Documente Academic
Documente Profesional
Documente Cultură
BANDLIMITED SIGNALLING
UNIT II
BANDLIMITED SIGNALLING
Power Spectra of PAM signals- Inter Symbol Interference- Ideal Nyquist channel-
Raised Cosine Channels- Correlative Coding- Eye patterns- Adaptive Equalization
for Data Transmission
________________________________________________________________________
Contents:
Overview of an bandlimited signal
Objective
PAM introduction
PAM Applications
Power spectra of PAM signal
Introduction of Inter Symbol Interference (ISI)
Eye Patterns
Nyquist Pulse Shaping
Raised Cosine (RC) Fall-Off Pulse Shaping
Adaptive Equalization
________________________________________________________________________
Overview:
Objectives:
To study about the Pulse Amplitude Modulation (PAM) in detail.
Explain about the ISI.
Discuss about the Eye patterns.
Describe the methodologies of pulse shaping.
To study about the RC fall off shaping.
• In binary PAM, each symbol ak takes only two values, say {A1 and A2}
• In a multilevel, i.e., M-ary system, symbols may take M values {A1, A2 ,...
AM}
• Signaling period, T
• Consequently, the filter output x(t) is a train of pulses, each with the
required shape hT(t)
Filtering of impulse train in transmit filter
• Clearly not a practical technique so
– Use a practical input pulse shape, then filter to realise the desired
output pulse shape
– Store a sampled pulse shape in a ROM and read out through a D/A
converter
• The transmitted signal x(t) passes through the channel HC(w) and the
receive filter HR(w).
• The overall frequency response is
H(w) = HT(w) HC(w) HR(w)
• Hence the signal at the receiver filter output is
Where h(t) is the inverse Fourier transform of H(w) and v(t) is the noise
signal at the receive filter output
• Data detection is now performed by the Data Slicer
1.4 Synchronization
• We need to derive an accurate clock signal at the receiver in order that y(t)
may be sampled at the correct instant
• Such a signal may be available directly (usually not because of the waste
involved in sending a signal with no information content)
• Usually, the sample clock has to be derived directly from the received signal.
• The ability to extract a symbol timing clock usually depends upon the
presence of transitions or zero crossings in the received signal.
• Line coding aims to raise the number of such occurrences to help the
extraction process.
• Unfortunately, simple line coding schemes often do not give rise to
transitions when long runs of constant symbols are received.
• Some line coding schemes give rise to a spectral component at the symbol
rate
• A BPF or PLL can be used to extract this component directly
• Sometimes the received data has to be non-linearly processed eg, squaring,
to yield a component of the correct frequency.
From (1) and (2), we obtain the psd of the PAM signal x (t) as Follows
Remark:
The results in (1) - (3) illustrate the dependence of the psd SX(f) of the transmitted
signal on
(1) the spectral characteristics of HT(f) of the pulse shape filter and
(2) the spectral characteristics of SB(f) of the pre-coded information sequence.
Conclusion:
Both HT(f) and SB(f) can be designed to control the shape and form of the psd of
the transmitted signal.
Problems:
Determine the psd in (3) where hT(t) is a rectangular pulse shown in Fig.
Solution.
The Fourier transform of hT(t) is as follows
Where
Hence, we have
Substituting it into (3), we obtain
If the pulse shape is the rectangular pulse T then the psd of the PAM x(t) is given
by
2. Inter-Symbol Interference:
• Figure 1 (a) is the input signal to an ideal minimum bandwidth LPF.
Figure 2 (b) shows the output of LPF that does not introduce any phase
or amplitude distortion. If the LPF is imperfect, the output response
closely resembles Figure 4.25 (c).
• The input signal is a random binary NRZ sequence. The output signal
reaches its full value for each transmitted pulse at the center of each
sampling interval.
• At sampling instants, the signal does not attain always the maximum
value. Ringing tails of several pulses have overlapped interfering with
the major pulse lobe.
• When there is no time delay, the energy in the form of spurious
responses from one pulse appears during the sampling instant of another
pulse. This phenomenon is called Inter-Symbol Interference (ISI).
• ISI is important in the transmission of pulses over circuits with a limited
bandwidth and linear phase response.
• Rectangular pulse won’t remain as rectangular in less than infinite
bandwidth. Narrower the bandwidth, more rounded the pulses. If phase
distortion is excessive, the pulses tilt and affect the next pulse.
• When pulses from more than one source are multiplexed together, the
amplitude, frequency and phase responses become critical.
• ISI causes crosstalk between channels that occupy adjacent time slots in a
TDM carrier system. Special filters called equalizers are inserted in the
transmission path to equalize the distortion for all frequencies creating
uniform transmission medium reducing transmission impairments. The
four primary causes of ISI are:
1. Timing Accuracies:
In digital transmission system, the transmitter timing accuracies cause
ISI, if the rate of transmission does not conform to the ringing
frequencies designed into the communication channel.
The timing inaccuracies of this type are insignificant. Since the receiver
clocking information is derived from the received signal (with noise),
inaccurate sampling timing mostly occur in receivers than in
transmitters.
2. Insufficient Bandwidth:
Timing errors are less likely to occur if the transmission rate is well
below the channel bandwidth. (Nyquist bandwidth < Channel
bandwidth)
When channel bandwidth reduces, ringing frequency also reduces
which results in more ISI.
3. Amplitude Distortion:
Filters are placed in the communication channel to band limit the signal
and reduce the predicted noise and interference. They are also used to
produce a specific pulse response.
The frequency response of a channel can not be predicted absolutely.
When the frequency characteristics of a communication channel depart
from the predicted values, pulse distortion occurs. Pulse distortion
results when the peaks of pulses are reduced causing improper ringing
frequency in time domain.
The compensation for amplitude/pulse distortion is amplitude
equalization.
4. Phase Distortion:
Each pulse is simply the superposition of a series of harmonically related
sine waves with specific amplitude and phase relationships. Phase
distortion occurs when the relative phase relations of the individual sine
waves are altered.
Phase distortion also occurs when the frequency components undergo
different amounts of time delay while propagating through the
transmission medium.
Special delay equalizers are placed in the transmission path to
compensate the varying delays thus reducing the phase distortion. Phase
equalizers can be manually adjusted or designed to automatically adjust
themselves to varying transmission characteristics.
3. Eye Patterns:
• The performance of a digital transmission system depends on the ability
of a repeater to regenerate the original pulses.
• The quality of regeneration process depends on the decision circuit
within the repeater and quality of the signal at the input to the decision
circuit.
• The performance of digital transmission system is measured by
displaying received signal on an oscilloscope and triggering the time
base at the data rate. All the waveform combinations are superimposed
over adjacent signaling intervals. Such a display is called Eye pattern or
Eye diagram.
• Eye pattern is a convenient technique to determine the effects of
degradations introduced into the pulses as they travel to the
regenerator.
• Figure 2 shows the test set up to display an Eye pattern. The received
pulse stream is fed to the vertical input of the oscilloscope and symbol
clock is fed to the external trigger input while sweep rate is set
approximately equal to symbol rate.
• Eye pattern (Figure 4.27) is generated by a symmetrical waveform for
ternary signal in which the individual pulses at the input to the
regenerator have a cosine-squared shape.
• In an m-level system, there are m-1 separate eyes. The vertical lines
labeled +1, 0 and -1 correspond to ideal received amplitudes. The
horizontal lines are separated by a signaling interval T corresponds to
ideal decision times. Vertical hairs represent decision time and
horizontal hairs represent decision levels.
• Eye pattern shows the quality of shaping and timing. It also discloses any
noise and errors that is present in line equalization. Eye opening defines
a boundary within which no waveform trajectories can exist under any
code pattern condition.
• To generate pulse sequence without errors, the eyes must be open and
decision cross hairs must be within open area. The pulse degradation
reduces the size of ideal eye. At the center of the eye, opening is 90%
indicating only minor ISI degradation due to filtering imperfections.
• Small degradation is due to the non-ideal Nyquist amplitude phase
characteristics of transmission system.
h
• ISI degradation is ISI = 20 Log where H = ideal vertical opening (cm)
H
and h = degraded vertical opening (cm). Here ISI = 20 Log (90/100) =
0.915 dB.
• The overlapping signals pattern does not cross horizontal zero line at
exact integer multiples of symbol clocks. This impairment is called data
transmission jitter. This jitter has an effect on symbol timing clock
recovery circuit. Excessive effect degrades the performance of
regenerative sections.
4. Nyquist Pulse Shaping
• It is possible to eliminate ISI at the sampling instants by ensuring that the
received pulses satisfy the Nyquist pulse shaping criterion
• We will assume that td=0, so the slicer input is
yn = an h(0) + ∑ ak h((n − k )T ) + vn
k ≠n
1 for n = 0
h(nT ) =
0 for n ≠ 0
• No pulse bandwidth less than 1/2T can satisfy the criterion, eg,
• The sinc pulse shape is very sensitive to errors in the sample timing, owing
to its low rate of side lobe decay
• Hard to design practical ‘brick-wall’ filters, consequently filters with smooth
spectral roll-off are preferred
• Pulses may take values for t<0 (ie non-causal). No problem in a practical
system because delays can be introduced to enable approximate realisation.
Non-causal response T = 1 s
Causal response T = 1s
Delay, td = 10s
T f ≤ 1 2T − β
π
H ( f ) = T cos 2 ( f − 1 2T + β ) 1 2T − β < f ≤ 1 2T + β
4 β
0 f > 1 2T + β
With, 0<b<1/2T
• The general RC function is as follows,
T f ≤ 1 2T − β
π
H ( f ) = T cos 2 ( f − 1 2T + β ) 1 2T − β < f ≤ 1 2T + β
4β
0 f > 1 2T + β
π
sin t
h (t ) = T cos 2 πβ t
π 1 − (4 β t )2
t
T
• Now b allows a trade-off between bandwidth and the pulse decay rate
• Sometimes b is normalised as follows,
β
x=
(12T )
• With b=0 (i.e., x = 0) the spectrum of the filter is rectangular and the time
domain response is a sinc pulse, that is,
H( f ) =T f ≤ 1 2T
π
sin t
h(t ) =
T
π
t
T
• The time domain pulse has zero crossings at intervals of nT as desired (See
plots for x = 0).
• With b=(1/2T), (i.e., x = 1) the spectrum of the filter is full RC and the time
domain response is a pulse with low sidelobe levels, that is,
πTf
H ( f ) = T cos 2 f ≤1 T
2
1 2π
h(t ) = sinc t
4 2 T
1 − 2 t
T
• The time domain pulse has zero crossings at intervals of nT/2, with the
exception at T/2 where there is no zero crossing. See plots for x = 1.
• Pulse shape and received signal, x = 0 (b = 0)
Eye diagram
• The much wider eye opening for x = 1 gives a much greater tolerance to
inaccurate sample clock timing
• The penalty is the much wider transmitted bandwidth
4.2 Probability of Error
• In the presence of noise, there will be a finite chance of decision errors at
the slicer output
• The smaller the eye, the higher the chance that the noise will cause an error.
For a binary system a transmitted ‘1’ could be detected as a ‘0’ and vice-versa
• In a PAM system, the probability of error is, Pe=Pr{A received symbol is
incorrectly detected}
• For a binary system, Pe is known as the bit error probability, or the bit error
rate (BER)
4.2.1 BER
• The received signal at the slicer is
yn = Vi + vn
Where f(vn) denotes the probability density function (pdf), that is,
b
and Pr{a < vn ≤ b} = ∫ f ( x)dx
a
Pe = P(error | 0) Po + P (error | 1) P1
• For ‘0’ sent: an error occurs when yn VT
– let vn=yn-Vo, so when yn=Vo, vn=0 and when yn=VT, vn=VT-Vo.
– So equivalently, we get an error when vn VT-V0
P(error | 0) = P(vn ≥ VT − Vo )
∞
V − Vo
P(error | 0) = ∫
VT −Vo
f (vn )dvn = Q T
σv
∞
1 − x2 2
Where, Q( z ) = ∫ e dx
z 2π
Pe = P(error | 0) Po + P (error | 1) P1
V − Vo V −V
Pe = Q T Po + Q 1 T P1
σv σv
Where Po is the probability that a ‘0’ was sent and P1 is the probability that a
‘1’ was sent
• For Po=P1=0.5, the min error rate is obtained when,
Vo + V1
VT =
2
• Consequently,
V −V h
Pemin = Q 1 o = Q where, h = V1 − Vo
2σ v 2σ v
Notes:
– Q(.) is a monotonically decreasing function of its argument, hence the
BER falls as h increases
– For received pulses satisfying Nyquist criterion, ie zero ISI, Vo=Ao and
V1=A1. Assuming unity overall gain.
– More complex with ISI. Worst case performance if h is taken to be the
eye opening
4.2.1.2 BER Example
• The received pulse h(t) in response to a single transmitted binary ‘1’ is as
shown,
• What is the worst case BER if a ‘1’ is received as h(t) and a ‘0’ as -h(t) (this is
known as a polar binary scheme)? Assume the data are equally likely to be
‘0’ and ‘1’ and that the optimum threshold (OV) is used at the slicer.
• By inspection, the pulse has only 2 non-zero amplitude values (at T and 4T)
away from the ideal sample point (at 2T).
• Consequently the worst case ‘1’ occurs when the data bits conspire to give
negative non-zero pulse amplitudes at the sampling instant.
• The worst case ‘1’ eye opening is thus,
1 - 0.3 - 0.2 = 0.5
as indicated in the following diagram.
• The indicated data gives rise to the worst case ‘1’ eye opening. Don’t care
about data marked ‘X’ as their pulses are zero at the indicated sample instant
• Similarly the worst case ‘0’ eye opening is
-1 + 0.3 + 0.2 = -0.5
• So, worst case eye opening h = 0.5-(-0.5) = 1V
• Giving the BER as,
h 1
Pemin = Q = Q
2σ
v 2σ
v
Legend in Figure 1:
1) {an}, an € {0,1} with an and an+k being independent for k≠ 0
The sample (bit or symbol) duration is .
2) {bn}, the NRZpolar, the output of the memoryless precoder (or level
converter)
4) The filter output yn can be represente d by the sum of the present input
pulse bn and its previous value bn-1
yn = bn + bn-1
Note that here we consider noiseless channel and m = 1which is from the
following formula:
Notice that
Then
(7)
From (4),we have Combining with (6),
From (8) we deduce the following decision rule for detecting the original binary
sequence {an} from {yn} :
if | yn |< d, then symbol an is 1
if | yn |> d, then symbol an is 0
if | yn |= d, randomly guessing an
A useful feature of this detector is that no knowledge of any input sample other
than the present one is required. Hence, error propagatio n cannot occur in the
detector.
Example.
Precoding with memory and duobinary coding.
Consider the binary data sequence 0010110. To proceed with the precoding of this
sequence, which involves feeding the precoder output back to the input, we add
and extra (initialization) bit to the precoding output. This extra bit is chosen
arbitrarily to be 1. Hence, using (4), we find that the sequence {b*n} at the
precoder output is as shown in row 2 of the following table. The polar formart {bn}
of the sequence {b*n} is shown in row 3 of the table. Finally, using (7), we find the
duobinary encoder output has the amplitude levels given in row 4 of the table. To
detect the original binary sequence, we apply the decision rule, given by (A), so,
obtain the binary sequence given in row 5 in the table.
The last row shows that, in absence of noise, the original binary sequence is
detected correctly.
Since for {ak}, 0 and 1 are equally likely, the output levels 2d each occur with ¼
and the output level 0
occurs with prob. ½ assuming no noise. If the thresholds are set at d, errors occurs
as follows:
If ak = 0, then
We write N = no(kT).
Consequently,
6. Adaptive Equalization
• Adaptive equalizers compensate for signal distortion attributed to
intersymbol interference (ISI), which is caused by multipath within time-
dispersive channels.
• Typically employed in high-speed communication systems, which do not
use differential modulation schemes or frequency division multiplexing
• The equalizer is the most expensive component of a data demodulator and
can consume over 80% of the total computations needed to demodulate a
given signal
The following quantities are defined for a linear equalizer with a real input signal:
Equalizer tap coefficient vector:
Error signal:
Where ‘p’ is the cross-correlation vector and ‘R’ is the input signal
correlation matrix
The gradient of the MSE cost function with respect to the equalizer tap
weights is defined as follows:
The optimal equalizer taps ‘fo’ required to obtain the MMSE can be
determined by replacing ‘f’ with ‘fo’ and setting the gradient above to
zero: