Ec6501 DC
Ec6501 DC
UNIT 1
A time limited signal is one that is non-zero only for a finite length time interval
and time unlimited signal is one which is non-zero for infinite length time interval. A
signal that is band limited is not time-limited and vice-versa.
Can travel long distances and can store data for long time.
Eb
The ratio of bit energy to noise power spectral density is called as the figure
N
0
If the overall system response has constant magnitude and if its phase shift is
linear with frequency then that is said to be distortionless transmission.
This is the bandwidth where power spectral density drops to half (3db) of the
maximum value. It is also called 3 db bandwidth.
7. Define PWM.
PWM is basically pulse width modulation. Width of the pulse changes according
to amplitude of the modulating signal. It also referred as pulse duration
modulation or PDM
N = 2BT0
Pk I (S k )
k 0
H(y) = E[I(Sk)] = k 1 1
P log
k 2
P
k 0 k
y y
0 1
P P P
x x
0 1
y y
1 0
P P 1P
x
1
x
0
Let the signal be bandlimited to W Hz. Then Nyquist rate is given as,
Aliasing will not take place if sampling rate is greater than Nyquist rate.
Aliasing effect takes place when sampling frequency is less than Nyquist rate.
Under such condition, the spectrum of the sampled signal overlaps with itself. Hence
higher frequencies take the form of lower frequencies. This interference of the
frequency components is called as aliasing effect.
DM encodes the input sample by one bit. It sends the information about + or -, ie
step rise or fall. DPCM can have more than one bit of encoding the sample. It sends
the information about difference between actual sample value and the predicted
sample value.
23 What are the two types of quantization that occur in delta modulation? (Apr-
May 2010)
24Write an expression for bandwidth of binary PCM with N messages each with a
maximum frequency of fm Hz.
If v number of bits are used to code each input sample, then bandwidth of PCM
is given as, BT N.v.fm , Here v. fm is the bandwidth required by one message.
10. Mention the use of adaptive quantizer in adaptive digital waveform coding
schemes.
Adaptive quantizer changes its step size according variance of the input signal.
In adaptive coding, the quantization step size and prediction filter coefficients are
changed as per properties of input signal. This reduces the quantization error and
number of bits to represent the sample value. Adaptive coding is used for speech
coding at low bits rates.
13. The signal to quantization noise ratio in a PCM system depends on what
criteria?
Here v is the number of bits used to represent samples in PCM. Hence signal to
quantization noise ratio in PCM depends upon the number of bits or quantization
levels.
input signal. Step size is made high if slope of the input signal is high. This avoids
slope overload distortion.
15. What is the advantage of delta modulation over pulse modulation schemes?
Delta modulation encodes one bit per samples. Hence signalling rate is reduced
in DM.
Here v is the number of bits used to represent one pulse. W is the maximum signal
frequency.
24 Granular noise.
signal.
23 Delta modulation transmits only one bit for one sample. Thus the
signaling rate and transmission channel bandwidth is quite small
24 The transmitter and receiver implementation is very much simple for delta
modulation. There is no analog to digital converter involved in delta
modulation.
24 Why is prefiltering done before sampling? (Apr-May 2011)
f
Prefiltering is done so that the new maximum frequency is reduced to 2s or less.
Thus there will be no aliased components.
22. State the advantage of adaptive delta modulation over delta modulation?
(Nov-Dec 2010)
23 If the successive errors are of opposite polarity then the delta modulator is
operated in its granular mode, in this case it may be advantageous to reduce the step
size.
If successive errors are of same polarity then the delta modulator is operated in its
slope overload mode, in this case the step size should be increased
UNIT III
The hamming distance between two code vectors is equal to the number of
elements in which they differ. For example, let the two code words be,
These two code words differ in second and third bits. Therefore the hamming distance
between X and Y is two.
The code efficiency is the ratio of message bits in a block to the transmitted bits
for that block by the encoder i.e.,Code efficiency= (k/n) k=message bits n=transmitted
bits.
3. Draw the RZ-Bipolar line code format for the information {01101001).
(Nov-Dec 2011)
A code is linear if modulo-2 sum of any two code vectors produces another code
vector. This means any code vector can be expressed as linear combination of other
code vectors.
23 What are the error detection and correction capabilities of hamming codes?
(Apr-May 2008, May-June 2009)
24
25 What is meant by cyclic codes? Mention its properties.(Nov-Dec 2011)
Cyclic codes are the subclasses of linear block codes. They have the property that a
cyclic shift of one codeword produces another code word.
Properties : i) Linearity: The sum, of any 2 code words in the code is also a code word.
ii)Cyclic property: Any cyclic shift of a code word in the code is also a code word.If X =
(xn-1, xn-2, x1, x0) Then X = (xn-2, xn-3 , x1, x0, xn-1) which is another code vector.X
= (xn-3, xn-4., x1, x0, xn-1, xn-2) which is a valid code vector.
T
In hamming codes the syndrome is calculated as, S=YH
T
Here Y is the received and H is the transpose of parity check matrix.
8. What is BCH code?(May-June 2006)
BCH codes are most extensive and powerful error correcting cyclic codes. The decoding of
BCH codes is comparatively simpler. For any positive integer m and t
m-1
(where t<2 )there exists a BCH code with following parameters:
m-1
Block length: n= 2
Number of parity check bits : n-k<=mt
These are non binary BCH codes. The encoder for RS code operates on multiple
bits simultaneously. The (n, k) RS code takes the groups of m- bit symbols of incoming
binary data stream. It takes such k number of symbols in one block. Then the
encoder acts (n k) redundant symbols to form the code word of n symbols.
RS code has:
m
Block Length : n=2 -1 symbols
Message size: K symbols
23
24
25 What is difference between block codes and convolutional codes?(Nov-Dec
2005, May-June 2012, May-June 2009)
Block codes takes k number of bits simultaneously form n bit code vector. This
code vector is also called block. Convolutional code takes one message bits at a time
and generates two or more encoded bits. Thus convolutional codes generate a string of
encoded bits for input message string.
Constraint length is the number of shifts over which the single message bit can
influence the encoder output. It is expressed in terms of message bits.
Free distance is the minimum distance between code vectors. It is also equal to
minimum weight of the code vectors.
Coding gain is used as a basis of comparison for different coding methods. To achieve
the same bit error rate the coding gain is defined as,
A (Eb / N o )Encoded
(Eb / N o )coded
A = rdf /2
T
The non zero output of the produce YH is called syndrome & it is used to detect
T
errors in y. Syndrome is denoted by S & given as,S=YH
The constraint length of the given convolutional encoder is K=2. Its rate is
means for single message bit input, two bits x1 and x2 are encoded at the output. S1
represents the input message bit and S2 stores the previous message bit. Since only
one previous message bit is stored, this encoder can have states depending upon this
stored message bit. Lets represent,
S2 = 0 state a
and S2 = 1 state b
S.No
Code tree Trellis diagram
the tree.
BCH codes are most extensive and powerful error correcting cyclic codes. The
decoding of BCH codes is comparatively simpler.
Golay code is the (23,12) cyclic code whose generating polynomial is,
11 9 7 6 5
G(p) = p +p +p +p +p +p+1
This code has minimum distance of dmin = 7. This code can correct upto 3 errors. But
A line code should be so designed that the receiver does not go out of
synchronization for any sequence of data symbols. A code is not transparent if for
some sequence of symbols, the clock is lost.
UNIT IV
In baseband binary PAM, symbols are transmitted one after another. These
symbols are separated by sufficient time durations. The transmitter, channel and
receiver acts as a filter to this baseband data. Because of the filtering characteristics,
transmitted PAM pulses spread in time. The presence of outputs due to other bits
interference with the output of required bit . This effect is called ISI. The receiving
filter output y(t) sampled at time ti=iTb of a baseband system is
ai ak P(iTb kTb )
1 i k
th
The first term ai is produced by the i transmitted bit. The second term represents
th
the residual effect of all other transmitted bits on the decoding of i bit, this residual
effect is called intersymbol interference.
Correlative level coding is used to transmit a baseband signal with the signalling
rate of 2Bo over the channel of bandwidth Bo. This is made physically possible by
allowing ISI in the transmitted in controlled manner. This ISI is known to receiver. The
correlative coding is implemented by duobinary signalling and modified duobinary
signalling.
Matched filter is a filter which is used for detection of signals in baseband and
passband transmission. The shape of the impulse response of the matched filter is
similar or matched to the shape of the input signal x(t). Hence it is called matched
filter.
4. What are eye patterns?(Nov-Dec 97)
1 Width of eye opening defines the interval over which the received wave can be
sampled without error from ISI.
2 The sensitivity of the system to timing error is determined by the rate of closure of
the eye as the sampling time is varied.
3 Height of the eye opening at sampling time is called margin over noise.
Eye pattern can be obtained on CRO by applying the signal to one of the input
channels and given an external trigger of 1/Tb Hz. This makes one sweep of beam
equal to Tb seconds.
Hence fixed pair of transmit and receive filters will not serve the equalization problem.
The filters adapt themselves to the dispersive effects of the channel that is the
cofficients of the filters are changed contineously according to the received data. The
filter cofficients are changed in such a way that the distortion in the data is reduced.
Correlative level coding allows the signal scaling rate of 2Bo in the channel of
bandwidth Bo. This is made physically possible by allowing ISI in the transmitted
signal in controlled manner, this ISI is known to the receiver.
1 f
P( f ) rect
2B 2B
0 0
1 The S/N ratio depend only upon the ratio of signal energy to the
PSD of white noise at filter output.
In the raised cosine spectrum, the frequency response P(f) decreases towards
zero gradually That is there is no abrupt transition).
14. What are the information that can be obtained from eye pattern regarding
the signal quality? (May-June 2012)
1 The width of eye opening define the interval over which the received wave can be
sampled without error from ISI.
2 The sensitivity of the system to tuning error is determined by the rate of closure of
eye as the sampling time is varied.
3 The height of eye opening, at specified sampling time is called margin over noise.
15. State Nyquist criterion for zero ISI.(Nov-Dec 2007, Nov-Dec 2011)
1 f ori
Time domain : p[(i-k)Tb] =
0 f ori
16. Write the performance of data transmission system using eye pattern
technique?
The width of the eye opening defines the interval over which the received wave
can can be sampled without error from inter symbol interference .
The sensitivity of the system to timing error is determined by the rate of closure of the
eye as the sampling time is varied.
17. Define Duobinary baseband PAM system.
Let the PAM signal ak represents kth bit. Then the encoder the new waveform as Ck
=ak + ak-1
Thus two successive bits are added to get encoded value of the kth bit. Hence Ck
becomes a correlated signal even though ak is not correlated. This introduces
intersymbol interference in the controlled manner to reduce the bandwidth.
UNIT-V
1. Compare the probability of Error of PSK with that FSK? (ECE May 2006)
Comparing these two equations in FSK the bit energy to noise density ratio has to be
doubled to maintain the same bit error as in PSK. So FSK needs double the
bandwidth of PSK. In PSK, the error probability is less whereas in FSK the error
probability is high.
2. Highlight the major difference between a QPSK signal and a MSK signal.
(Nov05)
In coherent detection, the local carrier generated at the receiver is phase locked
with carrier at the transmitter. Hence it is called synchronous detection.
5.Write the expression for bit error rate for Coherent Binary FSK. (Nov-Dec 2004)
1 Eb
1 0.6Eb
Pe erf c
2 4N0
6.What are the advantages of BPSK? (CSE Nov 2006)
BPSK has a bandwidth which is lower than of BFSK is the best of all systems in
the presence of noise. It gives the minimum possibility of error and it has very good
noise immunity.
7. What are the drawbacks of binary PSK system? (May June 2012)
If the received signal is - b(t) 2P cos(2f 0 t ) ,then squared input signal has changed its
sign. Therefore, it is not possible to determine whether the received signal is equal to
b(t) or b(t). This result in ambiguity in output signal.
Pair of sinusoidal wave that differs only in a relative phase shift of 180 degrees
is referred as Antipodal signals.
9. What are the advantages and disadvantages of binary FSK signals? ( Dec 2005)
Binary FSK has poorer error performance than PSK or QAM and consequently, is
seldom used for high performance digital radio systems. Its use is restricted to low
performance, low cost, asynchronous data modems that are used for data
communications.
The peak frequency deviation is constant and always at its maximum value.
10. Compare the Bandwidth Efficiency of M-ary PSK signals and M-ary FSK
signals (IT Apr 2003)
=Rb/B=2log2M/M
Pe1/2(M-1)erfc( E / 2N o
14. What are the advantages of M-ary signaling schemes? (Apr 2004)
15. What are the error probabilities of a binary FSK system? ( Dec 2003)
P(e)=1/2exp(-Eb/2No)
P(e)=erfc Eb / No
16. Sketch the waveform representation of ASK, FSK, PSK for a NRZ coded
binary sequence and represent also each case mathematically.
17. Draw the signal constellation of QPSK and give comments on QPSK.(Dec05)
18. What are the advantages and disadvantages of differential phase shift
keying? (Nov-Dec 2007)
Advantages:
i.No need to generate the carrier at the receiver end. This means
that complicated circuitry for generation of local carrier is avoided.
Disadvantages:
19.Plot the power spectrum of a BPSK signal operated with a carrier frequency of 140
MHz, modulated by data bits at a rate of 2400 bits/sec. What is the bandwidth
requirement? (Apr-May 2008)
20. Give the signal space representation of QPSK. How is the performance of the system
related to the distances between the symbols in the signal space. (Apr-May 2008)
M d 2 k1
1
P
e 2 erfc
k 2 4N 0
Here M is the number of signal points, and dk1 is the distance between s1 and sk
As with binary PSK, this modulation scheme is characterized by the fact that the
information carried by the transmitted wave is contained in phase.
In QPSK (Quadriphase Shift Keying), the phase of the carrier takes on one of
3 5 7
the four equally spaced values such as 4 , 4 , 4 and 4 as given by
2
E cos(2 t (2i 0t
S (t) f 1) T.
i c
T 4
0 Else where.
23.A binary frequency shift keying system employs two signaling frequencies f 1 and f2.
The lower frequency f1 is 1200 Hz and signaling rate is 500 Baud. Calculate f 2.
f1 = 1200 Hz.
1 Long distance.
1 Analog channels can be used for transmission.