fundamentals of modulation...

68
5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 1 Fundamentals of Modulation Techniques What is a baseband and passband signal? What is a baseband and passband signal? Analog vs. Digital modulation Analog vs. Digital modulation Modulation principal is the same in both cases, the Modulation principal is the same in both cases, the user signal format is different user signal format is different Representation of the signals Representation of the signals Time domain Time domain Frequency domain Frequency domain Orthogonal signal space Orthogonal signal space What is orthogonal signal space? What is orthogonal signal space?

Upload: others

Post on 30-Apr-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 1

Fundamentals of Modulation Techniques

What is a baseband and passband signal?What is a baseband and passband signal?Analog vs. Digital modulationAnalog vs. Digital modulationModulation principal is the same in both cases, the Modulation principal is the same in both cases, the user signal format is differentuser signal format is differentRepresentation of the signalsRepresentation of the signals

Time domainTime domainFrequency domainFrequency domainOrthogonal signal spaceOrthogonal signal space

What is orthogonal signal space?What is orthogonal signal space?

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 2

Fundamentals of Modulation Techniques

Why modulate?Why modulate?To allow for efficient spectrum useTo allow for efficient spectrum usemultiple user support on a shared mediummultiple user support on a shared medium

How do we modulate?How do we modulate?Use a carrier to translate the spectrum of the userUse a carrier to translate the spectrum of the useruse different carriers to separate them in frequencyuse different carriers to separate them in frequency

Where does the information reside in a modulated Where does the information reside in a modulated signal?signal?

There are three parameters associated with a sinusoidal There are three parameters associated with a sinusoidal carrier signalcarrier signal

AmplitudeAmplitudefrequencyfrequencyphasephase

Use one of them to carry the users information bearing Use one of them to carry the users information bearing signalsignal

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 3

Digital Modulation

Desirable modulation method Desirable modulation method provides low BER at low SNRprovides low BER at low SNRPerforms well in multipath and fading environmentPerforms well in multipath and fading environmentOccupies least amount of bandwidth/symbolOccupies least amount of bandwidth/symbolEasy and cost effective to implementEasy and cost effective to implement

Generally they are two categoriesGenerally they are two categoriesPower efficient Power efficient –– FSK, Spread spectrumFSK, Spread spectrum

At low SNR provide acceptable BERAt low SNR provide acceptable BERBandwidth efficient Bandwidth efficient –– PSK, QAM and its variantsPSK, QAM and its variants

At fixed bandwidth provide acceptable BERAt fixed bandwidth provide acceptable BERBandwidth efficiency (BE)= R/BBandwidth efficiency (BE)= R/BBE =C/B= log2(1+SNR)BE =C/B= log2(1+SNR)

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 4

Digital Modulation – Shannon’s Capacity for an AWGN Channel

tt

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 5

Digital Modulation – Bandwidth and PSD of Signals

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 6

Digital Modulation – Line coding and Pulse Shaping

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 7

Digital Modulation – Pulse Shaping Nyquist Criteria for Zero ISI

Pulse passing through a band limited multipath channel experiencPulse passing through a band limited multipath channel experience smearing or time e smearing or time spreadingspreadingNyquist suggested that if the overall response of the system couNyquist suggested that if the overall response of the system could be such that at the ld be such that at the sampling instant only the desired signal has non zero value, i.esampling instant only the desired signal has non zero value, i.e.,.,

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 8

Digital Modulation

Any filter of the following kind also satisfies Nyquist criterioAny filter of the following kind also satisfies Nyquist criterion; where n; where Z(fZ(f)=Z()=Z(--f) and Z(f)=0 for mag.(f)>fo>1/2Tsf) and Z(f)=0 for mag.(f)>fo>1/2Ts

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 9

Digital Modulation – Raised Cosine Rolloff Filters

tt

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 10

Digital Modulation – Geometrical Representation of Signals

tt

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 11

Digital Modulation - BPSK

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 12

Digital Modulation - QPSK

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 13

Digital Modulation - QPSK

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 14

Digital Modulation - QPSK

Convert the bit sequence from unipolar to bipolar NRZConvert the bit sequence from unipolar to bipolar NRZSplit the input bit stream into even and odd streamsSplit the input bit stream into even and odd streamsModulate the two streams separately on quadrature carriersModulate the two streams separately on quadrature carriersSum them together to form the QPSK signalSum them together to form the QPSK signalPass it through the BPF to confine the signal in the desired Pass it through the BPF to confine the signal in the desired bandband

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 15

Digital Modulation – Offset QPSK

Amplitude of the QPSK is constant Amplitude of the QPSK is constant Because of pulse shaping, they loose the constant Because of pulse shaping, they loose the constant envelope propertyenvelope propertyThe 180 phase shift can cause the envelope to pass The 180 phase shift can cause the envelope to pass through the zero for just an instant that causes the through the zero for just an instant that causes the filtered side lobes to reappear because of nonlinear filtered side lobes to reappear because of nonlinear amplifiers that do not linearly amplify the small amplifiers that do not linearly amplify the small voltagesvoltagesThis requires the use of less power efficient linear This requires the use of less power efficient linear amplifiersamplifiersOQPSK is less susceptible to this effectOQPSK is less susceptible to this effect

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 16

Digital Modulation – Offset QPSK

In OQPSK the even and odd bit steam are staggered by one bit In OQPSK the even and odd bit steam are staggered by one bit period resulting in at the most 90 degree phase transitionsperiod resulting in at the most 90 degree phase transitions

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 17

Digital Modulation – Pi/4 QPSK

It is compromise between QPSK and OQPSK. Maximum phase It is compromise between QPSK and OQPSK. Maximum phase transition is +transition is +--135 degrees135 degreesConstant envelope property is better than QPSK and worse than Constant envelope property is better than QPSK and worse than OQPSKOQPSKThere is at least a pi/4 phase shift There is at least a pi/4 phase shift

every symbolevery symbolGood for timing recoveryGood for timing recovery

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 18

Digital Modulation: Minimum Shift Keying – MSK

MSK is a special case of the continuous phase MSK is a special case of the continuous phase frequency shift keying wherein peak frequency frequency shift keying wherein peak frequency deviation is equal to deviation is equal to ¼¼ the bit rate:the bit rate:When When moduolationmoduolation index is 0.5 the two FSK signals index is 0.5 the two FSK signals are coherently orthogonal.are coherently orthogonal.As it is the minimum frequency spacing for two As it is the minimum frequency spacing for two signals to be orthogonal, it is the reason for the signals to be orthogonal, it is the reason for the name Minimum Shift Keyingname Minimum Shift KeyingMSK is special form of OQPSK where base band MSK is special form of OQPSK where base band rectangular pulses are replaced by half rectangular pulses are replaced by half sinusoidal pulsessinusoidal pulses

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 19

Digital Modulation: Minimum Shift Keying – MSK

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 20

Digital Modulation: Gaussian Minimum Shift Keying – GMSK

It is passing the MSK signal with a Gaussian pulse It is passing the MSK signal with a Gaussian pulse shaping filter, further shaping filter, further smothingsmothing the instantaneous the instantaneous phase and thus the phase and thus the sidelobessidelobes of the transmitted of the transmitted signal.signal.

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 21

Spread Spectrum Techniques

What is it?What is it?Why spread?Why spread?

Interference rejectionInterference rejectionInherent securityInherent security

Types of Spread Spectrum techniquesTypes of Spread Spectrum techniquesDirect SequenceDirect SequenceFrequency HoppedFrequency Hopped

How spread spectrum signal rejects interferenceHow spread spectrum signal rejects interferenceProcessing gainProcessing gain

Pg=Tx. Signal bandwidth/Pg=Tx. Signal bandwidth/appliactionappliaction data ratedata ratethe interference rejection is directly proportional to the the interference rejection is directly proportional to the processing gain and the crossprocessing gain and the cross--correlation properties of the correlation properties of the spreading codespreading code

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 22

The ISI & ACI problem - design of the appropriate Transmitted Pulse-shape

The transmitted pulse should be such that it The transmitted pulse should be such that it eliminates ISI and reduces the Adjacent Channel eliminates ISI and reduces the Adjacent Channel Interference (ACI) as much as possible. Interference (ACI) as much as possible. The Sinc pulse eliminates ISI but is not physically The Sinc pulse eliminates ISI but is not physically realizable. Its roll off as a function of frequency is realizable. Its roll off as a function of frequency is slowslowRaised cosine pulse is suitable for most practical Raised cosine pulse is suitable for most practical purposespurposesIn FDM systems, ACI is important as it deteriorates In FDM systems, ACI is important as it deteriorates signal quality in the adjacent bandsignal quality in the adjacent bandUse Guassian filter to increase the roll off rate.Use Guassian filter to increase the roll off rate.

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 23

The Typical Transmitter

digitalsourcedata

FEC encoder

bit/blockinterleaver

modulatortransmit

filter

up-converter

poweramplifier duplexer

D/Aconverter

Digital

Discrete

Analog

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 24

The Typical Receiver

demod.Rx

filter

Discrete

low noiseamplifier

widebandfilter

signalcombiner

downconverter

Analog

digitaldatasink

FEC decoder

bit/block deinterleaver

Digital

A/Dconverter

detector

equalizer

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 25

Main Tx./Rx. components

Why FEC coding?Why FEC coding?To provide error correction capability and reduce the desired To provide error correction capability and reduce the desired SNRSNR

Why interleaving?Why interleaving?To reduce the amount of burst errors due to deep fades or To reduce the amount of burst errors due to deep fades or impulsive noiseimpulsive noise

Why receive filter?Why receive filter?To reject undesired signalsTo reject undesired signals

Why amplification?Why amplification?To combat signal attenuationTo combat signal attenuation

Why equalizer?Why equalizer?To remove ISITo remove ISI

Why diversity?Why diversity?To combat the effects of signal fading To combat the effects of signal fading

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 26

About Equalizers

What actually equalizers do?What actually equalizers do?Channel inversionChannel inversionEqualizer frequency responseEqualizer frequency response

Equalizer structuresEqualizer structuresTransversal filtersTransversal filtersLinear vs. nonLinear vs. non--linearlinear

Equalizer training and adaptationEqualizer training and adaptationAdaptation algorithmsAdaptation algorithms

LMS algorithmLMS algorithm

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 27

About FEC coding and Interleaving

What is FEC coding?What is FEC coding?Types of FEC codingTypes of FEC coding

Block vs. convolutional codingBlock vs. convolutional coding

How coding works?How coding works?RedundancyRedundancyError detection and correctionError detection and correctionCode efficiencyCode efficiencyCoding gainCoding gain

How interleaving works?How interleaving works?Interleaving introduces delayInterleaving introduces delay

How it impacts applicationsHow it impacts applicationsvoice voice -- compressed or noncompressed or non--compressed compressed datadata

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 28

About Diversity

What is diversity?What is diversity?How does it work?How does it work?

Correlation in multipath signalsCorrelation in multipath signals

Types of diversity techniquesTypes of diversity techniquesspace, time, frequency, polarizationspace, time, frequency, polarization

Diversity combiningDiversity combiningselection, equal gain, maximal ratioselection, equal gain, maximal ratio

Commonly used techniquesCommonly used techniquesWhen and where to use?When and where to use?

Base station vs. mobileBase station vs. mobilepower of mobile vs. base station transmitterspower of mobile vs. base station transmitters

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 29

Multiple Access in Mobile Networks

Multiple access is not just multiplexing.Multiple access is not just multiplexing.It allows sharing of finite resource among more users on a It allows sharing of finite resource among more users on a dynamic basisdynamic basis

Design of a mobile cellular systemDesign of a mobile cellular systemavailable resource is allocated bandwidth and maximum available resource is allocated bandwidth and maximum power limitspower limitsChallenge is to design a system that maximizes the number Challenge is to design a system that maximizes the number of users that can be simultaneously supported in a cell while of users that can be simultaneously supported in a cell while reducing the number of cells in a given service area.reducing the number of cells in a given service area.

This is the system capacity problemThis is the system capacity problemMultiple access schemes have a role in the system capacity Multiple access schemes have a role in the system capacity calculationcalculation

What options are availableWhat options are availableFDMA FDMA -- TDMA TDMA -- CDMACDMA

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 30

Frequency Division Multiple Access-FDMABand of frequencies is divided into segments.Band of frequencies is divided into segments.

Each segment is available to a user during a callEach segment is available to a user during a callEach user has to contend for the access to the bandwidth Each user has to contend for the access to the bandwidth resource through a admission control mechanismresource through a admission control mechanismChannels are assigned as pair of frequenciesChannels are assigned as pair of frequenciesChannels are generally narrow, guard band is neededChannels are generally narrow, guard band is needed

Amplifier nonAmplifier non--linearity causes intermodulation linearity causes intermodulation frequencies infrequencies in--band and out of bandband and out of band

Downlink Uplink

890 915 935 960 - EuropeMHz

824 849 869 894 - US

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 31

Time Division Multiple Access - TDMA

Users share the bandwidth in timeUsers share the bandwidth in timeuse the same frequency band but not all the timeuse the same frequency band but not all the timeN users use the system 1/N time eachN users use the system 1/N time eachadmission control is needed for each calladmission control is needed for each callresource is reserved on per call basisresource is reserved on per call basis

TDMA is practical with digital signalsTDMA is practical with digital signalsTDMA is a store and burst systemTDMA is a store and burst system

Typical TDMA frame formatTypical TDMA frame formatNeed stringent synchronizationNeed stringent synchronizationDelay is an issue; user close to base station and at the cell Delay is an issue; user close to base station and at the cell edge have different propagation delay edge have different propagation delay -- guard time is guard time is needed to protect against thisneeded to protect against this-- it is adaptive frame it is adaptive frame alignmentalignment

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 32

TDMA vs FDMA

TDMA permits much more capacity than FDMATDMA permits much more capacity than FDMANegligible Intermodulation products in TDMA as only Negligible Intermodulation products in TDMA as only one carrier is used and has less bandwidth than the one carrier is used and has less bandwidth than the total FDMA systemtotal FDMA systemTDMA systems have overhead TDMA systems have overhead Control information can be sent without interruption Control information can be sent without interruption of speechof speechMay assist in hand over by monitoring an idle slotMay assist in hand over by monitoring an idle slotDynamic channel assignment is easily possible for the Dynamic channel assignment is easily possible for the case that channel conditions worsen; similar to some case that channel conditions worsen; similar to some cordless phones.cordless phones.Increased system flexibilityIncreased system flexibility

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 33

Code Division Multiple Access - CDMA

In CDMA, all users use the same frequency band In CDMA, all users use the same frequency band separation is in code domainseparation is in code domain

Main advantages are?Main advantages are?lower transmit power at the base and mobile station. Why?lower transmit power at the base and mobile station. Why?Soft handoffSoft handoffSome level of securitySome level of securityMore capacity than FDMAMore capacity than FDMA

Main disadvantagesMain disadvantagesnear far problemnear far problempower controlpower controlvery complex handoff managementvery complex handoff management

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 34

Source Data - Coding & Compression

Compression of the source signals increases system Compression of the source signals increases system capacity proportionallycapacity proportionallyThere are two coding approachesThere are two coding approaches

Waveform based codingWaveform based codingVocoders Vocoders -- use a parametric model of the sourceuse a parametric model of the source

Waveform based coding techniques are source type Waveform based coding techniques are source type independent so can be used in variety of situationindependent so can be used in variety of situation

They are robust in noisy environment and yield less degree They are robust in noisy environment and yield less degree of compressionof compressionPCM, DPCM, ADPCM, DM, APCPCM, DPCM, ADPCM, DM, APC

Vocoders achieve high compression but are more Vocoders achieve high compression but are more complexcomplex

They are also signal specific as they use a specific They are also signal specific as they use a specific parametric model of the sourceparametric model of the source

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 35

Characteristics of the Speech Signal

Amplitude of the speech signal is nonAmplitude of the speech signal is non--unifromlyunifromlydistributeddistributedsuccessive speech samples have nonsuccessive speech samples have non--zero correlationzero correlationSpeech spectra is not flatSpeech spectra is not flatSpeech spectra is band limitedSpeech spectra is band limitedSpeech signal has voice and nonSpeech signal has voice and non--voice partvoice partquasiquasi--periodicity of the speech signalsperiodicity of the speech signalsPDF of voice is a two sided Laplacian distribution PDF of voice is a two sided Laplacian distribution (7.1)(7.1)

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 36

Waveform Coding

Sampling, Quantization and CodingSampling, Quantization and CodingQuantizationQuantization

what is itwhat is itQuantization noiseQuantization noiseSignal to Quantization noise ratioSignal to Quantization noise ratioUniform vs NonUniform vs Non--uniform uniform MuMu and A law and A law compandingcompanding

PCM encodingPCM encoding

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 37

PCM Encoding example

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 38

Delta Modulation

Quite Different in principal to PCMQuite Different in principal to PCMCoding is simple, one bit at a timeCoding is simple, one bit at a timesampling rate should be much higher, it determines the sampling rate should be much higher, it determines the quantization noise floor.quantization noise floor.Delta modulation, modulates the slope of the signal, Delta modulation, modulates the slope of the signal, negative (0)or positive (1).negative (0)or positive (1).Does not capture the instantaneous valueDoes not capture the instantaneous value

+- +

Integrator Pulse Generator

0

Input + 11 Output

0- 0IntegratorPulse

Generator1

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 39

ADPCM

Mix of both PCM and DMMix of both PCM and DMExploits correlation in adjacent samplesExploits correlation in adjacent samples

removes redundancy in the voice signalremoves redundancy in the voice signalvariance of the successive speech signals is much less than variance of the successive speech signals is much less than the variance of the speech signal itself.the variance of the speech signal itself.

Implemented using signal prediction techniquesImplemented using signal prediction techniquesA predictor predicts the current sampleA predictor predicts the current sampledifference between the predicted and actual sample is the difference between the predicted and actual sample is the prediction errorprediction errorprediction error is encoded using PCM and then transmitted prediction error is encoded using PCM and then transmitted decoder is essentially an integrator as in DM. decoder is essentially an integrator as in DM.

Speech Coding for 32 kbpsSpeech Coding for 32 kbps

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 40

Frequency Domain Coding

Two kindsTwo kindsSub band codingSub band codingBlock transform codingBlock transform coding

Sub band codingSub band codingControls and distributes quantization noise in different Controls and distributes quantization noise in different spectrum bands based on perceptibilityspectrum bands based on perceptibilityPerceptual quality Perceptual quality -- some bands of frequencies are more some bands of frequencies are more perceptible than otherperceptible than otheruse more bit to code those that are more perceptible to use more bit to code those that are more perceptible to human earhuman earUse 4 to 8 bandsUse 4 to 8 bandsUse octave band splitting as human ear has decreasing Use octave band splitting as human ear has decreasing sensitivity to frequencysensitivity to frequency

Speech Coding from 9.6Speech Coding from 9.6--32 kbps: Typical 16 kbps32 kbps: Typical 16 kbps

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 41

Sub Band Coding

LP Translator

LP Translator

Decimator

Decimator

Encoder

Encoder MU

LTIP

LEX

OR

s(t)

BP Translator

BP Translator

Decoder

Decoder

Interpolator

Interpolator

+

DEM

ULT

IPLE

XO

R

s’(t)

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 42

Adaptive Transform Coding

Take a block of input speech samples and then take Take a block of input speech samples and then take a transforma transformSeparately send each transform coefficients after Separately send each transform coefficients after quantization and encodingquantization and encodingInverse transform the quantized transform Inverse transform the quantized transform coefficients to find the approximated speech samples coefficients to find the approximated speech samples Most commonly used transform technique is Discrete Most commonly used transform technique is Discrete Cosine Transform (DCT) (Eq. 7.11 and 7.22)Cosine Transform (DCT) (Eq. 7.11 and 7.22)Transforms are computationally extensiveTransforms are computationally extensive

Fast algorithms are available Fast algorithms are available

Speech Coding from 9.6Speech Coding from 9.6--20 kbps:20 kbps:

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 43

ATC (DCT) Implementation

The frame of N samples to be transformed or inverse The frame of N samples to be transformed or inverse transformed are stored in a buffertransformed are stored in a bufferEach coefficient has a particular number of bits associated withEach coefficient has a particular number of bits associated witheach coefficient of a frameeach coefficient of a framebit allocation changes from frame to frame with total number of bit allocation changes from frame to frame with total number of bits/frame staying the samebits/frame staying the sameDynamic bit allocation is controlled by time varying statistics Dynamic bit allocation is controlled by time varying statistics that are transmitted as side/overhead information.that are transmitted as side/overhead information.In practical systems, overhead information is the log energy In practical systems, overhead information is the log energy spectrum that may be obtained from transform coefficients by spectrum that may be obtained from transform coefficients by averaging over a number of framesaveraging over a number of framesNumber of bits for each transform coefficient is proportional toNumber of bits for each transform coefficient is proportional tothe the corresponding spectral energy valuethe the corresponding spectral energy value

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 44

Vocoders

The parametric model of SpeechThe parametric model of SpeechSpeech generation modelSpeech generation modelSpeech I voiced and unvoicedSpeech I voiced and unvoicedSound generating mechanism and Vocal Tract Filter Sound generating mechanism and Vocal Tract Filter forms the systemforms the systemVoiced sounds are a result of quasiperiodic vibrations Voiced sounds are a result of quasiperiodic vibrations of the vocal cordof the vocal cord\\Unvoiced sounds are turbulent air flows through a Unvoiced sounds are turbulent air flows through a constrictionconstrictionThree parameters are Three parameters are

pitch frequencypitch frequencypole frequencies of the modulating filterpole frequencies of the modulating filteramplitude parameters (loudness)amplitude parameters (loudness)

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 45

Vocoders - Linear Predictive Coders (LPC)

Time domain class of vocodersTime domain class of vocodersLPC model vocal tract as an all pole linear filter with the tranLPC model vocal tract as an all pole linear filter with the transfer sfer function in 7.13function in 7.13The filter is excited by either a pulse at the pitch frequency oThe filter is excited by either a pulse at the pitch frequency or r random white noiserandom white noisefilter coefficients are obtained in time domain by the linear filter coefficients are obtained in time domain by the linear prediction techniques. The principal is same as ADPCMprediction techniques. The principal is same as ADPCMLPC systems send only selected characteristics of the error LPC systems send only selected characteristics of the error signal;signal;

the gain factorthe gain factorpitch informationpitch informationvoiced/unvoiced decision informationvoiced/unvoiced decision information

error signal info is the excitation for the synthesis filter.error signal info is the excitation for the synthesis filter.

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 46

LPC Coding System

LPC Filter

Pitch Analysis

Encoder

Encoder

Decoder

Decoder SYN

THES

IZERs(t)

Voice/UnvoicedDecision

Encoder Decoder

CH

AN

NEL

Estimate parameters over 15Estimate parameters over 15--30 ms; 30 ms; Typical 2.4 Typical 2.4 --4.8 kbps4.8 kbpsTradeoff is in rate vs latencyTradeoff is in rate vs latencyCELP CELP -- Code Excited Linear predictionCode Excited Linear prediction

Excitation

Voice/Unvoiced

Buffer

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 47

Factors in Speech Codec Decision

Compatibility with existing standards Compatibility with existing standards Perceived quality of the voicePerceived quality of the voiceEncoding delayEncoding delayAlgorithmic complexity of the CodecAlgorithmic complexity of the CodecDC power requirementDC power requirementRobustness to transmission errorsRobustness to transmission errors

64 PCM and 40 ADM show similar robustness for same BER64 PCM and 40 ADM show similar robustness for same BERVocoders have different importance to different bits. So Vocoders have different importance to different bits. So error protection should be accordingly providederror protection should be accordingly provided

GSM Codec is RPEGSM Codec is RPE--LTP (Regular Pulse Excited LTP (Regular Pulse Excited -- Long Long Term Prediction) 13 kbpsTerm Prediction) 13 kbpsTable 7.1, Example 7.4Table 7.1, Example 7.4

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 48

What is Network Management (NM)?

Effective NM Effective NM optimizesoptimizes a networka network’’s operational s operational capabilities capabilities

Primary/Key functionsPrimary/Key functionspeak network performancepeak network performanceforecasting performance deteriorationforecasting performance deteriorationfix the causes of deteriorationfix the causes of deteriorationfix the consequences of deteriorationfix the consequences of deteriorationnetwork survivabilitynetwork survivability

Secondary functionsSecondary functionsnetwork performance information in quasinetwork performance information in quasi--real timereal timemaintenance and enforcement of network securitymaintenance and enforcement of network securitydata on network usagedata on network usage

configuration managementconfiguration managementadministrative managementadministrative management

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 49

Network Management

Traditional breakout by taskTraditional breakout by taskFault ManagementFault Management

provide information on the status of all network elementsprovide information on the status of all network elementsdisplay faults and their locationdisplay faults and their locationdisplay deterioration in performance (e.g., congestion) and display deterioration in performance (e.g., congestion) and suggest solutionsuggest solutionRate of information should be high to ensure correlation of Rate of information should be high to ensure correlation of events before faultevents before fault

Configuration ManagementConfiguration ManagementInventory of the resourcesInventory of the resourcesHelps resource provisioning (deployment of network equipment Helps resource provisioning (deployment of network equipment to keep up with the demand or vice versa) to keep up with the demand or vice versa) and user provisioning (provides data for end user service and user provisioning (provides data for end user service provisioning such as initiation termination and management of provisioning such as initiation termination and management of services)services)

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 50

Network Management

Performance ManagementPerformance Managementensure specified network performanceensure specified network performancegrowth managementgrowth management

Security ManagementSecurity Managementcontrol access; no unauthorized usecontrol access; no unauthorized useprotect the network against intentional and accidental abuseprotect the network against intentional and accidental abuseprotect communication lossprotect communication losslink encryption, key and passwords management,user link encryption, key and passwords management,user authentication authentication

Accounting ManagementAccounting Managementservice and utilization records managementservice and utilization records managementcustomer billing reportscustomer billing reportscosts and service charge analysis and reportscosts and service charge analysis and reports

Network Survivability; It is the brainNetwork Survivability; It is the brainNM center is not operational because of flood, earth quake, NM center is not operational because of flood, earth quake, terrorism, All network is dead. terrorism, All network is dead.

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 51

Network Management System - NMS

What are NMS?What are NMS?Provide automatic means of remotely monitoring a network for Provide automatic means of remotely monitoring a network for

levels of performancelevels of performanceequipment failures, outagesequipment failures, outageslevels of traffic, network usagelevels of traffic, network usage

Network Management System use distributed processingNetwork Management System use distributed processingTypically require a communication link to monitor and control Typically require a communication link to monitor and control the networkthe network

It is the same link that is used for rest of the traffic. It is the same link that is used for rest of the traffic. It shares the link bandwidthIt shares the link bandwidthTypical approach is multiplexingTypical approach is multiplexingWhile resources for the user may be shared and not guaranteed, While resources for the user may be shared and not guaranteed, Network resources may be permanently availableNetwork resources may be permanently available

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 52

Network Management Protocols

There are two main protocols. Rest are their variations.There are two main protocols. Rest are their variations.SNMP SNMP -- Simple Network Management Protocol (TCP/IP World)Simple Network Management Protocol (TCP/IP World)CMIP CMIP -- Common Management Information Protocol (OSI World)Common Management Information Protocol (OSI World)

SNMPSNMPThree componentsThree components

The protocolThe protocolThe MIB (Management of Information Base)The MIB (Management of Information Base)The SMI (Structure of Management Information)The SMI (Structure of Management Information)

ClientClient--Server ModelServer Model

MIBSMI

NOC MIBSMI

Agent

Managing System - Client Managed System - Server

ManagementProtocol

Request Execute

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 53

SNMP

SMI SMI the set of Rules that define MIB objectsthe set of Rules that define MIB objectsgeneric types used to define management informationgeneric types used to define management information

Abstract Syntax Notation One Abstract Syntax Notation One -- ASN.1 (ITUASN.1 (ITU--T X.400)T X.400)high level abstract language high level abstract language

organizes MIB objects into an upside down treeorganizes MIB objects into an upside down tree

MIBMIBSet of managed objects or variablesSet of managed objects or variablesEach object has a unique name and identifier for Each object has a unique name and identifier for management purposesmanagement purposesMIBs are defined for each management element or nodeMIBs are defined for each management element or nodeComplete definition of a MIB element includesComplete definition of a MIB element includes

name, syntax, definition, access method, status (req., optional)name, syntax, definition, access method, status (req., optional)

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 54

SNMP Architecture and Messages

SNMP ArchitectureSNMP Architectureone or few managers and a number of agents scattered one or few managers and a number of agents scattered throughout the networkthroughout the networkagents use the local MIB to provide data to the NMS for agents use the local MIB to provide data to the NMS for manipulationmanipulationMessagesMessages

GetRequestGetRequestGetNextRequestGetNextRequestGetResponseGetResponseSetRequestSetRequestTrapTrap

Connectionless protocolConnectionless protocolSNMP/UDP/IP/SNMP/UDP/IP/……High overheadHigh overhead

MIB View

Agent

MIB View

Agent

GetRequest Trap SetRequest

MIB View

Agent

Mobile Station Router Workstation

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 55

SNMP Message Encapsulation

SNMP message encapsulated in the UDP (User SNMP message encapsulated in the UDP (User datagram Protocol) Datagramdatagram Protocol) DatagramUDP datagram encapsulated in IP datagramUDP datagram encapsulated in IP datagramIP packet encapsulated in the local network frameIP packet encapsulated in the local network frame

e.g., Ethernet, then local network frame is Ethernet framee.g., Ethernet, then local network frame is Ethernet frameif IP packet is too big, it will be in multiple Ethernet frameif IP packet is too big, it will be in multiple Ethernet frame

Local Network frame

IP Datagram

UDP Datagram

SNMP Message Local NetworkTrailer

Local NetworkHeader

UDP HeaderIP header

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 56

SNMP Messages Structure

Version No. to ensure same version used by all parties Version No. to ensure same version used by all parties Community name; a security mech. to authorize the registered useCommunity name; a security mech. to authorize the registered usersrsSNMP PDU is one of the five standard messagesSNMP PDU is one of the five standard messagesTRAP PDU structure is different from the otherTRAP PDU structure is different from the otherPDU Type field identifies one of the five message type, Table 18PDU Type field identifies one of the five message type, Table 18.1.1Request ID correlates request with responseRequest ID correlates request with response

Version GetRequest, SetRequest, GetNextRequest, GetResponse PDUCommunity

PDU Type Request ID Error Status Error Index Object 1, Value 1 Object 2, Value 2 ...

SNMP Message

Variable Binding

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 57

SNMP Messages Structure

Error Status field identifies errors or no errorsError Status field identifies errors or no errorsError Index filed identifies the error type if Error Status fileError Index filed identifies the error type if Error Status filed d indicated an error Table 18.2 p. 965indicated an error Table 18.2 p. 965A variable binding field pairs a variable name with its value A variable binding field pairs a variable name with its value e.g. a MIB element name and its valuee.g. a MIB element name and its value

Version GetRequest, SetRequest, GetNextRequest, GetResponse PDUCommunity

PDU Type Request ID Error Status Error Index Object 1, Value 1 Object 2, Value 2 ...

SNMP Message

Variable Binding

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 58

SNMP Trap Messages Structure

Trap is an unsolicited packet from an agent to a manger on a Trap is an unsolicited packet from an agent to a manger on a prescribed conditionprescribed condition

coldStart, warmStart, linkDown, linkUp, authenticationFailure, coldStart, warmStart, linkDown, linkUp, authenticationFailure, egpNeighbourloss, enterpriseSpecificegpNeighbourloss, enterpriseSpecific

Trap uses a different UDP port (162 instead of 161)Trap uses a different UDP port (162 instead of 161)PDU Type is set to 4. Why?PDU Type is set to 4. Why?Enterprise field; identifies the management enterprise Enterprise field; identifies the management enterprise authorityauthorityAgent Address: agents IP addressAgent Address: agents IP address

Version Trap PDUCommunity

SNMP Message

PDU Type

Enterprise Agent Address

Generic TrapType

Object 1, Value 1 Object 2, Value 2 ...Specific TrapType

Timestamp

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 59

SNMP Trap Messages Structure

Generic and Specific Trap Types; More specific information on Generic and Specific Trap Types; More specific information on the particular trap type; Table 18.3the particular trap type; Table 18.3Timestamp; value of the sysUpTimeobject. Amount of time Timestamp; value of the sysUpTimeobject. Amount of time elapsed between last reinitialization and the regeneration of elapsed between last reinitialization and the regeneration of the trap.the trap.

Version Trap PDUCommunity

PDU Type

Enterprise Agent Address

Generic TrapType

Object 1, Value 1 Object 2, Value 2 ...Specific TrapType

Timestamp

SNMP Message

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 60

Remote Monitoring - RMON

Distributed networksDistributed networksGeographicalGeographicalLogicalLogical

Remote MonitoringRemote Monitoringput remote management devices on remote segments of the put remote management devices on remote segments of the network, called probesnetwork, called probesprobes are sensors of the NMSprobes are sensors of the NMS

MIB for these probes is called RMON MIBMIB for these probes is called RMON MIBentries of this MIB may be exchanged between elements of entries of this MIB may be exchanged between elements of the network management systemthe network management system

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 61

SNMP V2Builds on the experience of SNMPBuilds on the experience of SNMPseparates the management protocol from the transport separates the management protocol from the transport mechanismmechanism

may be used in different protocol environmentmay be used in different protocol environmentincreases reliability of the SNMP increases reliability of the SNMP UDP is not as reliable a protocol as TCPUDP is not as reliable a protocol as TCPtrap messages are of significance but there is no confirmation trap messages are of significance but there is no confirmation mechanism for them in SNMPmechanism for them in SNMPif a trap message is lost, neither agent nor manager would if a trap message is lost, neither agent nor manager would know that a trap message is lostknow that a trap message is lostSNMP v2 eliminates trap primitive with GETSNMP v2 eliminates trap primitive with GET--RESPONSE frame RESPONSE frame generated by agent and meant for port 162 of the managergenerated by agent and meant for port 162 of the managerA trap MIB has been added to help trap event handlingA trap MIB has been added to help trap event handlingSNMP is inefficient from Bandwidth perspectiveSNMP is inefficient from Bandwidth perspectiveGetBulkRequest helps efficiency and removes the need of GetBulkRequest helps efficiency and removes the need of repeated request. repeated request. Allows manager to manager communications Allows manager to manager communications

stations can act as agent or managerstations can act as agent or manager

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 62

CMIP

Considerably more complex than SNMPConsiderably more complex than SNMPuses different terminology than SNMPuses different terminology than SNMPDatabase is MIT (Management Information Tree) not MIBDatabase is MIT (Management Information Tree) not MIBPlatforms and devices are MOs (Managed Objects)Platforms and devices are MOs (Managed Objects)CMIP is used by a platform to change, create, retrieve or CMIP is used by a platform to change, create, retrieve or delete MOs in an MITdelete MOs in an MITCMIP uses connection oriented communication vs CMIP uses connection oriented communication vs connectionless for SNMPconnectionless for SNMPCommunications are generally acknowledgedCommunications are generally acknowledged

Network Management in ATM NetworksNetwork Management in ATM NetworksInterim Local Management Interface (ILMI)Interim Local Management Interface (ILMI)It is SNMP without UDP and IP and an ATM UNI MIBIt is SNMP without UDP and IP and an ATM UNI MIBManagement channel is a wellManagement channel is a well--known VPI and VCI addressknown VPI and VCI address

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 63

Link Layer Protocol

Basic Protocol Functions:Basic Protocol Functions:Segmentation and reassemblySegmentation and reassembly

Breaking the data in blocks (PDU) and reassembling themBreaking the data in blocks (PDU) and reassembling them

EncapsulationEncapsulationAddition of control information (header). Address, sequence numbAddition of control information (header). Address, sequence number er and error control fields are typical examplesand error control fields are typical examples

Connection ControlConnection ControlConnection establishment, data transfer and connection terminatiConnection establishment, data transfer and connection terminationon

Ordered DeliveryOrdered DeliveryFor connectionless packet data, it ensures that all packets are For connectionless packet data, it ensures that all packets are in order in order

Error ControlError ControlThis helps recover lost or errored PDUs (e.g. TCP)This helps recover lost or errored PDUs (e.g. TCP)

Flow ControlFlow ControlMakes sure that buffers do not fill up causing erasures of PDUsMakes sure that buffers do not fill up causing erasures of PDUsWorks in several layersWorks in several layers

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 64

Link Layer Protocol

MultiplexingMultiplexingincreases efficiencyincreases efficiencymultiple higher layer functions should be multiplexed at the multiple higher layer functions should be multiplexed at the lower layer to increases transmission efficiency.lower layer to increases transmission efficiency.

Mapping of PDUs in Adjacent Layers Mapping of PDUs in Adjacent Layers PDU PDU -- Protocol Data UnitProtocol Data UnitSDU SDU -- Service Data UnitService Data UnitPCI PCI -- Protocol Control InformationProtocol Control Information

(N) PDU

(N-1) SDU

(N-1) PDU

(N-1) PCI

(N) layer

(N-1) layer

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 65

Link Layer Protocol

DataData--Link LayerLink LayerProvide reliable interchange of data across a link established Provide reliable interchange of data across a link established by the physical layerby the physical layerPhysical layer also tries to provide reliable transmission. ThisPhysical layer also tries to provide reliable transmission. Thislayer provides additional capabilitieslayer provides additional capabilitiesConsider the case of multiple physical links with disparate Consider the case of multiple physical links with disparate qualities. DLL will ensure parity on a peer basis. qualities. DLL will ensure parity on a peer basis.

HDLC: the mother of others (LAPBHDLC: the mother of others (LAPB--LAPD etc.)LAPD etc.)TerminologyTerminology

Primary Station Primary Station -- master; sends commandsmaster; sends commandsSecondary Station Secondary Station -- slave, sends responsesslave, sends responsesCombined Station Combined Station -- equal; does both commands and responsesequal; does both commands and responsesUnbalanced Configuration Unbalanced Configuration -- Masters and slaveMasters and slaveBalanced Configuration Balanced Configuration -- EqualsEquals

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 66

High-level Data-Link Control - HDLC

Combined CombinedCommands

Responses

Secondary Secondary

PrimaryCommands

Responses

Modes of OperationsNormal response mode

unbalanced configuration - respond only when polled

Asynchronous response modeunbalanced configuration - slave may initiate transmission

Asynchronous balanced modebalanced configuration - any of the combined stations may initiate data transmission and provide error recovery

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 67

High-level Data-Link Control - HDLC

HDLC Frame FormatHDLC Frame Format

Flag Flag -- 01111110 delimits frame boundary01111110 delimits frame boundaryAddress Field Address Field --

individual or group individual or group addresseaddresseaddress field in extendable address field in extendable --

if LSB is 0 next octet is address fieldif LSB is 0 next octet is address field

F A C I FCS F

OpeningFlag

Address Field Control Field Information Field Frame CheckSequence

ClosingFlag

8 bits 8 bitsexpandable

in 8 bitincrements

8 bitsexpandable

in 8 bitincrements

8 bits(32 bits optional)

8 bits

5/8/2006 CS-CMPE-5710: Mobile Wireless Networks 68

High-level Data-Link Control - HDLC

Control Field Control Field -- three kinds three kinds Information frameInformation frameSupervisory frameSupervisory frameUnnumbered frameUnnumbered frame

I field I field -- Carries informationCarries informationlength is variablelength is variable