Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

Mahavir Polytechnic IF6I-WMN-UNIT 4

Mahavir Polytechnic, Nashik


Department of Information Technology
Year: TY Subject: WMN (22622)

UNIT 4: WLL Signal encoding techniques and Spread spectrum modulation Marks: 10
Course Outcome 4: Interpret the components of WLL Applications.

Syllabus:
4.1 WLL architecture, Wireless local Loop (WLL) technologies
4.2 WLL types: FWT and WT with mobility, WLL Applications.
4.3 Concept of LEC networks
4.4 Line coding techniques.
4.5 Amplitude shift keying, Binary phase shift keying;
• PCM features; DPCM features; DM: features
4.6 Types of spread spectrum DSSS, FHSS

4.1 WLL architecture, Wireless local Loop (WLL) technologies

• WLL stands for wireless local loop. Microwave wireless links can be used to create a Wireless Local
loop.
• Local Loop is a network that resides between the central office (CO) and the individual
• homes and business in close proximity to the central office (CO)
• In most developed countries, copper or optical fiber cable already has been installed to residence and
business.
• One more advantage of WLL is that we have to pay only once for that wireless equipment, after there is
no additional costs involved.
• System WLL is based on Cellular, satellite, microcellular.
• The WLL can greatly improve the telecommunication facilities and services in an inexpensive way.

Dept. Of Information Technology Page 1


Mahavir Polytechnic IF6I-WMN-UNIT 4

WLL Configuration:

WLL Architecture:

WLL architecture consists of:


1. PSTN network
2. Switch
3. WANU
4. WASU

Dept. Of Information Technology Page 2


Mahavir Polytechnic IF6I-WMN-UNIT 4

1. PSTN network: It is public switched telephone network. It is the nationwide telephone network
2. Switch: It is the PSTN switch through which the PSTN connection is carried till the BTS. This connection is
wireline most of the times.
3. WANU(Wireless Access Network Unit): It consists of
• BTS (base transceiver station)
• RPCU (the radio controller)
• AM (access manager)
• HLR (Home Location Register)
4. WASU(Wireless Access Subscriber Unit):
It provides an air interface that is wireless connectivity to the network.

WLL ( Wireless Local Loop) Importance:

• The importance of WLL is that only once the charges have to be paid for wireless equipment, after that
there is no additional costs involved.
• WLL can greatly improve telecommunication facility and services in an expensive way.
It provides
• High bandwidth
• Faster arrangement.
• Lower arrangement costs
• Lower network maintenance, management and operating cost

Advantages of WLL:

1. High bandwidth is available


2. Installation is simple
3. Faster arrangement.
4. Lower arrangement costs
5. Lower network maintenance, management and operating cost

Types of WLL:

There are two types of WLL


1 LMDS (Local Multipoint Distribution Services)

Dept. Of Information Technology Page 3


Mahavir Polytechnic IF6I-WMN-UNIT 4

Applications:
LMDS provides services- High speed internet access, Real time multimedia file transfer, remote access to local
area network, interactive video , video on demand , video conference , telephone services
2 MMDS (Multichannel Multipoint Distribution Services)
Applications:
Can transmit videos, voice or data signals at rate 1.5 to 2 Mbps downstream and 320 Kpbs to upstream

LMDS (Local Multipoint Distribution Services)

It consists of:

1. NOC (Network Operation Center)


2. BS (Base Station
3. CPE (Customer Premises Equipment)

NOC (Network Operation Center):

• It performs network management functions.


• It is connected to various different networks such as internet, ATM etc.
• This interconnection is done using fiber optic cables.

BS (Base Station):

• It is typically located on high point and covers an area known as LMDS cell.
Dept. Of Information Technology Page 4
Mahavir Polytechnic IF6I-WMN-UNIT 4

• Base station allows full duplex communication.


• Base station sends and receives signal from CPE which is fixed location.

CPE (Customer Premises equipment):

• It consists of the antenna mounted outdoor and indoor subscriber unit


• It consists of functionalities viz. modulation, demodulation, RF up conversion and RF down- conversion
etc.
• CPEs utilize multiple access schemes viz. TDMA, FDMA and CDMA for communication with BSs in
the LMDS network.

Features:

1. Operating frequency: 28 GHz or 38 GHz2.


2. Supports cellular principle
3. Cell size or range of BS is 5 miles.

Advantages

1. LMDS systems can be easily deployed.


2. The systems are cost effective.
3. The system data rate is very high.
4. According to customer demands, the architecture scalable.

Disadvantage:

1. It needs a large number of base stations because of short range of operation from the base stations.

MMDS (Multichannel Multipoint Distribution Services)

 A broadband wireless point-to-multipoint specification utilizing UHF (Ultra High Frequency)


communications
 It makes use of 2.1-2.7 GHz radio band for operation. It is also known as wireless cable
 It is used for general purpose broadband networking.

Dept. Of Information Technology Page 5


Mahavir Polytechnic IF6I-WMN-UNIT 4

 It actually invented to replace cable television technology However it also has applications in telephone,
Fax, data communication etc.
 It consists of Hub equipment and customer side equipment.
 Hub consists of antenna tower, RF equipment, Modem, Router for connection with internet and network
management system (i.e. NMS).
 Customer side equipment includes antenna, wireless modem, Ethernet switch, PCs etc.
 Nowadays MMDS is looked upon to provide high internet access, telephone/fax and TV together.

Architecture:

4.3 Local exchange carrier (LEC)

 A local exchange carrier (LEC) is the term used for the local telephone system used in the U.S.A
 The largest company providing LEC services is Bell labs.
 It provides local telephone and telecommunication services to businesses and individuals. "Local
exchange" refers to a central office (CO), and "carrier" refers to a company that "carries" telephone and
data.

Dept. Of Information Technology Page 6


Mahavir Polytechnic IF6I-WMN-UNIT 4

 Local Exchange Carrier, is a telephone company that is responsible for managing calls within a specific
territory, such as a city or county.

LEC Network:

 Telephone lines from homes terminate at these exchanges. These local exchange is connected to other
local exchanges within the local access and transport area (LATA)
 LEC owns the local loop cabling between its central offices and its subscribers' premises. An LEC
manages all calls, equipment, and customer queries within its respective LATA.
 An LEC may own its own equipment or may lease the equipment of a larger telecommunications
company, but is responsible for its own customers and equipment in either circumstance.

4.4 Line Coding Techniques

 Data as well as signals that represent data can either be digital or analog.
 Line coding is the process of converting digital data to digital signals. By this technique we converts a
sequence of bits to a digital signal. At the sender side digital data are encoded into a digital signal and at
the receiver side the digital data are recreated by decoding the digital signal.

Types of Line codes:


1. Unipolar (eg. Unipolar RZ, Unipolar NRZ).
2. Polar (eg. Polar RZ, Polar NRZ)
Dept. Of Information Technology Page 7
Mahavir Polytechnic IF6I-WMN-UNIT 4

3. Splitphase Manchester
4. Bipolar NRZ / AMI(Alternative Mark inversion) and Pseudo trinary

Unipolar NRZ:
In this type of unipolar signaling, a High in data is represented by a positive pulse called as Mark, which
has a duration T0 equal to the symbol bit duration. A Low in data input has no pulse.

Advantages
• It is simple.
• A lesser bandwidth is required.
Disadvantages
• No error correction done.
• Presence of low frequency components may cause the signal droop.
• No clock is present.
• Loss of synchronization is likely to occur (especially for long strings of 1s and 0s).

Dept. Of Information Technology Page 8


Mahavir Polytechnic IF6I-WMN-UNIT 4

Unipolar NRZ:
In this type of unipolar signaling, a High in data, though represented by a Mark pulse, its duration T0 is
less than the symbol bit duration. Half of the bit duration remains high but it immediately returns to zero
and shows the absence of pulse during the remaining half of the bit duration

Advantages

1. It is simple.
2. The spectral line present at the symbol rate can be used as a clock.
Disadvantages
1. No error correction.
2. Occupies twice the bandwidth as unipolar NRZ.
3. The signal droop is caused at the places where signal is non-zero at 0 Hz

Polar NRZ
In this type of Polar signaling, a High in data is represented by a positive pulse, while a Low in data is
represented by a negative pulse. The following figure depicts this well.

Dept. Of Information Technology Page 9


Mahavir Polytechnic IF6I-WMN-UNIT 4

Polar RZ

In this type of Polar signaling, a High in data, though represented by a Mark pulse, its duration T0 is less than
the symbol bit duration. Half of the bit duration remains high but it immediately returns to zero and shows the
absence of pulse during the remaining half of the bit duration.
However, for a Low input, a negative pulse represents the data, and the zero level remains same for the other
half of the bit duration. The following figure depicts this clearly.

Dept. Of Information Technology Page 10


Mahavir Polytechnic IF6I-WMN-UNIT 4

Split phase manchester

4.4 Amplitude Shift Keying

Amplitude Shift Keying ASK is a type of Amplitude Modulation which represents the binary data in the
form of variations in the amplitude of a signal. Any modulated signal has a high frequency carrier. The
binary signal when ASK modulated, gives a zero value for Low input while it gives the carrier
output for High input.

Dept. Of Information Technology Page 11


Mahavir Polytechnic IF6I-WMN-UNIT 4

Phase Shift Keying

Phase Shift Keying PSK is the digital modulation technique in which the phase of the carrier signal is changed
by varying the sine and cosine inputs at a particular time. PSK technique is widely used for wireless LANs, bio-
metric, contactless operations, along with RFID and Bluetooth communications.

PSK is of two types, depending upon the phases the signal gets shifted.

Binary Phase Shift Keying BPSK

 This is also called as 2-phase PSK or Phase Reversal Keying. In this technique, the sine wave carrier
takes two phase reversals such as 0° and 180°.
 BPSK is basically a Double Side Band Suppressed Carrier DSBSC modulation scheme, for message
being the digital information.

Quadrature Phase Shift Keying

 This is the phase shift keying technique, in which the sine wave carrier takes four phase reversals such
as 0°, 90°, 180°, and 270°.
 If this kind of techniques are further extended, PSK can be done by eight or sixteen values also,
depending upon the requirement

Dept. Of Information Technology Page 12


Mahavir Polytechnic IF6I-WMN-UNIT 4

Pulse Code Modulation (PCM):

 PCM is the technique used for remodeling analog signal into digital signal. Pulse Code Modulation has
good signal to noise ration. For transmission channel, Pulse Code Modulation needs high bandwidth than
DPCM.
 The PCM method is split into 3 components, initial is that the transmission at the supply finish, second
regeneration at the transmission path and also the receiving finish

Differential Pulse Code Modulation (DPCM):

 DPCM is same as the PCM technique used for remodeling analog signal into digital signal. DPCM has
moderate signal to noise ratio.
 DPCM differs from PCM as a result of it quantizes the distinction of the particular sample and expected
price. that’s the explanation it’s referred to as differential PCM

PCM DPCM

PCM stands for Pulse Code Modulation. While DPCM stands for Differential Pulse
Code Modulation.

In PCM, feedback is not provided. While in DPCM, feedback is provided.

It has good signal to noise ration. While it has moderate signal o noise ratio.

It is less efficient than DPCM. While it is more efficient than PCM.

For transmission channel, PCM needs high Whereas DPCM needs less bandwidth(B) than
bandwidth(B). PCM.

PCM is complex than DPCM in terms of While DPCM is simple in terms of


complexity. complexity.

In PCM, seven bits are transmitted per In DPCM, four bits are transmitted per six
eight sample. sample.

In PCM, for transmitting bits rate varies While in DPCM, for transmitting bits rate
from fifty five to sixty four. varies from thirty two to forty eight

Dept. Of Information Technology Page 13


Mahavir Polytechnic IF6I-WMN-UNIT 4

4.6 Spread Spectrum

 Spread spectrum is an increasingly important form of encoding for wireless communications. It is used
to transmit either analog or digital data, using an analog signal.
 The basic idea of spread spectrum is to modulate the signal so as to increase significantly the bandwidth
(spread the spectrum) of the signal to be transmitted.
 It was initially developed for military and intelligence requirements. The use of spread spectrum makes
jamming and interception more difficult and provides improved reception.
 The first type of spread spectrum developed is known as frequency hopping. A more recent type of
spread spectrum is direct sequence. Both of these techniques are used in various wireless
communications standards and products.
 The spread spectrum signals have the signal strength distributed as shown in the following frequency
spectrum figure

Following are some of its features −

 Band of signals occupy a wide range of frequencies.


 Power density is very low.
 Energy is wide spread.

With these features, the spread spectrum signals are highly resistant to interference or jamming.

General Model of Spread Spectrum System

Dept. Of Information Technology Page 14


Mahavir Polytechnic IF6I-WMN-UNIT 4

Figure highlights the key characteristics of any spread spectrum system. Input is fed into a channel encoder that
produces an analog signal with a relatively narrow bandwidth around some center frequency. This signal is
further modulated using a sequence of digits known as a spreading code or spreading sequence. Typically, but
not always, the spreading code is generated by a pseudo noise, or pseudorandom number, generator. The effect
of this modulation is to increase significantly the bandwidth (spread the spectrum) of the signal to be
transmitted. On the receiving end, the same digit sequence is used to demodulate the spread spectrum signal.
Finally, the signal is fed into a channel decoder to recover the data.

Frequency Hopped Spread Spectrum (FHSS)

 This is frequency hopping technique, where the users are made to change the frequencies of usage, from
one to another in a specified time interval, hence called as frequency hopping.
 For example, a frequency was allotted to sender 1 for a particular period of time. Now, after a while,
sender 1 hops to the other frequency and sender 2 uses the first frequency, which was previously used by
sender 1. This is called as frequency reuse.
 The frequencies of the data are hopped from one to another in order to provide a secure transmission.
The amount of time spent on each frequency hop is called as Dwell time.
 With frequency-hopping spread spectrum (FHSS), the signal is broadcast over a seemingly random
series of radio frequencies, hopping from frequency to frequency at fixed intervals.
 A receiver, hopping between frequencies in synchronization with the transmitter, picks up the message.
 Would-be eavesdroppers hear only unintelligible blips. Attempts to jam the signal on one frequency
succeed only at knocking out a few bits of it.

Dept. Of Information Technology Page 15


Mahavir Polytechnic IF6I-WMN-UNIT 4

Example:

Following Figure shows an example of a frequency-hopping signal.

 A number of channels are allocated for the FH signal. Typically, there are 2k carrier frequencies forming
2k channels.
 The spacing between carrier frequencies and hence the width of each channel usually corresponds to the
bandwidth of the input signal.
 The transmitter operates in one channel at a time for a fixed interval; for example, the IEEE 802.11
standard uses a 300-ms interval. During that interval, some number of bits (possibly a fraction of a bit,
as discussed subsequently) is transmitted using some encoding scheme.
 A spreading code dictates the sequence of channels used. Both transmitter and receiver use the same
code to tune into a sequence of channels in synchronization

Dept. Of Information Technology Page 16


Mahavir Polytechnic IF6I-WMN-UNIT 4

Frequency Selection

FHSS Cycle

Dept. Of Information Technology Page 17


Mahavir Polytechnic IF6I-WMN-UNIT 4

Direct Sequence Spread Spectrum (DSSS)

 Whenever a user wants to send data using this DSSS technique, each and every bit of the user data is
multiplied by a secret code, called as chipping code.

 This chipping code is nothing but the spreading code which is multiplied with the original message and
transmitted. The receiver uses the same code to retrieve the original message.

 With direct sequence spread spectrum (DSSS), each bit in the original signal is represented by multiple
bits in the transmitted signal, using a spreading code. The spreading code spreads the signal across a
wider frequency band in direct proportion to the number of bits used. Therefore, a 10-bit spreading code
spreads the signal across a frequency band that is 10 times greater than a 1-bit spreading code.

Direct Sequence Spread Spectrum Example

 One technique with direct sequence spread spectrum is to combine the digital information stream with
the spreading code bit stream using an exclusive-OR (XOR).
 Figure shows an example. Note that an information bit of one inverts the spreading code bits in the
combination, while an information bit of zero causes the spreading code bits to be transmitted without
inversion. The combination bit stream has the data rate of the original spreading code sequence, so it has
a wider bandwidth than the information stream. In this example, the spreading code bit stream is clocked
at four times the information rate.

Dept. Of Information Technology Page 18


Mahavir Polytechnic IF6I-WMN-UNIT 4

Dept. Of Information Technology Page 19


Mahavir Polytechnic IF6I-WMN-UNIT 4

Assignment 4
Sr. Attainment to
Questions
No which CO
1 Define the term LEC (Local Exchange Carrier). d

2 Draw and explain WLL architecture. d

3 List any four names of Line coding techniques. d

Encode the datastream 1011000101 using the following techniques


i) RZ - Bipolar
4 ii) AMI d
iii) Manchester

iv) NRZ - unipolar

5 Explain the principle of working of ASK and BPSK with suitable waveforms for the bit d
sequence 110101100.

6 Distinguish between PCM, DM. d

7 List the features of 4G. d

Dept. Of Information Technology Page 20

You might also like