Академический Документы
Профессиональный Документы
Культура Документы
Course Work
STUDENT NAME STUDENT ID SUPERVISOR SUBMISSION DATE : : : : M.BADURDEEN SHAKEAL 4750820 Dr. ROHAN MUNASINGHE 2012.10.01
LE LE YI
Date: ___________________________________
1 marker
st
2 marker/ moderator
nd
Final mark
Q1.
Q2.
10%
Total Marks
100%
st
_____________________________________________________________________
_____________________________________________________________________
nd
_____________________________________________________________________
_____________________________________________________________________
Declaration of Originality
I Badurdeen Shakeal declare that this thesis is my own work and contains no material which has been accepted for a degree or diploma by the University or any other institution, except by way of background information and duly acknowledged in the thesis, and to the best of the my knowledge and belief no material previously published or written by another person except where due acknowledgement is made in the text of the thesis, nor does the thesis contain any material that infringes copyright. List of reference is given at the end of the assignment report using Coventry University Harvard style referencing. This project is submitted in partial fulfilment of the requirements of the award of Bachelor of Engineering (Hons) in Electrical & Electronic Engineering.
Page - i
Acknowledgment
First and foremost, I would like to thank to our Lecture Dr. Rohan Munasinghe of this course work, Mr. Duminda Wijesinghe for the valuable guidance, advice and supervising. He inspired us greatly to work in this course work. His willingness to motivate us contributed tremendously to our course work. I also would like to thank Mr. Sujeewa Perera the librarian cum academic support executive of Auston Institute of Management Ceylon for helping us with library resources. Besides, I would like to thank the management of Auston Institute for providing us with a good environment and facilities to complete this course work. Also, I would like to take this opportunity to thank to the Coventry University for offering this program, computing course work. It gave us an opportunity to learn about the operation of multilevel digital modulation and forward error correction. Finally, an honorable mention goes to our families and friends for their understandings and supports on us in completing this project. Without helps of the particular that mentioned above, we would face many difficulties while doing this.
Page - ii
Introduction ............................................................................................................. 6
2.1. 2.2. 2.3. Background .................................................................................................................................. 6 Objectives .................................................................................................................................... 6 Scope/limitation of project .......................................................................................................... 6
5.4.1. 5.4.2.
5.4.3. MATLAB simulation code comparison of Bit Error Rate (BER) for coded and uncoded signals. 33 5.5 Detail simulation steps and procedures ..................................................................................... 35 Detail simulation steps of 8-QAM modulation.................................................................. 35
5.5.1.
COVENTRY UNIVERSITY
Page 1
Detail simulation steps of Hamming coding...................................................................... 37 Detail simulation steps of hard decision decoding ............................................................ 40 Detail simulation steps of Bit Error Rate (BER) Comparison. .......................................... 44
6.2 Analysis, discussion and comparison on different simulation results of Hamming coding and decoding................................................................................................................................................. 46 6.3 Theoretical interpretation and Verification................................................................................ 46
COVENTRY UNIVERSITY
Page 2
List of Tables
Table 1 Bit Allocation Table for 8-ary QAM Modulation ........................................................... 24 Table 2 Codeword table ................................................................................................................ 27 Table 3 Decoding Table (Syndrome) ........................................................................................... 29
COVENTRY UNIVERSITY
Page 3
COVENTRY UNIVERSITY
Page 4
1.3 Methodologies
The strategy utilized first of all is the calculating just about almost most exact numbers as well as variables and then finally stepping into MATLAB software for implementation as well as running purposes, where the accuracy of mathematical computed data could possibly be tested. Similarly thing about this course work focuses the building of the Hamming code using basic theory after this portion has been completed. Also finally MATLAB software has been used here for implementing this interrogation.
COVENTRY UNIVERSITY
Page 5
Introduction
2.1. Background
Background of this course work is whenever we come to telecom it is not easier compared to we all thought. As it associated with of procedure going through the senders and also devices. Therefore, there should be ways to handle and also correct whenever transmitting signals are usually incorrect so that you can have got perfect as well as quick communication. Thus, Forward error correction [FEC] may be the great way to perform that kind of scenario and also FEC coding were created not merely to detect yet correct errors in the communication to avoid requirement for retransmission. FEC is actually techniques are often charge in wireless transmission, exactly in which retransmission is strategies tend to be highly unproductive as well as error rate might be large. Consequently this really is gaining popularity through other error correction techniques.
2.2. Objectives
In this course work really aim is actually examine the particular calculations and also results which receive utilizing MATLAB encoding. As well as reading good results expression about the techniques utilized in these systems and getting good results knowledge in hard choice method in hamming programming and also decoding. Consequently simulation and comparison of obtained value of coded and uncoded signals.
While In the first chapter M value is given by the lecturer. So through the use of M value k value can be determine. Then through which have to prepare the particular binary bit assignment table. From then on need to pull the constellation diagram regarding of QAM modulation. Then Utilize the MATLAB software that can simulate the answer. Despite the fact that QAM effectiveness will be high it has many downsides in fact. A very important factor is always that is much more prone minimizing degree of noise is necessary to move the actual signal to various places. Not only must that hen QAM having amplitude aspects one-linearly be maintained.
COVENTRY UNIVERSITY
Page 6
cos(2fct)
Carrier Oscillator
Binary Input D(t) R bps
2-bit serial to parallel converter
+
sin(2fct)
The above mentioned figure 2 shows the actual QAM modulation scheme generally. The particular input can be a flow associated with binary numbers coming to a rate of R bps. This kind of supply will be converted into two separate bit streams. Withinside the diagram, top of the stream is actually ASK modulated over a carrier regarding regularity fc only multiplying the bit stream by the carrier. Therefore, a binary "0" is represented by the absence of the carrier wave
COVENTRY UNIVERSITY
Page 8
and a binary 1 is represented by the presence of the actual carrier wave at a continuous amplitude. This exact identical carrier wave is shifted simply by simply 900 as well as used for ASK associated with the lower binary stream. Both modulated signals are added together and transmitted. The transmitted signal can be expressed as follows:
( )
( )
( )
) ---------Equation 1
If a couple of- level ASK is used, then each of the two streams can be in one of two states and the combined stream could be in one of4 = 2 2 states. That is fundamentally QPSK. If four level ASK is used (i.e. four different amplitude levels), then the combined stream can be in one of 16 = 4 4 states. Systems using 64 and even 256 states have been implemented. The greater the number of states, the higher the data rate that is feasible within a given bandwidth. The higher the number of states, the larger the potential error rate due to noise and attenuation.
y1(t)= d1(t)/2
cos(2fct)
Carrier Oscillator
QAM signal in s(t) R bps
sin(2fct)
d2(t) R/2 bps
y2(t)= d2(t)/2
COVENTRY UNIVERSITY
Page 9
The above figure 2 shows the QAM demodulation scheme in general terms. The input is a stream of QAM signal arriving at a rate of R bps. This stream is converted into two separate bit streams. Both upper and lower part signal go through two separate Low Pass Filters.
Quadrature amplitude modulation is a modulation scheme which has digital and analogue The mathematical description of the new modulated signal
( )
-----------Equation 2
The level parameter for in-phase component and quadrature component are independent of each other for all i. M-ary QAM is a hybrid form of M-ary modulation. M-ary amplitude-shift keying (M-ary ASK) If bi=0 for all i, the modulated signal si(t) of above equation is reduces to
( )
) } --------Equation 3
COVENTRY UNIVERSITY
Page 10
Signal-to-noise ratio is understood to be the power ratio between signal and the background noise. The particular ideas regarding signal-noise ratio and energetic range tend to be closely connected. Powerful variety measures the particular proportion between the strongest un-distorted transmission channel on a route and the bare lowest discernable signal. Which usually for most reasons will be the noise level. SNR actions the actual percentage in among an arbitrary signal and noise. SNR is normally taken up indicate the average signal-to-noise ratio, as it is feasible for instantaneous signal-noise ratio proportions will be significantly different. The idea may be recognized as normalizing the particular noise level to a single (0 dB) and calculating how far the transmission. (R.S., 2004)
) ------Equation 4
Exactly in which P is typical power. Both transmission noise power must be assessed at the very similar and equal points in a system, and also inside the exact identical system bandwidth. If the transmission as well as the noises are usually assessed throughout the exact identical impedance, then the SNR can be obtained by establishing the actual square of the amplitude voltage. (Tocci, 2007) All the received power Pr is in the modulating signal Relationship of Eb/N0 and SNR as follow.
( )-------------Equation 5
( )
COVENTRY UNIVERSITY
Page 11
------------Equation 6
Where L represents the number of amplitude levels in one dimension. We assume that a sequence of log L (k) bits are assigned to an L-ary symbol using a Gray code.
------------Equation 8
(A.B.Carlson, 2001)
Signal power
The average signal power = A2/2
----------------Equation 9
COVENTRY UNIVERSITY
Page 12
Bandwidth requirements
Operating points for coherent quadrature amplitude modulation (QAM) is plotted in Figure Of the modulations shown, QAM is clearly the most bandwidth efficient.
COVENTRY UNIVERSITY
Page 13
COVENTRY UNIVERSITY
Page 14
Two main principle type of FEC codes are Block code Convolutional code
Block code
Error-correcting codes are employed to dependably transmit digital information over variable connections and communication channel subject to channel noise. Each time transmitter needs to transfer a possibly very long data stream using a block code, the particular transmitter breaks or cracks the actual stream upwards in to piece of a few fixes size. Every such piece is called message and also the procedure given by the actual block code encodes each massage individually right in to a codeword, also referred to as the block poor obstruct rules. The particular transmitter next transfers just about almost most blocks for the recipient, who is able to subsequently use some decoding mechanism to recover the original communications from the probably damaged received blocks. The particular performance and also success of the total transmitting depends upon the parameters of the channel and the block code. (A.B.Carlson, 2001)
Convolution Code
Convolutional codes are used thoroughly in various applications to have trustworthy data transmission, such as digital electronic video, radio, microwave mobile communication, and also satellite communication. These types of codes in many cases are implemented in concatenation using a hard-decision code, particularly Reed Solomon. Just before turbo codes, this kind of improvements had been probably one of essentially by far the best efficient, returning best towards the Claude Shannon limit. (Sklar, 2001)
Add redundant bits to a massage so that error can be detected and corrected Rate of code is a measure of redundancy = ratio of massage bits to total bits
COVENTRY UNIVERSITY
Page 15
Maybe effected on fixed length data blocks (block codes) or on a continuous data stream (convolutional codes)
COVENTRY UNIVERSITY
Page 16
3-bit binary words arranged in 3-dimensional space on a cube. Minimum Hamming distance between words is 1. Words 000 and 111 have distance 3 and represent EEC. Code rate is 1/3, single errors can be corrected. Example:
COVENTRY UNIVERSITY
Page 17
The minimal Hamming distance between any two correct codeword is 3, and received words can be correctly decoded if they are at distance at most one from the codeword that was transmitted by the sender. Hamming Distance = Minimum Weight
Parity Checks
We can add a parity bit to a word to ensure that it has a defined parity 1110 has odd parity (odd number of 1s). A single error will then disturb the parity and thus be detected, this is the basis for error correction coding. By introducing parity bits applied across subsets of the information bit positions it is possible to both detect and correct errors the basis of error correction codes (ECCs). The parity bits are sometimes mixed in with the information bits rather than attached at the end of the code word.
Block Codes
A block code is a code that operates upon fixed-length blocks of information bits. In (n,k) block codes each sequence of k information bits is mapped into a sequence of n(n >k). In order to achieve high error correction and detection capability the code minimum distance and code rate is should be large. Systematic block code is the block code which has the following structure where: (A.B.Carlson, 2001) First k elements are the same as the message bits, c=n-k bits are the check bits
COVENTRY UNIVERSITY
Page 18
SNR
The actual SNR benefit indicates the number of energy required to obtain a specific BER price. Typically a bigger SNR value results in lower BER. Programming obtain will be dened because the quantity of enhancement as well as level of superior throughout SNR, whenever a particular programming structure is employed. The normal way of discovering code acquire is to plot the actual BER versus SNR for equally numbered and united nations touch pad program, (Tocci, 2007)
----------Equation 10
( [(
) ])
------------Equation 11
COVENTRY UNIVERSITY
Page 19
Minimum Distance
The actual minimum distance provides all of us all a security program against noise and also attenuations. This particular mechanism the minimal range in among code phrases can be utilized for problem diagnosis and/or error a static correction. The actual fail-safe system regarding problem diagnosis, and or a static correction capacity for a FEC are determined by just about the minimum distance of the FEC. This might be worked out in two methods can be that we can help to eliminate the number of error corrections and or raise the number of mistake detections or even the other way circular. This can be the hamming distance. The hamming distance will be acquired by the bare lowest length between of two codewords. (R.S., 2004)
---------Equation 13
Coding gain
The coding gain defined as reduction in Eb/No(dB) to achieve a specific BER of and error correcting coded system compared to encoded system using the same modulation
---------------Equation 14
COVENTRY UNIVERSITY
Page 20
COVENTRY UNIVERSITY
Page 21
B Channel
Product Modulator
fb/3 fb/3
Sin wct
fb
Q I C
Reference Oscillator
Linear Summer
8-QAM Output
fb/3
+900
A Channel
PAM
Product Modulator
COVENTRY UNIVERSITY
Page 22
Calculations
Value of M=8, thus this is 8-ary QAM
(
( )
) ------------Equation 16
In line with this QAM there are 8 signals to be allocate. Thus here 2 two different amplitudes and 4 different phases has been assigned. Amplitude and phase allocation 1. Amplitude A1 = 1.5V, 2. Amplitude A2 = 3.0V Phase allocation 1. Phase 1 = 00, 2. Phase 1 = 900, 3. Phase 1 = 1800, 4. Phase 1 = 2700
COVENTRY UNIVERSITY
Page 23
011
010
101
110
111
Figure 8 Constellation Diagram for selected 8-ary QAM Modulation Symbol rate will be 1/3 of bitrate.
COVENTRY UNIVERSITY
Page 24
4.3 Design selection / criteria for (n, k) hamming coding and decoding
Value for m provided is 8
) -----------Equation 17
So value of n
Value of k
So here there are 4 data bits has been added with 3 parity bits to build a 7 bit codeword. So there are 16 combination can be used for this 4 bit parity matrix. Those are 000, 001, 010, 011, 100, 101, 110, and 111. Allocated Parity Equations
COVENTRY UNIVERSITY
Page 25
Generator Matrix
[ ]
][
] -------------Equation 19
Codeword Calculation
For data sequence 0000 [ ][ ] [ ] ------Equation 20
COVENTRY UNIVERSITY
Page 26
Similarly codeword table is generated by possible codeword Codeword Table No. 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 M1 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 M2 0 0 0 0 1 1 1 1 0 0 0 0 1 1 1 1 M3 0 0 1 1 0 0 1 1 0 0 1 1 0 0 1 1 M4 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 P1 0 0 1 1 1 1 0 0 1 1 0 0 0 0 1 1 P2 0 1 0 1 1 0 1 0 1 0 1 0 0 1 0 1 P3 0 1 1 0 0 1 1 0 1 1 0 1 1 0 0 1 Code weigh 0 3 3 4 3 4 4 3 4 4 3 4 3 4 4 7
COVENTRY UNIVERSITY
Page 27
Syndrome
Syndrome for e =0000000
Syndrome
] [ ]
[ ] -----------Equation 24
] [ ]
[ ]
] [ ]
[ ]
COVENTRY UNIVERSITY
Page 28
Similarly decoding table is generated by possible syndromes Decoding Table Error Pattern 0000000 1000000 0100000 0010000 0001000 0000100 0000010 0000001 Syndrome 000 111 110 101 011 100 010 001
Illustration of decoding Massage is 1111, transmitted codeword is 1111111 and received codeword is 1011111 So e = 1011111 and s = 110 Correction is 1111111 and decoded massage is 1111.
COVENTRY UNIVERSITY
Page 29
COVENTRY UNIVERSITY
Page 30
text(5.3,5.2,'\bf101'); %101 text(6.3,5.2,'\bf111'); %111 text(7.3,5.2,'\bf110'); %110 grid on; subplot(2,1,1); plot(time,Digital_signal,'LineWidth',3); title('Digital Input Signal'); xlabel('time'); ylabel('Amplitude'); axis([0 time(end) 0 2]); grid on; text(0.3,1.3,'\bf001'); %001 text(1.3,1.3,'\bf011'); %011 text(2.3,1.3,'\bf010'); %010 text(3.3,1.3,'\bf000'); %000 text(4.3,1.3,'\bf100'); %100 text(5.3,1.3,'\bf101'); %101 text(6.3,1.3,'\bf111'); %111 text(7.3,1.3,'\bf110'); %110
COVENTRY UNIVERSITY
Page 31
COVENTRY UNIVERSITY
Page 32
5.4.3. MATLAB simulation code comparison of Bit Error Rate (BER) for coded and uncoded signals.
% Script for computing BER with Hamming (7,4) code and maximal % likelihood hard decision decoding clear N = 10^6 ;% number of bits Eb_N0_dB = [0:1:10]; % multiple Eb/N0 values Ec_N0_dB = Eb_N0_dB - 10*log10(7/4); h = [ 1 1 1 ; 1 1 0; 1 0 1; 0 1 1]; ht = [h ;eye(3)]; g = [eye(4) h]; synRef = [ 5 7 6 3 ]; bitIdx = [ 7 7 4 7 1 3 2].'; for yy = 1:length(Eb_N0_dB) % Transmitter ip = rand(1,N)>0.5; % generating 0,1 with equal probability % Hamming coding (7,4) ipM = reshape(ip,4,N/4).'; ipC = mod(ipM*g,2); cip = reshape(ipC.',1,N/4*7); % Modulation s = 2*cip-1; % BPSK modulation 0 -> -1; 1 -> 0 % Channel - AWGN n = 1/sqrt(2)*[randn(size(cip)) + j*randn(size(cip))]; % white gaussian noise, 0dB variance % Noise addition y = s + 10^(-Ec_N0_dB(yy)/20)*n; % additive white gaussian noise % Receiver cipHard = real(y)>0; % hard decision % Hamming decoder cipHardM = reshape(cipHard,7,N/4).'; syndrome = mod(cipHardM*ht,2); % find the syndrome syndromeDec = sum(syndrome.*kron(ones(N/4,1),[4 2 1]),2); % converting the three bit syndrom to decimal syndromeDec(find(syndromeDec==0)) = 1; % to prevent simulation crash, assigning no error bits to parity bitCorrIdx = bitIdx(syndromeDec); % find the bits to correct bitCorrIdx = bitCorrIdx + [0:N/4-1].'*7; % finding the index in the array cipHard(bitCorrIdx) = ~cipHard(bitCorrIdx); % correcting bits idx = kron(ones(1,N/4),[1:4]) + kron([0:N/4-1]*7,ones(1,4)); % index of data bits ipHat = cipHard(idx); % selecting data bits % counting the errors nErr(yy) = size(find([ip- ipHat]),2);
COVENTRY UNIVERSITY
Page 33
end
theoryBer = 0.5*erfc(sqrt(10.^(Eb_N0_dB/10))); % theoretical ber uncoded AWGN simBer = nErr/N; close all figure semilogy(Eb_N0_dB,theoryBer,'bd-','LineWidth',2); hold on semilogy(Eb_N0_dB,simBer,'ms-','LineWidth',2); axis([0 10 10^-5 0.5]) grid on legend('theory - uncoded', 'simulation - Hamming 7,4 (hard)'); xlabel('Eb/No, dB'); ylabel('Bit Error Rate'); title('BER for BPSK in AWGN with Hamming (7,4) code');
COVENTRY UNIVERSITY
Page 34
5.5 Detail simulation steps and procedures 5.5.1. Detail simulation steps of 8-QAM modulation.
Result of M-QAM digital modulation obtained by MATLAB simulations
Figure 9 Programming code in MATLAB simulation software for 8-QAM Digital Modulation for the output of the signal together with related input binary signal
Figure 10 Result shown in MATLAB simulation software for 8-QAM Digital Modulation for the output of the signal together with related input binary signal
COVENTRY UNIVERSITY STUDENT ID: 4750820 Page 35
MATLAB simulation result. This figure 11 shows the output amplitude and phase combinations related to the input Signal 001011010000100101111110
Figure 11 Result of MATLAB simulation show the output of the signal together with related input binary signal
COVENTRY UNIVERSITY
Page 36
Figure 12 Programming code in MATLAB simulation software for (7, 4) hamming coding
Figure 13 Result shown in MATLAB simulation software for (7, 4) hamming coding
COVENTRY UNIVERSITY
Page 37
k=
G=
1 0 0 0
0 1 0 0
0 0 1 0
0 0 0 1
1 1 1 0
1 1 0 1
1 0 1 1
H=
1 1 1
1 1 0
1 0 1
0 1 1
1 0 0
0 1 0
0 0 1
COVENTRY UNIVERSITY
Page 38
msg =
code =
COVENTRY UNIVERSITY
Page 39
Figure 14 Programming code in MATLAB simulation software for (7, 4) hamming codes hard decision decoding
Figure 15 Result Shown in MATLAB simulation software for (7, 4) Hard Decision decoding.
COVENTRY UNIVERSITY
Page 40
Result Obtain from MATLAB Simulation Software for hard decision decoding. n=
k=
G=
1 0 0 0
0 1 0 0
0 0 1 0
0 0 0 1
1 1 1 0
1 1 0 1
1 0 1 1
COVENTRY UNIVERSITY
Page 41
H=
1 1 1
1 1 0
1 0 1
0 1 1
1 0 0
0 1 0
0 0 1
msg =
code =
recd =
COVENTRY UNIVERSITY
Page 42
syndrome =
correctedcode =
msg_decoded =
COVENTRY UNIVERSITY
Page 43
Figure 16 MATLAB coding in MATLAB simulation software for comparison of Bit Error Rate (BER) for coded and uncoded signals
Figure 17 Result Show in MATLAB simulation software for comparison of Bit Error Rate (BER) for coded and uncoded signals.
COVENTRY UNIVERSITY
Page 44
Graph for comparison of Bit Error Rate (BER) for coded and uncoded signals.
Figure 18 Result on MATLAB for Selected codingon results 6. Critical Analysis /Discussion andhamming comparison In above (figure 18) the blue color curve shows the uncoded bit error rate and purple color curve show the bit error rate for selected Hamming code.
COVENTRY UNIVERSITY
Page 45
6.2Analysis, discussion and comparison on different simulation results of Hamming coding and decoding
According to the allocation of m value the hamming code is coming deferent. Here we allocate 3 for m value. We can see here that according to the allocation of parity equation the hamming code simulation is coming different and results are obtain also different. As well as consistent with parity equation the parity check matrix and generator matrix is changing. And also the result of MATLAB simulation is changing. Also we can see here when we changing the parity equation the coded BER (Bit Error Rate) also altering habitually.
COVENTRY UNIVERSITY
Page 46
7. Conclusions
We will go over the particular computer simulation results. The actual hamming code is a seo'ed bitwise FEC for that Gaussian channel. Numerous transmission schemes include broke errors exactly in which they will happen really withinside surrounding bits. The actual channel inbuilt dynamics at times is employed to correct short burst problems. The channel interleaves attempts to set aside burst open errors arbitrarily within a obstruct of data where they may be remedied by way of a appropriate haphazard FEC at the shower radios finish, for instance Hamming code rule. In this training we view such a situation. The key portion is that the calculation of BER exactly in which this exhibits people the mistake rate from particular Eb/No. wherever this demonstrates a great uncoded program provides little error rate at commence where Eb/no tend to be small. However, if the data movements away a sizable power must keep up with the problem rate do i think the particular numbered program.
More than I'm able to point out which this QAM modulation is very important since it could be followed in to numerous engineering with the present. As an example, when we all work with a cable system the actual slandered of QAM modulation, its extensive for signal digesting. Here we have examined the actual performance regarding 8-QAM modulation. Here we can easily transmit more data rate actually. To ensure that we could view the QAM passage getting much far greater overall efficiency than PSK and have transitions because when using dull program rule methods this can possess a lot more performances. In this syllabus we understood how the QAM is a combination of PSK and ASK modulations. Anyhow the QAM could be exact identical in order to be able for you to help PSK in the event the electronic digital camera information wasnt possessing 2 service providers. The actual acting signal can be referred to in array form with creator matrix as well as parity check matrix. We need to calculate syndromes with regard to problem examining. In fact, when a legitimate codeword will be grow from the examine array the particular symptoms comes zero. Each time a codeword multiply along together using examine enclosure and also arriving nonzero affliction this means there is a error. All solitary touch mistakes could be remedied and all two-bit mistakes may be recognized.
COVENTRY UNIVERSITY
Page 47
The main advantage of forward error correction coding can it be needs a feed back. Yet its bad for multicast. In any case that's appropriate only for a few programs. This kind of FEC has a proven way tranny and avoid multicast problems. Anyway its computationally pricey as well as over-transmission
COVENTRY UNIVERSITY
Page 48
References
A.B.Carlson, 2001. Communication System, an Introduction to signals and nise in electrical communication.. 4th ed. s.l.:Mc Graw-Hill. Anon., 2009. Radio-Electronics.Com. [Online] Available at: http://www.radio-electronics.com/info/rf-technology-design/pm-phasemodulation/8qam-16qam-32qam-64qam-128qam-256qam.php [Accessed 25 09 2012]. R.S., D., 2004. In: Digital Transmission Systems. s.l.:s.n. Sklar, B., 2001. Digital Communications, Fundamentals of Applications. 2nd ed. s.l.:Pearson Education. Tocci, 2007. In: 1. Edition, ed. Digital System. s.l.:Prentice Hall of India, p. 80.
COVENTRY UNIVERSITY
Page 49