Sie sind auf Seite 1von 18

"Confidential information -- may not be copied or disclosed without permission".

Section 8

Modulation and Demodulation

PE/TRD/GR/0109 12.02/EN

February, 2000

Modulation and Demodulation

8-1

Objectives

Information physical transmission through the air


"Confidential information -- may not be copied or disclosed without permission".

After completing this lesson, you will be able to:

- Briefly describe GMSK: digital modulation used in GSM - Present how demodulation works through equalization - Describe the channel decoding method

PE/TRD/GR/0109 12.02/EN

February, 2000

Modulation and Demodulation

8-2

Location In Transmission and Reception Chains


Digitizing and source coding Channel coding Source decoding Channel decoding De-interleaving Interleaving Deciphering Ciphering Burst deformatting Burst formatting Demodulation equalization

"Confidential information -- may not be copied or disclosed without permission".

section 6 section 7 section 8 section 10

Modulation

Diversity Transmission

PE/TRD/GR/0109 12.02/EN

February, 2000

Modulation and Demodulation

8-3

Modulation and Demodulation Overview


Ciphering Interleaving Coding Modulation 0
BITS BITS

SPEECH DATA
"Confidential information -- may not be copied or disclosed without permission".

MODULATED SIGNAL

SIGNALING

AIR INTERFACE

SPEECH DATA
BITS SOFT BITS

SIGNALING

Deciphering De-interleaving Decoding


PE/TRD/GR/0109 12.02/EN February, 2000

RECEIVED SIGNAL

Demodulation (Equalization)
8-4

Modulation and Demodulation

GMSK Modulation
Q '1' - 90 + 90 '0'

"Confidential information -- may not be copied or disclosed without permission".

I
relative power (dB)

Bit 0 Bit 1

phase shift + 90 phase shift - 90

Bit b=0
( t) 3 dB

GMSK spectrum
90

MSK GMSK

271 kHz
frequency (MHz)

t
-Tb 0 Tb
8-5

Fc
PE/TRD/GR/0109 12.02/EN February, 2000 Modulation and Demodulation

Digitization and Preprocessing


carrier frequency
analog transposition at Fi

Fi
Fi

sampling at 4xFi & quantization

4xFi

"Confidential information -- may not be copied or disclosed without permission".

Fi
FREQUENCY TRANSPOSE R relative power (dB) 0 - 10 - 20 - 30 - 40 - 50 - 60 frequency (MHz)
Modulation and Demodulation 8-6

ANTI-ALIASING FILTER

A/D CONVERTER

200 kHz

C Il Ic Ir

baseband optimized filtering GMSK modulation spectrum

maximizes

C Il + Ic + Ir+N0

2xFi
F-0.2 F F+0.2

PE/TRD/GR/0109 12.02/EN

February, 2000

Demodulation and Decoding


2 x 57 MAIN CHANNEL SOUNDING DIVERSITY
"Confidential information -- may not be copied or disclosed without permission".

COMBINATION

EQUALIZER (VITERBI)

SOFT BITS PER BURST

D (MRC)

DEMODULATION TA C/I RXLEV RXQUAL DECODING

DECIPHERING

260 BITS

DECODER (VITERBI)

456 BITS

DE-INTERLEAVING

BUFFER

8 bursts

PE/TRD/GR/0109 12.02/EN

February, 2000

Modulation and Demodulation

8-7

Channel Sounding
Tail bit Data Training sequence Data Tail bit

Sent burst
"Confidential information -- may not be copied or disclosed without permission".

PROPAGATION

Received burst
Known at the reception Received Training Sequence

&

ESTIMATED FILTER

PE/TRD/GR/0109 12.02/EN

February, 2000

Modulation and Demodulation

8-8

Demodulation: a Complex Method


possible sent sequence of 57 bits over 257

NO
ESTIMATED FILTER

"Confidential information -- may not be copied or disclosed without permission".

TU

SE D

received sequence

possible received sequence over 257

COMPARISON OF 57 BITS: the estimated sequence is the most likely one, minimizing the least mean square error

needs 257 comparisons of 57 bits!!

PE/TRD/GR/0109 12.02/EN

February, 2000

Modulation and Demodulation

8-9

Sent Sequence Estimation: Viterbi Algorithm


16 e h f t nces o ch eque a e for rtial s pa
"Confidential information -- may not be copied or disclosed without permission".

Adding 0 or 1

Channel filtering
COMPARISON WITH THE RECEIVED SEQUENCE

ESTIMATED FILTER

two possibly received sequences

Choice of the best sequence according to the maximum likelihood criterion


lly a n fi
PE/TRD/GR/0109 12.02/EN

Choice of the best sequence out of 16 according to the maximum likelihood criterion
February, 2000 Modulation and Demodulation 8-10

Demodulation with Equalization: Viterbi Algorithm


Viterbi Equalizer
received samples
"Confidential information -- may not be copied or disclosed without permission".

POSSIBLE SEQUENCES CHANNEL SOUNDING SIGNAL GENERATOR INCREMENT CALCULATOR (metrics) VITERBI ALGORITHM

training sequence

DEMUX
information

soft bits 0XXX 1XXX


PE/TRD/GR/0109 12.02/EN February, 2000 Modulation and Demodulation 8-11

Bit Error Rate Estimation


estimated sent sequence which verifies the maximum likelihood criterion (soft bits levels) difference between estimated and effectively received sequence = NOISE
"Confidential information -- may not be copied or disclosed without permission".

each estimated value has its own likelihood


P
p(r/1) p(r/0)

P(r / 0) S = Log P(r / 1)

1 1XXX

0 0XXX

received sequence

1 114 (S ) P RXQUAL (burst) = 114 k =1 error k


PE/TRD/GR/0109 12.02/EN February, 2000

1 114 1 = 114 k =1 1+e Sk

Bit Error Rate (RXQUAL) involves all the bits likelihoods

Modulation and Demodulation

8-12

Channel Decoding: TCH Full Rate


456 bits from de-interleaving

Class I: 378 bits


"Confidential information -- may not be copied or disclosed without permission".

Class II 78 bits

Convolutional Decoding (r = 1/2)

189 bits 50 3 132 4


Tail Bits

Parity Code

Class Ia 50 bits

Class Ib 132 bits


260 bits = 20 ms of FR speech

Class II 78 bits

PE/TRD/GR/0109 12.02/EN

February, 2000

Modulation and Demodulation

8-13

Viterbi Decoding with Hard Decisions


0 00 1 01 2 11 1/11 1 3 10 4 10 5 01 6 01 7 01 time (bit period)

0000 1000 0100 1100 0010 1010 0110 1110 0001 1001 0101 1101 0011 1011 0111 1111

0/00 0 0/00 1

0/10

1 1/11 2

errors in the demodulated sequence

"Confidential information -- may not be copied or disclosed without permission".

1/01 1/01

path with the minimum cumulated metric

0/00 2

3 state of the encoder cumulative metrics with hard decisions


Modulation and Demodulation 8-14

PE/TRD/GR/0109 12.02/EN

February, 2000

Viterbi Decoding with Soft Decisions


0
+8

time (bit period)

0
+1
"Confidential information -- may not be copied or disclosed without permission".

+7 +12

+5

-1

1
-8

0000 1000

0/00

0/00

12 12

13 1

1/11

21 8

0/10

0100
26 5

X /XX Maximum Cumulative Path Cumulative Path Metric Branch Metric (Partial Metric)
1/11

1100 0010

28 2

PE/TRD/GR/0109 12.02/EN

February, 2000

Modulation and Demodulation

8-15

Exercise
Exercises: Use the Viterbi Trellis Exercise 1: Hard Bits
"Confidential information -- may not be copied or disclosed without permission".

You received the following sequence of 16 hard bits (the left bit is the first received): 1001000010111101. The coding was done with the convolutional codes used for full rate speech. Question: find the 8 bits of the original information. Exercise 2: Soft Bits You received the following sequence of 6 hard bits with their associated soft bits, so in total 24 bits: 1/011 0/001 0/110 1/011 0/011 0/101 The coding was done with the convolutional codes used for full rate speech. Question: find the 3 bits of the original information.

PE/TRD/GR/0109 12.02/EN

February, 2000

Modulation and Demodulation

8-16

Check Your Learning

1- What are the GSM modulation characteristics?


"Confidential information -- may not be copied or disclosed without permission".

2- What is the purpose of channel sounding?

3- How is the signal demodulated?

4- What is the interest of soft decisions?

5- Give the principle of Viterbi Algorithm. When is it used?

PE/TRD/GR/0109 12.02/EN

February, 2000

Modulation and Demodulation

8-17

PE/TRD/GR/0109 12.02/EN
"Confidential information -- may not be copied or disclosed without permission".

February, 2000 Modulation and Demodulation 8-18

Das könnte Ihnen auch gefallen