UNIT III PART-A

Transcription

UNIT III PART-A
www.Vidyarthiplus.com
UNIT 1
PART-A
1. What is communication and mention the three essential things necessary or any
communication?
Communication is the process of establishing connection (or link) between two points
for information exchange
2. Define signal to noise ratio?
Signal to noise power ratio is the ratio of the signal power level to the noise power
level
S/N = Ps/Pn
Where Ps = Signal power(watts)
Pn= Noise power(watts)
Signal to noise power ratio is often expressed as a logarithmic function with the
decimal unit
S/N(db) = 10log Ps/Pn
3. What are the three primary characteristics of a transmission line?
Wave velocity
Frequency
Wavelength
4. What is transmission line?
Transmission line is a metallic conductor system used to transfer electrical energy
from one point to another using electrical flow.
5. Mention the disadvantage of an unbalanced transmission line?
The primary disadvantage is its reduced immunity to common mode signals such as
noise and other interference.
6. Mention the disadvantage of an open wire transmission line?
There is no shielding so the radiation losses are high
The cable is susceptible to picking up signals through mutual induction, which
produces cross talk.
7. What are the different types of losses involved in a transmission line?
Conductor loss
Dielectric heating loss
Radiation loss
Coupling loss
Corona
8. What are standing waves?
With mismatched line there are two electromagnetic waves travelling in an opposite
direction, present on the line at the same time. These waves are in fact called
travelling waves. Two travelling wave setup an interference pattern known as
standing wave.
9. Define critical frequency?
Critical frequency is defined as the highest frequency that can be propagated directly
upward and still be returned to the earth by the ionosphere.
10. What is Maximum Usable Frequency?
MUF is the highest frequency that can be used for sky wave propagation between two
specific points on earth’s surface.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
PART-B
1. What are the types of transmission line and their respective losses?
Transmission lines
Coaxial transmission line with one source and one load
Impedance bridging is unsuitable for RF connections, because it causes power to be
reflected back to the source from the boundary between the high and the low impedances.
The reflection creates a standing wave if there is reflection at both ends of the
transmission line, which leads to further power waste and may cause frequencydependent loss. In these systems, impedance matching is desirable.
In electrical systems involving transmission lines (such as radio and fiber optics)—where
the length of the line is long compared to the wavelength of the signal (the signal changes
rapidly compared to the time it takes to travel from source to load)— the impedances at
each end of the line must be matched to the transmission line's characteristic impedance (
) to prevent reflections of the signal at the ends of the line. (When the length of the
line is short compared to the wavelength, impedance mismatch is the basis of
transmission-line impedance transformers; see previous section.) In radio-frequency (RF)
systems, a common value for source and load impedances is 50 ohms. A typical RF load
is a quarter-wave ground plane antenna (37 ohms with an ideal ground plane; it can be
matched to 50 ohms by using a modified ground plane or a coaxial matching section, i.e.,
part or all the feeder of higher impedance).
The general form of the voltage reflection coefficient for a wave moving from medium 1
to medium 2 is given by
while the voltage reflection coefficient for a wave moving from medium 2 to medium 1 is
so the reflection coefficient is the same (except for sign), no matter from which direction
the wave approaches the boundary.
There is also a current reflection coefficient; it is the same as the voltage coefficient,
except that it has an opposite sign. If the wave encounters an open at the load end,
positive voltage and negative current pulses are transmitted back toward the source
(negative current means the current is going the opposite direction). Thus, at each
www.Vidyarthiplus.com
www.Vidyarthiplus.com
boundary there are four reflection coefficients (voltage and current on one side, and
voltage and current on the other side). All four are the same, except that two are positive
and two are negative. The voltage reflection coefficient and current reflection coefficient
on the same side have opposite signs. Voltage reflection coefficients on opposite sides of
the boundary have opposite signs.
Because they are all the same except for sign it is traditional to interpret the reflection
coefficient as the voltage reflection coefficient (unless otherwise indicated). Either end
(or both ends) of a transmission line can be a source or a load (or both), so there is no
inherent preference for which side of the boundary is medium 1 and which side is
medium 2. With a single transmission line it is customary to define the voltage reflection
coefficient for a wave incident on the boundary from the transmission line side,
regardless of whether a source or load is connected on the other side.
a)imbalanced transmission line
ii.unbalanced transmission line
b) Baluns
c) Metallic transmission line
i.parallel conductor
• Open wire
•twin lead
• Twisted pair
d) co-axial transmission line
Losses
a) Conductor loss
b) Dielectric heating loss
c) Radiatin loss
d) Coupling loss
e) Corona loss
2. Equivalent circuit of transmission line?
a)equivalent circuit for a single section transmission line terminated in a load equal to
Zo.
R-resistance
L-self inductance
c-capacitance
www.Vidyarthiplus.com
www.Vidyarthiplus.com
The four terminal model
For the purposes of analysis, an electrical transmission line can be modelled as a two-port
network (also called a quadrapole network), as follows:
In the simplest case, the network is assumed to be linear (i.e. the complex voltage across
either port is proportional to the complex current flowing into it when there are no
reflections), and the two ports are assumed to be interchangeable. If the transmission line
is uniform along its length, then its behaviour is largely described by a single parameter
called the characteristic impedance, symbol Z0. This is the ratio of the complex voltage of
a given wave to the complex current of the same wave at any point on the line. Typical
values of Z0 are 50 or 75 ohms for a coaxial cable, about 100 ohms for a twisted pair of
wires, and about 300 ohms for a common type of untwisted pair used in radio
transmission.
When sending power down a transmission line, it is usually desirable that as much power
as possible will be absorbed by the load and as little as possible will be reflected back to
the source. This can be ensured by making the load impedance equal to Z 0, in which case
the transmission line is said to be matched.
A transmission line is drawn as two black wires. At a distance x into the line, there is
current I(x) traveling through each wire, and there is a voltage difference V(x) between
the wires. If the current and voltage come from a single wave (with no reflection), then
V(x) / I(x) = Z0, where Z0 is the characteristic impedance of the line.
Some of the power that is fed into a transmission line is lost because of its resistance.
This effect is called ohmic or resistive loss. At high frequencies, another effect called
dielectric loss becomes significant, adding to the losses caused by resistance. Dielectric
loss is caused when the insulating material inside the transmission line absorbs energy
www.Vidyarthiplus.com
www.Vidyarthiplus.com
from the alternating electric field and converts it to heat. The transmission line is
modeled with a resistance (R) and inductance (L) in series with a capacitance (C) and
conductance (G) in parallel. The resistance and conductance contribute to the loss in a
transmission line.
The total loss of power in a transmission line is often specified in decibels per metre
(dB/m), and usually depends on the frequency of the signal. The manufacturer often
supplies a chart showing the loss in dB/m at a range of frequencies. A loss of 3 dB
corresponds approximately to a halving of the power.
High-frequency transmission lines can be defined as those designed to carry
electromagnetic waves whose wavelengths are shorter than or comparable to the length
of the line. Under these conditions, the approximations useful for calculations at lower
frequencies are no longer accurate.
Telegrapher's equations
The telegrapher's equations (or just telegraph equations) are a pair of linear
differential equations which describe the voltage and current on an electrical transmission
line with distance and time.
Schematic representation of the elementary component of a transmission line.
3. Explain in detail about transmission line model?
The transmission line model represents the transmission line as an infinite series of twoport elementary components, each representing an infinitesimally short segment of the
transmission line:
The distributed resistance
of the conductors is represented by a series resistor
(expressed in ohms per unit length).
The distributed inductance
(due to the magnetic field around the wires, self
inductance, etc.) is represented by a series inductor (henries per unit length).
The capacitance between the two conductors is represented by a shunt capacitor C
(farads per unit length).
The conductance
of the dielectric material separating the two conductors is
represented by a shunt resistor between the signal wire and the return wire (Siemens per
unit length).
The model consists of an infinite series of the elements shown in the figure, and that the
values of the components are specified per unit length so the picture of the component
can be misleading.
, , , and may also be functions of frequency. An alternative
notation is to use
,
,
and
to emphasize that the values are derivatives with
respect to length. These quantities can also be known as the primary line constants to
distinguish from the secondary line constants derived from them, these being the
propagation constant, attenuation constant and phase constant.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
The line voltage
as
and the current
can be expressed in the frequency domain
When the elements and are negligibly small the transmission line is considered as a
lossless structure. In this hypothetical case, the model depends only on the and
elements which greatly simplifies the analysis. For a lossless transmission line, the
second order steady-state Telegrapher's equations are:
These are wave equations which have plane waves with equal propagation speed in the
forward and reverse directions as solutions. The physical significance of this is that
electromagnetic waves propagate down transmission lines and in general, there is a
reflected component that interferes with the original signal. These equations are
fundamental to transmission line theory.
If
and
are not neglected, the Telegrapher's equations become:
where
and the characteristic impedance is:
The solutions for
and
are:
www.Vidyarthiplus.com
www.Vidyarthiplus.com
The constants
pulse
and
, starting at
transmitted pulse
Transform,
must be determined from boundary conditions. For a voltage
and moving in the positive
at position
, of
-direction, then the
can be obtained by computing the Fourier
, attenuating each frequency component by
,
advancing its phase by
, and taking the inverse Fourier Transform. The real
and imaginary parts of can be computed as
For small losses and high frequencies, to first order in
Noting that an advance in phase by
can be simply computed as
and
is equivalent to a time delay by
one obtains
,
Input impedance of lossless transmission line
Looking towards a load through a length l of lossless transmission line, the impedance
changes as l increases, following the blue circle on this impedance smith chart. (This
impedance is characterized by its reflection coefficient Vreflected / Vincident.) The blue circle,
centered within the chart, is sometimes called an SWR circle (short for constant standing
wave ratio.
The characteristic impedance
of a transmission line is the ratio of the amplitude of a
single voltage wave to its current wave. Since most transmission lines also have a
www.Vidyarthiplus.com
www.Vidyarthiplus.com
reflected wave, the characteristic impedance is generally not the impedance that is
measured on the line.
For a lossless transmission line, it can be shown that the impedance measured at a given
position from the load impedance
is
where
is the wave number.
In calculating , the wavelength is generally different inside the transmission line to
what it would be in free-space and the velocity constant of the material the transmission
line is made of needs to be taken into account when doing such a calculation.
Special cases
Half wave length
For the special case where
where n is an integer (meaning that the length of
the line is a multiple of half a wavelength), the expression reduces to the load impedance
so that
for all . This includes the case when
, meaning that the length of the
transmission line is negligibly small compared to the wavelength. The physical
significance of this is that the transmission line can be ignored (i.e. treated as a wire) in
either case.
Quarter wave length
For the case where the length of the line is one quarter wavelength long, or an odd
multiple of a quarter wavelength long, the input impedance becomes
Matched load
Another special case is when the load impedance is equal to the characteristic impedance
of the line (i.e. the line is matched), in which case the impedance reduces to the
characteristic impedance of the line so that
for all and all
.
Short
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Standing waves on a transmission line with an open-circuit load (top), and a short-circuit
load (bottom). Colors represent voltages, and black dots represent electrons.
For the case of a shorted load (i.e.
), the input impedance is purely imaginary
and a periodic function of position and wavelength (frequency)
Open
For the case of an open load (i.e.
imaginary and periodic
), the input impedance is once again
Stepped transmission line
A simple example of stepped transmission line consisting of three segments.
A stepped transmission line is used for broad range impedance matching. It can be
considered as multiple transmission line segments connected in series, with the
characteristic impedance of each individual element to be Z0,i. The input impedance can
be obtained from the successive application of the chain relation
where is the wave number of the ith transmission line segment and li is the length of
this segment, and Zi is the front-end impedance that loads the ith segment.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
The impedance transformation circle along a transmission line whose characteristic
impedance Z0,i is smaller than that of the input cable Z0. And as a result, the impedance
curve is off-centered towards the -x axis. Conversely, if Z0,i > Z0, the impedance curve
should be off-centered towards the +x axis.
Because the characteristic impedance of each transmission line segment Z 0,i is often
different from that of the input cable Z 0, the impedance transformation circle is off
centered along the x axis of the Smith Chart whose impedance representation is usually
normalized against Z0.
Standing wave
When Zo =ZL all the incident power is absorbed by the load.this is called as matched
line.when Zo≠ZL some of the incident power is absorbed by the load,and some is
returned to the source.this is called an unmatched or mismatched line.with a mismatched
line,there are two electromagnetic waves,traveling in opposite direction,present on the
line at the same time.the two traveling waves set up an interference pattern known as a
standing wave.
4. Give short notes about ground wave propagation and space wave propogation?
Radio waves in the VLF Very low frequency band propagate in a ground, or surface
wave. The wave is confined between the surface of the earth and to the ionosphere. The
ground wave can propagate a considerable distance over the earth's surface and in the low
frequency and medium frequency portion of the radio spectrum. Ground wave radio
propagation is used to provide relatively local radio communications coverage, especially
by radio broadcast stations that require to cover a particular locality.
The radio waves having high frequencies are basically called as space waves. These
waves have the ability to propagate through atmosphere, from transmitter antenna to
receiver antenna. These waves can travel directly or can travel after reflecting from
earth’s surface to the troposphere surface of earth. So, it is also called as Tropospherical
Propagation. In the diagram of medium wave propagation, c shows the space wave
propagation. Basically the technique of space wave propagation is used in bands having
very high frequencies. E.g. V.H.F. band, U.H.F band etc
5. Give short notes about Maximum Usable Frequency?
In radio transmission maximum usable frequency (MUF) is the highest radio frequency
that can be used for transmission between two points via reflection from the ionosphere (
skywave or "skip" propagation) at a specified time, independent of transmitter power.
This index is especially useful in regard to short wave transmissions.
In short wave radio communication, a major mode of long distance propagation is for the
radio waves to reflect off the ionized layers of the atmosphere and return diagonally back
to Earth. In this way radio waves can travel beyond the horizon, around the curve of the
Earth. However the refractive index of the ionosphere decreases with increasing
frequency, so there is an upper limit to the frequency which can be used. Above this
frequency the radio waves are not reflected by the ionosphere but are transmitted through
it into space.
The ionization of the atmosphere varies with time of day and season as well as with solar
conditions, so the upper frequency limit for skywave communication varies on an hourly
basis. MUF is a median frequency, defined as the highest frequency at which skywave
communication is possible 50% of the days in a month, as opposed to the (LUF) which is
the frequency at which communication is possible 90% of the days, and the frequency o
optimum transmission (FOT).
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Typically the MUF is a predicted number. Given the maximum observed frequency
(MOF) for a mode on each day of the month at a given hour, the MUF is the highest
frequency for which an ionospheric communications path is predicted on 50% of the days
of the month.
On a given day, communications may or may not succeed at the MUF. Commonly, the
optimal operating frequency for a given path is estimated at 80 to 90% of the MUF. As a
rule of thumb the MUF is approximately 3 times the critical frequency.
It is the highest frequency that can be used for sky wave propagation between specific two
points on earth surface.
Mathematically muf=critical frequency/
6.
Explain in detail about Transmission line impedance matching?
In electronics, impedance matching is the practice of designing the input impedance of an
electrical load (or the output impedance of its corresponding signal source) to maximize the
power transfer or minimize reflections from the load.
In the case of a complex source impedance ZS and load impedance ZL, maximum power
transfer is obtained when
where * indicates the complex conjugate. Minimum reflection is obtained when
Reflection-less matching
Impedance matching to minimize reflections is achieved by making the load impedance equal
to the source impedance. Ideally, the source and load impedances should be purely resistive:
in this special case reflection-less matching is the same as maximum power transfer matching.
A transmission line connecting the source and load together must also be the same impedance:
Zload = Zline = Zsource, where Zline is the characteristic impedance of the transmission line. The
transmission line characteristic impedance should also ideally be purely resistive. Cable
makers try to get as close to this ideal as possible and transmission lines are often assumed to
have a purely real characteristic impedance in calculations, however, it is conventional to still
use the term characteristic impedance rather than characteristic resistance.
Complex conjugate matching
Complex conjugate matching is used when maximum power transfer is required. This is
different from reflection-less matching only when the source or load have a reactive
component.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Zload = Zsource*
(where * indicates the complex conjugate).
If the source has a reactive component, but the load is purely resistive then matching can be
achieved by adding a reactance of the opposite sign to the load. This simple matching network
consisting of a single element will usually only achieve a perfect match at a single frequency.
This is because the added element will either be a capacitor or an inductor, both of which are
frequency dependent and will not, in general, follow the frequency dependence of the source
impedance. For wide bandwidth applications a more complex network needs to be designed.
Power transfer
Whenever a source of power with a fixed output impedance such as an electrical signal source,
a radio transmitter or a mechanical sound (e.g., a loudspeaker) operates into a load, the
maximum possible power is delivered to the load when the impedance of the load (load
impedance or input impedance) is equal to the complex conjugate of the impedance of the
source (that is, its internal impedance or output impedance). For two impedances to be
complex conjugates their resistances must be equal, and their reactances must be equal in
magnitude but of opposite signs. In low-frequency or DC systems (or systems with purely
resistive sources and loads) the reactances are zero, or small enough to be ignored. In this
case, maximum power transfer occurs when the resistance of the load is equal to the resistance
of the source.
Impedance matching is not always necessary. For example, if a source with a low impedance
is connected to a load with a high impedance the power that can pass through the connection
is limited by the higher impedance. This maximum-voltage connection is a common
configuration called impedance bridging or voltage bridging, and is widely used in signal
processing. In such applications, delivering a high voltage (to minimize signal degradation
during transmission or to consume less power by reducing currents) is often more important
than maximum power transfer.
In older audio systems (reliant on transformers and passive filter networks, and based on the
telephone system), the source and load resistances were matched at 600 ohms. One reason for
this was to maximize power transfer, as there were no amplifiers available that could restore
lost signal. Another reason was to ensure correct operation of the hybrid transformers used at
central exchange equipment to separate outgoing from incoming speech, so these could be
amplified or fed to a four-wire circuit. Most modern audio circuits, on the other hand, use
active amplification and filtering and can use voltage-bridging connections for greatest
accuracy. Strictly speaking, impedance matching only applies when both source and load
devices are linear; however, matching may be obtained between nonlinear devices within
certain operating ranges.
Impedance-matching devices
Adjusting the source impedance or the load impedance, in general, is called "impedance
matching". There are three ways to improve an impedance mismatch, all of which are called
"impedance matching":
Devices intended to present an apparent load to the source of Zload = Zsource* (complex
conjugate matching). Given a source with a fixed voltage and fixed source impedance,
the maximum power theorem says this is the only way to extract the maximum power
from the source.
Devices intended to present an apparent load of Zload = Zline (complex impedance
matching), to avoid echoes. Given a transmission line source with a fixed source
impedance, this "reflectionless impedance matching" at the end of the transmission
line is the only way to avoid reflecting echoes back to the transmission line.
Devices intended to present an apparent source resistance as close to zero as possible,
or presenting an apparent source voltage as high as possible. This is the only way to
www.Vidyarthiplus.com
www.Vidyarthiplus.com
maximize energy efficiency, and so it is used at the beginning of electrical power
lines. Such an impedance bridging connection also minimizes distortion and
electromagnetic interference; it is also used in modern audio amplifiers and signalprocessing devices.
There are a variety of devices used between a source of energy and a load that perform
"impedance matching". To match electrical impedances, engineers use combinations of
transformers, resistors, inductors, capacitors and transmission lines. These passive (and active)
impedance-matching devices are optimized for different applications and include baluns,
antenna tuners (sometimes called ATUs or roller-coasters, because of their appearance),
acoustic horns, matching networks, and terminators.
Transformers
Transformers are sometimes used to match the impedances of circuits. A transformer converts
alternating current at one voltage to the same waveform at another voltage. The power input to
the transformer and output from the transformer is the same (except for conversion losses).
The side with the lower voltage is at low impedance (because this has the lower number of
turns), and the side with the higher voltage is at a higher impedance (as it has more turns in its
coil).
One example of this method involves a television balun transformer. This transformer
converts a balanced signal from the antenna (via 300-ohm twin-lead) into an unbalanced
signal (75-ohm coaxial cable such as RG-6). To match the impedances of both devices, both
cables must be connected to a matching transformer with a turns ratio of 2 (such as a 2:1
transformer). In this example, the 75-ohm cable is connected to the transformer side with
fewer turns; the 300-ohm line is connected to the transformer side with more turns. The
formula for calculating the transformer turns ratio for this example is:
Resistive network
Resistive impedance matches are easiest to design and can be achieved with a simple L pad
consisting of two resistors. Power loss is an unavoidable consequence of using resistive
networks, and they are only (usually) used to transfer line level signals.
Stepped transmission line
Most lumped-element devices can match a specific range of load impedances. For example, in
order to match an inductive load into a real impedance, a capacitor needs to be used. If the
load impedance becomes capacitive, the matching element must be replaced by an inductor. In
many cases, there is a need to use the same circuit to match a broad range of load impedance
and thus simplify the circuit design. This issue was addressed by the stepped transmission
line, where multiple, serially placed, quarter-wave dielectric slugs are used to vary a
transmission line's characteristic impedance. By controlling the position of each element, a
broad range of load impedances can be matched without having to reconnect the circuit.
Filters
Filters are frequently used to achieve impedance matching in telecommunications and radio
engineering. In general, it is not theoretically possible to achieve perfect impedance matching
at all frequencies with a network of discrete components. Impedance matching networks are
designed with a definite bandwidth, take the form of a filter, and use filter theory in their
design.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Applications requiring only a narrow bandwidth, such as radio tuners and transmitters, might
use a simple tuned filter such as a stub. This would provide a perfect match at one specific
frequency only. Wide bandwidth matching requires filters with multiple sections.
L-section
L networks for narrowband matching a source or load impedance Z to a transmission line with
characteristic impedance Z0. X and B may each be either positive (inductor) or negative
(capacitor). If Z/Z0 is inside the 1+jx circle on the Smith chart (i.e. if Re(Z/Z0)>1), network (a)
can be used; otherwise network (b) can be used.
A simple electrical impedance-matching network requires one capacitor and one inductor.
One reactance is in parallel with the source (or load), and the other is in series with the load
(or source). If a reactance is in parallel with the source, the effective network matches from
high to low impedance. The L-section is inherently a narrow band matching network.
The analysis is as follows. Consider a real source impedance of
and real load impedance
of
. If a reactance
is in parallel with the source impedance, the combined impedance
can be written as:
If the imaginary part of the above impedance is canceled by the series reactance, the real part
is
Solving for
If
the above equation can be approximated as
The inverse connection (impedance step-up) is simply the reverse—for example, reactance in
series with the source. The magnitude of the impedance ratio is limited by reactance losses
such as the Q of the inductor. Multiple L-sections can be wired in cascade to achieve higher
impedance ratios or greater bandwidth. Transmission line matching networks can be modeled
as infinitely many L-sections wired in cascade. Optimal matching circuits can be designed for
a particular system using smith charts.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Power factor correction
These devices are intended to cancel the reactive and nonlinear characteristics of a load at the
end of a power line. This causes the load seen by the power line to be purely resistive. For a
given true power required by a load this minimizes the true current supplied through the
power lines, and minimizes power wasted in the resistance of those power lines. For example,
a maximum power point tracker is used to extract the maximum power from a solar panel and
efficiently transfer it to batteries, the power grid or other loads. The maximum power theorem
applies to its "upstream" connection to the solar panel, so it emulates a load resistance equal to
the solar panel source resistance. However, the maximum power theorem does not apply to its
"downstream" connection. That connection is an impedance bridging connection; it emulates a
high-voltage, low-resistance source to maximize efficiency.
On the power grid the overall load is usually inductive. Consequently, power factor
correction is most commonly achieved with banks of capacitors. It is only necessary for
correction to be achieved at one single frequency, the frequency of the supply. Complex
networks are only required when a band of frequencies must be matched and this is the reason
why simple capacitors are all that is usually required for power factor correction.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
UNIT-2
PART-A
1. What is modulation?
Modulation is the process of placing the message signal over some carrier to make it
suitable for transmission over long distances.
2. What is demodulation?
Demodulation is the process of separating the message signal from the modulated
carrier signal.
3. What is multiplexing?
Multiplexing is the process of simultaneously transmitting two or more individual
signals over a single common channel.
Due to multiplexing it is possible to increase the number of communication channels
so that more information can be transmitted.
4. What are the two basic types of multiplexing?
Frequency division multiplexing
Time division multiplexing
In FDM many signals are transmitted simultaneously where each signal occupies a
different frequency slot within a common bandwidth.
In TDM the signals are transmitted at a time, instead they are transmitted in different
time slots.
5. Advantages of FDM?
A large number of signals (Channels) can be transmitted simultaneously
FDM does not need synchronization between its transmitter and receiver for proper
operation
Demodulation of FDM is easy
Due to slow narrow band fading only a single channel gets affected
6. What is Intersymbol Interference (ISI)?
In a communication system when the data is being transmitted in the form of pulses
(bits), the output produced at the receiver due to the other bits or symbols interferes
with the output produced by the desired bit. This is called as intersymbol
interference(ISI). The Intersymbol interference will produce errors in the detected
signal.
7. Advantages of TDM?
Full available channel bandwidth can be utilized for each channel
Intermodulation distortion is absent
TDM circuitry is not very complex
The problem of crosstalk is not severe
8. Disadvantages of TDM?
Synchronization is essential for proper operation
Due to slow narrowband fading, all the TDM channels may get wiped out
9. What is guard bands and mention their importance?
The adjacent spectrums in the spectrum of an FDM signal do not touch each other.
They are separated from each other by the guardbands.
The guard bands are introduced in order to avoid any interference between the
adjacent channels
Wider the guardband, smaller the interference
10. Applications of FDM?
Telephone systems
AM (amplitude modulation) and FM(frequency modulation) radio broadcasting TV
broadcasting and also first generation of cellular phones used FDM.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
PART-B
1.
Explain in detail about Amplitude modulation
Amplitude modulation (AM) is a technique used in electronic communication, most commonly
for transmitting information via a radio carrier wave. AM works by varying the strength of the
transmitted signal in relation to the information being sent. For example, changes in signal strength
may be used to specify the sounds to be reproduced by a loudspeaker, or the light intensity of
television pixels. Contrast this with Frequency modulation, in which the frequency is varied, and
phase modulation, in which the phase is varied in accordance to the modulating signal.
In the mid-1870s, a form of amplitude modulation—initially called "undulatory currents"—was the
first method to successfully produce quality audio over telephone lines. Beginning with Reginald
Fessenden’s audio demonstrations in 1906, it was also the original method used for audio radio
transmissions, and remains in use today by many forms of communication—"AM" is often used to
refer to the medium wave broadcast band.
Fig : An audio signal (top) may be carried by an AM or FMradio wave.
Forms of amplitude modulation
In radio communication, a continuous wave radio-frequency signal (a sinusoidal carrier wave) has
its amplitude modulated by an audio waveform before transmission. The audio waveform modifies
the amplitude of the carrier wave and determines the envelope of the waveform. In the frequency
domain, amplitude modulation produces a signal with power concentrated at the carrier frequency
and two adjacent sidebands. Each sideband is equal in bandwidth to that of the modulating signal,
and is a mirror image of the other. Amplitude modulation resulting in two sidebands and a carrier
is called "double-sideband amplitude modulation" (DSB-AM).
Amplitude modulation is inefficient in power usage; at least two-thirds of the power is
concentrated in the carrier signal. The carrier signal contains none of the original information being
transmitted (voice, video, data, etc.). However, it does contain information about the frequency,
phase and amplitude needed to demodulate the received signal most simply and effectively. In
some communications systems, lower total cost can be achieved by eliminating some of the carrier,
thereby lowering electrical power usage even though this requires greater receiver complexity and
cost. If some carrier is retained (reduced-carrier transmission, or DSB-RC) receivers can be
designed to recover the frequency, phase, and amplitude information from this "pilot" carrier and
use it in the demodulation process. If the carrier is eliminated (Double sideband suppressed-carrier
transmission or DSB-SC) the receiver must provide a substitute carrier, with inevitable loss of
fidelity. Completely suppressing both the carrier and one of the sidebands produces singlesideband modulation, widely used in amateur radio and other communications applications. SSB
occupies less than half the spectrum of AM so it also has greatly improved bandwidth efficiency.
In AM broadcasting, where there are many receivers for each transmitter, the full carrier is
provided to allow reception with inexpensive receivers. The broadcaster absorbs the extra power
cost to greatly increase potential audience.
A simple form of AM, often used for digital communications, is on-off keying: a type of
amplitude-shift keying in which binary data is represented by the presence or absence of a carrier.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
This is used by radio amateurs to transmit Morse code and is known as Continuous wave (CW)
operation.
ITU designations
In 1982, the International Telecommunication Union (ITU) designated the types of amplitude
modulation:
Example: double-sideband AM
Left part: Modulation Voltage as a function of time. Right part: Spectrum of the amplitude
modulated carrier
Fig : Double-sided spectra of baseband and AM signals.
A carrier wave is modeled as a sine wave:
in which the frequency in Hz is given by:
The constants and
represent the carrier amplitude and initial phase, and are introduced for
generality. For simplicity, their respective values can be set to 1 and 0.
Let m(t) represent an arbitrary waveform that is the message to be transmitted, e.g., a simple audio
tone of form:
where constant M represent the largest magnitude, and the frequency is:
It is assumed that
and that
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Amplitude modulation is formed by the product:
represents the carrier amplitude. The values A=1 and M=0.5 produce y(t), depicted by the top
graph (labelled "50% Modulation") in Figure 4.
Using trigonometric identities, y(t) can be written in the form
Therefore, the modulated signal has three components: a carrier wave and two sinusoidal waves
(known as sidebands), whose frequencies are slightly above and below
Spectrum
For more general forms of m(t), trigonometry is not sufficient; however, if the top trace of Figure 2
depicts the frequency of m(t) the bottom trace depicts the modulated carrier. It has two
components: one at a positive frequency (centeredon
) and one at a negative frequency
(centered on
). Each component contains the two sidebands and a narrow segment in
between, representing energy at the carrier frequency. Since the negative frequency is a
mathematical artifact, examining the positive frequency demonstrates that an AM signal's spectrum
consists of its original (two-sided) spectrum, shifted to the carrier frequency. Figure 2 is a result of
computing the Fourier transform of:
pairs:
using the following transform
Figure: The spectrogram of an AM broadcast shows its two sidebands (green), separated by the
carrier signal (red).
Power and spectrum efficiency
In terms of positive frequencies, the transmission bandwidth of AM is twice the signal's original
(baseband) bandwidth; both the positive and negative sidebands are shifted up to the carrier
www.Vidyarthiplus.com
www.Vidyarthiplus.com
frequency. Thus, double-sideband AM (DSB-AM) is spectrally inefficient because the same
spectral information is transmitted twice, and fewer radio stations can be accommodated in a given
broadcast band than if only one replica of the original signal's spectrum were transmitted. The
suppression methods described above may be understood in terms of Figure 2. With the carrier
suppressed, there would be no energy at the center of a group; with a sideband suppressed, the
"group" would have the same bandwidth as the positive frequencies of
The transmitterpower efficiency of DSB-AM depends on the type of receiver used. For the most inexpensive type
of AM receiver, the carrier is needed to provide undistorted reception, thus 100% of the power is
useful. With a single sideband suppressed carrier (SSB-SC) capable receiver, only 16.7% of the
transmitted power is useful, since 66.6% of the power is wasted in the carrier and 16.7% in the
unused sideband. DSB-SC systems have had very limited application but would theoretically use
33.3% of the transmitted signal.
Modulation index
The AM modulation index is the measure of the amplitude variation surrounding an unmodulated
carrier. As with other modulation indices, in AM this quantity (also called "modulation depth")
indicates how much the modulation varies around its unmodulated level. For AM, it relates to
variations in carrier amplitude and is defined as:
where
and are the message amplitude and carrier amplitude, respectively, and where the
message amplitude is the maximum change in the carrier amplitude, measured from its
unmodulated value.
So if
, carrier amplitude varies by 50% above (and below) its unmodulated level; for
, it varies by 100%. To avoid distortion, modulation depth must not exceed 100 percent.
Transmitter systems will usually incorporate a limiter circuit (such as a vogad) to ensure this.
However, AM demodulators can be designed to detect the inversion (or 180-degree phase reversal)
that occurs when modulation exceeds 100 percent; they automatically correct for this defect.
Variations of a modulated signal with percentages of modulation are shown below. In each image,
the maximum amplitude is higher than in the previous image (note that the scal (e changes from
one
image
to
the
next).
Fig : Modulation depth
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Modulation methods
Anode (plate) modulation. A tetrode's plate and screen grid voltage is modulated via an audio
transformer. The resistor R1 sets the grid bias; both the input and output are tuned circuits with
inductive coupling.
Modulation circuit designs may be classified as low- or high-level (depending on whether they
modulate in a low-power domain—followed by amplification for transmission—or in the highpower domain of the transmitted signal)
Low-level generation
In modern radio systems, modulated signals are generated via digital signal processing (DSP).
With DSP many types of AM are possible with software control (including DSB with carrier, SSB
suppressed-carrier and independent sideband, or ISB). Calculated digital samples are converted to
voltages with a digital to analog converter, typically at a frequency less than the desired RF-output
frequency. The analog signal must then be shifted in frequency and linearly amplified to the
desired frequency and power level (linear amplification must be used to prevent modulation
distortion). This low-level method for AM is used in many Amateur Radio transceivers.
AM may also be generated at a low level, using analog methods described in the next section.
High-level generation
High-power AM transmitters (such as those used for AM broadcasting) are based on highefficiency class-D and class-E power amplifier stages, modulated by varying the supply
voltage.Older designs (for broadcast and amateur radio) also generate AM by controlling the gain
of the transmitter’s final amplifier (generally class-C, for efficiency). The following types are for
vacuum tube transmitters (but similar options are available with transistors):Plate modulation: In
plate modulation, the plate voltage of the RF amplifier is modulated with the audio signal. The
audio power requirement is 50 percent of the RF-carrier power.
Heising (constant-current) modulation: RF amplifier plate voltage is fed through a ―choke‖
(high-value inductor). The AM modulation tube plate is fed through the same inductor, so the
modulator tube diverts current from the RF amplifier. The choke acts as a constant current source
in the audio range. This system has a low power efficiency.
Control grid modulation: The operating bias and gain of the final RF amplifier can be
controlled by varying the voltage of the control grid. This method requires little audio power, but
care must be taken to reduce distortion.
Clamp tube (screen grid) modulation: The screen-grid bias may be controlled through a
―clamp tube‖, which reduces voltage according to the modulation signal. It is difficult to approach
100-percent modulation while maintaining low distortion with this system.
Doherty modulation:One tube provides the power under carrier conditions and another
operates only for positive modulation peaks. Overall efficiency is good, and distortion is low.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Outphasing modulation:Two tubes are operated in parallel, but partially out of phase with
each other. As they are differentially phase modulated their combined amplitude is greater or
smaller. Efficiency is good and distortion low when properly adjusted.
Pulse width modulation (PWM) or Pulse duration modulation (PDM):A highly efficient
high voltage power supply is applied to the tube plate. The output voltage of this supply is varied at
an audio rate to follow the program. This system was pioneered by Hilmer Swanson and has a
number of variations, all of which achieve high efficiency and sound quality.
2.
Explain in detail about Amplitude demodulation or detection?
In order to look at the amplitude demodulation process it is necessary to first look at the format of
an AM signal.An AM signal consists of a carrier which acts as the reference. Any modulation that
is applied then appears as sidebands which stretch out either side of the signal - each sideband is a
mirror image of the other.
Spectrum of an amplitude modulated, AM signal
Within the overall AM signal the carrier possess the majority of the power - a fully modulated, i.e.
100% modulation - AM signal has sidebands which have 25% that of the main carrier.
When demodulating a signal, two basic steps may be considered:
Create baseband signal: The main element of AM demodulation is to create the baseband
signal. This can be achieved in a number of ways - one of the easiest is to use a simple diode and
rectify the signal. This leaves elements of the original RF signal. When other forms of
demodulation are sued, they too leave some elements of an RF signal.
Filter: The filtering removes any unwanted high frequency elements from the demodulation
process. The audio can then be presented to further stages for audio amplification, etc.
The AM demodulation process is outlined in the diagram below. This particular example applies
particularly to a diode detector.
Basics of AM demodulation / detection
Types of AM demodulator
There are a number of ways in which an AM signal can be demodulated. There is a balance that
needs to be made of the performance of the circuit that is required against the complexity, and
hence the cost that can be tolerated.
The major types of AM demodulator are:
Diode detector: This is by far the simplest form of AM demodulator or detector, requiring just a
semiconductor (or other form) of diode along with a capacitor to remove the high frequency
www.Vidyarthiplus.com
www.Vidyarthiplus.com
components. It suffers from a number of disadvantages, but its performance is more than adequate
for most applications including broadcast receivers where cost is a significant driver.
Synchronous detector: This form of detector offers a higher level of performance, but at the cost
of considerably the use of considerably more components. This means that it is only used in
receivers where the levels of performance are paramount and can justify the additional component
costs.
Both types of detector are widely used, although the diode detector is far more common in view of
its simplicity and the fact that it is quite adequate for broadcast applications where performance is
not normally an issue.
AM demodulation & detection includes:
One of the advantages of amplitude modulation (AM) is that it is cheap and easy to build a
demodulator circuit for a radio receiver. The simplicity AM radio receivers AM is one of the
reasons why AM has remained in service for broadcasting for so long. One of the key factors of
this is the simplicity of the receiver AM demodulator.
A number of methods can be used to demodulate AM, but the simplest is a diode detector. It
operates by detecting the envelope of the incoming signal. It achieves this by simply rectifying the
signal. Current is allowed to flow through the diode in only one direction, giving either the positive
or negative half of the envelope at the output. If the detector is to be used only for detection it does
not matter which half of the envelope is used, either will work equally well. Only when the
detector is also used to supply the automatic gain control (AGC) circuitry will the polarity of the
diode matter.
The AM detector or demodulator includes a capacitor at the output. Its purpose is to remove any
radio frequency components of the signal at the output. The value is chosen so that it does not
affect the audio base-band signal. There is also a leakage path to enable the capacitor to discharge,
but this may be provided by the circuit into which the demodulator is connected.
A simple diode detector (demodulator) for AM signals
This type of detector or demodulator is called a linear envelope detector because the output is
proportional to the input envelope. Unfortunately the diodes used can introduce appreciable levels
of harmonic distortion unless modulation levels are kept low. As a result these detectors can never
provide a signal suitable for high quality applications.
Additionally these detectors are susceptible to the effects of selective fading experienced on short
wave broadcast transmissions. Here the ionospheric propagation may be such that certain small
bands of the signal are removed. Under normal circumstances signals received via the ionosphere
reach the receiver via a number of different paths. The overall signal is a combination of the
signals received via each path and as a result they will combine with each other, sometimes
constructively to increase the overall signal level and sometimes destructively to reduce it. It is
found that when the path lengths are considerably different this combination process can mean that
small portions of the signal are reduced in strength. An AM signal consists of a carrier with two
sidebands.
If the section of the signal that is removed falls in one of the sidebands, it will change the tone of
the received signal. However if carrier is removed or even reduced in strength, the signal will
www.Vidyarthiplus.com
www.Vidyarthiplus.com
appear to be over modulated, and severe distortion will result. This is a comparatively common
occurrence on the short waves, and means that diode detectors are not suitable for high quality
reception. Synchronous demodulation (detection) is far superior.
3.
Explain in detail about Frequency modulation?
A signal may be carried by an AM or FM radio wave.
In telecommunications and signal processing, frequency modulation (FM) is the encoding of
information in a carrier wave by varying the instantaneous frequency of the wave. (Compare with
amplitude modulation, in which the amplitude of the carrier wave varies, while the frequency
remains constant.)
In analog signal applications, the difference between the instantaneous and the base frequency of
the carrier is directly proportional to the instantaneous value of the input-signal amplitude.
Digital data can be encoded and transmitted via carrier wave by shifting the carrier's frequency
among a predefined set of frequencies—a technique known as frequency-shift keying (FSK). FSK
is widely used in modems and fax modems, and can also be used to send Morse code. Radio
teletype also uses FSK.Frequency modulation is used in radio, telemetry, radar, seismic
prospecting, and monitoring newbornsfor seizures via EEG. FM is widely used for broadcasting
music and speech, two-way radio systems, magnetic tape-recording systems and some videotransmission systems. In radio systems, frequency modulation with sufficient bandwidth provides
an advantage in cancelling naturally-occurring noise.
Frequency modulation is known as phase modulation when the carrier phase modulation is the time
integral of the FM signal.
Theory
If the information to be transmitted (i.e., the baseband signal) is
and the sinusoidal carrier
is
, where fc is the carrier's base frequency, and Ac is the carrier's
amplitude, the modulator combines the carrier with the baseband data signal to get the transmitted
signal:
www.Vidyarthiplus.com
www.Vidyarthiplus.com
In this equation,
is the instantaneous frequency of the oscillator and
is the frequency
deviation, which represents the maximum shift away from fc in one direction, assuming xm(t) is
limited to the range ±1.
While most of the energy of the signal is contained within fc ± fΔ, it can be shown by Fourier
analysis that a wider range of frequencies is required to precisely represent an FM signal. The
frequency spectrum of an actual FM signal has components extending infinitely, although their
amplitude decreases and higher-order components are often neglected in practical design problems.
Sinusoidal baseband signal
Mathematically, a baseband modulated signal may be approximated by a sinusoidal continuous
wave signal with a frequency fm. The integral of such a signal is:
In this case, equation (1) above simplifies to:
where the amplitude
of the modulating sinusoid is represented by the peak deviation
.
The harmonic distribution of a sine wave carrier modulated by such a sinusoidal signal can be
represented with Bessel functions; this provides the basis for a mathematical understanding of
frequency modulation in the frequency domain.
Modulation index
As in other modulation systems, this quantity indicates by how much the modulated variable varies
around its unmodulated level. It relates to variations in the carrier frequency:
where
is the highest frequency component present in the modulating signal xm(t), and
is
the peak frequency-deviation—i.e. the maximum deviation of the instantaneous frequency from the
carrier frequency. If
, the modulation is called narrowband FM, and its bandwidth is
approximately
.
If
, the modulation is called wideband FM and its bandwidth is approximately
.
While wideband FM uses more bandwidth, it can improve the signal-to-noise ratio significantly;
for example, doubling the value of
, while keeping
constant, results in an eight-fold
improvement in the signal-to-noise ratio. (Compare this with Chirp spread spectrum, which uses
extremely wide frequency deviations to achieve processing gains comparable to traditional, betterknown spread-spectrum modes).
With a tone-modulated FM wave, if the modulation frequency is held constant and the modulation
index is increased, the (non-negligible) bandwidth of the FM signal increases but the spacing
between spectra remains the same; some spectral components decrease in strength as others
increase. If the frequency deviation is held constant and the modulation frequency increased, the
spacing between spectra increases.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Frequency modulation can be classified as narrowband if the change in the carrier frequency is
about the same as the signal frequency, or as wideband if the change in the carrier frequency is
much higher (modulation index >1) than the signal frequency. For example, narrowband FM is
used for two way radio systems such as Family Radio Service, in which the carrier is allowed to
deviate only 2.5 kHz above and below the center frequency with speech signals of no more than
3.5 kHz bandwidth. Wideband FM is used for FM broadcasting, in which music and speech are
transmitted with up to 75 kHz deviation from the center frequency and carry audio with up to a 20kHz bandwidth.
Bessel functions
For the case of a carrier modulated by a single sine wave, the resulting frequency spectrum can be
calculated using Bessel functions of the first kind, as a function of the sideband number and the
modulation index. The carrier and sideband amplitudes are illustrated for different modulation
indices of FM signals. For particular values of the modulation index, the carrier amplitude becomes
zero and all the signal power is in the sidebands.
Since the sidebands are on both sides of the carrier, their count is doubled, and then multiplied by
the modulating frequency to find the bandwidth. For example, 3 kHz deviation modulated by a 2.2
kHz audio tone produces a modulation index of 1.36. Examining the chart shows this modulation
index will produce three sidebands. These three sidebands, when doubled, gives us (6 * 2.2 kHz) or
a 13.2 kHz required bandwidth.
Carson's rule
A rule of thumb, Carson's rule states that nearly all (~98 percent) of the power of a frequencymodulated signal lies within a bandwidth
of:
where
, as defined above, is the peak deviation of the instantaneous frequency
center carrier frequency .
from the
Noise Reduction
A major advantage of FM in a communications circuit, compared for example with AM, is the
possibility of improved (SNR). Compared with an optimum AM scheme, FM typically has poorer
SNR below a certain signal level called the noise threshold, but above a higher level – the full
improvement or full quieting threshold – the SNR is much improved over AM. The improvement
depends on modulation level and deviation. For typical voice communications channels,
improvements are typically 5-15 dB. FM broadcasting using wider deviation can achieve even
greater improvements. Additional techniques, such as pre-emphasis of higher audio frequencies
with corresponding de-emphasis in the receiver, are generally used to improve overall SNR in FM
circuits. Since FM signals have constant amplitude, FM receivers normally have limiters that
remove AM noise, further improving SNR.
Implementation
Modulation
FM signals can be generated using either direct or indirect frequency modulation:
Direct FM modulation can be achieved by directly feeding the message into the input of a VCO.
For indirect FM modulation, the message signal is integrated to generate a phase modulated signal.
This is used to modulate a crystal-controlled oscillator, and the result is passed through a frequency
multiplier to give an FM signal.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Demodulation
Many FM detector circuits exist. A common method for recovering the information signal is
through a Foster-Seeley discriminator. A phase-locked loop can be used as an FM demodulator.
Slope detection demodulates an FM signal by using a tuned circuit which has its resonant
frequency slightly offset from the carrier. As the frequency rises and falls the tuned circuit provides
a changing amplitude of response, converting FM to AM. AM receivers may detect some FM
transmissions by this means, although it does not provide an efficient means of detection for FM
broadcasts.
Applications
Magnetic tape storage
FM is also used at intermediate frequencies by analog VCR systems (including VHS) to record the
luminance (black and white) portions of the video signal. Commonly, the chrominance component
is recorded as a conventional AM signal, using the higher-frequency FM signal as bias. FM is the
only feasible method of recording the luminance ("black and white") component of video to (and
retrieving video from) magnetic tape without distortion; video signals have a large range of
frequency components – from a few hertz to several megahertz, too wide for equalizers to work
with due to electronic noise below −60 dB. FM also keeps the tape at saturation level, acting as a
form of noise reduction; a limiter can mask variations in playback output, and the FM capture
effect removes print-through and pre-echo. A continuous pilot-tone, if added to the signal – as was
done on V2000 and many Hi-band formats – can keep mechanical jitter under control and assist
timebase correction. These FM systems are unusual, in that they have a ratio of carrier to
maximum modulation frequency of less than two; contrast this with FM audio broadcasting, where
the ratio is around 10,000. Consider, for example, a 6-MHz carrier modulated at a 3.5-MHz rate;
by Bessel analysis, the first sidebands are on 9.5 and 2.5 MHz and the second sidebands are on
13 MHz and −1 MHz. The result is a reversed-phase sideband on +1 MHz; on demodulation, this
results in unwanted output at 6−1 = 5 MHz. The system must be designed so that this unwanted
output is reduced to an acceptable level.
4.
Explain in detail about FM Demodulation / Detection?
FM demodulation or detection involves changing the frequency variations in a signal into
amplitude variations at baseband, e.g. audio. There are several techniques and circuits that
can be used each with its own advantages and disadvantages.
Frequency modulation is widely used for radio transmissions for a wide variety of
applications from broadcasting to general point to point communications.
Frequency modulation, FM offers many advantages, particularly in mobile radio applications
where its resistance to fading and interference is a great advantage. It is also widely used for
broadcasting on VHF frequencies where it is able to provide a medium for high quality audio
transmissions.
In view of its widespread use receivers need to be able to demodulate these transmissions.
There is a wide variety of different techniques and circuits that can be used including the
Foster-Seeley, and ratio detectors using discreet components, and where integrated circuits are
used the phase locked loop and quadrature detectors are more widely used.
What is frequency modulation, FM?
As the name suggests frequency modulation, FM uses changes in frequency to carry the sound
or other information that is required to be placed onto the carrier. As shown below it can be
www.Vidyarthiplus.com
www.Vidyarthiplus.com
seen that as the modulating or base band signal voltage varies, so the frequency of the signal
changes in line with it. This type of modulation brings several advantages with it:
Interference reduction: When compared to AM, FM offers a marked improvement
in interference. In view of the fact that most received noise is amplitude noise, an FM
receiver can remove any amplitude sensitivity by driving the IF into limiting.
Removal of many effects of signal strength variations: FM is widely used for
mobile applications because the amplitude variations do not cause a change in audio
level. As the audio is carried by frequency variations rather than amplitude ones,
under good signal strength conditions, this does not manifest itself as a change in
audio level.
Transmitter amplifier efficiency: As the modulation is carried by frequency
variations, this means that the transmitter power amplifiers can be made non-linear.
These amplifiers can be made to be far more efficient than linear ones, thereby saving
valuable battery power - a valuable commodity for mobile or portable equipment.
These advantages mean that FM has been widely used for many broadcasting and mobile
applications.
Frequency modulating a signal
Wide band and Narrow band FM
When a signal is frequency modulated, the carrier shifts in frequency in line with the
modulation. This is called the deviation. In the same way that the modulation level can be
varied for an amplitude modulated signal, the same is true for a frequency modulated one,
although there is not a maximum or 100% modulation level as in the case of AM.
The level of modulation is governed by a number of factors. The bandwidth that is available is
one. It is also found that signals with a large deviation are able to support higher quality
transmissions although they naturally occupy a greater bandwidth. As a result of these
conflicting requirements different levels of deviation are used according to the application that
is used.
Those with low levels of deviation are called narrow band frequency modulation (NBFM) and
typically levels of +/- 3 kHz or more are used dependent upon the bandwidth available.
Generally NBFM is used for point to point communications. Much higher levels of deviation
are used for broadcasting. This is called wide band FM (WBFM) and for broadcasting
deviation of +/- 75 kHz is used.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Receiving FM
In order to be able to receive FM a receiver must be sensitive to the frequency variations of
the incoming signals. As already mentioned these may be wide or narrow band. However the
set is made insensitive to the amplitude variations. This is achieved by having a high gain IF
amplifier. Here the signals are amplified to such a degree that the amplifier runs into limiting.
In this way any amplitude variations are removed.
In order to be able to convert the frequency variations into voltage variations, the demodulator
must be frequency dependent. The ideal response is a perfectly linear voltage to frequency
characteristic. Here it can be seen that the centre frequency is in the middle of the response
curve and this is where the un-modulated carrier would be located when the receiver is
correctly tuned into the signal. In other words there would be no offset DC voltage present.
The ideal response is not achievable because all systems have a finite bandwidth and as a
result a response curve known as an "S" curve is obtained. Outside the bandwidth of the
system, the response falls, as would be expected. It can be seen that the frequency variations
of the signal are converted into voltage variations which can be amplified by an audio
amplifier before being passed into headphones, a loudspeaker, or passed into other electronic
circuitry for the appropriate processing.
Characteristic "S" curve of an FM demodulator
To enable the best detection to take place the signal should be centred about the middle of the
curve. If it moves off too far then the characteristic becomes less linear and higher levels of
distortion result. Often the linear region is designed to extend well beyond the bandwidth of a
signal so that this does not occur. In this way the optimum linearity is achieved. Typically the
bandwidth of a circuit for receiving VHF FM broadcasts may be about 1 MHz whereas the
signal is only 200 kHz wide.
FM demodulators
There are a number of circuits that can be used to demodulate FM. Each type has its own
advantages and disadvantages, some being used when receivers used discrete components, and
others now that ICs are widely used.
Below is a list of some of the main types of FM demodulator or FM detector. In view of the
widespread use of FM, even with the competition from digital modes that are widely used
today, FM demodulators are needed in many new designs of electronics equipment.
Slope FM detector: This form of detector uses the slope of a tuned circuit to convert
the frequency variations into amplitude variations. As the frequency of the FM signal
www.Vidyarthiplus.com
www.Vidyarthiplus.com
varies, it changes its position on the slope of the tuned circuit, so the amplitude will
vary. This signal can then be converted into a baseband signal by using an AM diode
detector circuit. Read more about the Slope Detector
Ratio detector: This FM demodulator circuit was widely used with discrete
components, providing a good level of performance. It was characterised by the
transformer with three windings that was required. Read more about the Ratio
Detector
Foster-Seeley FM detector: Like the Ratio detector the Foster Seeley detector or
discriminator was used with discrete components, providing excellent performance
for the day in many FM radios. Read more about the Foster-Seeley Detector
PLL, Phase locked loop FM demodulator: FM demodulators using phase locked
loops, PLLs can provide high levels of performance. They do not require a costly
transformer and can easily be incorporated within FM radio ICs. Read more about the
PLL FM Detector
Quadrature FM demodulator: This form of FM demodulator is very convenient
for use within integrated circuits. It provides high levels of linearity, while not
requiring many external components. Read more about the Quadrature FM Detector
Coincidence FM demodulator: This form of demodulator has many similarities to
the quadrature detector. It uses digital technology and replaces a mixer with a logic
NAND gate.
Each of these different types of FM detector or demodulator has its own advantages and
disadvantages. These FM demodulators are described in further pages of this tutorial.
5.
Explain the Basic super heterodyne block diagram and its functionality?
The basic block diagram of a basic superheterodyne radio receiver is shown below. This
details the most basic form of the receiver and serves to illustrate the basic blocks and their
function.
Block diagram of a basic superheterodyne radio receiver
The way in which the receiver works can be seen by following the signal as is passes through
the receiver.
Front end amplifier and tuning block: Signals enter the front end circuitry from the
antenna. This circuit block performs two main functions:
o
Tuning: Broadband tuning is applied to the RF stage. The purpose of this is to reject the
signals on the image frequency and accept those on the wanted frequency. It must also be able to
track the local oscillator so that as the receiver is tuned, so the RF tuning remains on the required
frequency. Typically the selectivity provided at this stage is not high. Its main purpose is to reject
signals on the image frequency which is at a frequency equal to twice that of the IF away from the
wanted frequency. As the tuning within this block provides all the rejection for the image response,
it must be at a sufficiently sharp to reduce the image to an acceptable level. However the RF tuning
may also help in preventing strong off-channel signals from entering the receiver and overloading
elements of the receiver, in particular the mixer or possibly even the RF amplifier.
o
Amplification: In terms of amplification, the level is carefully chosen so that it does not
overload the mixer when strong signals are present, but enables the signals to be amplified
www.Vidyarthiplus.com
www.Vidyarthiplus.com
sufficiently to ensure a good signal to noise ratio is achieved. The amplifier must also be a low
noise design. Any noise introduced in this block will be amplified later in the receiver.
Mixer / frequency translator block: The tuned and amplified signal then enters one
port of the mixer. The local oscillator signal enters the other port. The performance of the mixer is
crucial to many elements of the overall receiver performance. It should eb as linear as possible. If
not, then spurious signals will be generated and these may appear as 'phantom' received signals.
Local oscillator: The local oscillator may consist of a variable frequency oscillator that
can be tuned by altering the setting on a variable capacitor. Alternatively it may be a frequency
synthesizer that will enable greater levels of stability and setting accuracy.
Intermediate frequency amplifier, IF block : Once the signals leave the mixer they
enter the IF stages. These stages contain most of the amplification in the receiver as well as the
filtering that enables signals on one frequency to be separated from those on the next. Filters may
consist simply of LC tuned transformers providing inter-stage coupling, or they may be much
higher performance ceramic or even crystal filters, dependent upon what is required.
Detector / demodulator stage: Once the signals have passed through the IF stages of
the superheterodyne receiver, they need to be demodulated. Different demodulators are required
for different types of transmission, and as a result some receivers may have a variety of
demodulators that can be switched in to accommodate the different types of transmission that are
to be encountered. Different demodulators used may include:
o
AM diode detector: This is the most basic form of detector and this circuit block would
simple consist of a diode and possibly a small capacitor to remove any remaining RF. The detector
is cheap and its performance is adequate, requiring a sufficient voltage to overcome the diode
forward drop. It is also not particularly linear, and finally it is subject to the effects of selective
fading that can be apparent, especially on the HF bands.
o
Synchronous AM detector: This form of AM detector block is used in where
improved performance is needed. It mixes the incoming AM signal with another on the same
frequency as the carrier. This second signal can be developed by passing the whole signal through
a squaring amplifier. The advantages of the synchronous AM detector are that it provides a far
more linear demodulation performance and it is far less subject to the problems of selective fading.
o
SSB product detector: The SSB product detector block consists of a mixer and a
local oscillator, often termed a beat frequency oscillator, BFO or carrier insertion oscillator, CIO.
This form of detector is used for Morse code transmissions where the BFO is used to create an
audible tone in line with the on-off keying of the transmitted carrier. Without this the carrier
without modulation is difficult to detect. For SSB, the CIO re-inserts the carrier to make the
modulation comprehensible.
o
Basic FM detector: As an FM signal carries no amplitude variations a demodulator
block that senses frequency variations is required. It should also be insensitive to amplitude
variations as these could add extra noise. Simple FM detectors such as the Foster Seeley or ratio
detectors can be made from discrete components although they do require the use of transformers.
o
PLL FM detector: A phase locked loop can be used to make a very good FM
demodulator. The incoming FM signal can be fed into the reference input, and the VCO drive
voltage used to provide the detected audio output.
o
Quadrature FM detector: This form of FM detector block is widely used within
ICs. IT is simple to implement and provides a good linear output.
Audio amplifier: The output from the demodulator is the recovered audio. This is
passed into the audio stages where they are amplified and presented to the headphones or
loudspeaker.
6.
Give short notes about Time-division multiplexing?
Time-division multiplexing (TDM) is a method of transmitting and receiving independent signals
over a common signal path by means of synchronized switches at each end of the transmission line
so that each signal appears on the line only a fraction of time in an alternating pattern. This form of
signal multiplexing was developed Intelecommunications for telegraphy systems in the late 1800s,
but found its most common application in digital telephony in the second half of the 20th century.
Technology
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Time-division multiplexing is used primarily for digital signals, but may be applied in analog
multiplexing in which two or more signals or bit streams are transferred appearing simultaneously
as sub-channels in one communication channel, but are physically taking turns on the channel. The
time domain is divided into several recurrent time slots of fixed length, one for each sub-channel.
A sample byte or data block of sub-channel 1 is transmitted during time slot 1, sub-channel 2
during time slot 2, etc. One TDM frame consists of one time slot per sub-channel plus a
synchronization channel and sometimes error correction channel before the synchronization. After
the last sub-channel, error correction, and synchronization, the cycle starts all over again with a
new frame, starting with the second sample, byte or data block from sub-channel 1, etc.
Application examples
The plesiochronous digital hierarchy (PDH) system, also known as the PCM system, for
digital transmission of several telephone calls over the same four-wire copper cable (T-carrier or Ecarrier) or fiber cable in the circuit switched digital telephone network
The synchronous digital hierarchy digital (SDH)and Synchronous optical networking
(SONET) network transmission standards that have replaced PDH.
The Basic Rate Interface and Primary Rate Interface for the Integrated Services Digital
Network (ISDN).
The RIFF (WAV) audio standard interleaves left and right stereo signals on a per-sample basis
The left-right channel splitting in use for stereoscopic liquid crystal shutter glasses
TDM can be further extended into the (TDMA) scheme, where several stations connected to the
same physical medium, for example sharing the same frequency channel, can communicate.
Application examples include:
TDM versus packet-mode communication
In its primary form, TDM is used for circuit mode communication with a fixed number of channels
and constant bandwidth per channel.
Bandwidth reservation distinguishes time-division multiplexing from statistical multiplexing such
as packet mode communication (also known as statistical time-domain multiplexing, see below)
i.e. the time slots are recurrent in a fixed order and pre-allocated to the channels, rather than
scheduled on a packet-by-packet basis. Statistical time-domain multiplexing resembles, but should
not be considered the same as time-division multiplexing.
History
Time-division multiplexing was first developed for applications in telegraphy to route multiple
transmissions simultaneously over a single transmission line. In the 1870s, Emile Baudotdeveloped
a time-multiplexing system of multiple Hughes machines.
In 1953 a 24-channel TDM was placed in commercial operation by RCA Communications to send
audio information between RCA's facility at Broad Street, New York and their transmitting station
at Rocky Point and the receiving station at Riverhead, Long Island, New York. The
communication was by a microwave system throughout Long Island. The experimental TDM
system was developed by RCA Laboratories between 1950 and 1953.
In 1962, engineers from Bell Labs developed the first D1 Channel Banks, which combined 24
digitised voice calls over a 4-wire copper trunk between Bell central office analogue switches. A
channel bank sliced a 1.544 Mbit/s digital signal into 8,000 separate frames, each composed of 24
contiguous bytes. Each byte represented a single telephone call encoded into a constant bit rate
signal of 64 kbit/s. Channel banks used a byte's fixed position (temporal alignment) in the frame to
determine which call it belonged to.
Multiplexed digital transmission
www.Vidyarthiplus.com
www.Vidyarthiplus.com
In circuit-switched networks, such as the (PSTN), it is desirable to transmit multiple subscriber
calls over the same transmission medium to effectively utilize the bandwidth of the medium. TDM
allows transmitting and receiving telephone switches to create channels (tributaries) within a
transmission stream. A standard DSO voice signal has a data bit rate of 64 kbit/s. A TDM circuit
runs at a much higher signal bandwidth, permitting the bandwidth to be divided into time frames
(time slots) for each voice signal which is multiplexed onto the line by the transmitter. If the TDM
frame consists of n voice frames, the line bandwidth is n*64 kbit/s.
Each voice time slot in the TDM frame is called a channel. In European systems, standard TDM
frames contain 30 digital voice channels (E1), and in American systems (T1), they contain 24
channels. Both standards also contain extra bits (or bit time slots) for signalling and
synchronization bits.Multiplexing more than 24 or 30 digital voice channels is called higher order
multiplexing. Higher order multiplexing is accomplished by multiplexing the standard TDM
frames. For example, a European 120 channel TDM frame is formed by multiplexing four standard
30 channel TDM frames. At each higher order multiplex, four TDM frames from the immediate
lower order are combined, creating multiplexes with a bandwidth of n*64 kbit/s, where n = 120,
480, 1920, etc.
Synchronous time-division multiplexing
There are three types of synchronous TDM: T1, SONET/SDH, and ISDN.
Synchronous Digital Hierarchy (SDH)
Plesiochronous digital hierarchy (PDH) was developed as a standard for multiplexing higher order
frames. PDH created larger numbers of channels by multiplexing the standard Europeans 30
channel TDM frames. This solution worked for a while; however PDH suffered from several
inherent drawbacks which ultimately resulted in the development of the Synchronous Digital
Hierarchy (SDH). The requirements which drove the development of SDH were these:Be
synchronous – All clocks in the system must align with a reference clock.
Be service-oriented – SDH must route traffic from End Exchange to End Exchange without
worrying about exchanges in between, where the bandwidth can be reserved at a fixed level for a
fixed period of time.
Allow frames of any size to be removed or inserted into an SDH frame of any size.
Easily manageable with the capability of transferring management data across links.
Provide high levels of recovery from faults.
Provide high data rates by multiplexing any size frame, limited only by technology.
Give reduced bit rate errors.
SDH has become the primary transmission protocol in most PSTN networks.It was developed to
allow streams 1.544 Mbit/s and above to be multiplexed, in order to create larger SDH frames
known as Synchronous Transport Modules (STM). The STM-1 frame consists of smaller streams
that are multiplexed to create a 155.52 Mbit/s frame. SDH can also multiplex packet based frames
e.g., PPP and ATM.
While SDH is considered to be a transmission protocol (Layer 1 in the OSI Reference Model), it
also performs some switching functions, as stated in the third bullet point requirement listed above.
The most common SDH Networking functions are these:
SDH Crossconnect – The SDH Crossconnect is the SDH version of a Time-Space-Time
crosspoint switch. It connects any channel on any of its inputs to any channel on any of its outputs.
The SDH Crossconnect is used in Transit Exchanges, where all inputs and outputs are connected to
other exchanges.
SDH Add-Drop Multiplexer – The SDH Add-Drop Multiplexer (ADM) can add or remove
any multiplexed frame down to 1.544Mb. Below this level, standard TDM can be performed. SDH
ADMs can also perform the task of an SDH Crossconnect and are used in End Exchanges where
the channels from subscribers are connected to the core PSTN network. SDH network functions
are connected using high-speed optic fibre. Optic fibre uses light pulses to transmit data and is
www.Vidyarthiplus.com
www.Vidyarthiplus.com
therefore extremely fast.Modern optic fibre transmission makes use of (WDM) where signals
transmitted across the fibre are transmitted at different wavelengths, creating additional channels
for transmission. This increases the speed and capacity of the link, which in turn reduces both unit
and total costs.
Statistical time-division multiplexing
(STDM) is an advanced version of TDM in which both the address of the terminal and the data
itself are transmitted together for better routing. Using STDM allows bandwidth to be split over
one line. Many college and corporate campuses use this type of TDM to distribute bandwidth.
On a 10-Mbit line entering a network, STDM can be used to provide 178 terminals with a
dedicated 56k connection (178 * 56k = 9.96Mb). A more common use however is to only grant the
bandwidth when that much is needed. STDM does not reserve a time slot for each terminal, rather
it assigns a slot when the terminal is requiring data to be sent or received.
Asynchronous time-division multiplexing (ATDM), is an alternative nomenclature in which
STDM designates synchronous time-division multiplexing, the older method that uses fixed time
slots.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
UNIT III
PART-A
1. What is PCM?
PCM is a type of pulse modulation like PAM, PWM or PPM but there is an
important difference between them. PAM, PWM or PPM is ―analog‖ pulse modulation
systems whereas PCM is a ―digital‖ pulse modulation system. This means the PCM
output in the form of digital pulses of constant amplitude, width and position.
The information transmitted in the form of code words. A PCM system consists of a
PCM encoder (transmitter) and a PCM decoder (receiver). The essential operations in the
PCM transmitter are sampling, quantizing and encoding.
2. Advantages of Digital Representation of a signal?
Immunity to transmission noise and interference.
Regeneration of the coded signal along the transmission path is possible.
Communication can be kept ―private‖ and ―secured‖ through the use of encryption.
The Possibility of uniform format for different kinds of baseband signals.
It is possible to store the signal and process it further.
3. Explain the block diagram of regenerative repeater?
It has three blocks i) The amplitude equalizer ii) The timing circuit iii) decision
making device.
i)The amplitude equalizer shapes the distorted PCM wave so as to compensate for the
effects of amplitude and phase distortions.
ii) The timing circuit produces a periodic pulse train in that is derived from the input
PCM pulses.
iii) The decision making device uses this pulse train for sampling the equalized PCM
pulses. The sampling is carried out at the instants where the signal to noise ratio is
maximum.
The decision device makes a decision about whether the equalized PCM wave at its input
has a 0 value or 1 value at the instant of sampling.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
4. What are modulator and demodulator?
A modulator-demodulator modem is a device that modulates an analog carrier
signal to encode digital information, and also demodulates such a carrier signal to decode
the transmitted information. The goal is to produce a signal that can be transmitted easily
and decoded to reproduce the original digital data. Modems can be used with any means
of transmitting analog signals, from light emitting distortion to radio. The most familiar
example is a voice band modem that turns the digital data of a personal computer into
modulated electrical signals in the voice frequency range of a telephone channel. These
signals can be transmitted over telephone lines and demodulated by another modem at the
receiver side to recover the digital data.
5. Application of BPSK?
a) Phase shift keying is the most efficient of the three modulation methods (i.e.)
ASK, FSK, PSK such and it is used for high bit rates even higher than 1800
bits/sec.
b) Due to low bandwidth requirements the BPSK modems are preferred over the
FSK modems, at higher operating speeds.
6. Advantages of BPSK?
a) BPSK has a high bandwidth which is lower than that of a BFSK signal.
b) BPSK has the best performance of all the systems in presence of noise. It gives
the minimum possibility of error.
c) BPSK has very good noise immunity.
7. Mention the why QPSK is better than PSK?
a) Due to multilevel modulation used in QPSK, it is possible to increase the bit rate to
double the bit rate of QPSK without increasing bandwidth.
b) The noise immunity of QPSK is same as that of PSK system.
c) Available channel bandwidth is utilized in a better way by the QPSK system than PSK
system.
8. Difference between wave form coding and source coding?
The waveform coders are in principle designed to signal independent.
The waveform coders are different from the source coders (e.g.) (linear and predictive).
www.Vidyarthiplus.com
www.Vidyarthiplus.com
The source coders depend on parameterization of the analog signal in accordance with an
appropriate model for the generation of the signal.
9. For a binary PCM system, the number of bits per transmitted word is 8 and the
sampling frequencyfs = 8 kHz. Calculate the bit rate and baud rate?
Given N = 8, fs = 8 kHz
Bit rate = N * fs = 8 * 8 kHz = 64 bits/sec
Baud rate = Bit rate = 64 kHz ( as transmission is binary)
10. For the same data in the previous example, calculate the bit rate and baud rate if a
QPSK system is used?
In the QPSK system, two successive bits are clubbed together to form one message.
Hence symbol corresponds to 2 bit duration.
Therefore, Baud rate = ½ * bit rate = 64/2 = 32 k bits/sec
Bit rate does not change.
PART-B
1. Explain in detail about Amplitude-shift keying (ASK)?
It is a form of amplitude modulation that represents digital data as variations in
the amplitude of a carrier wave. Any digital modulation scheme uses a finite number of
distinct signals to represent digital data. ASK uses a finite number of amplitudes, each
assigned a unique pattern of binary digits. Usually, each amplitude encodes an equal
number of bits. Each pattern of bits forms the symbol that is represented by the particular
amplitude. The demodulator, which is designed specifically for the symbol-set used by
the modulator, determines the amplitude of the received signal and maps it back to the
symbol it represents, thus recovering the original data. Frequency and phase of the carrier
are kept constant.
Like AM, ASK is also linear and sensitive to atmospheric noise, distortions,
propagation conditions on different routes in PSTN, etc. Both ASK modulation and
demodulation processes are relatively inexpensive. The ASK technique is also commonly
used to transmit digital data over optical fiber. For LED transmitters, binary 1 is
represented by a short pulse of light and binary 0 by the absence of light. Laser
transmitters normally have a fixed "bias" current that causes the device to emit a low light
level. This low level represents binary 0, while a higher-amplitude light wave represents
binary 1.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
The simplest and most common form of ASK operates as a switch, using the
presence of a carrier wave to indicate a binary one and its absence to indicate a binary
zero. This type of modulation is called on-off keying, and is used at radio frequencies to
transmit Morse code (referred to as continuous wave operation),
More sophisticated encoding schemes have been developed which represent data
in groups using additional amplitude levels. For instance, a four-level encoding scheme
can represent two bits with each shift in amplitude; an eight-level scheme can represent
three bits; and so on. These forms of amplitude-shift keying require a high signal-to-noise
ratio for their recovery, as by their nature much of the signal is transmitted at reduced
power.
ASK diagram
ASK system can be divided into three blocks. The first one represents the
transmitter, the second one is a linear model of the effects of the channel, and the third
one shows the structure of the receiver. The following notation is used:
ht(f) is the carrier signal for the transmission
hc(f) is the impulse response of the channel
n(t) is the noise introduced by the channel
hr(f) is the filter at the receiver
L is the number of levels that are used for transmission
Ts is the time between the generation of two symbols
Different symbols are represented with different voltages. If the maximum allowed
value for the voltage is A, then all the possible values are in the range [−A, A] and they
are given by:
the difference between one voltage and the other is:
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Considering the picture, the symbols v[n] are generated randomly by the source S,
then the impulse generator creates impulses with an area of v[n]. These impulses are sent
to the filter ht to be sent through the channel. In other words, for each symbol a different
carrier wave is sent with the relative amplitude.
Out of the transmitter, the signal s(t) can be expressed in the form:
In the receiver, after the filtering through hr (t) the signal is:
where we use the notation:
where * indicates the convolution between two signals. After the A/D conversion the
signal z[k] can be expressed in the form:
In this relationship, the second term represents the symbol to be extracted. The
others are unwanted: the first one is the effect of noise, the third one is due to the inter
symbol interference.If the filters are chosen so that g(t) will satisfy the Nyquist ISI
criterion, then there will be no inter symbol interference and the value of the sum will be
zero, so:
the transmission will be affected only by noise.
Probability of error
www.Vidyarthiplus.com
www.Vidyarthiplus.com
The probability density function of having an error of a given size can be modeled
by a Gaussian function; the mean value will be the relative sent value, and its variance
will be given by:
where
is the spectral density of the noise within the band and Hr (f) is the
continuous Fourier transform of the impulse response of the filter hr (f).
The probability of making an error is given by:
where, for example,
is the conditional probability of making an error given that a
symbol v0 has been sent and P_{H_0} is the probability of sending a symbol v0.
If the probability of sending any symbol is the same, then:
If we represent all the probability density functions on the same plot against the possible
value of the voltage to be transmitted, we get a picture like this (the particular case of L =
4 is shown):
The probability of making an error after a single symbol has been sent is the area of the
Gaussian function falling under the functions for the other symbols. It is shown in cyan
for just one of them. If we call P+ the area under one side of the Gaussian, the sum of all
the areas will be: 2 L P^+ - 2 P^+. The total probability of making an error can be
expressed in the form:
www.Vidyarthiplus.com
www.Vidyarthiplus.com
We have now to calculate the value of P+. In order to do that, we can move the origin of
the reference wherever we want: the area below the function will not change. We are in a
situation like the one shown in the following picture:
it does not matter which Gaussian function we are considering, the area we want to
calculate will be the same. The value we are looking for will be given by the following
integral:
whereerfc() is the complementary error function. Putting all these results together, the
probability to make an error is:
from this formula we can easily understand that the probability to make an error
decreases if the maximum amplitude of the transmitted signal or the amplification of the
system becomes greater; on the other hand, it increases if the number of levels or the
power of noise becomes greater.
This relationship is valid when there is no inter symbol interference, i.e. g(t) is a NyQuist
function.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
2. Explain in detail about Bit error rate calculation?
In digital transmission, the number of bit errors is the number of received bits of a
data stream over a communication channel that has been altered due to noise,
interference, distortion or bit synchronization errors.
The bit error rate or bit error ratio (BER) is the number of bit errors divided by the
total number of transferred bits during a studied time interval. BER is a unit less
performance measure, often expressed as a percentage.
The bit error probabilitype is the expectation value of the BER. The BER can be
considered as an approximate estimate of the bit error probability. This estimate is
accurate for a long time interval and a high number of bit errors.
Example
As an example, assume this transmitted bit sequence:
0 1 1 0 0 0 1 0 1 1,
and the following received bit sequence:
0 0 1 0 1 0 1 0 0 1,
The number of bit errors (the underlined bits) is in this case 3. The BER is 3 incorrect bits
divided by 10 transferred bits, resulting in a BER of 0.3 or 30%.
Packet error rate
The packet error rate (PER) is the number of incorrectly received data packets
divided by the total number of received packets. A packet is declared incorrect if at least
one bit is erroneous. The expectation value of the PER is denoted packet error
probabilitypp, which for a data packet length of N bits can be expressed as
,
Assuming that the bit errors are independent of each other. For small bit error
probabilities, this is approximately
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Similar measurements can be carried out for the transmission of frame, blocks or
symbols.
Factors affecting the BER,
In a communication system, the receiver side BER may be affected by
transmission channel noise, interference, distortion, bit synchronization problems,
attenuation, wireless multipath fading, etc.
The BER may be improved by choosing a strong signal strength (unless this
causes cross-talk and more bit errors), by choosing a slow and robust modulation scheme
or line coding scheme, and by applying channel coding schemes such as redundant
forward error correction codes.
The transmission BER is the number of detected bits that are incorrect before
error correction, divided by the total number of transferred bits (including redundant error
codes). The information BER, approximately equal to the decoding error probability, is
the number of decoded bits that remain incorrect after the error correction, divided by the
total number of decoded bits (the useful information). Normally the transmission BER is
larger than the information BER. The information BER is affected by the strength of the
forward error correction code.
Analysis of the BER
The BER may be analyzed using stochastic computer simulations. If a simple
transmission channel model and data source model is assumed, the BER may also be
calculated analytically. An example of such a data source model is the Bernoulli source.
Bit-error rate curves for BPSK, QPSK, 8-PSK and 16-PSK, AWGN channel.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
BER comparison between BPSK and differentially-encoded BPSK with graycoding operating in white noise.
In a noisy channel, the BER is often expressed as a function of the normalized
carrier-to-noise ratio measure denoted Eb/No, (energy per bit to noise power spectral
density ratio), or Es/No (energy per modulation symbol to noise spectral density).
For example, in the case of QPSK modulation and AWGN channel, the BER as function
of the Eb/N0 is given by:
People usually plot the BER curves to describe the functionality of a digital
communication system. In optical communication, BER (dB) vs. Received Power (dBm)
is usually used; while in wireless communication, BER (dB) vs. SNR(dB) is used.
Bit error rate test
BERT or bit error rate test is a testing method for digital communication circuits
that uses predetermined stress patterns consisting of a sequence of logical ones and zeros
generated by a test pattern generator.
A BERT typically consists of a test pattern generator and a receiver that can be set
to the same pattern. They can be used in pairs, with one at either end of a transmission
link, or singularly at one end with a loop back at the remote end. BERTs are typically
stand-alone specialized instruments, but can be Personal Computer based. In use, the
number of errors, if any, are counted and presented as a ratio such as 1 in 1,000,000, or 1
in 1e06.
Common types of BERT stress patterns
www.Vidyarthiplus.com
www.Vidyarthiplus.com
PRBS (pseudo random binary sequence) – A pseudorandom binary sequencer of
N Bits. These pattern sequences are used to measure jitter and eye mask of TX-Data in
electrical and optical data links.
QRSS (Quasi Random Signal Source) – A pseudorandom binary sequencer which
generates every combination of a 20-bit word, repeats every 1,048,575 bits, and
suppresses consecutive zeros to no more than 14. It contains high-density sequences, lowdensity sequences, and sequences that change from low to high and vice versa. This
pattern is also the standard pattern used to measure jitter.
3 in 24 – Pattern contains the longest string of consecutive zeros (15) with the
lowest ones density (12.5%). This pattern simultaneously stresses minimum ones density
and the maximum number of consecutive zeros. The D4 frame format of 3 in 24 may
cause a D4 Yellow Alarm for frame circuits depending on the alignment of one bits to a
frame.
1:7 – Also referred to as ―1 in 8‖. It has only a single one in an 8-bit repeating
sequence. This pattern stresses the minimum ones density of 12.5% and should be used
when testing facilities set for B8ZS coding as the 3 in 24 pattern increases to 29.5% when
converted to B8ZS.
Min/Max – Pattern rapid sequence changes from low density to high density.
Most useful when stressing the repeaters ALBO feature.
All Ones (or Mark) – A pattern composed of ones only. This pattern causes the
repeater to consume the maximum amount of power. If DC to the repeater is regulated
properly, the repeater will have no trouble transmitting the long ones sequence. This
pattern should be used when measuring span power regulation. An unframed all ones
pattern is used to indicate an AIS(also known as a Blue Alarm).
All Zeros – A pattern composed of zeros only. It is effective in finding equipment
misoptioned for AMI, such as fiber/radio multiplex low-speed inputs.
Alternating 0s and 1s - A pattern composed of alternating ones and zeroes.
2 in 8 – Pattern contains a maximum of four consecutive zeros. It will not invoke
a B8ZS sequence because eight consecutive zeros are required to cause a B8ZS
substitution. The pattern is effective in finding equipment misoptioned for B8ZS.
Bridge tap - within a span can be detected by employing a number of test patterns
with a variety of ones and zeros densities. This test generates 21 test patterns and runs for
15 minutes. If a signal error occurs, the span may have one or more bridge taps. This
www.Vidyarthiplus.com
www.Vidyarthiplus.com
pattern is only effective for T1 spans that transmit the signal raw. Modulation used in
HDSL spans negates the Bridgetap patterns' ability to uncover bridge taps.
Multipath - This test generates 5 commonly used test patterns to allow DS1 span
testing without having to select each test pattern individually. Patterns are: All Ones, 1:7,
2 in 8, 3 in 24, and QRSS.
T1-DALY and 55 OCTET - Each of these patterns contain fifty-five (55), eight
bit octets of data in a sequence that changes rapidly between low and high density. These
patterns are used primarily to stress the ALBO and equalizer circuitry but they will also
stress timing recovery. 55 OCTET has fifteen (15) consecutive zeroes and can only be
used unframed without violating ones density requirements. For framed signals, the T1DALY pattern should be used. Both patterns will force a B8ZS code in circuits optioned
for B8ZS.
Bit error rate tester
A bit error rate tester (BERT), also known as a bit error ratio testeror bit error rate
test solution (BERTs) is electronic test equipment used to test the quality of signal
transmission of single components or complete systems.
The main building blocks of a BERT are:
Pattern Generator, which transmits a defined test pattern to the DUT or test
system
Error detector connected to the DUT or test system, to count the errors generated
by the DUT or test system
Clock signal generator to synchronize the pattern generator and the error detector
Digital communication analyzer is optional to display the transmitted or received
signal
Electrical-optical converter and optical-electrical converter for testing optical
communication signals.
3. Explain in detail about Frequency-shift keying?
www.Vidyarthiplus.com
www.Vidyarthiplus.com
An example of binary FSK
Frequency-shift keying (FSK) is a frequency modulation scheme in which digital
information is transmitted through discrete frequency changes of a carrier wave. The
simplest FSK is binary FSK (BFSK). BFSK uses a pair of discrete frequencies to transmit
binary (0s and 1s) information. With this scheme, the "1" is called the mark frequency
and the "0" is called the space frequency. The time domain of an FSK modulated carrier
is illustrated in the figures to the right.
Definition - What does Frequency-Shift Keying (FSK) mean?
Frequency-shift keying (FSK) allows digital information to be transmitted by
changes or shifts in the frequency of a carrier signal, most commonly an analog carrier
sine wave. There are two binary states in a signal, zero (0) and one (1), each of which is
represented by an analog wave form. This binary data is converted by a modem into an
FSK signal, which can be transmitted via telephone lines, fiber optics or wireless media.
FSK is commonly used for caller ID and remote metering applications.
FSK is also known as frequency modulation (FM).
www.Vidyarthiplus.com
www.Vidyarthiplus.com
For example, a low-speed Hayes-compatible modem uses an unbit FM technique.
When no digital information is transmitted, the frequency is 1,700 Hz. When a one is
transmitted, the frequency shifts to 2,200 Hz. When a zero is transmitted, the frequency
shifts to 1,200 Hz. The number of these frequency shifts per second is measured as the
baud or modulation rate. Thus, a 2,400 baud modem can process zeros and ones from a
computer at the rate of 2,400 bits per second using FSK. This is the simplest digital
communication, where baud and bit rate are the same and measured in bits per second.
In more advanced modems and data transmission techniques, a symbol may have
more than two states, not just zeros and ones. It may also represent more than one bit of
information. However, a single bit always represents one of two states – either a zero (0)
or a one (1). In this case, baud (or symbol rate expressed in symbols/second or pulses
/second) and bit rate are different and must not be confused with one another.
Other forms of FSK
Minimum-shift keying
Minimum frequency-shift keying or minimum-shift keying (MSK) is a particular
spectrally efficient form of coherent FSK. In MSK, the difference between the higher and
lower frequency is identical to half the bit rate. Consequently, the waveforms that
represent a 0 and a 1 bit differ by exactly half a carrier period. The maximum frequency
deviation is δ = 0.25 fm, where fm is the maximum modulating frequency. As a result, the
modulation index m is 0.25. This is the smallest FSK modulation index that can be
chosen such that the waveforms for 0 and 1 are orthogonal. A variant of MSK called
GMSK is used in the GSM mobile phone standard.
Audio FSK
Audio frequency-shift keying (AFSK) is a modulation technique by which digital
data is represented by changes in the frequency (pitch) of an audio tone, yielding an
encoded signal suitable for transmission via radio or telephone. Normally, the transmitted
audio alternates between two tones: one, the "mark", represents a binary one; the other,
the "space", represents a binary zero.
AFSK differs from regular frequency-shift keying in performing the modulation
at baseband frequencies. In radio applications, the AFSK-modulated signal normally is
being used to modulate an RF carrier (using a conventional technique, such as AM or
FM) for transmission.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
AFSK is not always used for high-speed data communications, since it is far less
efficient in both power and bandwidth than most other modulation modes. In addition to
its simplicity, however, AFSK has the advantage that encoded signals will pass through
AC-coupled links, including most equipment originally designed to carry music or
speech.
AFSK is used in the U.S. based Emergency Alert System to notify stations of the
type of emergency, locations affected, and the time of issue without actually hearing the
text of the alert.
Applications
1200 baud AFSK signal
Menu
0:00
Listen to an example of a 1200 baud AFSK-modulated signal.
In 1910, Reginald Fessenden invented a two-tone method of transmitting Morse
code. Dots and dashes were different tones of equal length. The intent was to minimize
transmission time.
Some early CW transmitters employed an arc converter that could not be
conveniently keyed. Instead of turning the arc on and off, the key slightly changed the
transmitter frequency in a technique known as the compensation-wave method. The
compensation-wave was not used at the receiver. The method consumed a lot of
bandwidth and caused interference, so it was discouraged by 1921.
Most early telephone-line modems used audio frequency-shift keying (AFSK) to
send and receive data at rates up to about 1200 bits per second. The common Bell 103
and Bell 202 modems used this technique. Even today, North American caller ID uses
1200 baud AFSK in the form of the Bell 202 standard. AFSK is still widely used in
amateur radio, as it allows data transmission through unmodified voiceband equipment.
Radio control gear uses FSK, but calls it FM and PPM instead.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
AFSK is also used in the United States Emergency Alert System to transmit
warning information. It is used at higher bitrates for Weather copy used on Weather radio
by NOAA in the U.S.
The CHU shortwave radio station in Ottawa, Canada broadcasts an exclusive
digital time signal encoded using AFSK modulation.
FSK is commonly usedin Caller ID and remote metering applications: see FSK
standards for use in Caller ID and remote metering for more details.
4. Give short notes about PSK?
In phase shift keying (PSK), the phase of a carrier is changed according to the
modulating waveform which is a digital signal. In BPSK, the transmitted signal is a
sinusoid of fixed amplitude. It has one fixed phase when the data is at one level and when
the data is at the other level, phase is different by 180 degree. A Binary Phase Shift
Keying(BPSK) signal can be defined as
where b(t) = +1 or -1, fc is the carrier frequency, and T is the bit duration. The signal
has a power
sinusoidal carrier.
, so that
, where A represents the peak value of
Thus the above equation can be written as
=
=
=
, where E=PT is the energy contained in the bit
duration.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Figure.Shows the BPSK signal for bit sequence 1001,
Where
and
The received signal has the form
=
, where is the phase
shift introduced by the channel. The signal b(t) is recovered in the demodulator. If
synchronous demodulation is used, the waveform
is required at the
demodulator. Carrier recovery scheme in the demodulator is shown in Fig 2.
Figure: BPSK modulator and demodulator
www.Vidyarthiplus.com
www.Vidyarthiplus.com
The recovered carrier is multiplied with the received signal to generate
Assuming that integral number of carrier cycles is present in bit duration
voltage
and the bit synchronizer in Fig 2 knows the end of a bit interval and beginning of
the next, the output voltage
at the output of the integrate and dump circuit is:
If the channel is noisy, some of the demodulated bits will be in error.
5. What is modulator and demodulator (Modem) and give its applications?
A modem (modulator-demodulator) is a device that modulates an analog carrier
signalto encode digital information, and also demodulates such a carrier signal to decode
the transmitted information. The goal is to produce a signal that can be transmitted easily
and decoded to reproduce the original digital data. Modems can be used with any means
of transmitting analog signals, from light emitting diodes to radio. The most familiar
example is a voice band modem that turns the digital data of a personal computer into
modulated electrical signals in the voice frequency range of a telephone channel. These
signals can be transmitted over telephone lines and demodulated by another modem at the
receiver side to recover the digital data.
Modems are generally classified by the amount of data they can send in a given
unit of time, usually expressed in bits per second (bit/s, or bps), or bytes per second (B/s).
Modems can alternatively be classified by their symbol rate, measured in baud. The baud
unit denotes symbols per second, or the number of times per second the modem sends a
new signal. For example, the ITU V.21 standard used audio frequency shift keying with
two possible frequencies corresponding to two distinct symbols (or one bit per symbol),
to carry 300 bits per second using 300 baud. By contrast, the original ITU V.22 standard,
which could transmit and receive four distinct symbols (two bits per symbol), handled
1,200 bit/s by sending 600 symbols per second (600 baud) using phase shift keying.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Acoustic couplers
The Novation CAT acoustically coupled modem
For many years, the Bell System (AT&T) maintained a monopoly on the use of its
phone lines, and what devices could be connected to its lines. However, the seminal
Hush-a-Phone v. FCC case of 1956 concluded that it was within the FCC's jurisdiction to
regulate the operation of the System. Subsequently, the FCC examiner found that as long
as the device was not electrically attached it would not threaten to degenerate the system.
This led to a number of devices that mechanically connected to the phone, through a
standard handset. Since most handsets were supplied from Western Electric, it was
relatively easy to build such an acoustic coupler, and this style of connection was used for
many devices like answering machines.
Acoustically coupled Bell 103A-compatible 300 bit/s modems became common
during the 1970s, with well-known models including the Novation CAT and the
Anderson-Jacobson, the later spun off from an in-house project at Stanford Research
Institute. An even lower-cost option was the Penny whistle modem, designed to be built
using parts found at electronics scrap and surplus stores.
In December 1972, Vadicintroduced the VA3400, which was notable because it
provided full duplex operation at 1,200 bit/s over the phone network. Like the 103A, it
used different frequency bands for transmit and receive. In November 1976, AT&T
introduced the 212A modem to compete with Vadic. It was similar in design to Vadic's
model, but used the lower frequency set for transmission. One could also use the 212A
with a 103A modem at 300 bit/s. According to Vadic, the change in frequency
assignments made the 212 intentionally incompatible with acoustic coupling, thereby
locking out many potential modem manufacturers. In 1977, Vadic responded with the
VA3467 triple modem, an answer-only modem sold to computer center operators that
supported Vadic's 1,200-bit/s mode, AT&T's 212A mode, and 103A operation.
Carterfone and direct connection
www.Vidyarthiplus.com
www.Vidyarthiplus.com
The Hush-a-Phone decision applied only to mechanical collections, but the
Cartefonedecision of 1968 led to the FCC introducing a rule setting stringent AT&Tdesigned tests for electronically coupling a device to the phone lines. AT&T's tests were
complex, making electronically coupled modems expensive. so acoustically coupled
modems remained common into the early 1980s.
However, the rapidly falling prices of electronics in the late 1970s led to an
increasing number of direct-connect models around 1980. In spite of being directly
connected, these modems were generally operated like their earlier acoustic versions dialling and other phone-control operations were completed by hand, using an attached
handset. A small number of modems added the ability to automatically answer incoming
calls, or automatically place an outgoing call to a single number, but even these limited
features were relatively rare or limited to special models in a lineup. When more flexible
solutions were needed, 3rd party "dialers" were used to automate calling, normally using
a separate serial port.
The Smartmodem and the rise of BBSs
The original model 300 baud Smartmodem
The next major advance in modems was the Hayes Smart modem, introduced in
1981. The Smartmodem was an otherwise standard 103A 300-bit/s modem, but it was
attached to a small microcontroller that let the computer send it commands. The
command set included instructions for picking up and hanging up the phone, dialing
numbers, and answering calls. This eliminated the need for any manual operation, a
handset, or a dialer. Terminal programs that maintained lists of phone numbers and sent
the dialing commands became common. The basic Hayes command set remains the basis
for computer control of most modern modems.
The Smartmodem and its clones also aided the spread of bulletin board systems
(BBSs) because it was the first low-cost modem that could answer calls. Modems had
previously been typically either the call-only, acoustically coupled models used on the
client side, or the much more expensive, answer-only models used on the server side.
These were fine for large computer installations, but useless for the hobbies who wanted
to run a BBS but then periodically use the same telephone line to call other systems. The
www.Vidyarthiplus.com
www.Vidyarthiplus.com
first hobby BBS system, CBBS, started as an experiment in ways to better use the Smart
modem.
Almost all modern modems can inter-operate with fax machines. Digital faxes,
introduced in the 1980s, are simply an image format sent over a high-speed (commonly
14.4 kbit/s) modem. Software running on the host computer can convert any image into
fax format, which can then be sent using the modem. Such software was at one time an
add-on, but has since become largely universal.
V.34/28.8k and 33.6k
An ISA modem manufactured to conform to the V.34 protocol.
Any interest in these systems was destroyed during the lengthy introduction of the
28,800 bit/s V.34 standard. While waiting, several companies decided to release
hardware and introduced modems they referred to as V.FAST. In order to guarantee
compatibility with V.34 modems once the standard was ratified (1994), the
manufacturers were forced to use more flexible parts, generally a DSP and
microcontroller, as opposed to purpose-designed ASIC modem chips.
V.61/V.70 Analog/Digital Simultaneous Voice and Data
The V.61 Standard introduced Analog Simultaneous Voice and Data (ASVD).
This technology allowed users of v.61 modems to engage in point-to-point voice
conversations with each other while their respective modems communicated.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
In 1995, the first DSVD (Digital Simultaneous Voice and Data) modems became
available to consumers, and the standard was ratified as v.70 by the International
Telecommunication Union (ITU) in 1996.
Two DSVD modems can establish a completely digital link between each other
over standard phone lines. Sometimes referred to as "the poor man's ISDN", and
employing a similar technology, v.70 compatible modems allow for a maximum speed of
33.6 kbit/s between peers. By using a majority of the bandwidth for data and reserving
part for voice transmission, DSVD modems allow users to pick up a telephone handset
interfaced with the modem, and initiate a call to the other peer.
One practical use for this technology was realized by early two-player video
gamers, who could hold voice communication with each other over the phone while
playing.
Using digital lines and PCM (V.90/92)
Softmodem
www.Vidyarthiplus.com
www.Vidyarthiplus.com
A Win modem or soft modem is a stripped-down modem that replaces tasks
traditionally handled in hardware with software. In this case the modem is a simple
interface designed to act as a digital-to-analog and an analog-to-digital converter.
Softmodems are cheaper than traditional modems because they have fewer hardware
components. However, the software generating and interpreting the modem tones to be
sent to the softmodem uses many system resources. For online gaming, this can be a real
concern. Another problem is the lack of cross-platform compatibility, meaning that nonWindows operating systems (such as Linux) often do not have an equivalent driver to
operate the modem.
Radio modems
Direct broadcast satellite, Wi-Fi, and mobile phones all use modems to
communicate, as do most other wireless services today. Modern telecommunications and
data networks also make extensive use of radio modems where long distance data links
are required. Such systems are an important part of the PSTN, and are also in common
use for high-speed computer network links to outlying areas where fiber is not
economical.
Even where a cable is installed, it is often possible to get better performance or
make other parts of the system simpler by using radio frequencies and modulation
techniques through a cable. Coaxial cable has a very large bandwidth; however signal
attenuation becomes a major problem at high data rates if a baseband digital signal is
used. By using a modem, a much larger amount of digital data can be transmitted through
a single wire. Digital cable television and cable Internet services use radio frequency
modems to provide the increasing bandwidth needs of modern households. Using a
modem also allows for frequency-division multiple accessto be used, making full-duplex
digital communication with many users possible using a single wire.
Wireless modems come in a variety of types, bandwidths, and speeds. Wireless
modems are often referred to as transparent or smart. They transmit information that is
modulated onto a carrier frequency to allow many simultaneous wireless communication
links to work simultaneously on different frequencies.
Transparent modems operate in a manner similar to their phone line modem
cousins. Typically, they were half duplex, meaning that they could not send and receive
data at the same time. Typically transparent modems are polled in a round robin manner
to collect small amounts of data from scattered locations that do not have easy access to
wired infrastructure. Transparent modems are most commonly used by utility companies
for data collection.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Smart modems come with media access controllers inside, which prevent random
data from colliding and resend data that is not correctly received. Smart modems
typically require more bandwidth than transparent modems, and typically achieve higher
data rates. The IEEE 802.11 standard defines a short range modulation scheme that is
used on a large scale throughout the world.
Wi-Fi and Wi-Max
Wireless data modems are used in the Wi-Fi and Wi-Max standards, operating at
microwave frequencies.
Mobile broadband modems
USB wireless modem
Modems which use a mobile telephone system (GPRS, UMTS, HSPA, EVDO,
Wi-Max, etc.), are known as mobile broadband modems (sometimes also called wireless
modems). Wireless modems can be embedded inside a laptopor appliance, or be external
to it. External wireless modems are connecting cards, USB modems for mobile
broadband and cellular routers. A connect card is a PC card or Express card which slides
into a PCMCIA/PC card/Express Card slot on a computer. USB wireless modems use a
USB port on the laptop instead of a PC card or Express Card slot. A USB modem used
for mobile broadband Internet is also sometimes referred to as a dongle. A cellular router
may have an external datacard (Air Card) that slides into it. Most cellular routers do
allow such data cards or USB modems. Cellular routers may not be modems by
definition, but they contain modems or allow modems to be slid into them. The difference
between a cellular router and a wireless modem is that a cellular router normally allows
multiple people to connect to it (since it can route data or support multipoint to multipoint
connections), while a modem is designed for one connection.
Most of GSM wireless modems come with an integrated SIM card holder and
some models are also provided with a microSD memory slot and/or jack for additional
www.Vidyarthiplus.com
www.Vidyarthiplus.com
external antenna such as Huawei E1762 and Sierra Wireless Compass 885. The CDMA
(EVDO) versions do not use R-UIM cards, but use Electronic Serial Number (ESN)
instead.
The cost of using a wireless modem varies from country to country. Some carriers
implement flat rate plans for unlimited data transfers. Some have caps (or maximum
limits) on the amount of data that can be transferred per month. Other countries have
plans that charge a fixed rate per data transferred—per megabyte or even kilobyte of data
downloaded; this tends to add up quickly in today's content-filled world, which is why
many peopleare pushing for flat data rates.
The faster data rates of the newest wireless modem technologies (UMTS, HSPA,
EVDO, Wi-Max) are also considered to be broadband wireless modems and compete
with other broadband modems below.
Until the end of April 2011, worldwide shipments of USB modems surpassed
embedded 3G and 4G modules by 3:1 because USB modems can be easily discarded, but
embedded modems could start to gain popularity as tablet sales grow and as the
incremental cost of the modems shrinks, so by 2016 the ratio may change to 1:1.Like
mobile phones, mobile broadband modems can be SIM locked to a particular network
provider. Unlocking a modem is achieved the same way as unlocking a phone, by using
an 'unlock code'
Broadband
DSL Modem
(asymmetric digital subscriber line) ADSL modems, a more recent development,
are not limited to the telephone's voiceband audio frequencies. Some ADSL modems use
www.Vidyarthiplus.com
www.Vidyarthiplus.com
coded orthogonal frequency division modulation (DMT, for Discrete MultiTone; also
called COFDM, for digital TV in much of the world).
DSL modems utilize a property that standard twisted-pair telephone cable can be
used for short distances to carry much higher frequency signals than what the cable is
actually rated to handle. This is also why DSL modems have a distance limitation.
Standard voice and slower 56 kilobit modem communications are possible over many
kilometers of cable, but the higher frequencies used by DSL are attenuated and DSL's
maximum performance gradually declines as the cable length increases.
Cable Modemsuse a range of frequencies originally intended to carry RF
television channels, and can coexist on the same single cable alongside standard RF
channel signals. Multiple cable modems attached to a single cable can use the same
frequency band, using a low-level media access protocol to allow them to work together
within the same channel. Typically, uplink and downlink signals are kept separate using
frequency division multiple access. For a single-cable distribution system, the return
signals from customers require special bidirectional amplifiers or reverse path amplifiers
that can send specific customer frequency bands upstream to the cable plant amongst the
other downstream frequency bands.
New types of broadband modems are beginning to appear, such as double way
satellite and power line modems.
Broadband modems should still be classified as modems, since they use complex
waveforms to carry digital data. They are more advanced devices than traditional dial-up
modems as they are either capable of modulating/demodulating hundreds of channels
simultaneously and/or are capable of using much wider channels than dial-up modems.
Many broadband modems include the functions of a router, such as Ethernet and
Wi-Fi, and other features such as DHCP, NAT and firewalls.
When broadband technology was introduced, networking and routers were
unfamiliar to consumers. However, many people knew what a modem was because
Internet access was still commonly done through dial-up. Due to this familiarity,
companies started selling broadband modems using the familiar term "modem", rather
than vaguer ones such as "adapter," "transceiver," or "bridge."
Home networking
Although the name modem is seldom used in this case, modems are also used for
high-speed home networking applications, especially those using existing home wiring.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
One example is the G.hn standard, developed by ITU-T, which provides a high-speed (up
to 1 Gbit/s) LAN using existing home wiring (power lines, phone lines and coaxial
cables). G.hn devices use orthogonal frequency division multiplexing (OFDM) to
modulate a digital signal for transmission over the wire.
The phrase "null modem‖ was used to describe attaching a specially wired cable
between the serial ports of two personal computers. Basically, the transmit output of one
computer was wired to the receive input of the other; this was true for both computers.
The same software used with modems (such as ProComm or Mincom) could be used with
the null modem connection.
Voice modem
Voice modems are regular modems that are capable of recording or playing audio
over the telephone line. They are used for telephony applications. This type of modem
can be used as an FXO card for Private branch exchange systems (compare V.92).
Popularity
A CEA study in 2006 found that dial-up Internet access is declining in the U.S. In
2000, dial-up Internet connections accounted for 74% of all U.S. residential Internet
connections. The US demographic pattern for dial-up modem users per capita has been
more or less mirrored in Canada and Australia for the past 20 years.
Dial-up modem use in the US had dropped to 60% by 2003, and in 2006 stood at
36%. Voiceband modems were once the most popular means of Internet access in the
U.S., but with the advent of new ways of accessing the Internet, the traditional 56K
modem is losing popularity. The dial up modem is still widely used by customers in rural
areas, where DSL, Cable or Fiber Optic Service is not available, or they are unwilling to
pay what these companies charge.AOL in its 2012 annual report showed it still collects
around $700 million in fees from dial-up users; about 3 million people.
6. Give a Comparison of CW (Continuous Wave Systems)?
Parameter
ASK
BPSK
QPSK
QAM
M-ary
PSK
BPSK
Information is
transmitted by
change in
Amplitude
Phase
Phase
Amplitude
& Phase
Phase
Frequency
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Number of bits
per symbol
N=1
N=1
N=2
N
N
N=1
Number of
possible
symbols M=2N
Two
Two
Four
M=2N
M=2N
Two
Detection
Method
Coherent
Coherent
Coherent
Coherent
Coherent
NonCoherent
For M=16
2
Sin π/M
Minimum
Euclidean
distance
Minimum
bandwidth
Symbol
duration Ts
b
2
2
2
2fb
2fb
fb
2fb/N
2fb/N
4fb
Tb
Tb
2 Tb
N Tb
N Tb
Tb
www.Vidyarthiplus.com
www.Vidyarthiplus.com
IV UNIT 2 MARKS
1. Define data communication codes.
Data communication codes are prescribed bit sequences used for encoding
Characters and symbols.
2. Define error detection.
Error detection is simply the process of monitoring the received data and
determining when a transmission has occurred.
3. Define Echoplex.
Echoplex is a relatively simple type of error detection scheme that is used
almost exclusively in data communications systems where human operators are
used to enter the data manually from a keyboard.
4. Describe serial interface.
Serial interface is used to ensure an orderly flow of data between the line
Control unit and the modem.
5. Define parallel interface.
Parallel interfaces transfer data between two devices eight or more bits a a
time. That is one entire data word is transmitted at a time .Parallel transmission is
sometimes referred to as serial by word transmission.
6. What are the advantages of parallel transmission?
The advantage of parallel transmission is data are transmitted much faster
than with serial transmission because there is a transmission path for each bit of
the word.
In parallel interface there is no need to convert data from parallel to serial
or vice versa.
7. What is the purpose of data modem?
The primary purpose of data modem is to interface computers, computer
networks, and other digital terminal equipment to analog communication lines
and radio terminals.
8. Classify data modems.
Data modems are generally classified in to synchronous and asynchronous
data modems.
9. Define OSI.
The term open system interconnection is the name for a set of standards
For communications among computers. The primary purpose of OSI standards is
To serve as a structural guideline for exchanging information between computers,
Terminals and networks.
10. Describe LAN.
A local area network is usually a privately owned and links the devices in
a single office, building or campus of up to a few kilometres in size.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
IV UNIT 16 MARK
1. Describe LAN?
A local area network (LAN) is a computer network that interconnects computers in a
limited area such as a home, school, computer laboratory, or office building using network
media.[1] The defining characteristics of LANs, in contrast to wide area networks (WANs),
include their usually higher data-transfer rates, smaller geographic area, and lack of a need
for leased telecommunication lines.
ARCNET, Token Ring and other technology standards have been used in the past, but
Ethernet over twisted pair cabling, and Wi-Fi are the two most common technologies
currently used to build LANs.
A conceptual diagram of a local area network using 10BASE5 Ethernet
The increasing demand and use of computers in universities and research labs in the late
1960s generated the need to provide high-speed interconnections between computer
systems. A 1970 report from the Lawrence Radiation Laboratory detailing the growth of
their "Octopus" network gave a good indication of the situation.
Cambridge Ring was developed at Cambridge University in 1974 but was never developed
into a successful commercial product.
Ethernet was developed at Xerox PARC in 1973–1975, and filed as U.S. Patent 4,063,220.
In 1976, after the system was deployed at PARC, Metcalfe and Boggs published a seminal
paper, "Ethernet: Distributed Packet-Switching For Local Computer Networks."
ARCNET was developed by Data point Corporation in 1976 and announced in 1977. It
had the first commercial installation in December 1977 at Chase Manhattan Bank in New
York.
Standards evolution
The development and proliferation of personal computers using the CP/M operating
system in the late 1970s, and later DOS-based systems starting in 1981, meant that many
www.Vidyarthiplus.com
www.Vidyarthiplus.com
sites grew to dozens or even hundreds of computers. The initial driving force for
networking was generally to share storage and printers, which were both expensive at the
time. There was much enthusiasm for the concept and for several years, from about 1983
onward, computer industry pundits would regularly declare the coming year to be ―the
year of the LAN‖.
In practice, the concept was marred by proliferation of incompatible physical layer and
network protocol implementations, and a plethora of methods of sharing resources.
Typically, each vendor would have its own type of network card, cabling, protocol, and
network operating system. A solution appeared with the advent of Novell NetWare which
provided even-handed support for dozens of competing card/cable types, and a much more
sophisticated operating system than most of its competitors. Netware dominated the
personal computer LAN business from early after its introduction in 1983 until the mid1990s when Microsoft introduced Windows NT Advanced Server and Windows for
Workgroups.
Of the competitors to NetWare, only Banyan Vines had comparable technical strengths,
but Banyan never gained a secure base. Microsoft and 3Com worked together to create a
simple network operating system which formed the base of 3Com's 3+Share, Microsoft's
LAN Manager and IBM's LAN Server - but none of these was particularly successful.
During the same period, Unix computer workstations from vendors such as Sun
Microsystems, Hewlett-Packard, Silicon Graphics, Intergraph, NeXT and Apollo were
using TCP/IP based networking. Although this market segment is now much reduced, the
technologies developed in this area continue to be influential on the Internet and in both
Linux and Apple Mac OS X networking—and the TCP/IP protocol has now almost
completely replaced IPX, AppleTalk, NBF, and other protocols used by the early PC
LANs.
Cabling
Early LAN cabling had been based on various grades of coaxial cable. Shielded twisted
pair was used in IBM's Token Ring LAN implementation. In 1984, Star LAN showed the
potential of simple unshielded twisted pair by using Cat3 cable—the same simple cable
used for telephone systems. This led to the development of 10Base-T (and its successors)
and structured cabling which is still the basis of most commercial LANs today. In
addition, fiber-optic cabling is increasingly used in commercial applications.
As cabling is not always possible, Wi-Fi is now very common in residential premises, and
elsewhere where support for laptops and smart phones is important.
Technical aspects
Network topology describes the layout of interconnections between devices and network
segments. At the Data Link Layer and Physical Layer, a wide variety of LAN topologies
have been used, including ring, bus, mesh and star, but the most common LAN topology
in use today is switched Ethernet. At the higher layers, the Internet Protocol (TCP/IP) has
become the standard, replacing NetBEUI, IPX/SPX, AppleTalk and others.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Simple LANs generally consist of one or more switches. A switch can be connected to a
router, cable modem, or ADSL modem for Internet access. Complex LANs are
characterized by their use of redundant links with switches using the spanning tree
protocol to prevent loops, their ability to manage differing traffic types via quality of
service (Qos), and to segregate traffic with VLANs. A LAN can include a wide variety of
network devices such as switches, firewalls, routers, load balancers, and sensors.
LANs can maintain connections with other LANs via leased lines, leased services, or the
Internet using virtual private network technologies. Depending on how the connections are
established and secured in a LAN, and the distance involved, a LAN may also be
classified as a metropolitan area network (MAN) or a wide area network (WAN).
2. Give short notes about BAUDOT code and illustrate with an example?
Data are communicated between digital computers as sequences of bits. To provide
meaning to a sequence of bits, the bits are grouped to form a data character and an
encoding scheme, or translation table, is provided to allow a computer system to translate
each group of bits into a character. The ideal encoding scheme will provide a unique code
for every possible character to be communicated and stored in the computer, but this
requires that each group have a sufficient number of bits for each data character.
A code used early in the data communications industry is the Baudot code. Baudot uses
five bits per character, thus allowing up to 32 distinct characters. As a technique used to
extend this limitation, the code uses up-shift and down-shift modes as is used on a
typewriter. In the Baudot code, each five bits transmitted must be interpreted according to
whether they are up-shifted (figures) or down-shifted (letters). For example, the bit pattern
11111 represents up-shift and the bit pattern 11011 represents down-shift characters. All
characters transmitted after the sequence 11111 but before the shifted sequence 11011 are
treated as up-shift characters. All characters transmitted after the sequence 11011 are
treated as down-shift characters until the pattern 11111 is recognized. The complete
BAUDOT code (modified for this problem) is shown in the table at the end of this
problem.
Input
The input consists of two parts. The first part is the Baudot character set: line one contains
the 32 down-shift characters and line two contains the 32 up-shift characters. (Note:
spaces are inserted for the shift characters.) The remainder of the input file consists of one
or more messages encoded using the Baudot code. Each message will be on a line in the
input file. Each line will consist of 1's and 0's, with no characters between the bits. There
can be up to 80 bits per message. The input file will be terminated by end-of-file. The
initial state of each message should be assumed to be in the down-shift state.
Output
The output should consist of one line of text for each message. The output should contain
the character representation, as translated using BAUDOT, of each of the messages.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Sample Input
<T*O HNM=LRGIPCVEZDBSYFXAWJ UQK
>5@9 %,.+)4&80:;3"$?#6!/-2' 71(
100100110011000010011111101110000111110111101
001100001101111001001111100001001100010001100110111100000111
Sample Output
DIAL:911
NOV 5, 8AM
Bit Pattern
Down-Shift Character
Up-Shift Character
00000
<
>
00001
T
5
00010
*
@
00011
O
9
00100
Space
Space
00101
H
%
00110
N
,
00111
M
.
01000
=
+
01001
L
)
01010
R
4
01011
G
&
01100
I
8
01101
P
0
01110
C
:
01111
V
;
10000
E
3
10001
Z
"
10010
D
$
10011
B
?
10100
S
#
10101
Y
6
www.Vidyarthiplus.com
www.Vidyarthiplus.com
10110
F
!
10111
X
/
11000
A
-
11001
W
2
11010
J
'
11011
Shift Down
Shift Down
11100
U
7
11101
Q
1
11110
K
(
11111
Shift Up
Shift Up
Table: The BAUDOT code
3. Explain in detail about error detection and correction?
In information theory and coding theory with applications in computer science and
telecommunication, error detection and correction or error control are techniques that
enable reliable delivery of digital data over unreliable communication channels. Many
communication channels are subject to channel noise, and thus errors may be
introduced during transmission from the source to a receiver. Error detection
techniques allow detecting such errors, while error correction enables reconstruction
of the original data.
Error correction may generally be realized in two different ways:
Automatic repeat request (ARQ) (sometimes also referred to as backward error
correction): This is an error control technique whereby an error detection scheme is
combined with requests for retransmission of erroneous data. Every block of data
received is checked using the error detection code used, and if the check fails,
retransmission of the data is requested – this may be done repeatedly, until the data
can be verified.
Forward error correction (FEC): The sender encodes the data using an error-correcting
code (ECC) prior to transmission. The additional information (redundancy) added by
the code is used by the receiver to recover the original data. In general, the
reconstructed data is what is deemed the "most likely" original data.
ARQ and FEC may be combined, such that minor errors are corrected without
retransmission, and major errors are corrected via a request for retransmission: this is
called hybrid automatic repeat-request (HARQ).
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Error detection schemes
Error detection is most commonly realized using a suitable hash function (or
checksum algorithm). A hash function adds a fixed-length tag to a message, which
enables receivers to verify the delivered message by recomputing the tag and
comparing it with the one provided.
There exists a vast variety of different hash function designs. However, some are of
particularly widespread use because of either their simplicity or their suitability for
detecting certain kinds of errors (e.g., the cyclic redundancy check's performance in
detecting burst errors).
Random-error-correcting codes based on minimum distance coding can provide a
suitable alternative to hash functions when a strict guarantee on the minimum number
of errors to be detected is desired. Repetition codes, described below, are special cases
of error-correcting codes: although rather inefficient, they find applications for both
error correction and detection due to their simplicity.
Repetition codes
A repetition code is a coding scheme that repeats the bits across a channel to achieve
error-free communication. Given a stream of data to be transmitted, the data is divided
into blocks of bits. Each block is transmitted some predetermined number of times.
For example, to send the bit pattern "1011", the four-bit block can be repeated three
times, thus producing "1011 1011 1011". However, if this twelve-bit pattern was
received as "1010 1011 1011" – where the first block is unlike the other two – it can
be determined that an error has occurred.
Repetition codes are very inefficient, and can be susceptible to problems if the error
occurs in exactly the same place for each group (e.g., "1010 1010 1010" in the
previous example would be detected as correct). The advantage of repetition codes is
that they are extremely simple, and are in fact used in some transmissions of numbers
stations.
Parity bits
A parity bit is a bit that is added to a group of source bits to ensure that the number of
set bits (i.e., bits with value 1) in the outcome is even or odd. It is a very simple
scheme that can be used to detect single or any other odd number (i.e., three, five,
etc.) of errors in the output. An even number of flipped bits will make the parity bit
appear correct even though the data is erroneous.
Extensions and variations on the parity bit mechanism are horizontal redundancy
checks, vertical redundancy checks, and "double," "dual," or "diagonal" parity (used
in RAID-DP).
Checksums
A checksum of a message is a modular arithmetic sum of message code words of a
fixed word length (e.g., byte values). The sum may be negated by means of aones'-
www.Vidyarthiplus.com
www.Vidyarthiplus.com
complement operation prior to transmission to detect errors resulting in all-zero
messages.
Checksum schemes include parity bits, check digits, and longitudinal redundancy
checks. Some checksum schemes, such as the Damm algorithm, the Luhn algorithm,
and the Verhoeff algorithm, are specifically designed to detect errors commonly
introduced by humans in writing down or remembering identification numbers.
Cyclic redundancy checks (CRCs)
A cyclic redundancy check (CRC) is a single-burst-error-detecting cyclic code and
non-secure hash function designed to detect accidental changes to digital data in
computer networks. It is not suitable for detecting maliciously introduced errors. It is
characterized by specification of a so-called generator polynomial, which is used as
the divisor in a polynomial long division over a finite field, taking the input data as
the dividend, and where the remainder becomes the result.
Cyclic codes have favorable properties in that they are well suited for detecting burst
errors. CRCs are particularly easy to implement in hardware, and are therefore
commonly used in digital networks and storage devices such as hard disk drives.
Even parity is a special case of a cyclic redundancy check, where the single-bit CRC
is generated by the divisor x + 1.
Cryptographic hash functions
The output of a cryptographic hash function, also known as a message digest, can
provide strong assurances about data integrity, whether changes of the data are
accidental (e.g., due to transmission errors) or maliciously introduced. Any
modification to the data will likely be detected through a mismatching hash value.
Furthermore, given some hash value, it is infeasible to find some input data (other
than the one given) that will yield the same hash value. If an attacker can change not
only the message but also the hash value, then a keyed hash or message authentication
code (MAC) can be used for additional security. Without knowing the key, it is
infeasible for the attacker to calculate the correct keyed hash value for a modified
message.
Error-correcting codes
Any error-correcting code can be used for error detection. A code with minimum
Hamming distance, d, can detect up to d − 1 errors in a code word. Using minimumdistance-based error-correcting codes for error detection can be suitable if a strict limit
on the minimum number of errors to be detected is desired.
Codes with minimum Hamming distance d = 2 are degenerate cases of errorcorrecting codes, and can be used to detect single errors. The parity bit is an example
of a single-error-detecting code.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Error correction
Automatic repeat request
Automatic Repeat request (ARQ) is an error control method for data transmission that
makes use of error-detection codes, acknowledgment and/or negative
acknowledgment messages, and timeouts to achieve reliable data transmission. An
acknowledgment is a message sent by the receiver to indicate that it has correctly
received a data frame.
Usually, when the transmitter does not receive the acknowledgment before the
timeout occurs (i.e., within a reasonable amount of time after sending the data frame),
it retransmits the frame until it is either correctly received or the error persists beyond
a predetermined number of retransmissions.
Three types of ARQ protocols are Stop-and-wait ARQ, Go-Back-N ARQ, and
Selective Repeat ARQ.
ARQ is appropriate if the communication channel has varying or unknown capacity,
such as is the case on the Internet. However, ARQ requires the availability of a back
channel, results in possibly increased latency due to retransmissions, and requires the
maintenance of buffers and timers for retransmissions, which in the case of network
congestion can put a strain on the server and overall network capacity.
Error-correcting code
An error-correcting code (ECC) or forward error correction (FEC) code is a system of
adding redundant data, or parity data, to a message, such that it can be recovered by a
receiver even when a number of errors (up to the capability of the code being used)
were introduced, either during the process of transmission, or on storage. Since the
receiver does not have to ask the sender for retransmission of the data, a back-channel
is not required in forward error correction, and it is therefore suitable for simplex
communication such as broadcasting. Error-correcting codes are frequently used in
lower-layer communication, as well as for reliable storage in media such as CDs,
DVDs, hard disks, and RAM.
Error-correcting codes are usually distinguished between convolution codes and block
codes:
Convolution codes are processed on a bit-by-bit basis. They are particularly suitable
for implementation in hardware, and the Viterbi decoder allows optimal decoding.
Block codes are processed on a block-by-block basis. Early examples of block codes
are repetition codes, Hamming codes and multidimensional parity-check codes. They
were followed by a number of efficient codes, Reed–Solomon codes being the most
notable due to their current widespread use. Turbo codes and low-density parity-check
codes (LDPC) are relatively new constructions that can provide almost optimal
efficiency.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Shannon's theorem is an important theorem in forward error correction, and describes
the maximum information rate at which reliable communication is possible over a
channel that has a certain error probability or signal-to-noise ratio (SNR). This strict
upper limit is expressed in terms of the channel capacity. More specifically, the
theorem says that there exist codes such that with increasing encoding length the
probability of error on a discrete memory less channel can be made arbitrarily small,
provided that the code rate is smaller than the channel capacity. The code rate is
defined as the fraction k/n of k source symbols and n encoded symbols.
The actual maximum code rate allowed depends on the error-correcting code used,
and may be lower. This is because Shannon's proof was only of existential nature, and
did not show how to construct codes which are both optimal and have efficient
encoding and decoding algorithms.
Hybrid schemes
Hybrid ARQ is a combination of ARQ and forward error correction. There are two
basic approaches:
Messages are always transmitted with FEC parity data (and error-detection
redundancy). A receiver decodes a message using the parity information, and requests
retransmission using ARQ only if the parity data was not sufficient for successful
decoding (identified through a failed integrity check).
Messages are transmitted without parity data (only with error-detection information).
If a receiver detects an error, it requests FEC information from the transmitter using
ARQ, and uses it to reconstruct the original message.
The latter approach is particularly attractive on an erasure channel when using a rate
less erasure code.
Applications
Applications that require low latency (such as telephone conversations) cannot use
Automatic Repeat reQuest (ARQ); they must use Forward Error Correction (FEC). By
the time an ARQ system discovers an error and re-transmits it, the re-sent data will
arrive too late to be any good.
Applications where the transmitter immediately forgets the information as soon as it is
sent (such as most television cameras) cannot use ARQ; they must use FEC because
when an error occurs, the original data is no longer available. (This is also why FEC is
used in data storage systems such as RAID and distributed data store).
Applications that use ARQ must have a return channel. Applications that have no
return channel cannot use ARQ.
Applications that require extremely low error rates (such as digital money transfers)
must use ARQ.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Internet
In a typical TCP/IP stack, error control is performed at multiple levels:
Each Ethernet frame carries a CRC-32checksum. Frames received with incorrect
checksums are discarded by the receiver hardware.
The IPv4 header contains a checksum protecting the contents of the header. Packets
with mismatching checksums are dropped within the network or at the receiver.
The checksum was omitted from the IPv6 header in order to minimize processing
costs in network routing and because current link layer technology is assumed to
provide sufficient error detection (see also RFC 3819).
UDP has an optional checksum covering the payload and addressing information from
the UDP and IP headers. Packets with incorrect checksums are discarded by the
operating system network stack. The checksum is optional under IPv4, only, because
the Data-Link layer checksum may already provide the desired level of error
protection.
TCP provides a checksum for protecting the payload and addressing information from
the TCP and IP headers. Packets with incorrect checksums are discarded within the
network stack, and eventually get retransmitted using ARQ, either explicitly (such as
through triple-ack) or implicitly due to a timeout.
Deep-space telecommunications
Development of error-correction codes was tightly coupled with the history of deepspace missions due to the extreme dilution of signal power over interplanetary
distances, and the limited power availability aboard space probes. Whereas early
missions sent their data uncoded, starting from 1968 digital error correction was
implemented in the form of (sub-optimally decoded) convolutional codes and Reed–
Muller codes. The Reed–Muller code was well suited to the noise the spacecraft was
subject to (approximately matching a bell curve), and was implemented at the Mariner
spacecraft for missions between 1969 and 1977.
The Voyager 1 and Voyager 2 missions, which started in 1977, were designed to
deliver color imaging amongst scientific information of Jupiter and Saturn. This
resulted in increased coding requirements, and thus the spacecraft were supported by
(optimally Viterbi-decoded) convolutional codes that could be concatenated with an
outer Golay (24,12,8) code. The Voyager 2 probe additionally supported an
implementation of a Reed–Solomon code: the concatenated Reed–Solomon–Viterbi
(RSV) code allowed for very powerful error correction, and enabled the spacecraft's
extended journey to Uranus and Neptune.
The CCSDS currently recommends usage of error correction codes with performance
similar to the Voyager 2 RSV code as a minimum. Concatenated codes are
increasingly falling out of favor with space missions, and are replaced by more
powerful codes such as Turbo codes or LDPC codes.
The different kinds of deep space and orbital missions that are conducted suggest that
trying to find a "one size fits all" error correction system will be an ongoing problem
for some time to come. For missions close to earth the nature of the channel noise is
different from that of a spacecraft on an interplanetary mission experiences.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Additionally, as a spacecraft increases its distance from earth, the problem of
correcting for noise gets larger.
Satellite broadcasting (DVB)
The demand for satellite transponder bandwidth continues to grow, fueled by the
desire to deliver television (including new channels and High Definition TV) and IP
data. Transponder availability and bandwidth constraints have limited this growth,
because transponder capacity is determined by the selected modulation scheme and
Forward error correction (FEC) rate.
Overview
QPSK coupled with traditional Reed Solomon and Viterbi codes have been used for
nearly 20 years for the delivery of digital satellite TV.
Higher order modulation schemes such as 8PSK, 16QAM and 32QAM have enabled
the satellite industry to increase transponder efficiency by several orders of
magnitude.
This increase in the information rate in a transponder comes at the expense of an
increase in the carrier power to meet the threshold requirement for existing antennas.
Tests conducted using the latest chipsets demonstrate that the performance achieved
by using Turbo Codes may be even lower than the 0.8 dB figure assumed in early
designs.
Data storage
Error detection and correction codes are often used to improve the reliability of data
storage media. A "parity track" was present on the first magnetic tape data storage in
1951. The "Optimal Rectangular Code" used in group code recording tapes not only
detects but also corrects single-bit errors.
Some file formats, particularly archive formats, include a checksum (most often
CRC32) to detect corruption and truncation and can employ redundancy and/or parity
files to recover portions of corrupted data.
Reed Solomon codes are used in compact discs to correct errors caused by scratches.
Modern hard drives use CRC codes to detect and Reed–Solomon codes to correct
minor errors in sector reads, and to recover data from sectors that have "gone bad" and
store that data in the spare sectors.
RAID systems use a variety of error correction techniques, to correct errors when a
hard drive completely fails.
Systems such as ZFS and some RAID support data scrubbing and recovering, which
allows bad blocks to be detected and (hopefully) recovered before they are used. The
recovered data may be re-written to exactly the same physical location, to spare
blocks elsewhere on the same piece of hardware, or to replacement hardware.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Error-correcting memory
DRAM memory may provide increased protection against soft errors by relying on
error correcting codes. Such error-correcting memory, known as ECC or EDACprotected memory is particularly desirable for high fault-tolerant applications, such as
servers, as well as deep-space applications due to increased radiation.
Error-correcting memory controllers traditionally use Hamming codes, although some
use triple modular redundancy.
Interleaving allows distributing the effect of a single cosmic ray potentially upsetting
multiple physically neighboring bits across multiple words by associating neighboring
bits to different words. As long as a single event upset (SEU) does not exceed the
error threshold (e.g., a single error) in any particular word between accesses, it can be
corrected (e.g., by a single-bit error correcting code), and the illusion of an error-free
memory system may be maintained.
A few systems support memory scrubbing.
4. Give a brief note on ISDN?
Integrated Services Digital Network (ISDN) is a set of communication standards for
simultaneous digital transmission of voice, video, data, and other network services
over the traditional circuits of the public switched telephone network. It was first
defined in 1988 in the CCITT red book. Prior to ISDN, the telephone system was
viewed as a way to transport voice, with some special services available for data. The
key feature of ISDN is that it integrates speech and data on the same lines, adding
features that were not available in the classic telephone system. There are several
kinds of access interfaces to ISDN defined as Basic Rate Interface (BRI), Primary
Rate Interface (PRI), Narrowband ISDN (N-ISDN), and Broadband ISDN (B-ISDN).
ISDN is a circuit-switched telephone network system, which also provides access to
packet switched networks, designed to allow digital transmission of voice and data
over ordinary telephone copper wires, resulting in potentially better voice quality than
an analog phone can provide. It offers circuit-switched connections (for either voice
or data), and packet-switched connections (for data), in increments of 64 kilobit/s. A
major market application for ISDN in some countries is Internet access, where ISDN
typically provides a maximum of 128 kbit/s in both upstream and downstream
directions. Channel bonding can achieve a greater data rate; typically the ISDN Bchannels of three or four BRIs (six to eight 64 Kbit/s channels) are bonded.
ISDN should not be mistaken for its use with a specific protocol, such as Q.931
whereby ISDN is employed as the network, data-link and physical layers in the
context of the OSI model. In a broad sense ISDN can be considered a suite of digital
services existing on layers 1, 2, and 3 of the OSI model. ISDN is designed to provide
access to voice and data services simultaneously.
However, common use reduced ISDN to be limited to Q.931 and related protocols,
which are a set of protocols for establishing and breaking circuit switched
www.Vidyarthiplus.com
www.Vidyarthiplus.com
connections, and for advanced calling features for the user. They were introduced in
1986.
In a videoconference, ISDN provides simultaneous voice, video, and text transmission
between individual desktop videoconferencing systems and group (room)
videoconferencing systems.
ISDN elements
An integrated service refers to ISDN's ability to deliver at minimum two simultaneous
connections, in any combination of data, voice, video, and fax, over a single line.
Multiple devices can be attached to the line, and used as needed. That means an ISDN
line can take care of most people's complete communications needs (apart from
broadband Internet access and entertainment television) at a much higher transmission
rate, without forcing the purchase of multiple analog phone lines. It also refers to
integrated switching and transmission in that telephone switching and carrier wave
transmission are integrated rather than separate as in earlier technology.
Basic Rate Interface
Main article: Basic Rate Interface
The entry level interface to ISDN is the Basic(s) Rate Interface (BRI), a 128 kbit/s
service delivered over a pair of standard telephone copper wires. The 128 kbit/s
payload rate is broken down into two 64 kbit/s bearer channels ('B' channels) and one
16 kbit/s signaling channel ('D' channel or data channel). This is sometimes referred to
as 2B+D.
The interface specifies the following network interfaces:
The U interface is a two-wire interface between the exchange and a network
terminating unit, which is usually the demarcation point in non-North American
networks.
The T interface is a serial interface between a computing device and a terminal
adapter, which is the digital equivalent of a modem.
The S interface is a four-wire bus that ISDN consumer devices plug into; the S & T
reference points are commonly implemented as a single interface labeled 'S/T' on an
Network termination 1 (NT1).
The R interface defines the point between a non-ISDN device and a terminal adapter
(TA) which provides translation to and from such a device.
BRI-ISDN is very popular in Europe but is much less common in North America. It is
also common in Japan — where it is known as INS64.
Primary Rate Interface
The other ISDN access available is the Primary Rate Interface (PRI), which is carried
over an E1 (2048 kbit/s) in most parts of the world. An E1 is 30 'B' channels of 64
kbit/s, one 'D' channel of 64 kbit/s and a timing and alarm channel of 64 kbit/s.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
In North America PRI service is delivered on one or more T1 carriers (often referred
to as 23B+D) of 1544 kbit/s (24 channels). A PRI has 23 'B' channels and 1 'D'
channel for signalling (Japan uses a circuit called a J1, which is similar to a T1). Interchangeably but incorrectly, a PRI is referred to as T1 because it uses the T1 carrier
format. A true T1 (commonly called "Analog T1" to avoid confusion) uses 24
channels of 64 kbit/s of in-band signaling. Each channel uses 56 kb for data and voice
and 8 kb for signaling and messaging. PRI uses out of band signaling which provides
the 23 B channels with clear 64 kb for voice and data and one 64 kb 'D' channel for
signaling and messaging. In North America, Non-Facility Associated Signalling
allows two or more PRIs to be controlled by a single D channel, and is sometimes
called "23B+D + n*24B". D-channel backup allows for a second D channel in case
the primary fails. NFAS is commonly used on a T3.
PRI-ISDN is popular throughout the world, especially for connecting PBXs to PSTN.
While the North American PSTN can use PRI or Analog T1 format from PBX to
PBX, the POTS or BRI can be delivered to a business or residence. North American
PSTN can connect from PBX to PBX via Analog T1, T3, PRI, OC3, etc...
Even though many network professionals use the term "ISDN" to refer to the lowerbandwidth BRI circuit, in North America BRI is relatively uncommon whilst PRI
circuits serving PBXs are commonplace.
Bearer channels
The bearer channel (B) is a standard 64 kbit/s voice channel of 8 bits sampled at
8 kHz with G.711 encoding. B-Channels can also be used to carry data, since they are
nothing more than digital channels.
Each one of these channels is known as a DS0.
Most B channels can carry a 64 kbit/s signal, but some were limited to 56K because
they traveled over RBS lines. This was commonplace in the 20th century, but has
since become less so.
Signaling channel
The signaling channel (D) uses Q.931 for signaling with the other side of the link.
X.25
X.25 can be carried over the B or D channels of a BRI line, and over the B channels
of a PRI line. X.25 over the D channel is used at many point-of-sale (credit card)
terminals because it eliminates the modem setup, and because it connects to the
central system over a B channel, thereby eliminating the need for modems and
making much better use of the central system's telephone lines.
X.25 was also part of an ISDN protocol called "Always On/Dynamic ISDN", or
AO/DI. This allowed a user to have a constant multi-link PPP connection to the
internet over X.25 on the D channel, and brought up one or two B channels as needed.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Frame Relay
In theory, Frame Relay can operate over the D channel of BRIs and PRIs, but it is
seldom, if ever, used.
Consumer and industry perspectives
There are two points of view into the ISDN world. The most common is that of the
end-user, who wants a digital connection into the telephone network from home,
whose performance would be better than a 20th-century analog 56K modem
connection. Discussion on the merits of various ISDN modems, carriers' offerings and
tariffs (features, pricing) are from this perspective. Since the principal consumer
application is for Internet access, ISDN was mostly superseded by DSL in the early
21st century. Inexpensive ADSL service offers speeds up to 5 Mbit/s, while more
expensive versions are improving in speed all the time. By 2010, ADSL speeds of
several millions of bits per second had become commonplace, thus making ISDN
obsolete before it fairly started.
There is a second viewpoint: that of the telephone industry, where ISDN is a core
technology. A telephone network can be thought of as a collection of wires strung
between switching systems. The common electrical specification for the signals on
these wires is T1 or E1. Between telephone company switches, the signaling is
performed via SS7. Normally, a PBX is connected via a T1 with robbed bit signaling
to indicate on-hook or off-hook conditions and MF and DTMF tones to encode the
destination number. ISDN is much better because messages can be sent much more
quickly than by trying to encode numbers as long (100 ms per digit) tone sequences.
This results in faster call setup times. Also, a greater number of features are available
and fraud is reduced.
ISDN is also used as a smart-network technology intended to add new services to the
public switched telephone network (PSTN) by giving users direct access to end-to-end
circuit-switched digital services and as a backup or failsafe circuit solution for critical
use data circuits.
ISDN and broadcast industry
ISDN is used heavily by the broadcast industry as a reliable way of switching low
latency, high quality, long distance audio circuits. In conjunction with an appropriate
codec using MPEG or various manufacturers proprietary algorithms, an ISDN BRI
can be used to send stereo bi-directional audio coded at 128 Kbit/s with 20 Hz –
20 kHz audio bandwidth, although commonly the G.722 algorithm is used with a
single 64 kbit/s B channel to send much lower latency mono audio at the expense of
audio quality. Where very high quality audio is required multiple ISDN BRIs can be
used in parallel to provide a higher bandwidth circuit switched connection. BBC
Radio 3 commonly makes use of three ISDN BRIs to carry 320 Kbit/s audio stream
for live outside broadcasts. ISDN BRI services are used to link remote studios, sports
grounds and outside broadcasts into the main broadcast studio. ISDN via satellite is
used by field reporters around the world. It's also common to use ISDN for the return
audio links to remote satellite broadcast vehicles.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
In many countries, such as the UK and Australia, ISDN has displaced the older
technology of equalized analogue landlines, with these circuits being phased out by
telecommunications providers. IP based streaming codec’s are starting to gain a
foothold in the broadcast sector, using broadband internet to connect remote studios.
However reliability and latency is crucially important for broadcasters and the quality
of service offered by ISDN has not yet been matched by packet switched alternatives.
Countries
United States and Canada
ISDN-BRI never gained popularity as a general use telephone access technology in
Canada and the US, and remains a niche product. The service was seen as a solution
in search of a problem,[8] and the extensive array of options and features were difficult
for customers to understand and use. ISDN has long been known by derogatory
acronyms highlighting these issues, such as It Still Does Nothing, Innovations
Subscribers Don't Need, and I Still Don't know.
Once the concept of broadband Internet access came to be associated with data rates
incoming to the customer at 256 Kbit/s or more,[a] and alternatives like ADSL grew in
popularity, the consumer market for BRI did not develop. Its only remaining
advantage is that while ADSL has a functional distance limitation and can use ADSL
loop extenders, BRI has a greater limit and can use repeaters. As such, BRI may be
acceptable for customers who are too remote for ADSL. Widespread use of BRI is
further stymied by some small North American CLECs such as CenturyTel having
given up on it and not providing Internet access using it. [14] However, AT&T in most
states (especially the former SBC/SWB territory) will still install an ISDN BRI line
anywhere a normal analog line can be placed and the monthly charge is roughly $55.
ISDN-BRI is currently primarily used in industries with specialized and very specific
needs. High-end videoconferencing hardware made by companies such as Sony,
Polycom, Tandberg, and Life-size via the Life-size Networker[15] can bond up to 8 Bchannels together (using a BRI circuit for every 2 channels) to provide digital, circuitswitched video connections to almost anywhere in the world. This is very expensive,
and is being replaced by IP-based conferencing, but where concern cost is less of an
issue than predictable quality and where a QoS-enabled IP does not exist, BRI is the
preferred choice.
Most modern non-VoIP PBXs use ISDN-PRI circuits. These are connected via T1
lines with the central office switch, replacing older analog two-way and direct inward
dialing (DID) trunks. PRI is capable of delivering Calling Line Identification (CLID)
in both directions so that the telephone number of an extension, rather than a
company's main number, can be sent. It is still commonly used in recording studios,
when a voice-over actor is in one studio, but the director and producer are in a studio
at another location.[4] The ISDN protocol delivers channelized, not-over-the-Internet
service, powerful call setup and routing features, faster setup and tear down, superior
audio fidelity as compared to POTS (plain old telephone service), lower delay and, at
higher densities, lower cost.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
In 2013, Verizon announced it would no longer take orders for ISDN service in the
Northeastern United States.
India
Bharat Sanchar Nigam Limited, Reliance Communications and Bharti Airtel are the
largest communication service providers, and offer both ISDN BRI and PRI services
across the country. Reliance Communications and Bharti Airtel uses the DLC
technology for providing these services. With the introduction of broadband
technology, the load on bandwidth is being absorbed by ADSL. ISDN continues to be
an important backup network for point-to-point leased line customers such as banks,
Eseva Centers,[16]Life Insurance Corporation of India, and SBI ATMs.
Japan
On April 19, 1988, Japanese telecommunications company NTT began offering
nationwide ISDN services trademarked INS Net 64, and INS Net 1500, a fruition of
NTT's independent research and trial from the 1970s of what it referred to the INS
(Information Network System).
Previously, on April 1985, Japanese digital telephone exchange hardware made by
Fujitsu was used to experimentally deploy the world's first I interface ISDN. The I
interface, unlike the older and incompatible Y interface, is what modern ISDN
services use today.
Since 2000, NTT's ISDN offering have been known as FLET's ISDN, incorporating
the "FLET's" brand that NTT uses for all of its ISP offerings.
In Japan, the number of ISDN subscribers dwindled as alternative technologies such
as ADSL, cable Internet access, and fiber to the home gained greater popularity. On
November 2, 2010, NTT announced plans to migrate their backend from PSTN to the
IP network from around 2020 to around 2025. For this migration, ISDN services will
be retired, and fiber optic services are recommended as an alternative.
United Kingdom
In the United Kingdom, British Telecom (BT) provides ISDN2e (BRI) as well as
ISDN30 (PRI). Until April 2006, they also offered services named Home Highway
and Business Highway, which were BRI ISDN-based services that offered integrated
analogue connectivity as well as ISDN. Later versions of the Highway products also
included built-in Universal serial bus (USB) sockets for direct computer access. Home
Highway was bought by many home users, usually for Internet connection, although
not as fast as ADSL, because it was available before ADSL and in places where
ADSL does not reach.
France
France Telecom offers ISDN services under their product name Numeris (2 B+D), of
which a professional Duo and home Itoo version is available. ISDN is generally
known as RNIS in France and has widespread availability. The introduction of ADSL
www.Vidyarthiplus.com
www.Vidyarthiplus.com
is reducing ISDN used for data transfer and Internet access, although it is still
common in more rural and outlying areas, and for applications such as business voice
and point-of-sale terminals.
Germany
German stamp
In Germany, ISDN is very popular with an installed base of 25 million channels (29%
of all subscriber lines in Germany as of 2003 and 20% of all ISDN channels
worldwide). Due to the success of ISDN, the number of installed analog lines is
decreasing. Deutsche Telekom (DTAG) offers both BRI and PRI. Competing phone
companies often offer ISDN only and no analog lines. However, these operators
generally offer free hardware that also allows the use of POTS equipment, such as
NTBAs with integrated terminal adapters. Because of the widespread availability of
ADSL services, ISDN is today primarily used for voice and fax traffic, but is still very
popular thanks to the pricing policy of German telecommunication providers.
Today ISDN (BRI) and ADSL/VDSL are often bundled on the same line, mainly
because the combination of ADSL with an analog line has no cost advantage over a
combined ISDN-ADSL line. Some German operators started to implement Next
Generation Networking, generally realized via DSL and unbundled local loop.
However, a few operators offer the same services via the cable television
infrastructure or, in selected areas, via FTTH. Because of the popularity of ISDN,
virtually all these telecommunication providers bundle their products with residential
gateways that include both integrated analog telephony adapters and ISDN-NGN
adapters.
Greece
OTE, the incumbent telecommunications operator, offers ISDN BRI (BRA) services
in Greece. Following the launch of ADSL in 2003, the importance of ISDN for data
transfer began to decrease and is today limited to niche business applications with
point-to-point requirements.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
5. Describe in detail about MODEM?
A modem is a device or program that enables a computer to transmit data over, for
example, telephone or cable lines. Computer information is stored digitally, whereas
information transmitted over telephone lines is transmitted in the form of analog
waves. A modem converts between these two forms.
Fortunately, there is one standard interface for connecting external modems to
computers called RS-232. Consequently, any external modem can be attached to any
computer that has an RS-232 port, which almost all personal computers have. There
are also modems that come as an expansion board that you can insert into a vacant
expansion slot. These are sometimes called onboard or internal modems.
While the modem interfaces are standardized, a number of different protocols for
formatting data to be transmitted over telephone lines exist. Some, like CCITTV.34,
are official standards, while others have been developed by private companies. Most
modems have built-in support for the more common protocols -- at slow data
transmission speeds at least, most modems can communicate with each other. At high
transmission speeds, however, the protocols are less standardized.
Aside from the transmission protocols that they support, the following characteristics
distinguish one modem from another:
bps: How fast the modem can transmit and receive data. At slow rates, modems are
measured in terms of baud rates. The slowest rate is 300 baud (about 25 cps). At
higher speeds, modems are measured in terms of bits per second (bps). The fastest
modems run at 57,600 bps, although they can achieve even higher data transfer rates
by compressing the data. Obviously, the faster the transmission rate, the faster you
can send and receive data. Note, however, that you cannot receive data any faster than
it is being sent. If, for example, the device sending data to your computer is sending it
at 2,400 bps, you must receive it at 2,400 bps. It does not always pay, therefore, to
have a very fast modem. In addition, some telephone lines are unable to transmit data
reliably at very high rates.
Voice/data: Many modems support a switch to change between voice and data
modes. In data mode, the modem acts like a regular modem. In voice mode, the
modem acts like a regular telephone. Modems that support a voice/data switch have a
built-in loudspeaker and microphone for voice communication.
Auto-answer: An auto-answer modem enables your computer to receive calls in your
absence. This is only necessary if you are offering some type of computer service that
people can call in to use.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
data compression: Some modems perform data compression, which enables them to
send data at faster rates. However, the modem at the receiving end must be able to
decompress the data using the same compression technique.
Flash memory: Some modems come with flash memory rather than conventional
ROM, which means that the communications protocolscan be easily updated if
necessary.
Fax capability: Most modern modems are fax modems, which means that they can
send and receive faxes.
Acoustic coupler modem
A modem (modulator-demodulator) is a device that modulates an analog carrier
signal to encode digital information, and also demodulates such a carrier signal to
decode the transmitted information. The goal is to produce a signal that can be
transmitted easily and decoded to reproduce the original digital data. Modems can be
used with any means of transmitting analog signals, from light emitting diodes to
radio. The most familiar example is a voice band modem that turns the digital data of
a personal computer into modulated electrical signals in the voice frequency range of
a telephone channel. These signals can be transmitted over telephone lines and
demodulated by another modem at the receiver side to recover the digital data.
Modems are generally classified by the amount of data they can send in a given unit
of time, usually expressed in bits per second (bit/s, or bps), or bytes per second (B/s).
Modems can alternatively be classified by their symbol rate, measured in baud. The
baud unit denotes symbols per second, or the number of times per second the modem
sends a new signal. For example, the ITU V.21 standard used audio frequency shift
keying with two possible frequencies corresponding to two distinct symbols (or one
bit per symbol), to carry 300 bits per second using 300 baud. By contrast, the original
ITU V.22 standard, which could transmit and receive four distinct symbols (two bits
per symbol), handled 1,200 bit/s by sending 600 symbols per second (600 baud) using
phase shift keying.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Tele Guide terminal
News wire services in the 1920s used multiplex devices that satisfied the definition of
a modem. However the modem function was incidental to the multiplexing function,
so they are not commonly included in the history of modems.
Modems grew out of the need to connect teleprinters over ordinary phone lines
instead of the more expensive leased lines which had previously been used for current
loop–based tele printers and automated telegraphs. In 1942, IBM adapted this
technology to their unit record equipment and were able to transmit punched cards at
25 bits/second.[citation needed]
Mass-produced modems in the United States began as part of the SAGE air-defense
system in 1958 (the year the word modem was first used[1]), connecting terminals at
various airbases, radar sites, and command-and-control centers to the SAGE director
centers scattered around the U.S. and Canada. SAGE modems were described by
AT&T's Bell Labs as conforming to their newly published Bell 101 dataset standard.
While they ran on dedicated telephone lines, the devices at each end were no different
from commercial acoustically coupled Bell 101, 110 baud modems.
In summer 1960[citation needed], the name Data-Phone was introduced to replace the
earlier term digital subset. The 202 Data-Phone was a half-duplex asynchronous
service that was marketed extensively in late 1960.In 1962the 201A and 201B DataPhones were introduced. They were synchronous modems using two-bit-per-baud
phase-shift keying (PSK). The 201A operated half-duplex at 2,000 bit/s over normal
phone lines, while the 201B provided full duplex 2,400 bit/s service on four-wire
leased lines, the send and receive channels each running on their own set of two wires.
The famous Bell 103A dataset standard was also introduced by AT&T in 1962. It
provided full-duplex service at 300 bit/s over normal phone lines. Frequency-shift
keying was used, with the call originator transmitting at 1,070 or 1,270 Hz and the
answering modem transmitting at 2,025 or 2,225 Hz. The readily available 103A2
gave an important boost to the use of remote low-speed terminals such as the Teletype
Model 33 ASR and KSR, and the IBM 2741. AT&T reduced modem costs by
introducing the originate-only 113D and the answer-only 113B/C modems.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Acoustic couplers
The Novation CAT acoustically coupled modem
For many years, the Bell System (AT&T) maintained a monopoly on the use of its
phone lines, and what devices could be connected to its lines. However, the seminal
Hush-a-Phone v. FCC case of 1956 concluded that it was within the FCC's
jurisdiction to regulate the operation of the System. Subsequently, the FCC examiner
found that as long as the device was not electrically attached it would not threaten to
degenerate the system. This led to a number of devices that mechanically connected to
the phone, through a standard handset. Since most handsets were supplied from
Western Electric, it was relatively easy to build such an acoustic coupler, and this
style of connection was used for many devices like answering machines.
Acoustically coupled Bell 103A-compatible 300 bit/s modems became common
during the 1970s, with well-known models including the Novation CAT and the
Anderson-Jacobson, the later spun off from an in-house project at Stanford Research
Institute (now SRI International). An even lower-cost option was the Pennywhistle
modem, designed to be built using parts found at electronics scrap and surplus stores.
In December 1972, Vadic introduced the VA3400, which was notable because it
provided full duplex operation at 1,200 bit/s over the phone network. Like the 103A,
it used different frequency bands for transmit and receive. In November 1976, AT&T
introduced the 212A modem to compete with Vadic. It was similar in design to
Vadic's model, but used the lower frequency set for transmission. One could also use
the 212A with a 103A modem at 300 bit/s. According to Vadic, the change in
frequency assignments made the 212 intentionally incompatible with acoustic
coupling, thereby locking out many potential modem manufacturers. In 1977, Vadic
responded with the VA3467 triple modem, an answer-only modem sold to computer
center operators that supported Vadic's 1,200-bit/s mode, AT&T's 212A mode, and
103A operation.
Carterfone and direct connection
The Hush-a-Phone decision applied only to mechanical collections, but the Carterfone
decision of 1968 led to the FCC introducing a rule setting stringent AT&T-designed
tests for electronically coupling a device to the phone lines. AT&T's tests were
complex, making electronically coupled modems expensive, [citation needed] so
acoustically coupled modems remained common into the early 1980s.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
However, the rapidly falling prices of electronics in the late 1970s led to an increasing
number of direct-connect models around 1980. In spite of being directly connected,
these modems were generally operated like their earlier acoustic versions - dialling
and other phone-control operations were completed by hand, using an attached
handset. A small number of modems added the ability to automatically answer
incoming calls, or automatically place an outgoing call to a single number, but even
these limited features were relatively rare or limited to special models in a lineup.
When more flexible solutions were needed, 3rd party "diallers" were used to automate
calling, normally using a separate serial port.
The Smart modem and the rise of BBSs
The original model 300 baud Smartmodem
The next major advance in modems was the Hayes Smartmodem, introduced in 1981.
The Smartmodem was an otherwise standard 103A 300-bit/s modem, but it was
attached to a small microcontroller that let the computer send it commands. The
command set included instructions for picking up and hanging up the phone, dialing
numbers, and answering calls. This eliminated the need for any manual operation, a
handset, or a dialler. Terminal programs that maintained lists of phone numbers and
sent the dialing commands became common. The basic Hayes command set remains
the basis for computer control of most modern modems.
The Smartmodem and its clones also aided the spread of bulletin board systems
(BBSs) because it was the first low-cost modem that could answer calls. Modems had
previously been typically either the call-only, acoustically coupled models used on the
client side, or the much more expensive, answer-only models used on the server side.
These were fine for large computer installations, but useless for the hobbiest who
wanted to run a BBS but then periodically use the same telephone line to call other
systems. The first hobby BBS system, CBBS, started as an experiment in ways to
better use the Smartmodem.
Almost all modern modems can inter-operate with fax machines. Digital faxes,
introduced in the 1980s, are simply an image format sent over a high-speed
(commonly 14.4 kbit/s) modem. Software running on the host computer can convert
any image into fax format, which can then be sent using the modem. Such software
was at one time an add-on, but has since become largely universal.
1200 and 2400 bps
The 300 bit/s modems used audio frequency-shift keying to send data. In this system
the stream of 1s and 0s in computer data is translated into sounds which can be easily
sent on the phone lines. In the Bell 103 system, the originating modem sends 0s by
www.Vidyarthiplus.com
www.Vidyarthiplus.com
playing a 1,070 Hz tone, and 1s at 1,270 Hz, with the answering modem transmitting
its 0s on 2,025 Hz and 1s on 2,225 Hz. These frequencies were chosen carefully, they
are in the range that suffer minimum distortion on the phone system and not
harmonics of each other.
In the 1,200 bit/s and faster systems, phase-shift keying was used. In this system the
two tones for any one side of the connection are sent at similar frequencies as in the
300 bit/s systems, but slightly out of phase. Voice band modems generally remained
at 300 and 1,200 bit/s (V.21 and V.22) into the mid-1980s. A V.22bis 2,400-bit/s
system similar in concept to the 1,200-bit/s Bell 212 signaling was introduced in the
U.S., and a slightly different one in Europe. The limited available frequency range
meant the symbol rate of 1,200 bit/s modems was still only 600 baud (symbols per
second). The bit rate increases were achieved by defining 4 or 8 distinct symbols,
which allowed the encoding of 2 or 3 bits per symbol instead of only 1. The use of
smaller shifts had the drawback of making each symbols more vulnerable to
interference, but improvements in phone line quality at the same time helped
compensate for this. By the late 1980s, most modems could support all of these
standards and 2,400-bit/s operation was becoming common.
Proprietary standards
Many other standards were also introduced for special purposes, commonly using a
high-speed channel for receiving, and a lower-speed channel for sending. One typical
example was used in the French Minitel system, in which the user's terminals spent
the majority of their time receiving information. The modem in the Minitel terminal
thus operated at 1,200 bit/s for reception, and 75 bit/s for sending commands back to
the servers.
Three U.S. companies became famous for high-speed versions of the same concept.
Telebit introduced its Trailblazer modem in 1984, which used a large number of
36 bit/s channels to send data one-way at rates up to 18,432 bit/s. A single additional
channel in the reverse direction allowed the two modems to communicate how much
data was waiting at either end of the link, and the modems could change direction on
the fly. The Trailblazer modems also supported a feature that allowed them to spoof
the UUCPg protocol, commonly used on Unix systems to send e-mail, and thereby
speed UUCP up by a tremendous amount. Trailblazers thus became extremely
common on Unix systems, and maintained their dominance in this market well into
the 1990s.
USRobotics (USR) introduced a similar system, known as HST, although this
supplied only 9,600 bit/s (in early versions at least) and provided for a larger
backchannel. Rather than offer spoofing, USR instead created a large market among
Fidonet users by offering its modems to BBS sysops at a much lower price, resulting
in sales to end users who wanted faster file transfers. Hayes was forced to compete,
and introduced its own 9,600-bit/s standard, Express 96 (also known as Ping-Pong),
which was generally similar to Telebit's PEP. Hayes, however, offered neither
protocol spoofing nor sysop discounts, and its high-speed modems remained rare.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Echo cancellation, 9600 and 14,400
US Robotics Sportster 14,400 Fax modem (1994)
Echo cancellation was the next major advance in modem design.
Local telephone lines use the same wires to send and receive, which results in a small
amount of the outgoing signal being reflected back. This is useful for people talking
on the phone, as it provides a signal to the speaker that their voice is making it
through the system. However, this reflected signal causes problems for the modem,
which is unable to distinguish between a signal from the remote modem and the echo
of its own signal. This was why earlier modems split the signal frequencies into
"answer" and "originate"; the modem could then ignore any signals in the frequency
range it was using for transmission. Even with improvements to the phone system
allowing higher speeds, this splitting of available phone signal bandwidth still
imposed a half-speed limit on modems.
Echo cancellation eliminated this problem. Measuring the echo delays and magnitudes
allowed the modem to tell if the received signal was from itself or the remote modem,
and create an equal and opposite signal to cancel its own. Modems were then able to
send over the whole frequency spectrum in both directions at the same time, leading
to the development of 4,800 and 9,600 bit/s modems.
Increases in speed have used increasingly complicated communications theory.
Twelve hundred and 2,400 bit/s modems used the phase shift key (PSK) concept. This
could transmit two or three bits per symbol. The next major advance encoded four bits
into a combination of amplitude and phase, known as Quadrature Amplitude
Modulation (QAM).
The new V.27ter and V.32 standards were able to transmit 4 bits per symbol, at a rate
of 1,200 or 2,400 baud, giving an effective bit rate of 4,800 or 9,600 bit/s. The carrier
frequency was 1,650 Hz. For many years, most engineers considered this rate to be
the limit of data communications over telephone networks.
Error correction and compression
Operations at these speeds pushed the limits of the phone lines, resulting in high error
rates. This led to the introduction of error-correction systems built into the modems,
made most famous with Microcom's MNP systems. A string of MNP standards came
out in the 1980s, each increasing the effective data rate by minimizing overhead, from
www.Vidyarthiplus.com
www.Vidyarthiplus.com
about 75% theoretical maximum in MNP 1, to 95% in MNP 4. The new method
called MNP 5 added data compression to the system, thereby increasing overall
throughput above the modem's rating. Generally the user could expect an MNP5
modem to transfer at about 130% the normal data rate of the modem. Details of MNP
were later released and became popular on a series of 2,400-bit/s modems, and
ultimately led to the development of V.42 and V.42bis ITU standards. V.42 and
V.42bis were non-compatible with MNP but were similar in concept because they
featured error correction and compression.
Another common feature of these high-speed modems was the concept of fallback, or
speed hunting, allowing them to communicate with less-capable modems. During the
call initiation, the modem would transmit a series of signals and wait for the remote
modem to respond. They would start at high speeds and get progressively slower until
there was a response. Thus, two USR modems would be able to connect at 9,600 bit/s,
but, when a user with a 2,400-bit/s modem called in, the USR would fall back to the
common 2,400-bit/s speed. This would also happen if a V.32 modem and a HST
modem were connected. Because they used a different standard at 9,600 bit/s, they
would fall back to their highest commonly supported standard at 2,400 bit/s. The same
applies to V.32bis and 14,400 bit/s HST modem, which would still be able to
communicate with each other at 2,400 bit/s.
Breaking the 9.6k barrier
In 1980, Gottfried Ungerboeck from IBM Zurich Research Laboratory applied
channel coding techniques to search for new ways to increase the speed of modems.
His results were astonishing but only conveyed to a few colleagues.[2] In 1982, he
agreed to publish what is now a landmark paper in the theory of information
coding.[citation needed] By applying parity check coding to the bits in each symbol, and
mapping the encoded bits into a two-dimensional diamond pattern, Ungerboeck
showed that it was possible to increase the speed by a factor of two with the same
error rate. The new technique was called mapping by set partitions, now known as
trellis modulation.
Error correcting codes, which encode code words (sets of bits) in such a way that they
are far from each other, so that in case of error they are still closest to the original
word (and not confused with another) can be thought of as analogous to sphere
packing or packing pennies on a surface: the further two bit sequences are from one
another, the easier it is to correct minor errors.
V.32bis was so successful that the older high-speed standards had little to recommend
them. USR fought back with a 16,800 bit/s version of HST, while AT&T introduced a
one-off 19,200 bit/s method they referred to as V.32ter, but neither non-standard
modem sold well.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
V.34/28.8k and 33.6k
An ISA modem manufactured to conform to the V.34 protocol.
Any interest in these systems was destroyed during the lengthy introduction of the
28,800 bit/s V.34 standard. While waiting, several companies decided to release
hardware and introduced modems they referred to as V.FAST. In order to guarantee
compatibility with V.34 modems once the standard was ratified (1994), the
manufacturers were forced to use more flexible parts, generally a DSP and
microcontroller, as opposed to purpose-designed ASIC modem chips.
Today, the ITU standard V.34 represents the culmination of the joint efforts. It
employs the most powerful coding techniques including channel encoding and shape
encoding. From the mere 4 bits per symbol (9.6 kbit/s), the new standards used the
functional equivalent of 6 to 10 bits per symbol, plus increasing baud rates from 2,400
to 3,429, to create 14.4, 28.8, and 33.6 kbit/s modems. This rate is near the theoretical
Shannon limit. When calculated, the Shannon capacity of a narrowband line is
, with
the (linear) signal-to-noise ratio.
Narrowband phone lines have a bandwidth of 3000 Hz so using
(SNR = 24 dB), the capacity is approximately 24 kbit/s.
Without the discovery and eventual application of trellis modulation, maximum
telephone rates using voice-bandwidth channels would have been limited to
3,429 baud × 4 bit/symbol = approximately 14 kbit/s using traditional QAM.
V.61/V.70 Analog/Digital Simultaneous Voice and Data
The V.61 Standard introduced Analog Simultaneous Voice and Data (ASVD). This
technology allowed users of v.61 modems to engage in point-to-point voice
conversations with each other while their respective modems communicated.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
In 1995, the first DSVD (Digital Simultaneous Voice and Data) modems became
available to consumers, and the standard was ratified as v.70 by the International
Telecommunication Union (ITU) in 1996.
Two DSVD modems can establish a completely digital link between each other over
standard phone lines. Sometimes referred to as "the poor man's ISDN", and
employing a similar technology, v.70 compatible modems allow for a maximum
speed of 33.6 kbit/s between peers. By using a majority of the bandwidth for data and
reserving part for voice transmission, DSVD modems allow users to pick up a
telephone handset interfaced with the modem, and initiate a call to the other peer.
One practical use for this technology was realized by early two-player video gamers,
who could hold voice communication with each other over the phone while playing.
Using digital lines and PCM (V.90/92)
Modem bank at an ISP
In the late 1990s Rockwell/Lucent and USRoboticsintroduced new competing
technologies based upon the digital transmission used in modern telephony networks.
The standard digital transmission in modern networks is 64 kbit/s but some networks
use a part of the bandwidth for remote office signaling (e.g. to hang up the phone),
limiting the effective rate to 56 kbit/s DS0. This new technology was adopted into
ITU standards V.90 and is common in modern computers. The 56 kbit/s rate is only
possible from the central office to the user site (downlink). In the United States,
government regulation limits the maximum power output, resulting in a maximum
data rate of 53.3 kbit/s. The uplink (from the user to the central office) still uses V.34
technology at 33.6 kbit/s.
Later in V.92, the digital PCM technique was applied to increase the upload speed to a
maximum of 48 kbit/s, but at the expense of download rates. A 48 kbit/s upstream rate
would reduce the downstream as low as 40 kbit/s due to echo on the telephone line.
To avoid this problem, V.92 modems offer the option to turn off the digital upstream
and instead use a 33.6 kbit/s analog connection, in order to maintain a high digital
downstream of 50 kbit/s or higher.[4] V.92 also adds two other features. The first is the
ability for users who have call waiting to put their dial-up Internet connection on hold
for extended periods[vague] of time while they answer a call. The second feature is the
www.Vidyarthiplus.com
www.Vidyarthiplus.com
ability to quickly connect to one's ISP. This is achieved by remembering the analog
and digital characteristics of the telephone line, and using this saved information when
reconnecting.
Using compression to exceed 56k
Today's V.42, V.42bis and V.44 standards allow the modem to transmit data faster
than its basic rate would imply. For instance, a 53.3 kbit/s connection with V.44 can
transmit up to 53.3*6 == 320 kbit/s using pure text. However, the compression ratio
tends to vary due to noise on the line, or due to the transfer of already-compressed
files (ZIP files, JPEG images, MP3 audio, MPEG video). [5] At some points the
modem will be sending compressed files at approximately 50 kbit/s, uncompressed
files at 160 kbit/s, and pure text at 320 kbit/s, or any value in between.
In such situations a small amount of memory in the modem, a buffer, is used to hold
the data while it is being compressed and sent across the phone line, but in order to
prevent overflow of the buffer, it sometimes becomes necessary to tell the computer
to pause the datastream. This is accomplished through hardware flow control using
extra lines on the modem–computer connection. The computer is then set to supply
the modem at some higher rate, such as 320 kbit/s, and the modem will tell the
computer when to start or stop sending data.
Compression by the ISP
This section does not cite any references or sources. Please help improve this
section by adding citations to reliable sources. Unsourced material may be challenged
and removed. (March 2013)
As telephone-based 56k modems began losing popularity, some Internet service
providers such as Netzero/Juno, Netscape, and others started using pre-compression to
increase the throughput and maintain their customer base. The server-side
compression operates much more efficiently than the on-the-fly compression done by
modems due to the fact these compression techniques are application-specific (JPEG,
text, EXE, etc.). The website text, images, and Flash executables are compacted to
approximately 4%, 12%, and 30%, respectively. The drawback of this approach is a
loss in quality, which causes image content to become pixelated and smeared. ISPs
employing this approach often advertise it as "accelerated dial-up."
These accelerated downloads are now integrated into the Opera and Amazon Silk web
browsers, using their own server-side text and image compression.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Softmodem
A PCI Winmodem/softmodem (on the left) next to a traditional ISA modem (on
the right).
A Winmodem or softmodem is a stripped-down modem that replaces tasks
traditionally handled in hardware with software. In this case the modem is a simple
interface designed to act as a digital-to-analog and an analog-to-digital converter.
Softmodems are cheaper than traditional modems because they have fewer hardware
components. However, the software generating and interpreting the modem tones to
be sent to the softmodem uses many system resources. For online gaming, this can be
a real concern. Another problem is the lack of cross-platform compatibility, meaning
that non-Windows operating systems (such as Linux) often do not have an equivalent
driver to operate the modem.
List of dialup speeds
These values are maximum values, and actual values may be slower under certain
conditions (for example, noisy phone lines). [7] For a complete list see the companion
article list of device bandwidths. A baud is one symbol per second; each symbol may
encode one or more data bits.
FSK
Bitrate
[kbit/s]
0.1
Year
Released
1958
FSK
0.3
1962
FSK
1.2
QPSK
1.2
1980[8][9]
QAM
2.4
1984 [8]
PSK
2.4
PSK
4.8
[10]
QAM
9.6
1984 [8]
Connection
Modulation
110 baudBell 101 modem
300 baud (Bell 103 or
V.21)
1200 modem (1200 baud)
(Bell 202)
1200 Modem (600 baud)
(Bell 212A or V.22)
2400 Modem (600 baud)
(V.22bis)
2400 Modem (1200 baud)
(V.26bis)
4800 Modem (1600 baud)
(V.27ter)
9600 Modem (2400 baud)
www.Vidyarthiplus.com
www.Vidyarthiplus.com
(V.32)
14.4k Modem (2400
baud) (V.32bis)
28.8k Modem (3200
baud) (V.34)
33.6k Modem (3429
baud) (V.34)
56k Modem (8000/3429
baud) (V.90)
56k Modem (8000/8000
baud) (V.92)
Bonding modem (two 56k
modems) (V.92)[12]
Hardware
compression
(variable) (V.90/V.42bis)
Hardware
compression
(variable) (V.92/V.44)
Server-side
web
compression
(variable)
(Netscape ISP)
trellis
14.4
1991 [8]
trellis
28.8
1994 [8]
trellis
33.6
1996 [11]
digital
56.0/33.6
1998 [8]
digital
56.0/48.0
2000 [8]
112.0/96.0
56.0–220.0
56.0–320.0
100.0–
1,000.0
Radio modems
Direct broadcast satellite, WiFi, and mobile phones all use modems to communicate,
as do most other wireless services today. Modern telecommunications and data
networks also make extensive use of radio modems where long distance data links are
required. Such systems are an important part of the PSTN, and are also in common
use for high-speed computer network links to outlying areas where fibre is not
economical.
Even where a cable is installed, it is often possible to get better performance or make
other parts of the system simpler by using radio frequencies and modulation
techniques through a cable. Coaxial cable has a very large bandwidth, however signal
attenuation becomes a major problem at high data rates if a baseband digital signal is
used. By using a modem, a much larger amount of digital data can be transmitted
through a single wire. Digital cable television and cable Internet services use radio
frequency modems to provide the increasing bandwidth needs of modern households.
Using a modem also allows for frequency-division multiple access to be used, making
full-duplex digital communication with many users possible using a single wire.
Wireless modems come in a variety of types, bandwidths, and speeds. Wireless
modems are often referred to as transparent or smart. They transmit information that
is modulated onto a carrier frequency to allow many simultaneous wireless
communication links to work simultaneously on different frequencies.
Transparent modems operate in a manner similar to their phone line modem cousins.
Typically, they were half duplex, meaning that they could not send and receive data at
the same time. Typically transparent modems are polled in a round robin manner to
www.Vidyarthiplus.com
www.Vidyarthiplus.com
collect small amounts of data from scattered locations that do not have easy access to
wired infrastructure. Transparent modems are most commonly used by utility
companies for data collection.
Smart modems come with media access controllers inside, which prevents random
data from colliding and resends data that is not correctly received. Smart modems
typically require more bandwidth than transparent modems, and typically achieve
higher data rates. The IEEE 802.11 standard defines a short range modulation scheme
that is used on a large scale throughout the world.
WiFi and WiMax
Wireless data modems are used in the WiFi and WiMax standards, operating at
microwave frequencies.
Mobile broadband modems
HuaweiCDMA2000Evolution-Data Optimized USB wireless modem
Modems which use a mobile telephone system (GPRS, UMTS, HSPA, EVDO, WiMax, etc.), are known as mobile broadband modems (sometimes also called wireless
modems). Wireless modems can be embedded inside a laptop or appliance, or be
external to it. External wireless modems are connect cards, USB modems for mobile
broadband and cellular routers. A connect card is a PC card or Express Card which
slides into a PCMCIA/PC card/Express Card slot on a computer. USB wireless
modems use a USB port on the laptop instead of a PC card or Express Card slot. A
USB modem used for mobile broadband Internet is also sometimes referred to as a
dongle.[13] A cellular router may have an external data card (Air Card) that slides into
it. Most cellular routers do allow such data cards or USB modems. Cellular routers
may not be modems by definition, but they contain modems or allow modems to be
slid into them. The difference between a cellular router and a wireless modem is that a
cellular router normally allows multiple people to connect to it (since it can route data
or support multipoint to multipoint connections), while a modem is designed for one
connection.
Most of GSM wireless modems come with an integrated SIM cardholder (i.e., Huawei
E220, Sierra 881, etc.) and some models are also provided with a microSD memory
slot and/or jack for additional external antenna such as Huawei E1762 and Sierra
Wireless Compass 885.[14][15] The CDMA (EVDO) versions do not use R-UIM cards,
but use Electronic Serial Number (ESN) instead.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
The cost of using a wireless modem varies from country to country. Some carriers
implement flat rate plans for unlimited data transfers. Some have caps (or maximum
limits) on the amount of data that can be transferred per month. Other countries have
plans that charge a fixed rate per data transferred—per megabyte or even kilobyte of
data downloaded; this tends to add up quickly in today's content-filled world, which is
why many people[who?] are pushing for flat data rates.
The faster data rates of the newest wireless modem technologies (UMTS, HSPA,
EVDO, WiMax) are also considered to be broadband wireless modems and compete
with other broadband modems below.
Until the end of April 2011, worldwide shipments of USB modems surpassed
embedded 3G and 4G modules by 3:1 because USB modems can be easily discarded,
but embedded modems could start to gain popularity as tablet sales grow and as the
incremental cost of the modems shrinks, so by 2016 the ratio may change to 1:1. [16]
Like mobile phones, mobile broadband modems can be SIM locked to a particular
network provider. Unlocking a modem is achieved the same way as unlocking a
phone, by using an 'unlock code'[17]
Broadband
DSL modem
ADSL (asymmetric digital subscriber line) modems, a more recent development, are
not limited to the telephone's voice band audio frequencies. Some ADSL modems use
coded orthogonal frequency division modulation (DMT, for Discrete Multi Tone; also
called COFDM, for digital TV in much of the world).
DSL modems utilize a property that standard twisted-pair telephone cable can be used
for short distances to carry much higher frequency signals than what the cable is
actually rated to handle. This is also why DSL modems have a distance limitation.
Standard voice and slower 56 kilobit modem communications are possible over many
kilometers of cable, but the higher frequencies used by DSL are attenuated and DSL's
maximum performance gradually declines as the cable length increases.
Cable modems use a range of frequencies originally intended to carry RF television
channels, and can coexist on the same single cable alongside standard RF channel
www.Vidyarthiplus.com
www.Vidyarthiplus.com
signals. Multiple cable modems attached to a single cable can use the same frequency
band, using a low-level media access protocol to allow them to work together within
the same channel. Typically, uplink and downlink signals are kept separate using
frequency division multiple access.
For a single-cable distribution system, the return signals from customers require
special bidirectional amplifiers or reverse path amplifiers that can send specific
customer frequency bands upstream to the cable plant amongst the other downstream
frequency bands.
New types of broadband modems are beginning to appear, such as double way
satellite and power line modems.
Broadband modems should still be classified as modems, since they use complex
waveforms to carry digital data. They are more advanced devices than traditional dialup modems as they are either capable of modulating/demodulating hundreds of
channels simultaneously and/or are capable of using much wider channels than dialup modems.
Many broadband modems include the functions of a router, such as Ethernet and
WiFi, and other features such as DHCP, NAT and firewalls.
When broadband technology was introduced, networking and routers were unfamiliar
to consumers. However, many people knew what a modem was because Internet
access was still commonly done through dial-up. Due to this familiarity, companies
started selling broadband modems using the familiar term "modem", rather than
vaguer ones such as "adapter," "transceiver," or "bridge."
Bridged mode
DSL modems without internal routing use what is known as bridge mode to connect
to an upstream router device. DSL modems with built-in routing can also sometimes
be set to bridged mode to disable the internal built-in router in order to use an
upstream router instead, such as for Multiple-WAN load balancing, Multilink PPP, or
to replace the built-in router with an external device with more capabilities.
In bridged mode, although Ethernet cabling is used to connect the modem to the
upstream router, Internet Protocol is not used for communication between the devices.
Instead the Ethernet cable is treated as a high speed serial Asynchronous Transfer
Mode data connection according to RFC 1483. Multiple bridged DSL modems can all
have the same configuration IP address without conflict or error, since the address is
not used.
The upstream router is expected to use Point-to-point protocol over Ethernet (PPPoE)
or Multilink PPP in order to establish a connection on the DSL phone line.
The static IP address assigned to the bridged DSL modem is only used when the
modem is plugged into a client computer for directly configuring the modem,
typically through a web interface.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Home networking
Although the name modem is seldom used in this case, modems are also used for
high-speed home networking applications, especially those using existing home
wiring. One example is the G.hn standard, developed by ITU-T, which provides a
high-speed (up to 1 Gbit/s) Local area network using existing home wiring (power
lines, phone lines and coaxial cables). G.hn devices use orthogonal frequency-division
multiplexing (OFDM) to modulate a digital signal for transmission over the wire.
The phrase "null modem" was used to describe attaching a specially wired cable
between the serial ports of two personal computers. Basically, the transmit output of
one computer was wired to the receive input of the other; this was true for both
computers. The same software used with modems (such as ProComm or Mincom)
could be used with the null modem connection.
Deep-space communications
Many modern modems have their origin in space telecommunications from the 1960s.
Differences between deep space telecom modems and landline modems include:
Digital modulation formats that have high Doppler immunity are typically used.
Waveform complexity tends to be low—typically binary phase shift keying.
Error correction varies mission to mission, but is typically much stronger than most
landline modems.
Voice modem
Voice modems are regular modems that are capable of recording or playing audio
over the telephone line. They are used for telephony applications. See Voice modem
command set for more details on voice modems. This type of modem can be used as
an FXO card for Private branch exchange systems (compare V.92).
6. Explain the ISO/OSI reference model?
The Open Systems Interconnection (OSI) model (ISO/IEC 7498-1) is a conceptual
model that characterizes and standardizes the internal functions of a communication
system by partitioning it into abstraction layers. The model is a product of the Open
Systems Interconnection project at the International Organization for Standardization
(ISO).
The model group’s similar communication functions into one of seven logical layers.
A layer serves the layer above it and is served by the layer below it. For example, a
layer that provides error-free communications across a network provides the path
needed by applications above it, while it calls the next lower layer to send and receive
packets that make up the contents of that path. Two instances at one layer are
connected by a horizontal connection on that layer.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
OSI Model
Communication in the OSI-Model (example with layers 3 to 5)
History
Work on a layered model of network architecture was started and the International
Organization for Standardization (ISO) began to develop its OSI framework
architecture. OSI had two major components: an abstract model of networking, called
the Basic Reference Model or seven-layer model, and a set of specific protocols.
The concept of a seven-layer model was provided by the work of Charles Bachman,
Honeywell Information Services. Various aspects of OSI design evolved from
experiences with the ARPANET, the fledgling Internet, NPLNET, EIN, CYCLADES
network and the work in IFIP WG6.1. The new design was documented in ISO 7498
and its various addenda. In this model, a networking system was divided into layers.
Within each layer, one or more entities implement its functionality. Each entity
interacted directly only with the layer immediately beneath it, and provided facilities
for use by the layer above it.
Protocols enabled an entity in one host to interact with a corresponding entity at the
same layer in another host. Service definitions abstractly described the functionality
provided to an (N)-layer by an (N-1) layer, where N was one of the seven layers of
protocols operating in the local host.
The OSI standards documents are available from the ITU-T as the X.200-series of
recommendations.[1] Some of the protocol specifications were also available as part of
the ITU-T X series. The equivalent ISO and ISO/IEC standards for the OSI model
were available from ISO, but only some of them without fees. [2]
Description of OSI layers
According to recommendation X.200, there are seven layers, labeled 1 to 7, with layer
1 at the bottom. Each layer is generically known as an N layer. An "N+1 entity" (at
layer N+1) requests services from an "N entity" (at layer N).
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Data
unit
Layer
Function
7. Application
Network process to application
6. Presentation
Data representation, encryption and
decryption, convert machine
dependent data to machine
independent data
5. Session
Interhost communication, managing
sessions between applications
4. Transport
Reliable delivery of packets
between points on a network.
Packet/
Datagra
m
3. Network
Addressing, routing and (not
necessarily reliable) delivery of
datagram’s between points on a
network.
Bit
2. Data link
A reliable direct point-to-point data
connection.
Bit
1. Physical
A (not necessarily) reliable direct
point-to-point data connection.
Data
Host
layers
Segmen
ts
Media
layers
At each level, two entities (N-entity peers) interact by means of the N protocol by
transmitting protocol data units (PDU).
A service data unit (SDU) is a specific unit of data that has been passed down from an
OSI layer to a lower layer, and which the lower layer has not yet encapsulated into a
protocol data unit (PDU). An SDU is a set of data that is sent by a user of the services
of a given layer, and is transmitted semantically unchanged to a peer service user.
The PDU at a layer N is the SDU of layer N-1. In effect the SDU is the 'payload' of a
given PDU. That is, the process of changing an SDU to a PDU, consists of an
encapsulation process, performed by the lower layer. All the data contained in the
SDU becomes encapsulated within the PDU. The layer N-1 adds headers or footers, or
both, to the SDU, transforming it into a PDU of layer N-1. The added headers or
footers are part of the process used to make it possible to get data from a source to a
destination.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Some orthogonal aspects, such as management and security, involve every layer.
Security services are not related to a specific layer: they can be related by a number of
layers, as defined by ITU-T X.800 Recommendation.[3]
These services are aimed to improve the CIA triad (confidentiality, integrity, and
availability) of transmitted data. In practice, the availability of communication service
is determined by the interaction between network design and network management
protocols. Appropriate choices for both of these are needed to protect against denial of
service.[citation needed]
Layer 1: physical layer
The physical layer has the following major functions:
It defines the electrical and physical specifications of the data connection. It defines
the relationship between a device and a physical transmission medium (e.g. a copper
or fiber optical cable). This includes the layout of pins, voltages, line impedance,
cable specifications, signal timing, hubs, repeaters, network adapters, host bus
adapters (HBA used in storage area networks) and more.
It defines the protocol to establish and terminate a connection between two directly
connected nodes over a communications medium.
It may define the protocol for flow control.
It defines a protocol for the provision of a (not necessarily reliable) connection
between two directly connected nodes, and the Modulation or conversion between the
representation of digital data in user equipment and the corresponding signals
www.Vidyarthiplus.com
www.Vidyarthiplus.com
transmitted over the physical communications channel. This channel can involve
physical cabling (such as copper and optical fiber) or a wireless radio link.
The physical layer of Parallel SCSI operates in this layer, as do the physical layers of
Ethernet and other local-area networks, such as token ring, FDDI, ITU-TG.hn, and
IEEE 802.11, as well as personal area networks such as Bluetooth and IEEE 802.15.4.
Layer 2: data link layer
The data link layer provides a reliable link between two directly connected nodes, by
detecting and possibly correcting errors that may occur in the physical layer.
An example, in the TCP/IP protocol stack, of a data link layer is the Point-to-Point
Protocol (PPP).
The ITU-TG.hn standard, which provides high-speed local area networking over
existing wires (power lines, phone lines and coaxial cables), includes a complete data
link layer which provides both error correction and flow control by means of a
selective repeat Sliding Window Protocol.
Layer 3: network layer
The network layer provides the functional and procedural means of transferring
variable length data sequences (called data grams) from one node to another
connected to the same network. A network is a medium to which many nodes can be
connected, on which every node has an address and which permits nodes connected to
it to transfer messages to other nodes connected to it by merely providing the content
of a message and the address of the destination node and letting the network find the
way to deliver ("route") the message to the destination node. In addition to message
routing, the network may (or may not) implement message delivery by splitting the
message into several fragments, delivering each fragment by a separate route and
reassembling the fragments, report delivery errors, etc.
Datagram delivery at the network layer is not guaranteed to be reliable.
Examples of network layers in the usual Internet protocol stack are the Ethernet
(MAC) layer, the IP layer, and the UDP layer. The IP layer is an example of a
network layer often implemented on top of another network layer (MAC) rather than a
data link layer, as is UDP, which is a network layer implemented over IP, another
network layer. In the original design of the Internet, the network layer on top of which
the Internet was built was often called the "network layer" to distinguish it from the
Internet / IP "inter-network" network layer, which was built on top of it. Both the
network and the internetwork layers fit into the network layer in the OSI model.
A number of layer-management protocols, a function defined in the Management
Annex, ISO 7498/4, belong to the network layer. These include routing protocols,
multicast group management, network-layer information and error, and network-layer
address assignment. It is the function of the payload that makes these belong to the
network layer, not the protocol that carries them.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Layer 4: transport layer
The transport layer provides the reliable sending of data packets between nodes (with
addresses) located on a network, providing reliable data transfer services to the upper
layers.
An example of a transport layer protocol in the standard Internet protocol stack is
TCP, usually built on top of the IP protocol.
The transport layer controls the reliability of a given link through flow control,
segmentation/desegmentation, and error control. Some protocols are state- and
connection-oriented. This means that the transport layer can keep track of the
segments and retransmit those that fail. The transport layer also provides the
acknowledgement of the successful data transmission and sends the next data if no
errors occurred.
OSI defines five classes of connection-mode transport protocols ranging from class 0
(which is also known as TP0 and provides the least features) to class 4 (TP4, designed
for less reliable networks, similar to the Internet). Class 0 contains no error recovery,
and was designed for use on network layers that provide error-free connections. Class
4 is closest to TCP, although TCP contains functions, such as the graceful close,
which OSI assigns to the session layer. Also, all OSI TP connection-mode protocol
classes provide expedited data and preservation of record boundaries. Detailed
characteristics of TP0-4 classes are shown in the following table:[4]
Feature Name
Connection oriented network
Connectionless network
Concatenation and separation
Segmentation and reassembly
Error Recovery
Reinitiate connection (if an
excessive number of PDUs are
unacknowledged)
Multiplexing and demultiplexing
over a single virtual circuit
Explicit flow control
Retransmission on timeout
Reliable Transport Service
TP0
Yes
No
No
Yes
No
TP1
Yes
No
Yes
Yes
Yes
TP2
Yes
No
Yes
Yes
Yes
TP3
Yes
No
Yes
Yes
Yes
TP4
Yes
Yes
Yes
Yes
Yes
No
Yes
No
Yes
No
No
No
Yes
Yes
Yes
No
No
No
No
No
Yes
Yes
No
No
Yes
No
Yes
Yes
Yes
Yes
An easy way to visualize the transport layer is to compare it with a Post Office, which
deals with the dispatch and classification of mail and parcels sent. Do remember,
however, that a post office manages the outer envelope of mail. Higher layers may
www.Vidyarthiplus.com
www.Vidyarthiplus.com
have the equivalent of double envelopes, such as cryptographic presentation services
that can be read by the addressee only. Roughly speaking, tunneling protocols operate
at the transport layer, such as carrying non-IP protocols such as IBM's SNA or
Novell's IPX over an IP network, or end-to-end encryption with IPSec. While Generic
Routing Encapsulation (GRE) might seem to be a network-layer protocol, if the
encapsulation of the payload takes place only at endpoint, GRE becomes closer to a
transport protocol that uses IP headers but contains complete frames or packets to
deliver to an endpoint. L2TP carries PPP frames inside transport packet.
Although not developed under the OSI Reference Model and not strictly conforming
to the OSI definition of the transport layer, the Transmission Control Protocol (TCP)
and the User Datagram Protocol (UDP) of the Internet Protocol Suite are commonly
categorized as layer-4 protocols within OSI.
Layer 5: session layer
The session layer controls the dialogues (connections) between computers. It
establishes, manages and terminates the connections between the local and remote
application. It provides for full-duplex, half-duplex, or simplex operation, and
establishes check pointing, adjournment, termination, and restart procedures. The OSI
model made this layer responsible for graceful close of sessions, which is a property
of the Transmission Control Protocol, and also for session check pointing and
recovery, which is not usually used in the Internet Protocol Suite. The session layer is
commonly implemented explicitly in application environments that use remote
procedure calls.
Layer 6: presentation layer
The presentation layer establishes context between application-layer entities, in which
the higher-layer entities may use different syntax and semantics if the presentation
service provides a mapping between them. If a mapping is available, presentation
service data units are encapsulated into session protocol data units, and passed down
the stack.
This layer provides independence from data representation (e.g., encryption) by
translating between application and network formats. The presentation layer
transforms data into the form that the application accepts. This layer formats and
encrypts data to be sent across a network. It is sometimes called the syntax layer. [5]
The original presentation structure used the Basic Encoding Rules of Abstract Syntax
Notation One (ASN.1), with capabilities such as converting an EBCDIC-coded text
file to an ASCII-coded file, or serialization of objects and other data structures from
and to XML.
Layer 7: application layer
The application layer is the OSI layer closest to the end user, which means that both
the OSI application layer and the user interact directly with the software application.
This layer interacts with software applications that implement a communicating
component. Such application programs fall outside the scope of the OSI model.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Application-layer functions typically include identifying communication partners,
determining resource availability, and synchronizing communication. When
identifying communication partners, the application layer determines the identity and
availability of communication partners for an application with data to transmit. When
determining resource availability, the application layer must decide whether sufficient
network or the requested communication exists. In synchronizing communication, all
communication between applications requires cooperation that is managed by the
application layer. Some examples of application-layer implementations also include:
o
o
o
o
o
o
o
On OSI stack:
FTAM File Transfer and Access Management Protocol
X.400 Mail
Common Management Information Protocol (CMIP)
On TCP/IP stack:
Hypertext Transfer Protocol (HTTP),
File Transfer Protocol (FTP),
Simple Mail Transfer Protocol (SMTP)
Simple Network Management Protocol (SNMP).
Non-Linear Layering
It is not always the case that layer (N+1) is implemented on top of layer N of the OSI
stack.
For example, PPPoE implements PPP, a link layer protocol, on top of Ethernet, a
network layer protocol. Similarly, Modem used on top of a data link provided by a
v.42bis capable modem is providing a data link layer protocol on top of another data
link layer. Modem used within a telnet or ssh connection operating over the Internet,
provides a data link layer protocol on top of an application layer. The IP and ICMP
protocols implemented over Ethernet implement a network layer protocol over
another network layer, as does UDP implemented over IP.
Cross-layer functions
There are some functions or services that are not tied to a given layer, but they can
affect more than one layer. Examples include the following:
Security service (telecommunication) as defined by ITU-T X.800 Recommendation.
management functions, i.e. functions that permit to configure, instantiate, monitor,
terminate the communications of two or more entities: there is a specific application
layer protocol, common management information protocol (CMIP) and its
corresponding service, common management information service (CMIS), they need
to interact with every layer in order to deal with their instances.
Multiprotocol Label Switching (MPLS) operates at an OSI-model layer that is
generally considered to lie between traditional definitions of layer 2 (data link layer)
and layer 3 (network layer), and thus is often referred to as a "layer-2.5" protocol. It
was designed to provide a unified data-carrying service for both circuit-based clients
www.Vidyarthiplus.com
www.Vidyarthiplus.com
and packet-switching clients which provide a datagram-based service model. It can be
used to carry many different kinds of traffic, including IP packets, as well as native
ATM, SONET, and Ethernet frames.
ARP is used to translate IPv4 addresses (OSI layer 3) into Ethernet MAC addresses
(OSI layer 2).
Interfaces
Neither the OSI Reference Model nor OSI protocols specify any programming
interfaces, other than as deliberately abstract service specifications. Protocol
specifications precisely define the interfaces between different computers, but the
software interfaces inside computers, known as network sockets are implementationspecific.
For example Microsoft Windows' Winsock, and Unix's Berkeley sockets and System
V transport Layer Interface, are interfaces between applications (layer 5 and above)
and the transport (layer 4). NDIS and ODI are interfaces between the media (layer 2)
and the network protocol (layer 3).
www.Vidyarthiplus.com
www.Vidyarthiplus.com
V UNIT 2 MARKS
1. Define satellite.
Satellite is a celestial body that orbits around a planet. In aerospace terms,
A satellite is a space vehicle launched by humans and orbits earth or another
Celestial body.
2. State Kepler‘s first law.
Kepler‘s first law states that a satellite will orbit a primary body following
an elliptical path.
3. State Kepler‘s second law.
Kepler‘s second law states that for equal time intervals of time a satellite
will sweep out equal areas in the orbital plane, focused at the barycentre.
4. State Kepler‘s third law.
The third law states that the square of the periodic time of orbit is
proportional to the cube of the mean distance between the primary and the
satellite.
5. Define orbital satellite.
Orbital satellites are also called as nonsynchronous
Satellite. Nonsynchronous satellites rotate around earth in an elliptical or
Circular pattern. In a circular orbit, the speed or rotation is constant however in
Elliptical orbits the speed depends on the height the satellite is above the earth.
6. Define Azimuth angle.
Azimuth is the horizontal angular distance from a reference direction,
either the southern or northern most point of the horizon.
7. Define retrograde orbit.
If the satellite is orbiting in the opposite direction as the earth‘s rotation or
in the same direction with an angular velocity less than that of earth, the orbit is
Called a retrograde orbit.
8. Define Geo synchronous satellite.
Geo synchronous or geo stationary satellites are those that orbit in a
circular pattern with an angular velocity equal to that of Erath. Geosynchronous
satellites have an orbital time of approximately 24 hours, the same as earth; thus
geosynchronous satellites appear to be stationary as they remain in a fixed
position in respect to a given point on earth.
9. Define apogee and perigee.
The point in an orbit which is located farthest from the earth is called
apogee.
The point in an orbit which is located closest to earth is called perigee.
10. Define angle of inclination.
The angle of inclination is the angle between the earth‘s equatorial plane
and the orbital plane of a satellite measured counter clockwise at the point in the
orbit where it crosses the equatorial plane travelling from south to north.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
V UNIT 16 MARKS
1.
Give a brief discussion about Cellular network?
Top of a cellular radio tower
A cellular network or mobile network is a radio network distributed over land areas called
cells, each served by at least one fixed-location transceiver, known as a cell site or base
station. In a cellular network, each cell uses a different set of frequencies from neighboring
cells, to avoid interference and provide guaranteed bandwidth within each cell.
When joined together these cells provide radio coverage over a wide geographic area. This
enables a large number of portable transceivers (e.g., mobile phones, pagers, etc.) to
communicate with each other and with fixed transceivers and telephones anywhere in the
network, via base stations, even if some of the transceivers are moving through more than
one cell during transmission.
Cellular networks offer a number of advantages over alternative solutions:
flexible enough to use the features and functions of almost all public and private
networks
increased capacity
reduced power use
larger coverage area
reduced interference from other signals
An example of a simple non-telephone cellular system is an old taxi drivers' radio system, in
which a taxi company has several transmitters based around a city that can communicate
directly with each other.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Concept
Example of frequency reuses factor or pattern 1/4
In a cellular radio system, a land area to be supplied with radio service is divided into regular
shaped cells, which can be hexagonal, square, circular or some other regular shapes, although
hexagonal cells are conventional. Each of these cells is assigned multiple frequencies (f1 – f6)
which have corresponding radio base stations. The group of frequencies can be reused in
other cells, provided that the same frequencies are not reused in adjacent neighboring cells as
that would cause co-channel interference.
The increased capacity in a cellular network, compared with a network with a single
transmitter, comes from the fact that the same radio frequency can be reused in a different
area for a completely different transmission. If there is a single plain transmitter, only one
transmission can be used on any given frequency. Unfortunately, there is inevitably some
level of interference from the signal from the other cells which use the same frequency. This
means that, in a standard FDMA system, there must be at least a one cell gap between cells
which reuse the same frequency.
In the simple case of the taxi company, each radio had a manually operated channel selector
knob to tune to different frequencies. As the drivers moved around, they would change from
channel to channel. The drivers knew which frequency covered approximately what area.
When they did not receive a signal from the transmitter, they would try other channels until
they found one that worked. The taxi drivers would only speak one at a time, when invited by
the base station operator (this is, in a sense, time division multiple access (TDMA)).
Cell signal encoding
To distinguish signals from several different transmitters, frequency division multiple access
(FDMA) and code division multiple access (CDMA) were developed.
With FDMA, the transmitting and receiving frequencies used in each cell are different from
the frequencies used in each neighboring cell. In a simple taxi system, the taxi driver
www.Vidyarthiplus.com
www.Vidyarthiplus.com
manually tuned to a frequency of a chosen cell to obtain a strong signal and to avoid
interference from signals from other cells.
The principle of CDMA is more complex, but achieves the same result; the distributed
transceivers can select one cell and listen to it.
Other available methods of multiplexing such as polarization division multiple access
(PDMA) and time division multiple access (TDMA) cannot be used to separate signals from
one cell to the next since the effects of both vary with position and this would make signal
separation practically impossible. Time division multiple access, however, is used in
combination with either FDMA or CDMA in a number of systems to give multiple channels
within the coverage area of a single cell.
Frequency reuse
The key characteristic of a cellular network is the ability to re-use frequencies to increase
both coverage and capacity. As described above, adjacent cells must use different
frequencies, however there is no problem with two cells sufficiently far apart operating on the
same frequency. The elements that determine frequency reuse are the reuse distance and the
reuse factor.
The reuse distance, D is calculated as
where R is the cell radius and N is the number of cells per cluster. Cells may vary in radius in
the ranges (1 km to 30 km). The boundaries of the cells can also overlap between adjacent
cells and large cells can be divided into smaller cells.
The frequency reuse factor is the rate at which the same frequency can be used in the
network. It is 1/K (or K according to some books) where K is the number of cells which
cannot use the same frequencies for transmission. Common values for the frequency reuse
factor are 1/3, 1/4, 1/7, 1/9 and 1/12 (or 3, 4, 7, 9 and 12 depending on notation).
In case of N sector antennas on the same base station site, each with different direction, the
base station site can serve N different sectors. N is typically 3. A reuse pattern of N/K
denotes a further division in frequency among N sector antennas per site. Some current and
historical reuse patterns are 3/7 (North American AMPS), 6/4 (Motorola NAMPS), and 3/4
(GSM).
If the total available bandwidth is B, each cell can only use a number of frequency channels
corresponding to a bandwidth of B/K, and each sector can use a bandwidth of B/NK.
Code division multiple access-based systems use a wider frequency band to achieve the same
rate of transmission as FDMA, but this is compensated for by the ability to use a frequency
reuse factor of 1, for example using a reuse pattern of 1/1. In other words, adjacent base
station sites use the same frequencies, and the different base stations and users are separated
by codes rather than frequencies. While N is shown as 1 in this example that does not mean
the CDMA cell has only one sector, but rather that the entire cell bandwidth is also available
to each sector individually.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Depending on the size of the city, a taxi system may not have any frequency-reuse in its own
city, but certainly in other nearby cities, the same frequency can be used. In a large city, on
the other hand, frequency-reuse could certainly be in use.
Recently also orthogonal frequency-division multiple access based systems such as LTE are
being deployed with a frequency reuse of 1. Since such systems do not spread the signal
across the frequency band, inter-cell radio resource management is important to coordinate
resource allocation between different cell sites and to limit the inter-cell interference. There
are various means of Inter-cell Interference Coordination (ICIC) already defined in the
standard. Coordinated scheduling, multi-site MIMO or multi-site beam forming are other
examples for inter-cell radio resource management that might be standardized in the future.
Directional antennas
Cellular telephone frequency reuse pattern.
Although the original 2-way-radio cell towers were at the centers of the cells and were omnidirectional, a cellular map can be redrawn with the cellular telephone towers located at the
corners of the hexagons where three cells converge. Each tower has three sets of directional
antennas aimed in three different directions with 120 degrees for each cell (totaling 360
degrees) and receiving/transmitting into three different cells at different frequencies. This
provides a minimum of three channels (from three towers) for each cell. The numbers in the
illustration are channel numbers, which repeat every 3 cells. Large cells can be subdivided
into smaller cells for high volume areas.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Broadcast messages and paging
Practically every cellular system has some kind of broadcast mechanism. This can be used
directly for distributing information to multiple mobiles, commonly, for example in mobile
telephony systems, the most important use of broadcast information are to set up channels for
one to one communication between the mobile transceiver and the base station. This is called
paging. The three different paging procedures generally adopted are sequential, parallel and
selective paging.
The details of the process of paging vary somewhat from network to network, but normally
we know a limited number of cells where the phone is located (this group of cells is called a
Location Area in the GSM or UMTS system, or Routing Area if a data packet session is
involved; in LTE, cells are grouped into Tracking Areas). Paging takes place by sending the
broadcast message to all of those cells. Paging messages can be used for information transfer.
This happens in pagers, in CDMA systems for sending SMS messages, and in the UMTS
system where it allows for low downlink latency in packet-based connections.
Movement from cell to cell and handover
In a primitive taxi system, when the taxi moved away from a first tower and closer to a
second tower, the taxi driver manually switched from one frequency to another as needed. If
a communication was interrupted due to a loss of a signal, the taxi driver asked the base
station operator to repeat the message on a different frequency.
In a cellular system, as the distributed mobile transceivers move from cell to cell during an
ongoing continuous communication, switching from one cell frequency to a different cell
frequency is done electronically without interruption and without a base station operator or
manual switching. This is called the handover or handoff. Typically, a new channel is
automatically selected for the mobile unit on the new base station which will serve it. The
mobile unit then automatically switches from the current channel to the new channel and
communication continues.
The exact details of the mobile system‘s move from one base station to the other vary
considerably from system to system (see the example below for how a mobile phone network
manages handover).
Mobile phone network
GSM network architecture
www.Vidyarthiplus.com
www.Vidyarthiplus.com
The most common example of a cellular network is a mobile phone (cell phone) network. A
mobile phone is a portable telephone which receives or makes calls through a cell site (base
station), or transmitting tower. Radio waves are used to transfer signals to and from the cell
phone.
Modern mobile phone networks use cells because radio frequencies are a limited, shared
resource. Cell-sites and handsets change frequency under computer control and use low
power transmitters so that a limited number of radio frequencies can be simultaneously used
by many callers with less interference.
A cellular network is used by the mobile phone operator to achieve both coverage and
capacity for their subscribers. Large geographic areas are split into smaller cells to avoid lineof-sight signal loss and to support a large number of active phones in that area. All of the cell
sites are connected to telephone exchanges (or switches), which in turn connect to the public
telephone network.
In cities, each cell site may have a range of up to approximately ½ mile, while in rural areas;
the range could be as much as 5 miles. It is possible that in clear open areas, a user may
receive signals from a cell site 25 miles away.
Since almost all mobile phones use cellular technology, including GSM, CDMA, and AMPS
(analog), the term "cell phone" is in some regions, notably the US, used interchangeably with
"mobile phone". However, satellite phones are mobile phones that do not communicate
directly with a ground-based cellular tower, but may do so indirectly by way of a satellite.
There are a number of different digital cellular technologies, including: Global System for
Mobile Communications (GSM), General Packet Radio Service (GPRS), cdma One,
CDMA2000, Evolution-Data Optimized (EV-DO), Enhanced Data Rates for GSM Evolution
(EDGE), Universal Mobile Telecommunications System (UMTS), Digital Enhanced Cordless
Telecommunications (DECT), Digital AMPS (IS-136/TDMA), and Integrated Digital
Enhanced Network (iDEN).
Structure of the mobile phone cellular network
A simple view of the cellular mobile-radio network consists of the following:
A network of radio base stations forming the base station subsystem.
The core circuit switched network for handling voice calls and text
A packet switched network for handling mobile data
The public switched telephone network to connect subscribers to the wider telephony
network
This network is the foundation of the GSM system network. There are many functions that
are performed by this network in order to make sure customers get the desired service
including mobility management, registration, call set up, and handover.
Any phone connects to the network via an RBS (Radio Base Station) at a corner of the
corresponding cell which in turn connects to the Mobile switching center (MSC). The MSC
provides a connection to the public switched telephone network (PSTN). The link from a
phone to the RBS is called an uplink while the other way is termed downlink.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Radio channels effectively use the transmission medium through the use of the following
multiplexing & access schemes: frequency division multiple access (FDMA), time division
multiple access (TDMA), code division multiple access (CDMA), and space division
multiple access (SDMA).
Cellular handover in mobile phone networks
As the phone user moves from one cell area to another cell while a call is in progress, the
mobile station will search for a new channel to attach to in order not to drop the call. Once a
new channel is found, the network will command the mobile unit to switch to the new
channel and at the same time switch the call onto the new channel.
With CDMA, multiple CDMA handsets share a specific radio channel. The signals are
separated by using a pseudo noise code (PN code) specific to each phone. As the user moves
from one cell to another, the handset sets up radio links with multiple cell sites (or sectors of
the same site) simultaneously. This is known as "soft handoff" because, unlike with
traditional cellular technology, there is no one defined point where the phone switches to the
new cell.
In IS-95 inter-frequency handovers and older analog systems such as NMT it will typically be
impossible to test the target channel directly while communicating. In this case other
techniques have to be used such as pilot beacons in IS-95. This means that there is almost
always a brief break in the communication while searching for the new channel followed by
the risk of an unexpected return to the old channel.
If there is no ongoing communication or the communication can be interrupted, it is possible
for the mobile unit to spontaneously move from one cell to another and then notify the base
station with the strongest signal.
Cellular frequency choice in mobile phone networks
The effect of frequency on cell coverage means that different frequencies serve better for
different uses. Low frequencies, such as 450 MHz NMT, serve very well for countryside
coverage. GSM 900 (900 MHz) is a suitable solution for light urban coverage. GSM 1800
(1.8 GHz) starts to be limited by structural walls. UMTS, at 2.1 GHz is quite similar in
coverage to GSM 1800.
Higher frequencies are a disadvantage when it comes to coverage, but it is a decided
advantage when it comes to capacity. Pico cells, covering e.g. one floor of a building, become
possible, and the same frequency can be used for cells which are practically neighbors.
Cell service area may also vary due to interference from transmitting systems, both within
and around that cell. This is true especially in CDMA based systems. The receiver requires a
certain signal-to-noise ratio, and the transmitter should not send with too high transmission
power in view to not cause interference with other transmitters. As the receiver moves away
from the transmitter, the power received decreases, so the power control algorithm of the
transmitter increases the power it transmits to restore the level of received power. As the
interference (noise) rises above the received power from the transmitter, and the power of the
transmitter cannot be increased any more, the signal becomes corrupted and eventually
unusable. In CDMA-based systems, the effect of interference from other mobile transmitters
in the same cell on coverage area is very marked and has a special name, cell breathing.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
One can see examples of cell coverage by studying some of the coverage maps provided by
real operators on their web sites or by looking at independently crowd sourced maps such as
Open Signal. In certain cases they may mark the site of the transmitter, in others it can be
calculated by working out the point of strongest coverage.
Coverage comparison of different frequencies
The following table shows the dependency of the coverage area of one cell on the frequency
of a CDMA2000 network:
Frequency (MHz) Cell radius (km) Cell area (km2) Relative Cell Count
2.
450
48.9
7521
1
950
26.9
2269
3.3
1800
14.0
618
12.2
2100
12.0
449
16.2
Give a detailed discussion about Fibre Optic Communication?
Fibre-optic communication
An optical fiber junction box. The yellow cables are single mode fibers; the orange and blue
cables are multi-mode fibers: 62.5/125 µm OM1 and 50/125 µm OM3 fibers respectively.
Fiber-optic communication is a method of transmitting information from one place to another
by sending pulses of light through an optical fiber. The light forms an electromagnetic carrier
wave that is modulated to carry information. First developed in the 1970s, fiber-optic
communication systems have revolutionized the telecommunications industry and have
played a major role in the advent of the Information Age. Because of its advantages over
electrical transmission, optical fibers have largely replaced copper wire communications in
core networks in the developed world.
The process of communicating using fiber-optics involves the following basic steps: Creating
the optical signal involving the use of a transmitter, relaying the signal along the fiber,
www.Vidyarthiplus.com
www.Vidyarthiplus.com
ensuring that the signal does not become too distorted or weak, receiving the optical signal,
and converting it into an electrical signal.
Applications
Optical fiber is used by many telecommunications companies to transmit telephone signals,
Internet communication, and cable television signals. Due to much lower attenuation and
interference, optical fiber has large advantages over existing copper wire in long-distance and
high-demand applications. However, infrastructure development within cities was relatively
difficult and time-consuming, and fiber-optic systems were complex and expensive to install
and operate. Due to these difficulties, fiber-optic communication systems have primarily been
installed in long-distance applications, where they can be used to their full transmission
capacity, offsetting the increased cost. Since 2000, the prices for fiber-optic communications
have dropped considerably. The price for rolling out fiber to the home has currently become
more cost-effective than that of rolling out a copper based network. Prices have dropped to
$850 per subscriber[citation needed] in the US and lower in countries like The Netherlands, where
digging costs are low.
Since 1990, when optical-amplification systems became commercially available, the
telecommunications industry has laid a vast network of intercity and transoceanic fiber
communication lines. By 2002, an intercontinental network of 250,000 km of submarine
communications cable with a capacity of 2.56 Tb/s was completed, and although specific
network capacities are privileged information, telecommunications investment reports
indicate that network capacity has increased dramatically since 2004.
Technology
Modern fiber-optic communication systems generally include an optical transmitter to
convert an electrical signal into an optical signal to send into the optical fiber, a cable
containing bundles of multiple optical fibers that is routed through underground conduits and
buildings, multiple kinds of amplifiers, and an optical receiver to recover the signal as an
electrical signal. The information transmitted is typically digital information generated by
computers, telephone systems, and cable television companies.
Transmitters
A GBIC module (shown here with its cover removed), is an optical and electrical transceiver.
The electrical connector is at top right, and the optical connectors are at bottom left
The most commonly used optical transmitters are semiconductor devices such as lightemitting diodes (LEDs) and laser diodes. The difference between LEDs and laser diodes is
that LEDs produce incoherent light, while laser diodes produce coherent light. For use in
www.Vidyarthiplus.com
www.Vidyarthiplus.com
optical communications, semiconductor optical transmitters must be designed to be compact,
efficient, and reliable, while operating in an optimal wavelength range, and directly
modulated at high frequencies.
In its simplest form, an LED is a forward-biased p-n junction, emitting light through
spontaneous emission, a phenomenon referred to as electroluminescence. The emitted light is
incoherent with a relatively wide spectral width of 30-60 nm. LED light transmission is also
inefficient, with only about 1%[citation needed] of input power, or about 100 microwatts,
eventually converted into launched power which has been coupled into the optical fiber.
However, due to their relatively simple design, LEDs are very useful for low-cost
applications.
Communications LEDs are most commonly made from Indium gallium arsenide phosphide
(InGaAsP) or gallium arsenide (GaAs). Because InGaAsP LEDs operate at a longer
wavelength than GaAs LEDs (1.3 micrometers vs. 0.81-0.87 micrometers), their output
spectrum, while equivalent in energy is wider in wavelength terms by a factor of about 1.7.
The large spectrum width of LEDs is subject to higher fiber dispersion, considerably limiting
their bit rate-distance product (a common measure of usefulness). LEDs are suitable
primarily for local-area-network applications with bit rates of 10-100 Mbit/s and transmission
distances of a few kilometers. LEDs have also been developed that use several quantum wells
to emit light at different wavelengths over a broad spectrum, and are currently in use for
local-area WDM networks.
Today, LEDs have been largely superseded by VCSEL (Vertical Cavity Surface Emitting
Laser) devices, which offer improved speed, power and spectral properties, at a similar cost.
Common VCSEL devices couple well to multi mode fiber.
A semiconductor laser emits light through stimulated emission rather than spontaneous
emission, which results in high output power (~100 mW) as well as other benefits related to
the nature of coherent light. The output of a laser is relatively directional, allowing high
coupling efficiency (~50 %) into single-mode fiber. The narrow spectral width also allows for
high bit rates since it reduces the effect of chromatic dispersion. Furthermore, semiconductor
lasers can be modulated directly at high frequencies because of short recombination time.
Commonly used classes of semiconductor laser transmitters used in fiber optics include
VCSEL (Vertical Cavity Surface Emitting Laser), Fabry–Pérot and DFB (Distributed Feed
Back).
Laser diodes are often directly modulated, that is the light output is controlled by a current
applied directly to the device. For very high data rates or very long distance links, a laser
source may be operated continuous wave, and the light modulated by an external device such
as an electro-absorption modulator or Mach–Zehnder interferometer. External modulation
increases the achievable link distance by eliminating laser chirp, which broadens the
linewidth of directly modulated lasers, increasing the chromatic dispersion in the fiber.
A transceiver is a device combining a transmitter and a receiver in a single housing (see
picture on right).
Receivers
The main component of an optical receiver is a photo detector, which converts light into
electricity using the photoelectric effect. The primary photo detectors for telecommunications
www.Vidyarthiplus.com
www.Vidyarthiplus.com
are made from Indium gallium arsenide The photo detector is typically a semiconductorbased photodiode. Several types of photodiodes include p-n photodiodes, p-i-n photodiodes,
and avalanche photodiodes. Metal-semiconductor-metal (MSM) photo detectors are also used
due to their suitability for circuit integration in regenerators and wavelength-division
multiplexers.
Optical-electrical converters are typically coupled with a trans impedance amplifier and a
limiting amplifier to produce a digital signal in the electrical domain from the incoming
optical signal, which may be attenuated and distorted while passing through the channel.
Further signal processing such as clock recovery from data (CDR) performed by a phaselocked loop may also be applied before the data is passed on.
Fiber cable types
A cable reel trailer with conduit that can carry optical fiber
Single-mode optical fiber in an underground service pit
An optical fiber consists of a core, cladding, and a buffer (a protective outer coating), in
which the cladding guides the light along the core by using the method of total internal
reflection. The core and the cladding (which has a lower-refractive-index) are usually made
of high-quality silica glass, although they can both be made of plastic as well. Connecting
two optical fibers is done by fusion splicing or mechanical splicing and requires special skills
and interconnection technology due to the microscopic precision required to align the fiber
cores.[4]
Two main types of optical fiber used in optic communications include multi-mode optical
fibers and single-mode optical fibers. A multi-mode optical fiber has a larger core (≥ 50
micrometers), allowing less precise, cheaper transmitters and receivers to connect to it as well
as cheaper connectors. However, a multi-mode fiber introduces multimode distortion, which
often limits the bandwidth and length of the link. Furthermore, because of its higher dopant
content, multi-mode fibres are usually expensive and exhibit higher attenuation. The core of a
www.Vidyarthiplus.com
www.Vidyarthiplus.com
single-mode fiber is smaller (<10 micrometers) and requires more expensive components and
interconnection methods, but allows much longer, higher-performance links.
In order to package fiber into a commercially viable product, it typically is protectively
coated by using ultraviolet (UV), light-cured acrylate polymers, then terminated with optical
fiber connectors, and finally assembled into a cable. After that, it can be laid in the ground
and then run through the walls of a building and deployed aerially in a manner similar to
copper cables. These fibers require less maintenance than common twisted pair wires, once
they are deployed.[5]
Specialized cables are used for long distance subsea data transmission, e.g. transatlantic
communications cable. New (2011–2013) cables operated by commercial enterprises
(Emerald Atlantis, Hibernia Atlantic) typically have four strands of fiber and cross the
Atlantic (NYC-London) in 60-70ms. Cost of each such cable was about $300M in 2011.
source: The Chronicle Herald.
Another common practice is to bundle many fiber optic strands within long-distance power
transmission cable. This exploits power transmission rights of way effectively, ensures a
power company can own and control the fiber required to monitor its own devices and lines,
is effectively immune to tampering, and simplifies the deployment of smart grid technology.
Amplifiers
The transmission distance of a fiber-optic communication system has traditionally been
limited by fiber attenuation and by fiber distortion. By using opto-electronic repeaters, these
problems have been eliminated. These repeaters convert the signal into an electrical signal,
and then use a transmitter to send the signal again at a higher intensity than it was before.
Because of the high complexity with modern wavelength-division multiplexed signals
(including the fact that they had to be installed about once every 20 km), the cost of these
repeaters is very high.
An alternative approach is to use an optical amplifier, which amplifies the optical signal
directly without having to convert the signal into the electrical domain. It is made by doping a
length of fiber with the rare-earth mineral erbium, and pumping it with light from a laser with
a shorter wavelength than the communications signal (typically 980 nm). Amplifiers have
largely replaced repeaters in new installations.
Wavelength-division multiplexing
Wavelength-division multiplexing (WDM) is the practice of multiplying the available
capacity of optical fibers through use of parallel channels, each channel on a dedicated
wavelength of light. This requires a wavelength division multiplexer in the transmitting
equipment and a demultiplexer (essentially a spectrometer) in the receiving equipment.
Arrayed waveguide gratings are commonly used for multiplexing and demultiplexing in
WDM. Using WDM technology now commercially available, the bandwidth of a fiber can be
divided into as many as 160 channels to support a combined bit rate in the range of 1.6 Tbit/s.
Parameters
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Bandwidth–distance product
Because the effect of dispersion increases with the length of the fiber, a fiber transmission
system is often characterized by its bandwidth–distance product, usually expressed in units of
MHz·km. This value is a product of bandwidth and distance because there is a trade off
between the bandwidth of the signal and the distance it can be carried. For example, a
common multi-mode fiber with bandwidth–distance product of 500 MHz·km could carry a
500 MHz signal for 1 km or a 1000 MHz signal for 0.5 km.
Engineers are always looking at current limitations in order to improve fiber-optic
communication, and several of these restrictions are currently being researched.
Record speeds
Each fiber can carry many independent channels, each using a different wavelength of light
(wavelength-division multiplexing). The net data rate (data rate without overhead bytes) per
fiber is the per-channel data rate reduced by the FEC overhead, multiplied by the number of
channels (usually up to eighty in commercial dense WDM systems as of 2008).
Year Organization Effective speed WDM
channels Per channel
2009 Alcatel-Lucent 15 Tbit/s
155
100 Gbit/s
2010 NTT
69.1 Tbit/s
432
171 Gbit/s
2011 KIT
26 Tbit/s
1
26 Tbit/s
2011 NEC
101 Tbit/s
370
273 Gbit/s
2012 NEC, Corning 1.05 Petabit/s 12 core fiber
speed Distance
90 km
240 km
50 km
165 km
52.4 km
While the physical limitations of electrical cable prevent speeds in excess of 10 Gigabits per
second, the physical limitations of fiber optics have not yet been reached.
In 2013, New Scientist reported that a team at the University of Southampton had achieved a
throughput of 73.7 Tbit per second, with the signal traveling at 99.7% the speed of light
through a hollow-core photonic crystal fiber.
Dispersion
For modern glass optical fiber, the maximum transmission distance is limited not by direct
material absorption but by several types of dispersion, or spreading of optical pulses as they
travel along the fiber. Dispersion in optical fibers is caused by a variety of factors. Intermodal
dispersion, caused by the different axial speeds of different transverse modes, limits the
performance of multi-mode fiber. Because single-mode fiber supports only one transverse
mode, intermodal dispersion is eliminated.
In single-mode fiber performance is primarily limited by chromatic dispersion (also called
group velocity dispersion), which occurs because the index of the glass varies slightly
depending on the wavelength of the light, and light from real optical transmitters necessarily
has nonzero spectral width (due to modulation). Polarization mode dispersion, another source
of limitation, occurs because although the single-mode fiber can sustain only one transverse
mode, it can carry this mode with two different polarizations, and slight imperfections or
distortions in a fiber can alter the propagation velocities for the two polarizations. This
phenomenon is called fiber birefringence and can be counteracted by polarizationmaintaining optical fiber. Dispersion limits the bandwidth of the fiber because the spreading
www.Vidyarthiplus.com
www.Vidyarthiplus.com
optical pulse limits the rate that pulses can follow one another on the fiber and still be
distinguishable at the receiver.
Some dispersion, notably chromatic dispersion, can be removed by a 'dispersion
compensator'. This works by using a specially prepared length of fiber that has the opposite
dispersion to that induced by the transmission fiber, and this sharpens the pulse so that it can
be correctly decoded by the electronics.
Attenuation
Fiber attenuation, which necessitates the use of amplification systems, is caused by a
combination of material absorption, Rayleigh scattering, Mie scattering, and connection
losses. Although material absorption for pure silica is only around 0.03 dB/km (modern fiber
has attenuation around 0.3 dB/km), impurities in the original optical fibers caused attenuation
of about 1000 dB/km. Other forms of attenuation are caused by physical stresses to the fiber,
microscopic fluctuations in density, and imperfect splicing techniques.
Transmission windows
Each effect that contributes to attenuation and dispersion depends on the optical wavelength.
The wavelength bands (or windows) that exist where these effects are weakest are the most
favorable for transmission. These windows have been standardized, and the currently defined
bands are the following:[13]
Band Description
Wavelength Range
O band original
1260 to 1360 nm
E band extended
1360 to 1460 nm
S band short wavelengths
1460 to 1530 nm
C band conventional ("erbium window") 1530 to 1565 nm
L band long wavelengths
1565 to 1625 nm
U band ultralong wavelengths
1625 to 1675 nm
Note that this table shows that current technology has managed to bridge the second and third
windows that were originally disjoint.
Historically, there was a window used below the O band, called the first window, at 800900 nm; however, losses are high in this region so this window is used primarily for shortdistance communications. The current lower windows (O and E) around 1300 nm have much
lower losses. This region has zero dispersion. The middle windows (S and C) around
1500 nm are the most widely used. This region has the lowest attenuation losses and achieves
the longest range. It does have some dispersion, so dispersion compensator devices are used
to remove this.
Regeneration
When a communications link must span a larger distance than existing fiber-optic technology
is capable of, the signal must be regenerated at intermediate points in the link by repeaters.
Repeaters add substantial cost to a communication system, and so system designers attempt
to minimize their use.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Recent advances in fiber and optical communications technology have reduced signal
degradation so far that regeneration of the optical signal is only needed over distances of
hundreds of kilometers. This has greatly reduced the cost of optical networking, particularly
over undersea spans where the cost and reliability of repeaters is one of the key factors
determining the performance of the whole cable system. The main advances contributing to
these performance improvements are dispersion management, which seeks to balance the
effects of dispersion against non-linearity; and solitons, which use nonlinear effects in the
fiber to enable dispersion-free propagation over long distances.
Last mile
Although fiber-optic systems excel in high-bandwidth applications, optical fiber has been
slow to achieve its goal of fiber to the premises or to solve the last mile problem. However, as
bandwidth demand increases, more and more progress towards this goal can be observed. In
Japan, for instance EPON has largely replaced DSL as a broadband Internet source. South
Korea‘s KT also provides a service called FTTH (Fiber To The Home), which provides fiberoptic connections to the subscriber‘s home. The largest FTTH deployments are in Japan,
South Korea, and China. Singapore started implementation of their all-fiber Next Generation
Nationwide Broadband Network (Next Gen NBN), which is slated for completion in 2012
and is being installed by Open Net. Since they began rolling out services in September 2010,
Network coverage in Singapore has reached 60% nationwide.
In the US, Verizon Communications provides a FTTH service called FiOS to select highARPU (Average Revenue Per User) markets within its existing territory. The other major
surviving ILEC (or Incumbent Local Exchange Carrier), AT&T, uses a FTTN (Fiber To The
Node) service called U-verse with twisted-pair to the home. Their MSO competitors employ
FTTN with coax using HFC. All of the major access networks use fiber for the bulk of the
distance from the service provider's network to the customer.
The globally dominant access network technology is EPON (Ethernet Passive Optical
Network). In Europe, and among telcos in the United States, BPON (ATM-based Broadband
PON) and GPON (Gigabit PON) had roots in the FSAN (Full Service Access Network) and
ITU-T standards organizations under their control.
Comparison with electrical transmission
A mobile fiber optic splice lab used to access and splice underground cables
www.Vidyarthiplus.com
www.Vidyarthiplus.com
An underground fiber optic splice enclosure opened up
The choice between optical fiber and electrical (or copper) transmission for a particular
system is made based on a number of trades-offs. Optical fiber is generally chosen for
systems requiring higher bandwidth or spanning longer distances than electrical cabling can
accommodate.
The main benefits of fiber are its exceptionally low loss (allowing long distances between
amplifiers/repeaters), its absence of ground currents and other parasite signal and power
issues common to long parallel electric conductor runs (due to its reliance on light rather than
electricity for transmission, and the dielectric nature of fiber optic), and its inherently high
data-carrying capacity. Thousands of electrical links would be required to replace a single
high bandwidth fiber cable. Another benefit of fibers is that even when run alongside each
other for long distances, fiber cables experience effectively no crosstalk, in contrast to some
types of electrical transmission lines. Fiber can be installed in areas with high
electromagnetic interference (EMI), such as alongside utility lines, power lines, and railroad
tracks. Nonmetallic all-dielectric cables are also ideal for areas of high lightning-strike
incidence.
For comparison, while single-line, voice-grade copper systems longer than a couple of
kilometers require in-line signal repeaters for satisfactory performance; it is not unusual for
optical systems to go over 100 kilometers (62 mi), with no active or passive processing.
Single-mode fiber cables are commonly available in 12 km lengths, minimizing the number
of splices required over a long cable run. Multi-mode fiber is available in lengths up to 4 km,
although industrial standards only mandate 2 km unbroken runs.
In short distance and relatively low bandwidth applications, electrical transmission is often
preferred because of its
Lower material cost, where large quantities are not required
Lower cost of transmitters and receivers
Capability to carry electrical power as well as signals (in appropriately designed
cables)
Ease of operating transducers in linear mode.
Optical fibers are more difficult and expensive to splice than electrical conductors. And at
higher powers, optical fibers are susceptible to fiber fuse, resulting in catastrophic destruction
of the fiber core and damage to transmission components.
Because of these benefits of electrical transmission, optical communication is not common in
short box-to-box, backplane, or chip-to-chip applications; however, optical systems on those
scales have been demonstrated in the laboratory.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
In certain situations fiber may be used even for short distance or low bandwidth applications,
due to other important features:
Immunity to electromagnetic interference, including nuclear electromagnetic pulses
(although fiber can be damaged by alpha and beta radiation).
High electrical resistance, making it safe to use near high-voltage equipment or
between areas with different earth potentials.
Lighter weight—important, for example, in aircraft.
No sparks—important in flammable or explosive gas environments.
Not electromagnetically radiating, and difficult to tap without disrupting the signal—
important in high-security environments.
Much smaller cable size—important where pathway is limited, such as networking an
existing building, where smaller channels can be drilled and space can be saved in
existing cable ducts and trays.
Resistance to corrosion due to non-metallic transmission medium
Optical fiber cables can be installed in buildings with the same equipment that is used to
install copper and coaxial cables, with some modifications due to the small size and limited
pull tension and bend radius of optical cables. Optical cables can typically be installed in duct
systems in spans of 6000 meters or more depending on the duct's condition, layout of the duct
system, and installation technique. Longer cables can be coiled at an intermediate point and
pulled farther into the duct system as necessary.
Governing standards
In order for various manufacturers to be able to develop components that function compatibly
in fiber optic communication systems, a number of standards have been developed. The
International Telecommunications Union publishes several standards related to the
characteristics and performance of fibers themselves, including
ITU-T G.651, "Characteristics of a 50/125 µm multimode graded index optical fibre
cable"
ITU-T G.652, "Characteristics of a single-mode optical fibre cable"
Other standards specify performance criteria for fiber, transmitters, and receivers to be used
together in conforming systems. Some of these standards are:
100 Gigabit Ethernet
10 Gigabit Ethernet
Fibre Channel
Gigabit Ethernet
HIPPI
Synchronous Digital Hierarchy
Synchronous Optical Networking
Optical Transport Network (OTN)
TOSLINK is the most common format for digital audio cable using plastic optical fiber to
connect digital sources to digital receivers.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
3.
Mention the applications of Microwave communication?
Microwaves are widely used for point-to-point communications because their small
wavelength allows conveniently-sized antennas to direct them in narrow beams, which can be
pointed directly at the receiving antenna. This allows nearby microwave equipment to use the
same frequencies without interfering with each other, as lower frequency radio waves do.
Another advantage is that the high frequency of microwaves gives the microwave band a very
large information-carrying capacity; the microwave band has a bandwidth 30 times that of all
the rest of the radio spectrum below it. A disadvantage is that microwaves are limited to line
of sight propagation; they cannot pass around hills or mountains as lower frequency radio
waves can.
Microwave radio transmission is commonly used in point communication on the surface of
the Earth, in satellite communications, and in deep space radio communications. Other parts
of the microwave radio band are used for radars, radio navigation systems, sensor systems,
and radio astronomy.
The next higher part of the radio electromagnetic spectrum, where the frequencies are above
30 GHz and below 100 GHz, are called "millimeter waves" because their wavelengths are
conveniently measured in millimeters, and their wavelengths range from 10 mm down to
3.0 mm. Radio waves in this band are usually strongly attenuated by the Earthly atmosphere
and particles contained in it, especially during wet weather. Also, in wide band of frequencies
around 60 GHz, the radio waves are strongly attenuated by molecular oxygen in the
atmosphere. The electronic technologies needed in the millimeter wave band are also much
more difficult to utilize than those of the microwave band.
Wireless transmission of information
One-way (e.g. television broadcasting) and two-way telecommunication using
communications satellite
Terrestrial microwave radio broadcasting relay links in telecommunications networks
including e.g. backbone or backhaul carriers in cellular networks linking BTS-BSC and BSCMSC.
A parabolic antenna for Erdfunkstelle Raisting, based in Raisting, Bavaria, Germany.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
C bandhorn-reflector antennas on the roof of a telephone switching center in Seattle,
Washington, part of the U.S. AT&T Long Lines microwave relay network.
Wireless transmission of power
Proposed systems e.g. for connecting solar power collecting satellites to terrestrial
power grids
Parabolic (microwave) antenna
To direct microwaves in narrow beams for point-to-point communication links or
radiolocation (radar), a parabolic antenna is usually used. This is an antenna that uses a
parabolic reflector to direct the microwaves. To achieve narrow beamwidths, the reflector
must be much larger than the wavelength of the radio waves. The relatively short wavelength
of microwaves allows reasonably sized dishes to exhibit the desired highly directional
response for both receiving and transmitting.
Microwave radio relay
Dozens of microwave dishes on the Heinrich-Hertz-Turm in Germany.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Microwave radio relay is a technology for transmitting digital and analogsignals, such as
long-distance telephone calls, television programs, and computer data, between two locations
on a line of sight radio path. In microwave radio relay, microwaves are transmitted between
the two locations with directional antennas, forming a fixed radio connection between the two
points. The requirement of a line of sight limits the distance between stations to 30 or 40
miles.
Beginning in the 1950s and 1960s networks of microwave relay links, such as the AT&T
Long Lines system in the U.S., carried long distance telephone calls and television programs
between cities. These included long daisy-chained series of such links that traversed
mountain ranges and spanned continents. Much of the transcontinental traffic is now carried
by cheaper optical fibers and communication satellites, but microwave relay remains
important for shorter distances.
How microwave radio relay links are formed
Relay towers on Frazier Mountain, Southern California
Because the radio waves travel in narrow beams confined to a line-of-sight path from one
antenna to the other, they don't interfere with other microwave equipment, and nearby
microwave links can use the same frequencies. Antennas used must be highly directional
(High gain); these antennas are installed in elevated locations such as large radio towers in
order to be able to transmit across long distances. Typical types of antenna used in radio relay
link installations are parabolic antennas, dielectric lens, and horn-reflector antennas, which
have a diameter of up to 4 meters. Highly directive antennas permit an economical use of the
available frequency spectrum, despite long transmission distances.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Danish military radio relay node
Planning considerations
Because of the high frequencies used, a quasi-optical line of sight between the stations is
generally required. Additionally, in order to form the line of sight connection between the
two stations, the first Fresnel zone must be free from obstacles so the radio waves can
propagate across a nearly uninterrupted path. Obstacles in the signal field cause unwanted
attenuation, and are as a result only acceptable in exceptional cases. High mountain peak or
ridge positions are often ideal: Europe's highest radio relay station, the Richtfunkstation
Jungfraujoch, is situated atop the Jungfraujoch ridge at an altitude of 3,705 meters (12,156 ft)
above sea level.
Multiple antennas provide space diversity
Obstacles, the curvature of the Earth, the geography of the area and reception issues arising
from the use of nearby land (such as in manufacturing and forestry) are important issues to
consider when planning radio links. In the planning process, it is essential that "path profiles"
are produced, which provide information about the terrain and Fresnel zones affecting the
transmission path. The presence of a water surface, such as a lake or river, in the mid-path
region also must be taken into consideration as it can result in a near-perfect reflection (even
modulated by wave or tide motions), creating multipath distortion as the two received signals
("wanted" and "unwanted") swing in and out of phase. Multipath fades are usually deep only
in a small spot and a narrow frequency band, so space and/or frequency diversity schemes
would be applied to mitigate these effects.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
The effects of atmospheric stratification cause the radio path to bend downward in a typical
situation so a major distance is possible as the earth equivalent curvature increases from
6370 km to about 8500 km (a 4/3 equivalent radius effect). Rare events of temperature,
humidity and pressure profile versus height, may produce large deviations and distortion of
the propagation and affect transmission quality. High intensity rain and snow must also be
considered as an impairment factor, especially at frequencies above 10 GHz. All previous
factors, collectively known as path loss, make it necessary to compute suitable power
margins, in order to maintain the link operative for a high percentage of time, like the
standard 99.99% or 99.999% used in 'carrier class' services of most telecommunication
operators.
The longest microwave radio relay known up to date cross the Red Sea with 360 km hop
between Jebel Erba (2170m a.s.l., 20°44'46.17"N 36°50'24.65"E, Sudan) and Jebel Dakka
(2572m a.s.l., 21° 5'36.89"N 40°17'29.80"E, Saudi Arabia). The link built in 1979 by Telettra
allowed to proper transmit 300 telephone channels and 1 TV signal, in the 2 GHz frequency
band. (Hop distance is the distance between two microwave stations)
Portable microwave rig for Electronic news gathering (ENG) for television news
Over-horizon microwave radio relay
In over-horizon, or tropospheric scatter, microwave radio relays, unlike a standard microwave
radio relay link, the sending and receiving antennas do not use a line of sight transmission
path. Instead, the stray signal transmission, known as "tropo - scatter" or simply "scatter,"
from the sent signal is picked up by the receiving station. Signal clarity obtained by this
method depends on the weather and other factors, and as a result a high level of technical
difficulty is involved in the creation of a reliable over horizon radio relay link. Over horizon
radio relay links are therefore only used where standard radio relay links are unsuitable (for
example, in providing a microwave link to an island).
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Usages of microwave radio relay systems
During the 1950s the AT&T Long Lines system of microwave relay links grew to carry the
majority of US long distance telephone traffic, as well as intercontinental television network
signals.[2] The prototype was called TDX and was tested with a connection between New
York City and Murray Hill, the location of Bell Laboratories in 1946. The TDX system was
set up between New York and Boston in 1947. The TDX was improved to the TD2, which
still used klystron tubes in the transmitters, and then later to the TD3 that used solid state
electronics. The main motivation in 1946 to use microwave radio instead of cable was that a
large capacity could be installed quickly and at less cost. It was expected at that time that the
annual operating costs for microwave radio would be greater than for cable. There were two
main reasons that a large capacity had to be introduced suddenly: Pent up demand for long
distance telephone service, because of the hiatus during the war years, and the new medium
of television, which needed more bandwidth than radio.
Though not commonly known, the US Military used both portable and fixed-station
microwave communications in the European Theater during WWII. Starting in the late 1940s,
this continued to some degree into the 1960s, when many of these links were supplanted with
tropospheric scatter or satellite systems. When the NATO military arm was formed, much of
this existing equipment was transferred to communications groups. The typical
communications systems used by NATO during that time period consisted of the
technologies which had been developed for use by the telephone carrier entities in host
countries. One example from the USA is the RCA CW-20A 1–2 GHz microwave relay
system which utilized flexible UHF cable rather than the rigid waveguide required by higher
frequency systems, making it ideal for tactical applications. The typical microwave relay
installation or portable van had two radio systems (plus backup) connecting two LOS sites.
These radios would often provide communication for 24 telephone channels of frequency
division multiplexed signal (i.e. Lenkurt 33C FDM), though any channel could be designated
to carry up to 18 teletype communications instead. Similar systems from Germany and other
member nations were also in use.
Similar systems were soon built in many countries, until the 1980s when the technology lost
its share of fixed operation to newer technologies such as fiber-optic cable and
communication satellites, which offer lower cost per bit.
During the Cold War, the US intelligence agencies, such as the National Security
Agency (NSA), were reportedly able to intercept Soviet microwave traffic using satellites
such as Rhyolite.[3] Much of the beam of a microwave link passes the receiving antenna and
radiates toward the horizon, into space. By positioning a geosynchronous satellite in the path
of the beam, the microwave beam can be received.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
At the turn of the century, microwave radio relay systems are being used increasingly in
portable radio applications. The technology is particularly suited to this application because
of lower operating costs, a more efficient infrastructure, and provision of direct hardware
access to the portable radio operator.
Menu
0:00
Microwave link
A microwave link is a communications system that uses a beam of radio waves in the
microwave frequency range to transmit video, audio, or data between two locations, which
can be from just a few feet or meters to several miles or kilometers apart. Microwave links
are commonly used by television broadcasters to transmit programmes across a country, for
instance, or from an outside broadcast back to a studio.
Mobile units can be camera mounted, allowing cameras the freedom to move around without
trailing cables. These are often seen on the touchlines of sports fields on Steadicam systems.
Properties of microwave links
Involve line of sight (LOS) communication technology
Affected greatly by environmental constraints, including rain fade
Have very limited penetration capabilities through obstacles such as hills, buildings
and trees
Sensitive to high pollen count[citation needed]
Signals can be degraded[citation needed]during Solar proton events
Uses of microwave links
In communications between satellites and base stations
As backbone carriers for cellular systems
In short range indoor communications
Telecommunications, in linking remote and regional telephone exchanges to larger
(main) exchanges without the need for copper/optical fibre lines.
Frequency ranges from 150 MHz to 150 GHz
Microwave power transmission
Microwave power transmission (MPT) is the use of microwaves to transmit power through
outer space or the atmosphere without the need for wires. It is a sub-type of the more general
wireless energy transfer methods.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
History
Following World War II, which saw the development of high-power microwave emitters
known as cavity magnetrons, the idea of using microwaves to transmit power was researched.
In 1964, William C. Brown demonstrated a miniature helicopter equipped with a combination
antenna and rectifier device called a rectenna. The rectenna converted microwave power into
electricity, allowing the helicopter to fly. In principle, the rectenna is capable of very high
conversion efficiencies - over 90% in optimal circumstances.
Most proposed MPT systems now usually include a phased array microwave transmitter.
While these have lower efficiency levels they have the advantage of being electrically steered
using no moving parts, and are easier to scale to the necessary levels that a practical MPT
system requires.
Using microwave power transmission to deliver electricity to communities without having to
build cable-based infrastructure is being studied at Grand Bassin on Reunion Island in the
Indian Ocean.
Common safety concerns
The common reaction to microwave transmission is one of concern, as microwaves are
generally perceived by the public as dangerous forms of radiation - stemming from the fact
that they are used in microwave ovens. While high power microwaves can be painful and
dangerous as in the United States Military's Active Denial System, MPT systems are
generally proposed to have only low intensity at the rectenna.
Though this would be extremely safe as the power levels would be about equal to the leakage
from a microwave oven, and only slightly more than a cell phone, the relatively diffuse
microwave beam necessitates a large receiving antenna area for a significant amount of
energy to be transmitted.
Research has involved exposing multiple generations of animals to microwave radiation of
this or higher intensity, and no health issues have been found.
Proposed uses
MPT is the most commonly proposed method for transferring energy to the surface of the
Earth from solar power satellites or other in-orbit power sources. MPT is occasionally
proposed for the power supply in beam-powered propulsion for orbital lift space ships. Even
though lasers are more commonly proposed, their low efficiency in light generation and
reception has led some designers to opt for microwave based systems.
Current status
Wireless Power Transmission (using microwaves) is well proven. Experiments in the tens of
kilowatts have been performed at Goldstone in California in 1975 and more recently (1997)
at Grand Bassin on Reunion Island. In 2008 a long range transmission experiment
successfully transmitted 20 watts 92 miles (148 km) from a mountain on Maui to the main
island of Hawaii.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
4.
Give a brief discussion about satellite and its applications?
A satellite is an object that orbits or revolves around another object. For example, the Moon
is a satellite of Earth, and Earth is a satellite of the Sun. In this document, we will examine
human-made satellites that orbit Earth. They are highly specialized wireless
receiver/transmitters that are launched by a rocket and placed in orbit around the Earth. There
are hundreds of satellites currently in operation.
Satellite communication is one particular example of wireless communication systems.
Similar and maybe more familiar examples of wireless systems are radio and television
broadcasting and mobile and cordless telephones. Systems of this type rely on a network of
ground-based transmitters and receivers. They are commonly referred to as 'terrestrial'
systems as opposed to satellite systems.
Satellite communication systems differ from terrestrial systems in that the transmitter is not
based on the ground but in the sky: the transmitter here consists of a ground-based part called
the uplink, and the satellite-based part that 'reflects' the signals towards the receivers. This
part is called the transponder.
Purpose
Satellites come in many shapes and sizes and have many uses. The first artificial satellite,
called Sputnik, was launched by the Soviet Union in 1957 and was the size of a basketball. Its
purpose was simply to transmit a Morse code signal repeatedly. In contrast, modern satellites
can receive and transmit hundreds of signals at the same time, from simple digital data to
complex television programmes. They are used for many purposes such as television
broadcasting, amateur radio communications, Internet communications, weather forecasting
and Global Positioning Systems (GPS).
Communications satellites act as relay stations in space. One could imagine them as very
long, invisible poles that relay high frequency radio waves. They are used to bounce
messages from one part of the world to another. The messages can be telephone calls, TV
pictures or Internet connections. Certain communications satellites are, for example, used for
broadcasting: they send radio and TV signals to homes. Nowadays, there are more than 100
such satellites orbiting Earth, transmitting thousands of different TV (and radio) programmes
all over the world.
Other applications: remote-sensing satellites
Military, government, weather, environment, scientific, positioning
Remote-sensing satellites study the surface of the Earth. From a relatively low height (480
km) up, these satellites use powerful cameras to scan the planet. The satellite then transmits
valuable data on the global environment to researchers, governments, and businesses
including those working in map making, farming, fishing, mining and many other industries.
Instruments on remote-sensing satellites gather data about features such as the Earth's plant
cover, chemical composition and surface water. Remote-sensing satellites are also used to
study changes in the Earth's surface caused by human activity. Examples of this kind of
observation include investigations into presence of ozone and greenhouse gasses in the
atmosphere, the desertification in West Africa and deforestation in South America.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Weather satellites record weather patterns around the world. Almost all countries use the data
coming from satellites like TIROS (Television Infrared Observational Satellite) ENVISAT to
forecast weather, track storms and carry out scientific research. TIROS is part of a system of
weather satellites operated by the National Oceanic and Atmospheric Administration
(NOAA). There are two TIROS satellites circling Earth over the poles. They work with
another set of satellites in geosynchronous orbit called Geostationary Operational
Environmental Satellites (GOES), such as the Meteosat satellites. Using this group of
satellites, meteorologists study weather and climate patterns around the world.
Many satellites in orbit conduct scientific experiments and observations. SOHO (SOlar and
Heliospheric Observation) for instance is an international project managed by Europe and the
United States. Its very sophisticated instruments can measure activity inside the Sun, look at
its atmosphere or corona and study its surface. SOHO does not orbit Earth. In fact it orbits the
Sun, about a million miles away from Earth. In that position neither the Moon nor the Earth
can block its clear view of the Sun.
The military have developed the Global Positioning System (GPS), but now people are using
these satellite services to determine their exact latitude, longitude and altitude wherever they
are in the world. GPS satellites can be used for navigation almost everywhere on Earth: in an
airplane, boat, or car, on foot, in a remote wilderness, or in a big city. GPS uses radio signals
from at least three satellites in sight to calculate the position of the receiver.
Military and government institutions make extensive use of satellites for a mixture of
communication, remote sensing, imaging, positioning and other services, as well as for more
secret applications such as spying or missile guidance. Extremely useful civilian technology
spin-offs resulted from developments in this sector, although GPS originated as a military
application. The domains of image processing and image recognition also benefited greatly
from Military Research and Development.
Although the purpose of this report is not to train future satellite engineers, there are certain
parts of a satellite system that are worth knowing about and which can help the reader
understand how satellites behave and how they can be used for different purposes. From this
point onwards we will focus almost exclusively on communication satellites, particularly
those parts and elements that are relevant to satellite communications.
The two most important elements of the communications system are the satellite itself and the
Earth station.
Earth station is the common name for every installation located on the Earth's surface and
intended for communication (transmission and/or reception) with one or more satellites. Earth
stations include all devices and installations for satellite communications: handheld devices
for mobile satellite telephony, briefcase satellite phones, satellite TV reception, as well as
installations that are less familiar, eg VSAT stations and satellite broadcast TV stations. The
term Earth station refers to the collection of equipment that is needed to perform
communications via satellite: the antenna (often a dish) and the associated equipment
(receiver/decoder, transmitter).
Antennas vary in size to match the particular service for which they are designed. For
example, a 70 cm antenna may be sufficient for direct reception of satellite TV programmes
in the home, but would not be suitable for, for example, transmitting television programmes.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Handheld satellite telephone, antenna for satellite
TV reception, satellite transmitting Earth station
The other part of the Earth station is the application device which, in the case of reception,
translates radio signals into information that can be displayed on a TV screen or processed by
a computer. In the case of transmission, this device will transform information into a signal
that is suitable for transmission via the antenna, using modulation, amplification and other
processing techniques. In the case of VSAT- type two-way systems, both send and receive
functions can be carried out at the same time.
The two main parts in the sky common to all satellites are called the payload and the bus.
The payload represents all equipment a satellite needs to do its job. This can include
antennas, cameras, radar and electronics. The payload is different for every satellite. For
example, the payload for a weather satellite includes cameras to take pictures of cloud
formations, while the payload for a communications satellite includes large antennas to
transmit TV or telephone signals to Earth.
The transponder is the key component for satellite communications: it is the part of the
payload that takes the signals received from the transmitting Earth station, filters and
translates these signals and then redirects them to the transmitting antenna on board.
Communications satellites carry a large number of transponders on board (normally from six
to more than 24), enabling them to deliver multiple channels of communication at the same
time.
These
channels
are
called
carriers.
There are two main types of transponders. The 'bent pipe repeater' does not actually process
the signal at all. The second type of transponder, the 'onboard processor', can introduce digital
detection for the uplink signal and subsequent digital switching and modulation for the
downlink. Onboard processing is a major step in the implementation of new technologies
onto satellites. In the case of Iridium and many of the Internet access satellites, satellites act
as mini switchboards in the sky.
Communications satellites carry, as part of their payload, antennas that receive the original
signal from the transmitting Earth station and re-transmit this signal to the receive stations on
Earth. The antennas that were used in the past to do this were omni-directional (transmitting
signals in every direction) and not very effective. They were replaced by more efficient highgain antennas (most often dish shaped) pointing quite precisely towards the areas they were
servicing. To allow for flexibility in services or areas covered, later developments allowed
the re-pointing of the so-called steerable antenna to cover a different area or to reshape or
reformat the beam. Future developments will allow for a highly precise and efficient
reshaping of the transmitted beam in order to cover very small areas (pencil beams). This will
greatly facilitate the differentiation of services within large regions. The antennas on board
www.Vidyarthiplus.com
www.Vidyarthiplus.com
the satellite are typically limited in size to around 2-3 m by the space that is available on the
satellite structure.
Communications satellite
Bus: physical platform, remote control
The bus is the part of the satellite that carries the payload and all its equipment into space. It
is the physical platform that holds all the satellite's parts together and that provides electrical
power, navigation, control and propulsion to the spacecraft. The bus also contains equipment
that allows the satellite to communicate with Earth, a kind of 'remote control'.
Orbits:
GEO,
MEO,
LEO,
elliptical,
polar
The most common type of communications satellites, particularly the broadcast satellites like
AfriStar, Intelsat, PanAmSat, Eutelsat and ASTRA, are in geosynchronous orbit (from geo =
Earth + synchronous = moving at the same rate). That means that the satellite always stays
over one spot on Earth. It does this by placing the satellite in a position 35,786 km out in
space perpendicularly above the equator. The imaginary ring around the Earth where all
geostationary satellites are stationed for their lifetime is called the Clarke belt. The
consequence of this type of fixed location is that Earth stations (receive as well as transmit
stations on the Earth surface) can almost be permanently fixed because they are constantly
pointed to the same point in the sky where they 'see' the satellite.
A medium Earth orbit (MEO) satellite is one with an orbit from a few hundred miles to a few
thousand miles above the Earth's surface. Satellites of this type are in a higher orbit than low
Earth orbit (LEO) satellites, but lower than geostationary (GEO) satellites. The orbital
periods (the time in between two successive passes over one particular place on Earth) of
MEO satellites range from about 2 to 12 hours. Some MEO satellites orbit in near perfect
circles, therefore they have constant altitude and travel at a constant speed. Others have a
more elliptical shaped orbit, which results in different fly-over times according to the place
on Earth from where they can be seen. A fleet of several MEO satellites with properly
coordinated orbits can provide global coverage. There are several advantages of the use of
MEO satellites: because they are closer to the Earth's surface than geostationary satellites,
they require less power to transmit. The Earth stations (transmitters and receivers) by
consequence can be much smaller and have a small rod-shaped antenna. It is possible to use
mobile and even handheld terminals with such systems.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Low earth orbiting satellite system
A low Earth orbit (LEO) satellite system consists of a large number of satellites each in a
circular orbit at a constant altitude between 320 and 800 km. Because they orbit so close to
Earth, they must travel very fast so gravity does not pull them back into the atmosphere.
Satellites in LEOs circle around the Earth at 27,359 km per hour. The orbits take the satellites
over the geographic poles. Each revolution takes from less than 90 minutes up to a few hours.
The fleet is arranged in such a way that from any point on the surface at any time at least one
satellite is in line of sight. The system operates in a cellular network structure (almost like
mobile phones). The main difference is that in a mobile telephone network the relay towers or
aerials are fixed on the Earth while with satellites these aerials (called transponders or
wireless receiver/transmitters) are moving in space. LEO systems may form the space
segment of future mobile phone systems (such as S-UMTS) that will allow true mobile,
global, broadband multimedia connectivity. But although telecoms experts predicted a bright
future for this technology in the beginning of this century, to date only a few systems have
actually got off the ground.
Footprints: global, regional, spot beams
The area on Earth that the satellite can 'see' (or reach with its antennas) is called the satellite
'footprint'. A satellite's footprint refers to the area over which the satellite operates: the
intersection of a satellite antenna transmission pattern and the surface of the Earth.
Global coverage requires that the pattern of satellite antenna transmission covers the largest
possible portion of the Earth that can be viewed from the satellite. For geostationary
satellites, the beam width for global coverage is about 17.4 degrees.
No satellite can cover the whole surface of the Earth at one time: to achieve a global
coverage, multiple transmission beams from at least 3 different satellites are combined.
Combining footprints from Intelsat APR-1, 511 and 701 providing global coverage
The map above shows examples of how different satellites cover different areas. The
combined Intelsat satellite footprints on this map cover the whole Earth. A person in
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Australia can use this satellite to communicate with anyone in Alaska. In combination with
the regional beams from these satellites, communication can be established between many
areas simultaneously.
Regional or zone coverage is the result of a partial illumination of the global coverage area.
The area may have a simple shape such as a circle or ellipse or may be irregularly shaped
(contoured) to cover certain areas most effectively, for example the shape of a continent or
sub-continent. Typical regional beams measure around 5 degrees in width.
Regional coverage of the Eutelsat W1
Spot beam coverage towards South Africa from the Eutelsat W1
Spot beam coverage is an area that is much smaller than global coverage. The beam width is
reduced to around 2 degrees. Spot beams have the advantage of high antenna gain, but are
disadvantaged because they can only cover a smaller area. This drawback can be overcome
by the combination of multiple spot beams.
Most geostationary telecommunication satellites cover large regions (continents or subcontinents). Sometimes satellites cover different areas at the same time from where they are
positioned. For example: the Eutelsat W1 satellite, a typical broadcast satellite, positioned at
10 degrees East, provides a high-power coverage of Europe with a total of 20 channels. In
www.Vidyarthiplus.com
www.Vidyarthiplus.com
addition, the satellite provides a high-power steerable narrow coverage carrying another eight
channels directed towards southern Africa (see map above).
Being on the edge of the satellite footprint means the curvature of the Earth starts to disrupt
transmission. It also means being further away from the satellite and therefore having to
transmit or receive over larger distances through the atmosphere than would be required if
transmitting/receiving from the centre of the footprint. Antenna size and power by
consequence are invariably increased at the edge of the footprint. These values can be
deducted from the footprint maps that are published by satellite service operators (see maps
above). The numbers on the circles on the maps above indicate the signal strength received at
that location expressed in dBW. From tables like the one below, users who wish to receive a
transmission can read what size antenna they need. The size varies depending on the
meteorological conditions of the location: places with regular heavy rainfall will need the
larger
dimension.
Antenna Size and Signal Strength
Frequency bands
Satellite communications, like any other means of communication (radio, TV, telephone, etc),
use frequency bands that are part of the electromagnetic spectrum. The electromagnetic
radiation spectrum starts with the longest waves (including those in the audible range) and
extends through radio waves and the visible light, which is effectively a very small part of the
spectrum, all the way to the extremely short wavelengths such as radioactive radiation.
Within this broad range of frequencies, the International Telecommunications Union (the
United Nations institution that regulates worldwide use of airwaves) has allocated parts of the
spectrum that are suitable for and dedicated to transmission via satellite. Some of these bands
are exclusively dedicated to satellite transmission; others are shared with terrestrial
transmission
services.
Satellite communications spectrum
The satellite transmission bands that are of interest to us are the C-, Ku- and Ka-bands.
C-band is the oldest allocation and operates in the frequency range around 6 GHz for
transmission (uplink) and between 3.7 and 4.2 GHz for reception (downlink).
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Ku-band is the most common transmission format in Europe for satellite TV and uses around
14 GHz for uplink and between 10.9 and 12.75 GHz for downlink.
Ka-band uses around 30 GHz up- and between 18 and 20 GHz downlink frequency.
C-band and Ku-band are becoming congested by an increasing amount of users, so satellite
service operators are more and more turning to the use of Ka-band.
The selection of the band is not something that individual service providers decide, but is
rather chosen by large satellite operators based on different factors:
Availability: C-band is still the most widely available worldwide. Ku-band is
becoming more available recently in regions which were less covered in the past
(South America, Asia, Africa)
C-band is more prone to interference from other transmission services that share the
same frequencies (adjacent satellites or terrestrial transmissions) than the higher bands
While the C-band technology is cheaper in itself, it requires larger dishes (1 to 3 m)
than Ku- and Ka-band (0.6 to 1.8 m) and therefore imposes relatively higher
(installation) costs on the end-user
Ku- and especially Ka-band make better use of satellite capacity
Higher frequency bands (Ku- and especially Ka-) suffer significantly more from
signal deterioration caused by rainfall: to ensure availability in bad weather
conditions, the signal has to be much stronger. Note that 0.1% of unavailability means
in fact that the service will be interrupted for almost 9 hours over a 1-year period. 1%
unavailability represents 90 hours or almost 4 full days
Satellite control and lifetime
In principle, geostationary satellites occupy a fixed position in space and consequently the
ground-based antennas do not need to be constantly redirected to follow the satellite‘s
movements. The fact that the orientation of ground-based antennas is fixed is a major
advantage of the geostationary satellite orbit used by satellite broadcasters.
In practice however, the satellite wanders slightly around its nominal orbital position under
the gravitational influence of bodies such as the Sun and the Moon, as well as other
influences such as Sun radiation pressure and Earth asymmetry.
It is therefore necessary to take corrective actions in order to keep the satellite within
acceptable margins from its ideal position. This is achieved by activating the so-called
‗thrusters‘ that are mounted on the body of the satellite as part of its propulsion system.
As long as the satellite has enough fuel left to operate its thrusters, it can be kept in the
correct position. As soon as the satellite is out of fuel, it will drift out of control and into
space, which brings an end to its operational life. The satellite service operator can decide to
save on fuel (and by consequence extend the lifetime expectancy of a satellite) by allowing
the satellite to drift a little bit. Although this may bring down the costs for the communication
via the satellite considerably, there is a consequence on the Earth station side. These stations
have to be equipped for tracking (following the drift of) the satellite. The Earth stations that
are used with LEO and GEO systems use omni-directional antennas that make precise
pointing of the antenna unnecessary.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
However, for this application, the ability to ‗see‘ the satellite (line of sight should not be
obstructed by walls, roofs, excess foliage) is still required, which means that indoor use is
excluded.
The communication functions of a satellite (antennas, processors) are powered by electricity
provided through a combination of solar energy and batteries. These batteries automatically
take over the power supply from the large wing-shaped solar cell panels at moments when the
satellite
finds
itself
in
the
shadow
of
the
Earth.
LEOs and MEOs spin around the Earth at high speeds in order to resist the Earth‘s
gravitational forces. They are designed to be cheaper and therefore are smaller and lighter
than large GEOs. They take less fuel to correct their flight paths and in most cases have a
shorter life expectancy than GEOs. LEO operators expect to renew their satellite fleet
between 5 and 7 years. GEO operators estimate the lifetime of their satellites to be between
10 and 12 years.
Applications of Satellite Communications Technology
Satellite communications systems differ from terrestrial systems in one obvious and
important aspect - the transmitter is no longer located on the ground but rather in the sky.
Because it's positioned in space, it is able to serve a very large geographical area. This has
several
advantages.
As few as three geostationary satellites can cover almost the whole of the Earth's surface,
with the exclusion of the sparsely populated Polar Regions. To achieve the same coverage by
terrestrial means would require a very large and expensive network of ground-based
transmitters.
Services can be established quickly, since coverage is available for everyone from the day
transmissions start. There is no need for a phased introduction as is the case with groundbased transmissions where antennas need to be added to meet the expansion of the serviced
area. With satellite communications, even users in very remote locations enjoy the same level
of
service
as
any
other
user
in
the
coverage
area.
Satellites can overcome national boundaries, providing possibilities for truly international
services.
Although terrestrial systems may be better suited generally to provide communications
services, in many cases the need to be connected can only be met effectively and rapidly by
the implementation of satellite services.
Radio and TV Broadcasting
The most familiar use of satellites is television broadcasting. TV satellites deliver hundreds of
television channels every day throughout the world. These satellites are even used to supply
television signals to terrestrial transmitters or cable-head end stations for further distribution
to the home, or to exchange signals between television studios. The bandwidth required to
transmit multiple programmes at the same time can easily be provided using satellites. In
addition, developments in broadcast technology (digitalisation, multiplexing and
compression) allow different types of transmissions to be sent sharing the same satellite
signal. To address the largest possible number of viewers, the cost to the viewers must be
small, requiring small receive antennas and cheap receivers.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Satellite service operators such as Intelsat, Eutelsat, ASTRA, PanAmSat, NileSat, AsiaSat
and AfriStar carry the signals for satellite broadcasters such as BSkyB, CanalPLus,
Multichoice, DirecTV and WorldSpace. These in turn bundle programmes from different
public and private broadcasters in order to make them accessible for their viewers in an open
('free-to-air') or closed (restricted) way. Some satellite broadcasters bundle special offers into
so-called 'bouquets of services' that are offered at additional cost.
The importance of satellite TV broadcasting is enormous: at the moment Eutelsat broadcasts
over 900 TV channels and 560 radio stations to more than 84 million satellite and cable
homes, the vast majority of them via the five HOT BIRD satellites at 13 degrees East.
ASTRA, another European direct-to-home satellite system, transmits more than 1,000
television and radio channels in analogue and digital format to an audience of more than 89
million homes throughout Europe. It does this via 12 satellites at the orbital positions of 19.2
degrees, 24.2 degrees and 28.2 degrees East.
In order to make their offer more attractive to broadcasters, satellite service operators try to
place their satellites aimed at the same regional market as far as possible in one single
position. This is why we find the Eutelsat HotBird constellation at 13 degrees East or the
ASTRA position at 19 degrees East, where in each case a number of satellites are clustered.
In consequence, viewers need to point their antennas in one direction only in order to receive
a large number of satellite programmes coming effectively from different satellites but
looking as if they come from only one.
Satellite TV reception antenna
There are many different applications of satellite TV viewing, depending on the needs and
objectives of the broadcaster or the viewers. Direct-to-Home or DTH - also called DBS or
Direct Broadcast via Satellite - speaks for itself: the TV programmes are aimed at the
consumer and transmitted in such a way that residential customers can buy and install the
equipment to receive the programmes at the lowest possible expense. This requires a network
of local resellers that offer the hardware (satellite receive equipment), installers (technicians
that assist the customer in setting up the receive equipment) and service suppliers.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
The Eutelsat HotBird position at 13 Degrees East
Programme suppliers can opt for free-to-air programming, where every viewer with a
standard satellite receiver can receive and view the programme without restrictions.
However, some programmes contain information that is not for public viewing. To protect
these programmes so that only those who are the targeted audience will be able to view the
contents, some type of conditional access can be applied. What happens is that programmes
are encrypted and must then be unscrambled with a specific device (usually integrated in the
receiver and therefore often called an Integrated Receiver Decoder or IRD) to view the
contents.
The
move
from
analogue
to
digital
services
The number of analogue channels transmitted and the number of homes receiving analogue
continues to decrease. However, analogue takes up a significant portion of the range of
frequencies available. In addition, even in space, transmission capacity is limited. Where an
analogue signal will occupy a full transponder consuming a bandwidth of 36 or even 72
MHz, digital broadcasting makes it possible to compress signals, vastly increasing the
number of channels available by combining multiple programmes onto one single
transponder.
Nowadays, most digital TV signals are compliant to the MPEG-2/DVB standard and can be
received with standard consumer digital reception equipment that decodes the signal and
separates the different types of content out of the data stream. With transmission bit rates
between 34 and 38 Mbps, a digital signal can carry a combination of up to 12 television
channels,
along
with
numerous
radio
transmissions
and
data.
Consequently, it is digital television that is now driving the satellite TV market, aiming at
www.Vidyarthiplus.com
www.Vidyarthiplus.com
large numbers of consumers equipped with small antennae of typically 50 to 80 cm in
diameter in Western Europe and 1.2 to 1.5 m in diameter in other regions. Digital technology
has spurred the development of interactivity and aided the convergence of the worlds of
television,
radio,
personal
computing
and
telephony.
It appeals to the end-user by providing better video and audio quality, improved programme
and
service
choice
and
greater
control
over
content
delivery.
Pay TV is a service where the viewer is charged according to the programmes she/he views,
selected from the TV programme on offer. Video on Demand and Near Video on Demand
enables individual viewers to decide at any given moment (in the case of real Video on
Demand) or at a later time to be scheduled (in the case of Near Video on Demand) to view
the programme of his/her own choice. IP-TV is a Video on Demand application using
compression technologies that allow highly efficient distribution of video and audio using
common multimedia formats such as MPEG-1, 2 and 4. Streaming technologies are based on
the Internet Protocol, which allows delivery over all kinds of networks including the Internet.
The latest development in advanced television applications including delivery via satellite is
the Personal Video Recorder (PVR). These devices are used both to digitally record and play
back programmes: the programme provider sends the content the normal way (TV networks,
cable, satellite). At the receive end the content is fed into the PVR. Compression such as
MPEG-2 and MPEG-4 is used to decrease the bandwidth. The PVR unit is basically a
computer that saves the incoming live TV signal from the cable or antenna onto its large
internal hard drive. In this way, the viewer can play it back with a few seconds delay. The
viewer is then watching off the computer hard drive, instead of straight from the antenna or
cable connection. This allows the viewer to rewind, slow down, stop and pause at any point.
Broadcasters and content providers are able to improve their service offers. New satellite
facilities that are being offered or under development are Pay TV services, (Near) Video on
Demand, IP-TV delivery and Personal TV using devices such as the Personal Video Recorder
(PVR) or the Multimedia Home Platform (MHP), services that are called interactive TV or
enhanced TV. While the concept of interactive TV (iTV) is not new (there have been
numerous interactive TV pilot services and some limited applications have been rolled in
parts of the world), the broadcast world seems to be waiting for final and concrete iTV
standard protocols and definitions to give the public uptake the expected boost. Interactive or
enhanced services such as electronic programme guides, on-screen games, quizzes, enhanced
TV with retrievable background information on demand, recording, rewinding, even Internet
services such as mail and web browsing, are all applications that are not only appealing new
services for leisure TV but will also find applications within the education domain where the
high degree of penetration of TV sets and transmit capacity combined with the low threshold
of the television programmes for the end-user, may well become a strong argument for the
use
of
interactive
TV
in
educational
communities.
The Multimedia Home Platform (MHP) is a software specification that will be implemented
in set-top boxes, integrated digital TV receivers as well as multimedia PCs. The MHP will
connect the broadcast medium with the Internet, television, computer and telecommunication
and enables digital content providers to address all types of terminals ranging from low-end
to high-end set-top boxes, integrated digital TV sets and multimedia PCs.
But even if the broadcasting world is rapidly going digital, analogue TV and radio are set to
remain for several years yet. For some services, analogue is still the most attractive option
due to the large installed audience base and the widespread availability of consumer
www.Vidyarthiplus.com
www.Vidyarthiplus.com
equipment that is less expensive than digital equipment. Analogue is particularly popular for
free-to-air broadcasting. Moreover, the capacity to transmit several audio sub-carriers on one
analogue TV signal allows multilingual TV programmes. As for analogue radio broadcasting,
up to eight mono channels or four stereo pairs can be transmitted as sub-carriers of an
analogue television signal. However, due to the heavy use of analogue sub-carriers and the
decreasing number of transponders used for analogue TV, analogue sub-carriers are
becoming less and less available. Service providers considering new audio services should
therefore consider digital. When you take into account the cost of transmission and the
numerous innovative applications that are becoming available, such as the PVR, encryption
and the ability to carry data for multicasting, the appeal of digital broadcasting is hard to
resist.
Business radio and TV
Narrowcasting or business TV and radio is a term used for satellite broadcasters who use
transmission time to reach a very specific audience. Technically speaking, there is no
difference with broadcast satellite TV applications described in the previous section. Digital
television has made it possible to distribute information within organisations and companies
that are geographically dispersed, or to deliver distance education. Similarly, digital radio
allows for the delivery of radio services to relatively small closed user groups.
MPEG-2/DVB technology is the dominant standard for digital television, but other computerbased media coding techniques (such as MPEG-1, Real Video, etc) are also used to embed
video and/or audio into data streams, often integrated with other multimedia or Internet
services. Transmission via satellite requires there to be digital receivers available at relatively
low prices on the consumer market. The advantage is that more advanced or popular audio
coding techniques (for example MP3) can also be used and that the same stream can be used
for other applications, such as data distribution, outside broadcast hours.
Contribution ('backhaul' and SNG)
Satellite transmission technologies can be used to bring the signal that needs to be broadcast
to the place where it can be processed and prepared for re-distribution, for example: to a
broadcaster's main studio; to a number of cable-head end stations; to an Internet Service
Provider where it can be injected into the Internet; or to a network of local Points-of-Presence
for distribution in local networks. These links respond to the need for point-to-point and
point-to-multipoint transmission and are often called a 'hop'. The signal can be digital or
analogue and can include video, audio, data or multimedia.
When used by news companies this type of contribution link is called Satellite News
Gathering (SNG). News and information are sent from a mobile station - a truck equipped
with an antenna or a suitcase uplink - through the satellite to a central point, which is in most
cases the home studio, equipped with an Earth station with a fixed antenna. The home studio
can retransmit it live or record and re-edit it for later use.
Telephony
Thin route or trunk telephony
Telecom operators have been using satellite communications for many years to carry longdistance telephone communications, especially intercontinental, to complement or to bypass
submarine cables. To the end-user this is transparent: the phone calls are routed automatically
www.Vidyarthiplus.com
www.Vidyarthiplus.com
via the available capacity at any given moment. However, the 74,000 km round trip, even at
the speed of satellite signals, takes 250 milliseconds causing a delay that makes telephone
conversation rather unnatural, hence the preference for telephony over cable.
In regions where it is not so easy to install terrestrial telephone connections because of the
low density of population or because of the nature of the terrain, satellite is still being used to
connect the local switchboard to the telephone network. This technology is called thin route
or trunk satellite telephone networking. Wireless (microwave, two-way radio, etc) and optical
links, however, are replacing satellite increasingly in this area. With the advent of true mobile
telephony (cellular systems such as GSM, the Global System for Mobile communication),
and new end-user connection technologies such as Fixed Wireless Local Loop where there is
no longer a need to wire up each subscriber, satellite thin route telephony is becoming less
and less popular. In the future, satellite thin route telephony is expected to only hold a small
share of trunk telephony in areas that are otherwise impossible to reach.
Mobile satellite telephony
Mobile telephony allows the user to make telephone calls and to transmit and receive data
from wherever he/she is located. Digital cellular mobile telephony such as GSM has become
a worldwide standard for mobile communications, but its services lack coverage over areas
that are sparsely populated or uninhabited (mountains, jungle, sea), because it is not
economically viable or practical for the network operators to build antennas there. Satellite
telephony seems to be able to provide a possible solution to the problem of providing voice
and data communications services to these other locations.
Inmarsat
Inmarsat was the world's first global mobile satellite communications operator, founded in
the late 1970s. It focuses on communications services to maritime, land-mobile, aeronautical
and other users. Inmarsat now supports links for phone, fax and data communications at up to
64 Kbps to more than 210,000 ship, vehicle, aircraft and portable terminals.
The range of Inmarsat systems includes mobile terminals from handhelds to consoles, with
easy set-up mechanisms that allow users wherever they are to connect via a global fleet of
geostationary Inmarsat satellites to the terrestrial communications network and to carry out
telephone conversations, data transfers, and increasingly multimedia applications and Internet
access. Inmarsat is aimed at professionals who need a reliable communications system
wherever they are: ship owners and managers, journalists and broadcasters, health and
disaster-relief workers, land transport fleet operators, airlines, airline passengers and air
traffic controllers, government workers, national emergency and civil defence agencies, and
peacekeeping forces. The cost is rather high while the capacity is still rather limited:
voice/fax/data systems achieve a maximum data rate of 64 Kbps at connection costs starting
at almost US$ 3 per minute. Dedicated mobile IP systems can achieve a maximum download
speed of up to 144 Kbps.
LEO-based telephony
Another mobile satellite communications system is the Globalstar satellite telephone
network. Globalstar, which was established in 1991 and began commercial service in late
1999, offers service from virtually anywhere across over 100 countries, as well as from most
territorial waters and several mid-ocean regions. Globalstar deploys handheld telephone sets
that switch between the terrestrial wireless telephone network (GSM) and a LEO-based
www.Vidyarthiplus.com
www.Vidyarthiplus.com
satellite network in places where no terrestrial GSM network is available.
Globalstar telephony coverage map (April 2003)
Signals from a Globalstar phone or modem are received by one of the 48 LEO satellites and
relayed to ground-based gateways, which then pass the call on to the terrestrial telephone
network.
Globalstar LEO Satellite Telephone Service
A similar LEO satellite communications system is Iridium. Both Iridium and Globalstar are
based on constellations of satellites that can communicate with small handheld telephone sets
as well as between themselves, effectively acting as switchboards in the sky. The satellites
orbit at approximately 800 km above Earth and provide worldwide mobile telephony and
Internet access. Because of the short delay times (thanks to the low height and thus short
distance between Earth station and satellite) it is theoretically possible to introduce
videoconferencing and interactive multimedia to both fixed (with outdoor antenna) and
mobile transceivers at a later stage. It is easy to understand how LEO services would be
suited for urban or rural areas that are not connected to a broadband terrestrial infrastructure
or that cannot be covered economically using traditional terrestrial infrastructures.
GEO-based telephony
An alternative approach to satellite telephony uses a geostationary satellite instead of the
LEO. This results in longer delays (approximately half a second) but switching on board the
satellite reduces this inconvenience as much as possible. The Thuraya mobile satellite system
was launched in 1991, its satellite maintains a geo-synchronous orbit at 44 degrees East.
Thuraya operates effectively in both satellite and GSM environments. Its satellite network
capacity is about 13,750 telephone channels. When within reach of a GSM network,
Thuraya's mobile phone acts as an ordinary GSM handset. Outside this GSM coverage it
seamlessly switches to become a satellite telephone. The system can be used for voice, data,
fax, SMS and location determination (GPS-like). Thuraya handsets and subscription services
are distributed through service providers (mobile telecom companies) located in 106
countries in Europe, Africa, the Middle East, Asia and India. Through roaming agreements,
www.Vidyarthiplus.com
www.Vidyarthiplus.com
customers can use their handsets in a number of other countries as well.
Satellite Telephones
Thuraya GSM/Satellite Telephone Service
Satellite based mobile telephony: Conclusion
The deployment of these LEO-based services has not been as successful as had been hoped
by the providers. While initially it took a long time before the first service became available,
the competitors, in this case cellular mobile telephony, eg GSM, had already won a market
share that was lost for the new technology. The receivers were initially too expensive (about
US$ 2,000), the communications costs too high (from less than US$ 1 to more than US$ 5
per minute depending on the call destination and the payment programme, Thuraya being
cheaper in general) and the service had a reputation of not being very reliable: the technology
did not seem to be sufficiently mature and calls were frequently interrupted. The transmission
speed was very low (maximally 9.8 Kbps which is comparable to GSM-based transmissions).
Data, broadband and multimedia services
When we consider that TV and radio, telephone and fax nowadays are all being digitised and
packaged in datagrams (small data packets) to be transported on any type of network, it is
easy to understand that any digital content can be distributed in much the same way. This is
obviously the case with data over satellite communications networks.
Normally, data does not suffer from the small delay caused by the long transmission path via
satellite. Telecoms and global telecommunications carriers have been using satellite data
links to complement existing wire-based data networks for many years. Large, multinational
companies or international organisations in particular have exploited the ability to transfer
www.Vidyarthiplus.com
www.Vidyarthiplus.com
data over satellite networks since the time when smaller and cheaper satellite terminals and
more flexible satellite network services became available. Satellite services could support the
different services they were interested in, such as data collection and broadcasting, image and
video transfer, voice, two-way computer transactions and database inquiries.
The development of common datagram and data transport standards, and the digitisation of
voice, image, video and multimedia in general, have led to a shift to Internet Protocol (IP)based satellite communication systems that integrate seamlessly into the Internet world. It is
useful at this point to make a distinction between three different types of applications.
IP over satellite for ISPs
Telecoms and connectivity providers have started using satellite communications to bypass
the increasingly clogged terrestrial and submarine networks to complement their backbone
connectivity or to supplement them where they are not yet available. This approach takes
advantage of the fact that satellite is not a real point-to-point connection like cable, but a
connection that allows the delivery to multiple points at the same time. This allows for
simultaneous updating of multiple caching, proxy or mirroring servers.
IP via satellite for ISPs
In much the same way, it is possible to push Internet content to and even over the edges of
existing networks. When it is necessary to provide large amounts of content to places that are
poorly connected to the Internet, it is now possible to push content to local PoPs (Point of
Presence) edge servers. These can then in turn serve as ISPs to the local users or user
communities.
Although cable may be the preferred way to connect areas with a concentrated demand for
access (like cities or densely populated areas), satellite communications can still assist local
ISPs especially when there is not yet a reliable wired connection to the Network Access
Points or the Metropolitan Access Exchange points on the backbone. This is also practical
when a large quantity of content needs to be transported between two particular points and
high-capacity cable connections are not available.
Corporate or institutional VSAT networks
A particular application of data via satellite is VSAT (Very Small Aperture Terminal)
networks. Organisations with many remote affiliates can create a private high-speed satellite
www.Vidyarthiplus.com
www.Vidyarthiplus.com
intranet, which links the main office reliably with all local sites. Within and amongst
institutions there is an ever-growing need to communicate and to enhance the existing
networks, both human and physical. These networks, comparable to the corporate or
institutional networks of large multinational companies or international institutions, today
need high speed, reliable and cost-effective communications. This is especially true when the
locations are dispersed over remote regions and multiple countries, and barely connectable
via a terrestrial network infrastructure. In this case, satellite communications are an effective
way to provide private or secure data networks. VSAT can provide a complete network
capable of connecting all sites and connecting to the Internet, wherever the facilities are
located or wherever facilities will be located in the foreseeable future, including the homes of
staff, members, students etc.
VSAT stands for Very Small Aperture Terminal and refers to combined send/receive
terminals with a typical antenna diameter of 1 to 3.7 m linking the central hub to all remote
offices and facilities and keeping them all in constant immediate contact. VSAT networks
offer solutions for large networks with low or medium traffic. They provide very efficient
point-to-multipoint communication, are easy to install and can be expanded at low extra cost.
VSAT networks offer immediate accessibility and continuous high-quality transmissions.
They are adapted for any kind of transmission, from data to voice, fax and video.
The great advantage of VSAT is its flexibility. It permits any kind and size of network based
around a central hub and remote locations. This makes them particularly useful for corporate
networks or, for example, communication between educational, government or health-care
institutions. Through a VSAT network, a corporation can communicate freely and constantly
with branch offices:
Voice and fax transmissions
Local Area Network interconnection
Data broadcasting
Videoconferencing
In-house training
Various network topologies, protocols and interfaces are available to implement VSAT
communications applications. It is possible to lease satellite capacity on a carrier-per-carrier
basis for any type of VSAT network. VSAT operators offer turnkey solutions including
installation, licensing and maintenance.
VSAT networks are generally 'star' networks. This means there is a central location that acts
as a hub through which remote locations can transmit and receive data to and from each
other. They can be one- or two-directional.
VSAT Star-shaped Networks
www.Vidyarthiplus.com
www.Vidyarthiplus.com
A mesh configuration enables remote terminals to contact each other without passing through
the hub and is particularly appropriate for large corporations where local facilities need to be
in
contact
with
other
regions.
VSAT Mesh-shaped Networks
New VSAT technologies and services are being offered to support these demands.
Employing one- or two-way satellite communication, IP-compatible solutions enable private
network operators to provide their network members with enhanced speed and reliability for
institution-wide communication. Networks featuring PC-based user terminals equipped with
data cards linked to a receive/transmit satellite dish ensure fast Internet access and fast,
simultaneous data broadcast to all user terminals via satellite. Intranets, Extranets, Internet
access and email messaging are becoming just as important as the traditional video, voice and
data requirements of videoconferencing, business TV and data-file exchange. Different levels
of VSAT services can deliver various options depending on the requirements of each
network.
Capacity can be booked on a full-time basis with prior reservation for minimum utilisation of
any 24-hour contiguous period per occasion or on an ad-hoc basis according to a pre-arranged
plan of identical transmissions during specific periods, or for occasional use.
PAMA (Permanently Assigned Multiple Access) means having a permanently assigned
frequency channel that provides dedicated bandwidth, through which the network can send
data, voice or video. This may be required when larger amounts of data continuously need to
be transmitted between each element of the network. This can be the case in mission-critical
real-time processes such as process monitoring, distributed processes and data collection, but
also
in
media
streaming
(as
in
TV
and
radio
broadcasting).
DAMA (Demand Assignment Multiple Access) provides intermittent communication or
managed VSAT services on a pay-per-usage basis. With DAMA, satellite capacity is
instantaneously assigned and adapted according to immediate traffic needs. It is available
when needed, and users only pay for what they use. DAMA can support changing or
intermittent image-based or heavy data transfer needs and is best suited where multiple
services are integrated into a single network, since it supports telephony, low- and high-speed
data, video and multimedia applications. In order to be cost effective, DAMA requires the
network to be designed quite precisely to meet the organisation's needs for data distribution
and communications. Peak and minimal usage levels need to be particularly estimated.
DAMA is a highly efficient means of instantaneously assigning telephony and data channels
www.Vidyarthiplus.com
www.Vidyarthiplus.com
in
a
transponder
according
to
immediate
traffic
demands.
Advantages of VSAT networks include:
Wide geographic coverage
Independence from terrestrial communication infrastructure
High availability
Communication costs independent of transmission distance
Flexible network configuration
Rapid network deployment
Centralised control and monitoring
Any service can be provided from telephony through to ATM, Frame Relay, and of
course, high speed broadband Internet
Disadvantages include:
VSAT services are generally expensive
VSAT services are not available for single site users, but only to multiple site
networks
The ODU (outdoor unit, antenna) may be prone to vandalism or adverse weather
conditions (lightning, storm, etc)
Requires professional installation, management, monitoring and maintenance
In some countries VSATs are heavily regulated
As with all satellite solutions, there is a latency (delay) in the signal, making
telephone and videoconferencing services more difficult
End-user services for home or small office
Broadband access for end-users is usually considered a 'wired' solution: fibre optic
backbones, cable modems on coax, xDSL and ISDN on twisted copper. ADSL can only be
provided up to a distance of between 4 and 6 km from the local telephone exchanges,
depending on various factors. The cost to upgrade the existing copper network is very high.
This means that many households, particularly those in rural and remote areas, will probably
never be able to receive ADSL. Similarly, the cost of laying bi-directional cables for
interactive TV and Internet means that cable distribution is also unlikely to be available to
those living in small towns or in the countryside.
Satellite broadband connectivity has never been considered seriously, as long as it did not
allow for interactivity. However, nowadays satellites can provide interactivity via either the
satellite return channel or by using a hybrid solution with narrow-band return path via a
telephone line. With Internet via satellite, every user with the correct equipment and living
within the satellite footprint can now have a broadband connection.
Satellite has the capability to reach everywhere, thus effectively removing local loop
difficulties, especially in areas with poorly developed infrastructure. The subscriber requests
(eg the click on a hyperlink in a web page) can still be routed through terrestrial telephone
lines, but the downloaded data can now be routed via satellite directly to the Earth station of
the end-user. The typical asymmetry of home and small business Internet use opens up the
possibility of using a slow, small pipe in one direction and a fast, wide pipe in the other. The
average user does not need in-bound high-bandwidth connectivity around the clock and needs
even less out-bound high-bandwidth. So the hybrid of high-speed satellite for in-bound
matched to a low-cost, low-speed request path may well be the most cost-effective solution.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Using phone lines and a satellite downlink path means that you don't pay for more technology
than you need.
Most Internet-type traffic is asymmetric by nature: on average, the downlink (from ISP to
end-user) is 20 times greater than the uplink (from end-user towards the Internet). It is worth
noting however, that this is not true for certain particular end-users, web builders, content
distributors etc, where the ratio is, of course, different.
One-way Satellite Internet Connection
Recent developments have made it possible to send all requests and return data through the
satellite, which is ideal for areas with a weak telephone infrastructure.
Two-way Satellite Internet Connection
Current configurations can deliver data at a rate of up to 40 Mbps, but in practice, this means
that the hub communicates with the end-user terminals at speeds of up to 4 Mbps. The
terminals have a return link to the hub depending on the set-up of the network via a telephone
modem connection or via the satellite return system with speeds ranging from 16 Kbps to 512
Kbps. The hub is continually listening for data requests from the terminals so, to the user, the
system appears to be 'always on'. It is understood that in order to use public Internet access
through the satellite effectively, the hub needs to be well connected to the Internet backbone.
Not only does this system provide a broadband connection via the satellite downlink, but it
also means that the inherent advantages of satellites in many applications can be exploited,
www.Vidyarthiplus.com
www.Vidyarthiplus.com
especially the ability to multicast or broadcast the same data to millions of users over a huge
area. By applying intelligent caching techniques and news group feeds, traffic in the networks
can be reduced and the relatively high bandwidth cost of the space link becomes insignificant
especially
when
compared
to
the
reach.
This allows not only for 'pull' services, such as high-speed web browsing, where a single user
requests a specific item, but more importantly also for 'push' or multicast services, where a
file or stream is transmitted to many users at the same time, for example, real-time
information or streamed video. This type of push service is much harder to accomplish with
traditional wire-based terrestrial Internet connection technologies because it consumes
valuable
bandwidth
on
all
branches
of
the
network.
With satellite transmission, the number of potential users that can receive and decode
broadcast data can be restricted to one user, a group of users or all users. With a point-topoint data transfer, TCP/IP is used to send data addressed to one particular user. With pointto-multipoint file download or video stream, UDP or IP multicasting is used, and the satellite
broadcasts data that can be decoded by a specific group of users.
Only authorised users can connect the base station through the Internet and operate in
interactive mode (eg initiate an online web session). Conditional access is implemented at the
DVB transport level by conventional means, using 'smart cards' or a similar technology. In
addition, every user station has a unique station identification (hardware address) that is used
at link level for individual addressing of stations. Service operators are able to set access
authorisations on a user level so that transmissions may be restricted to a closed user group,
for example, for security reasons, or to allow subscription-based services. The PC board can
also be used for receiving video and audio broadcasting services already available and
transmitted
by
digital
broadcasters
on
the
same
satellite.
Satellite Internet connectivity offers possibilities that are becoming commonly accepted in
many different end-user communities, in regions that are excluded from access until such
time as wired or wireless broadband become available. Because it is impossible to predict
when such services will become available, it may be better to opt for satellite
telecommunications technology as it is immediately available. While financially it may seem
to make sense to wait for the best solution that will become available in the future, in the
short to medium term this could mean a high cost of lost (educational) opportunity.
Educational institutions can communicate across countries, regions and cultures, share
libraries and databases of research information, or offer distance-learning services that are
based on the TCP/IP protocols. Medical institutions can develop networks for telemedicine
applications. Government entities can deliver citizen information services. Push services
enable in all instances the multicasting of video and audio streams, database downloading and
software update distribution. Access to Internet and multimedia becomes available to remote
communities,
effectively
fighting
exclusion.
To conclude, the advantages of two-way satellite Internet connectivity for end-users include:
Reception is possible with a small antenna (one already in use to receive TV can, in
many cases, be sufficient but may require adaptation)
Connection is possible almost anywhere instantly within the footprint of the satellite,
with no cabling work or delays dependent on terrestrial infrastructure, thus effectively
solving the typical 'last mile' problem
Consumer equipment is relatively low cost
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Internet connectivity can be combined with traditional broadcast technologies such as
digital TV and radio, enabling content providers to select the most appropriate
delivery means for particular content
In addition, multimedia push services via satellite, such as data broadcasting or
information streaming, are extremely efficient. In these cases, there is no need for a
return link via modem, so there is no additional cost for connectivity to the Internet
Some of the main disadvantages include:
Satellite Internet is generally more expensive than terrestrial access solutions, at least
in regions where they are available
The outdoor unit (antenna and cabling) are more prone to vandalism and weather
conditions
Bandwidth availibility is somewhat limited
Requires professional support
Not the ideal technology for videoconferencing
Mobile data communications
We talk about fixed or mobile services depending on the specific application. Fixed services
are aimed at Earth stations that stay in the same place while operating. The antenna does not
move during transmission and reception. Mobile services in contrast are aimed at users that
need to receive or transmit while moving.
Euteltracs and some Inmarsat applications are examples of mobile satellite data
communication services. Euteltracs equips cars, trucks, ships etc, with a small antenna, an onboard terminal with keyboard and LCD, plus software linking the on-board information
system via the Euteltracs Network Management Centre based in France with the vehicle's
home base. This set-up enables low data-rate services between the mobile vehicle's home
base and the vehicle itself while on the move, which allows for:
Vehicle or vessel localisation with an accuracy of 100 m
Transmission of alarm and distress messages
Message exchange between the mobile terminal and base
Data collection and transmission from the vehicle or vessel
Access to external databases for example, for weather or traffic conditions
This type of system is extremely rugged but allows only for very limited amounts of data to
be transferred. It is therefore not an evident choice for multimedia applications.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
5. Explain in detail about the cellular concept?
The cells are normally drawn as hexagonal, but in practice they are irregularly shaped, this is
as a result of the influence of the surrounding terrain, or of design by the network planners
 Advantages of cell structures:
 higher capacity, higher number of users
 less transmission power needed
 more robust, decentralized
 base station deals with interference, transmission area etc. locally
 Problems:
 fixed network needed for the base stations
 handover (changing from one cell to another) necessary
 interference with other cells
•
•
The number of cells in any geographic area is determined by
number of MS subscribers who will be operating in that area,
geographic layout of the area (hills, lakes, buildings).
Large Cells
The maximum cell size for GSM is approximately 70 km in diameter, Size is
dependent on
the terrain the cell is covering
the power class of the MS.
Generally large cells are employed in:
Remote areas, Coastal regions, Areas with few subscribers.
Large areas which need to be covered with the minimum number of cell sites.
Small Cells
support a large number of MSs, in a small geographic region,
low transmission power may be required to reduce the effects of interference.
Small cells currently cover 200 m and upwards.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Uses:Urban areas,Low transmission power required,High number of MSs
The Trade Off – Large vs Small
Network providers would like to use large cells to reduce installation and maintenance
cost, but realize that to provide a quality service to their customers, they have to
consider many factors, such as terrain, transmission power required, number of MSs
etc. This inevitably leads to a mixture of both large and small cells.
Approaches to Cope with Increasing Capacity
Adding new channels
Frequency borrowing – frequencies are taken from adjacent cells by congested cells
Cell splitting – cells in areas of high usage can be split into smaller cells
Cell sectoring – cells are divided into a number of wedge-shaped sectors, each with
their own set of channels
 Microcells – antennas move to buildings, hills, and lamp posts




•
•
•
•
•
•
•
The cells are omni-directional cells. That is each site has a single cell and that cell has
a single transmit antenna which radiates the radio waves to 360 degrees.
The problem of omni-directional cells:
As the number of MSs increases in the same geographical region, need to increase
the number of cells to meet the demand.
( Achieved by decrease the size of the cell and fit more cells into this geographical
area).
introduces co-channel and adjacent channel interference, both of which degrade the
cellular network‘s performance.
splits a single site into a number of cells
each cell behaves as an independent cell to gain a further increase in capacity within
the geographic area (since independent transmit and receive antennas are used)
Each cell uses special directional antennas to ensure that the radio propagation from
one cell is concentrated in a particular direction.
Advantages
all the energy from the cell in a smaller area 60, 120, 180 degrees instead of 360
degrees, we get a much stronger signal, which is beneficial in locations such as ―inbuilding coverage‖.
we can now use the same frequencies in a much closer re-use pattern, thus allowing
more cells in our geographic region which allows us to support more MSs.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
 Adjacent cells assigned different frequencies to avoid interference or crosstalk
 Objective is to reuse frequency in nearby cells
– 10 to 50 frequencies assigned to each cell
– transmission power controlled to limit power at that frequency escaping to
adjacent cells
– the issue is to determine how many cells must intervene between two cells
using the same frequency
www.Vidyarthiplus.com
www.Vidyarthiplus.com
6.
Explain in detail about the concept of Frequency reuse?
 each cell allocated a group k channels
– a cluster has N cells with unique and disjoint channel
 groups, N typically 4, 7, 12
 total number of duplex channels S = kN
 Cluster repeated M times in a system
 Total number of channels that can be used (capacity)
– C = MkN = MS
 Smaller cells  higher M  higher C
+ Channel reuse  higher capacity
+ Lower power requirements for mobiles
– Additional base stations required
– More frequent handoffs
– Greater chance of ‗hot spots‘
 channels unique in same cluster, repeated over clusters
 keep cell size same
– large N : weaker interference, but lower capacity
– small N: higher capacity, more interference need to maintain certain S/I level
 frequency reuse factor: 1/N
– each cell within a cluster assigned 1/N of the total available channels
 In most of the current networks, frequency reuse factor is 1.
Design of cluster size
 In order to connect without gaps between adjacent cells (to Tessellate)
 N = i2 + ij + j2 where i and j are non-negative integers
 Example i = 2, j = 1
– N = 22 + 2(1) + 12 = 4 + 2 + 1 = 7
www.Vidyarthiplus.com
www.Vidyarthiplus.com
 Next page example
– move i cells along any chain or hexagon.
– then turn 60 degrees counterclockwise and move j cells.
 Example 3.1 in page 61
 Fixed Channel Assignments
– Each cell is allocated a predetermined set of voice channels.
– If all the channels in that cell are occupied, the call is blocked, and the
subscriber does not receive service.
– Variation includes a borrowing strategy: a cell is allowed to borrow channels
from a neighboring cell if all its own channels are occupied.
– This is supervised by the Mobile Switch Center: Connects cells to wide area
network; Manages call setup; Handles mobility
 Fixed Channel Assignments
– Each cell is allocated a predetermined set of voice channels.
– If all the channels in that cell are occupied, the call is blocked, and the
subscriber does not receive service.
– Variation includes a borrowing strategy: a cell is allowed to borrow channels
from a neighboring cell if all its own channels are occupied.
– This is supervised by the Mobile Switch Center: Connects cells to wide area
network; Manages call setup; Handles mobility
www.Vidyarthiplus.com
www.Vidyarthiplus.com
 Dynamic Channel Assignments
– Voice channels are not allocated to different cells permanently.
– Each time a call request is made, the serving base station requests a channel
from the MSC.
– The switch then allocates a channel to the requested call based on a decision
algorithm taking into account different factors: frequency re-use of candidate
channel and cost factors.
– Dynamic channel assignment is more complex (real time), but reduces
likelihood of blocking
 a call is more annoying than line busy
 Guard channel concept
– Reserve some channels for handoffs
– Waste of bandwidth
– But can be dynamically predicted
 Queuing of handoff requests
– There is a gap between time for handoff and time to drop.
– Better tradeoff between dropping call probability and network traffic.
 Reduce the burden for handoff
– Cell dragging
– Umbrella cell
 major limiting factor in performance of cellular radio systems
 sources of interference:
– other mobiles in same cell
– a call in progress in a neighboring cell
– other base stations operating in the same frequency band
– Non-cellular system leaking energy into the cellular frequency band
 effect of interference:
– voice channel: cross talk
www.Vidyarthiplus.com
www.Vidyarthiplus.com
– control channel: missed or blocked calls
 two main types:
– co-channel interference
– adjacent channel interference
 cells that use the same set of frequencies are called co-channel cells.
 Interference between the cells is called co-channel interference.
 Co-channel reuse ratio: Q = D/R=sqrt(3N)
– R: radius of cell
– D: distance between nearest co-channel cells
 Small Q  small cluster size N  large capacity
 large Q  good transmission quality
 tradeoff must be made in actual cellular design
 SINR
 Power: propagation factor 2-6
– Sun, nuclear bomb
 Approximation
 AMPS example
–
=4, S/I=18dB, N needs to be larger than 6.49.
– Reuse factor 1/N small
 Relations: cochannel interference, link quality, reuse factor
 Example 3.2
www.Vidyarthiplus.com