuned circuits and both are tuned to the same frequency .
(ii) Better linearity, because the operation of the circuit is dependent more on
the primary to secondary phase relationship which is very much linear.
Limitations:
It does not provide amplitude limiting. So in the presence of noise or any
other spurious amplitude variations, the demodulator output respond to
them and produce errors.
Continued….
Advantages:
•Easy alignment.
•Good linearity.
•Amplitude limiting is provided so that additional
limiter is not required.
Disadvantages:
•Complicated operation.
•More components are required.
THANK YOU
L#16: FM Demodulation_part 2
Advantages:
Easy to align.
Good linearity due to linear phase relationship
between primary and secondary.
Amplitude limiting is provided inherently. Hence
additional limiter is not required.
Change 1: Diode D2 is reversed so
that sum of Vao & Vbo appears across
points a’ and b’ instead of difference.
Disadvantages:
•Complicated operation.
•More components are required.
Why limiter stage is not used before ratio detector?
In ratio detector a large value capacitor is placed that functions
as amplitude limiter.
Limiter Function:
•If the input voltage fall, the diode current will fall, but the load
voltage will not, at first, because of the presence of the large
capacitor.
•The effect is that of an increased diode load impedance, the
diode current has fallen, but the load voltage remained constant.
•So that, damping is reduced and the gain of the driving amplifier
increases, this time counteracting an initial fall in the input
voltage.
•The ratio detector provides what is known as diode variable
damping.
•This maintains a constant output voltage desire changes in the
amplitude of the input.
•Thus, limiter stage is not used before ratio detector.
Performance Comparison of FM Demodulators
S.No. Parameter of Balanced Slope Foster-Seeley Ratio Detector
Comparison detector (Phase)
discriminator
(i) Alignment/tuning Critical as three Not Critical Not Critical
circuits are to be tuned
at different frequencies
(ii) Output characteristics Primary and secondary Primary and Primary and
depends on frequency relationship secondary phase secondary phase
relation. relation.
(iii) Linearity of output Poor Very good Good
characteristics
(iv ) Amplitude limiting Not providing Not Provided Provided by the
inherently inherently ratio detector.
(v) Amplifications Not used in practice FM radio, TV receiver
satellite station sound section ,
receiver etc. narrow band
FM receivers.
Phase-locked Loops
• It is the best frequency demodulator.
•A phase-locked loop (PLL) is an electronic circuit with a
voltage- or current-driven oscillator that is constantly
adjusted to match in phase (and thus lock on) with the
frequency of an input signal.
•PLL has low cost and superior performance even at low
SNR (signal-to-noise ratio)
PLL Characteristics
Basic operation
e(t)=i(t)-0(t)---phase error
e(t)=i(t)- K v v2 (t )dt
−
When e(t)=0 , the PLL is said to be phase locked
When e(t)<1 rad , the PLL is said to be near phase locked
So, sin[e(t)] e(t)
The loop filter operates on error signal v1(t) to produce the output v2(t).
So,
v2 (t ) = v1 ( )h(t − )d Where, h(t) is the Impulse response of the LPF
−
t
e (t ) = i (t ) − K vK d sin[ e ( )]h(t − )dtd
0 −
Thus
Under the above mentioned condition, the phase of the VCO becomes equal
to the phase of the incoming signal and the phase lock is therefore
established
From the Fig.
Or,
Then,
The corresponding time domain representation of the equation can
be obtaining by taking inverse Fourier Transform
Now,
Therefore,
Jayanta K Rakshit
Introduction
• Most of the signals that we use in our daily life are analog in nature
( for eg: speech, weather signals etc).
• Digital system possess many advantages in comparison to analog
system such as they are immune to noise, can be stored, processed
with more efficient algorithms, secure, more robust and cost
effective etc.
• Most of the effective signal processor are digital signal processors
which needs digital information in order to process it.
• Hence there arises a need to convert our analog signal to discrete
time signal in order to process them properly through digital signal
processors and then reconvert them back to analog signals so that
we can understand them.
• Sampling is the answer to this need.
• Sampling is a way to convert a signal from continuous time to
discrete time.
Sampling Theorem
This provides a mechanism for representing a continuous time signal
by a discrete time signal, taking sufficient number of samples of
signal so that original signal is represented in its samples
completely. It can be stated as:
(i) A band-limited signal of finite energy with no frequency
component higher than fm Hz, is completely described by its sample
values which are at uniform intervals less than or equal to 1/2fm
seconds apart. T = 1
s
2f
where Ts is sampling time
m
Solution: The angles are stated in radians, so the three frequencies are 25 Hz,
150 Hz and 60 Hz, respectively. The highest frequency is 150 Hz,
so the Nyquist rate is twice of 150 Hz = 300 Hz.
The Nyquist interval is the reciprocal of the Nyquist rate =1/300 sec= 3.333 ms
This is called ideal sampling or impulse sampling. You cannot use this practically
because pulse width cannot be zero and the generation of impulse train is not
possible practically.
Natural sampling
➢ This type of sampling similar to ideal sampling
except for the fact that instead of delta function,
now we use rectangular train of period Ts. i.e.
multiply input signal x(t) to pulse train.
➢ An electronic switch is used to periodically shift
between the two contacts at a rate of fs = (1/Ts) Hz,
staying on the input contact for C seconds and on
the grounded contact for the remainder of each
sampling.
➢ The output xs(t) of the sampler consists of segments
of x(t) and hence Xs(t) can be considered as the
product of x(t) and sampling function s(t).
➢ Xs(t)= x(t)×s(t)
The signal Xs(t) has the spectrum which consists of message spectrum and repetition
of message spectrum periodically in the frequency domain with a period of fs. But
the message term is scaled by ‘Co”(sinc function) which is not the case in
instantaneous sampling.
Flat Top sampling
✓ Flat Top sampling: During transmission, noise is introduced at top of the
transmission pulse which can be easily removed if the pulse is in the form of flat
top.
✓Here, the top of the samples are flat i.e. they have constant amplitude and is equal
to the instantaneous value of the baseband signal x(t) at the start of sampling.
Hence, it is called as flat top sampling or practical sampling.
➢ Flat top sampling makes use of sample and hold circuit.
➢ Theoretically, the sampled signal can be obtained by
convolution of rectangular pulse h(t) with ideally sampled
signal ,sδ(t).
g(t)= s(t) ⊗ h(t)
The duration of
each sample is τ
f(t) ⊗ δ(t) = f(t); property of delta function Applying a modified form; s(t) in place of
δ(t)
Sample and hold circuit to generate flat top sample
Sample and hold circuit is used for the generation of the sampled
signal to attain flat top sampling, which is shown in the Fig. below.
This equation shows that signal g(t) is obtained by passing the signal s(t) through a
filter having transfer function H(f).
Figure(a) shows one pulse of rectangular pulse train and each sample of x(t) i.e.
s(t) is convolved with this pulse.
Figure (b) shows the spectrum of this pulse. Thus, flat top sampling introduces an
amplitude distortion in reconstructed signal x(t) from g(t). There is a high
frequency roll off making H(f) act like a LPF, thus attenuating the upper portion
of message signal spectrum. The high frequencies of x(t) is affected. This is known
as aperture effect.
How to minimize aperture effect
An equalizer at the receiver end is needed to compensate aperture effect. The receiver
contains low pass reconstruction Filter with cut off slightly higher than fm Hz.
Pulse Train
Generator
Advantages of PAM :
In both the cases amplitude constant and does not carry information
so amplitude limiters can be used providing good noise immunity.
Pulse Width Modulation
•In PWM, Width of the pulses of the carrier pulse train is varied in
accordance with the modulating signal. The amplitude and positions
of the pulses are constant in this modulation.
• It is also called Pulse Duration Modulation (PDM), Pulse Length
Modulation (PLM).
Figure: Illustration of PWM (a) Modulating signal (b) Pulse Carrier (c) PWM signal
Pulse Width Modulation
Three types of pulse-width modulation (PWM) are possible:
(a) The leading edge of the pulse
being constant, the trailing edge
varies according to the message
signal.
Disadvantages of PWM:
•In PWM, pulses are varying in width and therefore their power
contents are variable. This requires that the transmitter must be able to
handle the power content of the pulse having maximum pulse width.
•Large bandwidth is required for the PWM as compared to PAM.
Pulse Position Modulation (PPM)
In PPM, the position of the pulse relative to its un-modulated time
occurrence is varied in accordance with the message signal.
The amplitude and width of the pulses are constant in this modulation.
PPM Generation
• PPM generator consists of
differentiator and monostable
multivibrator.
•The differentiator generates
positive and negative spikes
corresponding to leading and
trailing edges of the PWM
waveform.
• Diode D1 is used to bypass the
positive spikes.
•The negative spikes are used to
trigger the multivibrator.
•The monostable multivibrator
then generates the pulses of same
width and amplitude with
reference to the trigger to give
PPM waveform.
Demodulation of PPM
Disadvantages of PPM:
• Synchronization between transmitter and receiver is required.
• Large bandwidth is required for the PPM as compared to PAM
Transmission BW of PWM and PPM
Analogue signal
Sampling TIMING
Quantization levels.
Quantized to 5-levels
Quantization levels
Quantized 10-levels
PCM encoding example
M=8
The Mid-Rise type is so called because the origin lies in the middle of a raising part
of the stair-case like graph. The quantization levels in this type are even in number.
The Mid-tread type is so called because the origin lies in the middle of a tread of the
stair-case like graph. The quantization levels in this type are odd in number.
Both the mid-rise and mid-tread type of uniform quantizers are symmetric about the
origin.
Uniform Quantization
Dynamic Range: • Most ADC’s use uniform
(-8, 8)
quantizers.
Output sample
XQ
7
• The quantization levels of a
uniform quantizer are
5
1
equally spaced apart.
-8 -6 -4 -2 -1 2 4 6 8
• Uniform quantizers are
Input sample X
-3
optimal when the input
-5 distribution is uniform.
-7 When all values within the
Quantization Characteristic Dynamic Range of the
Example: Uniform =3 bit quantizer quantizer are equally likely.
q=8 and XQ = {1,3,5,7}
MIDTREAD QUANTIZER
1. A midtread quantizer assumes
values of the form ∆Hi⋅
where ∆ is the step size
and Hi = 0, ±1, ±2, ±3, ...
2. It is called mid-tread because
the origin lies in the middle of a
tread of a staircase like graph.
MIDRISER QUANTIZER
1. A mid-riser quantizer has output levels
are given by (∆/2)Hi, where ∆ is the step
size and Hi= ±1, ±2, ±3, ....
2. The origin lies in the middle of the
rising part of the staircase-like
characteristic graph.
Nonuniform Quantization
Many signals such as speech have a non-uniform distribution.
– The amplitude is more likely to be close to zero than to be at higher levels.
Nonuniform quantizers have unequally spaced levels
– The spacing can be chosen to optimize the SNR for a particular type of signal.
Output sample XQ
6
-8 -6 -4 -2 2 4 6 8
-2
Input sample X
-4
-6
WHY IT IS NECESSARY TO HAVE NON-
UNIFORM QUANTIZATION
1. Using linear quantization, the quantization error is given by:
Discrete Uniform
samples Compressor Quantizer
••••
Channel
••••
SOLUTION
(a) 𝑓𝑚 = 4.2 𝑀𝐻𝑧
𝑞 = 2𝜐 = 512
𝜐 = 𝑙𝑜𝑔2512 = 9 bits
(b) Bandwidth, BW = 2𝜐𝑓𝑚 = 2 x 9 × 4.2 = 75.6 Mb/s
ADVANTAGES AND DISADVANTAGES OF PCM
ADVANTAGES OF PCM
1. PCM provides high noise immunity.
2. Allows regeneration of clean signal by using repeaters placed
between the transmitter and the receiver.
3. PCM signals can be stored for later use or retransmission with high
fidelity
4. PCM signals can be encrypted more easily and to very high
standards.
DISADVANTAGES OF PCM
1. PCM requires complex circuitry to sample, quantize, code and
decode.
2. PCM requires large bandwidth compared with that of the original
analog signal.
THANK YOU
L#20: DELTA MODULATION
Ts is sampling interval
Using these notations
Further,
Where,
Hence,
Which means,
The present input of the delay unit
Disadvantages of DM
1. Slope Over load distortion (when Δ is small)
2. Granular noise (when Δ is large)
SLOPE OVERLOAD
Slope-overload occurs when the step size is too small to follow a
steep segment of the input waveform x(t ).
GRANULARITY
Granularity refers to a situation where the staircase function x(t)
hunts around a relatively flat segment of the input function, with a
step size that is too large relative to the local slope characteristic of
the input.
ADAPTIVE DELTA MODULATION
THE PRINCIPLE OF ADAPATIVE DELTA
MODULATION
Adaptive Delta
Modulation seeks to
overcome quantization
errors arising from
slope overload and
granular noise by
varying the step size
in accordance to the
signal amplitude.
ADAPTIVE DELTA MODULATION
TRANSMITTER AND RECEIVER
The logic for step size control is added in the diagram. The step
size increases or decreases according to a specified rule
depending on one bit quantizer output.
ADAPTIVE DELTA MODULATION
RECEIVER
The receiver has two portions. The first portion produces the step size
from each incoming bit. Exactly the same process is followed as that
in transmitter. The previous input and present input decide the step
size. It is then applied to the second portion i.e., an accumulator
which builds up staircase waveform. The low pass filter then
smoothens out the staircase waveform to reconstruct the original
signal.
Advantages
➢The signal to noise ratio of ADM is better than that of DM
because of the reduction in slope overload distortion and
idle noise.
➢Because of the variable step size , the dynamic range of
ADM is wider than DM.
➢Utilization of bandwidth is better in ADM than DM
Disadvantages
Implementation of step size control logic circuit is not
easy.
DIFFERENTIAL PULSE CODE
MODULATION (DPCM)
1. Some signals such as speech have high correlation between
adjacent samples.
2. When such highly correlated samples are encoded using basic
PCM, the resulting code contains a lot of redundant information.
3. In such cases, basic PCM scheme is not the preferred coding
method.
4. By removing this redundancy before encoding an efficient
coded signal can be obtained.
5. One method of removing redundancy is by using the Differential
PCM (DPCM) method.
6. DPCM is based on the principle that by knowing the past
behaviour of a signal up to a certain point in time, it is possible
to predict future values.
DPCM TRANSMITTER
A=peak amplitude.
By Combining
Binary signal and its equivalent signal
Generation of BPSK signal
The block diagram of Binary Phase Shift Keying consists of the
balance modulator which has the carrier sine wave as one input and
the binary sequence (Bipolar NRZ) as the other input.
Fig.: Generation of
BPSK
BPSK modulated output
Coherent detection of BPSK signal
A coherent reference for synchronous detection cannot be obtained by the use of an
ordinary phase-locked tracking loop, since there are no spectral line components at ±
fc. However, since the signal has a spectrum that is symmetric with respect to the
(suppressed) carrier frequency, either a squaring loop or a Costas PLL can be used
to obtain synchronisation.
The diagram for a squaring loop in a coherent detector is shown below:
Bandwidth for BPSK signal
the spectrum of the BPSK signal is centered around the carrier
frequency fc.
If fb = 1/Tb , then for BPSK, the maximum frequency in the
baseband signal will be fb. The main lobe is entered around carrier
frequency fc and extended from fc – fb to fc + fb .
Therefore Bandwidth of BPSK signal will be,
BW = Highest frequency – Lowest frequency in the main lobe
BW = (fc + fb)– (fc - fb )
Or, BW = 2fb
Hence, the minimum bandwidth of BPSK signal is equal to twice
of the highest frequency contained in baseband signal.
Salient Features of BPSK
then the squared signal remains same as before. Hence, the recovered
carrier is unchanged even if the input signal has changed its sign.
Therefore, it is not possible to determine whether the receiver signal
is equal to b(t) or – b(t). In fact, this results in ambiguity in the output
signal.
THANK YOU
L#22: Digital Modulation
Techniques_PART 2
it is obvious that the width of one lobe is 2fb. The two main lobes
due to fH and fL are placed such that the total width due to both
main loves is 4fb.
Therefore, we have
Bandwidth of BFSK = 2fb + 2fb
Or, BW = 4fb.
Now, if we compare this bandwidth with that of BPSK, we note
that,
BW (BFSK) = 2 X BW(BPSK)
Coherent Detection of BFSK
Drawback of BFSK
The major drawback is its high bandwidth requirement. Therefore,
FSK is extensively used in low speed modems having bit rates
below 1200 bits/sec.
Performance Comparison of Three Basic Digital
Modulation Techniques
S. Parameter of Binary ASK Binary FSK Binary PSK
N comparison
1 Variable characteristic Amplitude Frequency Phase
2 Bandwidth (Hz) 2fb 4fb 2fb
3 Noise Immunity Low high High
4 Probability of error High low Low
5 Performance in Poor Better than ASK Best of three
presence of noise
6 System complexity Simple Moderately Very complex
Complex
7 Bit rate or data rate Suitable upto Suitable upto Suitable for
100 bits/sec. 1200 bits/sec. high bit rates
8 Demodulation method Envelope Envelope Coherent
detection detection detection
Non-Coherent Detection
Non-Coherent Detection
s (t ) 2 P cos(2f t )
s c
The detector consists of two band pass filters one tuned to each of the
two frequencies used to communicate ‘0’s and ‘1’s., The output of
filter is envelope detected and then baseband detected using an
integrate and sum operation. The detector is simply evaluating which
of two possible sinusoids is stronger at the receiver. If we take the
difference of the outputs of the two envelope detectors the result is
bipolar baseband. The resulting envelope detector outputs are sampled
at t = kTb and their values are compared with the threshold and a
decision will be made in favour of symbol 1 or 0.
THANK YOU
L23:
Non-coherent detection of PSK
se(t) and s0(t) are basically BPSK signals. The only difference is that
T= 2Tb here. The value of ae(t) and a0(t) would be + 1 V or – 1V.
The output of the adder is QPSK signal and it is given by,
S (t ) = S (t ) + S (t )
0 e
QPSK waveform
QPSK waveform
Phasor diagram of QPSK signal
The power splitter directs the input QPSK signal to the I and Q product
detectors and the carrier recovery circuit. The carrier recovery circuit
reproduces the original transmit carrier oscillator signal. The recovered
carrier must be frequency and phase coherent with the transmit
reference carrier.
The QPSK signal is demodulated in the I and Q product detectors,
which generate the original I and Q data bits. The outputs of the
product detectors are fed to the bit combining circuit, where they are
converted from parallel I and Q data channels to a single binary output
data stream. The incoming QPSK signal may be any one of the four
possible output phases
• Mechanical,
• Hydraulic,
• Electrical,
• Optical etc.
INTRODUCTION
The mechanical methods, either pneumatic or hydraulic have acceptable results for short
distances and are used in environments that have a high level of electromagnetic interference
and in those situations where, for security reasons, it is not possible to use electrical signals,
for example, in explosive environments. More recently, use of optical fiber systems allows
the measurement of broad bandwidth and high immunity to noise and interference.
Other proposed telemetry systems are based on ultrasound, capacitive or magnetic coupling,
and infrared radiation, although these methods are not routinely used.
Electrically based telemetry does not have practical limits regarding the distance between
the measurement and the analysis areas, and can be easily adapted and upgraded in already
existing infrastructures.
Electric telemetry methods are further divided depending on the transmission channel that
they use as wire telemetry and wireless (or radio) telemetry.
• Wire telemetry is technologically the simplest solution. The limitations of wire
telemetry are the low bandwidth and low transmission speed that it can support.
However, it is used when the transmission wires can use the already existing
infrastructure, as, for example, in most electric power lines that are also used as wire
telemetry carriers
• Wireless telemetry is more complex than wire telemetry, as it requires a final radio
frequency (RF) stage. Despite its complexity, it is widely used because it can transmit
information over longer distances; thus, it is used in those applications in which the
measurement area is not normally accessible. It can also transmit at higher speeds
and have enough capacity to transmit several channels of information if necessary.
Telemetry using radio waves or wireless offers several distinct advantages over other
transmission methods. Some of these advantages are:
No transmission lines to be cut or broken.
The receiver end consists of similar modules. For wireless telemetry, these modules are:
1. a receiving antenna designed for maximum efficiency in the RF band used;
2. a radio receiver with a demodulation scheme compatible with the modulation scheme; and
3. Demodulation circuits for each of the transmitted channels.
For wireless telemetry, the antenna and the radio receiver are replaced by a generic front end to
amplify the signal and adapt the line impedance to the input impedance of the circuits that
follow.
TYPES OF TELEMETRY SYSTEMS
An important aspect of telemetering system is the signal to noise ration. Noise is of special consideration in
voltage telemetry system as in this current is very low and the signal power is very small. The transmission system
is to be specially designed to keep the interference to a minimum making the ratio S/N >> 2.
current telemetry system
The current telemetry system can develop higher signal power making it more immune to
interference arising mainly due to thermal and induced emf effects. The receiver is a cross-coil
current meter. It must be mentioned that the current must have a non-zero minimum value or
a live-zero for open circuit protection in the system.
It should be mentioned at this stage that such transmitters send the variable in the standard 4 to
20 mA range using a two-wire or three-wire scheme.
Frequency Telemetering
In a frequency telemetering system, the signal processing involves derivation of frequency in
proportion to an electrical signal after it has been obtained from the transducer, by use of an
appropriate unit such as a voltage-to-frequency converter, or a current-to-frequency converter.
For example, a 4 to 20 mA signal can be transformed into frequency ranges of
5 to 15 Hz (10 Hz) 9 to 15 Hz (6 Hz) 5 to 25 Hz (20 Hz) 6 to 27 Hz (21 Hz)
10 to 30 Hz (20 Hz) 7.5 to 15 Hz (7.5 Hz) 18 to 30 Hz (12 Hz)
The choice of these frequency ranges is governed by the commercial availability of low-cost telegraph and teletype
communication channels. A schematic block diagram of such a telemetry system is shown in Fig below
THANK YOU
L#25:Error Control Coding
Burst error :-
- It means that two or more bits in the data unit has
changed.
Types of error control
1. Automatic repeat request(ARQ) technique: receiver can
request for the retransmission of the complete or a part of message if
it finds some error in the received message. This requires an additional
channel called feedback channel to send the receiver’s request for
retransmission.
Appropriate for
• Low delay channels
• Channels with a return path
Not appropriate for delay sensitive data, e.g., real time speech and data
2. Forward error correction(FEC) technique: no such
feedback path and there is no request is made for
retransmission.
• System complexity.
Error Detection Techniques
1. Parity Checking
Solution
This code guarantees the detection of up to three
errors (s = 3),
but it can correct up to one error.
Hamming codes
• Consider a family of (n,k) linear block codes
that have the following parameters:
Block length: n=2m -1
No. of message bits: k=2m -m-1
No. of parity bits: n-k=m
Where m≥3
These are so called Hamming codes.
• Hamming codes have the property that the
minimum distance d 3 independent of the
min
Error Modulator
Digital Source Line X(w)
Control (Transmit
Source Encoder Coding
Coding Filter, etc)
Hc(w) Channel
Transmitter
N(w) Noise
+
Error Demod
Digital Source Line
Control (Receive
Sink Decoder Decoding Y(w)
Decoding Filter, etc)
Receiver
THANK YOU
L#26: Error Control Coding
(Block coding)
m0,m1,m2……….mk-1 c0,c1,c2………cn-k-1
m x
Linear block
encoder
* If generator matrix G is known, then parity check matrix can be calculated and vice-versa.
Properties of G and H matrix
Parity-check matrix H
The parity-check matrix of a canonical generator
matrix is an (n-k)-by-n matrix satisfying
(a) Find the parity check matrix H of the code in systematic form.
(b) Find the encoding table for the linear block code.
(c) What is the minimum distance dmin of the code. How many
errors can the code detect. How many errors can the code correct.
(d) Draw the hardware encoder diagram.
Solution
(a)
(b)
(c) From encoding table, we have
Hence the (6,3) linear block code can detect 2 bit errors and
correct 1 bit error in 6 bit output codeword
(d) The output for general code word is
1 1 0
So, 0 1 1
P
1 1 1
1 0 1 4X 3
n=7 and k=4
Here G is a 4 × 7 matrix in which 4 × 4 identity matrix
(iii)
Given
c5 = d1 + d3 + d4
c6 = d1 + d2 + d3
c7 = d2 + d3 + d4
Let, m=[0 1 0 1] So, c5 =1, c6 =0, c7 =0,
d1 d2 d3 d4 d5 d6 d7
So, code word for m=[0 1 0 1] is
0 1 0 1 1 0 0
Solution:
n=7 and k=4
There are 24 = 16 message vectors given by u=[0000, 0001, 0010,
0011, 0100, 0101, 0110, 0111, 1000, 1001, 1010, 1011, 1100, 1101,
1110, 1111 ]
The generator matrix G is in the form of
Encoder circuit
Syndrome circuit:
(a)
The syndrome for general received word is
n 1
x 0 p x1 p ....... x n2 p
n 2
pX(p) mod ( p 1) = x n 1
Non-Systematic Encoding:
The output code word is generated using polynomial
multiplication.
Information bits are not packed together in the
codeword. These are rarely used.
X1(p)= M1(p).G(p)
X2(p)= M2(p).G(p)
X3(p)= M3(p).G(p)
Generation of Systematic code-words
• There are three steps involved in the encoding process for an
(n,k) cyclic code. They are
nk
– Multiply the message polynomial M(p) by p
nk
– Divide p M ( p) by the generator polynomial G(p) to obtain the
remainder C(p) nk
p M ( p)
Q( p)
C ( p)
G ( p) G ( p)
Where Q(p)=Quotient
nk
--Add the remainder polynomial C(p) and p M ( p) to obtain the code
word polynomial X(p).
nk
i,e, X ( p) [ p M ( p)] C ( p)
Consider the generator polynomial for a (7,3) cyclic code
defined by:
g(p) = p4 + p3 + p2 + 1
(a) Find all non-systematic code vector.
Solution
Given that the generator polynomial for a (7,3) cyclic code is
g(p) = p4 + p3 + p2 +1
The output code words are given by
c(p) = M(p)g(p) 2
M(p)=m2p +m1p+m0
For example one multiplication :
Consider the generator polynomial for a (7,4) cyclic code defined by
g(p) = p3 + p2 + 1
(a) Find the systematic output codeword for input c = [ 1 1 1 1 ].
Solution
Given that c = [ 1 1 1 1 ].
Given that the generator polynomial for a (7,4) cyclic code is
g(p) = p3 + p2 +1
The systematic output code word is
Generator and parity check matrix of the cyclic code
The cyclic codes are linear block codes. Therefore generator and parity check
matrix can be defined.
The generator matrix G(p) has a size of k x n, i.e. k no. of rows and n no. of columns
G(p)=pn-k-1+ pn-kgn-k-1+…….+g2p2+g1p+1
The above equation represents the polynomial for the rows of the
generating polynomial. It is possible to obtain the generator matrix
from this equation
Problem
For a (7,4) cycle code, determine the generator matrix if
G(p) =1+p+p3.
Solution:
Here, n=7 and k=4, hence, n-k = 3
G(p) =1+p+p3
(i) We multiply both the side of G(p) by pi where i=(k-1)……,1,0.
piG(p)= pi+ p1+i+ p3+I, i=(k-1)……,1,0.
But, i=4, i=3,2,1,0.
(ii) By substituting these values of I into equation (i), we get four
different polynomials as under. These polynomials correspond to the
four row of the generator matrix as under.
Row No. 1 : i = 3 p3G(p) = p3 + p4 + p6
Row No. 2 : i = 2 p2G(p) = p2 + p3 + p5
Row No. 3 : i = 1 p G(p) = p + p2 + p4
Row No. 4 : i = 0 G(p) = 1 + p + p3
The generation matrix for (n,k) code is of size k x n. Therefore,
for the (7, 4) cycle code, the generator matrix will be a 4 x 7
matrix.
p p p p p p p
6 5 4 3 2 1 0
1 0 1 1 0 0 0
G0 1 0 1 1 0 0
0 0 1 0 1 1 0
0 0 0 1 0 1 1 4x7
The cycle codes are basically block codes. Therefore, its
code vectors can be obtained by using the generator matrix
as under:
X= MG
Solution:
All the code vectors can be obtained by using the following
expression:
X = MG
Let M = (m3 m2 m1 m0) = ( 1 0 1 0 )
Therefore,
1 0 1 1 0 0 0
0 1 0 1 1 0 0
X [1010 ]
0 0 1 0 1 1 0
0 0 0 1 0 1 1
Therefore, X = [ 1 0 0 0 00 00
10 10 10 00 00 10
00 10 00 00]
Therefore, We have X = [1 0 0 1 : 1 1 0]
Similarly, the other code vectors can be obtained.
Systematic Form of Generator Matrix
the generator matrix in the systematic form is given by.
G [I : Pk kx ( n k )
]
k x (n - k)
This means that there are k number of rows in the generator matrix.
Let us represent the row number (in general) by i. Then ith row of the
generator matrix is represented by,
p ( n i ) Re mainder
Quotient
G ( p) G ( p)
Let Remainder = Ri(p)
Quotient = Qi(p)
Substituting this into previous equation, We obtain
( n i )
p Ri ( p )
Qi ( p )
G ( p) G ( p)
So,
p ( ni ) Qi ( p)G( p) Ri ( p); where i 1,2,....k
In mod-2 additions, the addition and subtraction will yield the
same result.
So, p ( ni )
Ri ( p) Qi ( p)G( p)
the above expression represents the ith row of the systematic
generator matrix.
Problem
For systematic (7,4) cycle code, determine the
generator matrix and parity check matrix. Given :
G(p) =p3 + p + 1. Also obtain the code vector for the
message bit: [1 0 1 0]
Solution:
(i) The ith row of the generator matrix is given by equation (16.44)
as under:
p ( ni )
Ri ( p) Qi ( p)G( p)
where i=1,2,….k,
(ii) It is given that the cycle code is systematic (7,4) code.
Therefore, n=7, k=4 and (n-k) = 3
Substituting these values into the above expression, we obtain
p ( 7i ) Ri ( p) Qi ( p).(p3 + p + 1).....i 1,2, ...4.
p 6 Ri ( p) (p3 + p + 1)(p3 + p + 1)
p6 + p4 + p3 + p4 + p2 + p + p3 + p + 1
H= [PT : I3x3]
The transpose matrix PT is given by interchanging
the rows and columns of the P matrix.
1 1 1 0
P T 0 1 1 1
1 1 0 1 3 x 4
Hence, the parity check matrix is given by,
1 1 1 0 1 0 0
H 0 1 1 1 0 1 0
1 1 0 1 0 0 1 3 x 7
(ii)
Message bit, M[M3 M2 M1 M0]=[1 0 1 0]
Therefore, X=MG
1 0 0 0 1 0 1
G 1 0 1 00 1 0 0 1 1 1
0 0 1 0 1 1 0
0 0 0 1 0 1 1 4 x 7
Therefore, X= [1 0 1 0 : 0 1 1]
THANK YOU
L#29: ENCODER AND
DEODER FOR CYCLIC CODE
i 1
Hence,
G( p) p3 g 2 p 2 g1 p 1
Comparing, we get obtain
g1=1 and g2=0
Thus, the encoding for a (7,4) Hamming code is
Therefore, p 4 M ( p) p 4 [1 0 p p 2 p3 p 4 p5
Or p 4 M ( p) p 4 0 p 5 p 6 p 7 0 p 8 p 9
The code word polynomial can be obtained by adding p 4 M ( p) to the remainder polynomial C(p).
Thus,
X ( p) p M ( p) C ( p)
4
Therefore, C ( p) c0 c1 p c2 p 2 c3 p3
But we have obtained c(p) = p2, so, comparing the two, we obtain c0 = 0, c1 =0, c2 =1, and c3 = 0.
Therefore, Parity bits (c c c c ) (0100)
3 2 1 0
Substiruting n=10 and k=6 and n-k = 4 in the above equation, we shall have
3
G ( p) 1 gi p i p 4
i 1
Or G( p) p g3 p g 2 p g1 p 1
4 3 2
So, g1 = 0 g2 = 0 and g3 = 1
encoding arrangement
Cyclic Code Syndrome Calculation
• (n, k) cyclic code syndrome calculassions circuit:
• Cyclic codes are special linear block codes with one extra property. In a cyclic code, if a
code word is cyclically shifted (rotated), the result is another code word.
• A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital
networks and storage devices to detect accidental changes to raw data.
• Blocks of data entering these systems get a short check value attached, based on the
remainder of a polynomial division of their contents; on retrieval the calculation is repeated,
and corrective action can be taken against presumed data corruption if the check values do not
match.
Basic scheme for Cyclic Redundancy Checking
DIVISION IN CRC ENCODER
DIVISION IN CRC DECODER
CRC USING POLYNOMIAL
• We can use a polynomial to
represent a binary word.
• Each bit from right to left is
mapped onto a power term.
• The rightmost bit represents the
“0” power term. The bit next to it
the “1” power term, etc.
• If the bit is of value zero, the
power term is deleted from the
expression.
ADVANTAGES OF CYCLIC CODES
Fig.: (2, 1, 2)
convolutional
encoder
x ' j = m j −2 m j −1 m j
x '' j = m j −2 m j
The previous encoder can be described by two generator sequences:
• Note that g(1) and g(2) are called generator sequences of the encoder. Generator
sequences are nothing but impulse response of the encoder. The encoder output is
obtained by the convolution of the input sequence with the impulse response of
the encoder, hence the name convolutional code. Impulse response of the encoder
is the response of the encoder to a single “1” bit that moves through it.
• Numerous other convolutional codes are obtained by modifying the encoder
shown in figure. If we just change the connections to the mod-2 summers, then the
encoded output will change.
• The message bits in the register are combined by mod-2 addition to form the
encoded output. The input data to the encoder, which is assumed to be binary, is
shifted into and along the shift register k-bits at a time. The number of output bits
for each k-bit input sequence is n bits. The switch samples the all mod-2 adders in
sequence, once during each bit interval.
Some important terms of convolutional codes
Code rate, R
Initial condition
After 3rd clock pulse, the input bit “1” is discarded. So, the input bit 1
influences the output of the encoder for 2 shifts. Hence L (=2) is the
number of shifts over which a single message bit can influence the
encoder output bit.
Constraint length
L
x2= x ( 2)
i = g l( 2 ) mi −l , i = 0,1
l=0
Solution
(i) To obtain the bit steam xi(1) L
x1 = x
(1)
i = g l(1) mi −l , i = 0,1
l=0
Substituting i=0 x01 = g 01 .m0 = 11 = 1
Substituting i=1 x11 = g 01 .m1 + g11.m0 = (1 0) + (11) = 1
Similarly
x12 = g 01 .m2 + g11.m1 + g 12 .m0 = (1 0) + (1 0) + (11) = 1
X = {x x x x x x ......}
1 2
0 0
1 2
1 1
1 2
2 2
Codeword= 11 10 11 11 01 01 11
Transform domain approach of
convoluational code
Convolution in the time domain is transformed into multiplication of
Fourier transforms in frequency domain.
The general expression of the impulse response in the polynomial form:
G ( p ) = g 0 + g1 p + g 2 p 2 + ........
The polynomial corresponding to top and bottom adder are
G (1) ( p ) = g 01 + g11 p + g 12 p 2 + ........
G ( 2 ) ( p ) = g 02 + g12 p + g 22 p 2 + ........
So, G (1) ( p ) = 1 + p + p 2
For the bottom adder: g 1
0 = 1, g1
1
= 0, g 2 = 1,
1
So, G ( 2) ( p) = 1 + p 2
Note that we can easily find output of the encoder from any of the
above diagrams.
Given a sequence of message bits and the initial state, you can use
any of following 3 diagrams to find the resulting output bits.
Code Tree
The convention used to distinguish the input binary symbols is as
follows:
x2 m0 m2
If, m0=0
x1 0 0 0 0 x2 0 0 0
x1 x2 00
If, m0=1
x1 1 0 0 1 x2 1 0 1 x1 x2 11
The message sequence of
length m bits produce an
encoded sequence of length
n(m+L-1) bits.
Unipolar
single voltage level to represent data.
•Binary 1, high voltage
•Binary 0, no voltage is transmitted.
•There are two common variations of unipolar signalling:
1. Non-Return to Zero (NRZ)
2. Return to Zero (RZ)
Unipolar Non-Return to Zero (NRZ):
•Duration of the MARK pulse (Ƭ ) is equal to the duration (To) of
the symbol slot.
Advantages:
•Simplicity in implementation
• Doesn’t require a lot of bandwidth for transmission.
Disadvantages:
•Presence of DC level (indicated by spectral line at 0 Hz).
•Contains low frequency components. Causes “Signal Droop”
•Does not have any error correction capability.
•Does not posses any clocking component for ease of synchronisation.
•Is not Transparent. Long string of zeros causes loss of synchronisation.
Unipolar Return to Zero (RZ):
•MARK pulse (Ƭ ) is less than the duration (To) of the symbol slot.
•Fills only the first half of the time slot, returning to zero for the
second half.
Advantages:
•Simplicity in implementation.
•Presence of a spectral line at symbol rate which can be used as symbol timing
clock signal.
Disadvantages:
•Presence of DC level (indicated by spectral line at 0 Hz).
•Continuous part is non-zero at 0 Hz. Causes “Signal Droop”.
•Does not have any error correction capability.
•Occupies twice as much bandwidth as Unipolar NRZ.
•Is not Transparent.
Polar Signalling:
•Polar RZ •Polar NRZ
Polar NRZ:
•A binary 1 is represented by a pulse g1(t)
•A binary 0 by the opposite (or antipodal) pulse g0(t) = -g1(t).
Advantages:
•Simplicity in implementation.
•No DC component.
Disadvantages:
•Continuous part is non-zero at 0 Hz. Causes “Signal Droop”.
•Does not have any error correction capability.
•Does not posses any clocking component for ease of synchronisation.
•Is not transparent.
Polar RZ:
•A binary 1: A pulse g1(t)
•A binary 0: The opposite (or antipodal) pulse g0(t) = -g1(t).
•Fills only the first half of the time slot, returning to zero for the
second half.
Advantages:
•Simplicity in implementation.
•No DC component.
Disadvantages:
•Continuous part is non-zero at 0 Hz. Causes “Signal Droop”.
•Does not have any error correction capability.
•Occupies twice as much bandwidth as Polar NRZ.
Bipolar Signalling:
Alternate mark inversion (AMI)
•Uses three voltage levels (+V, 0, -V)
•0: Absence of a pulse
•1: Alternating voltage levels of +V and –V
Bipolar NRZ:
Bipolar RZ:
Bipolar Signalling:
Advantages:
•No DC component.
•Occupies less bandwidth than unipolar and polar NRZ schemes.
•Does not suffer from signal droop (suitable for transmission over
AC coupled lines).
•Possesses single error detection capability.
Disadvantages:
•Does not posses any clocking component for ease of synchronisation.
•Is not Transparent.
Coded mark inversion (CMI)
➢In telecommunication, coded mark inversion (CMI) is a non-
return-to-zero (NRZ) line code.
➢It encodes zero bits as a half bit time of zero followed by a half bit
time of one, and while one bits are encoded as a full bit time of a
constant level. The level used for one bits alternates each time one
is coded.
Manchester Signalling:
➢In telecommunication and data storage, Manchester code (also known as phase encoding,
or PE) is a line code in which the encoding of each data bit is either low then high, or high
then low, for equal time. It is a self-clocking signal with no DC component. Consequently,
electrical connections using a Manchester code are easily galvanically isolated.
➢Manchester code derives its name from its development at the University of Manchester,
where the coding was used for storing data on the magnetic drums of the Manchester Mark
1 computer.
Disadvantages:
•Because of the greater number of transitions it occupies a
significantly large bandwidth.
•Does not have error detection capability
THANK YOU
L#33: FDM and TDM system for
telemetry
where
or
Giving fm =6Hz
Time division multiplex system for telemetry
N . A. = n12 − n22
Emitted wavelength depends on bandgap energy • Transitions can take place from any energy state in
either band to any state in the other band. This results in a range of different wavelengths produced in this
spontaneous emission. This accounts for the fact that LEDs produce a range of wavelengths. Typically the
range is about 80 nm or so.
Light Emitting Semiconductors
LASER: Basic Operation
Types of Photodetectors
A PN junction can be formed by diffusing either a P-type impurity such as Boron, into a
N-type bulk silicon wafer, or a N-type impurity, such as Phosphorous, into a P-type bulk
silicon wafer.
Photodetection
Area of application for remote control is growing in the industrial organizations as well. Robots, for example, are specially
considered as workhorses in hazardous and hostile envirenments of manufacturing and such workhorses are controlled from a
safe remote distance.
Typical scheme of an industrial remote
control system
Remote stations in a pipe-line
The components in a communication-based supervisory control system are (a) master station, (b) several remote
stations, and (c) the interconnecting data links or channels. The master station is the central station from which
the remote stations are controlled. Basically there are units and equipment at such remote stations that need be
controlled by receiving the status report via telemetered data.
The remote stations in a pipe-line are the pumping stations at different sites where there are