Introduction To Analog and Digital Communications 2.2
Introduction To Analog and Digital Communications 2.2
Introduction To Analog and Digital Communications 2.2
Communications
By:
Phil Schniter
Introduction to Analog and Digital
Communications
By:
Phil Schniter
Online:
< http://cnx.org/content/col10968/1.2/ >
CONNEXIONS
Introduction
1
power linesA,D
compact discD
hard driveD
magnetic tapeA,D
Table 1.1
1
2 CHAPTER 1. INTRODUCTION
Figure 1.1
Figure 1.2
• A digital message is converted to an analog message coding and pulse-shaping, and then transmitted
using analog modulation. To recover the message, the received signal is demodulated, sampled, and
digitally processed.
• Perfect recovery is possible even in the presence of noise!
The Modulator:
Figure 2.1
a. Often we want to communicate several messages simultaneously (e.g., TV, radio, voice). It's
dicult or impossible to do this if they overlap in frequency!
b. Wireless EM transmission/reception is much easier at higher frequencies, since need antenna
λ c
length > 10 . (λ = fc is wavelength and c =3e8 m/s speed of light.)
Table 2.1
Notice that practical antenna length determines where dierent signal types can be transmitted.
The Coder/Mapper:
• Coder transforms sequence of message bits into an error-resiliant sequence of coded bits.
3
4 CHAPTER 2. PREVIEW OF COMM SYSTEM COMPONENTS
• Mapper transforms coded bits into discrete symbols. Ex: If the symbol alphabet is {−3, −1, 1, 3}
and the symbol mapping is
bits symbol
00 3
01 -1
10 1
11 -3
Table 2.2
a 01 10 00 01 -1 1 -3 -1
b 01 10 00 10 -1 1 -3 1
c 01 10 00 11 -1 1 -3 3
d 01 10 01 00 -1 1 -1 -3
. . .
. . .
. . .
Table 2.3
Pulse Shaper:
Figure 2.2
Preliminaries
1
Denition:
R∞
W (f ) = −∞
w (t) e−j2πf t dt = F{w (t)}
R∞ (3.1)
w (t) = −∞
W (f ) ej2πf t df = F −1 {W (f )}.
Properties:
3.2 Bandwidth
Figure 3.1
5
6 CHAPTER 3. PRELIMINARIES
Figure 3.2
Key properties:
R∞
1. Sifting:
−∞
w (t) δ (t − q) dt = w (q).
2. Time-domain impulse δ (t) has a at spectrum:
Z ∞
F{δ (t)} = δ (t) e−j2πf t dt = 1 (for all f ). (3.2)
−∞
Z ∞
F −1 {δ (f )} = δ (f ) ej2πf t df = 1 (for all t). (3.3)
−∞
Z ∞
−1
F {δ (f − fo )} = δ (f − fo ) ej2πf t df = ej2πfo t . (3.4)
−∞
1
F{cos (2πfo t)} = 2 δ (f − fo ) + 12 δ (f + fo )
(3.6)
1 1
F{sin (2πfo t)} = 2j δ (f − fo ) − 2j δ (f + fo ) .
Often we draw this as
Figure 3.3
Fourier transform requires evaluation of an integral. What do we do if we can't dene/solve the integral?
1
1. Generate (rate-
Ts ) sampled signal in MATLAB.
2. Plot magnitude of Discrete Fourier Transform (DFT) using plottf.m (from course webpage).
Square-wave example:
(a) (b)
Figure 3.4
Noise-wave example
(a) (b)
Figure 3.5
h
Notice that plottf.m only plots frequencies f ∈ − 2T1 s , 2T1 s .
An LTI system can be described by either its impulse response h (t) or its frequency response H (f ) =
F{h (t)}.
Figure 3.6
Input/output relationships:
• Time-domain: Convolution with impulse response h (t)
Figure 3.7
Figure 3.8
Figure 3.9
Figure 3.10
Figure 3.11
Figure 3.12
Figure 3.13
The commands firpm and fir2 have the same interface, but yield slightly dierent results (often worse
for our apps).
In MATLAB, perform ltering on
1
Ts -sampled signal x via
y = Ts*filter(h,1,x); or y = Ts*conv(h,x);
(a) (b)
Figure 3.14
important: The routines firls,firpm,fir2 generate causal linear-phase lters with group delay
= Lf
2 samples. Thus, the ltered output y will be delayed by Lf
2 samples relative to x .
Figure 4.1
where
H (f ): linear ltering due to multipath propagation
w (t): additive noise/interference.
Noise/interference sources include:
Es
signal energy
• signal-to-noise ratio (SNR) = En
noise energy
=
• roughly speaking, average SNR can be improved by ltering out the frequencies dominated by noise:
Figure 4.2
13
14 CHAPTER 4. THE COMMUNICATIONS CHANNEL
Figure 4.3
x (t) = c1 s (t − τ1 ) + c2 s (t − τ2 ) + · · · + cN s (t − τN ) , (4.1)
h (τ ) = c1 δ (τ − τ1 ) + c2 δ (τ − τ2 ) + · · · + cN δ (τ − τN ) . (4.2)
(a) (b)
Figure 4.4
Analog Communication
1
Figure 5.1
1
+ e−j2πfc t
j2πf t
Euler's cos (2πfc t) = 2 e c
then implies
R∞
S (f ) = −∞
m (t) cos (2πfc t) e−j2πf t dt
1 ∞ −j2π(f −fc )t
R∞
dt + 12 −∞ m (t) e−j2π(f +fc )t dt
R
= m (t) e (5.1)
2 −∞
1
= 2M (f − fc ) + 21 M (f + fc ) .
15
16 CHAPTER 5. ANALOG COMMUNICATION
Figure 5.2
Figure 5.3
Figure 5.4
νfc
note: a freq oset of λ = c Hz can occur when there is relative velocity of ν m/s between
transmitter and receiver.
Figure 5.5
π
v (t) = 2 LPF{ |r (t) | } −A
(5.5)
≈ m (t) (with a trivial channel)
Figure 5.6
QAM is motivated by unwanted redundancy in the AM spectrum, which was symmetric around fc .
QAM sends two real-valued signals {mI (t) , mQ (t)} simultaneously, resulting in a non-symmetric spec-
trum.
Figure 5.7
Figure 5.8
where the LPF specs are the same as in AM, i.e., passband edge Bp ≥ W Hz and stopband edge
Bs ≤ 2fc − W Hz.
For a trivial channel, we have r (t) = s (t), so that
= mI (t)
(5.6)
vQ (t) = LPF{−r (t) · 2sin (2πfc t)}
= LPF{−mI (t) 2cos (2πfc t) sin (2πfc t)
| {z }
sin(4πfc t)
= mQ (t) ,
assuming synchronized oscillators.
When the oscillators are not synchronized, one gets coupling between the I&Q components as well as
attenuation of each. Writing the I&Q signals in the complex-baseband form
Figure 5.9
F
note: Re{u (t)} = 1
2 [u (t) + u∗ (t)] ↔ 1
2 [U (f ) + U ∗ (−f )].
=
mI (t) cos (2πfc t) − mQ (t) sin (2πfc t) = s (t) ,
as well as for demodulation (assuming r (t) = s (t)):
−j4πfc t
− mQ (t) je−j4πfc t − j }
= LPF{mI (t) 1 + e
note: To get the complex baseband formulation for AM, we simply set mQ (t) = 0 and mI (t) =
m (t).
VSB is another way to restore regain the spectral eciency lost in AM. It's used to transmit North American
terrestrial TV, both analog (NTSC) and digital (ATSC) formats.
Figure 5.10
C (f − fc ) + C (f + fc ) = 2 for |f | ≤ W, (5.10)
Figure 5.11
V (f ) = LPF{S (f − fc ) + S (f + fc )}
1
= 2 LPF{[M (f ) + M (f − 2fc )] C (f − fc )
(5.12)
+ [M (f + 2fc ) + M (f )] C (f + fc )}
1
= M (f ) [C (f − fc ) + C (f + fc )]
|2 {z }
=1 for f ∈[−W,W ]
= M (f ) .
We note that the property
1
F{cos (2πfc t) c (t)} = 2 [C (f − fc ) + C (f + fc )] (5.13)
may be convenient, e.g., for testing whether a given lter c (t) satises the passband VSB criterion. VSB
∼
ltering can also be implemented at baseband using a complex-valued lter response c (t) which satises
generating the complex-baseband message signal m̃ (t). The message can be recovered by simplying ignoring
the imaginary part of the complex-baseband output ṽ (t).
Figure 5.12
(a) (b)
Figure 5.13
Z t
s (t) = cos 2πfc t + 2πkf m (τ ) dτ . (5.15)
0
| {z }
ϕ(t)"instantaneous modulation phase"
where kf is called the frequency-sensitivity factor. Since the instantaneous modulation frequency
dϕ (t)
= 2πkf m (t) (5.16)
dt
is a scaled version of the message m (t), it is tting to call this scheme frequency modulation.
Using the peak frequency deviation ∆f = kf max|m (t) |, the modulation index D is dened as
∆f
D = (5.17)
W ← denominator is the single-sided BW of m (t) .
Increasing D decreases spectral eciency but increases robustness to noise/interference.
Figure 5.14
There are various FM demodulators, but the discriminator is one of the best known. Recalling that
d dϕ (t)
cos (ϕ (t)) = − sin (ϕ (t)) , (5.20)
dt dt
we see that
Rt
d d
dt s (t) = dt cos2πfc t + 2πkf 0 m (τ ) dτ
Rt (5.21)
= − [2πfc + 2πkf m (t)] sin 2πfc t + 2π 0 m (τ ) dτ
is a form of large-carrier AM (assuming fc > kf m (t)), which can be demodulated using an envelope detector
as follows:
Figure 5.15
When designing a comm system, it is impossible to know exactly what the signal and noise waveforms will
be. But usually we know average characteristics such as energy distribution across frequency. It is exactly
these statistics that are most often used for comm system design.
We will consider random waveforms known as zero-mean wide-sense stationary random processes. Such
an x (t) is completely completely characterized by its power spectral density Sx (f ), or average signal power
versus frequency f. The technical denition of PSD accounts for the fact that power is dened as energy per
unit time:
Z 2
1 T
Sx (f ) := lim E{ x (t) ej2πf t dt }, (6.1)
T →∞ 2T −T
Broadband noise is often modelled as white random noise. A fundamentally important question is: What
does ltering do to the power spectrum of a signal? The answer comes with the aid of the autocor-
relation function Rx (τ ), dened as
F
Rx (τ ) ↔ Sx (f ) . (6.4)
Sw (f ) = No ⇒ Rw (τ ) = No δ (τ )
(6.5)
⇒ E{w (t) w∗ (t − τ )} = No δ (τ ) .
Here we see that w (t1 ) and w (t2 ) |t2 6= t1 are "uncorrelated" because E{w (t1 ) w∗ (t2 )} = 0, and that w (t)
2
has average energy Ew = E{|w (t) | } = ∞, which may be surprising. We could have found the same via
R∞
Ew = −∞ Sw (f ) df .
1 This content is available online at <http://cnx.org/content/m31819/1.3/>.
25
26 CHAPTER 6. RANDOM SIGNALS AND NOISE
R ∞ Now say that white noise w (t) is ltered with non-random h (t), yielding output y (t) =
−∞
w (q) h (t − q) dq . We can nd Sy (f ) by rst nding Ry (τ ) and then taking the FT. Recall:
R∞ R∞
Ry (τ ) = E{ −∞ w (q1 ) h (t − q1 ) dq1 −∞ w∗ (q2 ) h∗ (t − τ − q2 ) dq2 }
R∞ R∞ (6.7)
= E{ −∞ −∞ w (q1 ) w∗ (q2 ) h (t − q1 ) h∗ (t − τ − q2 ) dq1 dq2 }.
Because averaging is a linear operation, and because the h (·) terms are xed (non-random) quantities, we
can write
R∞ R∞
Ry (τ ) = −∞ −∞
E{w (q1 ) w∗ (q2 )} h (t − q1 ) h∗ (t − τ − q2 ) dq1 dq2 . (6.8)
E{w (q1 ) w∗ (q2 )} = E{w (q1 ) w∗ (q1 − (q1 − q2 ))} = No δ (q1 − q2 ) , (6.9)
R∞ R∞
Ry (τ ) = −∞ −∞
No δ (q1 − q2 ) h (t − q1 ) h∗ (t − τ − q2 ) dq1 dq2
R∞
= No −∞ h (t − q2 ) h∗ (t − τ − q2 ) dq2
R −∞ (6.10)
= No ∞
h (q) h∗ (q − τ ) (−dq) using q := t − q2
R∞
= No −∞ h (q) h∗ (q − τ ) dq.
To summarize, the autocorrelation of ltered white noise is
Z ∞
Ry (τ ) = No h (q) h∗ (q − τ ) dq. (6.11)
−∞
2
Sy (f ) = No |H (f ) | . (6.13)
More generally, the power spectrum of a ltered random process x (t) can be shown to be
2
Sy (f ) = Sx (f ) |H (f ) | , (6.14)
Linear communication schemes (e.g., AM, QAM, VSB) can all be represented (using complex-baseband
mod/demod) as:
Figure 7.1
Figure 7.2
Since s (t) is a bandpass signal, we can replace the wideband channel response h (t) with its bandpass
equivalent hbp (t):
1 This content is available online at <http://cnx.org/content/m31811/1.3/>.
27
28 CHAPTER 7. COMPLEX-BASEBAND EQUIVALENT CHANNEL
Figure 7.3
Figure 7.4
We can now reverse the order of the LPF and hbp (t) e−j2πfc t (since both are LTI systems), giving
Figure 7.5
Since mod/demod is transparent (with synched oscillators), it can be removed, simplifying the block
diagram to
Figure 7.6
Now, since m̃ (t) is bandlimited to W Hz, there is no need to model the left component of Hbp (f + fc ) =
F{hbp (t) e−j2πfc t }:
Figure 7.7
Replacing hbp (t) e−j2πfc t with the complex-baseband response h̃ (t) gives the complex-baseband equiv-
alent signal path:
Figure 7.8
The spectrums above show that hbp (t) = Re{h̃ (t) · 2ej2πfc t }.
Next consider the noise path on it's own:
Figure 7.9
Figure 7.10
From the diagram, ṽn (t) is a baseband version of the bandpass noise spectrum that occupies the frequency
range f ∈ [fc − Bs , fc + Bs ].
Since ṽn (t) is complex-valued, Ṽn (f ) is non-symmetric.
Say that w (t) is real-valued white noise with power spectral density (PSD) Sw (f ) = N0 . Since Sw (f )
is constant over all f, the PSD of the complex noise ṽn (t) will be constant over the LPF passband, i.e.,
f ∈ [−Bp , Bp ]:
Figure 7.11
A well-designed communications receiver will suppress all energy outside the signal bandwidth W, since
it is purely noise. Given that the noise spectrum outside f ∈ [−W, W ] will get totally suppressed, it doesn't
matter how we model it! Thus, we choose to replace the lowpass complex noise ṽn (t) with something simpler
to describe: white complex noise w̃ (t) with PSD Sw̃ (f ) = N0 :
Figure 7.12
Figure 7.13
The diagrams above should convince you of the utility of the complex-baseband representation in sim-
plifying the system model!
Digital Communication
1
Transmission consists of
P
1. pulse shaping: m̃ (t) = n a [n] g (t − nT ),
2. modulation: s (t) = Re{m̃ (t) ej2πfc t }.
Reception consists of
Figure 8.1
Building on analog QAM mod/demod components, digital mod adds pulse shaping & demod adds lter-
ing/sampling.
Simplifying via the complex-baseband equivalent channel:
33
34 CHAPTER 8. DIGITAL COMMUNICATION
Figure 8.2
Transmitter pulse shaping is used to convert the symbol sequence {a [n]} into the continuous message
m̃ (t):
P
m̃ (t) = n a [n] g (t − nT ) "baseband message"
(8.1)
T = "symbol period"
Thus, m̃ (t) can be seen to be a superposition of scaled and time-shifted copies of the pulse waveform g (t).
Example, if the symbol sequence [a [0] , a [1] , a [2] , a [3] , a [4]] equals [1, 3, −1, 1, 3], then the square pulse
g (t) shown below left yields the message m̃ (t) shown below right.
Figure 8.3
Noise suppression was briey discussed in Preliminaries (Chapter 3) and will soon be revisited in more detail.
Next we describe ISI.
Realize that, in the ideal digital comm system, the nth output y [n] would simply equal the nth input
a [n]. But in practice, y [n] can be corrupted by interference from the other symbols {a [m]}m6=n , known as
inter-symbol interference, and noise.
Figure 8.4
R P
y (t) = q (τ ) m̃ (t − τ ) dτ for m̃ (t) = n a [n] g (t − nT )
P R
n a [n] q (τ ) g (t − nT − τ ) dτ
= (8.2)
P
= n a [n] p (t − nT ) for p (t) = g (t) ∗ q (t) .
Figure 8.5
where
P P
y [m] = y (mT ) = n a [n] p (mT − nT ) = n a [n] p ((m − n) T ) . (8.3)
Figure 8.6
which is known as the Nyquist Criterion. This criterion can be simply stated as p (mT ) = δ [m] using
Examples of Nyquist, and non-Nyquist, combined-pulses p (t) for [a [0] , a [1] , a [2] , a [3] , a [4]] =
[1, 3, −1, 1, 3]:
Figure 8.7
1
P∞ k
F P∞
T k=−∞ δ f− T ↔ m=−∞ δ (t − mT ) , (8.5)
∞ ∞
1 X k F
X
P (f ) ∗ δ f− ↔ p (t) · δ (t − mT ).
T T m=−∞
k=−∞ (8.6)
| {z } | {z }
∞ ∞
1
P( k
)
P P
T f− T p(mT )δ(t−mT )
k=−∞ m=−∞
1
P∞ k
F
T k=−∞ P f− T ↔ δ (t) , (8.7)
Figure 8.8
{ T1 P f −
k
In other words, the superposition of
T }k∈Z must sum to one. This frequency-domain version
of the Nyquist Criterion will soon come in handy...
A popular choice of combined pulse p (t) = g (t) ∗ q (t) is the raised-cosine pulse with rollo parameter
α ∈ [0, 1]:
cos(παt/T ) sin(πx)
pRC (t) = 1−(2αt/T )2
sinc (t/T ) , sinc (x) := πx
T |f | ≤ (1−α)
2T
(8.8)
(1−α)
πT 1−α
≤ (1+α)
2
PRC (f ) = { T cos 2α |f | − 2T 2T ≤ |f | 2T
.
(1+α)
0 2T ≤ |f |
Tradeo: larger α ⇒ less time-spread but more freq-spread:
Figure 8.9
Figure 8.10
Figure 8.11
Es E{|ys [m]|2 }
= = (8.10)
SNR
En E{|yn [m]|2 } ,
P
ys [m] = n a [n] p ((m − n) T ) = a [m] p (0)
R∞ (8.11)
p (0) = −∞
q (τ ) g (0 − τ ) dτ,
so that
R∞ 2
2
Es = E{|ys [m] | } = E{a [m] −∞ q (τ ) g (−τ ) dτ }
R 2
2 ∞ (8.12)
= E{|a [m] | } −∞ q (τ ) g (−τ ) dτ ,
| {z }
2
σa
R∞
yn [m] = yn (mT ) = −∞
q (τ ) w̃ (mT − τ ) dτ, (8.13)
so that
R 2
∞
En = E{|yn [m] |2 } = E{ −∞ q (τ ) w̃ (mT − τ ) dτ }
R∞ R∞
= E{ −∞ q (τ ) w̃ (mT − τ ) dτ −∞ q ∗ τ ' w̃∗ mT − τ ' dτ ' }
R∞ R∞ (8.14)
q (τ ) −∞ q ∗ τ ' E{w̃ (mT − τ ) w̃∗ mT − τ ' }dτ ' dτ
= −∞
| {z }
N0 δ(τ ' −τ )
R∞ 2
= N0 −∞
|q (τ ) | dτ.
Putting these together, we nd
R∞ 2
2
σa | −∞
q(τ )g(−τ )dτ |
SNR = R∞ 2 . (8.15)
N0 −∞
|q(τ )| dτ
Cauchy-Schwarz says
R 2
∞ R∞ 2 R∞ 2
−∞ b (τ ) c (τ ) dτ ≤ |b (τ ) | dτ · |c (τ ) | dτ
−∞ −∞
(8.16)
with equality i b (τ ) = Kc∗ (τ ) for any K,
which implies
2 R∞
σa 2
SNR ≤ N0 −∞
|g (−τ ) | dτ
(8.17)
with equality i q (τ ) = Kg ∗ (−τ ) for any K.
Noting that SNR doesn't depend on K, we choose K = 1. Thus, given pulse g (t), the SNR-maximizing
receiver lter is
R∞ R∞ ∗
Q (f ) = −∞
q (τ ) e−j2πf τ dτ = g (−τ ) e−j2πf τ dτ
R∞ hR−∞ i∗
∞
= −∞
g ∗ (t) ej2πf t dt = −∞
g (t) e −j2πf t
dt (8.19)
= G∗ (f ) .
Summary: For SNR-maximizing ISI-free pulses, we need
Figure 8.12
∗
At the receiver, we would use qSRRC (t) = gSRRC (−t) = gSRRC (t); the latter equality is due to gSRRC (t)
being real and symmetric.
Digital implementation of transmitter pulse-shaping and receiver ltering is much more practical than analog.
First, recall the analog implementation of our digital communication system: from the module Digital
Communication (Chapter 8).
Figure 9.1
1
If waveform x (t) is bandlimited to Hz, then (9.1)
2Ts
∞
X 1
x (t) = x [n] sinc (t−nTs ) for x [n] = x (nTs ) . (9.2)
n=−∞
Ts
In other words, a bandlimited waveform can be reconstructed from its samples via sinc pulse shaping.
43
CHAPTER 9. DISCRETE-TIME IMPLEMENTATION OF DIGITAL
44
COMMUNICATION
Figure 9.2
P
τ − l PT g [l] = g l PT
P
g (τ ) = l g [l] sinc T for
P
m̃ (t) = n a [n] g (t − nT )
P T
P P
= n a [n] l g [l] sinc T t − nT − l P
(9.3)
P T
P P
= n a [n] k g [k − nP ] sinc T t − k P via k = nP − l
P X
a [n] g [k − nP ]sinc T t − k PT
P
= k n
| {z }
:=m̃[k]
The sequence m̃ [k], a weighted sum of P -shifted pulses g [k], can be generated by P -upsampling a [n] (i.e.,
inserting P −1 zeros between every pair of samples) and ltering with g [k]:
Figure 9.3
R∞
y k PT = −∞ q (τ ) ṽ k PT − τ dτ
y↑ [k] =
R∞ P ∞
q [l] sinc PT τ − l PT ṽ k PT − τ dτ
= −∞
l=−∞ Z ∞
∞
P ' T
τ ṽ (k − l) − τ dτ ' '
P
= q [l] sinc (9.5)
l=−∞ −∞ T P
| {z }
{sinc( P t )∗ṽ(t)} =ṽ[k−l]
T t=(k−l) T
P
∞
P
= q [l] ṽ [k − l] = q [k] ∗ ṽ [k] ,
l=−∞
Figure 9.4
P
i.e., downsampling. Here sinc T t does anti-alias ltering.
Finally, we derive a discrete-time representation of the channel between m̃ [k] and ṽ [k]:
Figure 9.5
Using w̃ [k] to refer to the noise component of ṽ [k], it can be seen from the block diagram that
R∞ P
k PT − τ
w̃ [k] = w̃ (τ ) sinc dτ (9.6)
−∞ T
T2
P P
sinc t ∗ h̃ (t) ∗ sinc t = 2 h̃ (t) . (9.7)
T T P
T T2
So, with
P -sampling and reconstruction of P 2 h̃ (t), i.e.,
∞
T2 P T2
t − i PT h i PT
P
P2 h̃ (t) = h [i] sinc T for h [i] = P2 (9.8)
i=−∞
2
w̃ [k] + l m̃ [l] PT 2 h̃ k PT − l PT
P
ṽ [k] =
P P
= w̃ [k] + l m̃ [l] i h̃ [i] sinc (k − l − i)
| {z } (9.9)
δ[k−l−i]
P
= w̃ [k] + l m̃ [l] h̃ [k − l]
yielding the discrete-time channel
Figure 9.6
Merging the discrete-time channel with the discrete-time modulator and demodulator yields
Figure 9.7
known as the fractionally sampled system model. This model is very convenient for MATLAB simulation
and acts as a foundation for further analysis.
Recall the gure below, from the module Discrete-Time Implementation of Digital Communication (Chap-
ter 9). When the channel is trivial and noiseless and the pulses satisfy the Nyquist criterion (i.e.,
g [k] ∗ q [k] = δ [k]), the digital comm system will work perfectly, yielding y [n] = a [n].
Figure 10.1
In practice, however,
leading to y [n] 6= a [n], in which case we must infer the value of a [n] from the received samples {y [m]}∞
m=−∞ .
For now, we consider using only the single sample y [n] to infer a [n].
Key question: What are the mechanisms by which errors are made?
To better understand error behavior, we can plot the eye diagram or the constellation diagram and
calculate the symbol error rate (SER).
49
50 CHAPTER 10. ERROR ANALYSIS OF DIGITAL COMMUNICATIONS
Figure 10.2
In MATLAB, the eye diagram can be made by superimposing P -sample segments of Re{y↑ [k]} corre-
P P −1
sponding to intervals k ∈ {nP − 2 , · · · , nP + 2 } for many n. (Usually P ≥ 8.)
Figure 10.3
If a [n] ∈ C, eye diagrams can be plotted for both the I and Q channels using Re{y (t)} and Im{y (t)},
respectively. MATLAB for digital mod/demod with eye diagram:
(a) (b)
Figure 10.4
The constellation diagram is a plot of Im{y [n]} vs. Re{y [n]} for many integers n. When the comm system
is working well, the points cluster around the symbol alphabet values:
Figure 10.5
Recall that y [n] ∈ C due to the complex-baseband channel model, regardless of whether a [n] ∈ R or
a [n] ∈ C.
Sometimes it is instructive to superimpose a plot of Im{y↑ [n]} vs. Re{y↑ [n]}, which approximates the
trajectory of y (t) in the complex plane:
Figure 10.6
(a) (b)
Figure 10.7
Figure 10.8
alphabet
2
M -QAM M -PAM M -PSK
σa 2
2 2
∆ ∆ ∆2
6 M2 − 1 12 M2 − 1 4sin2 (π/M )
Table 10.1
A reasonable way to infer the transmitted symbol a [n] from the received sample y [n] is to decide that a [n]
was the alphabet element nearest to y [n].
Nearest-element decision making is equivalent to using decision regions whose boundaries are equidistant
from the two nearest alphabet elements:
Figure 10.9
When a [n] = a, the symbol error rate (SER) equals the probability that y [n] lies outside the decision
region corresponding to alphabet member a. Writing y [n] = a [n] + e [n], we represent the cumulative eect
of noise and ISI by the error e [n]. Usually we model e [n] as a Gaussian random variable with mean 0 and
variance σe 2 .
Let's rst consider an M -PAM alphabet, where a [n] ∈ R. Since the decision regions show that Im{y [n]} is
not useful, we'll consider only the real parts of y [n] and e [n].
When a [n] = a, we have
y [n] = a + e [n], implying that y [n] is Gaussian with mean a and variance σ e 2 ,
abbreviated as N a, σe2 . This is illustrated below for the case of 4-PAM:
Figure 10.10
Formally, we say that py[n]|a[n] (y|a), the probability density function (pdf ) of y [n] conditioned on a [n] =
a, obeys
!
2
1 (y − a)
py[n]|a[n] (y|a) = p exp − . (10.1)
2πσe2 2σe2
| {z }
N (a,σe2 )
Basically, py[n]|a[n] (y|a) tells us how likely it is that y [n] = y given that a [n] = a.
Consider rst the case where a is an interior (not an edge) element of the symbol alphabet. Given
∆ ∆
that a [n] = a, we make an error when y [n] < a − 2 or when y [n] > a + 2 . To nd the probability of the
latter error event, i.e.,
∆
P r{y [n] > a + | a [n] = a}, (10.2)
2
y ∈ a+ ∆
we integrate py[n]|a[n] (y|a) over
2 ,∞ :
!
∞ ∞ 2
(y − a)
Z Z
1
py[n]|a[n] (y|a)dy = exp − dy. (10.3)
2σe2
p
2
2πσe
a+ ∆
2
| {z } a+ ∆
2
N (a,σe2 )
Figure 10.11
!
∞ 2
(y − µ) x−µ
Z
1
√ exp − dy = Q , (10.4)
x 2πσ 2 2σ 2 σ
| {z }
N (µ,σ 2 )
Figure 10.12
While the Q function is not represented in MATLAB, it can be calculated using the complementary
error function erf c:
1 x
Q (x) = erf c √ (10.5)
2 2
∆ (a+ ∆2 )−a
P r{y [n] > a + 2 | a [n] = a} = Q σe
(10.6)
∆
= Q 2σe .
By symmetry, the former error event probability is also
∆ ∆
P r{y [n] < a − 2 | a [n] = a} = Q 2σe . (10.7)
Since these two events are disjoint, the probability of making a decision error on an interior symbol equals
their sum:
∆ ∆ ∆
Q +Q = 2Q . (10.8)
2σe 2σe 2σe
For edge symbols, we experience half the decision error probability, since there is only one decision boundary
to cross.
Finally, we average over the conditional error probabilities:
P
P r{error} = P r{error|a [n] = a}P r{a [n] = a}
a ∈ alphabet
| {z }
=1/M for all a
(10.9)
∆ 2 ∆
= Q 2σ e
·M + 2Q 2σ e
· M−
M
2
2 M− 1 ∆
= M Q 2σe
,
2
∆
Using σa2 = 12 M2 − 1 , we can nally write
s !
σa2
M −1 3
SERM -PAM =2 Q . (10.10)
M (M − 1) σe2
2
With QAM, we have complex-valued y [n], a [n], e [n]. We'll assume that Re{e [n]} and Im{e [n]} are uncor-
related and equal variance. To calculate SER, we can re-use the PAM approach with a few modications:
Figure 10.13
h q 2
i2
M −1
3 σa
SERM 2 -QAM = 1− 1−2 Q . (10.11)
M (M 2 −1) σe2
With an M -ary alphabet, there are log 2 M bits per symbol, so 1 symbol error could cause up to log 2 M bit
errors.
Gray coding is a clever way of mapping bits to symbols so that neighboring symbols dier by only a
single bit. Since the vast majority of errors occur when y [n] falls into a neighboring decision region, Gray
coding yields BER ≈ SER.
Figure 10.14
Keywords are listed by the section with that keyword (page numbers are in parentheses). Keywords
do not necessarily appear in the text of the page. They are merely associated with that section. Ex.
apples, 1.1 (1) Terms are referenced by the page they appear on. Ex. apples, 1
B
Fourier transform, 3(5)
bandlimited, 9(43) fractional sampling, 9(43)
bandpass equivalent, 7(27) frequency domain, 3(5)
bandwidth, 3(5) frequeny modulation, 5(15)
baseband, 2(3)
BER, 10(49)
G Gray coding, 10(49)
D
message, 1(1)
DAC, 9(43) modulation, 5(15), 8(33)
decision regions, 10(49) modulator, 2(3)
demodulation, 5(15), 8(33) multipath propagation, 4(13)
digital, 9(43)
digital communication, 1(1) N noise, 4(13), 6(25)
downsampling, 9(43)
P PAM, 10(49)
S SER, 10(49)
W white noise, 6(25), 7(27)
wide-sense stationary, 6(25)
sifting, 3(5)
wideband, 7(27)
signal-to-noise ratio, 4(13), 8(33)
sinc pulse shaping, 9(43)
Z zero-mean, 6(25)
Attributions
About Connexions
Since 1999, Connexions has been pioneering a global system where anyone can create course materials and
make them fully accessible and easily reusable free of charge. We are a Web-based authoring, teaching and
learning environment open to anyone interested in education, including students, teachers, professors and
lifelong learners. We connect ideas and facilitate educational communities.
Connexions's modular, interactive courses are in use worldwide by universities, community colleges, K-12
schools, distance learners, and lifelong learners. Connexions materials are in many languages, including
English, Spanish, Chinese, Japanese, Italian, Vietnamese, French, Portuguese, and Thai. Connexions is part
of an exciting new information distribution system that allows for Print on Demand Books. Connexions
has partnered with innovative on-demand publisher QOOP to accelerate the delivery of printed course
materials and textbooks into classrooms worldwide at lower prices than traditional academic publishers.