Telecommunication - communication at a distance (lat.)

Communication( the process of information exchange) is a necessary condition for the existence of living organisms, ecological communities and human society. Social development is accompanied by the development of telecommunication technologies. Telecommunication technologies have been developing especially intensively over the past few decades.

Telecommunications can be defined as technologies dealing with communication at a distance and this can be explained different ways. Figure 8.2 shows one of the possible views of the various sections of telecommunications.

Figure 8.2. Telecommunications: forms and types

Telecommunications are divided into two types: unidirectional and bidirectional. Unidirectional, such as mass broadcasting and television broadcasting, involve the transmission of information in one direction - from the center to the subscribers. Bidirectional support a dialogue between two subscribers.

Telecommunications use mechanical and electrical means because, historically, telecommunications has evolved from a mechanical to an electrical form, using more and more complex electrical systems. This is the reason why many traditional operators in telecommunications such as the national postal, telegraph and telephone companies use both forms. The share of mechanical telecommunications such as regular mail and press (newspaper distribution) is expected to decrease, while the share of electrical, especially bidirectional, will increase and become the main one in the future. Already in our time, corporations and the press are primarily interested in electrical telecommunications (telecommunications) as a profitable business opportunity.

Along the edges of Figure 8.2. telecommunication services are shown, initially mechanical: the press (forwarding newspapers), mail; then electrical: telegraph, telex (subscriber telegraph), telephone, radio, television, computer networks, leased networks, cable television and mobile phones.

Approximately in this order, telecommunications developed historically.

Telecommunication system- a set of technical objects, organizational measures and subjects that implement processes consisting of: connection processes, transfer processes and access processes.

Telecommunication systems use the natural or artificial environment to exchange information. Telecommunication systems, together with the medium that is used for transmission, form telecommunication networks. The most important telecommunication networks are (Fig. 8.2.): postal service; public telephone network (PSTN); mobile telephone networks; telegraph network; Internet - a global network of interaction of computer networks; wire broadcasting network; cable television networks; television and radio broadcasting networks; departmental communication networks that provide communication services to government agencies, air and maritime traffic control systems, large industrial complexes; global networks of rescue and safety.

The telecommunication systems listed above, as a rule, closely interact with each other and use common resources for communication. To organize such interaction in each state and on a global scale, there are special bodies that regulate the use of common resources; determine general rules interactions (protocols) of telecommunication systems; develop advanced telecommunication technologies.

To implement communication at a distance, telecommunication systems use: switching systems; transmission systems; systems of access and control of transmission channels.

1. Principles of building wireless telecommunication systems

1.1 Architecture of cellular communication systems.

1.2 Service of the subscriber by the network.

1.3 Methods for separating subscribers in cellular communications

1.4 DECT standard for communication.

1.5 Standards Bluetooth, Wi-Fi (802.11, 802.16).

2. Systems complex signals for telecommunication systems.

2.1 Signal spectra

2.2 Correlation properties of signals

2.3 Types of complex signals

2.4 Derived signal systems

3. Modulation of complex signals

3.1 Geometric representation of signals

3.2 Methods of phase keying of signals (FM2, FM4, OFM).

3.3 Modulation with minimal frequency shift.

3.4 Quadrature modulation and its characteristics (QPSK, QAM).

3.5 Implementation of quadrature modems.

4. Characteristics of signal reception in telecommunication systems.

4.1 Probability of discrimination errors M of known signals

4.2 Probability of errors in distinguishing M fluctuating signals.

4.3 Calculation of discrimination errors of M signals with unknowns

non-energy settings.

4.4 Comparison of synchronous and asynchronous communication systems.

5. Conclusion.

6. References


1. Principles of building wireless telecommunication systems

1.1 Architecture of cellular communication systems

A cellular communication system is a complex and flexible technical system that allows for a wide variety, both in terms of configuration options and the set of functions performed. An example of the complexity and flexibility of the system is that it can transmit both speech and other types of information, in particular text messages and computer data. In terms of voice transmission, in turn, ordinary two-way telephone communication, multilateral telephone communication (the so-called conference call - with more than two subscribers participating in a conversation at the same time), voice mail. When organizing a normal two-way telephone conversation, starting with a call, the modes of auto redial, call waiting, call forwarding are possible.

A cellular communication system is built as a collection of cells, or cells, covering a service area, such as a metropolitan area. Cells are usually schematically depicted in the form of regular equal-sized hexagons (Fig. 1.1.), Which, by resemblance to bee honeycombs, was the reason to call the system cellular. Cellular, or cellular, structure of the system is directly related to the principle of frequency reuse - the basic principle of the cellular system, which determines effective use dedicated frequency range and high system capacity.


Rice. 1.1. Cells (cells) of the system covering the entire service area.

In the center of each cell there is a base station serving all mobile stations (subscriber radiotelephone sets) within its cell (Fig. 1.2.). When a subscriber moves from one cell to another, his service is transferred from one base station to another. All base stations of the system, in turn, are connected to the switching center, from which there is access to the Interconnected Communications Network (VSS) of Russia, in particular, if it happens in a city, access to a regular urban wired network telephone communication.

Rice. 1.2. One cell with a base station in the center serving all mobile stations in the cell.

On fig. 1.3. a functional diagram corresponding to the described structure is given.

Rice. 1.3. Simplified functional diagram of a cellular communication system: BS - base station; PS - mobile station (subscriber radiotelephone).

In reality, cells are never strictly geometric. Real cell boundaries have the form of irregular curves depending on the propagation and attenuation conditions of radio waves, i.e. on the terrain, the nature and density of vegetation and buildings, and similar factors. Moreover, cell boundaries are generally not well-defined, since the handoff boundary of a mobile station from one cell to another may shift to some extent with changes in radio wave propagation conditions and depending on the direction of movement of the mobile station. Similarly, the position of the base station only approximately coincides with the center of the cell, which, moreover, is not so easy to determine unambiguously if the cell has an irregular shape. If the base stations use directional (not isotropic in the horizontal plane) antennas, then the base stations actually end up at the cell boundaries. Further, a cellular communication system may include more than one switching center, which may be due to the evolution of the development of the system or the limited capacity of the switch. It is possible, for example, the structure of the system of the type shown in Fig. 1.4. - with several switching centers, one of which can be conditionally called "head" or "leading".

Rice. 1.4. Cellular communication system with two switching centers.

Consider a mobile station, which is the simplest element of a cellular communication system in terms of functionality and design, and besides, it is the only element of the system that is actually available to the user.

The block diagram of the mobile station is shown in fig. 1.5. It consists of:

Control block;

Transceiver unit;

Antenna block.

Rice. 1.5. Block diagram of a mobile station (subscriber radiotelephone).

The transceiver unit, in turn, includes a transmitter, a receiver, a frequency synthesizer and a logic unit.

The antenna unit is the simplest in composition: it includes the antenna itself and the receive-transmit switch. The latter for a digital station can be an electronic switch that connects the antenna either to the output of the transmitter or to the input of the receiver, since the mobile station of a digital system never receives and transmits simultaneously.

The control unit includes a handset - microphone and speaker, keyboard and display. The keyboard (a dialing field with numeric and function keys) is used to dial the phone number of the called subscriber, as well as commands that determine the mode of operation of the mobile station. The display serves to display various information provided by the device and the operating mode of the station.

The transceiver unit is much more complicated.

The transmitter includes:

Analog-to-digital converter (ADC) - converts the signal from the microphone output into digital form, and all subsequent processing and transmission of the speech signal is carried out in digital form, up to the reverse digital-to-analog conversion;

The speech encoder encodes the speech signal, i.e., converts a digital signal according to certain laws in order to reduce its redundancy, i.e. in order to reduce the amount of information transmitted over a communication channel;

Channel encoder - adds to digital signal, obtained from the output of the speech encoder, additional (redundant) information designed to protect against errors during signal transmission over the communication line; for the same purpose, information is subjected to a certain repackaging (multiplication); in addition, the channel encoder introduces control information from the logic block into the transmitted signal;

Modulator - carries out the transfer of information of the encoded video signal to the carrier frequency.

The composition of the receiver basically corresponds to the transmitter, but with the inverse functions of its constituent blocks:

The demodulator extracts from the modulated radio signal an encoded video signal carrying information;

The channel decoder extracts control information from the input stream and sends it to the logical block; the received information is checked for errors, and the selected errors are corrected if possible; before further processing, the received information is subjected to reverse (with respect to the encoder) repackaging;

The speech decoder restores the speech signal coming to it from the channel decoder, converting it into a natural form, with its inherent redundancy, but in digital form;

A digital-to-analog converter (DAC) converts the received speech signal into analog form and feeds it to the speaker output;

The equalizer serves to partially compensate for signal distortion due to multipath propagation; in essence, it is an adaptive filter that is tuned according to the training sequence of symbols that is part of the transmitted information; the equalizer block is not, generally speaking, functionally necessary and in some cases may be absent.

For a combination of an encoder and a decoder, the name codec is sometimes used.

In addition to the transmitter and receiver, the transceiver unit includes a logic unit and a frequency synthesizer. The logical unit is, in fact, a microcomputer with its own operational and permanent memory, which controls the operation of the mobile station. The synthesizer is a source of carrier frequency oscillations used to transmit information over a radio channel. The presence of a local oscillator and a frequency converter is due to the fact that different parts of the spectrum are used for transmission and reception.

The block diagram of the base station is shown in fig. 1.6.

Rice. 1.6. Base station block diagram.

The presence of several receivers and the same number of transmitters allows simultaneous operation on several channels with different frequencies.

Receivers and transmitters of the same name have common tunable reference oscillators, which ensure their coordinated tuning when switching from one channel to another. To ensure the simultaneous operation of N receivers for one receiving and N transmitters for one transmitting antenna, a power divider for N outputs is installed between the receiving antenna and receivers, and a power divider for N inputs is installed between the transmitters and the transmitting antenna.

The receiver and transmitter have the same structure as in the mobile station, except that there is no DAC and ADC here, since both the transmitter input signal and the receiver output signal are digital.

The communication line interface unit packs the information transmitted over the communication line to the switching center and unpacks the information received from it.

The base station controller, which is a sufficiently powerful and perfect computer, provides control over the operation of the station, as well as monitoring the performance of all its units and nodes.

The switching center is the brain center and at the same time the dispatching center of the cellular communication system, to which information flows from all base stations are closed and through which access to other communication networks is provided - a fixed telephone network, long-distance communication networks, satellite communications, and other cellular networks.

The block diagram of the switching center is shown in fig. 1.7. The switch performs the switching of information flows between the corresponding communication lines. It can, in particular, direct the flow of information from one base station to another, or from a base station to a fixed communication network, or vice versa.

The switch is connected to the communication lines through the appropriate communication controllers that perform intermediate processing (packing/unpacking, buffer storage) of information flows. The general management of the operation of the switching center and the system as a whole is carried out from the central controller, which has powerful software. The work of the switching center involves the active participation of operators, therefore, the center includes the appropriate terminals, as well as means of displaying and recording (documenting) information. The operator enters data on subscribers and their service conditions, initial data on the operating modes of the system.


Rice. 1.7. Block diagram of the switching center.

Important elements of the system are databases - home registry, guest registry, authentication center, hardware registry. The home register contains information about all subscribers registered in this system and about the types of services that can be provided to them. The location of the subscriber is also fixed here to organize his call, and the actually rendered services are recorded. The guest register contains approximately the same information about subscribers - guests (roamers), i.e. about subscribers registered in another system, but currently using cellular communication services in this system. The Authentication Center provides procedures for authenticating subscribers and encrypting messages. The hardware register, if it exists, contains information about the mobile stations in operation for their serviceability and authorized use.

1.2 Subscriber service by the network

Interface - a system of signals through which the devices of a cellular communication system are connected to each other. Each cellular standard uses several interfaces (different in different standards).

Of all the interfaces used in cellular communication, one occupies a special place - this is the exchange interface between the mobile and base stations. It is called the air interface. The terrestrial interface is necessarily used in any cellular communication system, with any of its configurations and in the only possible variant for its cellular communication standard.

The on-air interface of the D-AMPS system of the IS-54 standard is relatively simple (Fig. 1.8.).

A traffic channel is a voice or data transmission channel. The transmission of information in the traffic channel is organized by successive frames with a duration of 40 ms. Each frame consists of six time intervals - slots; the slot duration (6.67 ms) corresponds to 324 bits. With full-rate coding, two slots are allocated for one speech channel in each frame, i.e. A 20-millisecond segment of speech is packed into one slot, which is one-third as long. With half-rate coding, one speech channel is assigned one slot in the frame, i.e. the packing of the speech signal is twice as dense as in full-rate coding.


Fig.1.8. Frame and slot structure of the D-AMPS system (traffic channel; IS-54 standard): Data – speech information; Sync(Sc) – synchronizing (training) sequence; SACCH – control channel slow alignment information; CDVCC(CC) - coded digital color confirmation code; G - protective blank; R is the transmitter pulse front interval; V,W,X,Y - hexadecimal zeros; Res - reserve.

The slot has a slightly different structure in the forward traffic channel - from the base station to the mobile station and in the reverse traffic channel - from the mobile station to the base station. In both cases, 260 bits are allocated for speech transmission. Another 52 bits are occupied by control and auxiliary information. It includes: a 28-bit training sequence used for slot identification within a frame, slot timing, and equalizer tuning; 12-bit SACCH signaling (monitoring and control) message; 12-bit coded digital coloring code (CDVCC) field used to identify the mobile station when its signal is received by the base station (the code is assigned by the base station individually for each channel, i.e. for each mobile station and is relayed by the latter back to the base station).

The remaining 12 bits are not used in the forward channel (reserve), and in the reverse channel they serve as a guard interval, during which no useful information is transmitted.

At the initial stage of establishing a connection, a shortened slot is used, in which the synchronization sequence and the CDVCC code are repeated many times, separated by zero numbers of different lengths. There is an additional protective blank at the end of the shortened slot. The mobile station transmits short slots until the base station selects the required time delay, determined by the distance between the mobile station and the base station.

There are several communication channels: frequency, physical and logical.

A frequency channel is a frequency band allocated for the transmission of information of one communication channel. Several physical channels can be placed in one frequency channel, for example, in the TDMA method.

A physical channel in a time division multiple access (TDMA) system is a time slot with a specific number in the air interface frame sequence.

Logical channels are divided according to the type of information transmitted in the physical channel into a traffic channel and a control channel. The control channel carries signaling information including control information and equipment status monitoring information, and the traffic channel carries voice and data.

(Traffic is a collection of messages transmitted over a communication line).

Consider the operation of a mobile station within one cell of its ("home") system, without handover. In this case, the operation of the mobile station can be divided into four stages, which correspond to four modes of operation:

Power on and initialization;

Standby mode;

Communication (call) establishment mode;

Mode of communication (telephone conversation).

After turning on the mobile station, initialization is performed - the initial start. During this stage, the mobile station is configured to work as part of the system - according to the signals regularly transmitted by the base stations on the appropriate control channels, after which the mobile station goes into standby mode.

While in standby mode, the mobile station monitors:

Changes in system information - these changes can be associated both with changes in the mode of operation of the system, and with the movements of the mobile station itself;

System commands - for example, a command to confirm its performance;

Receiving a call from the system;

Call initialization by own subscriber.

In addition, the mobile station can periodically, for example, once every 10...15 minutes, confirm its operability by transmitting appropriate signals to the base station. In the switching center for each of the included mobile stations, a cell is fixed in which it is “registered”, which facilitates the organization of the procedure for calling a mobile subscriber.

If a call comes from the system to the number of a mobile subscriber, the switching center directs this call to the base station of the cell in which the mobile station is “registered”, or to several base stations in the vicinity of this cell, taking into account the possible movement of the subscriber over the time elapsed from the moment the last "registration", and the base stations transmit it on the appropriate call channels. The mobile station, which is in the idle mode, receives the call and answers it through its base station, simultaneously transmitting the data necessary to carry out the authentication procedure. At a positive result authentication, a traffic channel is assigned and the mobile station is informed of the corresponding frequency channel number. The mobile station tunes in to a dedicated channel and, together with the base station, performs the necessary steps to prepare a communication session. At this stage, the mobile station tunes in to the specified slot number in the frame, adjusts the time delay, adjusts the level of radiated power, and so on. The choice of time delay is made for the purpose of temporal coordination of slots in the frame when organizing communication with mobile stations located at different distances from the base station. In this case, the time delay of the packet transmitted by the mobile station is regulated by the commands of the base station.

The base station then issues a ringing (ringing) message, which is acknowledged by the mobile station, and the caller is able to hear the ringing signal. When the called subscriber answers the call, the mobile station issues a call termination request. When the connection is terminated, the communication session begins.

During the conversation, the mobile station processes the transmitted and received speech signals, as well as control signals transmitted simultaneously with speech. At the end of the conversation, service messages are exchanged between the mobile and base station, after which the transmitter of the mobile station turns off and the station goes into standby mode.

If the call originates from the mobile station, i.e. the subscriber dials the number of the called subscriber and presses the "call" button on the control panel, then the mobile station transmits a message through its base station indicating the called number and data for authenticating the mobile subscriber. After authentication, the base station assigns a traffic channel, and the next steps to prepare a communication session are the same as when a call is received from the system.

The base station then informs the switching center about the readiness of the mobile station, the switching center transfers the call to the network, and the mobile station subscriber gets the opportunity to hear "call" or "busy" signals. The connection is terminated on the network side.

Each time a connection is established, authentication and identification procedures are performed.

Authentication is a procedure for confirming the authenticity (validity, legality, availability of rights to use cellular services) of a subscriber of a mobile communication system. The need to introduce this procedure is caused by the inevitable temptation to gain unauthorized access to cellular services.

Identification is a procedure for establishing that a mobile station belongs to one of the groups with certain properties or characteristics. This procedure is used to identify lost, stolen or malfunctioning devices.

The idea of ​​the authentication procedure in a digital cellular communication system is to encrypt some identifier passwords using quasi-random numbers periodically transmitted to the mobile station from the switching center, and an encryption algorithm individual for each mobile station. Such encryption, using the same initial data and algorithms, is performed both at the mobile station and at the switching center, and authentication is considered successful if both results match.

The identification procedure consists in comparing the identifier of the subscriber set with the numbers contained in the corresponding “black lists” of the equipment register in order to withdraw stolen and technically faulty devices from circulation. The device identifier is made such that it is difficult and uneconomical to change or counterfeit it.

When moving a mobile station from one cell to another, its service is transferred from the base station of the first cell to the base station of the second (Fig. 1.9.). This process is called handover. It occurs only when the mobile station crosses a cell boundary during a communication session and the communication is not interrupted. If the mobile station is in standby mode, it simply tracks these movements according to the information of the system transmitted over the control channel, and at the right time changes to a stronger signal from another base station.

Rice. 1.9. Handover from cell A to cell B when the mobile station crosses a cell boundary.

The need for a handover occurs when the quality of the communication channel, as measured by signal strength and/or bit error rate, falls below an acceptable limit. In the D-AMPS standard, a mobile station measures these characteristics only for a working cell, but when the communication quality deteriorates, it reports this through the base station to the switching center, and at the command of the latter, similar measurements are performed by mobile stations in neighboring cells. Based on the results of these measurements, the switching center selects the cell to which the service should be handed over.

The service is transferred from the cell with the worst link quality to the cell with best quality, and this difference must be at least some given value. If this condition is not required, then, for example, when the mobile station moves approximately along the cell boundary, multiple handovers from the first cell to the second and back are possible, leading to loading the system with meaningless work and reducing the quality of communication.

Having made a decision to handover and selecting a new cell, the switching center informs the base station of the new cell about this, and the mobile station issues the necessary commands through the base station of the old cell indicating the new frequency channel, working slot number, etc. The mobile station changes to new channel and is configured to work with a new base station, following approximately the same steps as in preparing a communication session, after which communication continues through the base station of the new cell. At the same time, a break in a telephone conversation does not exceed a fraction of a second and remains invisible to the subscriber.

A cellular communication system can provide a roaming function - this is a procedure for providing cellular communication services to a subscriber of one operator in the system of another operator.

An idealized and simplified roaming organization scheme is as follows: a cellular subscriber who finds himself on the territory of a "foreign" system that allows roaming, initiates a call as if he were on the territory of his "own" system. The switching center, making sure that this subscriber does not appear in its home register, perceives it as a roamer and enters it into the guest register. At the same time, it queries the home register of the roamer's "native" system for information related to it, necessary for organizing service, and reports in which system the roamer is currently located; the latter information is recorded in the home register of the "native" system of the roamer. After that, the roamer uses cellular communications as at home.

1.3 Methods for separating subscribers in cellular communications

A link resource represents the time and bandwidth available for signal transmission on a particular system. To create an efficient communication system, it is necessary to plan the distribution of the resource among the users of the system so that time/frequency is used as efficiently as possible. The result of such planning should be equal access of users to the resource. There are three main methods for separating subscribers in a communication system.

1. Frequency division. Certain sub-bands of the usable frequency band are allocated.

2. Temporal separation. Subscribers are allocated periodic time intervals. Some systems allow users a limited amount of time to communicate. In other cases, the time that users access a resource is determined dynamically.

3. Code division. Certain elements of a set of orthogonally (or almost orthogonally) distributed spectral codes are distinguished, each of which uses the entire frequency range.

At frequency division(FDMA) communication resource is distributed according to fig. 1.10. Here, the distribution of signals or users over a frequency range is long-term or permanent. A communication resource can simultaneously contain several signals spaced apart in the spectrum.

The primary frequency range contains signals that use the frequency range between f 0 and f 1 , the second one between f 2 and f 3 , and so on. The regions of the spectrum that lie between the usable bands are called guard bands. The guard bands act as a buffer to reduce interference between adjacent (in frequency) channels.

Rice. 1.10. Frequency division seal.

In order for an unmodulated signal to use a higher frequency range, it is converted by superimposing or mixing (modulating) this signal and a sinusoidal signal of a fixed frequency.

With time division (TDMA), a communication resource is distributed by providing each of the M signals (users) of the entire spectrum for a small period of time, called a time interval (Fig. 1.11.). The time intervals that separate the intervals used are called guard intervals.

The guard interval creates some temporal uncertainty between adjacent signals and acts as a buffer, thereby reducing interference. Time is usually broken down into intervals called frames. Each frame is divided into time slots that can be distributed among users. The general structure of frames repeats periodically, such that a TDMA data transmission is one or more time slots that repeat periodically throughout each frame.

Rice. 1.11. Seal with temporary separation.

Code division multiple access (CDMA) is a practical application of spread spectrum techniques that can be divided into two main categories: direct sequence spread spectrum and frequency hopping spread spectrum.

Let us consider the spectrum extension by the direct sequence method. Spread spectrum gets its name from the fact that the bandwidth used for signal transmission is much larger than the minimum required for data transmission. So, N users receive an individual code g i (t), where i = 1,2,…,N. The codes are approximately orthogonal.

block diagram standard system CDMA is shown in fig. 1.12.


Rice. 1.12. Multiple access code division.

The first block of the circuit corresponds to the data modulation of the carrier wave Acosω 0 t. The output of the modulator belonging to the user from group 1 can be written as follows: s 1 (t)=A 1 (t)cos(ω 0 t+φ 1 (t)).

The type of the received signal can be arbitrary. The modulated signal is multiplied by the spreading signal g 1 (t) assigned to group 1; the result g 1 (t)s 1 (t) is transmitted over the channel. Similarly, for users of groups from 2 to N, the product of the code function and the signal is taken. Quite often, access to the code is limited to a well-defined group of users. The resulting channel signal is a linear combination of all transmitted signals. Neglecting delays in signal transmission, the indicated linear combination can be written as follows: g 1 (t)s 1 (t)+ g 2 (t)s 2 (t)+…+ g N (t)s N (t).

Multiplication of s 1 (t) and g 1 (t) results in a function whose spectrum is the convolution of the spectra of s 1 (t) and g 1 (t). Since the signal s 1 (t) can be considered narrowband (compared to g 1 (t)), the bands g 1 (t)s 1 (t) and g 1 (t) can be considered approximately equal. Consider a receiver configured to receive messages from user group 1. Let us assume that the received signal and the code g 1 (t) generated by the receiver are fully synchronized with each other. The first step of the receiver is to multiply the received signal by g 1 (t). As a result, a function g 1 2 (t)s 1 (t) and a set of side signals g 1 (t)g 2 (t)s 2 (t)+ g 1 (t)g 3 (t)s 3 (t )+…+ g 1 (t)g N (t)s N (t). If the code functions g i (t) are mutually orthogonal, the received signal can be perfectly extracted in the absence of noise, because

.

Side signals are easily eliminated by the system, since

.

The main advantages of CDMA are privacy and noise immunity.

1. Privacy. If the code of a user group is known only to authorized members of that group, CDMA ensures communication confidentiality, since unauthorized persons who do not have the code cannot access the transmitted information.

2. Noise immunity. Modulating a signal with a sequence on transmission requires it to be re-modulated with the same sequence on reception (which is equivalent to demodulating the signal), resulting in the restoration of the original narrowband signal. If the interference is narrowband, then the demodulating direct sequence, when received, acts on it as a modulating one, i.e. “smeares” its spectrum over a wide band W ss, as a result of which only 1/G of the interference power falls into the narrow band of the signal W s, so that the narrow-band interference will be attenuated G times, where G=W ss /W s (W ss is the extended spectrum band, W s is the original spectrum). If the interference is broadband - with a band of the order of W ss or wider, then demodulation will not change the width of its spectrum, and the interference will fall into the signal band weakened as many times as its band is wider than the band W s of the original signal.

1.4 Standard DECT for communication

DECT systems and devices are distributed in more than 30 countries on all continents of the planet. In fact, DECT is a set of specifications that define radio interfaces for various types of communication networks and equipment. DECT combines the requirements, protocols and messages that ensure the interaction of communication networks and terminal equipment. The organization of the networks themselves and the arrangement of equipment are not included in the standard. The most important task of DECT is to ensure the compatibility of equipment from different manufacturers.

Initially, DECT was focused on telephony - radio extenders, wireless office PBXs, providing radio access to public telephone networks. But the standard turned out to be so successful that it began to be used in data transmission systems, wireless subscriber access to public communication networks. DECT has found use in multimedia applications and home radio networks, for Internet access and facsimile.

What is a DECT radio interface? In the 20 MHz band (1880 - 1900 MHz), 10 carrier frequencies are allocated with an interval of 1.728 MHz. DECT uses time division access technology - TDMA. The time spectrum is divided into separate frames of 10ms (Fig. 1.13.). Each frame is divided into 24 time slots: 12 slots for receiving (from the point of view of a wearable terminal) and 12 for transmitting. Thus, on each of the 10 carrier frequencies, 12 duplex channels are formed - a total of 120. Duplex is provided by time division (with an interval of 5 ms) of reception / transmission. The 32-bit sequence “101010…” is used for synchronization. DECT provides speech compression in accordance with adaptive differential PCM technology at a rate of 32 Kbps. Therefore, the information part of each slot is 320 bits. When transmitting data, it is possible to combine time slots. The radio path uses Gaussian frequency modulation.

Base stations (BS) and subscriber terminals (AT) DECT constantly scan all available channels (up to 120). In this case, the signal strength on each of the channels is measured, which is entered into the RSSI list. If the link is busy or noisy, the RSSI is high. The BS selects the channel with the most low value RSSI for continuous transmission of service information about subscriber calls, station ID, system capabilities, etc. This information plays the role of reference signals for the AT - according to them, subscriber devices determine whether there is a right to access a particular BS, whether it provides the services required by the subscriber, whether there is free capacity in the system and choose the BS with the highest quality signal.

In DECT, the communication channel always defines AT. When a connection is requested from the BS (incoming connection), the AT receives a notification and selects a radio channel. The service information is transmitted by the base station and analyzed by the user terminal constantly, therefore, the AT is always synchronized with the closest available BS. When establishing a new connection, the AT selects the channel with the lowest RSSI value - this ensures that the new connection occurs on the cleanest channel available. This procedure of dynamic channel allocation allows you to get rid of frequency planning - the most important feature of DECT.


Rice. 1.13. DECT spectrum.

Since the AT constantly, even when a connection is established, analyzes the available channels, they can be dynamically switched during a communication session. Such switching is possible both to another channel of the same BS, and to another BS. This procedure is called "handover". In handover, the AT establishes a new connection, and for some time communication is maintained on both channels. Then the best one is chosen. Automatic switching between channels of different BS occurs almost imperceptibly for the user and is completely initiated by the AT.

It is essential that the signal power in the radio path of the DECT equipment is very low - from 10 to 250 mW. Moreover, 10 mW is practically the nominal power for microcellular systems with a cell radius of 30-50 m inside the building and up to 300-400 m in open space. Transmitters with a power of up to 250 mW are used for radio coverage of large areas (up to 5 km).

With a power of 10 mW, it is possible to locate base stations at a distance of 25 m. As a result, a record density of simultaneous connections (about 100 thousand subscribers) is achieved, provided that the BS is located according to the hexagon scheme in the same plane (on the same floor).

To protect against unauthorized access in DECT systems, the BS and AT authentication procedure is used. AT is registered in the system or at individual base stations to which it has access. Authentication occurs with each connection: the BS sends a "request" to the AT - a random number (64 bits). Based on this number and the authentication key, the AT and the BS calculate an authentication response (32 bits) using a given algorithm, which the AT sends to the BS. The BS compares the calculated response with the received one and, if they match, allows the AT to connect. DECT has a standard DSAA authentication algorithm.

As a rule, the authentication key is calculated based on the subscriber's authentication key UAK with a length of 128 bits or the authentication code AC (16 - 32 bits). UAK is stored in AT ROM or in a DAM card, which is similar to a SIM card. AC can also be manually written to the AT ROM or entered during authentication. Together with UAK, a personal user identifier UPI is also used, 16-32 bits long, entered only manually. In addition, unauthorized retrieval of information in systems with TDMA is extremely complex and is available only to specialists.

1.5 Standards Bluetooth , Wi - fi (802.11, 802.16)

The Bluetooth specification describes a packet method for transmitting information with time multiplexing. Radio traffic occurs in the frequency band 2400-2483.5 MHz. The radio path uses the method of spreading the spectrum by means of frequency hops and two-level Gaussian frequency modulation.

The frequency hopping method implies that the entire frequency band allocated for transmission is divided into a certain number of sub-channels with a width of 1 MHz each. The channel is a pseudo-random sequence of hops over 79 or 23 RF subchannels. Each channel is divided into 625 µs time segments, with each segment corresponding to a specific sub-channel. The transmitter uses only one subchannel at a time. Jumps occur synchronously in the transmitter and receiver in a pre-fixed pseudo-random sequence. Up to 1600 frequency jumps can occur per second. This method provides confidentiality and some noise immunity of transmissions. Noise immunity is ensured by the fact that if the transmitted packet could not be received on any subchannel, then the receiver reports this and the packet transmission is repeated on one of the following subchannels, already at a different frequency.

The Bluetooth protocol supports both point-to-point and point-to-multipoint connections. Two or more devices using the same channel form a piconet. One of the devices works as a master, and the rest as slaves. There can be up to seven active slaves in one piconet, with the remaining slaves in the "parked" state, remaining synchronized with the master. Interacting piconets form a "distributed network".

Each piconet has only one master device, but slave devices can be part of different piconets. In addition, the main device of one piconet can be a slave in another (Fig. 1.14.). Piconets are not synchronized with each other in time and frequency - each of them uses its own sequence of frequency hops. In the same piconet, all devices are synchronized in time and frequency. The hop sequence is unique to each piconet and is determined by the address of its primary device. The cycle length of the pseudo-random sequence is 2 27 elements.

Rice. 1. 14. A piconet with one slave device a), several b) and a distributed network c).

AT Bluetooth standard duplex transmission based on time division is provided. The master device transmits packets in odd time segments, and the slave device in even ones (Fig. 1.15.). Packets, depending on their length, can take up to five time segments. In this case, the channel frequency does not change until the end of the packet transmission (Fig. 1.16.).

Rice. 1. 15. Timing diagram of the channel.

The Bluetooth protocol can support an asynchronous data channel, up to three synchronous (constant rate) voice channels, or a simultaneous asynchronous data and synchronous voice channel.

With a synchronous connection, the master device reserves time segments following so-called synchronous intervals. Even if a packet is received with an error, it is not retransmitted during a synchronous connection. Asynchronous communication uses time segments that are not reserved for a synchronous connection. If no address is specified in the address field of an asynchronous packet, the packet is considered "broadcast" - it can be read by all devices. An asynchronous connection allows retransmission of packets received with errors.

Rice. 1. 16. Transmission of packets of various lengths.

A standard Bluetooth packet contains a 72-bit access code, a 54-bit header, and an information field of no more than 2745 bits. The access code identifies packets belonging to the same piconet and is also used for synchronization and query procedures. It includes a preamble (4 bits), a sync word (64 bits) and a trailer - 4 bits of the checksum.

The header contains communication control information and consists of six fields: AM_ADDR – 3-bit address of the active element; TYPE - 4-bit data type code; FLOW - 1 bit of data flow control, indicating the readiness of the device to receive; ARQN - 1 bit of confirmation of correct reception; SEQN - 1 bit used to determine the sequence of packets; HEC - 8-bit checksum.

The information field, depending on the type of packets, may contain either voice fields or data fields, or both types of fields at the same time.

Consider the IEEE 802.11 standard used in local data networks - i.e. in Ethernet-like wireless networks, which are fundamentally asynchronous in nature.

IEEE 802.11 considers two lower layers of the interaction model open systems– physical (the method of working with the transmission medium, the rate and modulation methods are determined) and the data link level, and at the last level, the lower sublevel is considered - MAC, i.e. channel access control (transmission medium). IEEE 802.11 uses the 2.400 - 2.4835 GHz band with a bandwidth of 83.5 MHz and provides for packet transmission with 48-bit address packets.

The standard provides for two main ways to organize a local network - according to the principle "each with each" (communication is established directly between two stations, all devices must be in the radio visibility zone, no administration occurs) and in the form of a structured network (an additional device appears - an access point, as a rule, stationary and operating on a fixed channel; communication between devices occurs only through access points, through which access to external wired networks is also possible).

As a rule, control functions are distributed among all devices of the IEEE 802.11 network - DCF mode. However, for structured networks, PCF mode is possible, when control is transferred to one specific access point. The need for PCF arises when transmitting delay-sensitive information. After all, IEEE 802.11 networks operate on the principle of competitive access to the channel - there are no priorities. In order to set them if necessary, the PCF mode was introduced. However, operation in this mode can occur only at certain periodically repeating intervals.

For the security of data transmission at the MAC level, station authentication and encryption of transmitted data are provided.

IEEE 802.11 implements Carrier Sense Multiple Access with Collision Detection. The station can start transmission only if the channel is free. If stations detect that multiple stations are trying to operate on the same channel, they all stop transmitting and try to resume transmission after a random amount of time. Thus, even when transmitting, the device must monitor the channel, i.e. work for the reception.

Before the first attempt to access the channel, the device loads the duration of a random waiting interval into a special counter. Its value is decremented at the specified frequency while the channel is idle. As soon as the counter is reset, the device can occupy the channel. If the channel is occupied by another device before the counter is reset, the counting stops, keeping the reached value. On the next attempt, the count starts from the stored value. As a result, those who did not have time last time get more chances to occupy the channel next time. This is not the case with wired Ethernet networks.

The packets through which the transmission takes place are actually formed at the MAC layer; at the physical layer, a physical layer header (PLCP) is added to them, consisting of a preamble and the PLCP header itself. There are three types of MAC layer packets - data packets, control packets and control packets. Their structure is the same. Each packet includes a MAC header, an information field, and a checksum.

Fixed access broadband urban wireless data networks use the IEEE 802.16 standard.

The IEEE 802.16 standard describes the operation in the range of 10 - 66 GHz systems with a point-to-multipoint architecture (from the center to many). This is a bi-directional system, i.e. downstream (from the base station to subscribers) and upstream (to the base station) flows are provided. In this case, channels are assumed to be broadband (about 25 MHz), and transmission rates are high (for example, 120 Mbps).

The IEEE 802.16 standard provides for a single carrier modulation scheme (in each frequency channel) and allows three types of quadrature amplitude modulation: four-position QPSK and 16-position 16-QAM (mandatory for all devices), as well as 64-QAM (optional).

Data at the physical layer is transmitted as a continuous sequence of frames. Each frame has a fixed duration - 0.5; 1 and 2 ms. The frame consists of a preamble (32 QPSK-character sync sequence), a control section, and a sequence of data packets. Since the system defined by the IEEE 802.16 standard is bidirectional, a duplex mechanism is required. It provides for both frequency and time separation of the uplink and downlink. In temporal channel duplexing, a frame is divided into downlink and uplink subframes separated by a special interval. In frequency duplexing, the uplink and downlink are each broadcast on their own carrier.

The IEEE 802.16 MAC layer is subdivided into three sub-layers - a service translation sub-layer (services are different applications), a main sub-layer, and a security sub-layer. At the protection sublayer, authentication mechanisms and data encryption are implemented. At the service transformation sublayer, the data streams of the upper layer protocols are transformed for data transmission over IEEE 802.16 networks. For each type of upper-level application, the standard provides a different transformation mechanism. At the main MAC sublayer, data packets are formed, which are then transmitted to the physical layer and broadcast through the communication channel. A MAC packet includes a header and a data field, which may be followed by a checksum.

A key point in the IEEE 802.16 standard is the concept of a service flow and the related concepts of "connection" and "connection identifier" (CID). A service flow in the IEEE 802.16 standard is a data flow associated with a specific application. In this context, a connection is the establishment of a logical connection at the MAC layers on the transmitting and receiving side for the transmission of a service flow. Each connection is assigned a 16-bit CID, which is uniquely associated with the type and characteristics of the connection. The service flow is characterized by a set of requirements for the information transmission channel (to the symbol delay time, the level of delay fluctuations and the guaranteed bandwidth). Each service flow is assigned an SFID identifier, based on which the BS determines the necessary parameters of a specific connection associated with this service flow.

The basic principle of providing channel access in the IEEE 802.16 standard is access on demand. No AS (subscriber station) can transmit anything, except for requests for registration and provision of a channel, until the BS allows it to do so, i.e. will allocate a time slot in the uplink and indicate its location. The SS can either request a certain bandwidth size in the channel or request a change in the channel resource already provided to it. The IEEE 802.16 standard provides for two modes of granting access - for each individual connection and for all connections of a particular AS. It is obvious that the first mechanism provides more flexibility, but the second one significantly reduces the volume of overhead messages and requires less hardware performance.


2. Systems of complex signals for telecommunication systems

2.1 Signal spectra

The signal spectrum s(t) is determined by the Fourier transform

In general, the spectrum is a complex function of the frequency ω. The spectrum can be represented as

,

where |S(ω)| is the amplitude, and φ(ω) is the phase spectrum of the signal s(t).

The signal spectrum has the following properties:

1. Linearity: if there is a set of signals s 1 (t), s 2 (t), ..., and s 1 (t) S 1 (ω), s 2 (t) S 2 (ω), ..., then the sum of the signals Fourier transform as follows:

where a i are arbitrary numerical coefficients.

2. If the signal s(t) corresponds to the spectrum S(ω), then the same signal shifted by t 0 corresponds to the spectrum S(ω) multiplied by e - jωt 0 s(t-t 0)S(ω)e - jωt 0 .

3. If s(t)S(ω), then

4. If s(t)S(ω) and f(t)=ds/dt, then f(t)F(ω)=jωS(ω).

5. If s(t)S(ω) and g(t)=∫s(t)dt, then g(t)G(ω)=S(ω)/jω.

6. If u(t)U(ω), v(t)V(ω) and s(t)=u(t)v(t), then

.

The signal is found over the spectrum using the inverse Fourier transform

.

Consider the spectra of some signals.

1. Rectangular impulse.

Fig.2.1. Spectrum of a rectangular pulse.

2. Gaussian impulse.

s(t)=Uexp(-βt 2)

Fig.2.2. Gaussian pulse spectrum.

3. Smoothed impulse

Using numerical integration, we find the spectrum S(ω).

S(0)=2.052 S(6)=-0.056

S(1)=1.66 S(7)=0.057

S(2)=0.803 S(8)=0.072

S(3)=0.06 S(9)=0.033

S(4)=-0.259 S(10)=-0.0072

S(5)=-0.221 S(ω)=S(-ω)

Rice. 2.3. The spectrum of the smoothed pulse.

2.2 Correlation properties of signals

To compare signals shifted in time, the autocorrelation function (ACF) of the signal is introduced. It quantitatively determines the degree of difference between the signal u(t) and its time-shifted copy u(t - τ) and is equal to the scalar product of the signal and the copy:

It is directly seen that at τ=0 the autocorrelation function becomes equal to the signal energy: B u (0)=E u .

The autocorrelation function is even: B u (τ)=B u (-τ).

For any value of the time shift τ, the ACF module does not exceed the signal energy |В u (τ)|≤B u (0)=E u .

The ACF is related to the signal spectrum by the following relation:

.

The reverse is also true:

.

For a discrete signal, the ACF is defined as follows:

and has the following properties.

Discrete ACF is even: B u (n)=B u (-n).

At zero shift, the ACF determines the energy of a discrete signal:

.

Sometimes a cross-correlation function (CCF) of signals is introduced, which describes not only the shift of the signals relative to each other in time, but also the difference in the shape of the signals.

VKF is defined as follows

for continuous signals and

for discrete signals.

Consider the ACF of some signals.

1. Sequence of rectangular pulses

Rice. 2.4. ACF of a sequence of rectangular pulses.

2. 7-position Barker signal

B u (0)=7, B u (1)= B u (-1)=0, B u (2)= B u (-2)=-1, B u (3)= B u (-3 )=0, B u (4)= B u (-4)=-1, B u (5)= B u (-5)=0, B u (6)= B u (-6)=-1 , B u (7)= B u (-7)=0.

Rice. 2.5. ACF of a 7-position Barker signal.

3. 8-Position Walsh Functions

2nd order Walsh function

B u (0)=8, B u (1)= B u (-1)=3, B u (2)= B u (-2)=-2, B u (3)= B u (-3 )=-3, B u (4)= B u (-4)=-4, B u (5)= B u (-5)=-1, B u (6)= B u (-6)= 2, B u (7)= B u (-7)=1, B u (8)= B u (-8)=0.

Rice. 2.6. ACF of the Walsh function of the 2nd order.

7th order Walsh function

B u (0)=8, B u (1)= B u (-1)=-7, B u (2)= B u (-2)=6, B u (3)= B u (-3 )=-5, B u (4)= B u (-4)=4, B u (5)= B u (-5)=-3, B u (6)= B u (-6)=2 , B u (7)= B u (-7)=-1, B u (8)= B u (-8)=0.

Rice. 2.7. ACF of the Walsh function of the 7th order.


2.3 Types of complex signals

A signal is a physical process that can carry useful information and propagate along a communication line. Under the signal s(t) we mean the function of time, which reflects the physical process, which has a finite duration T.

Signals whose base B, which is equal to the product of the signal duration T and the width of its spectrum, is close to unity, are called "simple" or "ordinary". These signals can be distinguished by frequency, time (delay) and phase.

Complex, multidimensional, noise-like signals are formed according to a complex law. During the duration of the signal T, it undergoes additional manipulation (or modulation) in frequency or phase. Additional amplitude modulation is rarely used. Due to additional modulation, the spectrum of the signal Δf (while maintaining its duration T) expands. Therefore, for such a signal B=T Δf>>1.

Under certain laws of formation of a complex signal, its spectrum turns out to be continuous and practically uniform, i.e. close to the bandwidth-limited noise spectrum. In this case, the signal autocorrelation function has one main spike, the width of which is determined not by the signal duration, but by the width of its spectrum, i.e. has a form similar to the bandlimited noise autocorrelation function. In this regard, such complex signals are called noise-like.

Noise-like signals have been used in broadband communication systems, as: they provide high noise immunity of communication systems; allow organizing the simultaneous operation of many subscribers in a common frequency band; allow you to successfully deal with multipath propagation of radio waves by separating the beams; provide best use spectrum in a limited area compared to narrowband communication systems.

Known big number various noise-like signals (NLS). However, the following main NPSs are distinguished: frequency-modulated signals; a lot of frequency signals; phase-shift keyed signals; discrete frequency signals; discrete composite frequency signals.

Frequency modulated signals (FM) are continuous signals, the frequency of which changes according to a given law (Fig. 2.8.).

Rice. 2.8. FM signal.

In communication systems, it is necessary to have many signals. In this case, the need for a quick change of signals and switching of the formation and processing equipment leads to the fact that the law of frequency change becomes discrete. In this case, FM signals are transferred to HF signals.

Multi-frequency (MF) signals are the sum of N harmonics u 1 (t) ... u N (t), the amplitudes and phases of which are determined in accordance with the laws of signal formation (Fig. 2.9.).


Rice. 2.9. MF signal.

MF signals are continuous and it is difficult to adapt digital technology methods for their formation and processing.

Phase-shift keyed (PM) signals are a sequence of radio pulses, the phases of which change according to a given law (Fig. 2.10., a). Usually the phase takes two values ​​(0 or π). In this case, the RF FM signal corresponds to the video-FM signal (Fig. 2.10., b).

Rice. 2.10. FM signal.

FM signals are very common, because. they allow a wide use digital methods during formation and processing, and it is possible to realize such signals with relatively large bases.

Discrete frequency (DF) signals represent a sequence of radio pulses (Fig. 2.11.), The carrier frequencies of which change according to a given law.

Rice. 2.11. DC signal.

Discrete composite frequency (DSF) signals are DC signals in which each pulse is replaced by a noise-like signal.

On fig. 2.12. a video-frequency FM signal is shown, the individual parts of which are transmitted at different carrier frequencies.

Rice. 2.12. DCH signal.

2.4 Derived signal systems

A derivative signal is a signal that results from the multiplication of two signals. In the case of PM signals, the multiplication must be carried out element by element or, as it is more commonly called, symbol by symbol. A system composed of derivative signals is called a derivative. Among derivative systems, systems constructed as follows are of particular importance. As a basis, some system of signals is used, the correlation properties of which do not fully meet the requirements for CF, but which has certain advantages in terms of ease of formation and processing. Such a system is called the original. Then a signal is selected that has certain properties. Such a signal is called generating. Multiplying the generating signal by each signal of the original system, we obtain a derivative system. The generating signal should be chosen so that the derived system is really better than the original one, i.e. to have good correlation properties. The complex envelope of the derivative signal S μ m (t) is equal to the product of the complex envelopes of the original signals U m (t) and the generating signal V μ (t), i.e. S μ m (t)= U m (t) V μ (t). If the indices change within m=1..M, μ=1..H, then the volume of the derivative signal system is L=MH.

The choice of generating signals is determined by a number of factors, including the original system. If the original system signals are broadband, then the producing signal may be broadband and have small levels of side peaks of the uncertainty function close to the rms value. If the signals of the original system are narrow-band, then it suffices to fulfill the inequality F V >>F U (F V is the width of the spectrum of generating signals, F U is the width of the spectrum of the original signals) and the requirement that the side peaks of the ACF be small.

Let us take the Walsh system as the initial one. In this case, the generating signals should be broadband and have good ACFs. In addition, the generating signal must have the same number of elements as the original signals, i.e. N=2 k elements, where k is an integer. These conditions are generally satisfied by non-linear sequences. Since the main requirement is the smallness of the side peaks of the ACF, the best signals with the number of elements N = 16, 32, 64 were selected in the class of nonlinear sequences. These signals are shown in fig. 2.13. On fig. 2.13. the values ​​of the number of blocks μ for each generating signal are also indicated. They are close to the optimal value μ 0 =(N+1)/2. This is a necessary condition for obtaining a good ACF with small side peaks.

Rice. 2.13. Producing FM signals.

The volume of the derivative system is equal to the volume of the Walsh system N. Derivative systems have better correlation properties than Walsh systems.

3. Modulation of complex signals

3.1 Geometric representation of signals

Consider a geometric or vector representation of signals. We define an N-dimensional orthogonal space as a space defined by a set of N linearly independent functions (ψ j (t)), called basis functions. Any function of this space can be expressed in terms of a linear combination of basis functions that must satisfy the condition

,

where the operator is called the Kronecker symbol. For non-zero constants K j the space is called orthogonal. If the basis functions are normalized so that all K j =1, the space is called orthonormal. The main orthogonality condition can be formulated as follows: each function ψ j (t) of the set of basis functions must be independent of the other functions of the set. Each function ψ j (t) must not interfere with other functions during the detection process. From a geometric point of view, all functions ψ j (t) are mutually perpendicular.

In orthogonal signal space, the Euclidean distance measure used in the detection process is most easily defined. If the waves carrying the signals do not form such a space, they can be converted into a linear combination of orthogonal signals. It can be shown that an arbitrary finite set of signals (s i (t)) (i=1…M), where each element of the set is physically realizable and has duration T, can be expressed as a linear combination of N orthogonal signals ψ 1 (t), ψ 2 ( t), …, ψ N (t), where NM, so that

where

The form of the basis (ψ j (t)) is not specified; these signals are chosen for convenience and depend on the waveform of the signal transmission. The set of such waves (s i (t)) can be considered as a set of vectors (s i )=(a i 1 , a i 2 , …,a iN ). The mutual orientation of the signal vectors describes the relationship between the signals (with respect to their phases or frequencies), and the amplitude of each set vector (s i ) is a measure of the signal energy transferred during symbol transmission time. In general, after choosing a set of N orthogonal functions, each of the transmitted signals s i (t) is completely determined by the vector of its coefficients s i =(a i 1 , a i 2 , …,a iN) i=1…M.

3.2 Phase-shift keying methods (PM2, PM4, RPM)

Phase Shift Keying (PSK) was developed early in the development of the deep space exploration program; now the PSK scheme is widely used in commercial and military communications systems. The signal in PSK modulation has the following form:

Here, the phase φ i (t) can take M discrete values, usually defined as follows:

by the most simple example phase shift keying is binary phase shift keying (PM2). Parameter E is symbol energy, T is symbol transmission time. The operation of the modulation circuit is to shift the phase of the modulated signal s i (t) by one of two values, zero or π (180 0). A typical view of the PM2 signal is shown in fig. 3.1.a), where characteristic sharp phase changes are clearly visible during the transition between symbols; if the modulated data stream consists of alternating zeros and ones, such abrupt changes will occur at each transition. The modulated signal can be represented as a vector on a graph in polar coordinates; the length of the vector corresponds to the amplitude of the signal, and its orientation in the general M-ary case corresponds to the phase of the signal relative to other M - 1 signals of the set. When modulating FM2 (Fig. 3.1.b)) the vector representation gives two antiphase (180 0) vectors. Sets of signals that can be represented by such out-of-phase vectors are called antipodes.

Rice. 3.1. Binary phase shift keying.


Another example of phase shift keying is PM4 modulation (M=4). With PM4 modulation, the parameter E is the energy of two symbols, the time T is the transmission time of two symbols. The phase of the modulated signal takes one of four possible values: 0, π/2, π, 3π/2. In vector representation, the FM4 signal has the form shown in Fig. 3.2.

Rice. 3.2. FM4 signal in vector representation.

Let's consider another type of phase shift keying - relative phase shift keying (RPK) or differential phase shift keying (DPSK). The name differential phase shift keying requires some explanation, since two different aspects of the modulation/demodulation process are associated with the word "differential": the encoding procedure and the detection procedure. The term "differential encoding" is used when the encoding of binary characters is determined not by their value (ie, zero or one), but by whether the character is the same as or different from the previous one. The term "differential coherent detection" of signals in differential PSK modulation (it is in this meaning that the name DPSK is usually used) is associated with a detection scheme, which is often referred to as non-coherent schemes, since it does not require phase matching with the received carrier.

In non-coherent systems, no attempt is made to determine the actual value of the phase of the incoming signal. Therefore, if the transmitted signal is of the form

the received signal can be described as follows.

Here α is an arbitrary constant, usually assumed to be a random variable uniformly distributed between zero and 2π, and n(t) is noise.

For coherent detection, matched filters are used; for incoherent detection, this is impossible, since in this case the output of the matched filter will depend on the unknown angle α. But if we assume that α changes slowly with respect to an interval of two periods (2T), then the phase difference between two successive signals will not depend on α.

The basis of differential coherent signal detection in DPSK modulation is as follows. The demodulation process may use the carrier phase of the previous symbol interval as a phase reference. Its use requires differential coding of the message sequence in the transmitter, since the information is encoded by the phase difference between two successive pulses. To transmit the i-th message (i=1,2,…,M), the phase of the current signal must be shifted by φ i =2πi/M radians relative to the phase of the previous signal. In general, the detector calculates the coordinates of an incoming signal by determining its correlation with locally generated signals cosω 0 t and sinω 0 t. Then, as shown in Fig. 3.3., the detector measures the angle between the vector of the current received signal and the vector of the previous signal.

Rice. 3.3. Signal space for the DPSK scheme.

The DPSK scheme is less efficient than PSK, because in the first case, due to the correlation between signals, errors tend to propagate (to adjacent symbol times). It is worth remembering that the PSK and DPSK schemes differ in that in the first case the received signal is compared with an ideal reference signal, and in the second case two noisy signals are compared. Note that DPSK modulation produces twice as much noise as PSK modulation. Therefore, when using DPSK, you should expect twice the probability of error than in the case of PSK. The advantage of the DPSK scheme is the lower complexity of the system.

3.3 Modulation with minimal frequency shift.

One non-discontinuous modulation scheme is minimum frequency shift keying (MSK). MSK can be thought of as a special case of frequency shift keying without phase discontinuity. The MSK signal can be represented as follows.

Here, f 0 is the carrier frequency, d k =±1 represents bipolar data that is transmitted at a rate of R=1/T, and x k is the phase constant for the kth bit interval. Note that when d k =1 the transmitted frequency is f 0 +1/4T, and when d k =-1 is f 0 -1/4T. During each T-second data transmission interval, the value of x k is constant, i.e. x k =0 or π, which is dictated by the requirement of signal phase continuity at times t=kT. This requirement imposes a restriction on the phase, which can be represented by the following recursive relation for x k .

The equation for s(t) can be rewritten in the quadrature representation.

The in-phase component is denoted as ak cos(πt/2T)cos2πf 0 t, where cos2πf 0 t is the carrier, cos(πt/2T) is the sinusoidal symbol weighting, and k is the data-dependent term. Similarly, the quadrature component is b k sin(πt/2T)sin2πf 0 t, where sin2πf 0 t is the carrier quadrature term, sin(πt/2T) is the same sinusoidal symbol weighting, and b k is the information dependent term. It may seem that the values ​​a k and b k can change their value every T seconds. However, due to the requirement of phase continuity, the value of a k can change only when the function cos(πt/2T) passes through zero, and b k only when the sin(πt/2T) passes through zero. Therefore, symbol weighting in an in-phase or quadrature channel is a sinusoidal pulse with a period of 2T and a variable sign. The in-phase and quadrature components are shifted relative to each other by T seconds.

The expression for s(t) can be rewritten in a different form.

Here d I (t) and d Q (t) have the same meaning of in-phase and quadrature data streams. An MSK scheme written in this form is sometimes referred to as a precoded MSK. The graphical representation of s(t) is given in fig. 3.4. On fig. 3.4. a) and c) shows the sinusoidal weighting of the in-phase and quadrature channel pulses, here multiplying by a sinusoid gives more smooth transitions phase than in the original data representation. On fig. 3.4. b) and d) shows the modulation of the orthogonal components cos2πf 0 t and sin2πf 0 t by sinusoidal data streams. On fig. 3.4. e) the summation of the orthogonal components shown in fig. 3.4. b) and d). From the expression for s(t) and Fig.3.4. we can conclude the following: 1) the signal s(t) has a constant envelope; 2) RF carrier phase is continuous at bit transitions; 3) the signal s(t) can be considered as an FSK modulated signal with transmission frequencies f 0 +1/4T and f 0 -1/4T. Thus, the minimum tone spacing required for MSK modulation can be written as:

which is equal to half the bit rate. Note that the tone spacing required for MSK is half (1/T) the spacing required for incoherent detection of FSK modulated signals. This is because the carrier phase is known and continuous, which allows coherent demodulation of the signal.

Rice. 3.4. Minimal shift keying: a) modified in-phase bit stream; b) the product of the in-phase bit stream and the carrier; c) modified quadrature bitstream; d) the product of the quadrature bitstream and the carrier; e) MSK signal.


3.4 Quadrature modulation and its characteristics ( Q PSK , QAM )

Consider quadrature phase shift keying (QPSK). The initial data stream d k (t)=d 0 , d 1 , d 2 ,… consists of bipolar pulses, i.e. d k take the values ​​+1 or -1 (Fig. 3.5.a)), representing a binary one and a binary zero. This pulse stream is divided into in-phase stream d I (t) and quadrature - d Q (t), as shown in fig. 3.5.b).

d I (t)=d 0 , d 2 , d 4 ,… (even bits)

d Q (t)=d 1 , d 3 , d 5 ,… (odd bits)

A convenient orthogonal implementation of the QPSK signal can be obtained using amplitude modulation of the in-phase and quadrature flows on the sine and cosine functions of the carrier.

Using trigonometric identities, s(t) can be represented as follows: s(t)=cos(2πf 0 t+θ(t)). The QPSK modulator shown in Fig. 3.5.c), uses the sum of the sinusoidal and cosine terms. The stream of pulses d I (t) is used for amplitude modulation (with an amplitude of +1 or -1) cosine. This is equivalent to shifting the phase of the cosine wave by 0 or π; therefore, the result is a BPSK signal. Similarly, the pulse stream d Q (t) modulates a sinusoid, which gives a BPSK signal orthogonal to the previous one. When these two orthogonal carrier components are summed, a QPSK signal is obtained. The value of θ(t) will correspond to one of four possible combinations of d I (t) and d Q (t) in the expression for s(t): θ(t)=0 0 , ±90 0 or 180 0 ; the resulting signal vectors are shown in the signal space in fig. 3.6. Since cos(2πf 0 t) and sin(2πf 0 t) are orthogonal, the two BPSK signals can be detected separately. QPSK has a number of advantages over BPSK: with QPSK modulation, one pulse transmits two bits, then the data rate is doubled, or at the same data rate as in the BPSK scheme, half the bandwidth is used; as well as increased noise immunity, tk. pulses are twice as long and therefore more powerful than BPSK pulses.


Rice. 3.5. QPSK modulation.

Rice. 3.6. Signal space for the QPSK scheme.

Quadrature amplitude modulation (KAM, QAM) can be considered a logical extension of QPSK, since the QAM signal also consists of two independent amplitude modulated carriers.

With quadrature amplitude modulation, both the phase and amplitude of the signal change, which makes it possible to increase the number of encoded bits and at the same time significantly increase noise immunity. The quadrature representation of signals is a convenient and fairly universal means of describing them. The quadrature representation consists in expressing the oscillation as a linear combination of two orthogonal components - sinusoidal and cosine (in-phase and quadrature):


s(t)=A(t)cos(ωt + φ(t))=x(t)sinωt + y(t)cosωt, where

x(t)=A(t)(-sinφ(t)),y(t)=A(t)cosφ(t)

Such discrete modulation (keying) is carried out over two channels, on carriers shifted by 90 0 relative to each other, i.e. in quadrature (hence the name).

Let us explain the operation of the quadrature circuit using the example of the formation of four-phase FM signals (FM-4) (Fig. 3.7).

Rice. 3.7. Scheme of quadrature modulator.

Rice. 3.8. Hexadecimal signal space (QAM-16).

The initial sequence of binary symbols of duration T is divided by a shift register into odd pulses y, which are fed into the quadrature channel (cosωt), and even pulses x, which enter the in-phase channel (sinωt). Both sequences of pulses are fed to the inputs of the corresponding shapers of manipulated pulses, at the outputs of which sequences of bipolar pulses x(t) and y(t) with an amplitude of ±U m and a duration of 2T are formed. Pulses x(t) and y(t) arrive at the inputs of channel multipliers, at the outputs of which two-phase (0, π) FM oscillations are formed. After summing, they form the FM-4 signal.

On fig. 3.8. 2D signal space and a set of hexadecimal QAM-modulated signal vectors depicted by dots arranged in a rectangular array are shown.

From fig. 3.8. it can be seen that the distance between the signal vectors in the signal space with QAM is greater than with QPSK, therefore, QAM is more noise-immune compared to QPSK,

3.5 Implementation of quadrature modems

The modem is designed to transmit / receive information via conventional telephone wires. In this sense, the modem acts as an interface between the computer and the telephone network. Its main task is to convert the transmitted information to a form acceptable for transmission over telephone channels, and to convert the received information to a form acceptable to a computer. As you know, a computer is capable of processing and transmitting information in binary code, that is, in the form of a sequence of logical zeros and ones, called bits. A logic one can be assigned a high voltage level, and a logic zero can be assigned a low voltage level. When transmitting information over telephone wires, it is necessary that the characteristics of the transmitted electrical signals (power, spectral composition, etc.) meet the requirements of the receiving equipment of the exchange. One of the main requirements is that the signal spectrum should be in the range from 300 to 3400 Hz, that is, it should have a width of no more than 3100 Hz. In order to satisfy this and many other requirements, the data is subjected to appropriate encoding, which, in fact, is handled by the modem. There are several ways of possible encoding, in which data can be transmitted over subscriber switched channels. These methods differ from each other, both in terms of transmission speed and noise immunity. At the same time, regardless of the encoding method, data is transmitted via subscriber channels only in analog form. This means that a sinusoidal carrier signal is used to transmit information, which is subjected to analog modulation. The use of analog modulation results in a much smaller spectrum at a constant bit rate. Analog modulation is a physical coding method in which information is encoded by changing the amplitude, frequency, and phase of a sinusoidal carrier frequency signal. There are several basic methods of analog modulation: amplitude, frequency and relative phase. Modems use the listed modulation methods, but not individually, but all together. For example, amplitude modulation can be used in conjunction with phase modulation (amplitude-phase modulation). The main problem that arises when transmitting information over subscriber channels is an increase in speed. The speed is limited by the spectral bandwidth of the communication channel. However, there is a way to significantly increase the rate of information transmission without increasing the width of the signal spectrum. The main idea of ​​this method is to use multiposition coding. The sequence of data bits is divided into groups (symbols), each of which is associated with some discrete state of the signal. For example, using 16 different signal states (they can differ from each other, both in amplitude and in phase), it is possible to encode all possible combinations for sequences of 4 bits. Accordingly, 32 discrete states will encode a group of five bits in one state. In practice, to increase the information transfer rate, mainly multi-position amplitude-phase modulation is used with several possible values ​​​​of the amplitude levels and phase shift of the signal. This type of modulation is called quadrature amplitude modulation (QAM). In the case of QAM, the signal states are conveniently depicted on the signal plane. Each point of the signal plane has two coordinates: the amplitude and phase of the signal and is an encoded combination of a bit sequence. To improve the noise immunity of quadrature amplitude modulation, the so-called Trellis modulation (Trellis Code Modulation, TCM) or, in other words, trellis coding, can be used. With trellis modulation, one extra trellis bit is added to each group of bits transmitted in one discrete signal state. If, for example, the information bits are divided into groups of 4 bits (a total of 16 different combinations are possible), then 16 signal points are placed in the signal plane. Adding a fifth trellis bit will result in 32 possible combinations, i.e. the number of signal points will double. However, not all combinations of bits are allowed, that is, they make sense. This is the idea of ​​trellis coding. The value of the added trellis bit is determined by a special algorithm. The added trellis bit is calculated by a special encoder. On the receiving modem, a special decoder, the so-called Viterbi decoder, is designed to analyze incoming bit sequences. If the received sequences are legal, then the transmission is considered to be error-free and the trellis bit is simply removed. If among the received sequences there are forbidden sequences, then using a special algorithm, the Viterbi decoder finds the most suitable allowed sequence, thus correcting transmission errors. So, the meaning of trellis coding is to increase the noise immunity of the transmission at the cost of a relatively small redundancy. The use of trellis coding makes it possible mainly to protect from entanglement precisely the points adjacent in the signal space, which are just the most prone to the possibility of "entangling" under the influence of interference.


4. Characteristics of signal reception in telecommunication systems

4.1 Discrimination error probabilities M known signals

Signal detection in radio electronics is understood as an analysis of the received oscillation y(t), culminating in a decision on the presence or absence of some useful component in it, which is called a signal. Distinguishing M signals is defined as an analysis of the received fluctuation y(t), ending with a decision about which of the M signals belonging to the pre-specified set S(s 0 (t), s 1 (t), ..., s M -1 ( t)) is present in y(t). Signal detection is a special case of distinguishing two signals, one of which is equal to zero over the entire observation interval.

Let the observed fluctuation y(t) be the realization of a random process that has a distribution W y , i.e. n-dimensional probability density (PW) W(y) [or PW functional W(y(t))] belonging to one of M non-overlapping classes W i (W i ∩ W k =Ø, i≠k, i, k= 0, 1, …, M-1). It is necessary, after observing the implementation of y(t), to decide which of the classes belongs to W y . The assumption that W y W i is called the hypothesis H i: W y W i . Decisions that are the result of testing hypotheses will be denoted by , where i(0, 1, …, M-1) is the number of the hypothesis, the truth of which is declared by the decision. The analyzed oscillation y(t) is the result of the interaction of the signal s i (t) present in it with an interfering random process (interference, noise) x(t): y(t)=F. Which of the M possible signals is present in y(t) determines the PV of the ensemble to which y(t) belongs, so that each s i (t) corresponds to some class W i of distributions of the ensemble represented by y(t). Thus, the hypotheses H i are treated as assumptions about the presence of the i-th (and only the i-th) signal in y(t). In this case, the solutions , one of which is the result of the discrimination procedure, are statements that the received oscillation contains exactly the i-th signal. Hypotheses H i correspond to classes W i . A hypothesis H i is called simple if the class W i contains one and only one distribution. Any other hypothesis is called complex. M complex hypotheses are called parametric if the classes corresponding to them differ from each other only in the values ​​of a finite number of parameters of the same distribution described by a known law. Otherwise, the hypotheses are called parametric.

Consider distinguishing M deterministic non-zero signals of the same energy. In this case, the rule of maximum likelihood (ML) will be taken as the basis

optimal in the case when the quality criterion is the sum of the conditional error probabilities, or the total error probability with equal a posteriori probabilities of all signals p i =1/M.

For an arbitrary M, a discriminator adhering to the MP rule considers the signal present in y(t) to be the least distant from y(t) in the sense of the Euclidean distance or, which is equivalent for the same signal energies, having the maximum correlation with y(t) . If we consider signals s 0 (t), s 1 (t), ..., s M -1 (t) as a bundle of vectors located in the M-dimensional space, then in order to reduce the probability of confusing the i-th signal with k -th, it is necessary to “spread” the i-th and k-th vectors as much as possible. Thus, the optimal choice of M deterministic signals is reduced to finding such a configuration of the beam M of vectors, in which the minimum Euclidean distance between a pair of vectors would be maximum: mind ik =max (i≠k). Since when the energies are equal, i.e. vector lengths

where ρ ik is the correlation coefficient of the i-th and k-th signals, E is the signal energy, then the requirement for the maximum minimum distance is identical to the condition for the minimum of the maximum correlation coefficient in the set of signals S(s 0 (t), s 1 (t), ..., s M -1 (t)). The maximum achievable minimum of the maximum correlation coefficient is established quite easily. Summing up ρ ik over all i and k, we obtain

where the inequality follows from the non-negativity of the square under the integral. In addition, in the sum on the left, M terms for i=k are equal to one, and the remaining M(M-1) is not more than ρ max =max ρ ik (i≠k). Therefore M+M(M-1)ρ max ≥0 and ρ max ≥-1/(M-1).

A configuration of M vectors in which the cosine of the angle between any pair of vectors is -1/(M-1) is called a regular simplex. If these vectors are taken as M signals, then the resulting deterministic ensemble, with the equiprobability of all s i (t), will provide a minimum of the total error probability P osh, which solves the problem of the optimal choice of M signals. When M>>1, the ratio -1/(M-1)≈0 is fulfilled, and therefore, with a large number of distinguishable signals, the orthogonal ensemble practically does not lose to the simplex one in the value of P osh.

The sequence of derivation of the exact expression for the error probability of distinguishing M signals with arbitrary ρ ik is as follows. The probability density (PD) of a system of random variables z 0 , z 1 , …, z M -1 is an M-dimensional normal law, to set which it is enough to know the averages of all z i and their correlation matrix. For the averages, if the hypothesis H l is true, we have . Correlation same i-th moment and the kth correlation is equal to N 0 Eρ ik /2. After the M-dimensional PV is found, its M-fold integral over the area z l ≥z i , i=0, 1, ..., M-1, allows you to get the probability of a correct solution under the condition that H l is true. The sum of such probabilities, divided by M (taking into account the equiprobability of the signals), will be the total probability of the correct decision P pr, associated with P osh by the obvious equality P osh \u003d 1-P o. single. So, for any equally correlated (equidistant) signals (ρ ik =ρ, i≠k)

In practical calculations, this expression is rarely used because of the need for numerical integration. Its upper estimate is useful, for deriving which we assume that the hypothesis H l is true. In this case, an error always occurs when at least one of the events z i >z l , i≠l is true. Its probability P osh l , equal to the probability of combining events z i >z l , i≠l, according to the probability addition theorem,

and, by Boole's inequality, is at most the first sum on the right. Since each term of this sum is the probability of confusing two signals, then for equidistant signals

Here is the signal-to-noise ratio at the output of the filter, consistent with s i (t) under the hypothesis H i , - the probability of confusing two signals. With equiprobable signals (p i =1/M) we come to the so-called additive boundary of the total error probability

The use of this expression is justified, on the one hand, by the asymptotic convergence of its right side and P br as the requirements for the quality of discrimination increase (P br → 0), and on the other hand, by choosing the necessary signal energy ( minimum value q) based on the right side of the expression, the developer always acts with a known reinsurance, ensuring that the actual probability of error is kept below the figure accepted by him in the calculation.

4.2 Discrimination error probabilities M fluctuating signals

Far from always the observer is a priori aware of the distinguishable signals in detail. More often, he does not know in advance not only the number of the signal present in the analyzed implementation, but also the values ​​of any parameters (amplitude, frequency, phase, etc.) of each of the M possible signals. In this case, the signals themselves are no longer deterministic, since their parameters are not set; the corresponding discrimination problem is called the discrimination of signals with unknown parameters.

Let us consider the solution of this problem using the example of distinguishing signals with random initial phases. Such signals are described by the model

s i (t; φ)=Re( i (t)exp),

where f 0 is the known center frequency; φ is a random initial phase with a priori PV W 0 (φ); (t) =S(t)e jγ (t) is the complex envelope of the signal s(t), which is the realization of s(t; φ) at φ=0: s(t)=s(t; 0); S(t) and γ(t) are known laws of amplitude and angle modulation. The application of the ML rule must be preceded by the calculation of the likelihood function (functional) W(y(t)|H i), i.e. averaging the FP W(y(t)|H i , φ) constructed for deterministic signals with a fixed phase φ over all its possible values, taking into account the a priori SW W 0 (φ). With a uniform phase PV W 0 (φ)=1/(2π), |φ|≤π, taking into account the equality of the energies of all distinguishable signals, W(y(t)|H i) is a modified zero-order Bessel function:

where c is a coefficient containing factors that do not depend on i, and is the correlation modulus of the complex envelopes of the received oscillation y(t) and the i-th signal. The monotonicity of the function I 0 ( ) on the positive semiaxis allows us to pass to the sufficient statistics Z i and write the MT rule in the form

Thus, the optimal discriminator of M signals of equal energy with random initial phases must calculate all M values ​​of Z i and, if the maximum of them is Z k , make a decision about the presence of the k-th signal in y(t). This means that the signal contained in the observed oscillation y(t) is the one whose complex envelope has the highest absolute correlation with the complex envelope y(t).

Exact formulas for the error probabilities of distinguishing M arbitrary signals are quite cumbersome even for M=2, however, in applications, ensembles of signals that are orthogonal in the enhanced sense are more common in applications. The latter means that any two noncoinciding signals s i (t; φ i), s k (t; φ k) are orthogonal for any values ​​of the initial phases:

∫s i (t; φ i)s k (t; φ k)dt=0 for any φ i , φ k and i≠k,

or, equivalently, the deterministic complex envelopes of these signals are orthogonal:

.

The orthogonality condition in a strong sense is more stringent than the usual orthogonality requirement that appeared earlier in application to deterministic signals. So, two segments of the cosine curve shifted by an angle of ±π/2, being orthogonal in the usual sense, are not orthogonal when the phase shift changes, i.e. in an enhanced sense. At the same time, signals that do not overlap in time or spectrum are also orthogonal in an enhanced sense.

If we first turn to the distinction between two signals, it is easy to understand that the opposite pair, minimizing P osh in the class of deterministic signals, is unacceptable in problems where the initial phases of the signals are random. Indeed, the only feature by which opposite signals are distinguished is the sign, i.e. the presence or absence of the term π in the initial phase. However, when before entering the discriminator each of the signals acquires a random phase shift, attempts to use the initial phase as a characteristic feature of the signal are meaningless, and the discriminator has to get rid of the non-informative value φ. Thus, we can conclude that in the class M≥2 of signals with random phases, simplex ensembles do not have optimal properties. It is the ensembles of signals that are orthogonal in the enhanced sense that turn out to be optimal: each of these signals causes a response at the output of only one of the filters of the receiving circuit, and therefore the mixing of the i-th signal with the k-th one will occur only if the noise envelope at the output k -th matched filter (SF) will have a value exceeding the value of the envelope of the sum of the signal with noise at the output of the i-th SF. Violation of the orthogonality condition in the enhanced sense will lead to a reaction to the i-th signal at the output not only of the i-th, but also of other SFs, for example, the k-th, resulting in an overshoot of the envelope at the output of the k-th SF, greater than the value of Z i , becomes more likely.

To find the probability of confusing p 01 s 0 (t; φ) with s 1 (t; φ) when distinguishing two signals, it is necessary to integrate the joint PV Z 0 , Z 1 under the hypothesis H 0 W(Z 0 , Z 1 |H 0) over the area Z 1 >Z 0 . For signals that are orthogonal in the amplified sense, the quantities Z 0 and Z 1 are independent, therefore W(Z 0 , Z 1 |H 0)=W(Z 0 |H 0)W(Z 1 |H 0). One-dimensional PVs Z 0 and Z 1 are known: if H 0 Z 0 is true, as the envelope of the sum of the signal with noise, it has a generalized Rayleigh PV; Z 1 as the noise only envelope is a Rayleigh random variable. Multiplying these PVs, after integrating the resulting PV W(Z 0 , Z 1 |H 0) and taking into account the obvious equality p 01 =p 10 for the total error probability of distinguishing two equally probable orthogonal in the enhanced sense signals with random phases, we obtain

Repetition of the reasoning of paragraph 4.2. (for deterministic signals) leads to an additive boundary

which, as a rule, is used to estimate the error probability if the number of equally probable signals, orthogonal in the enhanced sense, is M≥2.

4.3 Calculation of discrimination errors M signals with unknown non-energy parameters

Consider the problem of distinguishing "M" orthogonal signals with an unknown time position in asynchronous communication systems with code division of channels. The decision about the presence of a signal in the channel is made using the maximum likelihood method. Let us find the probability of discrimination error, taking into account noise emissions on the interval of possible time delays of the signals.

Let's assume that there are "M" subscribers of the communication system, each of which uses its own signal. The greatest noise immunity in the transmission of information under such conditions is provided by simplex signals. When M>>1, the noise immunity of such a system of signals practically coincides with the noise immunity of a system of orthogonal signals, for which

Here E kf is the energy of the signal f k . The condition of orthogonality, which can be called "orthogonality at a point", in practice requires a system of common time to organize synchronous communication. In asynchronous systems, signals orthogonal in the amplified sense are used, for which, for all values ​​of τ k and τ m

If R km (τ k , τ m)<0.25 – 0.3, то можно считать ансамбль сигналов практически удовлетворяющим условию ортогональности.

We will consider a system of complex signals (f k (t)), k=1…M, orthogonal with an arbitrary shift. Among complex signals, phase-shift keyed (PM) signals with a complex envelope of the form

where a i is the sequence code, u 0 (t) is the shape of the elementary parcel envelope, Δ is its duration. In the case of a rectangular shape of the elementary parcel envelope, the autocorrelation function (ACF) has the form:

Here R 0 (τ)=(1-|τ|/Δ). In the vicinity of the ACF maximum R(τ)= R 0 (τ)=(1-|τ|/Δ). At the receiver input, after passing through the multipath channel, the useful signal can be written as

δ n is the relative delay of the signal along the beam with number n, τ is the unknown time of arrival, which is within the interval . ε n =A n /A 0 is the relative amplitude of the "n"-th beam, the parameter ν has the meaning of the number of additional propagation beams. Relative delays δ n >Δ, i.e. the beams are separated when processing a complex signal. When ν=0, the signal has the form s(t)=A 0 f(t-τ 0).

Consider the processing algorithm. The receiver receives a mixture

x(t)=s k (t-τ 0k)+η(t), (t),

where s k (t) is one of the possible signals, k=1…M, τ 0 k is the time delay of the signal, η(t) is white Gaussian noise with zero mean and power spectral density N 0 /2. It is necessary to make a decision which of the M possible signals is present at the input of the receiver. Consider a receiver without multipath compensation. The linear part of such a receiver contains M channels in which statistics of the form

The expression for L k (τ k) can be rewritten in a more convenient form for analysis

Here and in the following formulas, the index k is omitted for brevity if the characteristics of one channel are being studied, z 0 2 =2A 0 2 E f /N 0 is the signal-to-noise power ratio, S(τ-τ 0)=∫f(t-τ ) f(t-τ 0)dt/E f is the normalized signal function, N(τ)=∫n(t)f(t-τ)dt is the normalized noise function with zero mean, unit variance and correlation function =S(τ"-τ""). The envelope of the signal function S(τ-τ 0) is the ACF.

According to the maximum likelihood algorithm, the decision in favor of the signal with number m is made if supL m (τ m)≥supL k (τ k). To find the probabilities of correct and incorrect decisions according to this rule, it is necessary to calculate the distribution of the absolute maxima of the processes L(τ) on the interval [Т 1 ,Т 2 ].

Let us consider a method for calculating the error probability of distinguishing M signals with unknown parameters in the case of single-beam propagation of signals (or in the scheme of optimal signal summation). Let us denote by H k =supL k (τ k) the value of the absolute maximum statistics at the output of the k-th channel of the receiver. We write the joint distribution of random variables (H 1 ,H 2 ,..H M ) as w(u 1 ,u 2 ,..u M). The condition of orthogonality for signals f k (t) in the statistical sense means the independence of random variables H k , k=1..M. Then the probability of a correct solution using the maximum likelihood algorithm can be written as

If we take into account the condition of orthogonality of the system of signals (s k (t)), then

Let us assume that the system of signals (s k (t)) has the same energy, that is, z 0 m =z 0 k =z 0 . Then the formulas for H m and H k can be rewritten as


The distribution function of the absolute maximum h k of the implementation of the Gaussian process with the correlation function R(τ) can be approximated by the formula

ξ=(T 2 -T 1)/Δ is the reduced length of the a priori interval [T 1 ,T 2 ], which has the meaning of the resolution number of PM signals in this interval. The approximation is asymptotically exact as ξ→∞, u→∞. For finite values ​​of ξ and u, one can use a more accurate approximation

Probability integral. For ξ>>1 and z 0 >>1, the absolute maximum distribution function h m can be written as F m (u)=F s (u)F N (u)≈Φ(u-z 0)F N (u). Substituting the expressions F N (u) and F m (u) into the relation for P rights, we obtain after appropriate transformations

The first term corresponds to the a priori probability of a correct solution for M equally probable events. The second term determines the change in probability due to the decision. As z 0 →∞, the integral in the expression for P is right tends to 1 and, accordingly, P is right →1.

The total error probability of distinguishing M signals with unknown parameters is equal to

It can be seen from the formulas that with an increase in the number of distinguishable signals, the probability of a decision error P e (z 0) increases. With an increase in the a priori interval of time delays of signals ξ, the probability of discrimination error P e (z 0) increases significantly.


4.4 Comparison of synchronous and asynchronous communication systems

Typically, when considering the performance of a receiver or demodulator, some level of signal synchronization is assumed. For example, in coherent phase demodulation (PSK scheme), it is assumed that the receiver can generate reference signals whose phase is identical (possibly up to a constant offset) to the phase of the transmitter signal alphabet elements. Then, in the process of deciding on the value of the received symbol (based on the maximum likelihood principle), the reference signals are compared with the incoming ones.

When generating such reference signals, the receiver must be synchronized with the received carrier. This means that the phase of the incoming carrier and its copy at the receiver must match. In other words, if no information is encoded on the incoming carrier, the incoming carrier and its copy at the receiver will pass through zero at the same time. This process is called phase locked loop (this is a condition that must be met as closely as possible if we want to accurately demodulate coherently modulated signals in the receiver). As a result of phase locked loop, the local oscillator of the receiver is synchronized in frequency and phase with the received signal. If the carrier signal modulates directly not the carrier, but the subcarrier, both the carrier phase and the subcarrier phase need to be determined. If the transmitter does not perform carrier-subcarrier phase synchronization (which it usually does), the receiver will be required to generate a copy of the subcarrier, with the phase control of the subcarrier copy being separate from the phase control of the copy carrier. This allows the receiver to obtain phase lock on both the carrier and the subcarrier.

In addition, it is assumed that the receiver knows exactly where an incoming character starts and where it ends. This information is needed to know the appropriate symbol integration interval - the energy integration interval before deciding on the symbol value. Obviously, if the receiver integrates over an interval of inappropriate length, or over an interval spanning two symbols, the ability to make an accurate decision will be reduced.

It can be seen that symbol and phase synchronization have in common that both involve making a copy of part of the faithful signal in the receiver. For phase lock, this will be an exact copy of the carrier. For a symbolic one, this is a meander with a zero crossing simultaneously with the transition of the incoming signal between symbols. A receiver capable of doing this is said to have symbol timing. Since there are typically a very large number of carrier periods per symbol period, this second level of synchronization is much coarser than phase synchronization and is usually performed using a different scheme than that used in phase synchronization.

Many communication systems require an even higher level of synchronization, commonly referred to as frame synchronization. Frame synchronization is required when information is delivered in blocks, or messages containing a fixed number of characters. This occurs, for example, when a block code is used to implement a forward error protection scheme, or if the communication channel is time-divisional and is used by multiple users (TDMA technology). With block coding, the decoder must know the location of the boundaries between the code words, which is necessary for the correct decoding of the message. When using a time division channel, one needs to know the location of the boundaries between the users of the channel, which is necessary for the correct direction of information. Like symbol sync, framing is equivalent to being able to generate a square wave at a frame rate with zero transitions coinciding with transitions from one frame to another.

Most digital communications systems using coherent modulation require all three levels of synchronization: phase, symbol, and frame. Non-coherent modulation systems typically require only symbol and frame synchronization; since the modulation is non-coherent, precise phase synchronization is not required. In addition, incoherent systems require frequency synchronization. Frequency synchronization differs from phase synchronization in that the copy of the carrier generated by the receiver may have arbitrary phase shifts from the received carrier. The structure of the receiver can be simplified if there is no requirement to determine the exact value of the phase of the incoming carrier. Unfortunately, this simplification entails a deterioration in the dependence of the reliability of the transmission on the signal-to-noise ratio.

Until now, the focus of discussion has been the receiving end of the communication channel. However, sometimes the transmitter takes a more active role in synchronization - it changes the timing and frequency of its transmissions to match the receiver's expectations. An example of this is a satellite communications network where multiple ground terminals send signals to a single satellite receiver. In most of these cases, the transmitter uses the return link from the receiver to determine timing accuracy. Therefore, two-way communication or a network is often required for transmitter synchronization to succeed. For this reason, transmitter timing is often referred to as network timing.

The need to synchronize the receiver is associated with certain costs. Each additional level of synchronization implies a greater cost to the system. The most obvious investment of money is the need for additional software or hardware for the receiver to receive and maintain synchronization. Also, and less obviously, we sometimes pay with the time it takes to synchronize before communication begins, or the energy required to transmit signals that will be used in the receiver to acquire and maintain synchronization. In this case, the question may arise why the designer of a communication system should consider a system design requiring high degree synchronization. Answer: improved performance and versatility.

Consider a typical commercial analog AM radio, which can be an important part of a broadcast communication system including a central transmitter and multiple receivers. This system communications are out of sync. At the same time, the receiver bandwidth must be wide enough to include not only the information signal, but also any carrier fluctuations due to the Doppler effect or drift of the transmitter reference frequency. This transmitter bandwidth requirement means that additional noise energy is delivered to the detector in excess of the energy theoretically required to transmit information. Slightly more sophisticated receivers containing a carrier frequency tracking system can include a narrow band pass filter centered on the carrier, which will significantly reduce noise energy and increase the received signal-to-noise ratio. Therefore, although conventional radio receivers are quite suitable for receiving signals from large transmitters at a distance of several tens of kilometers, they may be incapacitated under lesser quality conditions.

For digital communications, trade-offs between performance and receiver complexity are often considered when choosing a modulation. The simplest digital receivers include those designed for use with binary FSK with non-coherent detection. The only requirement is bit synchronization and frequency tracking. However, if you choose coherent BPSK as the modulation, you can get the same bit error probability, but with a lower signal-to-noise ratio (approximately 4 dB). The disadvantage of BPSK modulation is that the receiver requires precise phase tracking, which can be a difficult design problem if the signals have high Doppler rates or are fading.

Another trade-off between cost and performance involves error correction coding. Using suitable methods error protection can significantly improve performance. At the same time, the cost in terms of receiver complexity can be high. Proper operation of a block decoder requires that the receiver achieve block sync, frame sync, or message sync. This procedure is in addition to the normal decoding procedure, although there are certain error correction codes that have built-in block synchronization. Convolutional codes also require some additional synchronization to get optimal performance. Although performance analysis of convolutional codes often assumes an infinite length of the input sequence, in practice this is not the case. Therefore, to ensure a minimum error probability, the decoder must know the initial state (usually all zeros) from which the information sequence begins, the final state, and the time to reach the final state. Knowing the end of the initial state and reaching the final state is equivalent to the presence of frame synchronization. In addition, the decoder must know how to group the channel symbols to make a split decision. This requirement also applies to synchronization.

The above discussion of trade-offs has been in terms of the relationship between performance and complexity of individual channels and receivers. It is worth noting that the ability to synchronize also has significant potential implications for system efficiency and versatility. Frame synchronization allows you to use advanced, generic methods multiple access, similar to demand-based multiple access (DAMA) schemes. In addition, the use of spread spectrum techniques, both multiple access schemes and interference suppression schemes, require a high level of system synchronization. These technologies offer the possibility of creating very versatile systems, which is a very important feature when changing the system or when exposed to intentional or unintentional interference from various external sources.

Conclusion

The first section of my work describes the principles of building wireless telecommunication communication systems: a scheme for building a cellular communication system is given, methods for separating subscribers in cellular communication are indicated and the advantages (confidentiality and noise immunity) of code separation compared to time and frequency are noted, and common standards are also considered demon wired connection DECT, Bluetooth and Wi-Fi (802.11, 802.16).

Further, the correlation and spectral properties of signals are considered and, for example, calculations of the spectra of some signals (rectangular pulse, Gaussian bell, smoothed pulse) and autocorrelation functions of Barker signals common in digital communications and Walsh functions are given, and types of complex signals for telecommunication systems are indicated.

The third chapter presents modulation methods for complex signals: phase shift keying methods, modulation with a minimum frequency shift (one of the continuous phase modulation methods), quadrature amplitude modulation; and their advantages and disadvantages are indicated.

The last part of the work contains a consideration of the error probabilities of distinguishing M known and M fluctuating signals against the background of noise, as well as an algorithm for calculating errors in distinguishing M orthogonal signals with an unknown time position in asynchronous code division communication systems.


Bibliography:

1. Ratynsky M.V. Fundamentals of cellular communications / Ed. D. B. Zimina - M .: Radio and communication, 1998. - 248 p.

2. Sklyar B. Digital communications. Theoretical foundations and practical use, 2nd edition.: Per. from English. – M.: Williams Publishing House, 2003. – 1104 p.

3. Shakhnovich I. Modern technologies of wireless communication. Moscow: Technosfera, 2004. - 168 p.

4. Baskakov S.I. Radio circuits and signals: Proc. for universities on special "Radio engineering". - 3rd ed., revised. and additional - M .: Higher. school, 2000. - 462 p.

5. Noise-like signals in information transmission systems. Ed. prof. V.B. Pestryakova. M., "Owls. radio”, 1973. – 424 p.

6. Varakin L.E. Communication systems with noise-like signals. - M.: Radio and communication, 1985. - 384 p.

7. Vishnevsky V.M., Lyakhov A.I., Portnoy S.L., Shakhnovich I.V. Broadband wireless networks transfer of information. Moscow: Technosphere, 2005. - 592 p.

8. Radchenko Yu.S., Radchenko T.A. Efficiency of code separation of signals with unknown time of arrival. Proceedings of the 5th int. conf. "Radar, navigation, communications" - RLNC-99, Voronezh, 1999, v.1, p. 507-514.

9. Radio engineering systems: Proc. for universities on special "Radio Engineering" / Yu.P. Grishin, V.P. Ipatov, Yu.M. Kazarinov and others; Ed. Yu.M. Kazarinov. - M .: Higher. school, 1990. - 469 p.

Timely transmission of information is the basis for the stable functioning of many industries and agriculture.

The modern information society actively uses various telecommunication systems to exchange a large amount of information in a short time.

Modern telecommunication systems and networks

Telecommunication systems are technical means designed to transmit large amounts of information through fiber optic communication lines. As a rule, telecommunication systems are designed to serve a large number of users: from several tens of thousands to millions. The use of such a system involves the regular transmission of information in digital form between all participants in the telecommunications network.

The main feature of modern network equipment is to ensure an uninterrupted connection so that information is constantly transmitted. At the same time, periodic deterioration in the quality of communication at the time of establishing a connection, as well as periodic technical problems caused by external factors, is allowed.

Types and classification of telecommunication communication systems

Modern telecommunication systems are combined according to several main features.

Depending on the purpose, television broadcasting systems, personal communications, and computer networks are distinguished.

Depending on the technical support used to transmit information, traditional cable communication systems are distinguished, more advanced - fiber optic, as well as terrestrial and satellite.

Depending on the method of encoding the array of information, analog and digital communication channels are distinguished. The latter type has become widespread, while analog communication channels are becoming less and less in demand today.

Computer systems

Computer systems are a collection of several PCs, united in a single information field by means of cables and specialized programs.

The set of installed equipment and software is an autonomous self-regulating system that serves the enterprise as a whole.

Depending on their functions, computer system equipment is divided into:

  • service (for intermediate and backup storage of information);

  • active (to ensure timely and high-quality signaling;

  • personal devices.

To ensure the operation of the entire system, appropriate software is required, properly configured based on the needs of users.

Radio engineering and television systems

At the heart of radio communication systems are electromagnetic oscillations which are broadcast on a special radio channel. The unit of operation of the system is a signal that is converted in the transmitter and then transformed into an information message in the receiver.

The basis of the uninterrupted functioning of radio engineering systems is the communication line - the physical environment and hardware that ensure the timely and complete transmission of information.

Television systems operate on a similar principle of receiver and transmitter. Most of them use a digital signal, allowing the message to be transmitted in a higher quality.

Global telecommunications systems

Global telecommunications systems include those hardware and software that connect users regardless of their physical location on the planet. The main feature of global networks is intellectualization, which makes it easy to use network capacity with optimal efficiency, while minimizing equipment maintenance costs. There are several main types of global networks.

Digital networks with integrated modules use continuous circuit switching, while data arrays are processed in digital form. Network users have access to only some functions, the interface does not allow you to change the technical parameters on your own.

X25 networks are the oldest, most reliable and proven technologies for transferring information between an unlimited number of users. The main difference between such networks is the presence of a device for "assembling" individual blocks of transmitted information into "packets" for the fastest transmission.

Asynchronous data mode is a modern technology used for broadband networks that are based on fiber optic cables.

Optical telecommunication systems

The basis of optical telecommunication systems is a fiber optic cable that connects individual devices into a single global network.

The signals are transmitted using the infrared range of radiation, while the bandwidth of the fiber optic cable is many times higher than that of other types of equipment.

The technical characteristics of the material provide a low level of signal attenuation over long distances, which makes it possible to use the cable for communication between continents. Laid along the ocean floor, the fiber optic cable is protected from unauthorized access, since it is quite technically difficult to intercept the transmitted signals.

Multichannel telecommunication systems

A distinctive feature of such communication systems is the use of several channels for transmitting information signals.

Modern telecommunication systems use cable, waveguide, radio relay, as well as space communication lines. The encrypted signal is transmitted at a speed of several gigabits per second over vast distances.

The main advantage of multichannel systems is the provision stable operation. When one communication channel fails, the next one is automatically connected.

Users are protected from a sudden disconnection and loss of important information. These systems are based on structured cable structures.

Multiservice telecommunication systems

Multiservice telecommunication systems are a hardware and software environment designed to transmit data using packet switching technology - connecting individual blocks of information into large messages.

A feature of multiservice systems is the need to ensure the stable operation of all elements of the transport environment. As a rule, different technologies are used for data transmission, as well as voice and video information, but the infrastructure is the same. Therefore, the basic principle of building multiservice networks is universality. technological solution, with the help of which heterogeneous equipment is serviced, designed to perform various operations.

Multiservice system uses a single channel for data transmission various types. This saves money on system maintenance and hardware: a single design requires less personnel and costs.

Structure, equipment and components of telecommunication systems

At the heart of any telecommunications system are servers that store and process the information required by users.

Server rooms are small, industrially ventilated rooms that support many large hard drives.

User computers are the means of communication between the database and specific users of the information performing search queries.

The technical basis of telecommunication networks is communication lines, that is, data transmission media, which are used as fiber optic, coaxial or wireless communication channels.

Network equipment that provides data transmission and reception:

  • modems;
  • adapters;
  • routers;
  • concentrators.

Such devices complement the telecommunications system and are necessary for stable operation.

The software allows you to effectively control the operation of the installed equipment, which ensures the timely transmission of information in the required volumes.

Methods and means of measurement in telecommunication systems

Depending on the stage of implementation, three types of measurements are distinguished:

  1. Installation measurements are made after the installation of the equipment to make sure that all nodes of the telecommunications system are operational.

  2. In the course of work, it is necessary to carry out adjustment measurements that allow you to adapt the functionality of the equipment to changing environmental conditions. For example, if hardware or software is changed in a telecommunications system, it must be ensured that it continues to function fully.

  3. Control or preventive measurements are carried out regularly in order to prevent sudden breakdowns in the telecommunications network.

Fundamentals of construction and installation of telecommunication systems and networks

The main principle of building a telecommunications system of any size and purpose is to divide it into separate functional sections. The service time of each of them is reduced, the procedure for finding the place of breakdown in case of any technical malfunctions is simplified.

In addition, when installing systems, care must be taken to isolate the cable itself so that data transmission is as little dependent on external factors as possible. Modern fiber optic cables are located underground, on the ocean floor or in special corrugations, which maximally protects them from harmful effects.

Ensuring information security of telecommunication systems

The main task in building a security system in telecommunications is to prevent information leakage through separate channels. The reason for such phenomena can be both hardware damage to the transmission channel (optical fiber cable), and an attack by intruders using software tools.

In the first case, information security consists in providing high-quality cables that can withstand heavy loads and regular operation.

In the second, it is necessary to develop, implement and maintain software tools that restrict access to the resources of the telecommunications system.

Telecommunication systems of hotels

The hotel business is a whole range of services that provide comfortable accommodation for guests on the territory of the hotel. That is why the timely provision of complete and reliable information about everything that may interest guests is a guarantee of customer retention.

As a rule, telecommunication systems in hotel complexes consist of:

  • video communications;
  • computer systems;
  • software.

Thus, each guest receives the convenience of living in a room and all the necessary information.

Telecommunication systems and networks of railway transport

Unlike the hospitality industry, the main priority of telecommunications in the railway sector is the reliability of information. Therefore, telecommunication networks in railway transport are designed in such a way that all transmitted information can be quickly traced, while probable leaks are given minimal attention.

Companies serving telecommunication systems

Telecommunication systems are maintained by suppliers of equipment for conducting data communications and service companies.

Among the enterprises can be noted:

  • "Telecommunication Systems" is one of the oldest specialized companies in St. Petersburg, providing customers with services for the current repair, configuration and maintenance of information transmission systems;

  • "Stroykom-A" - a small company that provides services for the maintenance and improvement of dilapidated telecommunication systems;

  • Cryptocom is a narrow-profile company providing security in telecommunications systems of defense industry enterprises.

Manufacturers and suppliers of equipment for telecommunication systems

The following companies are engaged in the production and supply of equipment for telecommunication systems:

  • "Montair" is a provider of turnkey solutions for telecommunications systems, offering customers a wide range of server hardware.

  • Rdcam is a full-cycle company offering customers not only ready-made equipment, but also the development of engineering solutions for telecommunication systems.

  • LAN-ART is a supplier of network switching equipment and a manufacturer of communication cables.

Modern telecommunication systems and specialized communication equipment are demonstrated at the annual Sviaz exhibition.

Read our other articles:

By purpose, telecommunication systems are grouped as follows:

TV broadcasting systems;

Communication systems (including paging);

Computer networks.

By type of information transfer medium used:

Cable (traditional copper);

fiber optic;

Essential;

Satellite.

By way of information transfer:

Analog;

Digital.

Communication systems are divided by mobility into:

Stationary (traditional subscriber lines);

Movable.

Mobile communication systems are subdivided according to the principle of coverage of the service area:

On microcellular - DECT;

Cellular - NMT-450, D-AMPS, GSM, CDMA;

Trunking (macrocellular, zone) - TETRA, SmarTrunk;

Satellite.

TV broadcast systems

Broadcasting systems (TV) according to the method of signal delivery and coverage area are divided into:

Television reception networks;

- "cable" (systems of collective television reception (SKTP));

Technologies for wireless high-speed distribution of multimedia information MMDS, MVDS and LMDS;

Satellite.

Mobile communication systems

Cellular mobile communication systems (MCS), personal radio call networks (PRC) and satellite communication systems are designed to transmit data and provide mobile and stationary objects with telephone communications. Transferring data to a mobile subscriber dramatically expands its capabilities, since, in addition to telephone, it can receive telex and facsimile messages of various kinds. graphic information etc. An increase in the volume of information requires a reduction in the time for its transmission and receipt, as a result of which there is a steady increase in the production of mobile radio communications (pagers, cellular radiotelephones, satellite user terminals).

The main advantage of SPS: mobile communication allows the subscriber to receive communication services at any point within the coverage areas of terrestrial or satellite networks; thanks to advances in communication technology, small-sized universal subscriber terminals (ATs) have been created. SPS provide consumers with the opportunity to access the public telephone network (PSTN), the transmission of computer data.

Mobile communication networks include: cellular mobile communication networks (MCSN); trunking communication networks (STS); personal radio call networks (PRP); networks of personal satellite (mobile) communications.

Cellular mobile networks

Among modern telecommunication facilities, cellular radiotelephone networks are developing most rapidly. Their implementation made it possible to solve the problem of economical use of the allocated radio frequency band by transmitting messages at the same frequencies, but in different zones (cells) and to increase the throughput of telecommunication networks. They got their name in accordance with the cellular principle of organizing communications, according to which the service area is divided into cells (cells).

A cellular communication system is a complex and flexible technical system that allows for a wide variety of configuration options and a set of functions performed. It can provide the transmission of speech and other types of information. For voice transmission, in turn, the usual two-way and multilateral telephone communication (conference - with the participation of more than two subscribers in a conversation at the same time), voice mail can be implemented. When organizing a regular telephone conversation, the modes of auto redial, call waiting, call forwarding (conditional or unconditional), etc. are possible.

Modern technologies make it possible to provide SSRS subscribers with high quality of voice messages, reliability and confidentiality of communication, miniaturization of radiotelephones, and protection against unauthorized access.

Trunking networks

Trunking networks are to some extent close to cellular: they are also networks of terrestrial radiotelephone mobile communications that provide subscriber mobility within a fairly large service area. The main difference is that STSs are simpler in terms of construction principles and provide subscribers with a smaller set of services, but due to this they are cheaper than cellular ones. STS have a much lower capacity than cellular, and are fundamentally focused on departmental (corporate) mobile communications. The main use of STS is corporate (service, departmental) communication, for example, operational communications fire service with the number of exits (channels) "to the city" is much less than the number of system subscribers. The main requirements for STS are: providing communication in a given service area, regardless of the location of mobile subscribers; the possibility of interaction between individual groups of subscribers and the organization of circular communication; efficiency of communication management, including at various levels; providing communication through control centers; possibility of priority establishment of communication channels; low energy costs of the mobile station; confidentiality of conversations.

Name trunking communication comes from the English trunk (trunk) and reflects the fact that the communication trunk in such a system contains several physical (usually frequency) channels, each of which can be provided to any of the subscribers of the system. This feature distinguishes the STS from the two-way radio communication systems that preceded it, in which each subscriber had the opportunity to access only one channel, but the latter had to serve a number of subscribers in turn. STS compared with such systems have a significantly higher capacity (bandwidth) with the same indicators of quality of service.

Paging networks

Paging networks (PRP) or paging networks (paging - call) are one-way networks mobile communications, which ensure the transmission of short messages from the center of the system (from the paging terminal) to miniature subscriber receivers (pagers).

Paging networks provide a convenient and relatively cheap type of mobile communication, but with significant limitations: communication is one-way, not in real time, and only in the form of short messages. SRLs have become quite widespread in the world - in general, of the same order as cellular networks, although their prevalence in different countries differs significantly.

Mobile satellite networks

Along with the already publicly available SPS (personal radio call and cellular), satellite communication networks are developing more and more actively. The following areas of application of mobile satellite communications are relevant:

Expansion of cellular networks;

The use of satellite communications in areas where the deployment of SPS is impractical, for example, due to low population density;

The use of satellite communications in addition to existing cellular, for example, to provide roaming in case of incompatibility of standards, or in any emergency;

Fixed wireless communication in areas with low population density in the absence of SPS and wired communication;

When transmitting information on a global scale (water areas of the World Ocean, places of breaks in ground infrastructure, etc.).

In particular, when the subscriber is removed from the service area of ​​local cellular networks satellite connection plays a key role, since it has no restrictions on linking a subscriber to a specific area. In many regions of the world, the demand for mobile services can only be effectively met with the help of satellite systems.

Fiber optic networks

A fiber-optic communication line (FOCL) is a type of transmission system in which information is transmitted through optical dielectric waveguides, known as "optical fiber". A fiber-optic network is an information network, the connecting elements between the nodes of which are fiber-optic communication lines. Fiber optic network technologies, in addition to fiber optics, also cover issues related to electronic transmission equipment, its standardization, transmission protocols, network topology issues and general networking issues.

FOCL advantages: wide bandwidth, low attenuation of the light signal in the fiber, low noise level, high noise immunity, low weight and volume, high security against unauthorized access, galvanic isolation network elements, explosion and fire safety, cost-effectiveness of fiber-optic cables (FOC), long service life, remote power supply.

Disadvantages of FOCL: the cost of interface equipment (the price of optical transmitters and receivers is still quite high), the installation and maintenance of optical lines (the cost of installation, testing and support of fiber optic communication lines also remains high), the requirement for special fiber protection.

The advantages of using fiber optic communication lines are so significant that, despite the listed disadvantages of optical fiber, further prospects for the development of fiber optic communication technology in information networks are more than obvious.

Telecommunication networks represent the most complex equipment in the world. One has only to think about the telephone network, which includes more than 2 billion fixed and mobile phones with universal access. When one of these phones makes a call, the telephone network is able to connect to any other phone in the world. In addition, many other networks are connected to the telephone network. This suggests that the complexity of the global telecommunications network exceeds the complexity of any other system in the world.

Telecommunication services have a significant impact on the development of the world community. If we know the country's telephone density, then we can assess the level of its technical and economic development. In underdeveloped countries, the density of fixed (fixed) telephones does not exceed 10 telephones per 1,000 inhabitants; in developed countries, such as North America and Europe, it is approximately 500 - 600 phones per 1000 inhabitants. Economic and cultural development developing countries depends (in addition to many other factors) on the availability of efficient telecommunications services. The local area network (LAN) to which our computer is connected is connected to the LAN of other sites located throughout our university. This is necessary for the effective collaboration of various departments. We communicate daily with people in other organizations through e-mail, telephones, facsimiles and mobile phones. It happens at the scale of organizations, at the scale of the country and at the international scale.

Telecommunications play significant role in many areas of everyday life. Each of us daily uses not only telecommunications services, but also services that rely on telecommunications. Here are some examples of services that depend on telecommunications: banking, automated teller machines, e-commerce; aviation, railway, ticketing; sales, wholesale and order processing; payments with a credit card in stores; ordering hotel rooms by travel agencies; procurement of materials by industry; government operations.

Test questions:

1. The concept of a network. List the possibilities of the network.

2. In what year did the first network appear, what was it called and where?

3. Name the main components of the network.

4. List the indicators of computer networks.

5. Describe the levels of the reference model of open systems interaction.

6. Define the concepts of "protocol", "interface", "transparency", "network operating system".

7. What components does the technical support of computer networks include? Describe them.

8. Name the types of networks.

9. Give the classification of networks.

10. Describe the benefits of local area networks.

11. Describe the main hardware components of the LAN.

12. What is the difference between the "file-server" and "client-server" models?

13. Describe the cables used in most networks.

14. What technologies are used to transmit coded signals over the cable?

15. What is a transceiver? What is it for?

16. What are the advantages and types of wireless networks.

17. Describe LAN access methods

18. Give the concept of a telecommunications system.

19. List the types of telecommunication systems.

20. Describe mobile networks.


Topic 9. Internet

Part 1

TELECOMMUNICATION AND INFORMATION NETWORKS

Chapter 1 ______

TELECOMMUNICATION NETWORKS AND SYSTEMS. GENERAL PROVISIONS

List of abbreviations

GII (GII) - global information infrastructure
memory - Memory device
LS - communication line
ON - software
TS - telecommunications network
PSTN (PSTN) - public telephone network
CHNN - busy hour
ATM - asynchronous delivery method
B-ISDN - broadband integrated service digital network
FR - frame relay technology
IDN - integrated digital network
IN - intelligent communication network
IP - internet protocol
N-ISDN - narrowband integrated service digital network
PLMN - cellular communication network with mobile objects

BASIC CONCEPTS OF NETWORKS AND TELECOMMUNICATION SYSTEMS

Two features are inherent in the modern development of communication technology: the digital form of representation of all signals - regardless of what type of information is represented by these signals - speech, text, data or image; service integration, which can only be fully realized by switching communications to digital technology. There is an integration of information transmission and switching systems, the tasks of terminal devices and communication networks are redistributed in a new way. Multifunctional terminal devices are being created that differ from telephone and telegraph sets, terminal devices for visual display of data, suitable for more than one type of information. And finally, the communication network allows the transmission of voice, text information, data and images through the same connection: the user will have access to this network, regardless of the type of service, through the "communication plug".

With the help of these "revolutionary" means, the productivity and economic efficiency of labor of both entire organizations and individuals were significantly increased. The conclusion suggests itself that the unification of the efforts of three industries - the computer industry ( information technologies), consumer radio electronics (entertainment industry) and telecommunications - brought closer the achievement of the main goal - the creation of a global information infrastructure (GII, GII).



The ultimate goal of the GII is to ensure that every consumer has access to the information community.

There are certain fundamental characteristics that a GII must have in order to meet the requirements of consumers of information. These characteristics are called attributes. Proposed

For each type of information messages, a specific method of transmission in the network is traditionally used, characterized by the principle of converting a message into a telecommunication signal and the type of communications (form of communication). So, for the transmission of audio information, the accepted form of communication is telephone, for the transmission of still images, facsimile is used, for moving images, television. Data refers to a type of coded messages, the method of transmission of which is based on the representation of each information element (letter, character, digit) in the form of a code combination transmitted in the form of a signal over the network. For coded messages, the telegraph method of transmitting information and data transmission is used. Recently, the so-called "multi-media" forms of communication - multimedia (translated from English. milty- a lot of, media- medium) for the simultaneous transmission of sound, image and data.

Depending on the form of communication, telecommunication systems can be divided into systems of telephone communication, facsimile communication, television broadcasting, telegraph communication, data transmission, etc.; depending on the signal transmission medium (copper, ether, optical fiber) - to telecommunication and optical communication systems, as well as wired communication using guiding media (copper and optical cables), and wireless communication, where ether is used for signal transmission. It is necessary to emphasize what unites all these systems in the general concept of a telecommunications system:

1. The general purpose of all communication systems is to provide services to users.

2. All communication systems belong to the type of distributed systems, the main component of which is a telecommunications network that allows you to use general principles structural optimization of such systems.

3. Communication systems, like any complex systems, cannot be considered in isolation from the external environment. Under external environment understand the set of elements of any nature that exist outside the system and have certain effects on it. In relation to any communication system, such elements include users who determine the requirements for the volume of services consumed, their list, quality, and thereby affect the communication system.

It should be noted that the very concept of "system" is abstract in relation to the real object that is associated with it and can be interpreted as a model of the object. The model allows you to reflect the most important components of the object and omit minor, from the point of view of the purpose of its consideration, details. In this regard, the same object can be characterized differently by different systems, depending on the aspects of its consideration.

When considering models of most telecommunications networks and systems, the concepts of protocol and interface are widely used. A protocol is a set of rules and formats that determine the interaction of objects of the same network levels, for example, "human - human", "terminal - terminal", "computer - computer", "process - process", i.e. protocols that describe the order of interaction between users, terminals, network nodes or individual networks. In this case, the same language, the same syntactic rules and information formats should be used. The layer structure of the model allows independent development of protocols. Each layer of the model can have multiple protocols. The interaction of adjacent levels is provided by interfaces. An interface is a set of hardware and software tools used to interface devices, systems or programs. The set of means of interaction between two adjacent levels (interlevel interface) contains the rules of logical and electrical matching, as well as a detailed description of message formats.

Information networks are designed to provide users with services related to the exchange of information, its consumption, processing, storage and accumulation. An information consumer who has gained access to an information network becomes a user. Users can be both individuals and legal entities(firms, organizations, enterprises). The use of the network provides the opportunity to receive information when it is needed. An information network is understood as a set of geographically dispersed end systems that are combined into telecommunication networks and provide access for any of these systems to all network resources and their collective use. It is advisable to divide telecommunication networks according to the type of communications (telecommunication networks, optical communications, telephone communications, data transmission, rail or air communications, etc.).

The end systems of the information network can be classified as: - - terminal (terminal system), providing access to the network and its resources;

workers (server, host system), representing information and computing resources;

Administrative (management system), implementing the management of the network and its individual parts.

Information network resources are divided into information, data processing and storage, software and communication.

Informational resources - this is information and knowledge accumulated in all areas of science, culture and society, as well as products of the entertainment industry. All this is a system

tyzized in network databases with which network users interact. These resources determine the consumer value of the information network and must not only be constantly created and expanded, but also update outdated data in time.

Processing and storage resources data is determined by processor performance network computers and the amount of their storage devices (storage), as well as the time during which they are used.

Program resources are software (software) involved in the provision of services to users, as well as programs of related functions. The latter include: issuing invoices, accounting for payment for services, navigation (providing information search on the network), servicing network electronic mailboxes, organizing a bridge for teleconferencing, converting the formats of transmitted messages, cryptographic protection of information (coding and encryption), authentication ( electronic signature documents certifying their authenticity).

Communication Resources participate in the transportation of information and the redistribution of flows in the switching node. These include the capacities of communication lines, the switching capabilities of nodes, as well as the time they are occupied when a user interacts with the network. Communication resources are classified according to the type of TS: public switched telephone network, packet-switched data network, mobile communication network, television and radio broadcasting networks, integrated service digital network, etc.

Telecommunication networks are usually evaluated by a number of indicators that reflect the possibility of the efficiency of information transportation. The possibility of transferring information to the TS is related to the degree of its operability, i.e., the performance of the specified functions in the prescribed volume at the required quality level during certain period network operation or at any point in time. -> the health of the communication network is determined by the concepts of reliability and survivability. The difference between these concepts is due to the causes and factors that disrupt the normal operation of the network, and the nature of the violations.

Reliability A communication network characterizes its ability to provide communication, keeping in time the values ​​of “established quality indicators in given operating conditions. It reflects the ability to maintain the operability of a communication network under the influence, mainly, of internal factors - random failures of technical means caused by aging processes, defects in manufacturing technology or errors of maintenance personnel.

Vitality a communication network characterizes its ability to maintain full or partial operability when exposed to causes that are outside the network and lead to the destruction or significant damage to some of its elements (points and communication lines). Similar reasons can be divided into two classes: spontaneous and deliberate. Natural factors include

like an earthquake, landslides, river floods, etc., and deliberate - nuclear missile strikes, sabotage, etc.

When analyzing the throughput of a vehicle, the concepts of a call and a message are very important. A call is a request for a connection between two network users to send a message. Message- user formation converted into telecommunication signals. Given the difference between a call and a message, we can say that the call flow enters the network node or some part of it, and the message flow circulates in communication networks to transfer information to the user. The need to deliver messages from one point in the network to another can be expressed by gravity between these points. Gravity >characterizes the assessment of the need for various types communication between two points of the network and is determined by the volume of messages that must be delivered over a certain period of time from one point to another. From gravity, expressed by the volume of messages or the amount of information, you can go * gravity, expressed by the time of occupation of the communication line (LS), and from it - to the number of required 1C. Gravitation, determined by the amount of information, is convenient for a data transmission network, and determined by the number of channels occupied, it is convenient for a telephone network and various types of broadcasting networks. The channel occupation time is fought by hour occupations for a year, a day or an hour. Gravity depends on the type of information, the geographical location of users, their characteristics, economic, cultural and other relationships. It is impossible to unambiguously determine gravity, since it is influenced by a lot of factors, therefore, the accuracy of gravity estimates is usually low.

Amount of information, transmitted between two points for a certain period of time, is determined by the sum of the volumes of all messages (taking into account repeated ones) or the product of the number of transmitted messages - and the average volume of one message. The time of occupation of lines or devices, expressed in hourly occupations, With"-determines the load on these lines or devices as the product of the total number of calls received * r average duration of classes . Load intensity- this is the number of hours of employment for a certain period of time, for example, the busiest hour (PEH) is a 60-minute interval of the time during which the load on the network is greater than in any other similar period. Usually, the concept of load intensity is used, although for simplicity it is often called load. The dimensionless unit of load intensity is called the erlang. One erlang is the load intensity sinogo device continuously occupied for an hour.

In the case when the network cannot serve the incoming load, it makes sense to talk about the amount of realized load in the network. The value of the realized load is determined by the throughput of the communication network. In some cases, throughput is quantified. For example, by the value of the maximum flow of information that can be skipped between a certain pair of points. Thus, the bandwidth of the network section is determined, which is the bottleneck when dividing the network between the source and the recipient into two parts.

The flow of messages between two points is the sequence of messages transmitted from one point to another. In addition to useful information, control and signaling messages that are of no value to the user are transmitted in the network. Significantly load communication networks (without giving a useful effect) and repeated calls arising in case of failure during the initial call. The message flow is characterized by the sequence of time points of arrival of each next message. It is possible to express the flow in terms of time intervals between these moments. The type of message flow can also be described by the distribution of the durations of the devices being busy with each incoming message. All flows circulating in communication networks are divided into deterministic, random and mixed. Flows are called deterministic, the moments of arrival and the volumes of messages of which are known in advance. Such streams include almost all broadcast streams (both audio and television), regular transmissions of various reports, etc. For random streams, the moments of arrival, the volumes of individual messages and their addresses are not predetermined and are random variables described using probabilistic distributions. These streams include streams of telephone messages. Depending on the specific conditions, random flows can be very diverse, however, for most practical cases, it is possible to approximate (describe) the durations of the intervals between the arrival of two adjacent messages using known probabilistic distribution laws, which make it possible to obtain a mathematical model of the flow. A mixed flow has both deterministic and random components.

1.2. FRONTIERS OF DEVELOPMENT OF TELECOMMUNICATION TECHNOLOGIES AND COMMUNICATION SERVICES

In order to find out the prospects for the development of the National Information Infrastructure of Ukraine (NII) within the framework of the Global Information Infrastructure, it is necessary to understand how this process will proceed in the world, in industrialized countries and in Ukraine, what new information and communication technologies and services will be offered in coming years and decades.

The information revolution has become the engine of progress for the whole society. It has long been known that scientific and technological revolutions (STR) radically changed the way of life of mankind and the appearance of the world as a whole. The result of the scientific and technological revolution was a sharp increase in the population, which should be expected in the next two centuries. Many scientists working in the field of forecasting believe that three scientific and technological revolutions should take place in the 21st-22nd centuries: 1 - informational, 2 - biotechnical, 3 - quantum.

Each of these revolutions will lead to dramatic changes in the world. The information revolution will create IT, which will become the technical basis for the global information society. The biotechnical revolution will remove the problem of food supply for the population in the world, and the quantum revolution will create new efficient and safe energy sources.

The information revolution (the end of the 20th - the beginning of the 21st century) has significantly changed the face of information communications. The main factors in the development of infocommunications of the 21st century are the economy, technologies and services.

Infocommunication technologies and services are derivatives of the economy. In turn, the level of development of technologies and services depends on the level of scientific and technological progress, and their implementation - on the level of the economy and, first of all, on the solvent demand of the population for certain infocommunication services.

There are five major milestones in the historical development of communication networks and services (Figure 1.3). Each milestone has its own logic of development, interconnection with previous and subsequent stages.

In addition, each milestone depends on the level of economic development and the national characteristics of a particular state.

First Frontier- building a public telephone network (PSTN, PSTN - public Switched Telephone Network). For a long time, each state created its own national analog public telephone network. Telephone communication was recommended to the population, institutions, enterprises and compared with single service- transmission of language messages. In the future, data transmission began to be carried out over telephone networks using modems. However, even today, the telephone remains the main communication service, which brings telecom operators more than 80% of the profits.

Second Frontier- digitalization of the telephone network. To improve the quality of communication services, increase their number, increase the level of automation of control and technological equipment in industrialized countries in the 1970s, work was carried out on the digitalization of primary and secondary communication networks. Integrated digital networks were created IDN (Integral Digital Network), which provide mainly telephone services based on digital switching and transmission systems. By now, in many countries, digitalization telephone networks practically ended.

Third Frontier- service integration. The digitalization of communication networks has made it possible not only to improve the quality of services, but also to move to an increase in their number through integration. This is how the concept of a narrowband digital network with the integration of N-ISDN services was born (Narrowband Integrated Srsice Digital Network). The user (subscriber) of this network is provided with basic access (2B + D), through which information is transmitted over three digital channels: two channels AT with a transmission rate of 64 kbps and channel D at a rate of 16 kbps. two channels AT used to transmit language messages and data, channel th- for signaling and for data transmission in packet switching mode. For a user with more needs, primary access can be provided, which contains (30 B + D) channels. The concept of N-ISDN has existed for about 20 years, but has not received wide distribution in the world for several reasons. First, N-ISDN equipment is quite expensive to become mainstream; secondly, the user constantly pays for three digital channels; thirdly, the list of services /U-/50L/ exceeds the needs of the mass user. That is why service integration is starting to be replaced by the smart grid concept.

During the same period, networks with PLMN mobile systems ( public land mobil network) and data network service technologies based on circuit and packet switching: X.25, IP (Internet Protocol) , GR (Frame relay), 1R-telephony, e-mail, etc.

Fourth Frontier- smart grid /N (Intelligent Network). The history of this network is usually calculated from 1980, when the Bell System company (USA) carried out work to improve the service called "service-800". This service was mainly intended for charging for long-distance calls to the calling subscriber and has found wide application in the service and trade sectors. Since 1993, IN has been developing within the framework of the concept TINA (Telecommunication Information Networking Architecture) to maintain a client-server architecture. This network is designed to provide fast, efficient and cost-effective information services to the mass user. The necessary service is provided to the user when and at the time when he needs it. Accordingly, he is obliged to pay for the service provided during this time. Thus, the speed and efficiency of the service provide its cost-effectiveness, since if the user uses the communication channel for a much shorter period, this will allow him to reduce costs. This is the fundamental difference between the intelligent network and previous networks, namely, the flexibility and cost-effectiveness of providing services.

Fifth frontier- broadband B-ISND (Droadband Integrated Service Digital Network) pioneered the post-1980 development of multimedia services based on technology ATM (- fixed-length packet switching (53 bytes): conversational, informational and distributive search. Dialogue services provide services for the transmission of information (telephone service, speech service, video conferencing, etc.). Services information retrieval(on-demand services) enable the user to obtain information from a variety of data banks. Distribution services, with or without user control over the provision of information, can send information from one common source to an unlimited number of subscribers who have the right to access (data, text, moving and still images, sound, graphics, etc.). The practice of business communication is beginning to include not only conference calls, but also videoconferencing, allowing you to exchange information without wasting time and money on travel.

In turn, reducing the costs of the individual user for new services should increase the demand for them, that is, lead to an increase in the profits of service providers. A corresponding increase in demand for services will lead to an increase in supply necessary equipment, which will increase the profits of equipment suppliers. Thus, the flexibility of providing services using modern technologies brings together the economic interests of three parties: users, service providers and equipment suppliers.

test questions

1. Indicate the features of the development of communication technology at the present stage.

2. What is communication integration?

3. Describe the multifunctional terminal devices.

4. Define the Global Information Infrastructure.

5. What is needed to implement the concept of the Global Information Infrastructure?

6. What attributes (characteristics) should be considered when creating a Global Information Infrastructure standard?

7. Explain the principles and purpose of the Global Information Infrastructure.

8. Specify the main characteristics of the Global Information Infrastructure.

9. List the features of building an information network.

10. Explain the structure of the information network.

11. Describe the resources of the information network.

12. How are telecommunication systems divided depending on the type of communication?

13. What indicators of a telecommunication network characterize its efficiency in information transfer?

14. Define the concepts of protocol and interface in information networks.

15. What is the reliability of a communication network?

16. Explain the concept of communication survivability; list the factors on which it depends.

17. Describe the bandwidth of the telecommunications network.

18. What is a challenge?

19. What is meant in a telecommunications network by the concept of a message?

20. What parameters determine the amount of information?

21. What are the units of measurement of telephone load and its intensity.

22. What is message flow? Give an example.

23. What information is called useful? Name other types.

24. What characterizes the flow of messages?

25. Name and characterize the flows circulating in communication networks.

26. What are they called information flows, if the moment of receipt and the volume of messages are known in advance? Give an example.

27. What does the concept of "gravity" mean in a communication network?

28. Describe UNSSU, Research Institute of Ukraine, Global Information Infrastructure.

29. Explain the main milestones in the development of communication networks and services.

30. What are the features of a B-ISDN broadband network?