<< Chapter < Page Chapter >> Page >

A Gray code has the property that the binaryrepresentation for each symbol differs from its neighbors by exactly one bit.A Gray code for the translation of binary into 4-PAM is

01 + 3 11 + 1 10 - 1 00 - 3

Mimic the code in naivecode.m to implement this alternative and plot the number of errors as a function ofthe noise variance v . Compare your answer with [link] . Which code is better?

Symbols to signals

Even though the original message is translated into the desired alphabet, it is not yet ready for transmission:it must be turned into an analog waveform. In the binary case, a simple method is to use a rectangular pulseof duration T seconds to represent + 1 , and the same rectangular pulse inverted (i.e., multiplied by - 1 ) to represent the element - 1 . This is called a polar non-return-to-zero line code.The problem with such simple codes is that they use bandwidth inefficiently.Recall that the Fourier transform of the rectangular pulse in time is the sinc ( f ) function in frequency [link] , which dies away slowly as f increases. Thus, simple codes like the non-return-to-zeroare compact in time, but wide in frequency, limiting the number of simultaneous nonoverlapping users ina given spectral band.

More generally, consider the four-level signal of [link] . This can be turned into an analog signal for transmission by choosinga pulse shape p ( t ) (that is not necessarily rectangular and not necessarily of duration T ) and then transmitting

p ( t - k T ) if the k th symbol is 1 - p ( t - k T ) if the k th symbol is - 1 3 p ( t - k T ) if the k th symbol is 3 - 3 p ( t - k T ) if the k th symbol is - 3

Thus, the sequence is translated into an analog waveform by initiating a scaled pulse at the symbol time k T , where the amplitude scaling is proportional to the associated symbolvalue. Ideally, the pulse would be chosen so that

  • the value of the message at time k does not interfere with the value of the message at other sample times(the pulse shape causes no intersymbol interference ),
  • the transmission makes efficient use of bandwidth, and
  • the system is resilient to noise.

Unfortunately, these three requirements cannot all be optimized simultaneously, and so the design of thepulse shape must consider carefully the tradeoffs that are needed. The focus in Chapter [link] is on how to design the pulse shape p ( t ) , and the consequences of that choice in terms of possible interference betweenadjacent symbols and in terms of the signal-to-noise properties of the transmission.

For now, to see concretely how pulse shaping works, let's pick a simple nonrectangular shape and proceedwithout worrying about optimality. Let p ( t ) be the symmetrical blip shape shown in the top part of [link] , and defined in pulseshape.m by the hamming command. The text string in str is changed into a 4-level signal as in Example [link] , and then the complete transmitted waveform is assembled by assigning an appropriatelyscaled pulse shape to each data value. The output appears in the bottom of [link] . Looking at this closely, observe that the first letter T is represented by the four values - 1 - 1 - 1 - 3 , which corresponds exactly to the first four negative blips, three small and one large.

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, Software receiver design. OpenStax CNX. Aug 13, 2013 Download for free at http://cnx.org/content/col11510/1.3
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'Software receiver design' conversation and receive update notifications?

Ask