Vous êtes sur la page 1sur 29

Seminar report

On
Trellis coded modulation

SUBMITTED TO:
Nisha Gupta
ELECTRONICS & COMMUNICATION DEPT.
NIT KURUKSHETRA

SUBMITTED BY:
RAMNEEK BANSAL
107440
ECE-4
ELECTRONICS & COMMUNICATION DEPT.

1
ABSTRACT

This report describes basic framework of TCM, which have very good performance as
comparison to conventional coding in case of bandlimited channels by just increasing the
number of symbols instead of increasing symbol rate.

And it also explain that in TCM coding and modulation occurs simultaneously while in
conventional and convolutional coding first coding is done then modulation occurs. QAM
and PSK are also briefly explained as TCM is widely used with them.

There is a practical example of TCM in the end which briefly explains all key aspects of
TCM that is trellis encoding, trellis decoding, mapper and set partitioning

ABBREVIATIONS

2
1. TCM –Trellis Code Modulation

2. ACG – Asymptotic Coding Gain

3. AWGN –Additive white Gaussian Noise

4. SED – Squared Euclidian Distance

5. MSED – Minimum Squared Distance

6. SSED – Sum of Squared Euclidean Distance

7. SNR – Signal To Noise Ratio

8. QAM – Quadrature Amplitude modulation

9. PSK – Phase Shift Key

10. BPSK – Binary Phase Shift Key

11. QPSK – Quadrature Phase Shift Key

12. ASK – Amplitude Shift Key

13. FSK – Frequency Shift Key

14. BER – Bit Error Rate

INDEX

3
1 Introduction…………………………………………........................................5
1.1 Features of Channel Coding…………………………………………5
1.2 TCM Introduction…………………………………………………...6
2 TCM…………………………………………………………………………....8
2.1 History of TCM……………………………………………………….8
2.2 Basic Concepts………………………………………………..…...…9
2.2.1 Euclidean Distance…………………………………………9
2.2.2 Hamming Distance…………………………………………9
2.3 Basics Principles of TCM…………………………………………....11
2.4QAM………………………………………………..………………..12
2.5 PSK………………………………………………………………….13
2.5.1 Binary Phase Shift Keying (BPSK) ………..……………..13
2.5.2 Quadrature Phase Shift Keying (QPSK) ……………….....15
2.6 TCM in QAM and PSK……………………………………………..16
2.7 Coding Gain…………………………………………………………18
3 Implementation………………………………………………………………...19
3.1 Basic Philosophy…………………………………………………….19
3.2 Trellis Encoding
3.2.1 Trellis Encoder…………………………………………….19
3.2.2 Trellis State Diagram………………………………………20
3.2.3 Set Partitioning……………………………………………..21
3.2 Trellis Decoding……………………………………………………..22
3.2.1 Viterbi Decoding…………………………………………..24
4. Applications of Trellis Coded Modulation…………………………………...25
4.1 Applications in Wireline Communications………………………….25
4.1.1 Adsl………………………………………………………..25
4.1.2 Data/Fax Modem…………………………………………..25
4.1.3 Cable Modem………………………………………………25
4.1.4 Ethernet…………………………………………………….25
4.2 Applications In Wireless Communications………………………….26
4.2.1 Wi-Fi………………………………………………………..26
4.2.2 Wimax………………………………………………………26
4.2.3 Wpan………………………………………………………..26
4.2.4 Uwb………………………………………………………...26
4.2.5 Satellite Communications…………………………………..26
5 Conclusion……………………………………………………………………...27
6 References……………………………………………………………………...28

4
1 INTRODUCTION

The aim of channel encoding theory is to find codes which transmit quickly, contain
many valid code words and can correct or at least detect many errors. These aims are
mutually exclusive however, so different codes are optimal for different applications. The
needed properties of this code mainly depend on the probability of errors happening
during transmission.[1]

The term algebraic coding theory denotes the sub-field of coding theory where the
properties of codes are expressed in algebraic terms and then further researched.

Algebraic Coding theory, is basically divided into two major types of codes

1. Linear block codes


2. Convolution codes

1.1 FEATURES OF CHANNEL CODING

• Information theory tells us that for optimal communications we should design long
sequences of signals, with maximum separation among them; and at the receiver we
should perform decision making over such long signals rather than individual bits or
symbols.
• If this process is done properly, then the message error probability will
decrease exponentially with sequence length, n provided that the rate R is less than R0,
which in turn is less than the Shannon Capacity.
2
 d min

Pe  e 2 2 …………. 1.1

• This is the idea behind coding. In conventional coding, the coding is separate from
modulation. Coding occurs at the digital level, before modulation and generally involves
adding bits to the input sequence. The resultant redundancy requires added bandwidth.
• At the receiver, hard decoding occurs after demodulation. The decoding
operation is based on hard decisions, since a digital bit (or symbol) stream fees the
decoder and is either in error or not. Decoding can also be done based on the analog
received samples, and this is called soft decoding. The theoretical loss due to hard [vs.
soft] decoding leads to a ~2dB performance loss.[5]

1.2 TCM INTRODUCTION

5
TCM uses many diverse concepts from signal processing. In simplest terms it is a
combination of coding and modulation, hence it name TCM where the word trellis stands
for the use of trellis (also called convolutional) codes. Whereas we normally talk about
coding and modulation as two independent aspects of the communications link, in TCM
they are combined. TCM is a complex concept to understand particularly due to the non-
linear nature of the performance. It uses ideas from modulation and coding as well as
dynamic programming, lattice structures and matrix math. A convolutional code that has
optimum performance when used independently may not be optimum in TCM. Gray
coding is helpful in uncoded signaling and constellation mapping, but not always so in
TCM.[3]
It uses concepts of convolutional codes, trellis, lattice, cossets, and cosset generators.
Communications theory says that it is best to design codes in long sequences of
messages. The allowed sequences should be very different from each other. The receiver
can then make a decision between sequences using their statistics rather than on symbol-
by-symbol basis. When decoding this way, the probability of error is an inverse function
of the sequence length. In general form the probability of error between sequences is
given by the expression

2
 d min

Pe  e 2 2 ………….1.2

where dmin is the sequence Euclidean distance between sequences and is ó2 the noise
power. We measure the performance of TCM (and many other schemes) by ACG. This is
the gain obtained over some baseline performance at high SNR in a Gaussian
environment. ACG is not achievable in practice because we do not transmit signals at
high SNRs, have hardware and channel imperfections that depart from AWGN
assumptions. So recognize that all gains quoted herein are maximum possible only in
theory.[3]

The functions of a TCM consist of a Trellis code and a constellation mapper as shown
in Figure
TCM combines the functions of a convolutional coder of rate and a M-ary signal mapper
that maps input points into a larger constellation of constellation points.[3]

6
FIGURE 1.1 A general trellis coded modulation

7
2 TCM

2.1 HISTORY OF TCM

FIGURE 2.1 History of TCM

8
2.2 BASIC CONCEPTS

2.2.1 EUCLIDEAN DISTANCE


While representing two signals in the Euclidean space as linear combination of M
orthonormal basis functions.[4]
A straight line distance between any two points is called the Euclidean distance. For a
point p1 at (x1, y1) and another point p2 at (x2, y2), the Euclidean distance is given by
the familiar formula

( X 1  X 2 ) 2  (Y1  Y2 ) 2 …………….2.1
It is implicit that this distance is the shortest distance between these points. The
Euclidean distance is an analog concept, the very concept of distance that we normally
use day-to-day in the world of real numbers. For signals, we define this distance in the I-
Q plane. In Figure 1 we have a
8PSK signal constellation. The radius is equal to 1 and represents the maximum
amplitude. Each point of the constellation is a certain combination of a particular
amplitude and phase. The distance between these points is can be measured in the manner
described above and these are given in the Figure below. The distances given in Figure 1
are squared and are called SED. The smallest of these distances is called the MSED,
designated as for a particular constellation.[3]

FIGURE 2.2 8 PSK constellation and squared Euclidean distances between symbols

2.2.2 HAMMING DISTANCE

Just as real numbers have a concept of distance, so do the binary numbers. Take two
binary numbers, 011011 and 101101. The distance between these is the number of places
these two numbers differ. And that number is 4. This distance is called the Hamming
distance between these numbers. The distance would be zero, if these two numbers were
the same. A zero distance means the numbers are the same, same interpretation as in
Euclidean concept of distance. We distinguish these two types of distances by
recognizing that one belongs to the analog world of real numbers and the other to the
binary world. Both concepts are useful in signal processing.

9
In coding Hamming distance is most often used as a performance metric whereas it is
Euclidean distance in the analog world.[3]

Distance between sequences


We can also talk about Euclidean distances between sequences by comparing distances
between corresponding points of the sequences. Let’s take for example an 8PSK signal
that consists of a sequence of these symbols.[3]
S0 S3 S2 S1 S0
In bits, we can map these as: 000 011 010 101 100 000

FIGURE 2.3 Euclidean and sequence Hamming distance

The Euclidean distance for this sequence is the distance between each symbol in this
sequence and a reference sequence. If we designate the all-zero-symbols as the
reference sequence, then the squared Euclidean distance (SED) is the distance between
each one of these symbols and the symbol S0.
s0 to s0 = 0.0, s0 to s1 = .586, s0 to s2 = 2.0, s0 to s3 = 3.414
The SSED, also called d2 free of this sequence, from the all zero sequence is 3.414 + 2.0
+ 0.586 = 6.0
This cumulative distance gives a feeling of how easy or difficult it would be to mistake
one sequence for another. For the reference sequence we could have used any other
sequence than the all zero, and the results would be the same. However using an all-zero
sequence is convenient and conventional.[3]

10
2.3 BASIC PRINCIPLES OF TCM

• The key idea is that the operations of [baseband] modulation and coding are combined.
• The bandwidth is not expanded: same symbol rate, but redundancy is introduced by
using a constellation with more points than would be required without coding.
– Typically, the number of points is doubled
– The symbol rate is unchanged
– The power spectrum is unchanged
• Since there are more possible points per symbol, it may appear that the error probability
would increase for a given S/N.
• As in conventional coding, dependencies are introduced among different symbols
---only certain sequences of successive constellation points are allowed.
• By properly making use of these constraints during reception, the error probability
actually decreases.
• A measure of performance improvement is the coding gain, which is the difference in
S/N between a coded and uncoded system of the same information rate that produces the
same error probability.
• It can be shown for the Gaussian channel that there is an input discrete alphabet that has
capacity very close to the capacity with continuous inputs
• As shown on the next chart, an eight- level system can achieve a capacity of 2
bits/symbol
• This suggests that it is only necessary to double the signal constellation to get good
coding gains (increasing the signal alphabet will not improve the coding gain)
• The bandwidth has not been expanded (same symbol rate)[5]

FIGURE 2.4 TCM

11
2.4 QAM

Quadrature amplitude modulation (QAM) is a modulation scheme in which two


sinusoidal carriers, one exactly 90 degrees out of phase with respect to the other, are used
to transmit data over a given physical channel. Because the orthogonal carriers occupy
the same frequency band and differ by a 90 degree phase shift, each can be modulated
independently, transmitted over the same frequency band, and separated by demodulation
at the receiver. For a given available bandwidth, QAM enables data transmission at twice
the rate of standard pulse amplitude modulation (PAM) without any degradation in the bit
error rate (BER). QAM and its derivatives are used in both mobile radio and satellite
communication systems.

You can use the numerically controlled oscillator (NCO) Compiler to design a dual-
output oscillator that accurately generates the in-phase and quadrature carriers used by a
QAM modulator. The carrier frequency of each sinusoid can be set to any precision by
defining the phase increment input to the NCO. A block diagram of the QAM modulator
is shown Figure 1. A raised cosine finite impulse response (FIR) filter is used to filter the
data streams before modulation onto the quadrature carriers. When passed through a
band-limited channel, rectangular pulses suffer from the effects of time dispersion and
tend to smear into one another. This pulse shaping filter eliminates inter-symbol
interference by ensuring that at a given sampling instance, the contribution to the
response from all other symbols is zero.[6]

FIGURE 2.5 quadrature modulator

The motivation for QAM comes from the fact that a DSBSC signal occupies twice the
bandwidth of the message from which it is derived. This is considered wasteful of
resources. QAM restores the balance by placing two independent DSBSC, derived from

12
message #1 and message #2, in the same spectrum space as one DSBSC. The bandwidth
imbalance is removed.
In digital communications this arrangement is popular. It is used because of its bandwidth
conserving (and other) properties.
The QAM modulator is so named because, in analog applications, the messages do in fact
vary the amplitude of each of the DSBSC signals.
In QPSK the same modulator is used, but with binary messages in both the I and Q
channels, as describe above.
Each message has only two levels, ±V volt. For a non-bandlimited message this does not
vary the amplitude of the output DSBSC. As the message changes polarity this is
interpreted as a 1800 phase shift, given to the DSBSC.

2.5 PSK

Phase-shift keying (PSK) is a digital modulation scheme that conveys data by changing,
or modulating, the phase of a reference signal (the carrier wave).
Any digital modulation scheme uses a number of distinct signals to represent digital data.
In the case of PSK, a finite number of phases are used. Each of these phases is assigned a
unique pattern of binary bits. Usually, each phase encodes an equal number of bits. Each
pattern of bits forms the symbol that is represented by the particular phase. The
demodulator, which is designed specifically for the symbol-set used by the modulator,
determines the phase of the received signal and maps it back to the symbol it represents,
thus recovering the original data. This requires the receiver to be able to compare the
phase of the received signal to a reference signal — such a system is termed coherent.[7]

2.5.1 BPSK
There are three major classes of digital modulation techniques used for transmission of
digitally represented data:
• ASK
• FSK
• PSK
All convey data by changing some aspect of a base signal, the carrier wave, (usually a
sinusoid) in response to a data signal. In the case of PSK, the phase is changed to
represent the data signal. There are two fundamental ways of utilizing the phase of a
signal in this way:
• By viewing the phase itself as conveying the information, in which case the
demodulator must have a reference signal to compare the received signal's phase against;
or
• By viewing the change in the phase as conveying information — differential schemes,
some of which do not need a reference carrier (to a certain extent).
A convenient way to represent PSK schemes is on a constellation diagram. This shows
the points in the Argand plane where, in this context, the real and imaginary axes are
termed the in-phase and quadrature axes respectively due to their 90° separation. Such a
representation on perpendicular axes lends itself to straightforward implementation. The

13
amplitude of each point along the in-phase axis is used to modulate a cosine (or sine)
wave and the amplitude along the quadrature axis to modulate a sine (or cosine) wave.
In PSK, the constellation points chosen are usually positioned with uniform angular
spacing around a circle. This gives maximum phase-separation between adjacent points
and thus the best immunity to corruption. They are positioned on a circle so that they can
all be transmitted with the same energy. In this way, the moduli of the complex numbers
they represent will be the same and thus so will the amplitudes needed for the cosine and
sine waves. Two common examples are BPSK which uses two phases, and QPSK which
uses four phases, although any number of phases may be used. Since the data to be
conveyed are usually binary, the PSK scheme is usually designed with the number of
constellation points being a power of 2.

FIGURE 2.6 Constellation diagram for BPSK.

BPSK is the simplest form of PSK. It uses two phases which are separated by 180° and
so can also be termed 2-PSK. It does not particularly matter exactly where the
constellation points are positioned, and in this figure they are shown on the real axis, at 0°
and 180°. This modulation is the most robust of all the PSKs since it takes serious
distortion to make the demodulator reach an incorrect decision. It is, however, only able
to modulate at 1bit/symbol (as seen in the figure) and so is unsuitable for high data-rate
applications.

14
2.5.2 QPSK

FIGURE 2.7 Constellation diagram for QPSK with Gray coding.

Sometimes known as quaternary or quadriphase PSK or 4-PSK, QPSK uses four points
on the constellation diagram, equispaced around a circle. With four phases, QPSK can
encode two bits per symbol, shown in the diagram with Gray coding to minimize the
BER — twice the rate of BPSK. Analysis shows that this may be used either to double
the data rate compared to a BPSK system while maintaining the bandwidth of the signal
or to maintain the data-rate of BPSK but halve the bandwidth needed.
can be viewed as a quaternary modulation, it is easier to see it as two independently
modulated quadrature carriers. With this interpretation, the even (or odd) bits are used to
modulate the in-phase component of the carrier, while the odd (or even) bits are used to
modulate the quadrature-phase component of the carrier. BPSK is used on both carriers
and they can be independently demodulated.
As a result, the probability of bit-error for QPSK is the same as for BPSK:

15
2.6 TCM IN QAM AND PSK

• Given a channel with a bandwidth limitation, first determine the maximum symbol rate
that can be transmitted.
• Determine the size of the alphabet, which is needed to produce the desired bit rate.
• Double the size of the constellation and introduce a channel coder that produces one
extra bit
• The coder need not code all the incoming bits
• There are many ways to map the coded bits into symbols. The choice of mapping will
drastically affect the performance of the code.
• Ungerboeck produced a good heuristic technique called mapping by set partitioning
– The encoding philosophy is to first partition the larger constellation into smaller subsets
– The Euclidean distance between sequences of signal points in different subsets is
substantially increased (and may be on the order of the distance between points in the
same subset)
– Performance will be determined by the distance between sequences in different subsets.
• Trellis coding produces a dramatic increase in the Euclidean (free) distance between
sequences of signal points and the Viterbi Algorithm is used to detect the signal
• Results also hold for 2-dimensional modulation.[3]

Let’s say that we intend to transmit a QPSK signal. Figure 2.8 shows the constellation of
a QPSK signal of amplitude = 1. The minimum Euclidean distance between the four

constellation points is min now we draw the trellis of this QPSK signal
which is a trivial case.[5]

FIGURE 2.8 QPSK signal constellation and its trellis


(a) Four constellation points of QPSK, (b) the signal trellis of a QPSK signal
which allows all transitions at each time period.

16
So if original signal is BPSK, then a TCM encoder will put out a QPSK, a QPSK will
become 8PSK and if 8PSK was chosen, it becomes a 16QAM signal. As constellation
expands but the signal energy is kept the same, the distance between the symbols
decreases. That implies a worsening of a performance, not improving. So where is the
improvement coming from?
We start with a given bandwidth B, because in real life this is a big constraint. From this
bandwidth, we determine the maximum possible symbol rate, which is never more than
2B but usually less. Now determine the size of the alphabet that can deliver the needed
signal BER at the given available power.

The MSED, is the minimum squared distance between all points of a constellation and is
usually the distance between any two adjacent points.
The decoder on the receive side makes the decision about which symbol was sent based
on which decision region the signal falls in sort like a dartboard.[3]

FIGURE 2.9 General trellis coded modulation


(a) BPSK, code rate 1/2, output QPSK (b) QPSK, code rate = 2/3, output 8PSK
(c) 8PSK, code rate = 3/4, output 16QAM

17
2.8 CODING GAIN

The coding gain of a coded signal is given by

where dfree/coded is equal to the coded sequence Euclidean distance and dmin/uncoded
is minimum distance between the signals in the uncoded constellation as previously
defined. This coding gain is referenced to the baseline signal.

How do you measure the Euclidean distance of a coded signal when in fact, its
constellation Euclidean distance is smaller than dmin. Now we need to talk about
distances between sequences rather than distances between signals. dfree is defined as the
Euclidean distance of a coded signal in terms of the smallest possible distance between
all allowed sequences. Instead of checking all possible combinations, this distance is
measured from the all-zero sequence, same as the measurement of Hamming distance and
Hamming weight, which are both referenced to an all-zero code word.
Let say that we transmit an all-zero message. During decoding, errors occur and wrong
trellis path is followed by the decoder. The only way, the decoder can get depart and then
back to the correct path, which is the all-zero path, is by diverging and then remerging.
Remember that each sequence is a set of demodulated symbols. When two paths diverge,
it means, there was an error and the decoder made a wrong decision. Assuming that the
probability of such error is small, at subsequent junctions, the further decisions should
take the path back to the correct one. A small allowed path which incorrect is more likely
than a long one, so the distance of this small path is a measure of the error correcting
capability of the code. This is the same concept as when a receiver is most likely to pick
neighboring signal points because they are most like the correct signal, rather than
picking one that is quite different, as such the fundamental idea behind MLD.[3]

18
3 IMPLEMENTATION

3.1 BASIC PHILOSOPHY

• Form an expanded constellation, with double the number of points


• Partition that constellation into subsets. The points within each subset are far
apart in Euclidean distance, and are made to correspond to the uncoded bits.
• The remaining bits determine the choice of the subset. Only certain sequences
of subsets are allowed. Typically, the allowed sequences correspond to a
simple convolutional code.
• In order to keep the allowed sequences far apart, choose subsets that
correspond to branching in and out of each state to have maximum distance
separation.
• At the receiver, we find the allowed sequence which is closest in Euclidean
distance to the received sequence of signals.
• After the output sequence is decoded, the receiver decides between the
uncoded points based on the Euclidean distance to the nearest signal point ---
thus the distance between uncoded pairs and closest sequences should be ~ the
same.

3.2 TRELLIS ENCODING


3.2.1 TRELLIS ENCODER
Even though the minimum distance between signal points in the enlarged constellation is
reduced from the original constellation (for the same average power), TCM succeeds in
increasing the distance between the transmitted sequences.
• Finding good TCM codes does not follow from knowing how to find good codes with
good hamming distances (i.e. conventional convolutional codes)
• The mapping to analog signals is critical
• Recall that the output of the coder is determined by the new input and the current state
and the state evolves to a (possibly) new state.[5]

FIGURE 3.1 trellis encoder

19
3.2.2 TRELLIS STATE DIAGRAM
The bits are encoded in accordance with the trellis state diagram. Every state has two
paths coming out of it. The two paths corresponds to the two of the partitioned sets with
maximum Euclidean between two state vectors.

FIGURE 3.2 TCM does not protect parallel branches


Receiver trellis strives to generate (i.e. “estimate”)
the transmit path through the trellis

20
3.2.3 SET PARTITIONING

FIGURE 3.3 Partitioning of 16-Point Constellation

This Figure shows how the 8 points of 8PSK are successively portioned into disjoint
cosets such that the SEDs are increasing at each level. There are total of four partitions
counting the first unpartitioned set. At top-most level, the MSED is 0.586. At the next
level, where there are only four points in each of the two cosets, the MSED has increased
to 2.0 and at the last level, the MSED is 4.0. Each subset is also called a coset and by the
lattice terminology, we can show the partition with its coset generators in this way.
Since the top two levels have smaller distances, these errors are more likely, we will use
the coded bits to traverse through this part. b3 to and b2 which are coded can be used to
decide which partition (or coset) to choose and then we can use the uncoded bit at the last
level to pick the signal transmitted. The most significant bit b1, used at the last level, has
a large Euclidean distance from its complement and would require an error of 180
degrees to be corrupted.[3]

21
3.3 TRELLIS DECODING
Several algorithms exist for decoding convolutional codes. For relatively small values of
k, the Viterbi algorithm is universally used as it provides maximum likelihood
performance and is highly parallelizable.[2]
As with decoding of convolutional codes, the
Viterbi Algorithm (VA) is an application of dynamic programming that finds “shortest
paths” [here maximum likelihood sequences]. A critical feature is that complexity grows
linearly with time, rather than exponentially with time (i.e., the number of symbols
transmitted). The VA finds the sequence at a
= minimum Euclidean distance from the received signal ---or equivalently the
accumulated squared error is minimized.

1. Keep track of n possible sequences, each terminating in one of the n states.


2. For each new received symbol, calculate the new error value for each allowed
continuation of each sequence, and add it to the accumulated error of the sequence up to
that time.
3. For each new state, keep only the one sequence with minimum accumulated error.
Discard the other sequences.
Keep track of the new error and the bits associated with these n survivor sequences.
4. Depend on “merges”, and enough delay, to output the past history of the sequence.
The operation of the algorithm is best described by a trellis diagram, which shows the
possible sequences of states.[5]

22
FIGURE 3.4 trellis diagram

23
3.3.1 VITERBI ALGORITHM

FIGURE 3.5 Viterbi algorithm

• Compare (rk-Asolid)2 vs (rk - Adashed)2 to determine survivor for each state. We show
only the survivors.
• Note that “00” is a merged node at k (evident at k+2); similarly “00” is a merged node
at k+1 (evident at k+3). “11” merged at k+3 bold segment is part of max. likelihood
sequence.[5]

24
4. APPLICATIONS OF TRELLIS CODED MODULATION

This coding scheme has been used in many application such as Asymmetric Digital
Subscriber Line (ADSL), Data/Fax modem, Cable modem, Ethernet, Wi-Fi, WiMAX /
Wireless MAN, WPAN, UWB, Satellite and IP Core.

4.1 APPLICATIONS IN WIRELINE COMMUNICATIONS

Wireline communication (or fixed line communication) refers to computer networks


where there is a physical connection (either copper or fiber cables) between sender and
receiver.

4.1.1 ADSL

ADSL (Asymmetric Digital Subscriber Line) is a technology for transmitting digital


information at a high bandwidth on existing phone lines (also known as "twisted copper
pairs") to homes and businesses for ultra-fast Internet access.

4.1.2 DATA/FAX MODEM

A combination of fax and data modem, which is either an external unit that plugs into the
serial port or an expansion board that is installed internally. It includes a switch that
routes the call to the fax or data modem. The data/fax modem is like a regular modem
except that it is designed to transmit documents to a fax machine or to another fax
modem. The data/fax modem makes it possible to fax a document straight from the
computer, but cannot scan documents which are not in the computer.

4.1.3 CABLE MODEM

A cable modem is a device that enables you to hook up your PC to a local cable TV line
and receive data at about 1.5 Mbps. This data rate far exceeds that of the prevalent 28.8
and 56 Kbps telephone modems and the up to 128 Kbps of Integrated Services Digital
Network (ISDN) and is about the data rate available to subscribers of Digital Subscriber
Line (DSL) telephone service. A cable modem can be added to or integrated with a set-
top box that provides your TV set with channels for Internet access.

4.1.4 ETHERNET

Ethernet is the most widely-installed local area network (LAN) technology. Specified in a
standard, IEEE 802.3, Ethernet was originally developed by Xerox from an earlier
specification called Alohanet (for the Palo Alto Research Center Aloha network) and then
developed further by Xerox, DEC, and Intel.

25
4.2 APPLICATIONS IN WIRELESS COMMUNICATIONS

Wireless communication is fundamentally the art of communicating information without


wires. A wireless network is an infrastructure for communication “through the air”, in
other words, no cables are needed to connect from one point to another. These
connections can be used for speech, e-mail, surfing on the Web and transmission of audio
and video. The most widespread use is mobile telephones. Wireless networks are also
used for communication between computers.

4.2.1 Wi-Fi

Wi-Fi (short for "Wireless Fidelity") is a term for certain types of wireless local area
network (WLAN) that use specifications in the IEEE 802.11 family. The term Wi-Fi was
created by an organization called the Wi-Fi Alliance, which oversees tests that certify
product interoperability.

4.2.2 WiMAX

WiMAX is a wireless industry coalition whose members organized to advance IEEE


802.16 standards for broadband wireless access (BWA) networks. WiMAX 802.16
technology is expected to enable multimedia applications with wireless connection and,
with a range of up to 30 miles, enable networks to have a wireless last mile solution.

4.2.3 WPAN

“A wireless personal area network (WPAN) is a personal area network- a network for
interconnecting devices centered around an individual person's workspace - in which the
connections are wireless. Typically, a wireless personal area network uses some
technology that permits communication within about 10 meters - in other words, a very
short range. One such technology is Bluetooth, which was used as the basis for a new
standard, IEEE 802.15.

4.2.4 UWB

“Ultra wideband (also known as UWB or as digital pulse wireless) is a wireless


technology for transmitting large amounts of digital data over a wide spectrum of
frequency bands with very low power for a short distance. Ultra wideband radio not only
can carry a huge amount of data over a distance up to 230 feet at very low power (less
than 0.5 milliwatts), but has the ability to carry signals through doors and other obstacles
that tend to reflect signals at more limited bandwidths and a higher power.

4.2.5 SATELLITE COMMUNICATIONS

A communications satellite is a spacecraft that orbits the Earth and relays messages,
radio, telephone and television signals.

26
CONCLUSION

Just as for Gaussian channels, trellis-coded modulation is shown to be power-efficient


and bandwidth-efficient modulation technique for fading channels. A large amount of
coding gain on the order of 10 dB can be easily obtained in this case. Using two-fold
antenna diversity can improve the performance of trellis-coded modulation by another 8
dB.It has an edge over other coding techniques in band limited channels.It is widely used
in space telecommunications.[5]

27
REFERENCES

[1] www.wikipedia.org

[2] www.rfmd.com/DataBooks/db97/an0001.pdf

[3] www.complextoreal.com/chapters/tcm.pdf

[4] Communication Systems by Simon Haykin

[5] www.mjtele.com/pds/mjtele_pds/Trellis_coded_modulation.pdf

[6] www.altera.com/products/ip/altera/t-alt-qam.html

[7] www.eefocus.com/html/dict_83754_db8aed07fa1928147037f5a3608e2176.html

28
29

Vous aimerez peut-être aussi