SlideShare ist ein Scribd-Unternehmen logo
1 von 10
2MARKS QUESTION & ANSWERS
UNIT-1 DIGITAL COMMUNICATION SYSTEM
1. Define modulation?
Modulation is a process by which some characteristics of high frequency carrier signal is varied
in accordance with the instantaneous value of the modulating signal.
2. What is correlative coding?
Correlative level coding is used to transmit a baseband signal with the signaling rate of 2Bo over
the channel of bandwidth Bo. This is made physically possible by allowing ISI in the transmitted
in controlled manner. This ISI is known to receiver. The correlative coding is implemented by
duobinary signalling and modified duobinary signalling.
3. State sampling theorem.
· If a finite –energy signal g(t) contains no frequencies higher than W hertz ,it is completely
determined by specifying its co=ordinates at a sequence of points spaced 1/2W seconds apart.
· If a finite energy signal g(t) contains no frequencies higher than W hertz, it may be
completely recovered from its co=ordinates at a sequence of points.
4. What are the degrees of modulation?
Under modulation. m<1
Critical modulation m=1
Over modulation m>1
5. What is aliasing?
The phenomenon of a high-frequency in the spectrum of the original signal g(t) seemingly taking
on the identity of a lower frequency in the spectrum of the sampled signal g(t) is called aliasing
or foldover.
6. Why do you need adaptive equalization in a switched telephone network.
In switched telephone network the distortion depends upon
1) Transmission characteristics of individual links.
2) Number of links in connection.
Hence fixed pair of transmit and receive filters will not serve the equalization problem. The
transmission characteristics keep on changing. Therefore adaptive equalization is used.
7.What are the necessity of adaptive equalization?
Ans. Most of the channels are made up of individual links in switched telephone network, the
distortion induced depends upon
1) transmission characteristics of individual links
2) number of links in connection
8. Define the principle of adaptive equalization?
Ans. The filters adapt themselves to the dispersive effects of the channel that is the cofficients of
the filters are changed contineously according to the received data. The filter cofficients are
changed in such a way that the distortion in the data is reduced
9. Define duobinary encoding?
Ans. Duobinary encoding reduces the maximum frequency of the base band signal the “word
duo” means to the double transmission capacity of the binary system
10. Write a note on correlative level coding?
Correlative level coding allows the signal scaling rate of 2Bo in the channel of bandwidth Bo this
is made physically possible by allowing ISI in the transmitted signal in controlled manner this
ISI IS KNOWN TO THE RECEIVER
11. Define the term ISI?
Ans. The presence of outputs due to other bits interference with the output of required bit . this
effect is called inter symbol interference (ISI)
12. Write the performance of data transmission system using eye pattern technique?
Ans. The width of the eye opening defines the interval over which the received wave can can be
sampled without error from inter symbol interference . The sensitivity of the system to timing
error is determined by the rate of closure of the eye as the sampling time is varied.
13. What is the necessity of equalization?
Ans. When the signal is passed through the channel distortion is introduced in terms of 1)
amplitude 2) delay this distortion creates problem of ISI. The detection of the signal also become
difficult this distraction can be compensated with the help of equalizer.
14. What is meant by prediction error?
The difference between the actual sample of the process at the time of interest and the predictor
output is called a prediction error.
15. Define delta modulation.
Delta modulation is the one-bit version of differential pulse code modulation.
16. Define adaptive delta modulation.
The performance of a delta modulator can be improved significantly by making the step size of
the modulator assume a time- varying form. In particular, during a steep segment of the input
signal the step size is increased. Conversely, when the input signal is varying slowly, the step is
reduced , In this way, the step size is adapting to the level of the signal. The resulting method is
called adaptive delta modulation (ADM).
UNIT -2 : BASEBAND FORMATTING TECHNIQUES
1. Mention the need of optimum transmitting and receiving filter in baseband data
transmission.
When binary data is transmitted over the baseband channel, noise interfaces with it. Because of
this noise interference, errors are introduced in signal detection. Optimum filter performs two
functions while receiving the noisy signal:
1) Optimum filter integrates the signal during the bit interval and checks the output at the time
instant where signal to noise ratio is maximum
2) Transfer function of the optimum filter is selected so as to maximise signal to noise ratio.
3) Optimum filter minimizes the probability of error.
2. Define ASK.
In ASK, carrier is switched on when binary 1 is to be transmitted and it is switched off when
binary D is to be transmitted ASK is also called on-off keying.
3. What is meant by DPSK?
In DPSK, the input sequence is modified. Let input sequence be d(t) and output sequence be b(t).
Sequence b(t) changes level at the beginning of each interval in which d(t)=1 and it does not
changes level when d(t)=0. When b(t) changes level, phase of the carrier is changed. And as
stated above, b(t) changes t=its level only when d(t) =1. This means phase of the carrier is
changed only if d(t)=1. Hence the technique is called Differential PSK.
4. Explain coherent detection?
In coherent detection, the local carrier generated at the receiver is phase locked with the carrier at
the transmitter. The detection is done by correlating received noisy signal and locally generated
carrier. The coherent detection is a synchronous detection.
5. What is the difference between PSK and FSK?
In PSK, phase of the carrier is switched according to input bit sequence. In FSKfrequency of the
carrier is switched according to input bit sequence. FSK needs double of the bandwidth of PSK.
6. What is meant by coherent ASK?
In coherent ASK, correlation receiver is used to detect the signal. Locally generated carrier is
correlated with incoming ASK signal. The locally generated carrier is in exact phase with the
transmitted carrier. Coherent ASK is also called as synchronous ASK.
7. What is the major advantage of coherent PSK over coherent ASK?
ASK is on-off signalling, where as the modulated carrier is continuously transmitted in PSK.
Hence peak power requirement is more ASK, whereas it is reduced in case of PSK.
8. How are the predictor coefficients determined?
For the adaptation of the predictor coefficients the least mean square
(LMS) algorithm is used.
9. Define adaptive subband coding?
It is a frequency domain coder, in which the speech signal is divided in to
number of subbands and each one is coded separately. It uses non masking
phenomenon in perception for a better speech quality. The noise shaping is done
by the adaptive bit assignment.
10. What are formant frequencies?
In the context of speech production the formant frequencies are the resonant frequencies of the
vocal tract tube. The formants depend on the shape and dimensions of the vocal tract. 32. Define
Adaptive filter? It is a nonlinear estimator that provides an estimate of some desired response
without requiring knowledge of correlation functions, where the filter coefficients are data
dependent. A popular filtering algorithm is the LMS algorithm.
11. Define data Signalling Rate.
Data signalling rate is defined as the rate measured in terms bits per second(b/s) at which data
are transmitted. Data signaling rate Rb=I/Tb Where Tb=bit duration.
12. Define modulation rate.
It is defined as the rate at which signal level is changed depending On the nature of the format
used to represent the digital data.It is measured in Bauds or symbols per second.
13. State NRZ unipolar format
In this format binary 0 is represent by no pulse and binary 1 is Represented by the positive pulse.
36. State NRZ polar format. Binary 1 is represented by a positive pulse and binary 0 is
represented by a Negative pulse.
14. State NRZ bipolar format.
Binary 0 is represented by no pulse and binary one is represented by the alternative positive and
negative pulse.
15. State Manchester format.
Binary 0 Æ The first half bit duration negative pulse and the second half Bit duration positive
pulse. Binary 1Æ first half bit duration positive pulse and the second half Bit duration negative
pulse.
UNIT – 3: BASEBAND CODING TECHNIQUES
1. Properties of matched filter.
The signal to noise ratio of the matched filter depends only upon the the ratio of the signal
energy to the psd of white noise at the filter input
1) The output signal of a matched filter is proportional to a shifted version of the autocorrelation
function of the input signal to which the filter is matched.
2. Why do we go for Gram-Schmidt Orthogonalization procedure?
Consider a message signal m. The task of transforming an incoming message mi=1,2,
..M, into
a modulated wave si(t) may be divided into separate discrete time & continuous time operations.
The justification for this separation lies in the Gram-Schmidt orthogonalization procedure which
permits the representation of any set of M energy signals, {si(t)}, as linear combinations of N
orthonormal basis functions, where N ÂŁM .
3. What is matched filter receiver ?
A filter whose impulse response is a time reversed & delayed version of some signal Æ j (t) then
it is said to be matched to Æj (t) correspondingly, the optimum receiver based on the detector is
referred to as the matched filter receiver.
4. What is maximum likelihood detector.
Maximum likelihood detector computes the metric for each transmitted message compares them
and then decides in favor of maximum. The device for implementing the decision rule
i.e; set ^m = mi if In [ fx(x/mk)] is maximum for k=i is called maximum –likelihood detector and
the decision rule is called maximum likelihood.
5. Define antipodal signals.
A pair of sinusoidal signals that differ only in a phase shift of 180 degrees are referred to as
antipodal signals.
6. Explain how QPSK differs from PSK in term of transmission bandwidth and bit
information it carries?
For a given bit rate 1/Tb, a QPSK wave requires half the transmission bandwidth of the
corresponding binary PSK wave. Equivalently for a given transmission bandwidth, a QPSK
wave carries twice as many bits of information as the corresponding binary PSK wave
7. Give the equation for average probability of symbol error for coherent binary PSK.
Average probability of signal error,
Pe = 1 / 2 erfcÖ Eb / No
8. Explain the model of bandpass digital data transmission system?
The bandpass digital data transmission system consists of source, encoder and modulator in the
transmitter. Similarly receiver, decoder and destination form the transmitter.
9. What is baseband signal receiver?
A baseband signal receiver increases the signal to noise ratio at the instant of sampling. This
reduces the probability of error. The baseband signal receiver is also called optimum receiver.
10. What is matched filter?
The matched filter is a baseband signal receiver, which works in presence of white Gaussian
noise. The impulse response of the matched response of the matched filter is matched to the
shape pf the input signal.
11. What is the value of maximum signal to noise ratio of the matched filter? When it
becomes maximum?
Maximum signal to noise ratio is the ratio of energy to psd of white noise. i.e., ρmax = E/ (N0/2)
This maximum value occurs at the end of bit duration i.e. Tb.
12. What is correlator ?
Correlator is the coherent receiver. It correlates the received noisy signal f(t) with the locally
generated replica of the unknown signal x(t). It‟s output is denoted as r(t).
13. On what factor, the error probability of matched filter depends.
Error probability is given as Pe = 1/2erfc√E/No
This equation shows that error probability depends only on energy but not on shape of the signal.
14. Bring out the difference between coherent & non coherent binary modulation scheme.
a. Coherent detection:
In this method the local carrier generated at the receiver is phase locked with the carrier at the
transmitter. Hence it is called synchronous detection
b. Non coherent detection:
In this method, the receiver carrier need not be phase locked with transmitter
carrier. Hence it is called envelope detection.
15. Write the expression for bit error rate for coherent binary FSK. Bit error rate for
coherent binary FSK is given as,
Pe = 1/2erfc√0.6E/No
16. Highlight the major difference between a QPSK & MSK signal.
MSK signal have continuous phase in all the cases, where as QPSK has phase shift of π/2 or π.
17. What is the error probability of MSK & DPSK?
Error probability of MSK: Pe = 1/2erfc√E/No
Error probability of DPSK: Pe = 1/2e-Eb/No
18. In minimum shift keying what is the relation between the signal frequencies & bit rate.
Let the bit rate be fb and the frequency of carrier be f0. The higher and lower MSK signal
frequencies are given as,
fH = f0 + fb/4
fL = f0 - fb/4
UNIT- 4: BASEBAND RECEPTION TECHNIQUES
1.What is hamming distance?
The hamming distance between two code vectors is equal to the number of elements in which
they differ. For example, let the two code words be, X = (101) and Y= (110) These two code
words differ in second and third bits. Therefore the hamming distance between X and Y is two.
2. Define code efficiency.
The code efficiency is the ratio of message bits in a block to the transmitted bits for that block by
the encoder i.e., Code efficiency= (k/n)
k=message bits
n=transmitted bits.
3. What is meant by systematic and non-systematic codes?
In a Systematic block code, message bits appear first and then check bits. In the non-systematic
code, message and check bits cannot be identified in the code vector.
4. What is meant by linear code?
A code is linear if modulo-2 sum of any two code vectors produces another code vector. This
means any code vector can be expressed as linear combination of other code vectors.
5. What are the error detection and correction capabilities of hamming codes?
The minimum distance (dmin) of hamming codes is „3‟. Hence it can be used to detect double
errors or correct single errors. Hamming codes are basically linear block codes with dmin =3.
6. What is meant by cyclic codes?
Cyclic codes are the subclasses of linear block codes. They have the property that a cyclic shift
of one codeword produces another code word.
7. How syndrome is calculated in Hamming codes and cyclic codes?
In hamming codes the syndrome is calculated as, S=YHT
Here Y is the received and HT is the transpose of parity check matrix.
8. What is BCH code?
BCH codes are most extensive and powerful error correcting cyclic codes. The decoding of BCH
codes is comparatively simpler. For any positive integer „m‟ and „t‟ (where t<2 m-1)there exists
a BCH code with following parameters:
Block length: n= 2m-1
Number of parity check bits : n-k<=mt
Minimum distance: dmin>=2t+1
9. What is RS code?
These are non binary BCH codes. The encoder for RS code operates on multiple bits
simultaneously. The (n, k) RS code takes the groups of m- bit symbols of incoming binary data
stream. It takes such „k‟ number of symbols in one block. Then the encoder acts (n – k)
redundant symbols to form the code word of „n‟ symbols RS code has:
Block Length : n=2m-1 symbols
Message size: K symbols
Parity check size: n-k= 2t symbols
Minimum distance: dmin=2t+a symbols
10. What is difference between block codes and convolutional codes?
Block codes takes‟k‟ number of bits simultaneously form „n‟-bit code vector. This code vector
is also called block. Convolutional code takes one message bits at a time and generates two or
more encoded bits. Thus convolutional codes generate a string of encoded bits for input message
string.
11. Define constraint length in convolutional code?
Constraint length is the number of shift over which the single message bit can influence the
encoder output. It is expressed in terms of message bits.
12. Define free distance and coding gain.
Free distance is the minimum distance between code vectors. It is also equal to minimum weight
of the code vectors. Coding gain is used as a basis of comparison for different coding methods.
To achieve the same bit error rate the coding gain is defined as,
A= (Eb/No) encoded
(Eb/No) coded
For convolutional coding, the coding gain is given as,
A = rdf /2
Here „r‟ is the code rate And „df is the free distance.
13. What is convolution code?
Fixed number of input bits is stored in the shift register & they are combined with the help of
mod 2 adders. This operation is equivalent to binary convolution coding.
14. What is meant by syndrome of linear block code?
The non zero output of the produce YHT is called syndrome & it is used to detect errors in y.
Syndrome is denoted by S & given as, S=YHT.
UNIT- 5: BANDPASS SIGNAL TRANSMISSION AND RECEPTION
1. Why synchronization is required ?
The signals from various sources are transmitted on the single channel by multiplexing. This
requires synchronization between transmitter and receiver. Special synchronization bits are
added in the transmitted signal for the purpose. Synchronization is also required for detectors to
recover the digital data properly from the modulated signal.
2. What is pseudo noise sequence ?
Ans. Pseudo noise sequence is a noise like high frequency signal. The sequence is not
completely random, but it is generated by well defined logic. Hence it is called„pseudo‟ noise
sequence. Pseudo noise sequences are used in spread spectrum communication for spreading
message signals.
3. What is direct sequence spread spectrum modulation
Ans. In direct sequence spread spectrum modulation, the pseudo-noise sequence is directly
modulated with data sequence. Thus pseudo-noise sequence acts as high frequency carrier and
data sequence acts as low frequency modulating signal. The pseudo-noise sequence and data
sequence are applied to a product modulator. The output of product modulator can be used
directly or it can further generate BPSK signal for long distance communication.
4. What is frequency hap spread spectrum modulation?
Ans. In frequency hop spread spectrum, the data is transmitted in different frequency slots. These
frequency slots are selected with the help of pseudo-noise sequence. Selection of frequency slots
is called frequency hopping. The bandwidth of frequency hop spread spectrum is very much
large compared to direct sequences spread spectrum. Frequency hop spread spectrum is of two
types: I) slow frequency hopping and ii) fast frequency hopping.
5. Define code efficiency.
It is the ratio of message bits in a block to the transmitted bits for that
block by the encoder.
6. What is jamming margin ?
Ans. Jamming margin is the ratio of average power of interference (J) to average
power of data signal (Ps)
7. State four applications of spread spectrum.
I) Spread spectrum has the ability to resist the effect of intentional jamming
ii) Spread spectrum is used in mobile communications. This is because the spread
spectrum signal has the ability to resist the effects of multipath fading.
8. When is the PN sequence called as maximal length sequence?
Ans. When the PN sequence has the length of 2m - 1, it is called maximal length
sequence.

Weitere Àhnliche Inhalte

Was ist angesagt?

M ary psk and m ary qam ppt
M ary psk and m ary qam pptM ary psk and m ary qam ppt
M ary psk and m ary qam pptDANISHAMIN950
 
Analog communication
Analog communicationAnalog communication
Analog communicationPreston King
 
Trapatt diode
Trapatt diodeTrapatt diode
Trapatt diodeAnkit Pandey
 
EMI Unit 3 CRO
EMI Unit 3 CROEMI Unit 3 CRO
EMI Unit 3 CROGVNSK Sravya
 
Directional couplers 22
Directional couplers 22Directional couplers 22
Directional couplers 22HIMANSHU DIWAKAR
 
Broadside array vs end fire array
Broadside array vs end fire arrayBroadside array vs end fire array
Broadside array vs end fire arrayAJAL A J
 
L 1 5 sampling quantizing encoding pcm
L 1 5 sampling quantizing encoding pcmL 1 5 sampling quantizing encoding pcm
L 1 5 sampling quantizing encoding pcmDEEPIKA KAMBOJ
 
Antennas and Wave Propagation
Antennas and Wave Propagation Antennas and Wave Propagation
Antennas and Wave Propagation VenkataRatnam14
 
Multirate DSP
Multirate DSPMultirate DSP
Multirate DSP@zenafaris91
 
Antenna PARAMETERS
Antenna PARAMETERSAntenna PARAMETERS
Antenna PARAMETERSAJAL A J
 
Digital Communication: Information Theory
Digital Communication: Information TheoryDigital Communication: Information Theory
Digital Communication: Information TheoryDr. Sanjay M. Gulhane
 
Transmission line, single and double matching
Transmission line, single and double matchingTransmission line, single and double matching
Transmission line, single and double matchingShankar Gangaju
 
microwave-tubes
 microwave-tubes microwave-tubes
microwave-tubesATTO RATHORE
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationSahar Foroughi
 
Traveling Wave Antenna
Traveling Wave Antenna  Traveling Wave Antenna
Traveling Wave Antenna Abdelaziz Said
 
Digital communications 1
Digital communications 1Digital communications 1
Digital communications 1Jojie Cepeda
 
Detection and Binary Decision in AWGN Channel
Detection and Binary Decision in AWGN ChannelDetection and Binary Decision in AWGN Channel
Detection and Binary Decision in AWGN ChannelDrAimalKhan
 

Was ist angesagt? (20)

M ary psk and m ary qam ppt
M ary psk and m ary qam pptM ary psk and m ary qam ppt
M ary psk and m ary qam ppt
 
Analog communication
Analog communicationAnalog communication
Analog communication
 
Trapatt diode
Trapatt diodeTrapatt diode
Trapatt diode
 
EMI Unit 3 CRO
EMI Unit 3 CROEMI Unit 3 CRO
EMI Unit 3 CRO
 
Directional couplers 22
Directional couplers 22Directional couplers 22
Directional couplers 22
 
Digital Communication Unit 1
Digital Communication Unit 1Digital Communication Unit 1
Digital Communication Unit 1
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Broadside array vs end fire array
Broadside array vs end fire arrayBroadside array vs end fire array
Broadside array vs end fire array
 
L 1 5 sampling quantizing encoding pcm
L 1 5 sampling quantizing encoding pcmL 1 5 sampling quantizing encoding pcm
L 1 5 sampling quantizing encoding pcm
 
Synchronization
SynchronizationSynchronization
Synchronization
 
Antennas and Wave Propagation
Antennas and Wave Propagation Antennas and Wave Propagation
Antennas and Wave Propagation
 
Multirate DSP
Multirate DSPMultirate DSP
Multirate DSP
 
Antenna PARAMETERS
Antenna PARAMETERSAntenna PARAMETERS
Antenna PARAMETERS
 
Digital Communication: Information Theory
Digital Communication: Information TheoryDigital Communication: Information Theory
Digital Communication: Information Theory
 
Transmission line, single and double matching
Transmission line, single and double matchingTransmission line, single and double matching
Transmission line, single and double matching
 
microwave-tubes
 microwave-tubes microwave-tubes
microwave-tubes
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless Communication
 
Traveling Wave Antenna
Traveling Wave Antenna  Traveling Wave Antenna
Traveling Wave Antenna
 
Digital communications 1
Digital communications 1Digital communications 1
Digital communications 1
 
Detection and Binary Decision in AWGN Channel
Detection and Binary Decision in AWGN ChannelDetection and Binary Decision in AWGN Channel
Detection and Binary Decision in AWGN Channel
 

Andere mochten auch

Pp. dewi ariani bab 6
Pp. dewi ariani bab 6Pp. dewi ariani bab 6
Pp. dewi ariani bab 6dewiarianiaja
 
Map indonesia
Map indonesiaMap indonesia
Map indonesiaextiopyance
 
PHP Conference Brasil 2013 - Virtualização e Provisionamento de Ambientes c...
PHP Conference Brasil 2013 - Virtualização e Provisionamento de Ambientes c...PHP Conference Brasil 2013 - Virtualização e Provisionamento de Ambientes c...
PHP Conference Brasil 2013 - Virtualização e Provisionamento de Ambientes c...Lucas Arruda
 
Du enterprise services overview 3.2
Du enterprise services overview 3.2Du enterprise services overview 3.2
Du enterprise services overview 3.2Islam Bugbul
 
Website security how to protect your website?
Website security how to protect your website?Website security how to protect your website?
Website security how to protect your website?websecure
 
Using natural remedies to treat chronic symptoms
Using natural remedies to treat chronic symptomsUsing natural remedies to treat chronic symptoms
Using natural remedies to treat chronic symptomsOptimalWellnessLabs
 
Motley Fool One Mindset Charts
Motley Fool One Mindset ChartsMotley Fool One Mindset Charts
Motley Fool One Mindset Chartsmorganhousel
 
Pp picture halloween
Pp picture halloweenPp picture halloween
Pp picture halloweendewiarianiaja
 
Selling the Open-Source Philosophy - DrupalCon Latin America
Selling the Open-Source Philosophy - DrupalCon Latin AmericaSelling the Open-Source Philosophy - DrupalCon Latin America
Selling the Open-Source Philosophy - DrupalCon Latin AmericaLucas Arruda
 
TDC2013 - PHP - Virtualização e Provisionamento de Ambientes com Vagrant e ...
TDC2013 - PHP - Virtualização e Provisionamento de Ambientes com Vagrant e ...TDC2013 - PHP - Virtualização e Provisionamento de Ambientes com Vagrant e ...
TDC2013 - PHP - Virtualização e Provisionamento de Ambientes com Vagrant e ...Lucas Arruda
 
Bastiar
BastiarBastiar
Bastiartiar1
 
Bahtiar bab
Bahtiar babBahtiar bab
Bahtiar babtiar1
 
You're Trying Too Hard
You're Trying Too HardYou're Trying Too Hard
You're Trying Too Hardmorganhousel
 
Saliva and urine test to find chronic symptom source
Saliva and urine test to find chronic symptom sourceSaliva and urine test to find chronic symptom source
Saliva and urine test to find chronic symptom sourceOptimalWellnessLabs
 
This Is Why We Can't Have Nice Things
This Is Why We Can't Have Nice ThingsThis Is Why We Can't Have Nice Things
This Is Why We Can't Have Nice Thingsmorganhousel
 

Andere mochten auch (15)

Pp. dewi ariani bab 6
Pp. dewi ariani bab 6Pp. dewi ariani bab 6
Pp. dewi ariani bab 6
 
Map indonesia
Map indonesiaMap indonesia
Map indonesia
 
PHP Conference Brasil 2013 - Virtualização e Provisionamento de Ambientes c...
PHP Conference Brasil 2013 - Virtualização e Provisionamento de Ambientes c...PHP Conference Brasil 2013 - Virtualização e Provisionamento de Ambientes c...
PHP Conference Brasil 2013 - Virtualização e Provisionamento de Ambientes c...
 
Du enterprise services overview 3.2
Du enterprise services overview 3.2Du enterprise services overview 3.2
Du enterprise services overview 3.2
 
Website security how to protect your website?
Website security how to protect your website?Website security how to protect your website?
Website security how to protect your website?
 
Using natural remedies to treat chronic symptoms
Using natural remedies to treat chronic symptomsUsing natural remedies to treat chronic symptoms
Using natural remedies to treat chronic symptoms
 
Motley Fool One Mindset Charts
Motley Fool One Mindset ChartsMotley Fool One Mindset Charts
Motley Fool One Mindset Charts
 
Pp picture halloween
Pp picture halloweenPp picture halloween
Pp picture halloween
 
Selling the Open-Source Philosophy - DrupalCon Latin America
Selling the Open-Source Philosophy - DrupalCon Latin AmericaSelling the Open-Source Philosophy - DrupalCon Latin America
Selling the Open-Source Philosophy - DrupalCon Latin America
 
TDC2013 - PHP - Virtualização e Provisionamento de Ambientes com Vagrant e ...
TDC2013 - PHP - Virtualização e Provisionamento de Ambientes com Vagrant e ...TDC2013 - PHP - Virtualização e Provisionamento de Ambientes com Vagrant e ...
TDC2013 - PHP - Virtualização e Provisionamento de Ambientes com Vagrant e ...
 
Bastiar
BastiarBastiar
Bastiar
 
Bahtiar bab
Bahtiar babBahtiar bab
Bahtiar bab
 
You're Trying Too Hard
You're Trying Too HardYou're Trying Too Hard
You're Trying Too Hard
 
Saliva and urine test to find chronic symptom source
Saliva and urine test to find chronic symptom sourceSaliva and urine test to find chronic symptom source
Saliva and urine test to find chronic symptom source
 
This Is Why We Can't Have Nice Things
This Is Why We Can't Have Nice ThingsThis Is Why We Can't Have Nice Things
This Is Why We Can't Have Nice Things
 

Ähnlich wie 2 marks q&a

24071 digitalcommunication
24071 digitalcommunication24071 digitalcommunication
24071 digitalcommunicationsharma ellappan
 
analog communication system for undergraduate .pdf
analog communication  system for undergraduate .pdfanalog communication  system for undergraduate .pdf
analog communication system for undergraduate .pdfAlaAwouda
 
Pulse Shaping FIR Filter for WCDMA
Pulse Shaping FIR Filter for WCDMAPulse Shaping FIR Filter for WCDMA
Pulse Shaping FIR Filter for WCDMABhagwat Singh Rathore
 
Digital communication viva questions
Digital communication viva questionsDigital communication viva questions
Digital communication viva questionsishan0019
 
Fundamentals of coherent systems
Fundamentals of coherent systemsFundamentals of coherent systems
Fundamentals of coherent systemsfarha zeba
 
Inter symboluc interference in base.pptx
Inter symboluc interference in base.pptxInter symboluc interference in base.pptx
Inter symboluc interference in base.pptxrsaha130592
 
EEE323_7.pptx
EEE323_7.pptxEEE323_7.pptx
EEE323_7.pptxAlfazUddin6
 
Iaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdmaIaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdmaIaetsd Iaetsd
 
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...Sukhvinder Singh Malik
 
Amplitude Modulation using Multipliers and Envelope Detector
Amplitude Modulation using Multipliers and Envelope DetectorAmplitude Modulation using Multipliers and Envelope Detector
Amplitude Modulation using Multipliers and Envelope Detectorj naga sai
 
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...ijmnct
 
Data Encoding
Data EncodingData Encoding
Data EncodingLuka M G
 
Module 1 PCS notes.pptx
Module 1 PCS notes.pptxModule 1 PCS notes.pptx
Module 1 PCS notes.pptxSaralaT3
 

Ähnlich wie 2 marks q&a (20)

24071 digitalcommunication
24071 digitalcommunication24071 digitalcommunication
24071 digitalcommunication
 
analog communication system for undergraduate .pdf
analog communication  system for undergraduate .pdfanalog communication  system for undergraduate .pdf
analog communication system for undergraduate .pdf
 
Pulse Shaping FIR Filter for WCDMA
Pulse Shaping FIR Filter for WCDMAPulse Shaping FIR Filter for WCDMA
Pulse Shaping FIR Filter for WCDMA
 
Dq33705710
Dq33705710Dq33705710
Dq33705710
 
Dq33705710
Dq33705710Dq33705710
Dq33705710
 
Digital communication viva questions
Digital communication viva questionsDigital communication viva questions
Digital communication viva questions
 
Fundamentals of coherent systems
Fundamentals of coherent systemsFundamentals of coherent systems
Fundamentals of coherent systems
 
Inter symboluc interference in base.pptx
Inter symboluc interference in base.pptxInter symboluc interference in base.pptx
Inter symboluc interference in base.pptx
 
EEE323_7.pptx
EEE323_7.pptxEEE323_7.pptx
EEE323_7.pptx
 
Project 10
Project 10Project 10
Project 10
 
Iaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdmaIaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdma
 
Modulation Techniques for Mobile Radio
Modulation Techniques for Mobile RadioModulation Techniques for Mobile Radio
Modulation Techniques for Mobile Radio
 
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
 
Amplitude Modulation using Multipliers and Envelope Detector
Amplitude Modulation using Multipliers and Envelope DetectorAmplitude Modulation using Multipliers and Envelope Detector
Amplitude Modulation using Multipliers and Envelope Detector
 
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
 
DESIGN AND IMPLEMENTATION OF OFDM SYSTEM AND REDUCTION OF INTER-CARRIER INTER...
DESIGN AND IMPLEMENTATION OF OFDM SYSTEM AND REDUCTION OF INTER-CARRIER INTER...DESIGN AND IMPLEMENTATION OF OFDM SYSTEM AND REDUCTION OF INTER-CARRIER INTER...
DESIGN AND IMPLEMENTATION OF OFDM SYSTEM AND REDUCTION OF INTER-CARRIER INTER...
 
Data Encoding
Data EncodingData Encoding
Data Encoding
 
SIGNAL_CONVERSION.docx
SIGNAL_CONVERSION.docxSIGNAL_CONVERSION.docx
SIGNAL_CONVERSION.docx
 
Module 1 PCS notes.pptx
Module 1 PCS notes.pptxModule 1 PCS notes.pptx
Module 1 PCS notes.pptx
 
ADC Digital Modulation
ADC   Digital ModulationADC   Digital Modulation
ADC Digital Modulation
 

KĂŒrzlich hochgeladen

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

KĂŒrzlich hochgeladen (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

2 marks q&a

  • 1. 2MARKS QUESTION & ANSWERS UNIT-1 DIGITAL COMMUNICATION SYSTEM 1. Define modulation? Modulation is a process by which some characteristics of high frequency carrier signal is varied in accordance with the instantaneous value of the modulating signal. 2. What is correlative coding? Correlative level coding is used to transmit a baseband signal with the signaling rate of 2Bo over the channel of bandwidth Bo. This is made physically possible by allowing ISI in the transmitted in controlled manner. This ISI is known to receiver. The correlative coding is implemented by duobinary signalling and modified duobinary signalling. 3. State sampling theorem. · If a finite –energy signal g(t) contains no frequencies higher than W hertz ,it is completely determined by specifying its co=ordinates at a sequence of points spaced 1/2W seconds apart. · If a finite energy signal g(t) contains no frequencies higher than W hertz, it may be completely recovered from its co=ordinates at a sequence of points. 4. What are the degrees of modulation? Under modulation. m<1 Critical modulation m=1 Over modulation m>1 5. What is aliasing? The phenomenon of a high-frequency in the spectrum of the original signal g(t) seemingly taking on the identity of a lower frequency in the spectrum of the sampled signal g(t) is called aliasing or foldover. 6. Why do you need adaptive equalization in a switched telephone network. In switched telephone network the distortion depends upon 1) Transmission characteristics of individual links. 2) Number of links in connection. Hence fixed pair of transmit and receive filters will not serve the equalization problem. The transmission characteristics keep on changing. Therefore adaptive equalization is used. 7.What are the necessity of adaptive equalization?
  • 2. Ans. Most of the channels are made up of individual links in switched telephone network, the distortion induced depends upon 1) transmission characteristics of individual links 2) number of links in connection 8. Define the principle of adaptive equalization? Ans. The filters adapt themselves to the dispersive effects of the channel that is the cofficients of the filters are changed contineously according to the received data. The filter cofficients are changed in such a way that the distortion in the data is reduced 9. Define duobinary encoding? Ans. Duobinary encoding reduces the maximum frequency of the base band signal the “word duo” means to the double transmission capacity of the binary system 10. Write a note on correlative level coding? Correlative level coding allows the signal scaling rate of 2Bo in the channel of bandwidth Bo this is made physically possible by allowing ISI in the transmitted signal in controlled manner this ISI IS KNOWN TO THE RECEIVER 11. Define the term ISI? Ans. The presence of outputs due to other bits interference with the output of required bit . this effect is called inter symbol interference (ISI) 12. Write the performance of data transmission system using eye pattern technique? Ans. The width of the eye opening defines the interval over which the received wave can can be sampled without error from inter symbol interference . The sensitivity of the system to timing error is determined by the rate of closure of the eye as the sampling time is varied. 13. What is the necessity of equalization? Ans. When the signal is passed through the channel distortion is introduced in terms of 1) amplitude 2) delay this distortion creates problem of ISI. The detection of the signal also become difficult this distraction can be compensated with the help of equalizer. 14. What is meant by prediction error? The difference between the actual sample of the process at the time of interest and the predictor output is called a prediction error. 15. Define delta modulation. Delta modulation is the one-bit version of differential pulse code modulation.
  • 3. 16. Define adaptive delta modulation. The performance of a delta modulator can be improved significantly by making the step size of the modulator assume a time- varying form. In particular, during a steep segment of the input signal the step size is increased. Conversely, when the input signal is varying slowly, the step is reduced , In this way, the step size is adapting to the level of the signal. The resulting method is called adaptive delta modulation (ADM). UNIT -2 : BASEBAND FORMATTING TECHNIQUES 1. Mention the need of optimum transmitting and receiving filter in baseband data transmission. When binary data is transmitted over the baseband channel, noise interfaces with it. Because of this noise interference, errors are introduced in signal detection. Optimum filter performs two functions while receiving the noisy signal: 1) Optimum filter integrates the signal during the bit interval and checks the output at the time instant where signal to noise ratio is maximum 2) Transfer function of the optimum filter is selected so as to maximise signal to noise ratio. 3) Optimum filter minimizes the probability of error. 2. Define ASK. In ASK, carrier is switched on when binary 1 is to be transmitted and it is switched off when binary D is to be transmitted ASK is also called on-off keying. 3. What is meant by DPSK? In DPSK, the input sequence is modified. Let input sequence be d(t) and output sequence be b(t). Sequence b(t) changes level at the beginning of each interval in which d(t)=1 and it does not changes level when d(t)=0. When b(t) changes level, phase of the carrier is changed. And as stated above, b(t) changes t=its level only when d(t) =1. This means phase of the carrier is changed only if d(t)=1. Hence the technique is called Differential PSK. 4. Explain coherent detection? In coherent detection, the local carrier generated at the receiver is phase locked with the carrier at the transmitter. The detection is done by correlating received noisy signal and locally generated carrier. The coherent detection is a synchronous detection.
  • 4. 5. What is the difference between PSK and FSK? In PSK, phase of the carrier is switched according to input bit sequence. In FSKfrequency of the carrier is switched according to input bit sequence. FSK needs double of the bandwidth of PSK. 6. What is meant by coherent ASK? In coherent ASK, correlation receiver is used to detect the signal. Locally generated carrier is correlated with incoming ASK signal. The locally generated carrier is in exact phase with the transmitted carrier. Coherent ASK is also called as synchronous ASK. 7. What is the major advantage of coherent PSK over coherent ASK? ASK is on-off signalling, where as the modulated carrier is continuously transmitted in PSK. Hence peak power requirement is more ASK, whereas it is reduced in case of PSK. 8. How are the predictor coefficients determined? For the adaptation of the predictor coefficients the least mean square (LMS) algorithm is used. 9. Define adaptive subband coding? It is a frequency domain coder, in which the speech signal is divided in to number of subbands and each one is coded separately. It uses non masking phenomenon in perception for a better speech quality. The noise shaping is done by the adaptive bit assignment. 10. What are formant frequencies? In the context of speech production the formant frequencies are the resonant frequencies of the vocal tract tube. The formants depend on the shape and dimensions of the vocal tract. 32. Define Adaptive filter? It is a nonlinear estimator that provides an estimate of some desired response without requiring knowledge of correlation functions, where the filter coefficients are data dependent. A popular filtering algorithm is the LMS algorithm. 11. Define data Signalling Rate. Data signalling rate is defined as the rate measured in terms bits per second(b/s) at which data are transmitted. Data signaling rate Rb=I/Tb Where Tb=bit duration. 12. Define modulation rate. It is defined as the rate at which signal level is changed depending On the nature of the format used to represent the digital data.It is measured in Bauds or symbols per second.
  • 5. 13. State NRZ unipolar format In this format binary 0 is represent by no pulse and binary 1 is Represented by the positive pulse. 36. State NRZ polar format. Binary 1 is represented by a positive pulse and binary 0 is represented by a Negative pulse. 14. State NRZ bipolar format. Binary 0 is represented by no pulse and binary one is represented by the alternative positive and negative pulse. 15. State Manchester format. Binary 0 Æ The first half bit duration negative pulse and the second half Bit duration positive pulse. Binary 1Æ first half bit duration positive pulse and the second half Bit duration negative pulse. UNIT – 3: BASEBAND CODING TECHNIQUES 1. Properties of matched filter. The signal to noise ratio of the matched filter depends only upon the the ratio of the signal energy to the psd of white noise at the filter input 1) The output signal of a matched filter is proportional to a shifted version of the autocorrelation function of the input signal to which the filter is matched. 2. Why do we go for Gram-Schmidt Orthogonalization procedure? Consider a message signal m. The task of transforming an incoming message mi=1,2,
..M, into a modulated wave si(t) may be divided into separate discrete time & continuous time operations. The justification for this separation lies in the Gram-Schmidt orthogonalization procedure which permits the representation of any set of M energy signals, {si(t)}, as linear combinations of N orthonormal basis functions, where N ÂŁM . 3. What is matched filter receiver ? A filter whose impulse response is a time reversed & delayed version of some signal Æ j (t) then it is said to be matched to Æj (t) correspondingly, the optimum receiver based on the detector is referred to as the matched filter receiver. 4. What is maximum likelihood detector. Maximum likelihood detector computes the metric for each transmitted message compares them and then decides in favor of maximum. The device for implementing the decision rule
  • 6. i.e; set ^m = mi if In [ fx(x/mk)] is maximum for k=i is called maximum –likelihood detector and the decision rule is called maximum likelihood. 5. Define antipodal signals. A pair of sinusoidal signals that differ only in a phase shift of 180 degrees are referred to as antipodal signals. 6. Explain how QPSK differs from PSK in term of transmission bandwidth and bit information it carries? For a given bit rate 1/Tb, a QPSK wave requires half the transmission bandwidth of the corresponding binary PSK wave. Equivalently for a given transmission bandwidth, a QPSK wave carries twice as many bits of information as the corresponding binary PSK wave 7. Give the equation for average probability of symbol error for coherent binary PSK. Average probability of signal error, Pe = 1 / 2 erfcÖ Eb / No 8. Explain the model of bandpass digital data transmission system? The bandpass digital data transmission system consists of source, encoder and modulator in the transmitter. Similarly receiver, decoder and destination form the transmitter. 9. What is baseband signal receiver? A baseband signal receiver increases the signal to noise ratio at the instant of sampling. This reduces the probability of error. The baseband signal receiver is also called optimum receiver. 10. What is matched filter? The matched filter is a baseband signal receiver, which works in presence of white Gaussian noise. The impulse response of the matched response of the matched filter is matched to the shape pf the input signal. 11. What is the value of maximum signal to noise ratio of the matched filter? When it becomes maximum? Maximum signal to noise ratio is the ratio of energy to psd of white noise. i.e., ρmax = E/ (N0/2) This maximum value occurs at the end of bit duration i.e. Tb. 12. What is correlator ? Correlator is the coherent receiver. It correlates the received noisy signal f(t) with the locally generated replica of the unknown signal x(t). It‟s output is denoted as r(t).
  • 7. 13. On what factor, the error probability of matched filter depends. Error probability is given as Pe = 1/2erfc√E/No This equation shows that error probability depends only on energy but not on shape of the signal. 14. Bring out the difference between coherent & non coherent binary modulation scheme. a. Coherent detection: In this method the local carrier generated at the receiver is phase locked with the carrier at the transmitter. Hence it is called synchronous detection b. Non coherent detection: In this method, the receiver carrier need not be phase locked with transmitter carrier. Hence it is called envelope detection. 15. Write the expression for bit error rate for coherent binary FSK. Bit error rate for coherent binary FSK is given as, Pe = 1/2erfc√0.6E/No 16. Highlight the major difference between a QPSK & MSK signal. MSK signal have continuous phase in all the cases, where as QPSK has phase shift of π/2 or π. 17. What is the error probability of MSK & DPSK? Error probability of MSK: Pe = 1/2erfc√E/No Error probability of DPSK: Pe = 1/2e-Eb/No 18. In minimum shift keying what is the relation between the signal frequencies & bit rate. Let the bit rate be fb and the frequency of carrier be f0. The higher and lower MSK signal frequencies are given as, fH = f0 + fb/4 fL = f0 - fb/4 UNIT- 4: BASEBAND RECEPTION TECHNIQUES 1.What is hamming distance? The hamming distance between two code vectors is equal to the number of elements in which they differ. For example, let the two code words be, X = (101) and Y= (110) These two code words differ in second and third bits. Therefore the hamming distance between X and Y is two. 2. Define code efficiency. The code efficiency is the ratio of message bits in a block to the transmitted bits for that block by the encoder i.e., Code efficiency= (k/n)
  • 8. k=message bits n=transmitted bits. 3. What is meant by systematic and non-systematic codes? In a Systematic block code, message bits appear first and then check bits. In the non-systematic code, message and check bits cannot be identified in the code vector. 4. What is meant by linear code? A code is linear if modulo-2 sum of any two code vectors produces another code vector. This means any code vector can be expressed as linear combination of other code vectors. 5. What are the error detection and correction capabilities of hamming codes? The minimum distance (dmin) of hamming codes is „3‟. Hence it can be used to detect double errors or correct single errors. Hamming codes are basically linear block codes with dmin =3. 6. What is meant by cyclic codes? Cyclic codes are the subclasses of linear block codes. They have the property that a cyclic shift of one codeword produces another code word. 7. How syndrome is calculated in Hamming codes and cyclic codes? In hamming codes the syndrome is calculated as, S=YHT Here Y is the received and HT is the transpose of parity check matrix. 8. What is BCH code? BCH codes are most extensive and powerful error correcting cyclic codes. The decoding of BCH codes is comparatively simpler. For any positive integer „m‟ and „t‟ (where t<2 m-1)there exists a BCH code with following parameters: Block length: n= 2m-1 Number of parity check bits : n-k<=mt Minimum distance: dmin>=2t+1 9. What is RS code? These are non binary BCH codes. The encoder for RS code operates on multiple bits simultaneously. The (n, k) RS code takes the groups of m- bit symbols of incoming binary data stream. It takes such „k‟ number of symbols in one block. Then the encoder acts (n – k) redundant symbols to form the code word of „n‟ symbols RS code has: Block Length : n=2m-1 symbols Message size: K symbols
  • 9. Parity check size: n-k= 2t symbols Minimum distance: dmin=2t+a symbols 10. What is difference between block codes and convolutional codes? Block codes takes‟k‟ number of bits simultaneously form „n‟-bit code vector. This code vector is also called block. Convolutional code takes one message bits at a time and generates two or more encoded bits. Thus convolutional codes generate a string of encoded bits for input message string. 11. Define constraint length in convolutional code? Constraint length is the number of shift over which the single message bit can influence the encoder output. It is expressed in terms of message bits. 12. Define free distance and coding gain. Free distance is the minimum distance between code vectors. It is also equal to minimum weight of the code vectors. Coding gain is used as a basis of comparison for different coding methods. To achieve the same bit error rate the coding gain is defined as, A= (Eb/No) encoded (Eb/No) coded For convolutional coding, the coding gain is given as, A = rdf /2 Here „r‟ is the code rate And „df is the free distance. 13. What is convolution code? Fixed number of input bits is stored in the shift register & they are combined with the help of mod 2 adders. This operation is equivalent to binary convolution coding. 14. What is meant by syndrome of linear block code? The non zero output of the produce YHT is called syndrome & it is used to detect errors in y. Syndrome is denoted by S & given as, S=YHT. UNIT- 5: BANDPASS SIGNAL TRANSMISSION AND RECEPTION 1. Why synchronization is required ? The signals from various sources are transmitted on the single channel by multiplexing. This requires synchronization between transmitter and receiver. Special synchronization bits are added in the transmitted signal for the purpose. Synchronization is also required for detectors to recover the digital data properly from the modulated signal.
  • 10. 2. What is pseudo noise sequence ? Ans. Pseudo noise sequence is a noise like high frequency signal. The sequence is not completely random, but it is generated by well defined logic. Hence it is called„pseudo‟ noise sequence. Pseudo noise sequences are used in spread spectrum communication for spreading message signals. 3. What is direct sequence spread spectrum modulation Ans. In direct sequence spread spectrum modulation, the pseudo-noise sequence is directly modulated with data sequence. Thus pseudo-noise sequence acts as high frequency carrier and data sequence acts as low frequency modulating signal. The pseudo-noise sequence and data sequence are applied to a product modulator. The output of product modulator can be used directly or it can further generate BPSK signal for long distance communication. 4. What is frequency hap spread spectrum modulation? Ans. In frequency hop spread spectrum, the data is transmitted in different frequency slots. These frequency slots are selected with the help of pseudo-noise sequence. Selection of frequency slots is called frequency hopping. The bandwidth of frequency hop spread spectrum is very much large compared to direct sequences spread spectrum. Frequency hop spread spectrum is of two types: I) slow frequency hopping and ii) fast frequency hopping. 5. Define code efficiency. It is the ratio of message bits in a block to the transmitted bits for that block by the encoder. 6. What is jamming margin ? Ans. Jamming margin is the ratio of average power of interference (J) to average power of data signal (Ps) 7. State four applications of spread spectrum. I) Spread spectrum has the ability to resist the effect of intentional jamming ii) Spread spectrum is used in mobile communications. This is because the spread spectrum signal has the ability to resist the effects of multipath fading. 8. When is the PN sequence called as maximal length sequence? Ans. When the PN sequence has the length of 2m - 1, it is called maximal length sequence.