A First Course in Digital Communications

Size: px
Start display at page:

Download "A First Course in Digital Communications"

Transcription

1 A First Course in Digital Communications Ha H. Nguyen and E. Shwedyk February 9 A First Course in Digital Communications 1/46

2 Introduction There are benefits to be gained when M-ary (M = 4 signaling methods are used rather than straightforward binary signaling. In general, M-ary communication is used when one needs to design a communication system that is bandwidth efficient. Unlike QPSK and its variations, the gain in bandwidth is accomplished at the expense of error performance. To use M-ary modulation, the bit stream is blocked into groups of λ bits the number of bit patterns is M = λ. The symbol transmission rate is r s = 1/T s = 1/(λT b = r b /λ symbols/sec there is a bandwidth saving of 1/λ compared to binary modulation. Shall consider M-ary ASK, PSK, QAM (quadrature amplitude modulation and FSK. A First Course in Digital Communications /46

3 Optimum Receiver for M-ary Signaling i m (t s i r(t mˆ i w(t w(t is zero-mean white Gaussian noise with power spectral density of N (watts/hz. Receiver needs to make the decision on the transmitted signal based on the received signal r(t = s i (t + w(t. The determination of the optimum receiver (with minimum error proceeds in a manner analogous to that for the binary case. A First Course in Digital Communications 3/46

4 Represent M signals by an orthonormal basis set, {φ n (t} N n=1, N M: s i (t = s i1 φ 1 (t + s i φ (t + + s in φ N (t, s ik = Ts s i (tφ k (tdt. Expand the received signal r(t into the series r(t = s i (t + w(t = r 1 φ 1 (t + r φ (t + + r N φ N (t + r N+1 φ N+1 (t + For k > N, the coefficients r k can be discarded. Need to partition the N-dimensional space formed by r = (r 1,r,...,r N into M regions so that the message error probability is minimized. A First Course in Digital Communications 4/46

5 N dimensional observation space r = ( r, r,, r 1 M R Choose s ( t or m R M M Choose s ( t or m M R Choose s ( t or m The optimum receiver is also the minimum-distance receiver: Choose m i if N k=1 (r k s ik < N k=1 (r k s jk ; j = 1,,...,M; j i. A First Course in Digital Communications 5/46

6 M-ary Coherent Amplitude-Shift Keying (M-ASK s i (t = V i cos(πf c t, t T s T s = [(i 1 ]φ 1 (t, φ 1 (t = cos(πf c t, t T s, T s i = 1,,...,M. s ( s ( s ( s (t s k M ( s M (t 1 t t 3 t (k 1 (M (M 1 1 t φ ( t 1 t = kt s s i (t r(t kt s r1 ( dt! " ( k 1 Ts mˆ i w(t φ 1 ( t N WGN, strength watts/hz A First Course in Digital Communications 6/46

7 Minimum-Distance Decision Rule for M-ASK ( s k (t, if k 3 < r1 < ( k 1, k =,3,...,M 1 Choose s 1 (t, if r 1 < s M (t, if r 1 > ( M 3. f ( r s ( 1 k t Choose s1 ( t (k 1 Choose s M ( t Choose s k ( t # r 1 A First Course in Digital Communications 7/46

8 Error Performance of M-ASK f ( r s ( 1 k t P[error] = M P[s i (t]p[error s i (t]. i=1 P[error s i (t] = Q ( / N, i =,3,...,M 1. P[error s i (t] = Q ( / N, i = 1,M. (M 1 ( P[error] = M Q / N. A First Course in Digital Communications 8/46 r 1

9 Modified M-ASK Constellation The maximum and average transmitted energies can be reduced, without any sacrifice in error probability, by changing the signal set to one which includes the negative version of each signal. s i (t = (i 1 M }{{} V i '( '* & E s = E b = 3 M i=1 E i M T s cos(πf c t, t T s, i = 1,,..., M. = 4M E s log M = (M 1 1 log M = 3 % φ 1 ( t φ ( t 1 M (i 1 M = (M 1. 1 i=1 (1 log ME b M 1 A First Course in Digital Communications 9/46

10 Probability of Symbol Error for M-ASK ( (M 1 P[error] = M Q 6E s (M = 1N ( (M 1 M Q 6log M M 1 ( P[bit error] = 1 (M 1 P[symbol error] = λ M log M Q 6log M M E b. N E b (with Gray mapping N P[symbol error] M= (W=1/T b M=4 (W=1/T b M=8 (W=1/3T b M=16 (W=1/4T b E /N (db b W is obtained by using the WT s = 1 rule-of-thumb. Here 1/T b is the bit rate (bits/s. A First Course in Digital Communications 1/46

11 Example of -ASK (BPSK and 4-ASK Signals 1 Baseband information signal 1 Tb Tb 3Tb 4Tb 5Tb 6Tb 7Tb 8Tb 9Tb 1Tb BPSK Signalling Tb Tb 3Tb 4Tb 5Tb 6Tb 7Tb 8Tb 9Tb 1Tb 4 ASK Signalling Tb 4Tb 6Tb 8Tb 1Tb A First Course in Digital Communications 11/46

12 M-ary Phase-Shift Keying (M-PSK [ s i (t = V cos πf c t ] (i 1π, t T s, M i = 1,,...,M; f c = k/t s, k integer; E s = V T s / joules [ ] [ ] (i 1π (i 1π s i (t = V cos cos(πf c t+v sin sin(πf c t. M M φ 1 (t = V cos(πf ct, φ (t = V sin(πf ct. Es Es s i1 = [ ] (i 1π E s cos, s i = E s sin M M [ (i 1π The signals lie on a circle of radius E s, and are spaced every π/m radians around the circle. ]. A First Course in Digital Communications 1/46

13 Signal Space Plot of 8-PSK [ s i (t = V cos πf c t ] (i 1π, t T s, M i = 1,,...,M; f c = k/t s, k integer; E s = V T s / joules φ ( t s3( t 11 1 s 4 ( t s( t 1 E s 11 s 5( t π 4 s1( t φ 1 ( t 111 s6( t s8( t 1 s7( t 11 A First Course in Digital Communications 13/46

14 Signal Space Plot of General M-PSK [ s i (t = V cos πf c t ] (i 1π, t T s, M i = 1,,...,M; f c = k/t s, k integer; E s = V T s / joules φ ( t s ( t E s π M π M s ( t 1 φ 1 ( t s M (t A First Course in Digital Communications 14/46

15 Optimum Receiver for M-PSK r(t φ 1 ( t T, s T- s ( dt ( dt t = T s t = T s r 1 r Compute ( r1 si 1 + ( r+ si for i = 1,,, M and choose the smallest mˆ i r φ ( t s ( t Region Choose s ( t P[error] = P[error s 1 (t] = 1 r 1,r Region 1 f(r 1, r s 1 (tdr 1 dr. E s π M s ( t 1 Region1 Choose s ( t 1 r 1 A First Course in Digital Communications 15/46

16 Lower Bound of P[error] of M-PSK r Region Choose s ( t r s ( t R 1 s ( t E s π M s ( t 1 Region1 Choose s ( t 1 r 1 π M s 1 ( t ( E s, Es sin ( π M r 1 P[error s 1 (t] > P[r 1,r fall in R 1 s 1 (t], or { ( π } P[error s 1 (t] > Q sin Es /N. M A First Course in Digital Communications 16/46

17 Upper Bound of P[error] of M-PSK r r π M s 1 ( t Region r Choose s 1 (, t R 1 s ( t ( E s Es sin ( π M s ( t E s π M s ( t 1 Region1 Choose s ( t 1 r 1 r π M ( E s, s ( t 1 Es r 1 sin ( π M R s M (t P[error] < P[r 1,r fall in R 1 s 1 (t] + P[r 1,r fall in R s 1 (t], or ( ( π P[error] < Q sin Es /N, M A First Course in Digital Communications 17/46

18 Symbol Error Probability of M-PSK 1 1 M=3 1 M= P[symbol error] Exact M=4 M= Lower bound Upper bound M= E /N (db b With a Gray mapping, the bit ( error probability is approximated as: P[bit error] M-PSK 1 log M Q λsin ( π Eb M N. A First Course in Digital Communications 18/46

19 Comparison of BPSK and M-PSK ( ( π P[error] M-PSK Q λsin Eb, where E s = λe b. M N P[error] BPSK = Q( E b /N. λ M M-ary BW/Binary BW λsin (π/m M-ary Energy/Binary Energy 3 8 1/ db / db 5 3 1/ db / db A First Course in Digital Communications 19/46

20 M-ary Quadrature Amplitude Modulation (M-QAM M-QAM constellations are two-dimensional and they involve inphase (I and quadrature (Q carriers: φ I (t = cos(πf c t, t T s, T s φ Q (t = sin(πf c t, t T s, T s The ith transmitted M-QAM signal is: s i (t = V I,i T s cos(πf c t + V Q,i T s sin(πf c t, t T s i = 1,,...,M = E i T s cos(πf c t θ i V I,i and V Q,i are the information-bearing discrete amplitudes of the two quadrature carriers, E i = VI,i + V Q,i and θ i = tan 1 (V Q,i /V I,i. A First Course in Digital Communications /46

21 Rectangle Rectangle Triangle M = 4 M = 8 (1,3 (1,7 (4,4 A First Course in Digital Communications 1/46

22 R 1 Rectangle Triangle (1,5,1 R M = 16 R 1 R 1 R R Hexagon (8,8 (4,1 A First Course in Digital Communications /46

23 A Simple Comparison of M-QAM Constellations With the same minimum distance of all the constellations, a more efficient signal constellation is the one that has smaller average transmitted energy :4./1 ; < =>?@AB CDEDF M = 8 E s for the rectangular, triangular, (1,7 and (4,4 constellations are found to be 1.5, 1.15, 1.16 and 1.183, respectively. A First Course in Digital Communications 3/46

24 Rectangular M-QAM φ ( t Q M = 64 M =16 M = 3 M = 8 φ I ( t M = 4 The signal components take value from the set of discrete values {(i 1 M /}, i = 1,,..., M. A First Course in Digital Communications 4/46

25 Modulation of Rectangular M-QAM Each group of λ = log M bits can be divided into λ I inphase bits and λ Q quadrature bits, where λ I + λ Q = λ. Inphase bits and quadrature bits modulate the inphase and quadrature carriers independently. Inphase bits Select VI, i GHI JKLMNOLHPHQ Infor. bits s (t Inphase ASK i cos(πf ct T s XYZ WN[VSL Quadrature bits Select VQ, i Quadrature ASK RST UQSVWJNMMHQ sin(πf ct T A First Course in Digital Communications 5/46 s

26 Demodulation of Rectangular M-QAM Due to the orthogonality of the inphase and quadrature signals, inphase and quadrature bits can be independently detected at the receiver. T s ( dt t = T s Inphase ASK decision r ( t = si ( t + w( t φi ( t = cos( π fct T s T s ( dt t = T s Quadrature ASK decision Multiplexer Decision φq ( t = sin( π fct T s (b Receiver The most practical rectangular QAM constellation is one which λ I = λ Q = λ/, i.e., M is a perfect square and the rectangle is a square. A First Course in Digital Communications 6/46

27 Symbol Error Probability of M-QAM For square constellations: P[error] = 1 P[correct] = 1 ( 1 P M [error], ( ( P M [error] = 1 1 3E s Q, M (M 1N where E s /N is the average SNR per symbol. For general rectangular constellations: [ ( ] 3E s P[error] 1 1 Q (M 1N ( 3λE b 4Q (M 1N where E b /N is the average SNR per bit. A First Course in Digital Communications 7/46

28 1 1 1 M=64 M=56 P[symbol error] M=4 M= M= Exact performance Upper bound E b /N (db A First Course in Digital Communications 8/46

29 Performance Comparison of M-PSK and M-QAM For M-PSK, approximate P[error] Q( Es N sin π M For M-QAM, use the upper bound 4Q( 3λEb (M 1N. Comparing the arguments of Q( for the two modulations gives: 3/(M 1 κ M = sin (π/m. M 1log 1 κ M db db 3 7. db db db db. A First Course in Digital Communications 9/46

30 Performance Comparison of M-ASK, M-PSK, M-QAM P[symbol error] QAM or QPSK M=4, 8, 16, M ASK M PSK M QAM E /N (db b A First Course in Digital Communications 3/46

31 M-ary Coherent Frequency-Shift Keying (M-FSK s i (t = { V cos(πfi t, t T s, elsewhere, i = 1,,..., M, where f i are chosen to have orthogonal signals over [, T s ]. ( 1 (k ± i T f i = s, (coherently orthogonal (, i =, 1,,... 1 (k ± i, (noncoherently orthogonal T s φ ( t s ( t E s E s s ( t 1 φ 1 ( t s ( t 3 E s φ ( t 3 A First Course in Digital Communications 31/46

32 Minimum-Distance Receiver of M-FSK Choose m i if M M (r k s ik < (r k s jk k=1 k=1 j = 1,,...,M; j i, r(t s ( t φ 1 = 1 ( t E s Tf s Tg s ( dt h ( dt Choose m i if r i > r j, j = 1,,...,M; j i. t = T s t = T s r 1 h r M \]^^_` a]` bcde`_a Decision sm ( t φm ( t = E s A First Course in Digital Communications 3/46

33 Symbol Error Probability of M-FSK P[correct s 1 (t] = = r 1= P[error] = P[error s 1 (t] = 1 P[correct s 1 (t]. P[(r < r 1 and and (r M < r 1 s 1 (t sent]. P[(r < r 1 and and (r M < r 1 {r 1 = r 1, s 1 (t}]f(r 1 s 1 (tdr. [(r < r 1 and and(r M < r 1 {r 1 = r 1, s 1 (t}] = P[r j < r 1 {r 1 = r 1, s 1 (t}] = P[correct] = r 1= [ r1 1 πn exp λ= r1 M P[(r j < r 1 {r 1 = r 1, s 1 (t}] j= 1 πn exp 1 πn exp { (r 1 E s N { λ { λ N } dr 1. N } dλ. } dλ] M 1 A First Course in Digital Communications 33/46

34 1 1 1 P[symbol error] M=64 M=3 M=16 M=4 M= M=8 1 6 P[error] = 1 1 π E b /N (db ( [ 1 π y M 1 e dx] x / exp 1 y log ME b N dy. A First Course in Digital Communications 34/46

35 Bit Error Probability of M-FSK Due to the symmetry of M-FSK constellation, all mappings from sequences of λ bits to signal points yield the same bit error probability. For equally likely signals, all the conditional error events are equiprobable and occur with probability Pr[symbol error]/(m 1 = Pr[symbol error]/( λ 1. There are ( λ k ways in which k bits out of λ may be in error The average number of bit errors per λ-bit symbol is λ ( λ Pr[symbol error] k k λ 1 k=1 = λ λ 1 λ Pr[symbol error]. 1 The probability of bit error is simply the above quantity divided by λ: Pr[bit error] = λ 1 λ Pr[symbol error]. 1 A First Course in Digital Communications 35/46

36 Union Bound on the Symbol Error Probability of M-FSK P[error] = P[(r 1 < r or (r 1 < r 3 or,,or (r 1 < r M s 1 (t]. Since the events are not mutually exclusive, the error probability is bounded by: P[error] < P[(r 1 < r s 1 (t]+ P[(r 1 < r 3 s 1 (t] + + P[(r 1 < r M s 1 (t]. ( Es But P[(r 1 < r j s 1 (t] = Q /N, j = 3,4,...,M. Then ( ( P[error] < (M 1Q Es /N < MQ Es /N < Me Es/(N. { where the bound Q(x < exp x } has been used. A First Course in Digital Communications 36/46

37 An Upper Bound on Q(x Q(x = 1 x 1 π exp } { λ dλ < exp } { x Q(x and its simple upper bound Q(x exp( x / x A First Course in Digital Communications 37/46

38 Interpretations of P[error] < Me E s/(n 1 Let M = λ = e λln and E s = λe b. Then P[error] < e λ ln e λe b/(n = e λ(e b/n ln /. As λ, or equivalently, as M, the probability of error approaches zero exponentially, provided that E b N > ln = 1.39 = 1.4 db. Since E s = λe b = V T s /, then P[error] < e λ ln e V T s/(4n = e Ts[ r b ln+v /(4N ] If r b ln + V /(4N >, or r b < V 4N ln the probability or error tends to zero as T s or M becomes larger and larger. A First Course in Digital Communications 38/46

39 Comparison of M-ary Signaling Techniques A compact and meaningful comparison is based on the bit rate-to bandwidth ratio, r b /W (bandwidth efficiency versus the SNR per bit, E b /N (power efficiency required to achieve a given P[error]. M-ASK with single-sideband (SSB transmission, W = 1/(T s and ( rb = log W M (bits/s/hz. SSB-ASK M-PSK (M > must have double sidebands, W = 1/T s and ( rb = log W M, (bits/s/hz, PSK (Rectangular QAM has twice the rate of ASK, but must have double sidebands QAM and SSB-ASK have the same bandwidth efficiency. For M-FSK with the minimum frequency separation of 1/(T s, W = M T s = M (λ/r b = M log M r b, and ( rb = log M W FSK M. A First Course in Digital Communications 39/46

40 USSB Transmission of BPSK Signal cos( π f t c m( t + s ( t USSB LTI Filter + h( t H( f H ( f = j sgn( f mˆ ( t sin( π f t ( ˆm(t = m(t h(t = m(t 1 = 1 πt π c m(t λ dλ λ A First Course in Digital Communications 4/46

41 Example of USSB-BPSK Transmitted Signal V (a BPSK signal V Tb Tb 3Tb 4Tb 5Tb 6Tb t (b USSB BPSK signal V V Tb Tb 3Tb 4Tb 5Tb 6Tb 7Tb 8Tb t A First Course in Digital Communications 41/46

42 Power-Bandwidth Plane (At P[error] = 1 5 r b /W (bits/s/hz M=4 M= M=8 M=16 M=3 M=16 M=8 M=64 M=16 M=3 M=64 Bandwidth limited region: r b /W>1 Power limited region: r b /W<1. M=64 PSK QAM and ASK (SSB.1 FSK SNR per bit, E b /N (db A First Course in Digital Communications 4/46

43 Two Statements Consider information transmission over an additive white Gaussian noise (AWGN channel. The average transmitted signal power is P av, the noise power spectral density is N / and the bandwidth is W. Two statements are: 1 For each transmission rate r b, there is a corresponding limit on the probability of bit error one can achieve. For some appropriate signalling rate r b, there is no limit on the probability of bit error one can achieve, i.e., one can achieve error-free transmission. Which statement sounds reasonable to you? A First Course in Digital Communications 43/46

44 Shannon s Channel Capacity ( C = W log 1 + P av, WN where W is bandwidth in Hz, P av is the average power and N / is the two-sided power spectral density of the noise. Shannon proved that it is theoretically possible to transmit information at any rate r b, where r b C, with an arbitrarily small error probability by using a sufficiently complicated modulation scheme. For r b > C, it is not possible to achieve an arbitrarily small error probability. Shannon s work showed that the values of P av, N and W set a limit on transmission rate, not on error probability! The normalized channel capacity C/W (bits/s/hz is: C W = log ( 1 + P av WN = log ( 1 + C W A First Course in Digital Communications 44/46 E b N.

45 Shannon s Capacity Curve E b N = C/W 1 C/W r b /W (bits/s/hz Shannon limit Channel capacity limit, C/W M=4 M= M=8 M=16 M=3 M=16 M=8 M=64 M=16 M=3 M=64 Bandwidth limited region: r b /W>1 Power limited region: r b /W<1. M=64 PSK QAM and ASK (SSB.1 FSK SNR per bit, E /N (db b A First Course in Digital Communications 45/46

46 Spectrum Efficiency of DVB-S Standard Example : 8 Mbit/s in 36MHz at 9.5dB with 8PSK Spectrum Efficiency Example 1: 5Mbit/s in 36MHz at 4dB with QPSK SNR (db More information: A First Course in Digital Communications 46/46

Digital Band-pass Modulation PROF. MICHAEL TSAI 2011/11/10

Digital Band-pass Modulation PROF. MICHAEL TSAI 2011/11/10 Digital Band-pass Modulation PROF. MICHAEL TSAI 211/11/1 Band-pass Signal Representation a t g t General form: 2πf c t + φ t g t = a t cos 2πf c t + φ t Envelope Phase Envelope is always non-negative,

More information

ECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture)

ECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture) ECE 564/645 - Digital Communications, Spring 018 Homework # Due: March 19 (In Lecture) 1. Consider a binary communication system over a 1-dimensional vector channel where message m 1 is sent by signaling

More information

ρ = sin(2π ft) 2π ft To find the minimum value of the correlation, we set the derivative of ρ with respect to f equal to zero.

ρ = sin(2π ft) 2π ft To find the minimum value of the correlation, we set the derivative of ρ with respect to f equal to zero. Problem 5.1 : The correlation of the two signals in binary FSK is: ρ = sin(π ft) π ft To find the minimum value of the correlation, we set the derivative of ρ with respect to f equal to zero. Thus: ϑρ

More information

Computing Probability of Symbol Error

Computing Probability of Symbol Error Computing Probability of Symbol Error I When decision boundaries intersect at right angles, then it is possible to compute the error probability exactly in closed form. I The result will be in terms of

More information

X b s t w t t dt b E ( ) t dt

X b s t w t t dt b E ( ) t dt Consider the following correlator receiver architecture: T dt X si () t S xt () * () t Wt () T dt X Suppose s (t) is sent, then * () t t T T T X s t w t t dt E t t dt w t dt E W t t T T T X s t w t t dt

More information

A Simple Example Binary Hypothesis Testing Optimal Receiver Frontend M-ary Signal Sets Message Sequences. possible signals has been transmitted.

A Simple Example Binary Hypothesis Testing Optimal Receiver Frontend M-ary Signal Sets Message Sequences. possible signals has been transmitted. Introduction I We have focused on the problem of deciding which of two possible signals has been transmitted. I Binary Signal Sets I We will generalize the design of optimum (MPE) receivers to signal sets

More information

Digital Transmission Methods S

Digital Transmission Methods S Digital ransmission ethods S-7.5 Second Exercise Session Hypothesis esting Decision aking Gram-Schmidt method Detection.K.K. Communication Laboratory 5//6 Konstantinos.koufos@tkk.fi Exercise We assume

More information

EE4304 C-term 2007: Lecture 17 Supplemental Slides

EE4304 C-term 2007: Lecture 17 Supplemental Slides EE434 C-term 27: Lecture 17 Supplemental Slides D. Richard Brown III Worcester Polytechnic Institute, Department of Electrical and Computer Engineering February 5, 27 Geometric Representation: Optimal

More information

EE456 Digital Communications

EE456 Digital Communications EE456 Digital Communications Professor Ha Nguyen September 5 EE456 Digital Communications Block Diagram of Binary Communication Systems m ( t { b k } b k = s( t b = s ( t k m ˆ ( t { bˆ } k r( t Bits in

More information

a) Find the compact (i.e. smallest) basis set required to ensure sufficient statistics.

a) Find the compact (i.e. smallest) basis set required to ensure sufficient statistics. Digital Modulation and Coding Tutorial-1 1. Consider the signal set shown below in Fig.1 a) Find the compact (i.e. smallest) basis set required to ensure sufficient statistics. b) What is the minimum Euclidean

More information

Modulation & Coding for the Gaussian Channel

Modulation & Coding for the Gaussian Channel Modulation & Coding for the Gaussian Channel Trivandrum School on Communication, Coding & Networking January 27 30, 2017 Lakshmi Prasad Natarajan Dept. of Electrical Engineering Indian Institute of Technology

More information

Digital Communications: A Discrete-Time Approach M. Rice. Errata. Page xiii, first paragraph, bare witness should be bear witness

Digital Communications: A Discrete-Time Approach M. Rice. Errata. Page xiii, first paragraph, bare witness should be bear witness Digital Communications: A Discrete-Time Approach M. Rice Errata Foreword Page xiii, first paragraph, bare witness should be bear witness Page xxi, last paragraph, You know who you. should be You know who

More information

ECE 564/645 - Digital Communications, Spring 2018 Midterm Exam #1 March 22nd, 7:00-9:00pm Marston 220

ECE 564/645 - Digital Communications, Spring 2018 Midterm Exam #1 March 22nd, 7:00-9:00pm Marston 220 ECE 564/645 - Digital Communications, Spring 08 Midterm Exam # March nd, 7:00-9:00pm Marston 0 Overview The exam consists of four problems for 0 points (ECE 564) or 5 points (ECE 645). The points for each

More information

Summary: SER formulation. Binary antipodal constellation. Generic binary constellation. Constellation gain. 2D constellations

Summary: SER formulation. Binary antipodal constellation. Generic binary constellation. Constellation gain. 2D constellations TUTORIAL ON DIGITAL MODULATIONS Part 8a: Error probability A [2011-01-07] 07] Roberto Garello, Politecnico di Torino Free download (for personal use only) at: www.tlc.polito.it/garello 1 Part 8a: Error

More information

8 PAM BER/SER Monte Carlo Simulation

8 PAM BER/SER Monte Carlo Simulation xercise.1 8 PAM BR/SR Monte Carlo Simulation - Simulate a 8 level PAM communication system and calculate bit and symbol error ratios (BR/SR). - Plot the calculated and simulated SR and BR curves. - Plot

More information

CHAPTER 14. Based on the info about the scattering function we know that the multipath spread is T m =1ms, and the Doppler spread is B d =0.2 Hz.

CHAPTER 14. Based on the info about the scattering function we know that the multipath spread is T m =1ms, and the Doppler spread is B d =0.2 Hz. CHAPTER 4 Problem 4. : Based on the info about the scattering function we know that the multipath spread is T m =ms, and the Doppler spread is B d =. Hz. (a) (i) T m = 3 sec (ii) B d =. Hz (iii) ( t) c

More information

This examination consists of 11 pages. Please check that you have a complete copy. Time: 2.5 hrs INSTRUCTIONS

This examination consists of 11 pages. Please check that you have a complete copy. Time: 2.5 hrs INSTRUCTIONS THE UNIVERSITY OF BRITISH COLUMBIA Department of Electrical and Computer Engineering EECE 564 Detection and Estimation of Signals in Noise Final Examination 6 December 2006 This examination consists of

More information

CHANNEL CAPACITY CALCULATIONS FOR M ARY N DIMENSIONAL SIGNAL SETS

CHANNEL CAPACITY CALCULATIONS FOR M ARY N DIMENSIONAL SIGNAL SETS THE UNIVERSITY OF SOUTH AUSTRALIA SCHOOL OF ELECTRONIC ENGINEERING CHANNEL CAPACITY CALCULATIONS FOR M ARY N DIMENSIONAL SIGNAL SETS Philip Edward McIllree, B.Eng. A thesis submitted in fulfilment of the

More information

Digital Modulation 1

Digital Modulation 1 Digital Modulation 1 Lecture Notes Ingmar Land and Bernard H. Fleury Navigation and Communications () Department of Electronic Systems Aalborg University, DK Version: February 5, 27 i Contents I Basic

More information

EE4512 Analog and Digital Communications Chapter 4. Chapter 4 Receiver Design

EE4512 Analog and Digital Communications Chapter 4. Chapter 4 Receiver Design Chapter 4 Receiver Design Chapter 4 Receiver Design Probability of Bit Error Pages 124-149 149 Probability of Bit Error The low pass filtered and sampled PAM signal results in an expression for the probability

More information

Analog Electronics 2 ICS905

Analog Electronics 2 ICS905 Analog Electronics 2 ICS905 G. Rodriguez-Guisantes Dépt. COMELEC http://perso.telecom-paristech.fr/ rodrigez/ens/cycle_master/ November 2016 2/ 67 Schedule Radio channel characteristics ; Analysis and

More information

Es e j4φ +4N n. 16 KE s /N 0. σ 2ˆφ4 1 γ s. p(φ e )= exp 1 ( 2πσ φ b cos N 2 φ e 0

Es e j4φ +4N n. 16 KE s /N 0. σ 2ˆφ4 1 γ s. p(φ e )= exp 1 ( 2πσ φ b cos N 2 φ e 0 Problem 6.15 : he received signal-plus-noise vector at the output of the matched filter may be represented as (see (5-2-63) for example) : r n = E s e j(θn φ) + N n where θ n =0,π/2,π,3π/2 for QPSK, and

More information

Power Spectral Density of Digital Modulation Schemes

Power Spectral Density of Digital Modulation Schemes Digital Communication, Continuation Course Power Spectral Density of Digital Modulation Schemes Mikael Olofsson Emil Björnson Department of Electrical Engineering ISY) Linköping University, SE-581 83 Linköping,

More information

Optimum Soft Decision Decoding of Linear Block Codes

Optimum Soft Decision Decoding of Linear Block Codes Optimum Soft Decision Decoding of Linear Block Codes {m i } Channel encoder C=(C n-1,,c 0 ) BPSK S(t) (n,k,d) linear modulator block code Optimal receiver AWGN Assume that [n,k,d] linear block code C is

More information

Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems

Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems Department of Electrical Engineering, College of Engineering, Basrah University Basrah Iraq,

More information

The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals

The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals Clemson University TigerPrints All Theses Theses 1-015 The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals Allison Manhard Clemson University,

More information

Carrier Transmission. The transmitted signal is y(t) = k a kh(t kt ). What is the bandwidth? More generally, what is its Fourier transform?

Carrier Transmission. The transmitted signal is y(t) = k a kh(t kt ). What is the bandwidth? More generally, what is its Fourier transform? The transmitted signal is y(t) = k a kh(t kt ). What is the bandwidth? More generally, what is its Fourier transform? The baseband signal is y(t) = k a kh(t kt ). The power spectral density of the transmission

More information

Performance of Coherent Binary Phase-Shift Keying (BPSK) with Costas-Loop Tracking in the Presence of Interference

Performance of Coherent Binary Phase-Shift Keying (BPSK) with Costas-Loop Tracking in the Presence of Interference TMO Progress Report 4-139 November 15, 1999 Performance of Coherent Binary Phase-Shift Keying (BPSK) with Costas-Loop Tracking in the Presence of Interference M. K. Simon 1 The bit-error probability performance

More information

Digital Communications

Digital Communications Digital Communications Chapter 5 Carrier and Symbol Synchronization Po-Ning Chen, Professor Institute of Communications Engineering National Chiao-Tung University, Taiwan Digital Communications Ver 218.7.26

More information

Consider a 2-D constellation, suppose that basis signals =cosine and sine. Each constellation symbol corresponds to a vector with two real components

Consider a 2-D constellation, suppose that basis signals =cosine and sine. Each constellation symbol corresponds to a vector with two real components TUTORIAL ON DIGITAL MODULATIONS Part 3: 4-PSK [2--26] Roberto Garello, Politecnico di Torino Free download (for personal use only) at: www.tlc.polito.it/garello Quadrature modulation Consider a 2-D constellation,

More information

Summary II: Modulation and Demodulation

Summary II: Modulation and Demodulation Summary II: Modulation and Demodulation Instructor : Jun Chen Department of Electrical and Computer Engineering, McMaster University Room: ITB A1, ext. 0163 Email: junchen@mail.ece.mcmaster.ca Website:

More information

EE456 Digital Communications

EE456 Digital Communications EE456 Digial Communicaions Professor Ha Nguyen Sepember 6 EE456 Digial Communicaions Inroducion o Basic Digial Passband Modulaion Baseband ransmission is conduced a low frequencies. Passband ransmission

More information

EE6604 Personal & Mobile Communications. Week 13. Multi-antenna Techniques

EE6604 Personal & Mobile Communications. Week 13. Multi-antenna Techniques EE6604 Personal & Mobile Communications Week 13 Multi-antenna Techniques 1 Diversity Methods Diversity combats fading by providing the receiver with multiple uncorrelated replicas of the same information

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

PSK bit mappings with good minimax error probability

PSK bit mappings with good minimax error probability PSK bit mappings with good minimax error probability Erik Agrell Department of Signals and Systems Chalmers University of Technology 4196 Göteborg, Sweden Email: agrell@chalmers.se Erik G. Ström Department

More information

Residual Versus Suppressed-Carrier Coherent Communications

Residual Versus Suppressed-Carrier Coherent Communications TDA Progress Report -7 November 5, 996 Residual Versus Suppressed-Carrier Coherent Communications M. K. Simon and S. Million Communications and Systems Research Section This article addresses the issue

More information

Problem 7.7 : We assume that P (x i )=1/3, i =1, 2, 3. Then P (y 1 )= 1 ((1 p)+p) = P (y j )=1/3, j=2, 3. Hence : and similarly.

Problem 7.7 : We assume that P (x i )=1/3, i =1, 2, 3. Then P (y 1 )= 1 ((1 p)+p) = P (y j )=1/3, j=2, 3. Hence : and similarly. (b) We note that the above capacity is the same to the capacity of the binary symmetric channel. Indeed, if we considerthe grouping of the output symbols into a = {y 1,y 2 } and b = {y 3,y 4 } we get a

More information

Direct-Sequence Spread-Spectrum

Direct-Sequence Spread-Spectrum Chapter 3 Direct-Sequence Spread-Spectrum In this chapter we consider direct-sequence spread-spectrum systems. Unlike frequency-hopping, a direct-sequence signal occupies the entire bandwidth continuously.

More information

EE401: Advanced Communication Theory

EE401: Advanced Communication Theory EE401: Advanced Communication Theory Professor A. Manikas Chair of Communications and Array Processing Imperial College London Introductory Concepts Prof. A. Manikas (Imperial College) EE.401: Introductory

More information

Mapper & De-Mapper System Document

Mapper & De-Mapper System Document Mapper & De-Mapper System Document Mapper / De-Mapper Table of Contents. High Level System and Function Block. Mapper description 2. Demodulator Function block 2. Decoder block 2.. De-Mapper 2..2 Implementation

More information

Kevin Buckley a i. communication. information source. modulator. encoder. channel. encoder. information. demodulator decoder. C k.

Kevin Buckley a i. communication. information source. modulator. encoder. channel. encoder. information. demodulator decoder. C k. Kevin Buckley - -4 ECE877 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set Review of Digital Communications, Introduction to

More information

ELECTRONICS & COMMUNICATIONS DIGITAL COMMUNICATIONS

ELECTRONICS & COMMUNICATIONS DIGITAL COMMUNICATIONS EC 32 (CR) Total No. of Questions :09] [Total No. of Pages : 02 III/IV B.Tech. DEGREE EXAMINATIONS, APRIL/MAY- 207 Second Semester ELECTRONICS & COMMUNICATIONS DIGITAL COMMUNICATIONS Time: Three Hours

More information

Lecture 7: Wireless Channels and Diversity Advanced Digital Communications (EQ2410) 1

Lecture 7: Wireless Channels and Diversity Advanced Digital Communications (EQ2410) 1 Wireless : Wireless Advanced Digital Communications (EQ2410) 1 Thursday, Feb. 11, 2016 10:00-12:00, B24 1 Textbook: U. Madhow, Fundamentals of Digital Communications, 2008 1 / 15 Wireless Lecture 1-6 Equalization

More information

5 Analog carrier modulation with noise

5 Analog carrier modulation with noise 5 Analog carrier modulation with noise 5. Noisy receiver model Assume that the modulated signal x(t) is passed through an additive White Gaussian noise channel. A noisy receiver model is illustrated in

More information

Carrier Synchronization

Carrier Synchronization Chapter 8 Carrier Synchronization Marvin K. Simon and Jon Hamkins Traditionally, carrier synchronization (sync) techniques have been developed assuming that the modulation format and signal constellation

More information

Square Root Raised Cosine Filter

Square Root Raised Cosine Filter Wireless Information Transmission System Lab. Square Root Raised Cosine Filter Institute of Communications Engineering National Sun Yat-sen University Introduction We consider the problem of signal design

More information

Performance Analysis of Spread Spectrum CDMA systems

Performance Analysis of Spread Spectrum CDMA systems 1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department

More information

GEORGIA INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING Final Examination - Fall 2015 EE 4601: Communication Systems

GEORGIA INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING Final Examination - Fall 2015 EE 4601: Communication Systems GEORGIA INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING Final Examination - Fall 2015 EE 4601: Communication Systems Aids Allowed: 2 8 1/2 X11 crib sheets, calculator DATE: Tuesday

More information

Mobile Communications (KECE425) Lecture Note Prof. Young-Chai Ko

Mobile Communications (KECE425) Lecture Note Prof. Young-Chai Ko Mobile Communications (KECE425) Lecture Note 20 5-19-2014 Prof Young-Chai Ko Summary Complexity issues of diversity systems ADC and Nyquist sampling theorem Transmit diversity Channel is known at the transmitter

More information

Detecting Parametric Signals in Noise Having Exactly Known Pdf/Pmf

Detecting Parametric Signals in Noise Having Exactly Known Pdf/Pmf Detecting Parametric Signals in Noise Having Exactly Known Pdf/Pmf Reading: Ch. 5 in Kay-II. (Part of) Ch. III.B in Poor. EE 527, Detection and Estimation Theory, # 5c Detecting Parametric Signals in Noise

More information

Coding theory: Applications

Coding theory: Applications INF 244 a) Textbook: Lin and Costello b) Lectures (Tu+Th 12.15-14) covering roughly Chapters 1,9-12, and 14-18 c) Weekly exercises: For your convenience d) Mandatory problem: Programming project (counts

More information

Chapter 9 Fundamental Limits in Information Theory

Chapter 9 Fundamental Limits in Information Theory Chapter 9 Fundamental Limits in Information Theory Information Theory is the fundamental theory behind information manipulation, including data compression and data transmission. 9.1 Introduction o For

More information

Solutions to Selected Problems

Solutions to Selected Problems Solutions to Selected Problems from Madhow: Fundamentals of Digital Communication and from Johannesson & Zigangirov: Fundamentals of Convolutional Coding Saif K. Mohammed Department of Electrical Engineering

More information

Figure 1.1 (a) Model of a communication system, and (b) signal processing functions.

Figure 1.1 (a) Model of a communication system, and (b) signal processing functions. . Introduction to Signals and Operations Model of a Communication System [] Figure. (a) Model of a communication system, and (b) signal processing functions. Classification of Signals. Continuous-time

More information

Revision of Lecture 5

Revision of Lecture 5 Revision of Lecture 5 Information transferring across channels Channel characteristics and binary symmetric channel Average mutual information Average mutual information tells us what happens to information

More information

EE303: Communication Systems

EE303: Communication Systems EE303: Communication Systems Professor A. Manikas Chair of Communications and Array Processing Imperial College London Introductory Concepts Prof. A. Manikas (Imperial College) EE303: Introductory Concepts

More information

Example: Bipolar NRZ (non-return-to-zero) signaling

Example: Bipolar NRZ (non-return-to-zero) signaling Baseand Data Transmission Data are sent without using a carrier signal Example: Bipolar NRZ (non-return-to-zero signaling is represented y is represented y T A -A T : it duration is represented y BT. Passand

More information

Signal Design for Band-Limited Channels

Signal Design for Band-Limited Channels Wireless Information Transmission System Lab. Signal Design for Band-Limited Channels Institute of Communications Engineering National Sun Yat-sen University Introduction We consider the problem of signal

More information

Communication Theory Summary of Important Definitions and Results

Communication Theory Summary of Important Definitions and Results Signal and system theory Convolution of signals x(t) h(t) = y(t): Fourier Transform: Communication Theory Summary of Important Definitions and Results X(ω) = X(ω) = y(t) = X(ω) = j x(t) e jωt dt, 0 Properties

More information

ELEG 3124 SYSTEMS AND SIGNALS Ch. 5 Fourier Transform

ELEG 3124 SYSTEMS AND SIGNALS Ch. 5 Fourier Transform Department of Electrical Engineering University of Arkansas ELEG 3124 SYSTEMS AND SIGNALS Ch. 5 Fourier Transform Dr. Jingxian Wu wuj@uark.edu OUTLINE 2 Introduction Fourier Transform Properties of Fourier

More information

EE6604 Personal & Mobile Communications. Week 15. OFDM on AWGN and ISI Channels

EE6604 Personal & Mobile Communications. Week 15. OFDM on AWGN and ISI Channels EE6604 Personal & Mobile Communications Week 15 OFDM on AWGN and ISI Channels 1 { x k } x 0 x 1 x x x N- 2 N- 1 IDFT X X X X 0 1 N- 2 N- 1 { X n } insert guard { g X n } g X I n { } D/A ~ si ( t) X g X

More information

Performance of small signal sets

Performance of small signal sets 42 Chapter 5 Performance of small signal sets In this chapter, we show how to estimate the performance of small-to-moderate-sized signal constellations on the discrete-time AWGN channel. With equiprobable

More information

Chapter 4: Continuous channel and its capacity

Chapter 4: Continuous channel and its capacity meghdadi@ensil.unilim.fr Reference : Elements of Information Theory by Cover and Thomas Continuous random variable Gaussian multivariate random variable AWGN Band limited channel Parallel channels Flat

More information

EE 661: Modulation Theory Solutions to Homework 6

EE 661: Modulation Theory Solutions to Homework 6 EE 66: Modulation Theory Solutions to Homework 6. Solution to problem. a) Binary PAM: Since 2W = 4 KHz and β = 0.5, the minimum T is the solution to (+β)/(2t ) = W = 2 0 3 Hz. Thus, we have the maximum

More information

ELEC546 Review of Information Theory

ELEC546 Review of Information Theory ELEC546 Review of Information Theory Vincent Lau 1/1/004 1 Review of Information Theory Entropy: Measure of uncertainty of a random variable X. The entropy of X, H(X), is given by: If X is a discrete random

More information

Lecture 15: Thu Feb 28, 2019

Lecture 15: Thu Feb 28, 2019 Lecture 15: Thu Feb 28, 2019 Announce: HW5 posted Lecture: The AWGN waveform channel Projecting temporally AWGN leads to spatially AWGN sufficiency of projection: irrelevancy theorem in waveform AWGN:

More information

Constellation Shaping for Communication Channels with Quantized Outputs

Constellation Shaping for Communication Channels with Quantized Outputs Constellation Shaping for Communication Channels with Quantized Outputs Chandana Nannapaneni, Matthew C. Valenti, and Xingyu Xiang Lane Department of Computer Science and Electrical Engineering West Virginia

More information

Lecture 2. Capacity of the Gaussian channel

Lecture 2. Capacity of the Gaussian channel Spring, 207 5237S, Wireless Communications II 2. Lecture 2 Capacity of the Gaussian channel Review on basic concepts in inf. theory ( Cover&Thomas: Elements of Inf. Theory, Tse&Viswanath: Appendix B) AWGN

More information

On the Low-SNR Capacity of Phase-Shift Keying with Hard-Decision Detection

On the Low-SNR Capacity of Phase-Shift Keying with Hard-Decision Detection On the Low-SNR Capacity of Phase-Shift Keying with Hard-Decision Detection ustafa Cenk Gursoy Department of Electrical Engineering University of Nebraska-Lincoln, Lincoln, NE 68588 Email: gursoy@engr.unl.edu

More information

Digital Modulation 2

Digital Modulation 2 Digital Modulation 2 Lecture Notes Ingmar Land and Bernard H. Fleury Department of Electronic Systems Aalborg University Version: November 15, 2006 i Contents 1 Continuous-Phase Modulation 1 1.1 General

More information

Lattices for Communication Engineers

Lattices for Communication Engineers Lattices for Communication Engineers Jean-Claude Belfiore Télécom ParisTech CNRS, LTCI UMR 5141 February, 22 2011 Nanyang Technological University - SPMS Part I Introduction Signal Space The transmission

More information

16.36 Communication Systems Engineering

16.36 Communication Systems Engineering MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

More information

ELEG 635 Digital Communication Theory. Lecture 9

ELEG 635 Digital Communication Theory. Lecture 9 ELEG 635 Digital Cmmunicatin Thery Lecture 9 10501 Agenda Optimal receiver fr PSK Effects f fading n BER perfrmance Tw ray mdel Pulse shaping Rectangle Raised csine Rt raised csine Receivers and pulse

More information

Channel capacity. Outline : 1. Source entropy 2. Discrete memoryless channel 3. Mutual information 4. Channel capacity 5.

Channel capacity. Outline : 1. Source entropy 2. Discrete memoryless channel 3. Mutual information 4. Channel capacity 5. Channel capacity Outline : 1. Source entropy 2. Discrete memoryless channel 3. Mutual information 4. Channel capacity 5. Exercices Exercise session 11 : Channel capacity 1 1. Source entropy Given X a memoryless

More information

CS6304 / Analog and Digital Communication UNIT IV - SOURCE AND ERROR CONTROL CODING PART A 1. What is the use of error control coding? The main use of error control coding is to reduce the overall probability

More information

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Michael R. Souryal and Huiqing You National Institute of Standards and Technology Advanced Network Technologies Division Gaithersburg,

More information

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM ANAYSIS OF A PARTIA DECORREATOR IN A MUTI-CE DS/CDMA SYSTEM Mohammad Saquib ECE Department, SU Baton Rouge, A 70803-590 e-mail: saquib@winlab.rutgers.edu Roy Yates WINAB, Rutgers University Piscataway

More information

Principles of Communications Lecture 8: Baseband Communication Systems. Chih-Wei Liu 劉志尉 National Chiao Tung University

Principles of Communications Lecture 8: Baseband Communication Systems. Chih-Wei Liu 劉志尉 National Chiao Tung University Principles of Communications Lecture 8: Baseband Communication Systems Chih-Wei Liu 劉志尉 National Chiao Tung University cwliu@twins.ee.nctu.edu.tw Outlines Introduction Line codes Effects of filtering Pulse

More information

Analysis of Receiver Quantization in Wireless Communication Systems

Analysis of Receiver Quantization in Wireless Communication Systems Analysis of Receiver Quantization in Wireless Communication Systems Theory and Implementation Gareth B. Middleton Committee: Dr. Behnaam Aazhang Dr. Ashutosh Sabharwal Dr. Joseph Cavallaro 18 April 2007

More information

Lecture 18: Gaussian Channel

Lecture 18: Gaussian Channel Lecture 18: Gaussian Channel Gaussian channel Gaussian channel capacity Dr. Yao Xie, ECE587, Information Theory, Duke University Mona Lisa in AWGN Mona Lisa Noisy Mona Lisa 100 100 200 200 300 300 400

More information

Carrier and Timing Synchronization in Digital Modems

Carrier and Timing Synchronization in Digital Modems Carrier and Timing Synchronization in Digital Modems Synchronization-3 Carrier Phase Lock fred harris 21-21 June, 218 Locking to Carrier of Modulated Signal with Suppressed Carrier 2 How Can One Lock to

More information

Symbol Synchronization

Symbol Synchronization Chapter 10 Symbol Synchronization Marvin K. Simon As we have seen in other chapters, the operation and performance of various receiver functions can be quite sensitive to knowledge of the timing data transition

More information

Fast Near-Optimal Energy Allocation for Multimedia Loading on Multicarrier Systems

Fast Near-Optimal Energy Allocation for Multimedia Loading on Multicarrier Systems Fast Near-Optimal Energy Allocation for Multimedia Loading on Multicarrier Systems Michael A. Enright and C.-C. Jay Kuo Department of Electrical Engineering and Signal and Image Processing Institute University

More information

that efficiently utilizes the total available channel bandwidth W.

that efficiently utilizes the total available channel bandwidth W. Signal Design for Band-Limited Channels Wireless Information Transmission System Lab. Institute of Communications Engineering g National Sun Yat-sen University Introduction We consider the problem of signal

More information

Block 2: Introduction to Information Theory

Block 2: Introduction to Information Theory Block 2: Introduction to Information Theory Francisco J. Escribano April 26, 2015 Francisco J. Escribano Block 2: Introduction to Information Theory April 26, 2015 1 / 51 Table of contents 1 Motivation

More information

2. SPECTRAL ANALYSIS APPLIED TO STOCHASTIC PROCESSES

2. SPECTRAL ANALYSIS APPLIED TO STOCHASTIC PROCESSES 2. SPECTRAL ANALYSIS APPLIED TO STOCHASTIC PROCESSES 2.0 THEOREM OF WIENER- KHINTCHINE An important technique in the study of deterministic signals consists in using harmonic functions to gain the spectral

More information

Trellis Coded Modulation

Trellis Coded Modulation Trellis Coded Modulation Trellis coded modulation (TCM) is a marriage between codes that live on trellises and signal designs We have already seen that trellises are the preferred way to view convolutional

More information

Revision of Lecture 4

Revision of Lecture 4 Revision of Lecture 4 We have completed studying digital sources from information theory viewpoint We have learnt all fundamental principles for source coding, provided by information theory Practical

More information

Rapport technique #INRS-EMT Exact Expression for the BER of Rectangular QAM with Arbitrary Constellation Mapping

Rapport technique #INRS-EMT Exact Expression for the BER of Rectangular QAM with Arbitrary Constellation Mapping Rapport technique #INRS-EMT-010-0604 Exact Expression for the BER of Rectangular QAM with Arbitrary Constellation Mapping Leszek Szczeciński, Cristian González, Sonia Aïssa Institut National de la Recherche

More information

Weibull-Gamma composite distribution: An alternative multipath/shadowing fading model

Weibull-Gamma composite distribution: An alternative multipath/shadowing fading model Weibull-Gamma composite distribution: An alternative multipath/shadowing fading model Petros S. Bithas Institute for Space Applications and Remote Sensing, National Observatory of Athens, Metaxa & Vas.

More information

Consider the following passband digital communication system model. c t. modulator. t r a n s m i t t e r. signal decoder.

Consider the following passband digital communication system model. c t. modulator. t r a n s m i t t e r. signal decoder. PASSBAND DIGITAL MODULATION TECHNIQUES Consder the followng passband dgtal communcaton system model. cos( ω + φ ) c t message source m sgnal encoder s modulator s () t communcaton xt () channel t r a n

More information

E&CE 358, Winter 2016: Solution #2. Prof. X. Shen

E&CE 358, Winter 2016: Solution #2. Prof. X. Shen E&CE 358, Winter 16: Solution # Prof. X. Shen Email: xshen@bbcr.uwaterloo.ca Prof. X. Shen E&CE 358, Winter 16 ( 1:3-:5 PM: Solution # Problem 1 Problem 1 The signal g(t = e t, t T is corrupted by additive

More information

ADVERSARY ANALYSIS OF COCKROACH NETWORK UNDER RAYLEIGH FADING CHANNEL: PROBABILITY OF ERROR AND ADVERSARY DETECTION. A Dissertation by.

ADVERSARY ANALYSIS OF COCKROACH NETWORK UNDER RAYLEIGH FADING CHANNEL: PROBABILITY OF ERROR AND ADVERSARY DETECTION. A Dissertation by. ADVERSARY ANALYSIS OF COCKROACH NETWORK UNDER RAYLEIGH FADING CHANNEL: PROBABILITY OF ERROR AND ADVERSARY DETECTION A Dissertation by Tze Chien Wong Master of Science, Wichita State University, 2008 Bachelor

More information

1. Band-pass modulations. 2. 2D signal set. 3. Basis signals p(t)cos(2πf 0 t) e p(t)sin(2πf 0 t) 4. Costellation = m signals, equidistant on a circle

1. Band-pass modulations. 2. 2D signal set. 3. Basis signals p(t)cos(2πf 0 t) e p(t)sin(2πf 0 t) 4. Costellation = m signals, equidistant on a circle TUTORIAL ON DIGITAL MODULATIONS Part 14: m-psk [last modified: 2010-11-25] Roerto Garello, Politecnico di Torino Free download at: www.tlc.polito.it/garello (personal use only) 1 m-psk modulations 1. Band-pass

More information

Capacity Bounds for Power- and Band-Limited Wireless Infrared Channels Corrupted by Gaussian Noise

Capacity Bounds for Power- and Band-Limited Wireless Infrared Channels Corrupted by Gaussian Noise 40th Annual Allerton Conference on Communications, Control, and Computing, U.Illinois at Urbana-Champaign, Oct. 2-4, 2002, Allerton House, Monticello, USA. Capacity Bounds for Power- and Band-Limited Wireless

More information

2016 Spring: The Final Exam of Digital Communications

2016 Spring: The Final Exam of Digital Communications 2016 Spring: The Final Exam of Digital Communications The total number of points is 131. 1. Image of Transmitter Transmitter L 1 θ v 1 As shown in the figure above, a car is receiving a signal from a remote

More information

One Lesson of Information Theory

One Lesson of Information Theory Institut für One Lesson of Information Theory Prof. Dr.-Ing. Volker Kühn Institute of Communications Engineering University of Rostock, Germany Email: volker.kuehn@uni-rostock.de http://www.int.uni-rostock.de/

More information

MODULATION AND CODING FOR QUANTIZED CHANNELS. Xiaoying Shao and Harm S. Cronie

MODULATION AND CODING FOR QUANTIZED CHANNELS. Xiaoying Shao and Harm S. Cronie MODULATION AND CODING FOR QUANTIZED CHANNELS Xiaoying Shao and Harm S. Cronie x.shao@ewi.utwente.nl, h.s.cronie@ewi.utwente.nl University of Twente, Faculty of EEMCS, Signals and Systems Group P.O. box

More information

This examination consists of 10 pages. Please check that you have a complete copy. Time: 2.5 hrs INSTRUCTIONS

This examination consists of 10 pages. Please check that you have a complete copy. Time: 2.5 hrs INSTRUCTIONS THE UNIVERSITY OF BRITISH COLUMBIA Department of Electrical and Computer Engineering EECE 564 Detection and Estimation of Signals in Noise Final Examination 08 December 2009 This examination consists of

More information

List Decoding: Geometrical Aspects and Performance Bounds

List Decoding: Geometrical Aspects and Performance Bounds List Decoding: Geometrical Aspects and Performance Bounds Maja Lončar Department of Information Technology Lund University, Sweden Summer Academy: Progress in Mathematics for Communication Systems Bremen,

More information