Viterbi Algorithm In Wireless Communication

Superior Essays
1

Abstract — Information sent and received in wireless communication systems can suffer from data losses due to multipath propagation, further leading to intersymbol interference. These conditions compromise the integrity of the information transmitted. This paper explores the Viterbi algorithm used to combat error bounds in convolutional codes, and develops a MATLAB-based alternative model of the algorithm for continuous time applications that is shown to significantly diminish the effects of intersymbol interference in the wireless transmission of a signal.
I. INTRODUCTION
Wireless communications is part of everyday life. Whether we speak on the phone with a friend, or hear the news on the radio. However, the usage of the frequency spectrum
…show more content…
An example of this is ionospheric reflection and refraction: a fraction of any message sent from Earth to space can reflect back to Earth on the surface of the ionosphere, and then a small fraction of this signal can be reflected back to space on the planet’s surface, and so on. When receiver circuits read a multipath signal, the original message becomes distorted due to echoes and reverberation, and the data can suffer heavy losses.
Signals can be divided into equal sized fractions of the original signal. Each piece is called a “symbol”. When a signal is propagated via multiple paths, the receiver circuit reads the same message multiple times with a certain delay. This is because of the time it takes for reflected signals to move through their whole trajectory. In a situation as such, each symbol will smear into their neighboring symbol, generating noise and distortion. This phenomenon is called intersymbol interference, and a graphical representation of said phenomenon is shown in Fig. 1.
Fig. 1. Intersymbol interference on an amplitude-modulated
…show more content…
As we model this Markov process, we observe the state-dependent output, yet initially we are not able to note any of the states. Each state has a unique probability distribution over each possible output. Thus, information about the sequence of states through which the model makes its way can be obtained from the sequence of outputs generated, while the rest of the model remains hidden.
The algorithm tracks a stochastic process through its states by using a recursive method that is optimal in specific situations.
Fig. 2. State transition diagram for a four-state shift register process.
A visual representation of the behavior of a discrete time Markov process, as shown in Fig. 2, can be converted to what is called a trellis, which can be observed in Fig. 3. Each node represents a specific discrete time state, and each branch is specified to have a certain length, which is dependent on the data received.
The application of the algorithm in discrete time is mostly related to decoding convolutional codes in both GSM and CDMA digital cellular, dial-up modems, satellite communications, and other digital applications. However, the notion of the algorithm can be expanded to fit analog applications as well.
The algorithm can be formally described as

Related Documents

  • Decent Essays

    Nt1310 Unit 2

    • 703 Words
    • 3 Pages

    The code can appear in several forms, however in this lab the modular approach was used. This form allows the program to be created in sections, and then the sections are compiled together to formulate the code in its entirety. In each part of this lab a code was created using this approach, such as code one which can be seen in Figure 5. After a code, has been completed it is compiled to ensure no errors are present, which would interfere with the output generated on the DE2-115 board.…

    • 703 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Additional wellbeing has been incorporated into this outline by making a "loopbacks" to the zero tally, with a yield of zero if the information state to the counter is inconceivable for the present number that it is on (for instance, a data condition of 010—NS, when the present check is 101—5, the NS tally ought to have as of now circled back). By circling back to zero, this will give the framework's movement express a more drawn out time to determine an "undetermined" state. Test Strategy: With a specific end goal to test the counter outline, we have chosen to test just a predetermined number of cases and test to see whether the configuration a) tallies accurately, and b) sends the yield T high at the right times. To do this, we will pick two or three states to…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This phase includes three algorithms as detailed below: I. Key generator: the data owner DO initiates the scheme by using KeyGenerator(µ)…

    • 682 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Pm3110 Unit 4 Test Paper

    • 1148 Words
    • 5 Pages

    The exchanging focuses in the system. Trunks: The branches between trades. Trunks convey numerous voice-recurrence circuits utilizing either FDM or synchronous TDM.…

    • 1148 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 8 Lab Report

    • 494 Words
    • 2 Pages

    Mathematically we computed that these will add to 6 clock cycles. So to read start and end will take 12 clock cycles.…

    • 494 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The general model introduced in Fig.4.10 is commonly used to design stable high-order modulators. If a chain of integrators is used to form the loop filter, two main modulators typologies exist [1, 5, 8]: a cascade of M delaying integrators is used to form the filter, where the feedback and the input signals are being fed to each integrator input with different weight factors a_i and b_i (Fig.4.11). The transfer function of the signal filter, L_0, is: while the feedback filter L_1 can be derived as: where a_i and b_i>0. The NTF results: Note that the NTF zeros must lie at 푧=1 (i.e. DC). The weight factors a_i can be used to introduce finite non-zero poles into the NTF and to determine the zeros of L_1 (z).…

    • 275 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    This is referred to as destructive interference. The Mechanic summed up this experiment to Alice by saying, “When two waves overlap and combine with each other, their amplitudes, the amounts by which they go up or down, combine with one another. In some places the contributing waves are all going in the same direction, so the disturbances add up and you get a large effect. At other positions they go in different directions and cancel one another out.” (Gilmore, 36) With that said, Alice and her companion moved on to the next subject on her journey through…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1210 Chapter 7 Summary

    • 1348 Words
    • 6 Pages

    Chapter 7: 7.1 Frame synchronization: The beginning and end of each frame must be recognizable. 7.2 The function accomplished by a receiving entity to limit the amount or rate of data that is sent by a transmitting entity. 7.3 A flow control protocol in which the sender communicates a block of data and then awaits an acknowledgment before transmitting the next block. 7.4 •…

    • 1348 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Pm3110 Unit 6 Lab Report

    • 1076 Words
    • 5 Pages

    The four bit number that we used for the first lab was “0100”. We have implemented the sequence detector from the experiment #1. Finally, we have made it work and again it was hard for our group to know which key to press to display and how the building behavior work. But again, with the help of the professor, we have learned it, at the same time we again explain him what we had done for this part and get sign off.…

    • 1076 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Study Guide

    • 1037 Words
    • 5 Pages

    Question from Chapters 5,6,7,8 1. What UML diagram types do you need to represent the essential features of a system? A. Activity diagrams, which show the activity that make up a system process and the flow of control B. Use case diagrams, which show the interactions between a system and its environment. C. Sequence diagrams, which show interactions between actors and the system and between system components. D. Class diagrams, which show the object classes in the system and the associations between these classes.…

    • 1037 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Furthermore, it involves the identification of steps in a process that has the potential in helping to eliminate or reduce the occurrence of failure (Vincent, 2010) 1. Identification of the interdisciplinary team members who will be incorporated in the FMEA. The members include the Registered Nurse (RN), Health Care Assistant (HCA), Director of Nursing (DON), Licensed Practicing Nurse (LPN), Doctor, a STAT CODE team, and CHR team (Corporate Health Resources). 2.…

    • 2014 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    Interpersonal communication can be attributed as a reason to almost every conflict and misunderstanding. So, what is interpersonal communication? Interpersonal communication is humanity’s most vital characteristic and its biggest accomplishment. It is humans skill to turn meaningless grunts into articulated and composed words, across that they are able to make known their needs, wants, thoughts and feelings.…

    • 1512 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The appellant, Chester Comerford, was a licensed attorney and previous law professor who operated a website for a group whom he founded, called the guardians. The guardians questioned President Obama’s citizenship; in 2011 Comerford was convicted of aiding and abetting threats on the President, however the Supreme Court of the United States reversed his conviction the following year. After his conviction was reversed, Comerford went to a local merchant to purchase a smart-phone. Knowing that a phone could be tracked through GPS technology, Comerford disabled the GPS tracking capability, with help from online instructions.…

    • 760 Words
    • 4 Pages
    Improved Essays
  • Brilliant Essays

    The next best practice is information management. The author believes that technology is not the answer but an enabler for companies to manage their information as an asset. The main purpose of managing information as an asset is to benefit the customer. "There has to be a sustained commitment to change attitudes and behavior if technology is going to help in leveraging information assets for the benefit of the customer." (Unruh, 1997)…

    • 3010 Words
    • 13 Pages
    Brilliant Essays
  • Improved Essays

    from the work of Claude and Warren Weaver. Shannon in 1949; this three-part model was intended to capture radio and television transmission process. The three parts are: source, channel, and receiver. Shannon and Weaver also identify another component that can interfere while listening to a telephone call that is called noise. However, this model was adapted to human communication, and it has some useful parallels to public speaking.…

    • 956 Words
    • 4 Pages
    Improved Essays