0% found this document useful (0 votes)
17 views55 pages

WC Unit 7

Uploaded by

Loki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views55 pages

WC Unit 7

Uploaded by

Loki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

WIRELESS COMMUNICATION

UNIT 7 (10EC81)

Wireless Modulation Techniques and Hardware


Overvie
w
• Characteristics of Air interface

• Path loss models

• Wireless communication coding


techniques

• Digital modulation techniques

• UWB radio techniques

• Diversity techniques

• Typical GSM hardware


Transmission Characteristics of Wire line and Fiber
Systems
Wirelin communicatio Refer to telecommunicati
infrastructure
e n: s fixed on

Different technologies are used to deliver the desired signal


from one point to another point depending upon:
• Distance
• Form of information (Analog or Digital)
• Required data transmission rate
• Environment condition

Transmission lines (TL): Fig: Coaxial cable


A transmission line is a cable designed
carr of radio frequency. They are used to guide
specialized to a signal from
to
y point
point
as efficiently as
possible.
1. Conductor based TL
2. Fiber optic cables
Conductor based transmission line:

At lower frequencies (extremely long wavelengths):


Current flows within the conductor and is not prone to radiate
away from TL.

At higher frequencies:
The current flow take place near the conductor surface (skin
effect)

Types of TLs:
• Twisted pairs
- Unshielded or Shielded (UTP and STP)
• LAN category cable
• Coaxial cable

In all the three cases, the signal attenuation increases


with frequency
Characteristics of TL to be considered:
• Bandwidth
• Susceptibility to noise
• Frequency response

In transmission lines, noise can enter at termination points,


splices or connectors. To compensate this various coding
schemes and transmission protocols have been developed.

Fiber optic cables:


• Potential for unlimited bandwidth
• Not susceptible to electromagnetic interference
(EMI)
• They do not have any noise problems
• Bit error rate (BER) is extremely low backbon
• Suitable
telecommunication
for high capacity
networks(GBPS and e
TBPS)
Unfortunately, wireline cables and fiber – optic cables cannot
be used
for radio channel.
Characteristics of the air interface

Radio wave propagation and propagation models


Ground waves:
• EM waves below 2 MHZ
• They are launched by vertical antennas
• These waves tend to follow the curvature of the earth
• They lose the strength rapidly as they travel away from
antenna

Sky waves:
• Frequencies between 2 to 30 MHz
• They bounce off of ionospheric layers
• They propagate completely around the earth through
multiple
reflections or “hops” between the ground and
ionosphere

Straight waves or “Rays”


• Above 30MHz
Antenna
Size:
• Antenna size is inversely proportional to frequency
• The higher the frequency of operation, the smaller the
antenna structure

Wave propagation effects at UHF and above

All of the world’s mobile wireless systems use UHF (300 – 3000

MHz) Following are the three primary propagation effects.

1. Reflection
2. Scattering
3. Diffraction
Reflection:

Reflection is the change in direction of a EM wave at an


interface between two different media so that the wave returns
into the medium from which it originated

How much of the signal power is reflected depends on, the


surface roughness, frequency of the incident wave and other
variables.
Scatterin
g
Scatterin is a physica proces wher some
g radiation, general
of are forced to deviate
l from
s a straight
e trajectory
forms by
orone
more paths and the signal is scattered in many
directions simultaneously. different

Scattering occurs when the signal is incident upon a rough


surface or obstacles.

Diffraction

Diffraction is the effect that causes the EM waves to appear to


bend
around corners.

Diffraction occures when the signal is incident upon a sharp


corner e.g., the edge of a building rooftop.
Fig: Typical Outdoor propagation
case
Primary Signal: The signal that tend to follow the line of sight
(LOS)

There may be several to many other secondary,


tertiary, or even higher order reflections.

All the signals arriving at the mobile add together, with the
strongest
signal creating composite received signal.

Common term used: Multipath


Path Loss Model for Various Coverage areas
Fig: Two ray
model
Wireless Telecommunication Coding Techniques

Why Coding techniques..?


To compensate for the problems that encountered during use of
a mobile radio link.

Where they are implemented..?


The coding techniques are implemented at the transmitter to
increase the transmitted signal’s immunity to channel noise
and other impairments like frequency fading and multipath
spread.

Error Detection and Correction Coding

In wire line systems:


Errors occurs at one bit at a time – Single bit error
In wireless systems: Errors occurs in bursts

Error Control Coding (ECC):


The technique that codes the transmitted bits to control the
overall bit error rate.
In a single-bit error, only 1 bit in the data unit has changed.

A burst error means that 2 or more bits in the data unit have
changed
Block codes:

Block codes are used to determine whether


an error has occurred during data transmission.

Forward Error Correction (FEC) Codes: The schemes


that use
block codes to correct errors

Block codes operate on a block of bits.

Using a preset algorithm, a group of bits are taken and a coded


part is added to make a larger block. This block is checked at
the receiver.

The receiver then makes a decision about the validity of the


received
sequence.

Block codes are referred to as (n, k) codes. A block of k


In block coding, message is divided into blocks, each of ‘k’ bits,
called
datawords.

We add ‘ r ’ redundant bits to each block to make the length n


= k + r.
The resulting n-bit blocks are called codewords.

The code takes k information bits and computes (n-k) parity


bits
from the code generator matrix.

This code makes use of single parity bit.

Example: To transmit a message over the control channel, GSM


takes a block of 184 bits and adds 40 parity check bits to
generate a 224 bit codeword.

Disadvantage:

Using single parity bit, only a single error can be detected.


Convolutional Codes

Introduction
 Convolutio
n:
1. A coil or twist, or a state of being coiled or
twisted
2. A thing i.e., complex and difficult to follow rando
3. A method of determinationof the sum of m
two variables by summation
 Convolutional code:
1. Type of error correcting code in which each k-bit
information symbol to be encoded is transformed into
n-bit symbol.
2. An error correcting code that processes incoming bits
serially rather in large blocks.
 Why convolutional codes?
 In block codes, buffering should be done before
generating the code word.
 In some applications, message bits come in serially
rather than
the blocks, where buffering is undesirable.
 Useful for real-time applications because they
can be continuously encoded and decoded
 We can represent convolutional codes as
generators, block
diagrams, state diagrams, and trellis diagrams

 Convolution codes are generated using


‘convolutional encoder’

 Why the name convolutional encoder?


 It generates redundant bits by using modulo-2
convolutions, hence the name.
Convolutional k (n,k) n
Encoder : input, n bits are output
 k bits are bits encoder bits

 k & n are very small (usually k=1-3,


n=2-6)
 Code rate Rc=k/n ; 0<Rc<1
 At each time k bits enter the encoder, content of the
shift register (consists of K stages) are shifted to
the right by k memory elements
After the k bits have entered shift register, the n
adders add the
contents of memory elements.
 Addition is done using modulo-2 addition
procedure 0+0 = 0, 0+1 = 1, 1+0 = 1, 1+1
= 0;
 The parameter K is called the "constraint
length" of convolutional code.
 Hence, a convolutional code is specified by
General block diagram of Convolutional
Encoder
Examples of Convolutional
Encoders
 For k=1, n=2, K=3

 For k=2, n=3,


K=2
A RATE ½ CONVOLUTIONAL ENCODER

Message sequence: m
(101) Tim Outpu
Tim Outpu
e e t
t
u1 u1
u1 u 2 u1 u2
t
t1 1 0 1 1 2 0 1 1 0
0 u
2 0 u
2

u1 u1
u1 u2 u1 u2
t t
3 1 0 0 0 4 0 1 1 0
1 u
2 0 u
2
A RATE ½ CONVOLUTIONAL ENCODER (CONTINUED…)

Tim Outpu Tim Outpu


e t e t
u1 u1
u1 u 2 u1 u2
t t
5 0 0 1 1 6 0 0 0 0
1 u
2 0 u
2

m Encoder U  (11 10 00 10 11)


(101)

Example: n = 2, k = 1, K = 3, L = 3 input bits.


Output = n(L + K -1) = 2*(3 + 3 – 1) = 10
output bits
Turbo
Encoders
Turbo codes are the modified form of combined convolutional
encoders that can be used to create new class of enhanced
error correction codes.

These codes belongs to a class of high – performance Forward


Error Correction (FEC) codes.

These are the first practical codes and they were


developed in 1993.

A typical turbo encoder is constructed from two


systematic
convolutional encoder connected in parallel.

The output bit streams of the two convolutional encoders are


multiplexed together and repeated to form the final code
symbols.

Eg: For cdma2000, rate ½, 1/3, ¼ and 1/5 turbo encoders are
employed.
The first class of cod was the concatenate
turbo e parallel d
convolutional code
(PCCC). patented in US 5,446,74
(https:// Patent 7
[Link]/patents/US5446747).
Turbo Codes were first
Speech
Coding
Speech coding is a process dat compressio of audi
of a n digital o
signals containing speech.
The speech coders used for both GSM and CDMA wireless
systems take 20-msec segments of previously encoded
speech or raw speech.

Types of speech coders:


1. Waveform coders: Eg: Pulse code modulation
2. Vocoders

For GSM wireless systems, speech may be transmitted at full


rate, half rate, or enhanced full rate.
Full-rate speech coder: 260 bits (33 bytes) every 20 msec (13
kbps)
Half-rate speech coder: Two half packets of 228 bits
228 bits + 228 bits = 456 bits every 20 msec
kbps For 9.6 kbps: 172 bits are provided every 20
.For CDMA
msec
systems, the speech encoders operate at 9.6 kbps or
14.4 For 14.4 kbps: 268 bits every 20 msec
Block Interleaving

Block interleaving is a technique used by the mobile wireless


systems to overcome the effects of bit errors introduced during
the transmission of a frame.

Data written to and read from memory in different orders.

Example: Lets consider, the error control code used by the


system may be able to correct 1 bit error out of a block of 8
bits, i.e., it is not able to correct a burst of say 6 errors within
the 8-bit block.

If the bits of the block are interleaved with the bits from the
other blocks, then, the burst of 6 errors can be spread out over
6 other blocks.

Thus ECC can correct each of the single bit errors in each of the
single blocks.
A burst error that may occur is spread out over a number of
blocks, making error correction possible.

Data bits and corresponding check bits are interspersed with


bits from other blocks
At receiver, data are de-interleaved to recover original order
Digital Modulation Techniques

Orthogonal frequency-division multiplexing (OFDM)

Orthogonal frequency-division multiplexing (OFDM) is a


method of
encoding digital data on multiple carrier frequencies.

OFDM Principle

The available bandwidth W is divided into a number Nc of sub-


bands,
commonly called sub-carriers, each of width,
Condition supposed to be satisfied:
The frequency spacing between each carrier should be
orthogonal to each other.

Reason for the orthogonality: Orthogonal signals will


not
interfere with each other at a receiver.
Advantages:

1. High efficienc as to modulatio


spectral y compared other n
schemes.
2. Can easily adapt to severe channel
conditions.
3. Robust against narrow-band co-channel
interference.
fadin
4. Robust against inter-symbol interference (ISI) g
and
5. caused
Efficientby
implementation using Fast Fourier Transform
multi-path propagation.
(FFT).

6. Low sensitivity to time synchronization errors.


Fig: Spectrum of an OFDM
signal.
Spread Spectrum Modulation
Techniques
As the name “spread spectrum” suggests, this technique
supports spreading the bandwidth to transmit the data.

Spread spectrum technique employ a transmission bandwidth


that is several orders of magnitude greater than the minimum
required signal bandwidth.

This technique is bandwidth inefficient for a single


user;
but the
bandwidth
The without
advantage significantly
is, many interfering with one another.
users can same
simultaneously use
The spreading is done by Pseudo Noise Code (PN Code), which
is a
binary sequence that appears to be random.

Pseudo Noise Code (PN Code):


It is defined as a series of bits (1’s and 0’s) that seems to be
random but repeat itself after ‘n’ numbers where ‘n’ represents
length of PN code.
Definition:

Spread spectrum is a type of modulation in which the


modulated signal bandwidth is much greater than the
message signal bandwidth.
The spreading of the message signal spectrum is done by a
spreading code called Pseudo Noise Code (PN Code)
which is independent of the message signal.

Spread spectrum modulation was originally developed for


military
applications.

It was used in the battle ground and in the hostile territories


where the enemy always tries to intrude into the
communication system of the friendly forces to steal
information and to jam the systems.
Applications and advantages of spread spectrum
systems:

• To prevent eavesdropping.
• To prevent the jamming of signals.
• Improved interference rejection
• CDMA applications
• Secure communication
• High resolution ranging
• Anti-jam capability
• Increased capacity and spectral efficiency in some mobile-
cellular personal communication system applications
• Lower cost of implementation
• Readily available IC components
Model of a Spread-Spectrum Digital Communication
System
Spread spectrum systems have been classified by their
architecture
and modulation concepts.
The most commonly employed SS techniques are the
following:

 Direct Sequence Spread Spectrum (DSSS)


 Frequency Hopping Spread Spectrum (FHSS)
 Slow Frequency Hopping Spread Spectrum
 Fast Frequency Hopping Spread Spectrum
• Time Hopping Spread Spectrum (TH/SS)
• Hybrid spread spectrum methods (HSS)
Frequency Hopping Spread Spectrum (FHSS)
FHSS was invented by a movie star Hedy Lamarr.

Frequency hopping involves a periodic change of transmission


frequency during the transmission.

FHSS consists of a system that changes


the center frequency of transmission on a periodic
basis in a pseudorandom sequence.

The hopping sequence is designed in such a


fashion that, various
hopping frequencies are statistically independent of one another.

For the system to work, both the transmitter and receiver must
have prior knowledge of hopping sequence.

The set of possible carrier frequency is called the hopset.

Definition: The type of spread spectrum in which carrier hops


randomly from one frequency to another is called Frequency Hop
Frequency hoping are classified as
follows:
1. Slow Frequency Hopping Spread Spectrum
Slow Frequency Hopping occurs if one or more symbols
are
transmitted in the time interval between frequency hops.

If the hopping (chipping) rate is higher than the bit rate then
it is called fast frequency hopping spread spectrum system
(FF-HSS).

2. Fast Frequency Hopping Spread Spectrum


Fast Frequency Hopping occurs if there is more than one
frequency hop during each transmitted symbol.

If the hopping (chipping) rate is lesser than the bit rate then it
is called slow frequency system (SF-HSS).
Direct Sequence Spread Spectrum (DSSS)

A DSSS system spreads the baseband data by directly


multiplying the baseband data with a pseudo-noise sequence
that is produced by a pseudo noise code generators.

The same spreading code (PN code) is applied at the received


signal to perform demodulation.

Both the transmitter and the receiver must have the


knowledge of
the spreading code used, for the proper working of DSSS
system.
Ultra – Wideband Radio Technology

It is a emerging technology and extremely suits


for short range application space.

This technology employs effective sharing of radio


frequency
spectrum instead of looking for new frequency bands for new
services.

Applications:
• Ground penetrating radar
• Vehicular radar
• Measurement and positioning systems
• Data communications

Data rates supported by UWB systems:


1. Over short distances (1 – 10 meters) – 100 to 500 mbps
2. Larger distances (> 10 meters) – 3.1 to 10.6 GHz
Diversity Techniques
 RAKE Receiver

Explain RAKE receiver for a diversity technique, with


a block diagram.
December 2011,
10Marks
A RAKE receiver is a specialized radio receiver designed to
counter the effects of multipath fading and is used in CDMA
systems.

It combines multipath components, which are time delayed


versions of the original signal transmission.

The RAKE receiver was originally designed by Price and Green


and is patented in the US in 1956. The first practical
implementations of the receiver was designed in 1970.

The RAKE receiver is so named because it reminds the function


Fig: RAKE receiver block
diagram
A RAKE receiver utilizes multiple correlators (also called “sub-
receivers” or “fingers”) to separately detect M strongest
multipath components.

Each correlator detects a time-shifted version of the original


CDMA transmission, and each finger of the RAKE correlators to
a portion of the signal, which is delayed from the other fingers.

Let M be the no. of correlators used in CDMA


receiver Let Z1, Z2,…,ZM be the outputs of the M
correlators Let m be the multipath
component
Let α1, α2, α3,…, αM be the weighted components

Then,
the maximum combined output Z’ is given
by
In a RAKE receiver, if the output from one correlator is corrupted
by fading, the others may not be. The corrupted signals are
discarded and the bit decisions are done using decision device.

Applications
• Theyare common in a wide variety of CDMA and W-
CDMA radio devices such as mobile phones and wireless
LAN equipment.
• Used in radio astronomy
- Studying celestial objects at radio frequencies
• Used in radio telescopes
 Space
Diversity
It’s a typical technique to improve mobile wireless system
performance

Space diversity improves mobile wireless system performance in


the form of additional receiving antennas located at the base
station.

Problem associated:Small size of the antenna in relation to


a wavelength of the radio frequency employed.

Remedial schemes:
MIMO (Multiple Input, Multiple Output) antennas, smart antennas
etc.

In theory, the paths taken by the reverse signal to arrive at


each
antenna will not be affected equally by multipath fading or
spread.
The antennas feed multiple with the receive
receivers, signal being used by the strongest d
system.
Polarization diversity is used to counter the change in EM signal
polarization that can be induced by the environment during
reflection, scattering, and so on.
 Smart Antennas

Smart antennas are used in 3G applications

This technique improves system performance by making use of


phased array or “beam steering” antenna systems.

Smart antennas uses narrow pencil beam patterns to


communicate with a subset of the active users within a cell.

Once a mobile subscriber has been located by the system, a


narrow radio beam is pointed in the user’s direction through the
use of sophisticated antenna technology.

Smart antennas eliminates most multipath signals their by


reduces
amount of interference received.

As the mobile user moves about the coverage area, the smart
antenna will track the mobile’s motion.
Fig: Depiction of 3G smart antenna
system
 Single Antenna Interference Cancellation (SAIC)

Single antenna interference cancellation (SAIC) is a newly


developed technique that can be used to improve the downlink
performance of a GSM system.

To get the maximum performance from this technology, the GSM


system should be synchronous (i.e., tied to the timing of the GPS
system )

SAIC uses two algorithms to cancel the interference


 Joint detection (JD) cancellation
 Blind interference cancellation (BIC)

In both the cases , the systems tend to suppress the interference


that would normally increase the bit error rate of the system.
Thank
You

You might also like