1strev main

Upload: vijay-sagar

Post on 02-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/27/2019 1strev Main

    1/23

    SEMIANALYTIC BER FOR PSK

  • 7/27/2019 1strev Main

    2/23

    ABSTRACT

    The most commonly used method for valuating the BERof a Digital Communication system is the Semi-analytic biterror rate (BER) estimation. The main utility of the method isthe significant time savings in computation relative to MonteCarlo simulation. Despite this advantage, no known reference

    defines the procedure for computing exact BER for M-aryphase shift keying (PSK) with ISI and AWGN using the semi-analytic method. This project defines an efficient procedure forcomputing exact semi-analytic BER for modulation formatswith circular constellations when the noise component of the

    decision variable has a circularly symmetric Gaussiandistribution. The technique is demonstrated for 8PSK over theDigital Audio Broadcasting-Satellite-Second Generation(DVB-S2) channel. The project is carried out in MATLABsimulation.

  • 7/27/2019 1strev Main

    3/23

    BLOCK DIAGRAM

    Modulator Output

    Multiplexer

    Traveling Wave

    Tube Amplifier

    Input

    Multiplexer

    Demodulator

    Adder

    Noise

  • 7/27/2019 1strev Main

    4/23

    Existing System

    The bit error rate (BER) is computed using the

    Monte Carlo (MC) simulation (Bit Error Counting). It

    is shown that if we wish to have reliable results with

    good precision, the total number of transmitted datamust be conversely proportional to the product of the

    true BER by the relative error of estimate.

    Consequently, computing time is reduced drastically.

    Some theoretical results are also given to prove theconvergence of this new method in the sense of mean

    square error (MSE) criterion.

  • 7/27/2019 1strev Main

    5/23

    Disadvantages

    Long Computation time

    Performance cannot be calculated Analytically

    Requires the transmitted data to be conversely

    proportional to true BER computed usingrelative error of estimate

  • 7/27/2019 1strev Main

    6/23

    Proposed System

    Monte Carlo methods are often used when

    simulating physical and mathematical systems.

    Because of their reliance on repeated

    computation and random or pseudo-random

    numbers, Monte Carlo methods are mostsuited to calculation by a computer. Monte

    Carlo methods tend to be used when it is

    unfeasible or impossible to compute an exactresult with a deterministic algorithm.

  • 7/27/2019 1strev Main

    7/23

    MONTE CARLO SIMULATION

    Monte Carlo methods are a class of computational algorithms that rely on

    repeated random sampling to compute their results.

    Monte Carlo methods are often used in simulating physical and

    mathematical systems. Because of their reliance on repeated computation

    of random or pseudo-random numbers, these methods are most suited to

    calculation by a computer and tend to be used when it is infeasible orimpossible to compute an exact result with a deterministic algorithm

    However, these approaches tend to follow a particular pattern:

    Define a domain of possible inputs.

    Generate inputs randomly from the domain using a certain specified

    probability distribution. Perform a deterministic computation using the inputs.

    Aggregate the results of the individual computations into the final result.

  • 7/27/2019 1strev Main

    8/23

    Advantages of MONTE CARLO

    Often the only type of model possible for complex systems

    Analytical models frequently infeasible

    Process of building simulation can clarify understanding of real system

    Sometimes more useful than actual application of final simulation

    Allows for sensitivity analysis and optimization of real system without need

    to operate real system Can maintain better control over experimental conditions than real

    system

    Time compression/expansion: Can evaluate system on slower or fastertime scale than real system

  • 7/27/2019 1strev Main

    9/23

    Disadvantages of MONTE

    CARLO May be very expensive and time consuming to build

    simulation

    Easy to misuse simulationby stretching it beyond thelimits of credibility Problem especially apparent when using commercial simulation

    packages due to ease of use and lack of familiarity withunderlying assumptions and restrictions

    Slick graphics, animation, tables, etc. may tempt user to assignunwarranted credibility to output

    Monte Carlo simulation usually requires several(perhaps many) runs at given input values Contrast: analytical solution provides exact values

  • 7/27/2019 1strev Main

    10/23

    WHEN TO USE THE

    SEMIANALYTIC TECHNIQUE The semi analytic technique works well for certain types of communication

    systems, but not for others. The semi analytic technique is applicable if asystem has all of these characteristics:

    Any effects of multi path fading, quantization, and amplifier nonlinearitiesmust precede the effects of noise in the actual channel being modeled.

    The receiver is perfectly synchronized with the carrier, and timing jitter is

    negligible. Because phase noise and timing jitter are slow processes, theyreduce the applicability of the semi analytic technique to a communicationsystem.

    The noiseless simulation has no errors in the received signal constellation.Distortions from sources other than noise should be mild enough to keepeach signal point in its correct decision region. If this is not the case, thenthe calculated BER will be too low. For instance, if the modeled system has

    a phase rotation that places the received signal points outside their properdecision regions, then the semianalytic technique is not suitable to predictsystem performance.

  • 7/27/2019 1strev Main

    11/23

    PROCEDURE FOR THE

    SEMIANALYTIC TECHNIQUE The procedure below describes how you would typically

    implement the semi analytic technique using the semianalytic function:

    Generate a message signal containing at least ML

    symbols, where M is the alphabet size of the modulationand L is the length of the impulse response of thechannel, in symbols.

    A common approach is to start with an augmentedbinary pseudo noise (PN) sequence of total length

    (log2M)ML. An augmented PN sequence is a PNsequence with an extra zero appended, which makes thedistribution of ones and zeros equal.

  • 7/27/2019 1strev Main

    12/23

    contd

    Modulate a carrier with the message signal using base bandmodulation. Supported modulation types are listed on the referencepage for semi analytic. Shape the resultant signal with rectangularpulse shaping, using the oversampling factor that you will later useto filter the modulated signal. Store the result of this step as txsig forlater use.

    Filter the modulated signal with a transmit filter. This filter is often asquare-root raised cosine filter, but you can also use a Butterworth,Bessel, Chebyshev type 1 or 2, elliptic, or more general FIR or IIRfilter. If you use a square-root raised cosine filter, use it on the non-oversampled modulated signal and specify the oversampling factorin the filtering function. If you use another filter type, you can apply it

    to the rectangular pulse shaped signal.

  • 7/27/2019 1strev Main

    13/23

    .contd

    Run the filtered signal through a noiseless channel. This channelcan include multipath fading effects, phase shifts, amplifiernonlinearities, quantization, and additional filtering, but it must notinclude noise. Store the result of this step as rxsig for later use.

    Invoke the semi analytic function using the txsig and rxsig data fromearlier steps. Specify a receive filter as a pair of input arguments,

    unless you want to use the function's default filter. The functionfilters rxsig and then determines the error probability of eachreceived signal point by analytically applying the Gaussian noisedistribution to each point. The function averages the errorprobabilities over the entire received signal to determine the overallerror probability. If the error probability calculated in this way is a

    symbol error probability, then the function converts it to a bit errorrate, typically by assuming Gray coding. The function returns the biterror rate (or, in the case of DQPSK modulation, an upper bound onthe bit error rate).

  • 7/27/2019 1strev Main

    14/23

    PHASE-SHIFT KEYING

    Phase-shift keying (PSK) is a digital modulation scheme thatconveys data by changing, or modulating, the phase of a referencesignal (the carrier wave).

    Any digital modulation scheme uses a finite number of distinctsignals to represent digital data. PSK uses a finite number ofphases, each assigned a unique pattern of binary bits. Usually, each

    phase encodes an equal number of bits. Each pattern of bits formsthe symbol that is represented by the particular phase.

    The demodulator, which is designed specifically for the symbol-setused by the modulator, determines the phase of the received signaland maps it back to the symbol it represents, thus recovering theoriginal data. This requires the receiver to be able to compare the

    phase of the received signal to a reference signal such a systemis termed coherent (and referred to as CPSK).

  • 7/27/2019 1strev Main

    15/23

    CONSTELLATION DIAGRAM

    A constellation diagram is a representation of asignal modulated by a digital modulation schemesuch as quadrature amplitude modulation orphase-shift keying. It displays the signal as a

    two-dimensional scatter diagram in the complexplane at symbol sampling instants.

    In a more abstract sense, it represents thepossible symbols that may be selected by agiven modulation scheme as points in thecomplex plane. Measured constellationdiagrams can be used to recognize the type ofinterference and distortion in a signal.

  • 7/27/2019 1strev Main

    16/23

    PSK CONSTELLATION WITH ISI

    AND AWGN

  • 7/27/2019 1strev Main

    17/23

    MODULE SEPERATION

    Module 1: Psk Constellation with ISI and

    Awgn

    Module 2: Bit Error Rate Calculation

    Module 3: Application Example

  • 7/27/2019 1strev Main

    18/23

    MODULE DESCRIPTION

    Module 1:

    The M signal waveforms for ideal M-ary PSK are represented As sm(t) = g(t)cos(ct

    + m). When distortions due to channel effects or modem imperfections are present.

    The received decision variables will differ from the M ideal points, and their locations

    will be data dependent due to ISI. In this context, ISI will refer to the effects of both

    linear and non-linear time invariant distortions with memory.

    Assuming equiprobable symbols, then in order to completely characterize the ISI of a

    channel with L symbol periods of memory, it is sufficient to consider all possible

    sequences of L symbols.

    A maximal length pseudorandom ML symbol sequence will satisfy this property. ForM=2, linear feedback shift registers can be used to generate maximal length

    pseudorandom bit sequences.

  • 7/27/2019 1strev Main

    19/23

    FUTURE ENHANCEMENT

    In a similar way, the technique can also be

    extended to frequency non-selective

    slowly fading channels

  • 7/27/2019 1strev Main

    20/23

    Advantages The probability distributions within the model can be easily

    and flexibly used, without the need to approximate them

    Correlations and other relations and dependencies (such as 'if'statements) can be modeled without difficulty

    The level of mathematics required is quite basic

    Commercial Monte Carlo simulation packages can automatethe tasks involved in simulation

    The behavior of and changes to the model can be investigatedwith great ease and speed.

  • 7/27/2019 1strev Main

    21/23

    APPLICATIONS

    The technique is demonstrated for 8PSK

    over the Digital Video Broadcasting-

    Satellite-Second Generation (DVB-S2)

    channel

  • 7/27/2019 1strev Main

    22/23

    DOMAIN-COMMUNICATION

    Wireless communication is the transfer of information

    over a distance without the use of electrical conductors or

    "wires". The distances involved may be short (a few meters as

    in television remote control) or long (thousands or millions ofkilometers for radio communications). When the context is

    clear, the term is often shortened to "wireless". Wireless

    communication is generally considered to be a branch of

    telecommunications.

  • 7/27/2019 1strev Main

    23/23

    MATLAB SIMULATION

    -2 -1.5 -1 -0.5 0 0.5 1 1.5 2-2

    -1.5

    -1

    -0.5

    0

    0.5

    1

    1.5

    2