Professional Documents
Culture Documents
Introduction
Basically there are two ways in which information of any type can be
transmitted over telecommunication media – analog or digital. Analog means that
the amplitude of the transmitted amplitude signal varies over a continuous range.
Digital transmission means that streams of on/off pulses are sent on the
transmission media. The pulses are referred to as bits. Examples of analog signals
are human voice, hi–fi music, temperature reading, etc. While that of digital are data,
telegraphy signals.
Fig. 1
Signal to Noise Ratio Along A X–Mission Path
(ii) Compatibility of different media : Cables, radio links, switching
equipment can be interconnected without decoding the digital signals
by means of relatively cheap interface equipment which contributes
little or no impairment to the signal. There is thus no need to take any
consideration of the particularities of the original signal.
Line repeaters
2W 4W
(12 MHz Vs 140 Mb/s)
1+1 Radio repeater
(1800 FDM Vs 140 200 W 600 W
Mb/s)
– Hybrid circuits
Pulse Transmission
The encoding of two bits into one baud is known as dibit encoding.
Nyquist relationship
In 1928, Harry Nyquist developed the relationship between the bandwidth and
the baud rate on a channel as
B = 2W
The Nyquist relationship states that the rate at which data can be transmitted
prior to intersymbol interference occurring must be less than or equal to twice the
bandwidth in Hz. Thus, an analog circuit with a bandwidth of 3000 Hz can only
support baud rates at or under 6000 signalling elements per second.
Shannon's law
In 1948, Claude E. Shannon presented a paper concerning the relationship of
coding to noise and calculated the theoretical maximum bit rate capacity of a
channel of bandwidth W Hz. The relationship developed by Shannon is given by
C = W log2 (1+S/N)
where
C = capacity in bits per second,
W = bandwidth in Hz,
S = Signal power at the receiver input
N = power of thermal noise = No.W
If the digital signal changes at a rate of N bits/sec, then the modulated phase
would change at a rate of N/2 symbols/sec. This rate of change of symbols is known
as the Baud–rate (R).
Thus, for a 140 Mb/s signal, the symbol rate = 70 Mb/s if QPSK is employed.
The minimum BW needed for transmitting so many symbols without ISI is 35 MHz.
This is the one sited filter Bandwidth. The total RF BW would include both sides of
the spectrum and be equal to 70 MHz. This is the theoretical minimum BW.
Because of the delay (as the band width of channel is finite) the delayed
version of wave form of one sampling interval will extend into the next sampling
interval leading to ISI.
Suppose that binary information is transmitted using a pulse type waveform.
A 1 Volt pulse is used to send a 1 and 0 Volt pulse for a binary 0. When this
waveform goes through the system, it gets distorted. Among other effects, any sharp
corners of the wave are rounded, since the system cannot pass infinite frequency.
Therefore, the values in previous sampling intervals affect the value within the
present interval. If for example, we send a long string of 1s, we would expect the
channel output to eventually settle to a constant 1. Similarly, if we send a long string
of 0's, the output should eventually settle towards 0. If we alternate 1's and 0's, the
output might resemble a sine wave, depending upon the frequency cut off of the
channel.
The eye pattern is, therefore, the superposition of many waveforms within one
sampling interval, the components of this composite waveform being the signals due
to all possible preceeding data strings. The number of individual waveforms
contributing to the eye pattern depends upon the memory of the system. For
example, if the system transient response extends over six sampling intervals, the
particular pattern of six most recent bits determines the waveform within the interval.
Transmitter Receiver
Superimposition of Received Waveform
Superposition
of received
waveforms
Encoding & Modulation Techniques
If transmission media were perfect, we would not have to worry about errors
in data communications. Unfortunately, that is not the case. Noise spikes and other
types of interference can change 1s to 0s and 0s to 1s during transmission. A short
20 ms click on a telephone line may be annoying during a telephone conversation,
but it is unlikely to disrupt voice communication. However, if data are being sent over
the line at 4800 b/s, that same click may destroy 240 data bits. A number of
techniques have been developed to detect and sometimes to correct errors.
The simplest way to deal with errors is to let the receiving operator correct
them. This method takes advantage of the fact that human language itself is
redundant. For example, suppose the following sentence is sent over a news service
communication system as part of a news story :
If the transmission is sent to Baudot, and the first bit of the second W in the
word DOWNTOWN is changed by a noise spike, the message will be received as :
It would not be difficult for the receiving operator to realize that DOWNTOAN
is not a word and to make the necessary correction before publishing the story.
There is enough reduntant information in the message to do that. However, if the
character 4 in the sentence is affected by noise, and the message is received as :
THE DOWNTOWN BRANCH OF THE BANCK OF CENTERVILLE WAS
ROBBED OF MORE THAN $8000 LAST NIGHT.
the receiving operator will know that there is an error in the message but will
probably not know how to fix it. There is enough redundant information in the
message to detect the error, but there is not enough to correct it.
In most of today's data communication systems, the only types of errors that
humans are expected to correct are typing errors. Most communication systems
detect and correct errors that occur after the information leaves the keyboard.
Echoplex
Echoplex is a simple form of error detection that relies on redundant
transmission to help the sending operator make corrections. It is commonly used on
full–duplex communications systems in which each character is sent as it is typed
into the transmitting terminal. Almost anyone who has used a computer and a
modem has used echoplex. As the receiving terminal receives each character, it
retransmits or echoes it back to the transmitting terminal where it appears on that
termianal's screen. The operator checks the character on the screen to see if it has
been echoed correctly. If there is an error, the operator presses the backspace key
to erase the erroneous character and then types the correct one.
Parity
Parity is one of the simplest forms of automatic error detection and is
frequently used with the ASCII code. Although ASCII is a 7–bit code, a redundant
bit, called a parity bit, is often added to the ASCII character. The parity bit is placed
in the most significant bit (bit 7) position. There are two types of parity – odd and
even. If even parity is used, every 8–bit data word in a message contains an even
number of binary 1s. If odd parity is used, every word has an odd number of 1s. As
the parity bit is added to the ASCII character by the sending terminal, it is either set
or cleared to form the correct parity.
Example 5–6
The following ASCII characters are sent : 110 0001, 111 0010 and 110 0101.
If the characters are transmitted with odd parity, where parity bit is added to each
character, a 1 or a 0? What is the ASCII code for each character in hexadecimal
including theparity bit ?
Solution
For odd parity, the total number of binary 1s in each character, including the
parity bit is odd. The first character, 110 0001 has three 1s, which is already odd
parity. Therefore, a parity bit of 0 is added in the MSB position to make the complete
8–bit data character 0110 0001, or $61. The second character, 111 0010 has an
even number of 1s. The sending terminal adds a binary 1 as a parity bit to make the
total number of 1s odd. The resulting ASCII character, including the parity bit , is
1111 0010, or $F2. The third character, 110 0101, also requires a 1 for odd parity,
which makes the complete data character 1110 0101, or $E5.
The receiver checks the parity of each incoming ASCII character to see if it is
correct. If the receiver is programmed to receive odd parity, every incoming data
word must have odd parity. If it is programmed to receive even parity, every
incoming data word must have even parity. If one bit in a data character gets
changed by noise during transmission, the parity of the received character will be
incorrect. When incorrect parity is received, it is called a parity error. For example,
suppose a communications system uses even parity and that the ASCII character
1011 1000 is sent. If a noise spike changes bit 1, the character will be received as
1011 1010, which has odd parity. This is a parity error.
Like all methods of error detection, parity adds redundant information ot the
data stream. A disadvantage of parity is that it detects only errors that affect an odd
number of bits in a data word. An advantage of parity is that it is simple to
implement. Because of its simplicity, parity is widely used.
Either even or odd parity may be used for both the horizontal and vertical
parity bits. The same parity may be used for both, or one of them may have even
parity, and the other may have odd parity. However, the transmitting and receiving
terminals must use the same parity scheme. For illustration, the horizontal parity in
Table 1 is even, and the vertical parity is odd. Bits 0 through 6 in the figure are the
ASCII code for the information transmitted. Notice that even the parity bit of the BCC
passes both the vertical and horizontal parity check.
Table 1
A short message using even character and odd column parity
ASCII
P b6 b5 b4 b3 b2 b1 b0
Character
1 1 1 0 0 1 0 0 d
1 1 1 0 0 0 0 1 a
0 1 1 1 0 1 0 0 t
1 1 1 0 0 0 0 1 a
1 0 1 0 0 0 0 0 SP
0 1 1 0 0 0 1 1 c
0 1 1 0 1 1 1 1 o
1 1 1 0 1 1 0 1 m
1 1 1 0 1 1 0 1 m
1 1 0 0 0 0 1 1 BCC
ASCII
P b6 b5 b4 b3 b2 b1 b0
Character
1 1 1 0 0 1 0 0 d
1 1 1 0 0 0 0 1 a
0 1 1 1 0 1 0 0 t
1 1 1 0 0 0 0 1 a
1 0 1 0 0 0 1 0 SP
0 1 1 0 0 0 1 1 c
0 1 1 0 1 1 1 1 o
1 1 1 0 1 1 0 1 m
1 1 1 0 1 1 0 1 m
1 1 0 0 0 0 1 1 BCC
Table 3
Two–bit errors can be detected by a combination of character and column
parity checks, but they usually cannot be corrected
ASCII
P b6 b5 b4 b3 b2 b1 b0
Character
1 1 1 0 0 1 0 0 d
1 1 1 0 0 0 0 1 a
0 1 1 1 0 1 0 0 t
1 1 1 0 0 0 0 1 a
1 0 1 0 0 0 1 0 SP
0 1 1 0 0 1 1 1 c
0 1 1 0 1 1 1 1 o
1 1 1 0 1 1 0 1 m
1 1 1 0 1 1 0 1 m
1 1 0 0 0 0 1 1 BCC
Parity bits can be generated by software routines in the sending terminal, and
they can be checked by software routines at the receiving terminal. However, it is
more efficient to generate and check parity bits in hardware. Figure 11 is the
schematic of a circuit that can be used to generate horizontal parity bits. The 7 bits
of the ASCII character are applied to the inputs labelled bit 0 through bit 6, and a
bias bit is applied to the remaining input. If the bias bit is a 1, the correct horizontal
parity bit will be generated to give the character odd parity. A bias bit of 0 will cause
the circuit to generate the correct horizontal parity bit for even parity. Trace the
circuit by assuming a set of inputs to assure yourself that it works.
Parity generator and checker circuits are part of the DTE circuit. They were
once constructed from discrete, exclusive OR gates as shown in Figure 11 below,
but today they are built into a larger integrated circuit that also performs other
communication tasks, as will be discussed in Chapter 8.
Fig. 11
A Parity Generator Circuit
Table 4
Even the combination of character and column parity checks
will not detect all errors
ASCII
P b6 b5 b4 b3 b2 b1 b0
Character
1 1 1 0 0 1 0 0 d
1 1 1 0 0 0 0 1 a
0 1 1 1 0 1 0 0 t
1 1 1 0 0 0 0 1 a
1 0 1 0 0 1 1 0 SP
0 1 1 0 0 0 1 1 c
0 1 1 0 1 1 1 1 o
1 1 1 0 1 0 1 1 m
1 1 1 0 1 1 0 1 m
1 1 0 0 0 0 1 1 BCC
Checksums
As illustrated in Table 5, a checksum is the least significant byte of the
arithmetical sum of the binary data transmitted. As the data is sent, the transmitting
terminals sums it. At the end of the data block, it sends the least significant byte of
the sum as an extra character, called the checksum. The receiver generates its own
checksum by summing the data as it is received. At the end of the block, it compares
the checksum it generated with the checksum it receives from the transmitter. If the
two are identical, it is likely that no error occurred. If the two checksums are different,
an error has occurred, and the receiver requests that the block of data be resent.
Table 5
The checksum is the least significant byte of the sum of the coded data
Character EBCDIC
T $E3
e $85
r $99
r $99
i $89
b $82
l $93
e $85
Checksum $BD
Data
input
Fig. 12
A CRC circuit
The CRC circuit is initialized with all 0s in the shift registers. Each time a bit is
received, every bit in the shift registers is shifted right. Assume that the first bit
received is a 1. It is exclusively 0Red in G3 with a 0 shifted out of b0 of the shift
register to produce a logical 1 which is in turn shifted into the b15 position of he shift
register and continues to shift right as each subsequent bit is received. Four
received bits later, it will have been shifted to the b11 position where it will influence
the output of exclusive OR gate G1. The output of G1 is shifted to the right until it
arrives at the b4 position and influences the output of G2. The G2 output in turn
shifts right to the b0 position where it is exclusively 0Red with a received bit of data
to influence the output of G3 and thereby the input to the CRC circuit.
Although Fig.12 shows a circuit that generates a 16–bit CRC, 32–bit CRCs
are also common in many data communication systems. Twelve–bit and 24–bit
CRCs are used in some systems. Like the parity checker circuit, CRC generators
are usually not separate circuits as shown in the figure. They are included in a larger
integrated circuit that also performs other data communications functions.
Summary
In this chapter, we have looked at codes used in data communications and
methods used to detect and sometimes correct errors. Of the codes presented in
this chapter, the two that are most commonly used in data communications are
ASCII and EBCDIC. Baudot is a 5–bit code, and it was the first code to be widely
used for data communications. Baudot has two modes, a letters mode and a figures
mode, each with its own character set. The LTRS and FIGS characters are used to
shift back and forth between the two modes. Communications systems that once
used Baudot have now almost all switched to the ASCII code.
EBCDIC is an 8–bit code that was developed by IBM Corporation for use in
its larger computers. EBCDIC is also used in equipment that was designed to be
compatible with those IBM Computers.
Parity is an extra bit that is added to each data character in the MSB position.
The parity bit is set or cleared to ensure that each character either contains an even
number of 1s or that each character contains an odd number of 1s. Parity is
consequently used with the ASCII code.
A checksum is no more than the least significant type of the arithmetical sum
of all the binary characters transmitted in a block of data. Both the transmitter and
the receiver calculate a checksum, and at the end of a transmission, the sending
terminal transmits the checksum which the receiver then compares with its own
checksum.
1.0 Introduction
In order to transmit digital signals over Radio systems. It is necessary to transfer the information to the Radio
frequency carrier.
Binary input
Fig. 2.1
ASK MODULATOR
FIG. 2.2
SIGNAL CONSTELLATION
+V
Bit Streem
0
-V
FSK +E
Fig. 3.2
Fig. 3.5.
Incoherent
Coheren
FIG 3.6
PERFORMANCE COMPARISON OF INCOHERENT AND COHERENT FSK
DETECTOR
It may be seen that for a given BER requirement, the Eb/No (and hence C/N)
requirement is more for incoherent detection compared to that of coherent
detection i.e. Coherent detection is superior to incoherent detection.
3.2 M-ARY FSK
M-ARY FSK (MFSK) -is-a way to trade bandwidth for signaling speed.
Instead of sending data using binary signals with one of two frequencies, the
signaling alphabet is expanded to include M possible frequencies. This
process will normally increase the speed between the lowest and the highest
freq. and therefore the bandwidth can be expected to increase. However,
since increased information is sent with each signal element, the baud rate
can be decreased to partially counteract the increase in bandwidth. For
example, if it were necessary to send 1000 bps of, data, this could be one by
sending a binary FSK pulse every millisecond. Alternatively, a 4 ary FSK
burst could be sent every 2 ms, representing a decrease in baud rate by a
factor of two. (Baud rate is a unit of signaling speed and it is the number of
symbols (pulses)/ second in the Channel. If each symbol represents one bit,
then baud rate is same as bit rate, if each symbol represents more than one bit
then baud rate is less than bit rate.
Baud rate= Bit Rate/No, of Bits per Symbol
C= B log2 (1 + S/N)
Where C is the capacity in bits per second, B is the bandwidth of channel in
Hz and S/N is the signal to noise ratio.
The signal power S is the energy per bit multiplied by the number of bits
per second. The noise power is No multiplied by the system bandwidth. If we
take the limit as the bandwidth approaches infinity.
C = Lim B log2 (1+EC/NoB)
B ∞
a. 2 Phase System
0 0 0
π 1 1
b. 4 Phase System
Stream 1 Stream 2
0 0 0 0
π/2 1 0 1
π 2 1 0
3π/2 3 1 1
On the top line, the original bit stream, X is the sequence 0110. The phase
stream on the 2nd line is obtained by
The PSK signa! and a synchronous carrier (i.e. having same phase and
frequency of carrier on the transmitter side) are fed to the phase detector.
Detected output after the LPF (Low Pass Filter) is proportional to Cosψ, Since
Cosψassumes values of either +1 or -1 corresponding to ψ = o and π respectively,
the decision circuit judges only polarity (+ or -1) in the 2 phase
PSK system. Bits 0 and 1 correspond to phases 0 and π respectively. The carrier
used in the receiver must be synchronized with that of the carrier on the transmitter
side. Thus, a carrier synchronising circuit called the carrier recovery circuit is also
necessary.
(2) Differential Detection (Delay Detection)
The following figure (Fig.4.3) illustrates the differential! detection principle. The
incoming PSK signal is expressed as E= A Cos (wt+ψ).
E = A Cos (wt +ψi-1), where ψIi and ψi-1 represent the phases corresponding to
the ith and (i-1)th bits respectively. The E and E1 signals are fed to a phase
detector. The output of LPF is Cos (wt +ψI-1), The decision circuit discriminates
between different values of Cos (wi +ψi-1), in the same way as
the decision circuit in the coherent detection case.
Comparison
Differential Detection is not applicable to low speed data streams, However, it
is applicable to high speed data streams, but the detected output contains
twice as much thermal noise as the O/P of coherent detection system. This is
because differential detection uses two separately received PSK signals (with
a time difference of one bit) which are equally noisy, whiie in the coherent
detection case the carrier is assumed to be free of noise.
For these reasons, the coherent detection is the preferred demodulation
method. Unlike differential detection coherent detection needs carrier
recovery.
4.4 Decision circuit {Threshold Comparator)
The detector output, which represents the phase changes of received PSK
signal, includes thermal noise, distortion arid interference, which enter the
signal at repeaters and along propagation paths. Consequently, the detected
output waveforms are considerably distorted as shown in the following figure.
The integral decision method integrates the amplitude of the detected output
for a fixed time interval and compares the result with the threshold. The
integral decision method is more sensitive to inter symbol interference than
the instantaneous decision method, and so the instantaneous decision
method is preferred.
4.4.3 What is Jitter ?
Unwanted phase modulation is termed as jitter, in the decision circuit clock
pulses are generated using PSK signal phase changes as a reference.
These clock pulses may some times be inaccurate due to poor tuning of the
pulse generating circuit causing jitter.
2 – PSK MODULATOR
Input
Data S/P
Con ≈≈ M
M BPF BPF 4 Outp
3 P/S ut
II /2 II /2
T
2
Q H
Transmitter Receiver
1&2 : LPF
3 : Bit Timing Recovery
4 : Carrier
TH : Threshold
Fig. 4.7
In this system the I/P pulse stream is converted into two bit streams. Their
pulse speed is exactly half that original stream. The serial to parallel converter block
includes a differential encoding function. QPSK modulator can be thought of 2
BPSK modulators in parallel.
As the signal space diagram indicates, the QPSK modulator uses a gray
code arrangement i.e., instead of having (0,1),(1 ( 1 , 1 ) , (0,0) symbols we Be-
having (0,1) , (1,1), (1,0), (0,0) symbols. The reason is explained with reference to
the following figure (Fig.4.8).
FIG. 4.9
Vector Diagram of PSK signals, noise, and sub-carriers
Any noise superimposed in a PSK signal changes the signals vectors. The
noise vector are constantly varying in phase and amplitude and if the vector sum of
the noise and PSK signal cross a carrier vector, a bit error occurs. As a noise vector
increases in magnitude, so does the possibility of mistaking the true PSK signal
vector for an adjacent one. However, the possibility of the noise vector increasing
enough to mistake the true PSK signal vector for the signal vector 1800 opposite
(differing by π) is very low. Gray coding therefore improves bit error rate compared
with natural binary coding, because one symbol error results in a single bit error.
i.e., bit error rate = Symbol error rate / 2
Circuits used for Natural Code to Gray Code conversion (At the transmitter)
and vice versa (At the Receiver) are shown below.
Four times frequency division fo E(4ω) recovers a pure carrier. Similarly for BPSK scheme 2
multiplication system can be used.
Fig. 4.11
Costa’s loop
The VCO operates at the carrier frequency fc . The output of upper low pass filter is given
by, 0.5 A (t) sin (θ -φ). This output is therefore proportional to the sine of the phase
difference. If the two frequencies are not matched, the phase difference includes a linearly
varying term.
The output of the lower LPF is given by, 0.5 A (t) sin (θ -φ). This output is therefore
proportional to the cosine of the phase difference.
When these two terms are multiplied together, the result is the error term.
5.0 16 QAM
The 16 QAM (Quadrature Amplitude Modulation) system carriers twice as much
information as the QPSK system.
5.1 Modulation
The 16 QAM signal is obtained by vector summing two 4 level ASK signals in
quadrature. The following figure shows two 4 level ASK signals in quadrature (Fig. 5.1).
FIG 5.1
TWO 4- LEVEL ASK SIGNALS PERPENDICULAR TO EACH OTHER
Fig. 2
Encoded TDM (Japanese)
3.4 In the N.T.T. proposal the bit rate of 32064 kbit/s at the third level of the
proposed hierarchy might be considered a suitable bit rate to be used on
international satellite links perhaps for administrations operating different
PCM primary multiplex equipments. It is also a convenient bit rate for
encoding the standardized 300-channel FDM mastergroup. Delta modulation
and differential PCM for 4 MHz visual telephone are also suitable for this bit
rate. Transmission of 32064 kbit/s via a special symmetrical cable of new
design is also possible.
3.5 The above fact shows that the differing bit rates of the third level indicated in
the two hierarchy proposals can, therefore, be justified by technical
arguments. As far as the differing bit rates of the fourth level are concerned,
only a few technical reasons are included in the two proposal. In both cases
coaxial cables are used as a transmission medium so that the medium does
not call for different bit rates.
3.6 Moreover, it seems that at present the specifications of the fourth level (and
higher ones) in the two proposed hierarchies is not yet considered so urgent.
For the time being the third level seems to be more important.
3.7 The C.C.I.T.T. faced with this situation has reached finally the solution which
is covered by CCITT recommendation G.752 as one can see from this
recommendation, two different hierarchical levels are existing in the third level
of this hierarchy, namely 32064 kbits/s and 44736 kbit/s respectively. Higher
level have not been specified so far.
4.0 DIGITAL HIERARCHY BASED ON THE 2048 KBIT/S PCM PRIMARY
MULTIPLEX EQUIPMENT
For this digital hierarchy, two specifications have at present been laid down
only for the first level at 2048 kbit/s and for the second level at 8448 kbit/s.
As for the higher levels, the situation is just contrary to that existing in the
case of digital hierarchies derived from 1544 kbit/s primary multiplex, i.e.
general agreement has more or less been reached on the fourth level having
a bit rate of 139264 kbit/s. 5th order system where bit rate of 565 Mb/s have
also been planned now.
4.1 The critical point in this hierarchy is whether or not the third level at 34368
kbit/s should exist.
4.2 The C.C.I.T.T. has agreed after long discussions on the following
(Recommendation G.751) “that there should be a 4th order bit rate of 139264
kbit/s in the digital hierarchy which is based on the 2nd order bit rate of 8448
kbit/s”.
There should be two methods of achieving the 4th order bit rate :
Method 1 by using a 3rd order bit rate of 34368 kbit/s in the digital hierarchy.
Method 2 by directly multiplexing sixteen digital signals at 8448 kbit/s. The
digital signals at the bit rate of 139264 kbit/s obtained by these two methods
should be identical.
The existence of the above two methods implies that the use of the bit rate of
34368 kbit/s should not be imposed on an Administration that does not wish
to realize the corresponding equipment.
4.3 In accordance with the above two methods the following realizations of digital
multiplex equipments using positive justification are recommended :
Method 1 : Realization by separate digital multiplex equipments : one type
which operates at 34368 kbit/s and multiplexes four digital signals at 8448
kbit/s; the other type which operates at 139264 kbit/s and multiplexes four
digital signals at 34368 kbit/s.
Method 2 : Realization by a single digital multiplex equipment which operates
at 139264 kbit/s and multiplexes sixteen digital signals at 8448 kbit/s.
Method 1 has been put into practice.
4.4 Where the fifth level is concerned, some preliminary proposals (e.g. 565148
kbit/s) have been submitted which were not discussed in detail.
Therefore, the present structure of this digital hierarchy is as given in Fig.3.
139.264
Fig. 3
Encoded TDM (European)
5.0 Most of the administrations favour the specification of a third level at 34368
kbit/s, mainly as a suitable flexibility point for the operation of the network and
as an adequate bit rate for digital line systems which are to be set up either
on new cables (screened symmetrical or micro-coaxial cables) or an radio-
relay links. Other administrations do not consider the specification of a third
level to be advantageous for their networks. On the contrary they regard it to
be more economical to go directly from the second level at 8448 kbit/s so the
fourth level at 139264 kbit/s, is also achieved by multiplexing four digital
signals at 34368 kbit/s, each of which is obtained by multiplexing first four
digital signals at 8448 kbit/s. However, this is a matter of internal multiplexing
only, i.e. digital multiplex equipment of this type has no external input or
output at 34368 kbit/s.
All administrations interested in the third level at 34368 kbit/s would thus be
offered the possibility of using this level. Their digital multiplex equipment
which multiplexes in the same way each of the four digital signals at 8448
kbit/s has to provide external outputs for the resulting signal at 34368 kbit/s.
The digital multiplex equipment which multiplexes each of the four digital
signals at 34368 kbit/s has to provide four inputs for these bit rates and one
output for the resulting bit rate of 139264 kbit/s.
5.1 Outlook
The above context indicates that at the moment the discussion of digital
hierarchies is still underway and is mainly concentrated on the third and fourth
levels. Although certain trends are evident the specification of these and
higher levels will take some time. In the interest of a comprehensive
specification of the digital hierarchies to be drawn up as soon as possible, it is
to be hoped that all parties concerned perform their studies with high priority.
All digital multiplexes and hierarchies proposed till date are operating in an
asynchronous mode (positive justification, “positive stuffing”, bit-interleaved).
It is likely that in the future, synchronous digital multiplex equipment has to be
considered when setting up digital hierarchies. For various digital line systems
being developed in many countries non-hierarchical bit rates have
provisionally been adopted with due regard to the characteristics of the
transmission media used. These non-hierarchical bit rates for digital line
systems have also to be born in mind when defining the digital hierarchies
and may affect the hierarchical bit rates.
6.0 CCITT Recommendations
6.1 Second order digital multiplex equipment operating at 8448 kbit/s and
using positive justification CCITT Rec. G 742.
1. This 2nd order digital multiplex equipment using positive justification is
intended for use on digital paths using 2048 kbit/s primary multiplex
equipments.
2. Bit rates : The nominal bit rate should be 8448 kbit/s. The tolerance on
this rate should be +30 PPM.
3. Frame Structure :
Frame Structure Bit No.
Frame alignment word (1111010000) 1 to 10
Alarm to remote Tml 11 Set I
National use 12 Set I
Bits from tributaries 13 to 212 Set I
Justification Control bits 1 to 4 Set II
Bits from tributaries 5 to 212 Set II
Justification Control bits 1 to 4 Set III
Bits from tributaries 5 to 212 Set III
Justification Control bits 1 to 4 Set IV
Bits for tributaries available for 5 to 8 Set IV
justification
Bits from tributaries 9 to 212 Set IV
Frame Length 848 bits
bits/tributary 206 bits
Combiner
PCM
FIG. 1 (a)
FIG. 1 (b)
FIG. 1 ( c )
Fig. 1
Fig. 2
System for Multiplexing & Demultiplexing Asynchronous Signals
ME
M2
Fig. 3
Waveforms at Respective Points
380 BITS
FIG. 4
LINE CODES
1.0 INTRODUCTION
1.1 The digital output of a PCM equipment contains "1s and 'O's. For transmission
of the digital signals between two points, the '1' s and 'O' s contained by the signal
are transmitted in the form of pulses as shown in Fig. 1.
1.2 For distortion free transmission, the PCM output should be converted
into a suitable code which will match the characteristics of the medium.
This code is called the "line code" and the signal converted to the line
code is called a line signal. This handout briefly describes the basic
requirements of a line code, the different types of line codes and the
operation of an HDB3 code decoder.
.
Here it may be seen that whenever a' 1' is continuously transmitted, the
output continues at 'V level for a duration equal to the number of bits
transmitted. In a30 chl. PCM system, the bit duration is 0.488 micro
second. If three '1' 1 s are transmitted, the output signal is a pulse which
is 3x0.488 micro seconds wide.
(ii) In the example the signal has only one polarity. A 'O1 is O volt and a ' 1 ' is
positive (say-f-5v). Sometimes, however, a ' 1 ' is denoted by a positive
voltage and "O1 is denoted by a negative voltage. A pulse stream
10,0.110111001 in such a case can be represented graphically as in
Fig.3.
(ii) There is a large low frequency content. This may result in cross talk.
(iv) The high DC component does not permit the use of transformers
for coupling.
(v) Thus the simple NRZ binary code does not satisfy the requirements
of a line code.
4.0 RZ BINARY
4.1 This is a modification of the NRZ code and stands for "Return to zero"
binary. In this '1' bit is represented by a pulse of half the bit duration as
shown in Fig. 5
4.2 Here the '1' bits pulse have only 50% duration. From the spectrum we
can seen that there is a strong component at 1/T, the clock frequency.
Hence clock recovery is possible. But still, because of the strong
DC.component and low frequency content, this code is also not
suitable for transmission.
(ii) From the spectrum For the AMI code it can be seen that the
maximum power is centred around the half bit rate i.e. 1/2T and
that there is no DC component.
(iii) Although the AMI code satisfies most of the line code requirements,
a series of *O's is encountered, the timing information is likely to be
lost. This is a limitation of the AMI code.
(iv) The AMI code is the one specified for 24 channel PCM systems.
(i) The serial PCM output in RZ binary form is fed to the flioflop
toggle point and to the gates G1 and G2 as show
(ii) Cricuit operation (A)
First make arrives
Under this condition, the flip flop is set and Q goes HIGH. Consequently Gl
output goes HIGH which triggers the positive generator. The output of this
generator is a positive pluse. The wave forms for this condition are shown
in section I of Fig. 9.
(v) The violation pulse is always placed in the last bit position.
Suppose there are 4 zeroes coming in a row. Then the HDB3
code for this would be BOOV in general where V is the violation
pulse. The polarity of this depends on the polarity of the last '1'
and the number of %1'"encountered prior to the four zeroes.
(vi) The first bit of the code was shown as B in (v) above. B is set to '0' if
the number of '1' s encountered prior to the violation is ODD. If it is
EVEN or ZERO then the "B" bit is filled with a T whose polarity is in
accordance with the AMI code. i.e. if the previous ' 1' was positive +
then B is '1' with negative polarity and vice versa.
From the above Table it can be seen that when the number of Ts is
even, the HDB3 substitution is BOOV; in this, B follows the AMI code
and V follows B. If 'B' is positive, then V is also a positive pulse. Thus
consecutive violations are made to be of opposite polarity so that
there is no DC component added by the violations themselves.
[NO of 1 = ODD]
Fig 10 (b) is the RZ binary form for Fig 10 (a).
Fig 10 (c) is the corresponding HDB3 Code.
(i) Notice that upto pulse Z, the HDB3 Code follows the AMI Code.
(ii) After pulse Z, we have four consecutive zeroes. This calls for a
violation.
(iii) Prior to the arrival of these zeroes, three ‘1's were encountered i.e.
number of ‘1 's preceding the violation is ODD.
(iv) This means that the HDB3 substitution for the 4 zeroes will be of
the form 000V.
(v) Also the polarity of the last ' 1 ' before the arrival of the zeroes is
positive. Therefore the violation pulse will also be a positive pulse, as
shown shaded in Fig 10 (c).
(vi) Then the fourth pulse P arrives which is converted according to AMI
code as shown.
EX: Draw the HDB3 code with the first pulse in Fig 10 (c) as a negative
pulse.
6.3.2 Example 1. (b)
Consider the RZ binary wave form shown in Fig 11 (a). In this the first
pulse is a violation pulse resulting from the occurrence of 4 zeroes just
before pulse X.
(i) Here, the first pulse is positive violation pulse. The next pulse (i.e.
pulse X) is converted in accordance with AMI code and is therefore
shown as a negative pulse in Fig 11 (b).
(iii) Now, the total number of '1's SINCE the last violation is one, i.e. ODD.
Therefore the substitution is of the form 000V.
(iv) As the polarity of the last M' before the arrival of zeroes is negative, the
violation pulse is also negative which is shown as a shaded pulse. (V-).
6.3.3 Example 1 (c)
Consider the RZ wave form shown in fig 12 (a), assume that there was no
previous violation.
(ii) The first pulse goes as a positive pulse. The next four zeroes are
substituted by 000 V because the polarity of the last '1' is positive and
the total number is ODD.
(iii) Then pulse is converted into a negative pulse according to AMI code.
(iv) The next 4 zeroes are substituted by 000V since in this case the total
number of '1' s is again ODD and the polarity of the last '1' is negative.
(ii) Four zeroes are encountered after pulse Y. Here the number of' 1 's
prior to these zeroes is EVEN and therefore the substitution is of the
form BOOV.
(iii) Since the last "1' is a negative pulse, from Table 1 the substitution
BOOV.
(iv) The HDB3 substitution for the 4 zeroes is shown in Fig 13 (b) as
shaded positive pulses.
(i) In this case, the wave form begin with 4 zeroes. There are
no previous violations. The number of "1's preceding the string of
"0" is zero i.e. EVEN.
(iv) The following " 1's X, Y and 2 are converted according to AMI code.
(iii) Further since the polarity of the last ' 1 ' is positive, the code would
be B 00V. This is shown as shaded pulsed in Fig 15 (b).
Then pulse Z is converted according to AMI code.
(iii) The first four zeroes are substituted by B 00 V since the last' 1' was
negative.
(iv) After the first 4 zeroes, we have another 4 zeroes coming number
of' 1' in this case zero i.e. EVEN again.
(v) Hence the second set of zeroes is also converted as BOOV. But
the polarity of the last '1' (although it was a violation pulse), was
positive.
Hence, the second set of zeroes is converted, as B 00 V
(vii) The substitution pulses are shown in shaded areas in Fig 16 (b).
6.4 But for the insertion of violation pulses, the HDB2 coding is similar to the
AMI code.
The spectrum for the HDB3 code is shown in Fig. 17
From the spectrum it can be seen that there is no DC component and that maximum
power is around 0.46/T. It means that the power in the lower and upper limits of the
spectrum is low. This would minimize high frequency alternation and cross
talk. Although this spectrum also has mulls at 1/T2/T etc, because of the violation
pulse introduced, timing is not lost when a long string of zeroes is encountered. The
HDB3 code satisfies ad the requirements of a line code and is therefore specified
by the CCCTT for 30 channel PCM systems having 2048 kbits/sec, clock.
When ODD ' 1 ' are encountered, the AND gate O/P is zero. The pulse from
the violation command circuit is added to AMI output. When even * 1 ' s are
encountered, the AND gate output SETS the first stage of the shift
register. This goes to the AMI circuit and gets coded according to AMI law.
The violation pulse is then added after a delay of 2 bits. After the violation
pulse is added, the inhibit circuit and more counter are cleared.
7.2 HDB3 DECODER
The HDB3 code must be decoded into RZ binaryform at there receiving
end for detecting the analog signal. The HDB3 decoder used for this
purpose has the following function.
(a) Detect an AMI violation
(b) Count the number of zeros preceding the violation
This is done to determine if the last received mark is HBD substitution or an
error.
Fig. 19 shows a simplified block schematic of an HDB3 decoder.
Here the RZ converter converts all negative pulse into positive pulses. These
are then fed to a four bit shift register. When there is no violation. (i.e. when
there are no continuous zeroes present) the shift register gives a serial output
which is RZ binary form.
Simultaneously, The AMI violation detector checks for a deviation from the
AMI code. If alternate N1's are not having opposite polarity, then it gives an
output which will reset all the four bits of the shift register to zero. (This is
done because, at the transmitting end when a number of zeroes are faced
the V bit in BOOV code was inserted with a polarity opposite to that of the
previous mark By resetting the shift register we are converting the BOOV
code back to 0000. This is what is desired).
The output of the shift register is a serial RZ digital signal with the HDB3 code
substitutions removed. This RZ signal is the same as the TDM multiplexed
output of the PCM equipment and this can be further processed through PCM
decoder to retrieve the analog signal. Waveforms Typical HDB code/decoder
wave forms are shown in Fig.20.
8.0 CMI CODE (CODED MARK INVERSION)
8.1 This is a 2 level NRZ code in which a binary '0' is coded as '01' and binary
‘1's are coded alternatively as a logic '0' or T. In case of a binary '0' the two CMI bits
'0' and '1' are for half clock duration whereas for binary Ts the 'O1 and '1' are for full
clock duration. This is illustrates in Fig.21.
This is basically a binary code and the bit rate of the code is twice the bipolar AMI
code.
For this reason CMI code is grouped with 1B2B family of line codes. The CMI code
has a high clock content and for this reason. The CMI code is recommended by
CCITT for 140 Mb/s multiplex equipment (not a line code).
1.0 INTRODUCTION
Across Network, the network between local exchange and subscribers in the
Telecom Network accounts for A major portion of resources both) in terms of capital
and manpower. So far, the subscriber loop has remained in the domain of the
copper cable providing cost effective solution in the past. Need for quick
deployment of subscriber loop, coverage of inaccessible & remote locations and
requirement of more bandwidth for new services coupled with advances in
technology have led to the emergence of new Access Technologies. Modern
access network technologies are discussed here.
However the copper pair cables still dominate the subscriber loop (local
network) due to certain reasons primarily based on techno- economic
considerations. This copper based local network is considered to be responsible for
most of the faults in telecom network. The obvious reasons are congestion of
underground facilities, complex network planning and limitation of copper cables to
handle digital signals leading to a network inappropriate for extending broadband
integrated services digital network (ISDN).
Let us discuss above modern technologies which are largely set to replace
copper in subscriber loop.
The radio technology is able to offer the same level of service quality as that
provided by wire line technology. The subscribers have no knowledge of their
radio connection and may access all the offered PSTN services in exactly the
same way as if they were directly connected by wire line. Application of
wireless local loop has just started worldwide. The technology employed shall
depend upon various radio access techniques like FDMA, TDMA, CDMA.
4.1 Basically two types of technology options are available for wireless in
local loop. The first one based on cellular mobile Telephone system can be
adopted for fixed wireless in local loop application. These systems have Macro
cell architecture with cell radius of tens of kilometers ( typically 10-20 Kms),
The second type based on Micro cell architecture are extension of cordless
telephone systems. These systems have cell radius of few hundred meters
(typically 50-200 mts).
4.2 Point to Multi Point (PMP) systems also called Digital MARR systems are
becoming available. These systems can cover long range depending upon line
of sight conditions (LOS) and repeaters. These systems can be found
attractive in hilly areas, isolated islands or largely dispersed habitation where
multiple of subscribers are to be served.
4.3 Satellite media can also be used to extend local loop to subscribers who are
otherwise located at inaccessible places where laying of cables or line of sight
radio media is not economically justified. For example certain villages have
been extended gram panchnyat telephones using satellite media for
providing rural communication. Generally social factors dominate cost
considerations for providing local loops in such cases.
Now a days very small aperture terminals (VSATs) being used for interactive
data communication have proved successful in business/ corporate
applications. Multichannel per carrier VSATs are also used to extend trunk
junctions to remote and inaccessible/ hilly areas.
Through its wide area broadcast capability, a geo stationary earth orbit (GEO)
satellite is able to deliver essentially the same throughput signal throughout the
country or region at an attractive cost per user.Taking advantage of this factor
direct to home (DTH) satellite broadcasting with a smaller antenna at the
subscriber roof top is also an extension of local loop over the satellite.
The WILL technologies available in different frequency & their important parameter
are indicated below:
SYSTEM
MACRO CELLULAR MICRO CELLULAR
TECHNOLOGY
CT2
GSM DAMPS CDMA DECT PHS
FREQUENCY 864-868
890-915 824-849 824-849 1810- 1895-
Mhz
935-960 869-894 869-894 1900 1918
Mhz Mhz Mhz Mhz Mhz
MULTIPLE
TDMA TDMA CDMA FDMA TDMA TDMA
ACCESS
RF CHL 100
200 Khz 30 Khz 1250 Khz 1728 Khz 300 Khz
SPACING Khz
PIE/4- PIC/4
MODULATION GMSK CDMA FSK GFSK
QPSK QPSK
(v) Small size of fiber cable avoids congestion in ducts & crowding at MDF.
(vi) Due to their inherent wide band width capability optical fiber cable can
support narrow band and broadband ISDN services. They can also support
video transmission, thus bringing the telephone services and cable TV
operations together.
The advantages offered by FITL and limitations of copper access
network can be tabulated as:
The long term objective of FITL is to take the fiber right upto the subscriber
premises or else to extend the fiber as close .to subscriber as possible. The various
approaches towards the end goal depending upon its penetration in the access
network can be listed below
IMPLEMENTATION
(II) There is no major identified demand for broad band ISDN service. Thus
unless the cost economics of FITL is justified its application may be some
what slow.
While there is no denying the fact that the fiber will eventually take
over the last mile (access portion) of the network ,it is felt & generally
accepted that it would not be economically justified immediately and, would
take some more time before it penetrates in the access network. The
Telecom Administrations world over have already invested a lot in, terms of
their copper based network and will continue to do so until the fiber becomes
more techno-economically feasible. Till such time there is no alternative but
to exploit the already buried (but not dead) copper to carry more and more
bandwidth.
8.0 CONCLUSION
c. To achieve convergence
f. Integrate the needs of all the services/ wings of BSNL requiring the fiber
media.
At present our fiber network is in the Fiber To The Network (FTTN) state. The
Access Network is proposed to reach upto the Curb so that the Fiber to the Curb
(FTTC) can be achieved. Fiber to the Building (FTTB) and Fiber to the Home can be
achieved in the later phases of expansion. Thus Access Network is essential in
every city where data/ leased line customers are in a good number. The last mile to
the customer is the most unreliable link compared to the reliable communication
system we have from one exchange to other. It is more appropriate to call this last
mile as First mile since the customer is always comes first in any direction to the
exchange. Access Network shall strengthen the First mile and also allows us to
deliver the giga bit band width to the customers. It shall also enable us to enter in to
Service Level Agreements with customers to the extent of 99.9%.
1. NETWORK PLANNING
The Network ultimately should provide end to end fiber connectivity for high
bandwidth users. The Network should provide additional fiber connectivity between
BSNL exchanges and Transmission centers. It should also be capable of building
up of leased lines traffic from exchanges to other exchanges or transmission centers
as required. The Network should provide alternate media between exchanges,
RLUs, RSUs and DLCs. Broadband data traffic should have access and aggregate
points in the network. The duct planning should be done in order to cover the
potential customers as listed below. Universities, colleges, schools, hospitals,
hostels, multistoried buildings, cinema theatres, software technology parks, industrial
pockets, exhibition grounds, Air ports, posts, railway station, travel agencies internet
service providers, cable operators, call centers, training institution, research centers,
banks, cellular service providers etc.
All the above data is to be drawn on the road map of the city. This shall be the
starting point for the planning of the network.
2. TYPE OF DUCT :
In order to provide fibers for CICs, DLCs, junction traffic, long distance traffic and
other value added services such as cellular, WILL High Count fibers are to be used.
Provision of fibers for these needs may be required to be done in many phases.
This indicates that multiple pipes are essentially to be laid in city limits. 40 mm
Permanently lubricated HDPE pipes (PLB HDPE pipes) are to be used for laying the
OF cables. Coloured pipes should be used to identify the multiple cables to be laid.
Quality of the pipe is plays very critical role in the Access network. The PLB pipe
being laid is proposed to serve as the permanent reusable duct. The cables are
expected to be deblown and blown in these ducts, when high count fibers are to be
laid in place of the existing cables.
TEC specification is available for 40mm & 32 mm (outer diameter) PLB HDPE
pipes. OF cables with 16 mm Outer diameter, can be easily blown in 40mm Pipe.
The 96 F/ 48F OF cable supplied by M/s Sterlite and M/s Icomm have an outer
diameter of 18 mm. The 96F cable has been successfully blown in 40mm PLB pipe
in Chennai. 96/48F can be also pulled in the PLB pipe subject to the condition that
the pulling force does not exceed 2.5x Weight of cable for 1 KM.
Cable blowing is to be planned in the PLB pipe used in the Access Network. In
general the cable blowing shall be done by the pipe supplier within the agreement
time. Access Work may require more PLB couplers and end plugs. Since pipes
are being laid by other private operators, it becomes essential to identify our pipes.
Accordingly manufacturer may be asked to put BSNL logo, name on the pipe.
3. DUCT PLANNING
Triangle B
Outer arm
Primary Arm
C Main
Inner arm
Distribution Arm
The polygon by name indicates that the duct can be planned with any number of
arms. A few examples are shown for rectangle and Pentagon.
A B
A B
C D
C D
RECTANGLE PENTAGON
Many places as the geography does not permit such Polygons with the distribution
arms meeting at a place, the polygons may be planned as shown below.
A B
C D
The advantages of planning the ducts in the polygon fashion is as given below.
a. The exchange areas are demarcated automatically