SlideShare a Scribd company logo
Chapter 3 Pulse Modulation
We migrate from analog modulation
(continuous in both time and value) to digital
modulation (discrete in both time and value)
through pulse modulation (discrete in time but
could be continuous in value).
© Po-Ning Chen@ece.nctu Chapter 3-2
3.1 Pulse Modulation
 Families of pulse modulation
 Analog pulse modulation
 A periodic pulse train is used as carriers (similar to
sinusoidal carriers)
 Some characteristic feature of each pulse, such as
amplitude, duration, or position, is varied in a
continuous matter in accordance with the sampled
message signal.
 Digital pulse modulation
 Some characteristic feature of carriers is varied in a
digital manner in accordance with the sampled,
digitized message signal.
© Po-Ning Chen@ece.nctu Chapter 3-3
3.2 Sampling Theorem






n
s
s nT
t
nT
g
t
g )
(
)
(
)
( 

   

 














n
s
s
n
s
s f
nT
j
nT
g
dt
ft
j
nT
t
nT
g
f
G 


 2
exp
)
(
2
exp
)
(
)
(
)
(
 Ts sampling period
 fs = 1/Ts sampling rate
t
 Given:
 Claim:
© Po-Ning Chen@ece.nctu Chapter 3-4
3.2 Sampling Theorem






m
s
s mf
f
G
f
f
G )
(
)
(

 






n
s
s f
nT
j
nT
g
f
G 
 2
exp
)
(
)
(
0
0
f
f
© Po-Ning Chen@ece.nctu Chapter 3-5
3.2 Spectrum of Sampled Signal
df
f
f
n
j
f
L
f
c
f
f
n
j
c
f
L
f
mf
f
G
f
f
L
s
s
f
f
s
s
n
n s
n
s
m
s
s
































2
/
2
/
2
exp
)
(
1
where
,
2
exp
)
(
,
Expansion
Series
By Fourier
.
period
with
periodic
is
it
that
notice
and
,
)
(
)
(
Let


 




















 











2
/
2
/
2
/
2
/
2
exp
)
(
2
exp
)
(
1
s
s
s
s
f
f
s
m
s
f
f
s
s
n
df
f
f
n
j
mf
f
G
df
f
f
n
j
f
L
f
c



Proof:
cn = G( f - mfs )exp -j
2pn
fs
f
æ
è
ç
ö
ø
÷df
- fs /2
fs /2
ò
m=-¥
¥
å , s = f - mfs
= G(s)exp -j
2pn
fs
(s+ mfs )
æ
è
ç
ö
ø
÷ds
- fs /2-mfs
fs /2-mfs
ò
m=-¥
¥
å
= G(s)exp -j
2pn
fs
s
æ
è
ç
ö
ø
÷ds
- fs /2-mfs
fs /2-mfs
ò
m=-¥
¥
å
= G(s)
-¥
¥
ò exp -j
2pn
fs
s
æ
è
ç
ö
ø
÷ds
= g(-nTs )
© Po-Ning Chen@ece.nctu Chapter 3-6
  .
where
,
2
exp
)
(
2
exp
)
(
)
(
n
m
f
mT
j
mT
g
f
f
n
j
nT
g
f
L
m
s
s
n s
s

























Q.E.D.
© Po-Ning Chen@ece.nctu Chapter 3-7
3.2 First Important Conclusion from Sampling
 Uniform sampling at the time domain results in a periodic
spectrum with a period equal to the sampling rate.













m
s
s
n
s
s mf
f
G
f
f
G
nT
t
nT
g
t
g )
(
)
(
)
(
)
(
)
( 
 
0
0
f
f
© Po-Ning Chen@ece.nctu Chapter 3-8
3.2 Reconstruction from Sampling
.
2
Take W
fs 
Ideal lowpass filter
.
|
|
for
)
(
2
1
)
( W
f
f
G
W
f
G 
 
0
0
f
f
© Po-Ning Chen@ece.nctu Chapter 3-9
3.2 Aliasing due to Sampling
.
samples
ed
undersampl
by
ed
reconstruc
be
cannot
)
(
,
2
When f
G
W
fs 
0
© Po-Ning Chen@ece.nctu Chapter 3-10
 A band-limited signal of finite energy with bandwidth W
can be completely described by its samples of sampling rate
fs  2W.
 2W is commonly referred to as the Nyquist rate.
 How to reconstruct a band-limited signal from its samples?
3.2 Second Important Conclusion from Sampling
2W
fs
 
 
 
 
 
)
(
2
sinc
2
)
(
)
(
2
)
(
2
sin
)
(
2
)
(
2
exp
)
(
1
)
2
exp(
2
exp
)
(
1
)
2
exp(
)
(
)
2
exp(
)
(
)
(
s
s
n
s
s
s
n
s
s
W
W
s
n
s
s
W
W
n
s
s
s
W
W
nT
t
W
WT
nT
g
nT
t
W
nT
t
W
nT
g
f
W
df
f
nT
t
j
nT
g
f
df
ft
j
f
nT
j
nT
g
f
df
ft
j
f
G
df
ft
j
f
G
t
g





















 



























2WTs sinc[2W(tnTs)] plays the role of an interpolation function
for samples.
© Po-Ning Chen@ece.nctu Chapter 3-11
See Slides 3-4 ~ 3-6
© Po-Ning Chen@ece.nctu Chapter 3-12
3.2 Band-Unlimited Signals
 The signal encountered in practice is often not strictly band-
limited.
 Hence, there is always “aliasing” after sampling.
 To combat the effects of aliasing, a low-pass anti-aliasing
filter is used to attenuate the frequency components outside
[fs/2, fs/2].
 In this case, the signal after passing the anti-aliasing filter is
often treated as bandlimited with bandwidth fs/2 (i.e., fs =
2W). Hence,







 



n
T
t
nT
g
t
g
s
n
s sinc
)
(
)
(
© Po-Ning Chen@ece.nctu Chapter 3-13
3.2 Interpolation in terms of Filtering
 Observe that
is indeed a convolution between g(t) and sinc(t/Ts).







 



n
T
t
nT
g
t
g
s
n
s sinc
)
(
)
(
 
 























 









 















 









n s
s
s
s
n
s
s
s
s
d
T
t
nT
nT
g
d
T
t
nT
nT
g
d
T
t
g
T
t
t
g













sinc
)
(
)
(
sinc
)
(
)
(
sinc
)
(
sinc
*
)
(






















n s
s
s
n
T
t
nT
g
T
t
t
g sinc
)
(
sinc
*
)
(

(Continue from the previous slide.)










s
T
t
t
h sinc
)
(
filter)
tion
(interpola
filter
tion
Reconstruc
)
(
rect
)
( f
T
T
f
H s
s


2
/
s
f
 2
/
s
f
s
f
)
(t
g )
(t
g
© Po-Ning Chen@ece.nctu Chapter 3-14
)
( f
H
© Po-Ning Chen@ece.nctu Chapter 3-15
3.2 Physical Realization of Reconstruction Filter
 An ideal lowpass filter is not physically realizable.
 Instead, we can use an anti-aliasing filter of bandwidth W,
and use a sampling rate fs > 2W. Then, the spectrum of a
reconstruction filter can be shaped like:
0
Signal spectrum with bandwidth W
Signal spectrum after
sampling with fs > 2W
The physically realizable
reconstruction filter
)
(
*
)
(
)
(
)
(
)
(
)
(
)
(
*
)
( ideal
ideal
realizable
realizable t
h
t
g
f
H
f
G
f
H
f
G
t
h
t
g 


 


© Po-Ning Chen@ece.nctu Chapter 3-16
0
0
 PAM
 The amplitude of regularly spaced pulses is varied in
proportion to the corresponding sample values of a
continuous message signal.
© Po-Ning Chen@ece.nctu Chapter 3-17
3.3 Pulse-Amplitude Modulation (PAM)
Notably, the top of each
pulse is maintained flat.
So, this is PAM, not
natural-sampling for
which the message
signal is directly
multiplied by a periodic
train of rectangular
pulses.
t
T
Ts
© Po-Ning Chen@ece.nctu Chapter 3-18
3.3 Pulse-Amplitude Modulation (PAM)
 The operation of generating a PAM modulated signal is
often referred to as “sample and hold.”
 This “sample and hold” process can also be analyzed
through “filtering technique.”
)
(
*
)
(
)
(
)
(
)
( t
h
t
m
nT
t
h
nT
m
t
s
n
s
s 


 













otherwise
,
0
,
0
,
2
/
1
0
,
1
)
(
where T
t
t
T
t
t
h .
)
(
)
(
)
(
and 





n
s
s nT
t
nT
m
t
m 

© Po-Ning Chen@ece.nctu Chapter 3-19
3.3 Pulse-Amplitude Modulation (PAM)
 By taking “filtering” standpoint, the spectrum of S(f) can be
derived as:
 M(f) is the message signal with bandwidth W (or having
experienced an anti-aliasing filter of bandwidth W).
 fs  2W.
)
(
)
(
)
(
)
(
)
(
)
(
)
(
f
H
kf
f
M
f
f
H
kf
f
M
f
f
H
f
M
f
S
k
s
s
k
s
s


















 
© Po-Ning Chen@ece.nctu Chapter 3-20
3.3 Pulse-Amplitude Modulation (PAM)
)
(
)
(
)
(
)
(
)
(
)
(
)
(
)
(
)
(
)
(
Equalizer
Filter
tion
Reconstruc
1
|
|
f
M
f
H
f
M
f
H
kf
f
M
f
f
H
f
M
f
f
H
kf
f
M
f
f
S
k
s
s
s
k
s
s













)
(
1
))
(
of
]
,
[
range
(over the
f
H
f
M
W
W

0
Reconstruction
filter
Equalizer
s(t) m(t)
© Po-Ning Chen@ece.nctu Chapter 3-21
3.3 Feasibility of Equalizer Filter
 The distortion of M(f) is due to M(f)H(f),
   
fT
j
fT
T
f
H
T
t
t
T
t
t
h 











 exp
sinc
)
(
or
otherwise
,
0
,
0
,
2
/
1
0
,
1
)
(
where
 
 









otherwise
0,
|
|
,
exp
sinc
1
)
(
1
)
(
W
f
fT
j
fT
T
f
H
f
E

Question: Is the above E(f) feasible or realizable?
.
2
1
1
W
f
T
T
s
s



© Po-Ning Chen@ece.nctu Chapter 3-22
 







otherwise
0,
|
|
,
sinc
1
)
(
~ W
f
fT
T
f
E
-1 -0.5 0.5 1
0.2
0.4
0.6
0.8
1
)
(
~
f
E
E.g., T = 1, W = 1/8.
This gives an equalizer:
)
(
~
f
E
 
fT
j
T
t


exp
or
)
2
/
( 
)
(t
i )
(t
o
non-realizable! Why?
A lowpass filter
)
(
1 t
o
Because "o1(t)= 0 for t < 0" does not imply "o(t)= 0 for t < 0."
© Po-Ning Chen@ece.nctu Chapter 3-23
3.3 Feasibility of Equalizer Filter
 Causal
 A reasonable assumption for a feasible linear filter
system is that:
 A necessary and sufficient condition for the above
assumption to hold is that h(t) = 0 for t < 0.
)
(t
h
)
(t
o
)
(t
i
.
0
for
0
)
(
have
we
,
0
for
0
)
(
satisfying
)
(
any
For 


 t
t
o
t
t
i
t
i
 Simplified Proof:

 










 


t
d
t
i
h
d
t
i
h
t
o
t
t
i
t
t
h
0
)
(
)
(
)
(
)
(
)
(
0
for
0
)
(
0
for
0
)
(






0
for
0
)
( 

 t
t
o












.
0
for
,
1
;
0
for
,
0
)
(
take
then
,
0
some
for
0
)
(
If
t
t
t
i
a
dt
t
h
a
input!
zero
completely
to
due
output
nonzero
a
be
will
there
that
means
which
,
0
)
(
)
( 


 



a
d
h
a
o 

.
0
every
for
0
)
(
Therefore, 





a
d
h
a


.
0
for
0
)
(
)
(
0
every
for
0
)
( 








 







a
a
h
d
h
a
a
d
h
a
a




© Po-Ning Chen@ece.nctu Chapter 3-24
© Po-Ning Chen@ece.nctu Chapter 3-25
3.3 Aperture Effect
 The distortion of M(f) due to M(f)H(f)
is very similar to the distortion caused by the finite size of
the scanning aperture in television. So, it is named the
aperture effect.
 If T/Ts ≦ 0.1, the amplitude distortion is less than 0.5%;
hence, the equalizer may not be necessary.
   
fT
j
fT
T
f
H
T
t
t
T
t
t
h 











 exp
sinc
)
(
or
otherwise
,
0
,
0
,
2
/
1
0
,
1
)
(
where
-0.06 -0.04 -0.02 0.02 0.04 0.06
0.2
0.4
0.6
0.8
1
© Po-Ning Chen@ece.nctu Chapter 3-26
 







otherwise
0,
|
|
,
sinc
1
)
(
~ W
f
fT
T
f
E .
2
1
1
and W
f
T
T
s
s



  04
.
0
,
10
,
1
for
otherwise
0,
04
.
0
|
|
,
sinc
1
)
(
~










 W
T
T
f
f
f
E s
)
(
~
f
E 1.00264
© Po-Ning Chen@ece.nctu Chapter 3-27
3.3 Pulse-Amplitude Modulation
 Final notes on PAM
 PAM is rather stringent in its system requirement, such
as short duration of pulse.
 Also, the noise performance of PAM may not be
sufficient for long distance transmission.
 Accordingly, PAM is often used as a mean of message
processing for time-division multiplexing, from which
conversion to some other form of pulse modulation is
subsequently made. Details will be discussed in Section
3.9.
© Po-Ning Chen@ece.nctu Chapter 3-28
3.4 Other Forms of Pulse Modulation
 Pulse-Duration Modulation (or Pulse-Width Modulation)
 Samples of the message signal are used to vary the
duration of the pulses.
 Pulse-Position Modulation
 The position of a pulse relative to its unmodulated time
of occurrence is varied in accordance with the message
signal.
Pulse trains
PDM
PPM
© Po-Ning Chen@ece.nctu Chapter 3-29
© Po-Ning Chen@ece.nctu Chapter 3-30
3.4 Other Forms of Pulse Modulation
 Comparisons between PDM and PPM
 PPM is more power efficient because excessive pulse
duration consumes considerable power.
 Final note
 It is expected that PPM is immune to additive noise,
since additive noise only perturbs the amplitude of the
pulses rather than the positions.
 However, since the pulse cannot be made perfectly
rectangular in practice (namely, there exists a non-zero
transition time in pulse edge), the detection of pulse
positions is somehow still affected by additive noise.
© Po-Ning Chen@ece.nctu Chapter 3-31
3.5 Bandwidth-Noise Trade-Off
 PPM seems to be a better form for analog pulse modulation
from noise performance standpoint. However, its noise
performance is very similar to (analog) FM modulation as:
 Its figure of merit is proportional to the square of
transmission bandwidth (i.e., 1/T) normalized with
respect to the message bandwidth (W).
 There exists a threshold effect as SNR is reduced.
 Question: Can we do better than the “square” law in figure-
of-merit improvement? Answer: Yes, by means of Digital
Communication, we can realize an “exponential” law (with
respect to error rates)!
)
/
.,
.
( W
B
B
e
I T
n 
© Po-Ning Chen@ece.nctu Chapter 3-32
3.6 Quantization Process
 Transform the continuous-amplitude m = m(nTs) to discrete
approximate amplitude v = v(nTs)
 Such a discrete approximate is adequately good in the sense
that any human ear or eye can detect only finite intensity
differences.
Quantizer
g( )
m v
© Po-Ning Chen@ece.nctu Chapter 3-33
3.6 Quantization Process
 We may drop the time instance nTs for convenience, when
the quantization process is memoryless and instantaneous
(hence, the quantization at time nTs is not affected by earlier
or later samples of the message signal.)
 Types of quantization
 Uniform
 Quantization step sizes are of equal length.
 Non-uniform
 Quantization step sizes are not of equal length.
© Po-Ning Chen@ece.nctu Chapter 3-34
 An alternative classification of quantization
 Midtread
 Midrise
midtread midrise
input input
output output
© Po-Ning Chen@ece.nctu Chapter 3-35
3.6 Quantization Noise
Uniform midtread
quantizer in the
previous slide
© Po-Ning Chen@ece.nctu Chapter 3-36
3.6 Quantization Noise
 Define the quantization noise to be Q = M – V = M – g(M),
where g( ) is the quantizer.
 Let the message M be uniformly distributed in (–mmax,
mmax). So, M has zero mean.
 Assume g( ) is symmetric and of midrise type; then, V =
g(M) also has zero-mean, and so does Q = M – V.
 Then, the step size of the quantizer is given by:
where L is the total number of representation levels.
L
mmax
2


mmax =1
L = 4
D =
1
2
Example.
© Po-Ning Chen@ece.nctu Chapter 3-37
3.6 Quantization Noise
 Assume that g( ) assigns the midpoint of each step interval
to be the representation level. Then,
 


































2
,
1
2
2
,
2
1
2
,
0
2
)
mod
(
Pr
Pr
q
q
q
q
q
M
q
Q
mmax =1
L = 4
D =
1
2
Example.
© Po-Ning Chen@ece.nctu Chapter 3-38
3.6 Quantization Noise
 So, the output signal-to-noise ratio is equal to:
 The transmission bandwidth of a quantization system is
conceptually proportional to the number of bits required per
sample, i.e., R = log2(L).
 We then conclude that SNRO  4R, which increases
exponentially with transmission bandwidth.
2
2
max
2
max
2
2
/
2
/
2
3
2
12
1
12
1
1
L
m
P
L
m
P
P
dq
q
P
SNRO 















© Po-Ning Chen@ece.nctu Chapter 3-39
Example 3.1 Sinusoidal Modulating Signal
 Let m(t) = Am cos(2fmt). Then
L R SNRO (dB)
32 5 31.8
64 6 37.8
128 7 43.8
256 8 49.8
* Note that in this example, we assume a full-load quantizer, in
which no quantization loss is encountered due to saturation.
© Po-Ning Chen@ece.nctu Chapter 3-40
3.6 Quantization Noise
 In the previous analysis of quantization error, we assume
the quantizer assigns the mid-point of each step interval to
be the representative level.
 Questions:
 Can the power of quantization noise be further reduced
by adjusting the representative levels?
 Can the power of quantization noise be further reduced
by adopting a non-uniform quantizer?
© Po-Ning Chen@ece.nctu Chapter 3-41
Representation
level
3.6 Optimality of Scalar Quantizers
v1 v2 vL1 vL
 Let d(m, vk) be the distortion by representing m by vk.
 Goal: To find {Ik} and {vk} such that the average distortion
D = E[d(M, g(M))] is minimized.
…
I1 I2 IL1 IL
…
Partitions
)
,
[
1
A
A
I
L
k
k 


 Notably, interval Ik may not be
a “consecutive” single interval.
© Po-Ning Chen@ece.nctu Chapter 3-42
3.6 Optimality of Scalar Quantizers
 Solution:



L
k I
M
k
I
v
I
v
k
k
k
k
k
dm
m
f
v
m
d
D
1
}
{
}
{
}
{
}
{
)
(
)
,
(
min
min
min
min
(I) For fixed {vk}, determine the optimal {Ik}.
(II) For fixed {Ik}, determine the optimal {vk}.
(I) If d(m, vk) ≦ d(m, vj), then m should be assigned to Ik
rather than Ij.
 
L
j
v
m
d
v
m
d
A
A
m
I j
k
k 





 1
all
for
)
,
(
)
,
(
:
)
,
[
(II) For fixed {Ik}, determine the optimal {vk}.


L
k I
M
k
v
k
k
dm
m
f
v
m
d
1
}
{
)
(
)
,
(
min




























j
j
k
I
M
j
j
I
M
j
j
L
k I
M
k
j
dm
m
f
v
v
m
d
dm
m
f
v
m
d
v
dm
m
f
v
m
d
v
)
(
)
,
(
)
(
)
,
(
)
(
)
,
(
Since
1
.
0
)
(
)
,
(
:
is
optimal
for the
condition
necessary
a




j
I
M
j
j
j
dm
m
f
v
v
m
d
v
© Po-Ning Chen@ece.nctu Chapter 3-43
Lloyd-Max algorithm is to repetitively apply (I) and (II)
for the search of the optimal quantizer.
© Po-Ning Chen@ece.nctu Chapter 3-44
Example: Mean-Square Distortion
 d(m, vk) = (m  vk)2
(I)  
interval.
e
consecutiv
a
be
should
1
all
for
)
(
)
(
:
)
,
[ 2
2
L
j
v
m
v
m
A
A
m
I j
k
k 







v1 v2 vL1 vL
…
I1 I2 IL1 IL
…
Representation
level
Partitions
m1= mL=
m2 m3 mL-1
mL-2
© Po-Ning Chen@ece.nctu Chapter 3-45
Example: Mean-Square Distortion
(II) :
is
optimal
for the
condition
necessary
A j
v
]
|
[
)
(
)
(
1
optimal
, 1
1










j
j
m
m
M
m
m
M
j m
M
m
M
E
dm
m
f
dm
m
mf
v j
j
j
j
Exercise: What is the best {mk} and {vk} if M is uniformly
distributed over [A,A).
© Po-Ning Chen@ece.nctu Chapter 3-46
3.7 Pulse-Code Modulation
Lowpass
(anti-aliasing)
filter
Quantizer
PCM
Encoder
Channel
PCM
Decoder
Reconstruction
filter
sampler
Continuous
time analog
signal
Reconstructed
analog signal
© Po-Ning Chen@ece.nctu Chapter 3-47
3.7 Pulse-Code Modulation
 Non-uniform quantizers used for telecommunication (ITU-
T G.711)
 ITU-T G.711: Pulse Code Modulation (PCM) of Voice
Frequencies (1972)
 It consists of two laws: A-law (mainly used in
Europe) and m-law (mainly used in US and Japan)
 This design helps to protect weak signal, which occurs
more frequently in, say, human voice.
© Po-Ning Chen@ece.nctu Chapter 3-48
3.7 Laws
 Quantization Laws
 A-law
 13-bit uniformly quantized
 Conversion to 8-bit code
 m-law
 14-bit uniformly quantized
 Conversion to 8-bit code.
 These two are referred to as compression laws since
they use 8-bit to (lossily) represent 13-(or 14-)bit
information.
© Po-Ning Chen@ece.nctu Chapter 3-49
3.7 A-law in G.711
 A-law (A=87.6)




















1
1
,
)
log(
1
|)
|
log(
1
)
sgn(
1
,
)
log(
1
)
(
law
-
A
m
A
A
m
A
m
A
m
m
A
A
m
F
Linear mapping
Logarithmic mapping
-1
-0.8
-0.6
-0.4
-0.2
0
0.2
0.4
0.6
0.8
1
-1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1
output
input
)
(
law
-
A m
F
m
© Po-Ning Chen@ece.nctu Chapter 3-50
-128
-112
-96
-80
-64
-48
-32
0
32
48
64
80
96
112
128
-4096 -2048 -1024 -512
-256
-128
-64
0
64
128
256
512 1024 2048 4096
output
input
)
(
law
-
A m
F
© Po-Ning Chen@ece.nctu Chapter 3-51
13 bit uniform quantization
8 bit PCM code A piecewise linear approximation to the law.
© Po-Ning Chen@ece.nctu Chapter 3-52
E.g. (3968)10  (1111,1000,0000)2111,1111)2127)10
E.g. (2176)10 1000,1000,0000)2111,0001)2113)10
Compressor of A-law (assume nonnegative m)
© Po-Ning Chen@ece.nctu Chapter 3-53
Expander of A-law (assume nonnegative m)
E.g. (113)10 ® (111,0001)2 ® (1000,1100,0000)2 ® (2240)10
In other words,
(1001,0000,0000)2 +(1000,1000,0000)2
2
=
(2304)10 +(2176)10
2
= (2240)10
© Po-Ning Chen@ece.nctu Chapter 3-54
3.7 m-law in G.711
 m-law (m = 255)
 It is approximately linear at low m.
 It is approximately logarithmic at large m.
.
1
for
)
log(
1
)
1
log(
)
sgn(
)
(
law
- 


 m
m
m
m
F
m
m
m
)
(
law
- m
Fm
© Po-Ning Chen@ece.nctu Chapter 3-55
-1
-0.8
-0.6
-0.4
-0.2
0
0.2
0.4
0.6
0.8
1
-1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1
m
)
(
law
- m
Fm
14 bit uniform quantization (213 = 8192)
8 bit PCM code
© Po-Ning Chen@ece.nctu Chapter 3-56
-128
-112
-96
-80
-64
-48
-32
-16
0
16
32
48
64
80
96
112
128
-8159 -4063 -2015 -991
-479
-223
-95
-31
0
31
95
223
479
991 2015 4063 8159
A piecewise linear approximation to the law.
Compressor of m-law (assume nonnegative m)
Raised Input = Input + (33)10 = Input + 21H
(For negative m, the raised input becomes (input – 33).)
An additional 7th bit is used to indicate whether the input signal is positive
(1) or negative (0).
© Po-Ning Chen@ece.nctu Chapter 3-57
Expander of m-law (assume nonnegative m)
© Po-Ning Chen@ece.nctu Chapter 3-58
Output = Raised Output – 33
Note that the combination of a compressor and an expander is
called a compander.
-1
-0.8
-0.6
-0.4
-0.2
0
0.2
0.4
0.6
0.8
1
-0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8
A-law
mu-law
Comparison of A-law and m-law specified in G.711.
© Po-Ning Chen@ece.nctu Chapter 3-59
© Po-Ning Chen@ece.nctu Chapter 3-60
3.7 Coding
 After the quantizer provides a symbol, representing one of
256 possible levels (8 bits of information) at each sampled
time, the encoder will transform the symbol (or several
symbols) into a code character (or code word) that is
suitable for transmission over a noisy channel.
 Example. Binary code.
11100100
1 1 1 0 0 1 0
0 = change
1 = unchange
0
© Po-Ning Chen@ece.nctu Chapter 3-61
3.7 Coding
 Example. Ternary code (Pseudo-binary code).
0 0 0 1 1 0 1
00011011 B
A
C
00011011ACABBCBB
1
Through the help of coding, the receiver may be able to
detect (or even correct) the transmission errors due to noise.
For example, it is impossible to receive ABABBABB, since
this is not a legitimate code word (character).
© Po-Ning Chen@ece.nctu Chapter 3-62
3.7 Coding
 Example of error correcting code : Three-times repetition
code (to protect Bluetooth packet header).
00011011 000,000,000,111,111,000,111,111
Then, the so-called majority law can be applied at the
receiver to correct one-bit error.
 Channel (error correcting) codes are designed to
compensate the channel noise, while line codes are simply
used as the electrical representation of a binary data stream
over the electrical line.
© Po-Ning Chen@ece.nctu Chapter 3-63
3.7 Line Codes
(a) Unipolar nonreturn-to-zero
(NRZ) signaling
(b) Polar nonreturn-to-zero (NRZ)
signaling
(c) Unipolar return-to-zero (RZ)
signaling
(d) Bipolar return-to-zero (BRZ)
signaling
(e) Split-phase (Manchester code)
0 1 0 0 1
© Po-Ning Chen@ece.nctu Chapter 3-64
3.7 Derivation of PSD
 From Slide 1-117, we obtain that the general formula for
PSD is:
}.
|
{|
)
(
)
(
where
)],
(
)
(
[
2
1
lim
PSD 2
*
2 T
t
t
s
t
s
f
S
f
S
E
T
T
T
T



 

1































































 
 
 
b
b
b
b
fkT
j
k
a
b
N
N
m
fkT
j
k
a
b
N
N
N
m
T
m
n
f
j
n
a
b
N
n
T
m
n
f
j
N
N
m
m
n
b
N
e
k
T
f
G
e
k
NT
f
G
e
m
n
NT
f
G
e
a
a
E
f
G
NT







2
2
1
2
2
1
)
(
2
2
)
(
2
1
*
2
)
(
1
|
)
(
|
)
(
2
1
lim
|
)
(
|
)
(
2
1
lim
|
)
(
|
]
[
|
)
(
|
2
1
lim
PSD
© Po-Ning Chen@ece.nctu Chapter 3-65
(See Slide 3-4.)
(i.i.d. = independent and identically distributed)
© Po-Ning Chen@ece.nctu Chapter 3-66
3.7 Power Spectral of Line Codes
 Unipolar nonreturn-to-zero (NRZ) signaling
 Also named on-off signaling.
 Disadvantage: Waste of power due to the non-zero-
mean nature (i.e., PSD does not approach zero at zero
frequency).







 











otherwise
,
0
0
,
)
(
i.i.d.,
zero/one
is
}
{
where
,
)
(
)
( b
n
n
n
b
n T
t
A
t
g
a
nT
t
g
a
t
s
0 1 0 0 1
© Po-Ning Chen@ece.nctu Chapter 3-67
3.7 Power Spectral of Line Codes
 PSD of Unipolar NRZ
© Po-Ning Chen@ece.nctu Chapter 3-68
 Polar nonreturn-to-zero (NRZ) signaling
 The previous PSD of Unipolar NRZ suggests that a
zero-mean data sequence is preferred.







 












otherwise
,
0
0
,
)
(
i.i.d.,
1
is
}
{
where
,
)
(
)
( b
n
n
n
b
n T
t
A
t
g
a
nT
t
g
a
t
s
3.7 Power Spectral of Line
Codes
0 1 0 0 1
© Po-Ning Chen@ece.nctu Chapter 3-69
3.7 Power Spectral of
Line Codes
 Unipolar return-to-zero (RZ) signaling
 An attractive feature of this line code is the presence of
delta functions at f = –1/Tb, 0, 1/Tb in the PSD, which
can be used for bit-timing recovery at the receiver.
 Disadvantage: It requires 3dB more power than polar
return-to-zero signaling.







 











otherwise
,
0
2
/
0
,
)
(
i.i.d.,
zero/one
is
}
{
where
,
)
(
)
( b
n
n
n
b
n T
t
A
t
g
a
nT
t
g
a
t
s
0 1 0 0 1
© Po-Ning Chen@ece.nctu Chapter 3-70
3.7 Power Spectral of Line Codes
 PSD of Unipolar RZ
© Po-Ning Chen@ece.nctu Chapter 3-71
3.7 Power Spectral of Line Codes
 Bipolar return-to-zero (BRZ) signaling
 Also named alternate mark inversion (AMI) signaling
 No DC component and relatively insignificant low-
frequency components in PSD.


 



 


 otherwise
,
0
2
/
0
,
)
(
where
,
)
(
)
( b
n
b
n
T
t
A
t
g
nT
t
g
a
t
s
0 1 0 0 1
© Po-Ning Chen@ece.nctu Chapter 3-72
3.7 Power Spectral of Line Codes
 PSD of BRZ
 {an} is no longer i.i.d.
.
1
for
0
]
[
0
16
1
)
1
)(
1
(
16
1
)
1
)(
1
(
16
1
)
1
)(
1
(
16
1
)
1
)(
1
(
]
[
4
1
4
1
)
1
(
]
[
2
1
4
1
)
1
(
4
1
)
1
(
2
1
)
0
(
]
[
2
1
2
2
2
























m
a
a
E
a
a
E
a
a
E
a
E
m
n
n
n
n
n
n
n

© Po-Ning Chen@ece.nctu Chapter 3-73
3.7 Power Spectral of Line Codes
© Po-Ning Chen@ece.nctu Chapter 3-74
3.7 Power Spectral of
Line Codes
 Split-phase (Manchester code)
 This signaling suppressed the DC component, and has
relatively insignificant low-frequency components,
regardless of the signal statistics.
 Notably, for P-NRZ and BRZ, the DC component is
suppressed only when the signal has the right statistics.




























otherwise
,
0
2
/
,
2
/
0
,
)
(
i.i.d.,
1
is
}
{
where
,
)
(
)
(
b
b
b
n
n
n
b
n
T
t
T
A
T
t
A
t
g
a
nT
t
g
a
t
s
0 1 0 0 1
© Po-Ning Chen@ece.nctu Chapter 3-75
3.7 Power Spectral of Line Codes
 PSD of Manchester code
© Po-Ning Chen@ece.nctu Chapter 3-76
Let Tb=1, and adjust A such that the total power of each line
code is 1. This gives a fair comparison among line codes.
© Po-Ning Chen@ece.nctu Chapter 3-77
0
0.2
0.4
0.6
0.8
1
0 0.5 1 1.5 2
U-NRZ
P-NRZ
U-RZ
BRZ
Manchester
2
/
1 
© Po-Ning Chen@ece.nctu Chapter 3-78
3.7 Differential Encoding with Unipolar NRZ Line
Coding
 1 = no change and 0 = change.
n
d
n
o 0 1 1 1 0 0 1 0 0
1 0 0 0 1 1 0 1 1
1 0 0 0 0 1 0 0 1 0
Original data
Differentially
encoded data
Reference bit
© Po-Ning Chen@ece.nctu Chapter 3-79
3.7 Regeneration
 Regenerative repeater for PCM system
 It can completely remove the distortion if the decision
making device makes the right decision (on 1 or 0).
Equalizer
Decision-
making
device
Timing
circuit
Amplifier
Degraded
PCM wave
Regenerated
PCM wave
© Po-Ning Chen@ece.nctu Chapter 3-80
3.7 Decoding & Filtering
 After regenerating the received pulse at the last stage, the
receiver decodes and regenerates the original message
signal (with acceptable quantization error).
 Finally, a lowpass reconstruction filter whose cutoff
frequency is equal to the message bandwidth W is applied at
the end (to remove the unnecessary high-frequency
components due to “quantization”).
© Po-Ning Chen@ece.nctu Chapter 3-81
3.8 Noise Consideration in PCM Systems
 Two major noise sources in PCM systems
 (Message-independent) Channel noise
 (Message-dependent) Quantization noise
 The quantization noise is often under designer’s
control, and can be made negligible by taking
adequate number of quantization levels.
© Po-Ning Chen@ece.nctu Chapter 3-82
3.8 Noise Consideration in PCM Systems
 The main effect of channel noise is to introduce bit errors.
 Notably, the symbol error rate is quite different from
the bit error rate.
 A symbol error may be caused by one-bit error, or two-
bit error, or three-bit error, or …; so, in general, one
cannot derive the symbol error rate from the bit error
rate (or vice versa) unless some special assumption is
made.
 Considering the reconstruction of original analog signal,
a bit error in the most significant bit is more harmful
than a bit error in the least significant bit.
© Po-Ning Chen@ece.nctu Chapter 3-83
3.8 Error Threshold
 Eb/N0
 Eb: Transmitted signal energy per information bit
 E.g., information bit is encoded using three-times
repetition code, in which each code bit is transmitted
using one BPSK symbol with symbol energy Ec.
 Then Eb = 3 Ec.
 N0: One-sided noise spectral density
 The bit error rate (BER) is a function of Eb/N0 and
transmission speed (and implicitly bandwidth, etc).
© Po-Ning Chen@ece.nctu Chapter 3-84
3.8 Error Threshold
 Influence of Eb/N0 on BER at 105 bit per second (bps)
Eb/N0 (dB) BER About one bit error in every …
4.3 102 103 second
8.4 104 101 second
10.6 106 10 seconds
12.0 108 20 minutes
13.0 1010 1 day
14.0 1012 3 months
 The usual requirement of BER in practice is 105.
© Po-Ning Chen@ece.nctu Chapter 3-85
3.8 Error Threshold
 Error threshold
 The minimum Eb/N0 to achieve the required BER.
 By knowing the error threshold, one can always add a
regenerative repeater when Eb/N0 is about to drop below the
threshold; hence, long-distance transmission becomes
feasible.
 Unlike the analog transmission, of which the distortion
will accumulate for long-distance transmission.
© Po-Ning Chen@ece.nctu Chapter 3-86
3.9 Time-Division Multiplexing
 An important feature of sampling process is a conservation-
of-time.
 In principle, the communication link is used only at the
sampling time instances.
 Hence, it may be feasible to put other message’s samples
between adjacent samples of this message on a time-shared
basis.
 This forms the time-division multiplex (TDM) system.
 A joint utilization of a common communication link by
a plurality of independent message sources.
© Po-Ning Chen@ece.nctu Chapter 3-87
3.9 Time-Division Multiplexing
 The commutator (1) takes a narrow sample of each of the N
input messages at a rate fs slightly higher than 2W, where W
is the cutoff frequency of the anti-aliasing filter, and (2)
interleaves these N samples inside the sampling interval Ts.
LPF
LPF
LPF
LPF
LPF
LPF
LPF
Channel
PCM PCM
synchronized
commutator commutator
(anti-aliasing) (reconstruction)
1
2
N
1
2
N
© Po-Ning Chen@ece.nctu Chapter 3-88
3.9 Time-Division Multiplexing
 The price we pay for TDM is that N samples be squeezed in
a time slot of duration Ts.
LPF
LPF
LPF
LPF
LPF
LPF
LPF
Channel
PCM PCM
synchronized
commutator commutator
(anti-aliasing) (reconstruction)
1
2
N
1
2
N
© Po-Ning Chen@ece.nctu Chapter 3-89
3.9 Time-Division Multiplexing
 Synchronization is essential for a satisfactory operation of
the TDM system.
 One possible procedure to synchronize the transmitter
clock and the receiver clock is to set aside a code
element or pulse at the end of a frame, and to transmit
this pulse every other frame only.
© Po-Ning Chen@ece.nctu Chapter 3-90
Example 3.2 The T1 System
 T1 system
 Carries 24 64kbps voice channels with regenerative
repeaters spaced at approximately 2-km intervals.
 Each voice signal is essentially limited to a band from
300 to 3100 Hz.
 Anti-aliasing filter with W = 3.1 KHz
 Sampling rate = 8 KHz ( 2W = 6.2 KHz)
 ITU G.711 m-law is used with m = 255.
 Each frame consists of 24  8 + 1 = 193 bits, where a
single bit is added at the end of the frame for the
purpose of synchronization.
© Po-Ning Chen@ece.nctu Chapter 3-91
Example 3.2 The T1 System
 In addition to the 193 bits per frame (i.e., 1.544
Megabits per second), a telephone system must also
pass signaling information such as “dial pulses” and
“on/off-hook.”
 The least significant bit of each voice channel is
deleted in every sixth frame, and a signaling bit is
inserted in its place.
(DS=Digital Signal)
1 2 3 24
F
DS1 Frame (24 DS0)
Framing bit
© Po-Ning Chen@ece.nctu Chapter 3-92
3.10 Digital Multiplexers
 The introduction of digital multiplexer enables us to
combine digital signals of various natures, such as
computer data, digitized voice signals, digitized facsimile
and television signals.
Multiplexer Demultiplexer
1
2
N
1
2
N
High-speed
transmission line
© Po-Ning Chen@ece.nctu Chapter 3-93
3.10 Digital Multiplexers
 The multiplexing of digital signals is accomplished by
using a bit-by-bit interleaving procedure with a selector
switch that sequentially takes a (or more) bit from each
incoming line and then applies it to the high-speed common
line.
(3 channels/frame)
PCM
PCM
PCM
TDM
4k Hz Analog Voices
64 kbps Digital Voices
1 frame
© Po-Ning Chen@ece.nctu Chapter 3-94
3.10 Digital Multiplexers
 Digital multiplexers are categorized into two major groups.
1. 1st Group: Multiplex digital computer data for TDM
transmission over public switched telephone network.
 Require the use of modem technology.
2. 2nd Group: Multiplex low-bit-rate digital voice data
into high-bit-rate voice stream.
 Accommodate in the hierarchy that is varying from
one country to another.
 Usually, the hierarchy starts at 64 Kbps, named a
digital signal zero (DS0).
© Po-Ning Chen@ece.nctu Chapter 3-95
3.10 North American Digital TDM Hierarchy
 The first level hierarchy
 Combine 24 DS0 to obtain a primary rate DS1 at 1.544
Mb/s (T1 transmission)
 The second-level multiplexer
 Combine 4 DS1 to obtain a DS2 with rate 6.312 Mb/s
 The third-level multiplexer
 Combine 7 DS2 to obtain a DS3 at 44.736 Mb/s
 The fourth-level multiplexer
 Combine 6 DS3 to obtain a DS4 at 274.176 Mb/s
 The fifth-level multiplexer
 Combine 2 DS4 to obtain a DS5 at 560.160 Mb/s
T4=6 DS3
(274.176 Mbps)
© Po-Ning Chen@ece.nctu Chapter 3-96
3.10 North American Digital TDM Hierarchy
 The combined bit rate is higher than the multiple of the
incoming bit rates because of the addition of bit stuffing
and control signals.
M01
M12
M23
M34
T1=24 DS0
(1.544 Mbps)
T2=4 DS1
(6.312 Mbps)
T3=7 DS2
(44.736 Mbps)
DS0
DS1
DS2
DS3
DS4
Voice
(64 kbps)
© Po-Ning Chen@ece.nctu Chapter 3-97
3.10 North American Digital TDM Hierarchy
 Basic problems involved in the design of multiplexing
system
 Synchronization should be maintained to properly
recover the interleaved digital signals.
 Framing should be designed so that individual can be
identified at the receiver.
 Variation in the bit rates of incoming signals should be
considered in the design.
 A 0.01% variation in the propagation delay produced
by a 1℉ decrease in temperature will result in 100
fewer pulses in the cable of length 1000-km with
each pulse occupying about 1 meter of the cable.
© Po-Ning Chen@ece.nctu Chapter 3-98
3.10 Digital Multiplexers
 Synchronization and rate variation problems are resolved by
bit stuffing.
 Example 3.3. AT&T M12 (second-level multiplexer)
 24 control bits are stuffed, and separated by sequences
of 48 data bits (12 from each DS1 input).
M0
M1
M1
M1
48
48
48
48
CI
CII
CIII
CIV
48
48
48
48
F0
F0
F0
F0
48
48
48
48
CI
CII
CIII
CIV
48
48
48
48
CI
CII
CIII
CIV
48
48
48
48
F1
F1
F1
F1
48
48
48
48
Frame
markers
Frame
markers
Subframe
markers
Stuffing
indicators
Stuffing
indicators
Stuffing
indicators
© Po-Ning Chen@ece.nctu Chapter 3-99
M 48 C 48 F 48 C 48 C 48 F 48
DS2 M-Subframe: 294 bits (6 blocks)
For each block:
DS1 #1
DS1 #2
DS1 #3
DS1 #4
Bit interleave
© Po-Ning Chen@ece.nctu Chapter 3-100
Example 3.3 AT&T M12 Multiplexer
 The control bits are labeled F, M, and C.
 Frame markers: In sequence of F0F1F0F1F0F1F0F1, where F0
= 0 and F1 = 1.
 Subframe markers: In sequence of M0M1M1M1, where M0 = 0
and M1 = 1.
 Stuffing indicators: In sequences of CI CI CI CII CII CII CIII CIII
CIII CIV CIV CIV, where all three bits of Cj equal 1’s indicate
that a stuffing bit is added in the position of the first
information bit associated with the first DS1 bit stream that
follows the F1-control bit in the same subframe, and three 0’s
in CjCjCj imply no stuffing.
 The receiver should use majority law to check whether a
stuffing bit is added.
© Po-Ning Chen@ece.nctu Chapter 3-101
Example 3.3 AT&T M12 Multiplexer
 These stuffed bits can be used to balance (or maintain) the
nominal input bit rates and nominal output bit rates.
 S = nominal bit stuffing rate
 The rate at which stuffing bits are inserted when both
the input and output bit rates are at their nominal
values.
 fin = nominal input bit rate
 fout = nominal output bit rate
 M = number of bits in a frame
 L = number of information bits (input bits) for one input
stream in a frame
© Po-Ning Chen@ece.nctu Chapter 3-102
Example 3.3 AT&T M12 multiplexer
 For M12 framing,
bits
288
bits
1176
24
4
288
Mbps
312
.
6
Mbps
544
.
1







L
M
f
f
out
in
in
in
out f
L
S
f
L
S
f
M
)
1
(
1
frame
a
of
Duration
bit.
stuffed
a
by
replaced
is
bit
One








334601
.
0
1176
312
.
6
544
.
1
288 




 M
f
f
L
S
out
in
© Po-Ning Chen@ece.nctu Chapter 3-103
Example 3.3 AT&T M12 Multiplexer
 Allowable tolerances to maintain nominal output bit rates
 A sufficient condition for the existence of S such that
the nominal output bit rate can be matched.






















in
in
S
out
in
in
S f
L
S
f
L
S
f
M
f
L
S
f
L
S )
1
(
1
min
)
1
(
1
max
]
1
,
0
[
]
1
,
0
[
out
in
out
in
out
in
f
M
L
f
f
M
L
f
L
f
M
f
L 1
1 







54043
.
1
312
.
6
1176
287
312
.
6
1176
288
5458
.
1 


 in
f
© Po-Ning Chen@ece.nctu Chapter 3-104
Example 3.3 AT&T M12 Multiplexer
 This results in an allowable tolerance range:
 In terms of ppm (pulse per million pulses),
 This tolerance is already much larger than the
expected change in the bit rate of the incoming DS1
bit stream.
kbps
36735
.
5
1176
/
312
.
6
54043
.
1
5458
.
1 


18
.
2312
and
8
.
1164
5458
.
1
10
544
.
1
10
54043
.
1
10 6
6
6







ppm
ppm
ppm
ppm
b
a
a
b
© Po-Ning Chen@ece.nctu Chapter 3-105
3.11 Virtues, Limitations, and Modifications of
PCM
 Virtues of PCM systems
 Robustness to channel noise and interference
 Efficient regeneration of coded signal along the transmission path
 Efficient exchange of increased channel bandwidth for improved
signal-to-noise ratio, obeying an exponential law.
 Uniform format for different kinds of baseband signal
transmission; hence, facilitate their integration in a common
network.
 Message sources are easily dropped or reinserted in a TDM
system.
 Secure communication through the use of encryption/decryption.
© Po-Ning Chen@ece.nctu Chapter 3-106
3.11 Virtues, Limitations, and Modifications of
PCM
 Two limitations of PCM system (in the past)
 Complexity
 Bandwidth
 Nowadays, with the advance of VLSI technology, and with
the availability of wideband communication channels (such
as fiber) and compression technique (to reduce the
bandwidth demand), the above two limitations are greatly
released.
© Po-Ning Chen@ece.nctu Chapter 3-107
3.12 Delta Modulation
 Delta Modulation (DM)
 The message is oversampled (at a rate much higher than
the Nyquist rate) to purposely increase the correlation
between adjacent samples.
 Then, the difference between adjacent samples is
encoded instead of the sample value itself.
1
0
© Po-Ning Chen@ece.nctu Chapter 3-108
Staircase
approximation
mq(t)
m(t)
Ts
1
0
1
1
1
1
1
1 0
1
0
1
0
0
0
1
© Po-Ning Chen@ece.nctu Chapter 3-109
3.12 Math Analysis of Delta Modulation
Then
.
at time
)
(
of
ion
approximat
DM
the
be
]
[
Let
).
(
]
[
Let
s
q
s
nT
t
m
n
m
nT
m
n
m 
mq[n]= mq[n-1]+eq[n]= eq[ j]
j=-¥
n
å ,
where eq[n]= D×sgn(m[n]- mq[n-1]).
.
}
2
/
]
1
)
/
]
[
[(
{
is
word
code
ed
transmitt
The 



 n
q n
e
Chapter 3-110
 The principle virtue
of delta modulation
is its simplicity.
 It only requires
the use of
comparator,
quantizer, and
accumulator.
Bandwidth W of m(t)
3.12 Delta
Modulation
]).
1
[
]
[
sgn(
]
[
where
,
]
[
]
[
]
1
[
]
[








 


n
m
n
m
n
e
n
e
n
e
n
m
n
m
q
q
n
j
q
q
q
q
Decoder
for DM
z-1
+
+
Lowpass
filter
1-bit
quantizer
Encoder
for DM
z-1
+
+
+_
Accumulator
Accumulator
© Po-Ning Chen@ece.nctu Chapter 3-111
3.12 Delta Modulation
 Distortions due to delta modulation
 Slope overload distortion
 Granular noise
© Po-Ning Chen@ece.nctu Chapter 3-111
m(t)
mq(t)
Slope-overload
distortion
Granular
noise
Ts
© Po-Ning Chen@ece.nctu Chapter 3-112
3.12 Delta Modulation
 Slope overload distortion
 To eliminate the slope overload distortion, it requires
 So, increasing step size  can reduce the slope-overload
distortion.
 An alternative solution is to use dynamic . (Often, a
delta modulation with fixed step size is referred to as a
linear delta modulator due to its fixed slope, a basic
function of linearity.)
condition)
overload
(slope
)
(
max
dt
t
dm
Ts


© Po-Ning Chen@ece.nctu Chapter 3-113
3.12 Delta Modulation
 Granular noise
 mq[n] will hunt around a relatively flat segment of m(t).
 A remedy is to reduce the step size.
 A tradeoff in step size is therefore resulted for slope
overload distortion and granular noise.
© Po-Ning Chen@ece.nctu Chapter 3-114
3.12 Delta-Sigma Modulation
 Delta-sigma modulation
 In fact, the delta modulation distortion can be reduced
by increasing the correlation between samples.
 This can be achieved by integrating the message signal
m(t) prior to delta modulation.
 The “integration” process is equivalent to a pre-
emphasis of the low-frequency content of the input
signal.
© Po-Ning Chen@ece.nctu Chapter 3-115
3.12 Delta-Sigma Modulation
 A side benefit of
“integration-before-
delta-modulation,”
which is named
delta-sigma
modulation, is that
the receiver design
is further simplified
(at the expense of a
more complex
transmitter).
Decoder
for DM
z-1
+
+
Lowpass
filter
1-bit
quantizer
Encoder
for DM
z-1
+
+
+_
Accumulator
Accumulator
Move the
accumulator
to the
transmitter.
© Po-Ning Chen@ece.nctu Chapter 3-116
3.12 Delta-Sigma Modulation
A straightforward
structure
Since integration is
a linear operation,
the two integrators
before comparator
can be combined
into one after
comparator.
1-bit
quantizer
Encoder
for DM
+_
z-1
+
+
Accumulator
z-1
+
+
Accumulator
Decoder
for DM
Lowpass
filter
1-bit
quantizer
Encoder
for DM
+_
z-1
+
+
Accumulator
z-1
combine
into one
© Po-Ning Chen@ece.nctu Chapter 3-117
3.12 Math Analysis of Delta-Sigma Modulation
]).
1
[
]
[
sgn(
]
[
where
],
[
]
1
[
]
[
Then
.
at time
)
(
)
(
of
ion
approximat
DM
the
be
]
[
Let
.
)
(
]
[
Let
















n
i
n
i
n
n
n
i
n
i
nT
d
m
t
i
n
i
dt
t
m
n
i
q
q
q
q
q
s
t
q
nTs




.
}
2
/
]
1
)
/
]
[
[(
{
is
word
code
ed
transmitt
The 



 n
q n

,
)
(
)
(
]
1
[
]
[
]
1
[
]
[
]
[ )
1
( s
nT
T
n
q
q
q T
t
m
dt
t
m
n
i
n
i
n
i
n
i
n
s
s







  

Since
we only need a lowpass filter to smooth out the received
signal at the receiver end. (See the previous slide.)
© Po-Ning Chen@ece.nctu Chapter 3-118
3.12 Delta Modulation
 Final notes
 Delta(-sigma) modulation trades channel bandwidth
(e.g., much higher sampling rate) for reduced system
complexity (e.g., the receiver only demands a lowpass
filter).
 Can we trade increased system complexity for a reduced
channel bandwidth? Yes, by means of prediction
technique.
 In Section 3.13, we will introduce the basics of
prediction technique. Its application will be addressed in
subsequent sections.
© Po-Ning Chen@ece.nctu Chapter 3-119
3.13 Linear Prediction
 Consider a finite-duration impulse response (FIR) discrete-
time filter, where p is the prediction order, with linear
prediction




p
k
k k
n
x
w
n
x
1
]
[
]
[
ˆ
z-1 z-1 z-1
w1 w2 wp-1 wp
x[n] x[n-1] x[n-2] x[n-p]
x[n-p+1]
prediction
© Po-Ning Chen@ece.nctu Chapter 3-120
3.13 Linear Prediction
 Design objective
 To find the filter coefficient w1, w2, …, wp so as to
minimize index of performance J:
].
[
ˆ
]
[
]
[
where
]],
[
[ 2
n
x
n
x
n
e
n
e
E
J 















































 

 


p
k
X
k
p
k
p
k
j
X
j
k
p
k
X
k
X
p
k
p
j
j
k
p
k
k
p
k
k
R
w
j
k
R
w
w
k
R
w
R
j
n
x
k
n
x
E
w
w
k
n
x
n
x
E
w
n
x
E
k
n
x
w
n
x
E
J
1
2
1
1
1 1
1
2
2
1
]
0
[
]
[
2
]
[
2
]
0
[
]]
[
]
[
[
]]
[
]
[
[
2
]]
[
[
]
[
]
[
0
]
[
2
]
[
2
]
0
[
2
]
[
2
]
[
2
]
[
2
1
1
1
1






























p
j
X
j
X
X
i
i
k
X
k
p
i
j
X
j
X
i
j
i
R
w
i
R
R
w
i
k
R
w
j
i
R
w
i
R
J
w
© Po-Ning Chen@ece.nctu Chapter 3-121
.
1
for
]
[
]
[
1
p
i
i
R
j
i
R
w X
p
j
X
j 





© Po-Ning Chen@ece.nctu Chapter 3-122
The above optimality equations are called the Wiener-Hopf
equations for linear prediction.
It can be rewritten in matrix form as:









































]
[
]
2
[
]
1
[
]
0
[
]
2
[
]
1
[
]
2
[
]
0
[
]
1
[
]
1
[
]
1
[
]
0
[
2
1
p
R
R
R
w
w
w
R
p
R
p
R
p
R
R
R
p
R
R
R
X
X
X
p
X
X
X
X
X
X
X
X
X









or RXw = rX Þ Optimal solution wo = RX
-1
rX
© Po-Ning Chen@ece.nctu Chapter 3-123
3.13 Toeplitz (Square) Matrix
 Any square matrix of the form
is said to be Toeplitz.
 A Toeplitz matrix (such as RX) can be uniquely determined
by p elements, [a0, a1, …, ap1].
p
p
p
p
p
p
a
a
a
a
a
a
a
a
a

















0
2
1
2
0
1
1
1
0







© Po-Ning Chen@ece.nctu Chapter 3-124
3.13 Linear Adaptive Predictor
 The optimal w0 can only be obtained with the knowledge of
autocorrelation function.
 Question: What if the autocorrelation function is unknown?
 Answer: Use linear adaptive predictor.
 To minimize J, we should update wi toward the bottom of
the J-bowel.
 So, when gi  0, wi should be decreased.
 On the contrary, wi should be increased if gi < 0.
 Hence, we may define the update rule as:
where m is a chosen constant step size, and ½ is
included only for convenience of analysis.
© Po-Ning Chen@ece.nctu Chapter 3-125
3.13 Idea Behind Linear Adaptive Predictor
i
i
w
J
g



]
[
2
1
]
[
ˆ
]
1
[
ˆ n
g
n
w
n
w i
i
i 


 m
 gi[n] can be approximated by:
































p
j
j
p
j
j
p
j
X
j
X
i
i
j
n
x
n
w
n
x
i
n
x
i
n
x
j
n
x
n
w
i
n
x
n
x
j
i
R
w
i
R
w
J
n
g
1
1
1
]
[
]
[
ˆ
]
[
]
[
2
]
[
]
[
]
[
ˆ
2
]
[
]
[
2
)
(
2
)
(
2
/
]
[
© Po-Ning Chen@ece.nctu Chapter 3-126
© Po-Ning Chen@ece.nctu Chapter 3-127
3.13 Structure of Linear Adaptive Predictor
z-1 Linear predictor
+ _
x[n]
x[n-1]
Error
e[n]
© Po-Ning Chen@ece.nctu Chapter 3-128
3.13 Least Mean Square
 The pairs in the form of the popular least-mean-square
(LMS) algorithm for linear adaptive prediction.
© Po-Ning Chen@ece.nctu Chapter 3-129
3.14 Differential Pulse-Code Modulation (DPCM)
 Basic idea behind differential pulse-code modulation
 Adjacent samples are often found to exhibit a high
degree of correlation.
 If we can remove this adjacent redundancy before
encoding, a more efficient coded signal can be resulted.
 A way to remove the redundancy is to use linear
prediction.
© Po-Ning Chen@ece.nctu Chapter 3-130
3.14 DPCM
 For DPCM, the
quantization
error is on e[n],
rather on m[n] as
for PCM.
 So, the
quantization
error q[n] is
supposed to be
smaller.
Bandwidth W of m(t)
Decoder
for DPCM
+
+
Lowpass
filter
Quantizer
Encoder
for DPCM
+
+
+_
Prediction
filter
Prediction
filter
© Po-Ning Chen@ece.nctu Chapter 3-131
3.14 DPCM
 Derive:
]
[
]
[
]
[ n
q
n
e
n
eq 

]
[
]
[
]
[
]
[
]
[
ˆ
]
[
]
[
ˆ
]
[
n
q
n
m
n
q
n
e
n
m
n
e
n
m
n
m q
q








So, we have the same
relation between mq[n] and
m[n] (as in Slide 3-110) but
with smaller q[n].
Bandwidth W of m(t)
Decoder
for DPCM
+
+
Lowpass
filter
Quantizer
Encoder
for DPCM
+
+
+_
Prediction
filter
Prediction
filter
]
[
ˆ n
m
© Po-Ning Chen@ece.nctu Chapter 3-132
3.14 DPCM
 Notes
 DM system can be treated as a special case of DPCM.
Prediction filter => single delay
Quantizer => single-bit
1-bit
quantizer
Encoder
for DM
z-1
+
+
+_
Accumulator
© Po-Ning Chen@ece.nctu Chapter 3-133
3.14 DPCM
 Distortions due to DPCM
 Slope overload distortion
The input signal changes too rapidly for the prediction
filter to track it.
 Granular noise
© Po-Ning Chen@ece.nctu Chapter 3-134
3.14 Processing Gain
 The DPCM system can be described by:
 So, the output signal-to-noise ratio is:
 We can re-write SNRO as:
]
[
]
[
]
[ n
q
n
m
n
mq 

]]
[
[
]]
[
[
2
2
n
q
E
n
m
E
SNRO 
Q
p
O SNR
G
n
q
E
n
e
E
n
e
E
n
m
E
SNR 


]]
[
[
]]
[
[
]]
[
[
]]
[
[
2
2
2
2
error.
prediction
the
is
]
[
ˆ
]
[
]
[
where n
m
n
m
n
e 

© Po-Ning Chen@ece.nctu Chapter 3-135
3.14 Processing Gain
 In terminologies,









ratio
noise
on
quantizati
to
signal
]]
[
[
]]
[
[
gain
processing
]]
[
[
]]
[
[
2
2
2
2
n
q
E
n
e
E
SNR
n
e
E
n
m
E
G
Q
p
Notably, SNRQ can be treated as the SNR for
system of eq[n]= e[n]+q[n].
© Po-Ning Chen@ece.nctu Chapter 3-136
3.14 Processing Gain
 Usually, the contribution of SNRQ to SNRO is fixed.
 One additional bit in quantization results in 6 dB
improvement.
 Gp is the processing gain due to a nice “prediction.”
 The better the prediction is, the larger Gp is.
© Po-Ning Chen@ece.nctu Chapter 3-137
3.14 DPCM
 Final notes on DPCM
 Comparing DPCM with PCM in the case of voice
signals, the improvement is around 4-11 dB, depending
on the prediction order.
 The greatest improvement occurs in going from no
prediction to first-order prediction, with some additional
gain, resulting from increasing the prediction order up to
4 or 5, after which little additional gain is obtained.
 For the same sampling rate (8KHz) and signal quality,
DPCM may provide a saving of about 8~16 Kbps
compared to standard PCM (64 Kpbs).
© Po-Ning Chen@ece.nctu Chapter 3-138
Speech Quality
(Mean Opinion Scores)
Source: IEEE Communications Magazine, September 1997.
2 4 8 16 32 64
Unacceptable
Poor
Fair
Good
Excellent
Bit Rate (kb/s)
FS-1015
MELP 2.4 FS-1016
JDC2
G.723.1
GSM/2
JDC
IS54
IS96
GSM
G.723.1 G.729 G.728 G.726
G.711
G.727
IS-641
PCM
ADPCM
3.14 DPCM
IS = Interim Standard GSM = Global System for Mobile Communications JDC = Japanese Digital Cellular
FS = Federal Standard MELP = Mixed-Excitation Linear Prediction
© Po-Ning Chen@ece.nctu Chapter 3-139
3.15 Adaptive Differential Pulse-Code Modulation
 Adaptive prediction is used in DPCM.
 Can we also combine adaptive quantization into DPCM to
yield a comparably voice quality to PCM with 32 Kbps bit
rate? The answer is YES from the previous figure.
 32 Kbps: 4 bits for one sample, and 8 KHz sampling
rate
 64 Kbps: 8 bits for one sample, and 8 KHz sampling
rate
 So, “adaptive” in ADPCM means being responsive to
changing level and spectrum of the input speech signal.
© Po-Ning Chen@ece.nctu Chapter 3-140
3.15 Adaptive Quantization
 Adaptive quantization refers to a quantizer that operates
with a time-varying step size [n].
 [n] is adjusted according to the power of input sample
m[n].
 Power = variance, if m[n] is zero-mean.
 In practice, we can only obtain an estimate of E[m2[n]].
]]
[
[
]
[ 2
n
m
E
n 

 
© Po-Ning Chen@ece.nctu Chapter 3-141
3.15 Adaptive Quantization
 The estimate of E[m2[n]] can be done in two ways:
 Adaptive quantization with forward estimation (AQF)
 Estimate based on unquantized samples of the input
signals.
 Adaptive quantization with backward estimation (AQB)
 Estimate based on quantized samples of the input
signals.
© Po-Ning Chen@ece.nctu Chapter 3-142
3.15 AQF
 AQF is in principle a more accurate estimator. However, it
requires
 an additional buffer to store unquantized samples for the
learning period.
 explicit transmission of level information to the receiver
(the receiver, even without noise, only has the quantized
samples).
 a processing delay (around 16 ms for speech) due to
buffering and other operations for AQF.
 The above requirements can be relaxed by using AQB.
© Po-Ning Chen@ece.nctu Chapter 3-143
3.15 AQB
A possible drawback for a feedback system is its potential unstability.
However, stability in this system can be guaranteed if mq[n] is bounded.
Quantizer
De-
quantizer
Level
estimator
Level
estimator
m[n] mq[n]
© Po-Ning Chen@ece.nctu Chapter 3-144
3.15 APF and APB
 Likewise, the prediction approach used in ADPCM can be
classified into:
 Adaptive prediction with forward estimation (APF)
 Prediction based on unquantized samples of the input
signals.
 Adaptive prediction with backward estimation (APB)
 Prediction based on quantized samples of the input
signals.
 The pro and con of APF/APB is the same as AQF/AQB.
 APB/AQB are a preferred combination in practical
applications.
© Po-Ning Chen@ece.nctu Chapter 3-145
3.15 ADPCM
Adaptive prediction
with backward
estimation (APB).
Quantizer
Encoder
for DPCM
+
+
+_
Prediction
filter
Estimate
© Po-Ning Chen@ece.nctu Chapter 3-146
3.16 Computer Experiment: Adaptive Delta
Modulation
 In this section, the
simplest form of
ADM with AQB
is simulated,
namely, ADM
with AQB.
 Comparison with
LDM (i.e., linear
DM), where step
size is fixed, will
also be performed.
Figure 3.31 in text is incorrect.
© Po-Ning Chen@ece.nctu Chapter 3-147
3.16 Computer Experiment: Adaptive Delta
Modulation
 In this section, the
simplest form of
ADM modulation
with AQB is
simulated, namely,
ADM with AQB.
 Comparison with
LDM (i.e., linear
DM) where step
size is fixed will
also be performed.
I fix the error in this slide.
z-1
+
+
1-bit
quantizer
z-1
+
+
+_
Accumulator
Accumulator
z-1
Level
estimator
z-1
Level
estimator
© Po-Ning Chen@ece.nctu Chapter 3-148
3.16 Computer Experiment: Adaptive Delta
Modulation





















 






min
min
min
]
1
[
if
,
]
1
[
if
,
]
[
]
1
[
2
1
1
]
1
[
]
[
n
n
n
e
n
e
n
n q
q





1.
equals
t
output tha
quantizer
bit
1
the
is
]
[
,
iteration
at
size
step
the
is
]
[
where
n
e
n
n
q
Setting:m(t) =10sin 2p
fs
100
t
æ
è
ç
ö
ø
÷,DLDM =1 and Dmin =
1
8
© Po-Ning Chen@ece.nctu Chapter 3-149
3.16 Computer Experiment: Adaptive Delta
Modulation
Observation: ADM can achieve a comparable performance of
LDM with a much lower bit rate.
See Figure 3.32 in textbook.
© Po-Ning Chen@ece.nctu Chapter 3-150
3.17 MPEG Audio Coding Standard
 The ADPCM and various voice coding techniques
introduced above did not consider the human auditory
perception.
 In practice, a consideration on human auditory perception
can further improve the system performance (from the
human standpoint).
 The MPEG-1 standard is capable of achieving transparent,
“perceptually lossless” compression of stereophonic audio
signals at high sampling rate.
 A human subjective test shows that a 6-to-1
compression ratio are “perceptually indistinguishable”
to human.
© Po-Ning Chen@ece.nctu Chapter 3-151
3.17 Characteristics of Human Auditory System
 Psychoacoustic characteristic of human auditory system
 Critical band
 The inner ear will scale the power spectra of
incoming signals nonlinearly in the form of limited
frequency bands called the critical bands.
 Roughly, the inner ear can be modeled as 25
selective overlapping band-pass filters with
bandwidth < 100Hz for the lowest audible
frequencies, and up to 5kHz for the highest audible
frequencies.
© Po-Ning Chen@ece.nctu Chapter 3-152
3.17 Characteristics of Human Auditory System
 Auditory masking
 When a low-(power-)level signal (i.e., the maskee)
and a high-(power-)level signal (i.e., the masker)
occur simultaneously in the same critical band,
and are close to each other in frequency, the low-
(power-)level signal will be made inaudible (i.e.,
masked) by the high-(power-)level signal, if the
low-(power-)level one lies below a masking
threshold.
 Masking threshold is frequency-dependent.
© Po-Ning Chen@ece.nctu Chapter 3-153
3.17 Characteristic of Human Auditory System
Within a critical band, the quantization noise is inaudible as long as
the NMR = SMR - SNR for the pertinent quantizer is negative.
Masking
threshold
Signal level
(masker)
Critical band
Neighboring
Critical band
Neighboring
critical band
Quantization
noise level
Minimum masking threshold
at the critical band
SMR = signal-to-mask ratio
SNR
© Po-Ning Chen@ece.nctu Chapter 3-154
3.17 MPEG Audio Coding Standard
Frame
packing
Quantization
& coding
Analysis
filter-bank
Psychoacoustic
model
Bit
allocation
PCM
audio
signal
Output
bit
stream
© Po-Ning Chen@ece.nctu Chapter 3-155
3.17 MPEG Audio Coding Standard
 Analysis filter-bank
 Divide the audio signal into a proper number of subbands, which is
a compromise design for computational efficiency and perceptual
performance.
 Psychoacoustic model
 Analyze the spectral content of the input audio signal and thereby
compute the signal-to-mask ratio (SMR).
 Quantization & coding
 Decide how to apportion the available number of bits for the
quantization of the subband signals.
 Frame packing
 Assemble the quantized audio samples into a decodable bit stream.
© Po-Ning Chen@ece.nctu Chapter 3-156
3.18 Summary and Discussion
 Sampling – transform analog waveform to discrete-time
continuous wave
 Nyquist rate
 Quantization – transform discrete-time continuous wave to
discrete data.
 Human can only detect finite intensity difference.
 PAM, PDM and PPM
 TDM (Time-Division Multiplexing)
 PCM, DM, DPCM, ADPCM
 Additional consideration in MPEG audio coding

More Related Content

Similar to chap3.pptx

Noise performence
Noise performenceNoise performence
Noise performence
Punk Pankaj
 
IMPLEMENTATION OF THE DEVELOPMENT OF A FILTERING ALGORITHM TO IMPROVE THE SYS...
IMPLEMENTATION OF THE DEVELOPMENT OF A FILTERING ALGORITHM TO IMPROVE THE SYS...IMPLEMENTATION OF THE DEVELOPMENT OF A FILTERING ALGORITHM TO IMPROVE THE SYS...
IMPLEMENTATION OF THE DEVELOPMENT OF A FILTERING ALGORITHM TO IMPROVE THE SYS...
csandit
 
Implementation of the
Implementation of theImplementation of the
Implementation of the
csandit
 
Ch6 digital transmission of analog signal pg 99
Ch6 digital transmission of analog signal pg 99Ch6 digital transmission of analog signal pg 99
Ch6 digital transmission of analog signal pg 99
Prateek Omer
 
LifeTimeReport_v7
LifeTimeReport_v7LifeTimeReport_v7
LifeTimeReport_v7
Marc Alvarez
 
H0255065070
H0255065070H0255065070
H0255065070
theijes
 
Baseband transmission
Baseband transmissionBaseband transmission
Baseband transmission
Punk Pankaj
 
Icaee paper id 116.pdf
Icaee paper id 116.pdfIcaee paper id 116.pdf
Icaee paper id 116.pdf
shariful islam
 
Design and Implementation of Low Ripple Low Power Digital Phase-Locked Loop
Design and Implementation of Low Ripple Low Power Digital Phase-Locked LoopDesign and Implementation of Low Ripple Low Power Digital Phase-Locked Loop
Design and Implementation of Low Ripple Low Power Digital Phase-Locked Loop
CSCJournals
 
Moshtagh new-approach-ieee-2006
Moshtagh new-approach-ieee-2006Moshtagh new-approach-ieee-2006
Moshtagh new-approach-ieee-2006
imeneii
 
Dsp 2018 foehu - lec 10 - multi-rate digital signal processing
Dsp 2018 foehu - lec 10 - multi-rate digital signal processingDsp 2018 foehu - lec 10 - multi-rate digital signal processing
Dsp 2018 foehu - lec 10 - multi-rate digital signal processing
Amr E. Mohamed
 
Ch7 noise variation of different modulation scheme pg 63
Ch7 noise variation of different modulation scheme pg 63Ch7 noise variation of different modulation scheme pg 63
Ch7 noise variation of different modulation scheme pg 63
Prateek Omer
 
Close Loop V/F Control of Voltage Source Inverter using Sinusoidal PWM, Third...
Close Loop V/F Control of Voltage Source Inverter using Sinusoidal PWM, Third...Close Loop V/F Control of Voltage Source Inverter using Sinusoidal PWM, Third...
Close Loop V/F Control of Voltage Source Inverter using Sinusoidal PWM, Third...
IAES-IJPEDS
 
Pulse modulation
Pulse modulationPulse modulation
Pulse modulation
avocado1111
 
Applications of Wavelet Transform
Applications of Wavelet TransformApplications of Wavelet Transform
Applications of Wavelet Transform
ijtsrd
 
Accurate Evaluation of Interharmonics of a Six Pulse, Full Wave - Three Phase...
Accurate Evaluation of Interharmonics of a Six Pulse, Full Wave - Three Phase...Accurate Evaluation of Interharmonics of a Six Pulse, Full Wave - Three Phase...
Accurate Evaluation of Interharmonics of a Six Pulse, Full Wave - Three Phase...
idescitation
 
wep153
wep153wep153
Signal conversion
Signal conversionSignal conversion
Signal conversion
satheesh714
 
IMPLEMENTATION OF THE DEVELOPMENT OF A FILTERING ALGORITHM TO IMPROVE THE SYS...
IMPLEMENTATION OF THE DEVELOPMENT OF A FILTERING ALGORITHM TO IMPROVE THE SYS...IMPLEMENTATION OF THE DEVELOPMENT OF A FILTERING ALGORITHM TO IMPROVE THE SYS...
IMPLEMENTATION OF THE DEVELOPMENT OF A FILTERING ALGORITHM TO IMPROVE THE SYS...
cscpconf
 
Paper id 26201491
Paper id 26201491Paper id 26201491
Paper id 26201491
IJRAT
 

Similar to chap3.pptx (20)

Noise performence
Noise performenceNoise performence
Noise performence
 
IMPLEMENTATION OF THE DEVELOPMENT OF A FILTERING ALGORITHM TO IMPROVE THE SYS...
IMPLEMENTATION OF THE DEVELOPMENT OF A FILTERING ALGORITHM TO IMPROVE THE SYS...IMPLEMENTATION OF THE DEVELOPMENT OF A FILTERING ALGORITHM TO IMPROVE THE SYS...
IMPLEMENTATION OF THE DEVELOPMENT OF A FILTERING ALGORITHM TO IMPROVE THE SYS...
 
Implementation of the
Implementation of theImplementation of the
Implementation of the
 
Ch6 digital transmission of analog signal pg 99
Ch6 digital transmission of analog signal pg 99Ch6 digital transmission of analog signal pg 99
Ch6 digital transmission of analog signal pg 99
 
LifeTimeReport_v7
LifeTimeReport_v7LifeTimeReport_v7
LifeTimeReport_v7
 
H0255065070
H0255065070H0255065070
H0255065070
 
Baseband transmission
Baseband transmissionBaseband transmission
Baseband transmission
 
Icaee paper id 116.pdf
Icaee paper id 116.pdfIcaee paper id 116.pdf
Icaee paper id 116.pdf
 
Design and Implementation of Low Ripple Low Power Digital Phase-Locked Loop
Design and Implementation of Low Ripple Low Power Digital Phase-Locked LoopDesign and Implementation of Low Ripple Low Power Digital Phase-Locked Loop
Design and Implementation of Low Ripple Low Power Digital Phase-Locked Loop
 
Moshtagh new-approach-ieee-2006
Moshtagh new-approach-ieee-2006Moshtagh new-approach-ieee-2006
Moshtagh new-approach-ieee-2006
 
Dsp 2018 foehu - lec 10 - multi-rate digital signal processing
Dsp 2018 foehu - lec 10 - multi-rate digital signal processingDsp 2018 foehu - lec 10 - multi-rate digital signal processing
Dsp 2018 foehu - lec 10 - multi-rate digital signal processing
 
Ch7 noise variation of different modulation scheme pg 63
Ch7 noise variation of different modulation scheme pg 63Ch7 noise variation of different modulation scheme pg 63
Ch7 noise variation of different modulation scheme pg 63
 
Close Loop V/F Control of Voltage Source Inverter using Sinusoidal PWM, Third...
Close Loop V/F Control of Voltage Source Inverter using Sinusoidal PWM, Third...Close Loop V/F Control of Voltage Source Inverter using Sinusoidal PWM, Third...
Close Loop V/F Control of Voltage Source Inverter using Sinusoidal PWM, Third...
 
Pulse modulation
Pulse modulationPulse modulation
Pulse modulation
 
Applications of Wavelet Transform
Applications of Wavelet TransformApplications of Wavelet Transform
Applications of Wavelet Transform
 
Accurate Evaluation of Interharmonics of a Six Pulse, Full Wave - Three Phase...
Accurate Evaluation of Interharmonics of a Six Pulse, Full Wave - Three Phase...Accurate Evaluation of Interharmonics of a Six Pulse, Full Wave - Three Phase...
Accurate Evaluation of Interharmonics of a Six Pulse, Full Wave - Three Phase...
 
wep153
wep153wep153
wep153
 
Signal conversion
Signal conversionSignal conversion
Signal conversion
 
IMPLEMENTATION OF THE DEVELOPMENT OF A FILTERING ALGORITHM TO IMPROVE THE SYS...
IMPLEMENTATION OF THE DEVELOPMENT OF A FILTERING ALGORITHM TO IMPROVE THE SYS...IMPLEMENTATION OF THE DEVELOPMENT OF A FILTERING ALGORITHM TO IMPROVE THE SYS...
IMPLEMENTATION OF THE DEVELOPMENT OF A FILTERING ALGORITHM TO IMPROVE THE SYS...
 
Paper id 26201491
Paper id 26201491Paper id 26201491
Paper id 26201491
 

Recently uploaded

Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 

Recently uploaded (20)

Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 

chap3.pptx

  • 1. Chapter 3 Pulse Modulation We migrate from analog modulation (continuous in both time and value) to digital modulation (discrete in both time and value) through pulse modulation (discrete in time but could be continuous in value).
  • 2. © Po-Ning Chen@ece.nctu Chapter 3-2 3.1 Pulse Modulation  Families of pulse modulation  Analog pulse modulation  A periodic pulse train is used as carriers (similar to sinusoidal carriers)  Some characteristic feature of each pulse, such as amplitude, duration, or position, is varied in a continuous matter in accordance with the sampled message signal.  Digital pulse modulation  Some characteristic feature of carriers is varied in a digital manner in accordance with the sampled, digitized message signal.
  • 3. © Po-Ning Chen@ece.nctu Chapter 3-3 3.2 Sampling Theorem       n s s nT t nT g t g ) ( ) ( ) (                        n s s n s s f nT j nT g dt ft j nT t nT g f G     2 exp ) ( 2 exp ) ( ) ( ) (  Ts sampling period  fs = 1/Ts sampling rate t
  • 4.  Given:  Claim: © Po-Ning Chen@ece.nctu Chapter 3-4 3.2 Sampling Theorem       m s s mf f G f f G ) ( ) (          n s s f nT j nT g f G   2 exp ) ( ) ( 0 0 f f
  • 5. © Po-Ning Chen@ece.nctu Chapter 3-5 3.2 Spectrum of Sampled Signal df f f n j f L f c f f n j c f L f mf f G f f L s s f f s s n n s n s m s s                                 2 / 2 / 2 exp ) ( 1 where , 2 exp ) ( , Expansion Series By Fourier . period with periodic is it that notice and , ) ( ) ( Let                                      2 / 2 / 2 / 2 / 2 exp ) ( 2 exp ) ( 1 s s s s f f s m s f f s s n df f f n j mf f G df f f n j f L f c    Proof:
  • 6. cn = G( f - mfs )exp -j 2pn fs f æ è ç ö ø ÷df - fs /2 fs /2 ò m=-¥ ¥ å , s = f - mfs = G(s)exp -j 2pn fs (s+ mfs ) æ è ç ö ø ÷ds - fs /2-mfs fs /2-mfs ò m=-¥ ¥ å = G(s)exp -j 2pn fs s æ è ç ö ø ÷ds - fs /2-mfs fs /2-mfs ò m=-¥ ¥ å = G(s) -¥ ¥ ò exp -j 2pn fs s æ è ç ö ø ÷ds = g(-nTs ) © Po-Ning Chen@ece.nctu Chapter 3-6   . where , 2 exp ) ( 2 exp ) ( ) ( n m f mT j mT g f f n j nT g f L m s s n s s                          Q.E.D.
  • 7. © Po-Ning Chen@ece.nctu Chapter 3-7 3.2 First Important Conclusion from Sampling  Uniform sampling at the time domain results in a periodic spectrum with a period equal to the sampling rate.              m s s n s s mf f G f f G nT t nT g t g ) ( ) ( ) ( ) ( ) (    0 0 f f
  • 8. © Po-Ning Chen@ece.nctu Chapter 3-8 3.2 Reconstruction from Sampling . 2 Take W fs  Ideal lowpass filter . | | for ) ( 2 1 ) ( W f f G W f G    0 0 f f
  • 9. © Po-Ning Chen@ece.nctu Chapter 3-9 3.2 Aliasing due to Sampling . samples ed undersampl by ed reconstruc be cannot ) ( , 2 When f G W fs  0
  • 10. © Po-Ning Chen@ece.nctu Chapter 3-10  A band-limited signal of finite energy with bandwidth W can be completely described by its samples of sampling rate fs  2W.  2W is commonly referred to as the Nyquist rate.  How to reconstruct a band-limited signal from its samples? 3.2 Second Important Conclusion from Sampling 2W fs
  • 11.           ) ( 2 sinc 2 ) ( ) ( 2 ) ( 2 sin ) ( 2 ) ( 2 exp ) ( 1 ) 2 exp( 2 exp ) ( 1 ) 2 exp( ) ( ) 2 exp( ) ( ) ( s s n s s s n s s W W s n s s W W n s s s W W nT t W WT nT g nT t W nT t W nT g f W df f nT t j nT g f df ft j f nT j nT g f df ft j f G df ft j f G t g                                                   2WTs sinc[2W(tnTs)] plays the role of an interpolation function for samples. © Po-Ning Chen@ece.nctu Chapter 3-11 See Slides 3-4 ~ 3-6
  • 12. © Po-Ning Chen@ece.nctu Chapter 3-12 3.2 Band-Unlimited Signals  The signal encountered in practice is often not strictly band- limited.  Hence, there is always “aliasing” after sampling.  To combat the effects of aliasing, a low-pass anti-aliasing filter is used to attenuate the frequency components outside [fs/2, fs/2].  In this case, the signal after passing the anti-aliasing filter is often treated as bandlimited with bandwidth fs/2 (i.e., fs = 2W). Hence,             n T t nT g t g s n s sinc ) ( ) (
  • 13. © Po-Ning Chen@ece.nctu Chapter 3-13 3.2 Interpolation in terms of Filtering  Observe that is indeed a convolution between g(t) and sinc(t/Ts).             n T t nT g t g s n s sinc ) ( ) (                                                                   n s s s s n s s s s d T t nT nT g d T t nT nT g d T t g T t t g              sinc ) ( ) ( sinc ) ( ) ( sinc ) ( sinc * ) (
  • 14.                       n s s s n T t nT g T t t g sinc ) ( sinc * ) (  (Continue from the previous slide.)           s T t t h sinc ) ( filter) tion (interpola filter tion Reconstruc ) ( rect ) ( f T T f H s s   2 / s f  2 / s f s f ) (t g ) (t g © Po-Ning Chen@ece.nctu Chapter 3-14 ) ( f H
  • 15. © Po-Ning Chen@ece.nctu Chapter 3-15 3.2 Physical Realization of Reconstruction Filter  An ideal lowpass filter is not physically realizable.  Instead, we can use an anti-aliasing filter of bandwidth W, and use a sampling rate fs > 2W. Then, the spectrum of a reconstruction filter can be shaped like: 0
  • 16. Signal spectrum with bandwidth W Signal spectrum after sampling with fs > 2W The physically realizable reconstruction filter ) ( * ) ( ) ( ) ( ) ( ) ( ) ( * ) ( ideal ideal realizable realizable t h t g f H f G f H f G t h t g        © Po-Ning Chen@ece.nctu Chapter 3-16 0 0
  • 17.  PAM  The amplitude of regularly spaced pulses is varied in proportion to the corresponding sample values of a continuous message signal. © Po-Ning Chen@ece.nctu Chapter 3-17 3.3 Pulse-Amplitude Modulation (PAM) Notably, the top of each pulse is maintained flat. So, this is PAM, not natural-sampling for which the message signal is directly multiplied by a periodic train of rectangular pulses. t T Ts
  • 18. © Po-Ning Chen@ece.nctu Chapter 3-18 3.3 Pulse-Amplitude Modulation (PAM)  The operation of generating a PAM modulated signal is often referred to as “sample and hold.”  This “sample and hold” process can also be analyzed through “filtering technique.” ) ( * ) ( ) ( ) ( ) ( t h t m nT t h nT m t s n s s                   otherwise , 0 , 0 , 2 / 1 0 , 1 ) ( where T t t T t t h . ) ( ) ( ) ( and       n s s nT t nT m t m  
  • 19. © Po-Ning Chen@ece.nctu Chapter 3-19 3.3 Pulse-Amplitude Modulation (PAM)  By taking “filtering” standpoint, the spectrum of S(f) can be derived as:  M(f) is the message signal with bandwidth W (or having experienced an anti-aliasing filter of bandwidth W).  fs  2W. ) ( ) ( ) ( ) ( ) ( ) ( ) ( f H kf f M f f H kf f M f f H f M f S k s s k s s                    
  • 20. © Po-Ning Chen@ece.nctu Chapter 3-20 3.3 Pulse-Amplitude Modulation (PAM) ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( Equalizer Filter tion Reconstruc 1 | | f M f H f M f H kf f M f f H f M f f H kf f M f f S k s s s k s s              ) ( 1 )) ( of ] , [ range (over the f H f M W W  0 Reconstruction filter Equalizer s(t) m(t)
  • 21. © Po-Ning Chen@ece.nctu Chapter 3-21 3.3 Feasibility of Equalizer Filter  The distortion of M(f) is due to M(f)H(f),     fT j fT T f H T t t T t t h              exp sinc ) ( or otherwise , 0 , 0 , 2 / 1 0 , 1 ) ( where              otherwise 0, | | , exp sinc 1 ) ( 1 ) ( W f fT j fT T f H f E  Question: Is the above E(f) feasible or realizable?
  • 22. . 2 1 1 W f T T s s    © Po-Ning Chen@ece.nctu Chapter 3-22          otherwise 0, | | , sinc 1 ) ( ~ W f fT T f E -1 -0.5 0.5 1 0.2 0.4 0.6 0.8 1 ) ( ~ f E E.g., T = 1, W = 1/8. This gives an equalizer: ) ( ~ f E   fT j T t   exp or ) 2 / (  ) (t i ) (t o non-realizable! Why? A lowpass filter ) ( 1 t o Because "o1(t)= 0 for t < 0" does not imply "o(t)= 0 for t < 0."
  • 23. © Po-Ning Chen@ece.nctu Chapter 3-23 3.3 Feasibility of Equalizer Filter  Causal  A reasonable assumption for a feasible linear filter system is that:  A necessary and sufficient condition for the above assumption to hold is that h(t) = 0 for t < 0. ) (t h ) (t o ) (t i . 0 for 0 ) ( have we , 0 for 0 ) ( satisfying ) ( any For     t t o t t i t i
  • 24.  Simplified Proof:                  t d t i h d t i h t o t t i t t h 0 ) ( ) ( ) ( ) ( ) ( 0 for 0 ) ( 0 for 0 ) (       0 for 0 ) (    t t o             . 0 for , 1 ; 0 for , 0 ) ( take then , 0 some for 0 ) ( If t t t i a dt t h a input! zero completely to due output nonzero a be will there that means which , 0 ) ( ) (         a d h a o   . 0 every for 0 ) ( Therefore,       a d h a   . 0 for 0 ) ( ) ( 0 every for 0 ) (                   a a h d h a a d h a a     © Po-Ning Chen@ece.nctu Chapter 3-24
  • 25. © Po-Ning Chen@ece.nctu Chapter 3-25 3.3 Aperture Effect  The distortion of M(f) due to M(f)H(f) is very similar to the distortion caused by the finite size of the scanning aperture in television. So, it is named the aperture effect.  If T/Ts ≦ 0.1, the amplitude distortion is less than 0.5%; hence, the equalizer may not be necessary.     fT j fT T f H T t t T t t h              exp sinc ) ( or otherwise , 0 , 0 , 2 / 1 0 , 1 ) ( where
  • 26. -0.06 -0.04 -0.02 0.02 0.04 0.06 0.2 0.4 0.6 0.8 1 © Po-Ning Chen@ece.nctu Chapter 3-26          otherwise 0, | | , sinc 1 ) ( ~ W f fT T f E . 2 1 1 and W f T T s s      04 . 0 , 10 , 1 for otherwise 0, 04 . 0 | | , sinc 1 ) ( ~            W T T f f f E s ) ( ~ f E 1.00264
  • 27. © Po-Ning Chen@ece.nctu Chapter 3-27 3.3 Pulse-Amplitude Modulation  Final notes on PAM  PAM is rather stringent in its system requirement, such as short duration of pulse.  Also, the noise performance of PAM may not be sufficient for long distance transmission.  Accordingly, PAM is often used as a mean of message processing for time-division multiplexing, from which conversion to some other form of pulse modulation is subsequently made. Details will be discussed in Section 3.9.
  • 28. © Po-Ning Chen@ece.nctu Chapter 3-28 3.4 Other Forms of Pulse Modulation  Pulse-Duration Modulation (or Pulse-Width Modulation)  Samples of the message signal are used to vary the duration of the pulses.  Pulse-Position Modulation  The position of a pulse relative to its unmodulated time of occurrence is varied in accordance with the message signal.
  • 29. Pulse trains PDM PPM © Po-Ning Chen@ece.nctu Chapter 3-29
  • 30. © Po-Ning Chen@ece.nctu Chapter 3-30 3.4 Other Forms of Pulse Modulation  Comparisons between PDM and PPM  PPM is more power efficient because excessive pulse duration consumes considerable power.  Final note  It is expected that PPM is immune to additive noise, since additive noise only perturbs the amplitude of the pulses rather than the positions.  However, since the pulse cannot be made perfectly rectangular in practice (namely, there exists a non-zero transition time in pulse edge), the detection of pulse positions is somehow still affected by additive noise.
  • 31. © Po-Ning Chen@ece.nctu Chapter 3-31 3.5 Bandwidth-Noise Trade-Off  PPM seems to be a better form for analog pulse modulation from noise performance standpoint. However, its noise performance is very similar to (analog) FM modulation as:  Its figure of merit is proportional to the square of transmission bandwidth (i.e., 1/T) normalized with respect to the message bandwidth (W).  There exists a threshold effect as SNR is reduced.  Question: Can we do better than the “square” law in figure- of-merit improvement? Answer: Yes, by means of Digital Communication, we can realize an “exponential” law (with respect to error rates)! ) / ., . ( W B B e I T n 
  • 32. © Po-Ning Chen@ece.nctu Chapter 3-32 3.6 Quantization Process  Transform the continuous-amplitude m = m(nTs) to discrete approximate amplitude v = v(nTs)  Such a discrete approximate is adequately good in the sense that any human ear or eye can detect only finite intensity differences. Quantizer g( ) m v
  • 33. © Po-Ning Chen@ece.nctu Chapter 3-33 3.6 Quantization Process  We may drop the time instance nTs for convenience, when the quantization process is memoryless and instantaneous (hence, the quantization at time nTs is not affected by earlier or later samples of the message signal.)  Types of quantization  Uniform  Quantization step sizes are of equal length.  Non-uniform  Quantization step sizes are not of equal length.
  • 34. © Po-Ning Chen@ece.nctu Chapter 3-34  An alternative classification of quantization  Midtread  Midrise midtread midrise input input output output
  • 35. © Po-Ning Chen@ece.nctu Chapter 3-35 3.6 Quantization Noise Uniform midtread quantizer in the previous slide
  • 36. © Po-Ning Chen@ece.nctu Chapter 3-36 3.6 Quantization Noise  Define the quantization noise to be Q = M – V = M – g(M), where g( ) is the quantizer.  Let the message M be uniformly distributed in (–mmax, mmax). So, M has zero mean.  Assume g( ) is symmetric and of midrise type; then, V = g(M) also has zero-mean, and so does Q = M – V.  Then, the step size of the quantizer is given by: where L is the total number of representation levels. L mmax 2   mmax =1 L = 4 D = 1 2 Example.
  • 37. © Po-Ning Chen@ece.nctu Chapter 3-37 3.6 Quantization Noise  Assume that g( ) assigns the midpoint of each step interval to be the representation level. Then,                                     2 , 1 2 2 , 2 1 2 , 0 2 ) mod ( Pr Pr q q q q q M q Q mmax =1 L = 4 D = 1 2 Example.
  • 38. © Po-Ning Chen@ece.nctu Chapter 3-38 3.6 Quantization Noise  So, the output signal-to-noise ratio is equal to:  The transmission bandwidth of a quantization system is conceptually proportional to the number of bits required per sample, i.e., R = log2(L).  We then conclude that SNRO  4R, which increases exponentially with transmission bandwidth. 2 2 max 2 max 2 2 / 2 / 2 3 2 12 1 12 1 1 L m P L m P P dq q P SNRO                
  • 39. © Po-Ning Chen@ece.nctu Chapter 3-39 Example 3.1 Sinusoidal Modulating Signal  Let m(t) = Am cos(2fmt). Then L R SNRO (dB) 32 5 31.8 64 6 37.8 128 7 43.8 256 8 49.8 * Note that in this example, we assume a full-load quantizer, in which no quantization loss is encountered due to saturation.
  • 40. © Po-Ning Chen@ece.nctu Chapter 3-40 3.6 Quantization Noise  In the previous analysis of quantization error, we assume the quantizer assigns the mid-point of each step interval to be the representative level.  Questions:  Can the power of quantization noise be further reduced by adjusting the representative levels?  Can the power of quantization noise be further reduced by adopting a non-uniform quantizer?
  • 41. © Po-Ning Chen@ece.nctu Chapter 3-41 Representation level 3.6 Optimality of Scalar Quantizers v1 v2 vL1 vL  Let d(m, vk) be the distortion by representing m by vk.  Goal: To find {Ik} and {vk} such that the average distortion D = E[d(M, g(M))] is minimized. … I1 I2 IL1 IL … Partitions ) , [ 1 A A I L k k     Notably, interval Ik may not be a “consecutive” single interval.
  • 42. © Po-Ning Chen@ece.nctu Chapter 3-42 3.6 Optimality of Scalar Quantizers  Solution:    L k I M k I v I v k k k k k dm m f v m d D 1 } { } { } { } { ) ( ) , ( min min min min (I) For fixed {vk}, determine the optimal {Ik}. (II) For fixed {Ik}, determine the optimal {vk}. (I) If d(m, vk) ≦ d(m, vj), then m should be assigned to Ik rather than Ij.   L j v m d v m d A A m I j k k        1 all for ) , ( ) , ( : ) , [
  • 43. (II) For fixed {Ik}, determine the optimal {vk}.   L k I M k v k k dm m f v m d 1 } { ) ( ) , ( min                             j j k I M j j I M j j L k I M k j dm m f v v m d dm m f v m d v dm m f v m d v ) ( ) , ( ) ( ) , ( ) ( ) , ( Since 1 . 0 ) ( ) , ( : is optimal for the condition necessary a     j I M j j j dm m f v v m d v © Po-Ning Chen@ece.nctu Chapter 3-43 Lloyd-Max algorithm is to repetitively apply (I) and (II) for the search of the optimal quantizer.
  • 44. © Po-Ning Chen@ece.nctu Chapter 3-44 Example: Mean-Square Distortion  d(m, vk) = (m  vk)2 (I)   interval. e consecutiv a be should 1 all for ) ( ) ( : ) , [ 2 2 L j v m v m A A m I j k k         v1 v2 vL1 vL … I1 I2 IL1 IL … Representation level Partitions m1= mL= m2 m3 mL-1 mL-2
  • 45. © Po-Ning Chen@ece.nctu Chapter 3-45 Example: Mean-Square Distortion (II) : is optimal for the condition necessary A j v ] | [ ) ( ) ( 1 optimal , 1 1           j j m m M m m M j m M m M E dm m f dm m mf v j j j j Exercise: What is the best {mk} and {vk} if M is uniformly distributed over [A,A).
  • 46. © Po-Ning Chen@ece.nctu Chapter 3-46 3.7 Pulse-Code Modulation Lowpass (anti-aliasing) filter Quantizer PCM Encoder Channel PCM Decoder Reconstruction filter sampler Continuous time analog signal Reconstructed analog signal
  • 47. © Po-Ning Chen@ece.nctu Chapter 3-47 3.7 Pulse-Code Modulation  Non-uniform quantizers used for telecommunication (ITU- T G.711)  ITU-T G.711: Pulse Code Modulation (PCM) of Voice Frequencies (1972)  It consists of two laws: A-law (mainly used in Europe) and m-law (mainly used in US and Japan)  This design helps to protect weak signal, which occurs more frequently in, say, human voice.
  • 48. © Po-Ning Chen@ece.nctu Chapter 3-48 3.7 Laws  Quantization Laws  A-law  13-bit uniformly quantized  Conversion to 8-bit code  m-law  14-bit uniformly quantized  Conversion to 8-bit code.  These two are referred to as compression laws since they use 8-bit to (lossily) represent 13-(or 14-)bit information.
  • 49. © Po-Ning Chen@ece.nctu Chapter 3-49 3.7 A-law in G.711  A-law (A=87.6)                     1 1 , ) log( 1 |) | log( 1 ) sgn( 1 , ) log( 1 ) ( law - A m A A m A m A m m A A m F Linear mapping Logarithmic mapping
  • 50. -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1 -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1 output input ) ( law - A m F m © Po-Ning Chen@ece.nctu Chapter 3-50
  • 51. -128 -112 -96 -80 -64 -48 -32 0 32 48 64 80 96 112 128 -4096 -2048 -1024 -512 -256 -128 -64 0 64 128 256 512 1024 2048 4096 output input ) ( law - A m F © Po-Ning Chen@ece.nctu Chapter 3-51 13 bit uniform quantization 8 bit PCM code A piecewise linear approximation to the law.
  • 52. © Po-Ning Chen@ece.nctu Chapter 3-52 E.g. (3968)10  (1111,1000,0000)2111,1111)2127)10 E.g. (2176)10 1000,1000,0000)2111,0001)2113)10 Compressor of A-law (assume nonnegative m)
  • 53. © Po-Ning Chen@ece.nctu Chapter 3-53 Expander of A-law (assume nonnegative m) E.g. (113)10 ® (111,0001)2 ® (1000,1100,0000)2 ® (2240)10 In other words, (1001,0000,0000)2 +(1000,1000,0000)2 2 = (2304)10 +(2176)10 2 = (2240)10
  • 54. © Po-Ning Chen@ece.nctu Chapter 3-54 3.7 m-law in G.711  m-law (m = 255)  It is approximately linear at low m.  It is approximately logarithmic at large m. . 1 for ) log( 1 ) 1 log( ) sgn( ) ( law -     m m m m F m m m
  • 55. ) ( law - m Fm © Po-Ning Chen@ece.nctu Chapter 3-55 -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1 -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1 m
  • 56. ) ( law - m Fm 14 bit uniform quantization (213 = 8192) 8 bit PCM code © Po-Ning Chen@ece.nctu Chapter 3-56 -128 -112 -96 -80 -64 -48 -32 -16 0 16 32 48 64 80 96 112 128 -8159 -4063 -2015 -991 -479 -223 -95 -31 0 31 95 223 479 991 2015 4063 8159 A piecewise linear approximation to the law.
  • 57. Compressor of m-law (assume nonnegative m) Raised Input = Input + (33)10 = Input + 21H (For negative m, the raised input becomes (input – 33).) An additional 7th bit is used to indicate whether the input signal is positive (1) or negative (0). © Po-Ning Chen@ece.nctu Chapter 3-57
  • 58. Expander of m-law (assume nonnegative m) © Po-Ning Chen@ece.nctu Chapter 3-58 Output = Raised Output – 33 Note that the combination of a compressor and an expander is called a compander.
  • 59. -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 A-law mu-law Comparison of A-law and m-law specified in G.711. © Po-Ning Chen@ece.nctu Chapter 3-59
  • 60. © Po-Ning Chen@ece.nctu Chapter 3-60 3.7 Coding  After the quantizer provides a symbol, representing one of 256 possible levels (8 bits of information) at each sampled time, the encoder will transform the symbol (or several symbols) into a code character (or code word) that is suitable for transmission over a noisy channel.  Example. Binary code. 11100100 1 1 1 0 0 1 0 0 = change 1 = unchange 0
  • 61. © Po-Ning Chen@ece.nctu Chapter 3-61 3.7 Coding  Example. Ternary code (Pseudo-binary code). 0 0 0 1 1 0 1 00011011 B A C 00011011ACABBCBB 1 Through the help of coding, the receiver may be able to detect (or even correct) the transmission errors due to noise. For example, it is impossible to receive ABABBABB, since this is not a legitimate code word (character).
  • 62. © Po-Ning Chen@ece.nctu Chapter 3-62 3.7 Coding  Example of error correcting code : Three-times repetition code (to protect Bluetooth packet header). 00011011 000,000,000,111,111,000,111,111 Then, the so-called majority law can be applied at the receiver to correct one-bit error.  Channel (error correcting) codes are designed to compensate the channel noise, while line codes are simply used as the electrical representation of a binary data stream over the electrical line.
  • 63. © Po-Ning Chen@ece.nctu Chapter 3-63 3.7 Line Codes (a) Unipolar nonreturn-to-zero (NRZ) signaling (b) Polar nonreturn-to-zero (NRZ) signaling (c) Unipolar return-to-zero (RZ) signaling (d) Bipolar return-to-zero (BRZ) signaling (e) Split-phase (Manchester code) 0 1 0 0 1
  • 64. © Po-Ning Chen@ece.nctu Chapter 3-64 3.7 Derivation of PSD  From Slide 1-117, we obtain that the general formula for PSD is: }. | {| ) ( ) ( where )], ( ) ( [ 2 1 lim PSD 2 * 2 T t t s t s f S f S E T T T T       1
  • 65.                                                                      b b b b fkT j k a b N N m fkT j k a b N N N m T m n f j n a b N n T m n f j N N m m n b N e k T f G e k NT f G e m n NT f G e a a E f G NT        2 2 1 2 2 1 ) ( 2 2 ) ( 2 1 * 2 ) ( 1 | ) ( | ) ( 2 1 lim | ) ( | ) ( 2 1 lim | ) ( | ] [ | ) ( | 2 1 lim PSD © Po-Ning Chen@ece.nctu Chapter 3-65 (See Slide 3-4.) (i.i.d. = independent and identically distributed)
  • 66. © Po-Ning Chen@ece.nctu Chapter 3-66 3.7 Power Spectral of Line Codes  Unipolar nonreturn-to-zero (NRZ) signaling  Also named on-off signaling.  Disadvantage: Waste of power due to the non-zero- mean nature (i.e., PSD does not approach zero at zero frequency).                     otherwise , 0 0 , ) ( i.i.d., zero/one is } { where , ) ( ) ( b n n n b n T t A t g a nT t g a t s 0 1 0 0 1
  • 67. © Po-Ning Chen@ece.nctu Chapter 3-67 3.7 Power Spectral of Line Codes  PSD of Unipolar NRZ
  • 68. © Po-Ning Chen@ece.nctu Chapter 3-68  Polar nonreturn-to-zero (NRZ) signaling  The previous PSD of Unipolar NRZ suggests that a zero-mean data sequence is preferred.                      otherwise , 0 0 , ) ( i.i.d., 1 is } { where , ) ( ) ( b n n n b n T t A t g a nT t g a t s 3.7 Power Spectral of Line Codes 0 1 0 0 1
  • 69. © Po-Ning Chen@ece.nctu Chapter 3-69 3.7 Power Spectral of Line Codes  Unipolar return-to-zero (RZ) signaling  An attractive feature of this line code is the presence of delta functions at f = –1/Tb, 0, 1/Tb in the PSD, which can be used for bit-timing recovery at the receiver.  Disadvantage: It requires 3dB more power than polar return-to-zero signaling.                     otherwise , 0 2 / 0 , ) ( i.i.d., zero/one is } { where , ) ( ) ( b n n n b n T t A t g a nT t g a t s 0 1 0 0 1
  • 70. © Po-Ning Chen@ece.nctu Chapter 3-70 3.7 Power Spectral of Line Codes  PSD of Unipolar RZ
  • 71. © Po-Ning Chen@ece.nctu Chapter 3-71 3.7 Power Spectral of Line Codes  Bipolar return-to-zero (BRZ) signaling  Also named alternate mark inversion (AMI) signaling  No DC component and relatively insignificant low- frequency components in PSD.             otherwise , 0 2 / 0 , ) ( where , ) ( ) ( b n b n T t A t g nT t g a t s 0 1 0 0 1
  • 72. © Po-Ning Chen@ece.nctu Chapter 3-72 3.7 Power Spectral of Line Codes  PSD of BRZ  {an} is no longer i.i.d. . 1 for 0 ] [ 0 16 1 ) 1 )( 1 ( 16 1 ) 1 )( 1 ( 16 1 ) 1 )( 1 ( 16 1 ) 1 )( 1 ( ] [ 4 1 4 1 ) 1 ( ] [ 2 1 4 1 ) 1 ( 4 1 ) 1 ( 2 1 ) 0 ( ] [ 2 1 2 2 2                         m a a E a a E a a E a E m n n n n n n n 
  • 73. © Po-Ning Chen@ece.nctu Chapter 3-73 3.7 Power Spectral of Line Codes
  • 74. © Po-Ning Chen@ece.nctu Chapter 3-74 3.7 Power Spectral of Line Codes  Split-phase (Manchester code)  This signaling suppressed the DC component, and has relatively insignificant low-frequency components, regardless of the signal statistics.  Notably, for P-NRZ and BRZ, the DC component is suppressed only when the signal has the right statistics.                             otherwise , 0 2 / , 2 / 0 , ) ( i.i.d., 1 is } { where , ) ( ) ( b b b n n n b n T t T A T t A t g a nT t g a t s 0 1 0 0 1
  • 75. © Po-Ning Chen@ece.nctu Chapter 3-75 3.7 Power Spectral of Line Codes  PSD of Manchester code
  • 76. © Po-Ning Chen@ece.nctu Chapter 3-76 Let Tb=1, and adjust A such that the total power of each line code is 1. This gives a fair comparison among line codes.
  • 77. © Po-Ning Chen@ece.nctu Chapter 3-77 0 0.2 0.4 0.6 0.8 1 0 0.5 1 1.5 2 U-NRZ P-NRZ U-RZ BRZ Manchester 2 / 1 
  • 78. © Po-Ning Chen@ece.nctu Chapter 3-78 3.7 Differential Encoding with Unipolar NRZ Line Coding  1 = no change and 0 = change. n d n o 0 1 1 1 0 0 1 0 0 1 0 0 0 1 1 0 1 1 1 0 0 0 0 1 0 0 1 0 Original data Differentially encoded data Reference bit
  • 79. © Po-Ning Chen@ece.nctu Chapter 3-79 3.7 Regeneration  Regenerative repeater for PCM system  It can completely remove the distortion if the decision making device makes the right decision (on 1 or 0). Equalizer Decision- making device Timing circuit Amplifier Degraded PCM wave Regenerated PCM wave
  • 80. © Po-Ning Chen@ece.nctu Chapter 3-80 3.7 Decoding & Filtering  After regenerating the received pulse at the last stage, the receiver decodes and regenerates the original message signal (with acceptable quantization error).  Finally, a lowpass reconstruction filter whose cutoff frequency is equal to the message bandwidth W is applied at the end (to remove the unnecessary high-frequency components due to “quantization”).
  • 81. © Po-Ning Chen@ece.nctu Chapter 3-81 3.8 Noise Consideration in PCM Systems  Two major noise sources in PCM systems  (Message-independent) Channel noise  (Message-dependent) Quantization noise  The quantization noise is often under designer’s control, and can be made negligible by taking adequate number of quantization levels.
  • 82. © Po-Ning Chen@ece.nctu Chapter 3-82 3.8 Noise Consideration in PCM Systems  The main effect of channel noise is to introduce bit errors.  Notably, the symbol error rate is quite different from the bit error rate.  A symbol error may be caused by one-bit error, or two- bit error, or three-bit error, or …; so, in general, one cannot derive the symbol error rate from the bit error rate (or vice versa) unless some special assumption is made.  Considering the reconstruction of original analog signal, a bit error in the most significant bit is more harmful than a bit error in the least significant bit.
  • 83. © Po-Ning Chen@ece.nctu Chapter 3-83 3.8 Error Threshold  Eb/N0  Eb: Transmitted signal energy per information bit  E.g., information bit is encoded using three-times repetition code, in which each code bit is transmitted using one BPSK symbol with symbol energy Ec.  Then Eb = 3 Ec.  N0: One-sided noise spectral density  The bit error rate (BER) is a function of Eb/N0 and transmission speed (and implicitly bandwidth, etc).
  • 84. © Po-Ning Chen@ece.nctu Chapter 3-84 3.8 Error Threshold  Influence of Eb/N0 on BER at 105 bit per second (bps) Eb/N0 (dB) BER About one bit error in every … 4.3 102 103 second 8.4 104 101 second 10.6 106 10 seconds 12.0 108 20 minutes 13.0 1010 1 day 14.0 1012 3 months  The usual requirement of BER in practice is 105.
  • 85. © Po-Ning Chen@ece.nctu Chapter 3-85 3.8 Error Threshold  Error threshold  The minimum Eb/N0 to achieve the required BER.  By knowing the error threshold, one can always add a regenerative repeater when Eb/N0 is about to drop below the threshold; hence, long-distance transmission becomes feasible.  Unlike the analog transmission, of which the distortion will accumulate for long-distance transmission.
  • 86. © Po-Ning Chen@ece.nctu Chapter 3-86 3.9 Time-Division Multiplexing  An important feature of sampling process is a conservation- of-time.  In principle, the communication link is used only at the sampling time instances.  Hence, it may be feasible to put other message’s samples between adjacent samples of this message on a time-shared basis.  This forms the time-division multiplex (TDM) system.  A joint utilization of a common communication link by a plurality of independent message sources.
  • 87. © Po-Ning Chen@ece.nctu Chapter 3-87 3.9 Time-Division Multiplexing  The commutator (1) takes a narrow sample of each of the N input messages at a rate fs slightly higher than 2W, where W is the cutoff frequency of the anti-aliasing filter, and (2) interleaves these N samples inside the sampling interval Ts. LPF LPF LPF LPF LPF LPF LPF Channel PCM PCM synchronized commutator commutator (anti-aliasing) (reconstruction) 1 2 N 1 2 N
  • 88. © Po-Ning Chen@ece.nctu Chapter 3-88 3.9 Time-Division Multiplexing  The price we pay for TDM is that N samples be squeezed in a time slot of duration Ts. LPF LPF LPF LPF LPF LPF LPF Channel PCM PCM synchronized commutator commutator (anti-aliasing) (reconstruction) 1 2 N 1 2 N
  • 89. © Po-Ning Chen@ece.nctu Chapter 3-89 3.9 Time-Division Multiplexing  Synchronization is essential for a satisfactory operation of the TDM system.  One possible procedure to synchronize the transmitter clock and the receiver clock is to set aside a code element or pulse at the end of a frame, and to transmit this pulse every other frame only.
  • 90. © Po-Ning Chen@ece.nctu Chapter 3-90 Example 3.2 The T1 System  T1 system  Carries 24 64kbps voice channels with regenerative repeaters spaced at approximately 2-km intervals.  Each voice signal is essentially limited to a band from 300 to 3100 Hz.  Anti-aliasing filter with W = 3.1 KHz  Sampling rate = 8 KHz ( 2W = 6.2 KHz)  ITU G.711 m-law is used with m = 255.  Each frame consists of 24  8 + 1 = 193 bits, where a single bit is added at the end of the frame for the purpose of synchronization.
  • 91. © Po-Ning Chen@ece.nctu Chapter 3-91 Example 3.2 The T1 System  In addition to the 193 bits per frame (i.e., 1.544 Megabits per second), a telephone system must also pass signaling information such as “dial pulses” and “on/off-hook.”  The least significant bit of each voice channel is deleted in every sixth frame, and a signaling bit is inserted in its place. (DS=Digital Signal) 1 2 3 24 F DS1 Frame (24 DS0) Framing bit
  • 92. © Po-Ning Chen@ece.nctu Chapter 3-92 3.10 Digital Multiplexers  The introduction of digital multiplexer enables us to combine digital signals of various natures, such as computer data, digitized voice signals, digitized facsimile and television signals. Multiplexer Demultiplexer 1 2 N 1 2 N High-speed transmission line
  • 93. © Po-Ning Chen@ece.nctu Chapter 3-93 3.10 Digital Multiplexers  The multiplexing of digital signals is accomplished by using a bit-by-bit interleaving procedure with a selector switch that sequentially takes a (or more) bit from each incoming line and then applies it to the high-speed common line. (3 channels/frame) PCM PCM PCM TDM 4k Hz Analog Voices 64 kbps Digital Voices 1 frame
  • 94. © Po-Ning Chen@ece.nctu Chapter 3-94 3.10 Digital Multiplexers  Digital multiplexers are categorized into two major groups. 1. 1st Group: Multiplex digital computer data for TDM transmission over public switched telephone network.  Require the use of modem technology. 2. 2nd Group: Multiplex low-bit-rate digital voice data into high-bit-rate voice stream.  Accommodate in the hierarchy that is varying from one country to another.  Usually, the hierarchy starts at 64 Kbps, named a digital signal zero (DS0).
  • 95. © Po-Ning Chen@ece.nctu Chapter 3-95 3.10 North American Digital TDM Hierarchy  The first level hierarchy  Combine 24 DS0 to obtain a primary rate DS1 at 1.544 Mb/s (T1 transmission)  The second-level multiplexer  Combine 4 DS1 to obtain a DS2 with rate 6.312 Mb/s  The third-level multiplexer  Combine 7 DS2 to obtain a DS3 at 44.736 Mb/s  The fourth-level multiplexer  Combine 6 DS3 to obtain a DS4 at 274.176 Mb/s  The fifth-level multiplexer  Combine 2 DS4 to obtain a DS5 at 560.160 Mb/s
  • 96. T4=6 DS3 (274.176 Mbps) © Po-Ning Chen@ece.nctu Chapter 3-96 3.10 North American Digital TDM Hierarchy  The combined bit rate is higher than the multiple of the incoming bit rates because of the addition of bit stuffing and control signals. M01 M12 M23 M34 T1=24 DS0 (1.544 Mbps) T2=4 DS1 (6.312 Mbps) T3=7 DS2 (44.736 Mbps) DS0 DS1 DS2 DS3 DS4 Voice (64 kbps)
  • 97. © Po-Ning Chen@ece.nctu Chapter 3-97 3.10 North American Digital TDM Hierarchy  Basic problems involved in the design of multiplexing system  Synchronization should be maintained to properly recover the interleaved digital signals.  Framing should be designed so that individual can be identified at the receiver.  Variation in the bit rates of incoming signals should be considered in the design.  A 0.01% variation in the propagation delay produced by a 1℉ decrease in temperature will result in 100 fewer pulses in the cable of length 1000-km with each pulse occupying about 1 meter of the cable.
  • 98. © Po-Ning Chen@ece.nctu Chapter 3-98 3.10 Digital Multiplexers  Synchronization and rate variation problems are resolved by bit stuffing.  Example 3.3. AT&T M12 (second-level multiplexer)  24 control bits are stuffed, and separated by sequences of 48 data bits (12 from each DS1 input). M0 M1 M1 M1 48 48 48 48 CI CII CIII CIV 48 48 48 48 F0 F0 F0 F0 48 48 48 48 CI CII CIII CIV 48 48 48 48 CI CII CIII CIV 48 48 48 48 F1 F1 F1 F1 48 48 48 48 Frame markers Frame markers Subframe markers Stuffing indicators Stuffing indicators Stuffing indicators
  • 99. © Po-Ning Chen@ece.nctu Chapter 3-99 M 48 C 48 F 48 C 48 C 48 F 48 DS2 M-Subframe: 294 bits (6 blocks) For each block: DS1 #1 DS1 #2 DS1 #3 DS1 #4 Bit interleave
  • 100. © Po-Ning Chen@ece.nctu Chapter 3-100 Example 3.3 AT&T M12 Multiplexer  The control bits are labeled F, M, and C.  Frame markers: In sequence of F0F1F0F1F0F1F0F1, where F0 = 0 and F1 = 1.  Subframe markers: In sequence of M0M1M1M1, where M0 = 0 and M1 = 1.  Stuffing indicators: In sequences of CI CI CI CII CII CII CIII CIII CIII CIV CIV CIV, where all three bits of Cj equal 1’s indicate that a stuffing bit is added in the position of the first information bit associated with the first DS1 bit stream that follows the F1-control bit in the same subframe, and three 0’s in CjCjCj imply no stuffing.  The receiver should use majority law to check whether a stuffing bit is added.
  • 101. © Po-Ning Chen@ece.nctu Chapter 3-101 Example 3.3 AT&T M12 Multiplexer  These stuffed bits can be used to balance (or maintain) the nominal input bit rates and nominal output bit rates.  S = nominal bit stuffing rate  The rate at which stuffing bits are inserted when both the input and output bit rates are at their nominal values.  fin = nominal input bit rate  fout = nominal output bit rate  M = number of bits in a frame  L = number of information bits (input bits) for one input stream in a frame
  • 102. © Po-Ning Chen@ece.nctu Chapter 3-102 Example 3.3 AT&T M12 multiplexer  For M12 framing, bits 288 bits 1176 24 4 288 Mbps 312 . 6 Mbps 544 . 1        L M f f out in in in out f L S f L S f M ) 1 ( 1 frame a of Duration bit. stuffed a by replaced is bit One         334601 . 0 1176 312 . 6 544 . 1 288       M f f L S out in
  • 103. © Po-Ning Chen@ece.nctu Chapter 3-103 Example 3.3 AT&T M12 Multiplexer  Allowable tolerances to maintain nominal output bit rates  A sufficient condition for the existence of S such that the nominal output bit rate can be matched.                       in in S out in in S f L S f L S f M f L S f L S ) 1 ( 1 min ) 1 ( 1 max ] 1 , 0 [ ] 1 , 0 [ out in out in out in f M L f f M L f L f M f L 1 1         54043 . 1 312 . 6 1176 287 312 . 6 1176 288 5458 . 1     in f
  • 104. © Po-Ning Chen@ece.nctu Chapter 3-104 Example 3.3 AT&T M12 Multiplexer  This results in an allowable tolerance range:  In terms of ppm (pulse per million pulses),  This tolerance is already much larger than the expected change in the bit rate of the incoming DS1 bit stream. kbps 36735 . 5 1176 / 312 . 6 54043 . 1 5458 . 1    18 . 2312 and 8 . 1164 5458 . 1 10 544 . 1 10 54043 . 1 10 6 6 6        ppm ppm ppm ppm b a a b
  • 105. © Po-Ning Chen@ece.nctu Chapter 3-105 3.11 Virtues, Limitations, and Modifications of PCM  Virtues of PCM systems  Robustness to channel noise and interference  Efficient regeneration of coded signal along the transmission path  Efficient exchange of increased channel bandwidth for improved signal-to-noise ratio, obeying an exponential law.  Uniform format for different kinds of baseband signal transmission; hence, facilitate their integration in a common network.  Message sources are easily dropped or reinserted in a TDM system.  Secure communication through the use of encryption/decryption.
  • 106. © Po-Ning Chen@ece.nctu Chapter 3-106 3.11 Virtues, Limitations, and Modifications of PCM  Two limitations of PCM system (in the past)  Complexity  Bandwidth  Nowadays, with the advance of VLSI technology, and with the availability of wideband communication channels (such as fiber) and compression technique (to reduce the bandwidth demand), the above two limitations are greatly released.
  • 107. © Po-Ning Chen@ece.nctu Chapter 3-107 3.12 Delta Modulation  Delta Modulation (DM)  The message is oversampled (at a rate much higher than the Nyquist rate) to purposely increase the correlation between adjacent samples.  Then, the difference between adjacent samples is encoded instead of the sample value itself.
  • 108. 1 0 © Po-Ning Chen@ece.nctu Chapter 3-108 Staircase approximation mq(t) m(t) Ts 1 0 1 1 1 1 1 1 0 1 0 1 0 0 0 1
  • 109. © Po-Ning Chen@ece.nctu Chapter 3-109 3.12 Math Analysis of Delta Modulation Then . at time ) ( of ion approximat DM the be ] [ Let ). ( ] [ Let s q s nT t m n m nT m n m  mq[n]= mq[n-1]+eq[n]= eq[ j] j=-¥ n å , where eq[n]= D×sgn(m[n]- mq[n-1]). . } 2 / ] 1 ) / ] [ [( { is word code ed transmitt The      n q n e
  • 110. Chapter 3-110  The principle virtue of delta modulation is its simplicity.  It only requires the use of comparator, quantizer, and accumulator. Bandwidth W of m(t) 3.12 Delta Modulation ]). 1 [ ] [ sgn( ] [ where , ] [ ] [ ] 1 [ ] [             n m n m n e n e n e n m n m q q n j q q q q Decoder for DM z-1 + + Lowpass filter 1-bit quantizer Encoder for DM z-1 + + +_ Accumulator Accumulator
  • 111. © Po-Ning Chen@ece.nctu Chapter 3-111 3.12 Delta Modulation  Distortions due to delta modulation  Slope overload distortion  Granular noise © Po-Ning Chen@ece.nctu Chapter 3-111 m(t) mq(t) Slope-overload distortion Granular noise Ts
  • 112. © Po-Ning Chen@ece.nctu Chapter 3-112 3.12 Delta Modulation  Slope overload distortion  To eliminate the slope overload distortion, it requires  So, increasing step size  can reduce the slope-overload distortion.  An alternative solution is to use dynamic . (Often, a delta modulation with fixed step size is referred to as a linear delta modulator due to its fixed slope, a basic function of linearity.) condition) overload (slope ) ( max dt t dm Ts  
  • 113. © Po-Ning Chen@ece.nctu Chapter 3-113 3.12 Delta Modulation  Granular noise  mq[n] will hunt around a relatively flat segment of m(t).  A remedy is to reduce the step size.  A tradeoff in step size is therefore resulted for slope overload distortion and granular noise.
  • 114. © Po-Ning Chen@ece.nctu Chapter 3-114 3.12 Delta-Sigma Modulation  Delta-sigma modulation  In fact, the delta modulation distortion can be reduced by increasing the correlation between samples.  This can be achieved by integrating the message signal m(t) prior to delta modulation.  The “integration” process is equivalent to a pre- emphasis of the low-frequency content of the input signal.
  • 115. © Po-Ning Chen@ece.nctu Chapter 3-115 3.12 Delta-Sigma Modulation  A side benefit of “integration-before- delta-modulation,” which is named delta-sigma modulation, is that the receiver design is further simplified (at the expense of a more complex transmitter). Decoder for DM z-1 + + Lowpass filter 1-bit quantizer Encoder for DM z-1 + + +_ Accumulator Accumulator Move the accumulator to the transmitter.
  • 116. © Po-Ning Chen@ece.nctu Chapter 3-116 3.12 Delta-Sigma Modulation A straightforward structure Since integration is a linear operation, the two integrators before comparator can be combined into one after comparator. 1-bit quantizer Encoder for DM +_ z-1 + + Accumulator z-1 + + Accumulator Decoder for DM Lowpass filter 1-bit quantizer Encoder for DM +_ z-1 + + Accumulator z-1 combine into one
  • 117. © Po-Ning Chen@ece.nctu Chapter 3-117 3.12 Math Analysis of Delta-Sigma Modulation ]). 1 [ ] [ sgn( ] [ where ], [ ] 1 [ ] [ Then . at time ) ( ) ( of ion approximat DM the be ] [ Let . ) ( ] [ Let                 n i n i n n n i n i nT d m t i n i dt t m n i q q q q q s t q nTs     . } 2 / ] 1 ) / ] [ [( { is word code ed transmitt The      n q n  , ) ( ) ( ] 1 [ ] [ ] 1 [ ] [ ] [ ) 1 ( s nT T n q q q T t m dt t m n i n i n i n i n s s            Since we only need a lowpass filter to smooth out the received signal at the receiver end. (See the previous slide.)
  • 118. © Po-Ning Chen@ece.nctu Chapter 3-118 3.12 Delta Modulation  Final notes  Delta(-sigma) modulation trades channel bandwidth (e.g., much higher sampling rate) for reduced system complexity (e.g., the receiver only demands a lowpass filter).  Can we trade increased system complexity for a reduced channel bandwidth? Yes, by means of prediction technique.  In Section 3.13, we will introduce the basics of prediction technique. Its application will be addressed in subsequent sections.
  • 119. © Po-Ning Chen@ece.nctu Chapter 3-119 3.13 Linear Prediction  Consider a finite-duration impulse response (FIR) discrete- time filter, where p is the prediction order, with linear prediction     p k k k n x w n x 1 ] [ ] [ ˆ z-1 z-1 z-1 w1 w2 wp-1 wp x[n] x[n-1] x[n-2] x[n-p] x[n-p+1] prediction
  • 120. © Po-Ning Chen@ece.nctu Chapter 3-120 3.13 Linear Prediction  Design objective  To find the filter coefficient w1, w2, …, wp so as to minimize index of performance J: ]. [ ˆ ] [ ] [ where ]], [ [ 2 n x n x n e n e E J   
  • 121.                                                     p k X k p k p k j X j k p k X k X p k p j j k p k k p k k R w j k R w w k R w R j n x k n x E w w k n x n x E w n x E k n x w n x E J 1 2 1 1 1 1 1 2 2 1 ] 0 [ ] [ 2 ] [ 2 ] 0 [ ]] [ ] [ [ ]] [ ] [ [ 2 ]] [ [ ] [ ] [ 0 ] [ 2 ] [ 2 ] 0 [ 2 ] [ 2 ] [ 2 ] [ 2 1 1 1 1                               p j X j X X i i k X k p i j X j X i j i R w i R R w i k R w j i R w i R J w © Po-Ning Chen@ece.nctu Chapter 3-121
  • 122. . 1 for ] [ ] [ 1 p i i R j i R w X p j X j       © Po-Ning Chen@ece.nctu Chapter 3-122 The above optimality equations are called the Wiener-Hopf equations for linear prediction. It can be rewritten in matrix form as:                                          ] [ ] 2 [ ] 1 [ ] 0 [ ] 2 [ ] 1 [ ] 2 [ ] 0 [ ] 1 [ ] 1 [ ] 1 [ ] 0 [ 2 1 p R R R w w w R p R p R p R R R p R R R X X X p X X X X X X X X X          or RXw = rX Þ Optimal solution wo = RX -1 rX
  • 123. © Po-Ning Chen@ece.nctu Chapter 3-123 3.13 Toeplitz (Square) Matrix  Any square matrix of the form is said to be Toeplitz.  A Toeplitz matrix (such as RX) can be uniquely determined by p elements, [a0, a1, …, ap1]. p p p p p p a a a a a a a a a                  0 2 1 2 0 1 1 1 0       
  • 124. © Po-Ning Chen@ece.nctu Chapter 3-124 3.13 Linear Adaptive Predictor  The optimal w0 can only be obtained with the knowledge of autocorrelation function.  Question: What if the autocorrelation function is unknown?  Answer: Use linear adaptive predictor.
  • 125.  To minimize J, we should update wi toward the bottom of the J-bowel.  So, when gi  0, wi should be decreased.  On the contrary, wi should be increased if gi < 0.  Hence, we may define the update rule as: where m is a chosen constant step size, and ½ is included only for convenience of analysis. © Po-Ning Chen@ece.nctu Chapter 3-125 3.13 Idea Behind Linear Adaptive Predictor i i w J g    ] [ 2 1 ] [ ˆ ] 1 [ ˆ n g n w n w i i i     m
  • 126.  gi[n] can be approximated by:                                 p j j p j j p j X j X i i j n x n w n x i n x i n x j n x n w i n x n x j i R w i R w J n g 1 1 1 ] [ ] [ ˆ ] [ ] [ 2 ] [ ] [ ] [ ˆ 2 ] [ ] [ 2 ) ( 2 ) ( 2 / ] [ © Po-Ning Chen@ece.nctu Chapter 3-126
  • 127. © Po-Ning Chen@ece.nctu Chapter 3-127 3.13 Structure of Linear Adaptive Predictor z-1 Linear predictor + _ x[n] x[n-1] Error e[n]
  • 128. © Po-Ning Chen@ece.nctu Chapter 3-128 3.13 Least Mean Square  The pairs in the form of the popular least-mean-square (LMS) algorithm for linear adaptive prediction.
  • 129. © Po-Ning Chen@ece.nctu Chapter 3-129 3.14 Differential Pulse-Code Modulation (DPCM)  Basic idea behind differential pulse-code modulation  Adjacent samples are often found to exhibit a high degree of correlation.  If we can remove this adjacent redundancy before encoding, a more efficient coded signal can be resulted.  A way to remove the redundancy is to use linear prediction.
  • 130. © Po-Ning Chen@ece.nctu Chapter 3-130 3.14 DPCM  For DPCM, the quantization error is on e[n], rather on m[n] as for PCM.  So, the quantization error q[n] is supposed to be smaller. Bandwidth W of m(t) Decoder for DPCM + + Lowpass filter Quantizer Encoder for DPCM + + +_ Prediction filter Prediction filter
  • 131. © Po-Ning Chen@ece.nctu Chapter 3-131 3.14 DPCM  Derive: ] [ ] [ ] [ n q n e n eq   ] [ ] [ ] [ ] [ ] [ ˆ ] [ ] [ ˆ ] [ n q n m n q n e n m n e n m n m q q         So, we have the same relation between mq[n] and m[n] (as in Slide 3-110) but with smaller q[n]. Bandwidth W of m(t) Decoder for DPCM + + Lowpass filter Quantizer Encoder for DPCM + + +_ Prediction filter Prediction filter ] [ ˆ n m
  • 132. © Po-Ning Chen@ece.nctu Chapter 3-132 3.14 DPCM  Notes  DM system can be treated as a special case of DPCM. Prediction filter => single delay Quantizer => single-bit 1-bit quantizer Encoder for DM z-1 + + +_ Accumulator
  • 133. © Po-Ning Chen@ece.nctu Chapter 3-133 3.14 DPCM  Distortions due to DPCM  Slope overload distortion The input signal changes too rapidly for the prediction filter to track it.  Granular noise
  • 134. © Po-Ning Chen@ece.nctu Chapter 3-134 3.14 Processing Gain  The DPCM system can be described by:  So, the output signal-to-noise ratio is:  We can re-write SNRO as: ] [ ] [ ] [ n q n m n mq   ]] [ [ ]] [ [ 2 2 n q E n m E SNRO  Q p O SNR G n q E n e E n e E n m E SNR    ]] [ [ ]] [ [ ]] [ [ ]] [ [ 2 2 2 2 error. prediction the is ] [ ˆ ] [ ] [ where n m n m n e  
  • 135. © Po-Ning Chen@ece.nctu Chapter 3-135 3.14 Processing Gain  In terminologies,          ratio noise on quantizati to signal ]] [ [ ]] [ [ gain processing ]] [ [ ]] [ [ 2 2 2 2 n q E n e E SNR n e E n m E G Q p Notably, SNRQ can be treated as the SNR for system of eq[n]= e[n]+q[n].
  • 136. © Po-Ning Chen@ece.nctu Chapter 3-136 3.14 Processing Gain  Usually, the contribution of SNRQ to SNRO is fixed.  One additional bit in quantization results in 6 dB improvement.  Gp is the processing gain due to a nice “prediction.”  The better the prediction is, the larger Gp is.
  • 137. © Po-Ning Chen@ece.nctu Chapter 3-137 3.14 DPCM  Final notes on DPCM  Comparing DPCM with PCM in the case of voice signals, the improvement is around 4-11 dB, depending on the prediction order.  The greatest improvement occurs in going from no prediction to first-order prediction, with some additional gain, resulting from increasing the prediction order up to 4 or 5, after which little additional gain is obtained.  For the same sampling rate (8KHz) and signal quality, DPCM may provide a saving of about 8~16 Kbps compared to standard PCM (64 Kpbs).
  • 138. © Po-Ning Chen@ece.nctu Chapter 3-138 Speech Quality (Mean Opinion Scores) Source: IEEE Communications Magazine, September 1997. 2 4 8 16 32 64 Unacceptable Poor Fair Good Excellent Bit Rate (kb/s) FS-1015 MELP 2.4 FS-1016 JDC2 G.723.1 GSM/2 JDC IS54 IS96 GSM G.723.1 G.729 G.728 G.726 G.711 G.727 IS-641 PCM ADPCM 3.14 DPCM IS = Interim Standard GSM = Global System for Mobile Communications JDC = Japanese Digital Cellular FS = Federal Standard MELP = Mixed-Excitation Linear Prediction
  • 139. © Po-Ning Chen@ece.nctu Chapter 3-139 3.15 Adaptive Differential Pulse-Code Modulation  Adaptive prediction is used in DPCM.  Can we also combine adaptive quantization into DPCM to yield a comparably voice quality to PCM with 32 Kbps bit rate? The answer is YES from the previous figure.  32 Kbps: 4 bits for one sample, and 8 KHz sampling rate  64 Kbps: 8 bits for one sample, and 8 KHz sampling rate  So, “adaptive” in ADPCM means being responsive to changing level and spectrum of the input speech signal.
  • 140. © Po-Ning Chen@ece.nctu Chapter 3-140 3.15 Adaptive Quantization  Adaptive quantization refers to a quantizer that operates with a time-varying step size [n].  [n] is adjusted according to the power of input sample m[n].  Power = variance, if m[n] is zero-mean.  In practice, we can only obtain an estimate of E[m2[n]]. ]] [ [ ] [ 2 n m E n    
  • 141. © Po-Ning Chen@ece.nctu Chapter 3-141 3.15 Adaptive Quantization  The estimate of E[m2[n]] can be done in two ways:  Adaptive quantization with forward estimation (AQF)  Estimate based on unquantized samples of the input signals.  Adaptive quantization with backward estimation (AQB)  Estimate based on quantized samples of the input signals.
  • 142. © Po-Ning Chen@ece.nctu Chapter 3-142 3.15 AQF  AQF is in principle a more accurate estimator. However, it requires  an additional buffer to store unquantized samples for the learning period.  explicit transmission of level information to the receiver (the receiver, even without noise, only has the quantized samples).  a processing delay (around 16 ms for speech) due to buffering and other operations for AQF.  The above requirements can be relaxed by using AQB.
  • 143. © Po-Ning Chen@ece.nctu Chapter 3-143 3.15 AQB A possible drawback for a feedback system is its potential unstability. However, stability in this system can be guaranteed if mq[n] is bounded. Quantizer De- quantizer Level estimator Level estimator m[n] mq[n]
  • 144. © Po-Ning Chen@ece.nctu Chapter 3-144 3.15 APF and APB  Likewise, the prediction approach used in ADPCM can be classified into:  Adaptive prediction with forward estimation (APF)  Prediction based on unquantized samples of the input signals.  Adaptive prediction with backward estimation (APB)  Prediction based on quantized samples of the input signals.  The pro and con of APF/APB is the same as AQF/AQB.  APB/AQB are a preferred combination in practical applications.
  • 145. © Po-Ning Chen@ece.nctu Chapter 3-145 3.15 ADPCM Adaptive prediction with backward estimation (APB). Quantizer Encoder for DPCM + + +_ Prediction filter Estimate
  • 146. © Po-Ning Chen@ece.nctu Chapter 3-146 3.16 Computer Experiment: Adaptive Delta Modulation  In this section, the simplest form of ADM with AQB is simulated, namely, ADM with AQB.  Comparison with LDM (i.e., linear DM), where step size is fixed, will also be performed. Figure 3.31 in text is incorrect.
  • 147. © Po-Ning Chen@ece.nctu Chapter 3-147 3.16 Computer Experiment: Adaptive Delta Modulation  In this section, the simplest form of ADM modulation with AQB is simulated, namely, ADM with AQB.  Comparison with LDM (i.e., linear DM) where step size is fixed will also be performed. I fix the error in this slide. z-1 + + 1-bit quantizer z-1 + + +_ Accumulator Accumulator z-1 Level estimator z-1 Level estimator
  • 148. © Po-Ning Chen@ece.nctu Chapter 3-148 3.16 Computer Experiment: Adaptive Delta Modulation                              min min min ] 1 [ if , ] 1 [ if , ] [ ] 1 [ 2 1 1 ] 1 [ ] [ n n n e n e n n q q      1. equals t output tha quantizer bit 1 the is ] [ , iteration at size step the is ] [ where n e n n q Setting:m(t) =10sin 2p fs 100 t æ è ç ö ø ÷,DLDM =1 and Dmin = 1 8
  • 149. © Po-Ning Chen@ece.nctu Chapter 3-149 3.16 Computer Experiment: Adaptive Delta Modulation Observation: ADM can achieve a comparable performance of LDM with a much lower bit rate. See Figure 3.32 in textbook.
  • 150. © Po-Ning Chen@ece.nctu Chapter 3-150 3.17 MPEG Audio Coding Standard  The ADPCM and various voice coding techniques introduced above did not consider the human auditory perception.  In practice, a consideration on human auditory perception can further improve the system performance (from the human standpoint).  The MPEG-1 standard is capable of achieving transparent, “perceptually lossless” compression of stereophonic audio signals at high sampling rate.  A human subjective test shows that a 6-to-1 compression ratio are “perceptually indistinguishable” to human.
  • 151. © Po-Ning Chen@ece.nctu Chapter 3-151 3.17 Characteristics of Human Auditory System  Psychoacoustic characteristic of human auditory system  Critical band  The inner ear will scale the power spectra of incoming signals nonlinearly in the form of limited frequency bands called the critical bands.  Roughly, the inner ear can be modeled as 25 selective overlapping band-pass filters with bandwidth < 100Hz for the lowest audible frequencies, and up to 5kHz for the highest audible frequencies.
  • 152. © Po-Ning Chen@ece.nctu Chapter 3-152 3.17 Characteristics of Human Auditory System  Auditory masking  When a low-(power-)level signal (i.e., the maskee) and a high-(power-)level signal (i.e., the masker) occur simultaneously in the same critical band, and are close to each other in frequency, the low- (power-)level signal will be made inaudible (i.e., masked) by the high-(power-)level signal, if the low-(power-)level one lies below a masking threshold.
  • 153.  Masking threshold is frequency-dependent. © Po-Ning Chen@ece.nctu Chapter 3-153 3.17 Characteristic of Human Auditory System Within a critical band, the quantization noise is inaudible as long as the NMR = SMR - SNR for the pertinent quantizer is negative. Masking threshold Signal level (masker) Critical band Neighboring Critical band Neighboring critical band Quantization noise level Minimum masking threshold at the critical band SMR = signal-to-mask ratio SNR
  • 154. © Po-Ning Chen@ece.nctu Chapter 3-154 3.17 MPEG Audio Coding Standard Frame packing Quantization & coding Analysis filter-bank Psychoacoustic model Bit allocation PCM audio signal Output bit stream
  • 155. © Po-Ning Chen@ece.nctu Chapter 3-155 3.17 MPEG Audio Coding Standard  Analysis filter-bank  Divide the audio signal into a proper number of subbands, which is a compromise design for computational efficiency and perceptual performance.  Psychoacoustic model  Analyze the spectral content of the input audio signal and thereby compute the signal-to-mask ratio (SMR).  Quantization & coding  Decide how to apportion the available number of bits for the quantization of the subband signals.  Frame packing  Assemble the quantized audio samples into a decodable bit stream.
  • 156. © Po-Ning Chen@ece.nctu Chapter 3-156 3.18 Summary and Discussion  Sampling – transform analog waveform to discrete-time continuous wave  Nyquist rate  Quantization – transform discrete-time continuous wave to discrete data.  Human can only detect finite intensity difference.  PAM, PDM and PPM  TDM (Time-Division Multiplexing)  PCM, DM, DPCM, ADPCM  Additional consideration in MPEG audio coding