Upload
khangminh22
View
2
Download
0
Embed Size (px)
Citation preview
Edge Position Modulation
for Wireless Infrared Communications
Der Technischen Fakultät der
Universität Erlangen-Nürnberg
zur Erlangung des Grades
DOKTOR-INGENIEUR
vorgelegt von
Thomas Lüftner
Erlangen - 2005
Als Disseration genehmigt von
der Technischen Fakultät der
Universität Erlangen-Nürnberg
Tag der Einreichung: 18. April 2005
Tag der Promotion: 1. August 2005
Dekan: Prof. Dr. rer. nat. Albrecht Winnacker
Berichterstatter: Prof. Dr.-Ing. Dr.-Ing.habil. Robert Weigel
Prof. Dr.-Ing. Richard Hagelauer
Pulsflanken Positions Modulation
für drahtlose Infrarot-Kommunikation
Thomas Lüftner
Erlangen - 2005
Ich widme diese Arbeit meiner liebevollen Freundin Birgit und meiner großartigen Familie:
meinem Vater Alfred und meiner Mutter Gabriele, meinem Bruder Markus und seiner Frau
Silvia und deren Kindern Moritz und Elena, und meinem Opa Willy und meiner Oma Maria.
Thomas
v
Einleitung
Getrieben von der Infrared Data Association (IrDA) wurde die drahtlose Infrarot-
Kommunikation in den letzten Jahren zu einer sehr populären und weit verbreiteten Methode zur
Kurzstrecken-Datenübertragung zwischen mobilen Geräten wie Laptops, PDAs und
Mobiltelefonen. Aufgrund der "Point & Shoot"-Eigenschaft zeichnet sich IrDA im Besonderen
bei Anwendungen aus, die einen schnellen Verbindungsaufbau erfordern. Dabei übertrifft es
andere Lösungen wie die Funkübertragung entsprechend dem Standard "Bluetooth" oder die auf
dem Standard "Universal Serial Bus (USB)" basierende Datenübertragung mittels Kabel.
Qualität und Geschwindigkeit der Infrarot-Kommunikation sind im Wesentlichen durch die
Bandbreite des Infrarot-Transceivers limitiert. Daher ist es wichtig eine Modulationstechnik mit
hoher Bandbreiteneffizienz zu verwenden und dabei gleichzeitig eine niedrige Bitfehlerrate und
eine hohe Leistungseffizienz aufrecht zu erhalten. Konsequenterweise hat die IrDA die
Modulationstechniken ihrer Standards kontinuierlich verbessert. Es wurden schrittweise die
Verfahren "Return to Zero Inverted (RZI)" für die "Serial Infrared (SIR)"-Datenübertragung, "4
Pulse Position Modulation (4-PPM)" für die "Fast Infrared (FIR)"-Datenübertragung und
"HHH(1,13)" für die neueste "Very Fast Infrared (VFIR)"-Datenübertragung eingeführt. Die
vorliegende Arbeit soll mit dem Verfahren "Edge Position Modulation (EPM)" eine neuartige
Modulationstechnik präsentieren, die eine verbesserte Bandbreiteneffizienz und eine
verbesserte Leistungseffizienz gegenüber den oben genannten Verfahren besitzt. Diese neue
Modulationstechnik soll auf die Eigenschaften des drahtlosen Infrarotkanals optimierbar sein
und soll dadurch auch eine niedrige Bitfehlerrate aufrechterhalten können.
vii
Zusammenfassung
Das einführende Kapitel 1 gibt nach einer kurzen Motivation einen Einblick in die Historie und
in den Stand der Technik der drahtlosen Infrarot-Kommunikation. In diesem Kapitel wird der
IrDA Standard vorgestellt und als Referenz für die darauf folgende Arbeit definiert. Die
Anforderungen an die Modulationstechnik für eine zuverlässige Datenübertragung werden
durch die Eigenschaften des drahtlosen Infrarotkanals bestimmt. Daher präsentiert Kapitel 2 die
Komponenten der physikalischen Schicht eines IrDA-Übertragungssystems und die
wesentlichen Eigenschaften der optischen Verbindung. Damit wird dann ein einfaches
mathematisches Modell des drahtlosen Infrarotkanals hergeleitet. Kapitel 3 bereitet dann die
theoretischen Grundlagen der Modulation und Demodulation durch eine generische
mathematische Beschreibung der involvierten Signale und Kodierungsschritte auf. Daraus
werden dann die grundsätzlichen Bewertungskriterien für die Modulationstechniken hergeleitet
und bestimmt. Die Bewertungskriterien werden die Bandbreiteneffizienz, die Leistungseffizienz
und die Fehlerübertragungsrate sein. Als Referenz für EPM präsentiert Kapitel 4 die wichtigsten
auf Puls-Positions-Modulation basierenden Techniken, die zurzeit in den diversen drahtlosen
Infrarot-Übertragungssystemen für mobile Geräte eingesetzt werden. Im Besonderen werden
die Modulationsverfahren, die von den IrDA-Standards verwendet werden, anhand der
Bewertungskriterien aus Kapitel 3 bewertet, wobei für die Evaluierung der
Fehlerübertragungsrate das Kanalmodell aus Kapitel 2 verwendet wird. Die neuartige
Modulationstechnik EPM wird dann in Kapitel 5 eingeführt. Nach der Präsentation der
grundlegenden Idee hinter EPM werden die erreichbaren Bandbreiteneffizienzen für
verschiedene Varianten von EPM hergeleitet. Es wird aufgezeigt, dass die Variante
EPM(5,12,1/3,1) eine viel versprechende Alternative zu den zurzeit verwendeten Methoden ist
und daher analysiert Kapitel 6 diese EPM-Variante näher im Detail. Zuerst werden die
prinzipiellen Modulations- und Demodulationsschritte von EPM(5,12,1/3,1) beschrieben und
dann wird ein neuartiger "1/3-Rate RLL(5,12) Code" eingeführt, der die Realisierung der
EPM(5,12,1/3,1)-Modulationstechnik ermöglicht. (Die Generierung dieses RLL(5,12)-Codes
wird im Anhang A beschrieben.) Anschließend werden die Bewertungskriterien angewandt,
wobei gezeigt wird, dass EPM(5,12,1/3,1) nicht nur eine exzellente Bandbreiteneffizienz
aufweist, sondern auch eine verbesserte Leistungseffizienz besitzt und auch die
Fehlerübertragungsrate konkurrenzfähig ist. Dann wird gezeigt, wie EPM(5,12,1/3,1) in ein
IrDA konformes Infrarot-Kommunikationssystem integriert werden kann. Schließlich wird in
ix
Kapitel 6 noch der angefertigte HW-Prototyp mit den entsprechenden Messergebnissen
präsentiert, wodurch die Funktionalität von EPM(5,12,1/3,1) nachgewiesen wird. Abschließend
wird in Kapitel 7 ein Vergleich zwischen den Leistungsfähigkeiten der einzelnen
Modulationsverfahren gebracht. Als Konklusion werden im Besonderen die Vorteile und
Nachteile des neuartigen EPM-Verfahrens zusammengefasst und hervorgehoben.
x
Inhaltsangabe
KAPITEL 1 Einleitung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Motivation and Ziele der Arbeit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
1.2 Geschichte der drahtlosen Infrarot-Kommunikation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
1.3 Stand der Technik. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
KAPITEL 2 Drahtloser Infrarotkanal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.1 Definition des drahtlosen Infrarotkanals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
2.2 Optischer Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
2.3 Sender Front-End . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
2.4 Empfänger Front-End. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
2.5 Basisband Modell des drahtlosen Infrarotkanals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
KAPITEL 3 Elektrische Modulation und Demodulation . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.1 Elektrische Modulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44
3.2 Electrische Demodulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48
3.3 Bewertungskriterien der Modulations Techniken . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55
KAPITEL 4 Puls-Positions basierte Modulation Verfahren . . . . . . . . . . . . . . . . . . . . . . 67
4.1 Return to Zero Inverted . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
4.2 N - Pulse Position Modulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
4.3 Run-Length-Limited Code Modulation RLL(d,k) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
KAPITEL 5 Pulseflanken Positions Modulation (EPM). . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.1 Grundlagen von EPM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95
5.2 Theorie der RLL Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .101
5.3 EPM Bandbreiten Effizienz . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .112
5.4 EPM Varianten . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113
KAPITEL 6 EPM(5,12,1/3,1) - Implementierungsbeispiel . . . . . . . . . . . . . . . . . . . . . . . 117
6.1 EPM(5,12,1/3,1) Bewertung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117
6.2 System Implementierung mit EPM(5,12,1/3,1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .126
6.3 HW Prototyp und Messergebnisse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .147
KAPITEL 7 Konklusion and Ausblick . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
ANHANG A RLL(5,12) Generierung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
A.1 Encoder Generierung. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155
A.2 Decoder Generierung. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165
Literaturverzeichnis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
xi
Abstract
Driven by the Infrared Data Association (IrDA) wireless infrared communication has become a
very popular and widely used method for short range data transmission between mobile devices
like laptops, PDAs and mobile phones. Especially at ad-hoc connection applications IrDA excels
radio based solutions like Bluetooth or cable based solutions like Universal Serial Bus (USB),
due to the point-and-shoot characteristic of infrared communication. Quality and speed of
infrared communications are mainly limited by the bandwidth of the infrared transceivers.
Therefore it is important to use a modulation technique with high bandwidth efficiency, while
simultaneously maintaining low bit error rate and high power efficiency. Consequently, IrDA
has continuously improved the modulation techniques of its standards by introducing Return to
Zero Inverted (RZI) for the Serial Infrared (SIR) standard, 4 Pulse Position Modulation (4-PPM)
for the Fast Infrared (FIR) standard and HHH(1,13) for the latest Very Fast Infrared (VFIR)
standard.
This thesis shall present a novel modulation scheme called Edge Position Modulation (EPM),
which offers both increased bandwidth efficiency and increased power efficiency over the
previous methods. The novel modulation technique shall be capable to be optimized to the
characteristics of the wireless infrared channel, and thereby it shall also maintain low bit error
rates.
For that the introductory Chapter 1 of this thesis gives, after a short motivation for this thesis, a
brief insight in the history and in the state of the art of wireless infrared communications. In this
chapter the IrDA standard is introduced and defined as reference for the following work. The
modulation technique requirements for reliable data transmission are determined by the
characteristics of the wireless infrared channel. Therefore Chapter 2 presents the basic
components of the physical layer of an IrDA transmission system and the characteristics of the
optical link. From that a simple mathematical model of the wireless infrared channel is derived.
Chapter 3 provides the theoretical background for the modulation and demodulation processes
by a generic mathematical description of the involved signals and codecs. From that the basic
evaluation criteria for modulation techniques are then derived and defined. The evaluation
criteria will be bandwidth efficiency, power efficiency and transmission reliability measured in
bit error rate. As reference for EPM Chapter 4 presents the most important pulse position based
xiii
modulation techniques, which are currently used in the various wireless infrared transmission
systems for mobile devices. In particular the modulation techniques used by IrDA are assessed
by means of the evaluation criteria of Chapter 3, whereby for the evaluation of the transmission
reliability the channel model of Chapter 2 is applied. The novel modulation technique EPM is
then introduced in Chapter 5. After the presentation of the basic idea of EPM the achievable
bandwidth efficiencies for different variations of EPM are derived. It is revealed that the variant
EPM(5,12,1/3,1) is a promising alternative to the currently used modulation techniques.
Therefore Chapter 6 analyses this EPM variant in more detail. At first the modulation and
demodulation flows of EPM(5,12,1/3,1) are described and a novel 1/3-rate RLL(5,12) code is
introduced that enables the EPM(5,12,1/3,1) modulation scheme. (The generation of this
RLL(5,12) code is provided in the Appendix A of this work.) Then the evaluation criteria are
applied, whereby it is shown that EPM(5,12,1/3,1) provides not only an excellent bandwidth
efficiency, but also an improved power efficiency and a competitive transmission reliability.
Then it is shown how EPM(5,12,1/3,1) could be integrated in an IrDA compliant infrared
communication system. Eventually in Chapter 6 the HW prototype and the corresponding
measurement results are presented that have proven the functionality of EPM(5,12,1/3,1).
Finally, the conclusion of Chapter 7 provides a comparison of the capabilities of the different
modulation techniques presented in this work. In particular the advantages and disadvantages of
the novel EPM are summarized and highlighted.
xiv
Acknowledgment
I would like to express my acknowledgement to those people and institutions who have enabled
me with their support to write this dissertation.
I want to thank my sponsors Univ.-Prof. Dr. Robert Weigel from the Friedrich-Alexander
University Erlangen-Nuremberg, Germany, and Univ.-Prof. Dr. Richard Hagelauer from the
Johannes Kepler University Linz, Austria. I want to take this opportunity to express my
appreciation about their great attitude to promote and challenge young engineers as they have
done it with me so far. I am very lucky to have them as sponsors.
Then I want to express my acknowledgement to Infineon Technologies and to DICE, the
Infineon Design Center in Linz, where I am employed. During the last four years I have always
got the support and freedom to work on my thesis besides my full-time employment, and
therefore I am very grateful to my line managers Dr. Markus Schutti (DICE) and Dr. Matthias
Sauer (Infineon). My special thank goes to Univ.-Prof. Dr. Josef Hausner, who was during his
time at Infineon always a great mentor for me, and I wish him all the best in his new profession
as professor at the University of Bochum.
Furthermore I am very much indebted to Dipl.-Ing. Hans Margiol and Dipl.-Ing. Christian
Kröpl, whose diploma theses have been a very valuable contribution to my thesis. It was a
pleasure for me to work with them. The thesis of Christian is incorporated in this thesis in the
Chapter 2 about the wireless infrared channel. The work of Hans was very much the basis for
the HW prototype described in Section 6.3.
My thank goes also to the students of the University of Applied Sciences of Upper Austria in
Hagenberg, who implemented my novel modulation technique in VHDL during a practical
course and thereby significantly contributed to the HW prototyping. In particular I want to thank
Dipl.-Ing.(FH) Thomas Pühringer who has performed the measurements shown in Section 6.3.
Finally I am especially grateful to Univ.-Prof. Dr. Mario Huemer, who encouraged me during
his time at DICE to write this thesis. Furthermore he gave me a lot of valuable hints of how to
write papers and how to approach the dissertation at all.
Linz, April 2005 Thomas Lüftner
xv
Table of Content
CHAPTER 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Motivation and Goals of the Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
1.2 History of Wireless Infrared Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
1.3 State of the Art at Wireless Infrared Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
1.3.1 Optical Link Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
1.3.2 Optical Modulation / Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
1.3.3 Electrical Modulation / Demodulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
1.3.4 Overview of IrDA's Wireless Infrared Communications System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
CHAPTER 2 Wireless Infrared Channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.1 Definition of Wireless Infrared Channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
2.2 Optical Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
2.2.1 Basics of Optics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
2.2.1.1 What is Infrared Light?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
2.2.1.2 Energy related Quantities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
2.2.2 Directed LOS Link according to IrDA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
2.2.3 Ambient Radiation and Optical Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
2.2.4 Optical Link Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
2.2.4.1 Path Loss. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
2.2.4.2 Ambient Radiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
2.3 Transmitter Front-End . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
2.3.1 Transmitter Front-End Circuitry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
2.3.2 Intensity Modulation by LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
2.3.2.1 Basic Functionality of LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
2.3.2.2 Radiant Intensity versus Induced Diode Current . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24
2.3.3 Transfer Function of Transmitter Front-End . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
2.4 Receiver Front-End . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
2.4.1 Receiver Front-End Circuitry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
2.4.2 Direct Detection by Photodiodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
2.4.2.1 Basic Functionality of Photodiodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
2.4.2.2 Photocurrent versus Irradiance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
2.4.3 Transfer Function of Receiver Front-End . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
2.4.4 Receiver Noise Current . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
2.4.4.1 Shot Noise. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
2.4.4.2 Amplifier Noise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
2.5 Baseband Model of Wireless Infrared Channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
2.5.1 General Channel Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
2.5.2 Reference Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34
2.5.2.1 Time Constant of Transmitter Front-End . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34
2.5.2.2 Gain Factor KTXFE of Transmitter Front-End . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
2.5.2.3 Path Loss of Optical Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
2.5.2.4 Ambient Radiation of Optical Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
2.5.2.5 Responsivity R of Receiver Front-End. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
2.5.2.6 Time Constants of Receiver Front-End . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
2.5.2.7 Receiver Front-End Noise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
xvii
2.5.3 Reference Channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
2.5.4 Impulse Response of Reference Channel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
CHAPTER 3 Electrical Modulation and Demodulation . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.1 Electrical Modulation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.1.1 Encoder Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
3.1.2 Pulse Shaper Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3.2 Electrical Demodulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
3.2.1 Quantization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
3.2.2 Sampling and Receiver Clock Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
3.2.3 Decoder Function. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
3.3 Evaluation Criteria for Modulation Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
3.3.1 Reliability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
3.3.1.1 Quantization Error Robustness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
3.3.1.2 Sampling Error Robustness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
3.3.2 Bandwidth Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
3.3.3 Power Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
CHAPTER 4 Pulse Position based Modulation Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . 67
4.1 Return to Zero Inverted . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
4.1.1 1/4-RZI Modulation Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
4.1.2 1/4-RZI Demodulation Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.1.3 Reliability of 1/4-RZI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
4.1.3.1 Quantization Error Robustness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
4.1.3.2 Sampling Error Robustness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
4.1.4 Bandwidth Efficiency of 1/4-RZI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
4.1.5 Power Efficiency of 1/4-RZI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
4.2 N - Pulse Position Modulation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
4.2.1 4-PPM Modulation Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
4.2.2 4-PPM Demodulation Scheme. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
4.2.3 Reliability of 4-PPM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
4.2.3.1 Quantization Error Robustness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
4.2.3.2 Sampling Error Robustness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
4.2.4 Bandwidth Efficiency of 4-PPM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
4.2.5 Power Efficiency of 4-PPM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
4.3 Run-Length-Limited Code Modulation RLL(d,k) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
4.3.1 HHH(1,13) Modulation Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
4.3.2 HHH(1,13) Demodulation Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
4.3.3 Reliability of HHH(1,13) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
4.3.3.1 Quantization Error Robustness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
4.3.3.2 Sampling Error Robustness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
4.3.4 Bandwidth Efficiency of HHH(1,13). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
4.3.5 Power Efficiency of HHH(1,13) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
CHAPTER 5 Edge Position Modulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.1 Basics of EPM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.2 RLL Codes in Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
5.2.1 State Transition Matrix of RLL(d,k) Codes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
5.2.2 Capacity C(d,k) of RLL Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
xviii
5.2.3 RLL Code Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .105
5.3 EPM Bandwidth Efficiency in General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .112
5.4 EPM Variants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113
5.4.1 EPM Implementation Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113
5.4.1.1 Implementation Requirement for r . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113
5.4.1.2 Implementation Requirements for Tchip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .114
5.4.1.3 Implementation Requirement for k. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .114
5.4.1.4 Implementation Requirement for RLL Code Rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .115
5.4.2 Selected EPM Variants. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .115
CHAPTER 6 EPM(5,12,1/3,1) - Implementation Example. . . . . . . . . . . . . . . . . . . . . . . 117
6.1 EPM(5,12,1/3,1) Evaluation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117
6.1.1 EPM(5,12,1/3,1) Modulation Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117
6.1.2 EPM(5,12,1/3,1) Demodulation Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .120
6.1.3 Reliability of EPM(5,12,1/3,1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .122
6.1.3.1 Quantization Error Robustness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .122
6.1.3.2 Sampling Error Robustness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .123
6.1.4 Bandwidth Efficiency of EPM(5,12,1/3,1). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .126
6.1.5 Power Efficiency of EPM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .126
6.2 System Implementation with EPM(5,12,1/3,1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .126
6.2.1 System Impact of EPM Extension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .126
6.2.2 Infrared Controller with EPM Extension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127
6.2.2.1 CRC Unit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127
6.2.2.2 Modulation Unit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .128
6.2.2.3 Synchronization Unit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .129
6.2.2.4 Demodulation Unit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .129
6.2.2.5 Bus Interface Unit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .129
6.2.3 Clock Recovery and Edge Detection for EPM(5,12,1/3,1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .129
6.2.3.1 Synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .131
6.2.3.2 Digital PLL for EPM(5,12,1/3,1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .131
6.2.3.3 Sampling and Edge Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .138
6.2.3.4 Manner of Operation for Clock Phase Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .138
6.2.3.5 Sampling Clock Phase Accuracy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .144
6.2.4 Framing Structure for EPM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .145
6.3 HW Prototype and Measurements Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .147
6.3.1 HW Prototype Implementation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .147
6.3.2 Measured Eye Diagrams after Quantization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .148
6.3.3 Measured Frame Processing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .149
CHAPTER 7 Conclusion and Outlook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
APPENDIX A RLL(5,12) Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
A.1 Encoder Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155
A.2 Decoder Generation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165
Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
xix
List of Figures
CHAPTER 1 Introduction ...................................................................................................... 1
Figure 1-1. Wireless Optical Communications System of A.G. Bell (1880) .................................................3Figure 1-2. Wireless Infrared Communications System.................................................................................5Figure 1-3. Classification of Optical Links ....................................................................................................6Figure 1-4. Physical Layer according to IrDA Standard ................................................................................8Figure 1-5. System Architecture.....................................................................................................................9Figure 1-6. Infrared Transceiver .....................................................................................................................9
CHAPTER 2 Wireless Infrared Channel ............................................................................ 11
Figure 2-1. Wireless Infrared Channel .........................................................................................................11Figure 2-2. Principle of Absorption and Emission of Photons.....................................................................12Figure 2-3. Electromagnetic Spectrum.........................................................................................................14Figure 2-4. Radiant Intensity Illustration......................................................................................................15Figure 2-5. Directed LOS Link according to IrDA ......................................................................................17Figure 2-6. Normalized Power Spectra of Ambient Infrared Radiation Sources .........................................18Figure 2-7. Optical Link Model....................................................................................................................19Figure 2-8. TX Path of an Infrared Transceiver............................................................................................20Figure 2-9. LED in Thermal-Equilibrium Condition ...................................................................................22Figure 2-10. LED in Forward Biased Condition ..........................................................................................23Figure 2-11. Emission Spectrum of LEDs....................................................................................................24Figure 2-12. Normalized Radiant Intensity vs. Angular Displacement........................................................25Figure 2-13. Receiver Front-End ..................................................................................................................26Figure 2-14. Cross-Section View of p-i-n Photodiode under Reverse Bias .................................................27Figure 2-15. Operation of a p-i-n Photodiode ..............................................................................................28Figure 2-16. Normalized Responsivity of a Si Diode and a Ge Diode.........................................................30Figure 2-17. Baseband Model of Wireless Infrared Channel .......................................................................32Figure 2-18. Settling Time of the High-Pass Filter due to Disturbance EAmbient......................................33Figure 2-19. Steady State Baseband Model of Wireless Infrared Channel ..................................................33Figure 2-20. Reference Channel Model........................................................................................................38Figure 2-21. Reference Channel Model in Steady State...............................................................................39Figure 2-22. Reference Input Pulse ..............................................................................................................40Figure 2-23. Impulse Response after the Transmitter Front-End .................................................................40Figure 2-24. Impulse Response after Transmitter Front-End and Optical Link...........................................41Figure 2-25. Impulse Response of complete Wireless Infrared Channel .....................................................41Figure 2-26. Settling Time of the High-Pass Filter of the Receiver Front-End............................................42
CHAPTER 3 Electrical Modulation and Demodulation .................................................... 43
Figure 3-1. Binary-Level Electrical Modulation and Demodulation............................................................43Figure 3-2. Electrical Modulation Process ...................................................................................................45Figure 3-3. Electrical Demodulation Process ...............................................................................................50Figure 3-4. Transfer Function of the Quantization Unit ...............................................................................50Figure 3-5. Pulse Extension due to Imprecise Threshold .............................................................................51Figure 3-6. Output of the Binary Level Quantization with Ideal Threshold ................................................52Figure 3-7. Receiver Clock Recovery and Sampling....................................................................................53Figure 3-8. Probability Density Function p0k and p1k ................................................................................58Figure 3-9. Eye Diagram after Receiver Front-End without Noise..............................................................61Figure 3-10. Sample Error: Pulse not Sampled by Corresponding Sample Beat .........................................62Figure 3-11. Sample Error: Pulse Mistakenly Sampled by Next Sample Beat ............................................63
xxi
Figure 3-12. Horizontal Eye Opening of rb(t) ............................................................................................ 63
CHAPTER 4 Pulse Position based Modulation Schemes ................................................... 67
Figure 4-1. 1/4-RZI Modulation .................................................................................................................. 69Figure 4-2. 1/4-RZI Eye Diagram of r(t) after Receiver Front-End............................................................. 70Figure 4-3. 1/4-RZI Demodulation .............................................................................................................. 70Figure 4-4. 1/4-RZI Bit Error Probability due to Quantization Errors ........................................................ 71Figure 4-5. 1/4-RZI Eye Diagram of r(t) without Noise under Worst Case Condition................................ 72Figure 4-6. 1/4-RZI Eye Diagram of rb(t) after Quantization Unit ............................................................. 73Figure 4-7. 4-PPM Modulation .................................................................................................................... 77Figure 4-8. 4-PPM Eye Diagram of r(t) after Receiver Front-End .............................................................. 77Figure 4-9. 4-PPM Error Correction ............................................................................................................ 78Figure 4-10. 4-PPM Demodulation.............................................................................................................. 79Figure 4-11. 4-PPM Bit Error Probability due to Quantization Errors ........................................................ 80Figure 4-12. 4-PPM Eye Diagram of r(t) without Noise under Worst Case Condition ............................... 81Figure 4-13. 4-PPM Eye Diagram of rb(t) after Quantization Unit ............................................................. 82Figure 4-14. HHH(1,13) Modulation ........................................................................................................... 86Figure 4-15. HHH(1,13) Eye Diagram of r(t) after Receiver Front-End ..................................................... 87Figure 4-16. HHH(1,13) Single-Pulse Correction ....................................................................................... 87Figure 4-17. HHH(1,13) Demodulation....................................................................................................... 89Figure 4-18. HHH(1,13) Bit Error Probability due to Quantization Errors ................................................. 90Figure 4-19. HHH(1,13) Eye Diagram of r(t) without Noise under Worst Case Condition ........................ 91Figure 4-20. HHH(1,13) Eye Diagram of rb(t) after Quantization Unit ...................................................... 92
CHAPTER 5 Edge Position Modulation .............................................................................. 95
Figure 5-1. Principle of Pulse Position Modulation Techniques.................................................................. 95Figure 5-2. Principle of Edge Position Modulation Techniques .................................................................. 96Figure 5-3. EPM Modulator Components with Corresponding Signals ...................................................... 97Figure 5-4. EPM Demodulator Components with Corresponding Signals.................................................. 98Figure 5-5. Lower Limit of Time Slot Duration Tchip ................................................................................ 99Figure 5-6. EPM with r = 1, d = 5 and k = 10............................................................................................ 100Figure 5-7. State Transition Diagram of RLL(d,k) Codes ......................................................................... 101Figure 5-8. State Transition Diagram of RLL(d,) Codes ........................................................................... 103Figure 5-9. RLL Code Capacity CRLL(d,k) versus d and k ...................................................................... 106Figure 5-10. RLL(1,3) Transition Diagram ............................................................................................... 107Figure 5-11. Final State Transition Diagram 1/2-rate RLL(1,3)................................................................ 110Figure 5-12. Maximum Bandwidth Efficiency of EPM with r = 1 ........................................................... 113
CHAPTER 6 EPM(5,12,1/3,1) - Implementation Example .............................................. 117
Figure 6-1. EPM(5,12,1/3,1) Modulation .................................................................................................. 120Figure 6-2. EPM(5,12,1/3,1) Eye Diagram of r(t) after the Receiver Front-End....................................... 120Figure 6-3. Edge Detection for EPM(5,12,1/3,1)....................................................................................... 121Figure 6-4. EPM(5,12,1/3,1) Demodulation .............................................................................................. 123Figure 6-5. EPM(5,12,1/3,1) Bit Error Probability due to Quantization Errors ........................................ 124Figure 6-6. EPM(5,12,1/3,1) Eye Diagram of r(t) without Noise under Worst Case Condition ............... 124Figure 6-7. EPM(5,12,1/3,1) Eye Diagram after Quantization Unit.......................................................... 125Figure 6-8. IrDA Compliant Infrared Communication System ................................................................. 127Figure 6-9. IrDA Compliant Infrared Controller with EPM(5,12,1/3,1) Extension .................................. 128Figure 6-10. Clock Recovery and Edge Detection Circuitry for EPM(5,12,1/3,1).................................... 130Figure 6-11. Synchronization of Input Signal rb(t).................................................................................... 131Figure 6-12. DPLL Circuitry...................................................................................................................... 132Figure 6-13. Phase Detector Behavior at Phase Lock when 2nd MSB = ’1’............................................. 132
xxii
Figure 6-14. Phase Detector Behavior at Phase Lock when 2nd MSB = ’0’ .............................................133Figure 6-15. Phase Detector Behavior at a Phase Error of Tsysclk/2 when 2nd MSB = ’1’ .....................133Figure 6-16. Phase Detector Behavior at a Phase Error of Tsysclk/2 when 2nd MSB = ’0’ .....................134Figure 6-17. Phase Detector Behavior at a Phase Error of Tsysclk when 2nd MSB = ’1’.........................134Figure 6-18. Phase Detector Behavior at a Phase Error of Tsysclk when 2nd MSB = ’0’.........................135Figure 6-19. Phase Detector Behavior at a Phase Error of -Tsysclk/2 when 2nd MSB = ’1’ ....................135Figure 6-20. Phase Detector Behavior at a Phase Error of -Tsysclk/2 when 2nd MSB = ’0’ ....................136Figure 6-21. Phase Detector .......................................................................................................................136Figure 6-22. Sampling and Edge Detection................................................................................................138Figure 6-23. Clock Recovery with Average Phase Offset Tsysclk/2 and with 2nd MSB = ’1’ .................139Figure 6-24. Clock Recovery with Average Phase Offset Tsysclk and with 2nd MSB = ’1’.....................140Figure 6-25. Clock Recovery with Average Phase Offset -Tsysclk/2 and with 2nd MSB = ’1’ ................141Figure 6-26. Clock Recovery with Average Phase Offset Tsysclk/2 and with 2nd MSB = ’0’ .................142Figure 6-27. Clock Recovery with Average Phase Offset Tsysclk and with 2nd MSB = ’0’.....................143Figure 6-28. Clock Recovery with Average Phase Offset -Tsysclk/2 and with 2nd MSB = ’0’ ................144Figure 6-29. EPM modulation and packet Generation Flow ......................................................................146Figure 6-30. FPGA Board Description.......................................................................................................147Figure 6-31. Piggyback Prototype with FPGA Board and ARM7 Evaluation Board ................................148Figure 6-32. Measuring Setup for Eye Diagram Measuring ......................................................................148Figure 6-33. Eye Diagram after Quantization at d = 5cm, phi = 0° ...........................................................149Figure 6-34. Eye Diagram after Quantization at d = 10 cm, phi = 30° ......................................................149Figure 6-35. Eye Diagram after Quantization at d = 100 cm, phi = 0° ......................................................150Figure 6-36. Measuring Setup for Frame Processing Measuring ...............................................................150Figure 6-37. Measurement Results of Logic Analyzer...............................................................................151
CHAPTER 7 Conclusion and Outlook............................................................................... 153
APPENDIX A RLL(5,12) Generation ................................................................................ 155
xxiii
List of Tables
CHAPTER 1 Introduction ...................................................................................................... 1
CHAPTER 2 Wireless Infrared Channel ............................................................................ 11
Table 2-1. Reference Parameters Overview..................................................................................................39
CHAPTER 3 Electrical Modulation and Demodulation .................................................... 43
CHAPTER 4 Pulse Position based Modulation Schemes................................................... 67
Table 4-1. Encoding Table for 4-PPM ..........................................................................................................75Table 4-2. Decoding Table for 4-PPM..........................................................................................................78
CHAPTER 5 Edge Position Modulation.............................................................................. 95
Table 5-1. RLL Code Capacity C(d,k)........................................................................................................105Table 5-2. State Transition Table D2 ..........................................................................................................108Table 5-3. Splitting Step 0 ..........................................................................................................................108Table 5-4. Splitting Step 1 ..........................................................................................................................109Table 5-5. Encoding Table ..........................................................................................................................109Table 5-6. Reduction of Encoding Table ....................................................................................................110Table 5-7. Final Reduced Encoding Table..................................................................................................110Table 5-8. Decoding Table..........................................................................................................................111Table 5-9. EPM Variants.............................................................................................................................115
CHAPTER 6 EPM(5,12,1/3,1) - Implementation Example.............................................. 117
Table 6-1. Value Table of Phase Detector Logic ........................................................................................137Table 6-2. Phase Shift of Sample Clock .....................................................................................................137Table 6-3. Description of Measured Signals...............................................................................................150
CHAPTER 7 Conclusion and Outlook............................................................................... 153
Table 7-1. Summary of Evaluation Parameters ..........................................................................................154
APPENDIX A RLL(5,12) Generation ................................................................................ 155
Table A-1. State Transition Table D3 .........................................................................................................156Table A-2. Splitting Step 0 .........................................................................................................................157Table A-3. Splitting Step 1 .........................................................................................................................157Table A-4. Splitting Step 2 .........................................................................................................................158Table A-5. Splitting Step 3 .........................................................................................................................159Table A-6. Splitting Step 4 .........................................................................................................................159Table A-7. Encoding Table .........................................................................................................................161Table A-8. First Reduction of Encoding Table ...........................................................................................162Table A-9. Second Reduction of Encoding Table.......................................................................................163Table A-10. Third Reduction of Encoding Table .......................................................................................164Table A-11. Forth Reduction of Encoding Table........................................................................................164Table A-12. Encoder Truth Table ...............................................................................................................165Table A-13. Decoding Table .......................................................................................................................166
xxv
1 Introduction
1.1 Motivation and Goals of the Thesis
In recent years mobile digital devices like PDAs, mobile phones, digital cameras, and Laptops
have penetrated the consumer market. All these devices require a powerful short range
communication method for data exchange between each other, for connections with printers or
for local area network (LAN) accesses [2]. Basically, the communication methods can be based
on cable connections, on radio links or on infrared links. Since all of them have their individual
strengths and weaknesses, each type has found its way into the various products [3].
The data exchange via cables is a well established method and especially USB has become a
widely used standard interface. USB excels due to its high baud rates of up to 480 Mbit/s, but
suffers from its limited mobility due to the cable connection [4]. Therefore USB is best for
applications, which require stable high performance connections for transmission of high data
volumes, where mobility is not that important. An example application would be the connection
of a video-conferencing camera with your laptop.
However, mobility is the big advantage of radio based short range communication methods like
Bluetooth, which recently have appeared in many mobile devices. Bluetooth can transmit data
through solid, non-metal objects and supports a nominal link range from 10 cm to 10 m at a
moderate baud rate of up to 721 kbit/s [5]. Because of the nature of radio Bluetooth is a point-
to-multipoint communication system, which supports connections of two devices as well as ad
hoc networking between several devices. But in order to prevent unauthorized access, Bluetooth
requires sophisticated authentication and encryption mechanisms, which hamper a fast
connection establishing. Therefore Bluetooth is best for applications, which require stable point-
to-point or point-to-multipoint connections for data exchange at moderate speed, where mobility
is the key requirement. An example application would be the transmission of audio data from
your mobile phone to your headset.
1
On the contrary to USB and Bluetooth, the infrared transmission based on the IrDA standard
[1][6] enables a fast and simple connection establishing due to its point-and-shoot characteristic.
Together with the high baud rates of up to 16 Mbit/s this makes IrDA transmission perfectly
suited for applications, which require high performance ad hoc point-to-point connections.
Example applications would be the download of pictures from your digital camera on your
laptop or paying your meal in your company’s cafeteria with your mobile phone via the IrDA
port.
In order to provide competitive baud rates, IrDA has continuously improved the modulation
techniques of its standards by introducing Return to Zero Inverted (RZI) for the Serial Infrared
(SIR) standard, 4 Pulse Position Modulation (4-PPM) for the Fast Infrared (FIR) standard and
HHH(1,13)1 for the latest Very Fast Infrared (VFIR) standard [1].
The goal of this thesis is to present in detail a new modulation scheme called Edge Position
Modulation (EPM) with Run-Length-Limited (RLL) coding, which is a consequent further
development of the previous techniques. The basic ideas behind EPM have already been
published in [7], [8], [9] and [10], and have been protected by patent [11] by the author. Basically
EPM shall offer both an increased bandwidth efficiency and an increased power efficiency over
previous methods. Since the novel modulation technique can be optimized to the characteristics
of the wireless infrared channel, it shall also maintain low bit error rates. EPM is intended as a
possible extension of IrDA's physical layer (IrPHY) [1] and shall be transparent for the upper
layers of the IrDA protocol stack [6][12][13][14]. Furthermore it shall be compliant to standard
infrared transceivers [15][16].
1.2 History of Wireless Infrared Communications
[17] Since communication by means of the human voice is insufficient for larger distances,
mankind has always been seeking for alternative ways for information exchange. One
recognized very early that optical signals can be used to overcome large distances very easily.
Therefore the first wide area communication systems were optical ones, like smoking signals,
fire, light-towers, signal-rockets and semaphorical wave-signals.
1. HHH is an abbreviation of the names Hirt, Hassner and Heise, the developers of the code
2
The 19th century was the era of the big discoveries and inventions in the field of communication
science. In 1838 Morse developed the telegraphy with his famous Morse signs. In 1865 Maxwell
developed the theory of electromagnetic radiation, which was verified and improved by Hertz in
1888. Due to further inventions in those years like the telephone of Bell and Gray in 1876, the
artificial electrical light of Edison in 1879, the development of the photo-electrical cell by Bell,
and the radio developments of Marconi and Popov, the reception of information signals was no
longer limited to the human organs of sense.
One of the first wireless communications system with an artificial receiver was an optical system
as illustrated in Figure 1-1 (source: [17]). This system had been introduced by Bell [18] years
before Hertz has verified the existence of electromagnetic waves. The intensity of a beam of
sunlight was modulated by an optical microphone that consists of a vibrating mirror. The
detection was realized by a light-sensitive bar of selenium. The resulting electrical signal was
converted into an audio signal by means of a telephone, which was invented also by Bell some
years before.
Figure 1-1. Wireless Optical Communications System of A.G. Bell (1880)
Although communication over several hundreds of meters was proved, the science community
was concentrating on radio based communication systems in the following years. As radio
systems offers several advantages, such as not being limited by the horizon, interest in optical
systems was very low. Nevertheless, with the development of new electro-optic components in
the 1960s, such as lasers, light-emitting diodes (LED) and photodiodes, the interest in wireless
optical transmission reawakened.
In 1979 Gfellner from IBM recognized that wireless infrared communication is especially suited
for in-door communication and so Gfellner was the first who proposed to build up a wireless
3
LAN by means of diffuse infrared [19]. Gfellner's paper can be considered as the basis for all
wireless infrared in-door communications systems, that have come up since then. (In fact, the
paper was even the first wireless LAN proposal using any medium.)
Also in 1979 the company Hewlett-Packard began to integrate infrared-interfaces in the pocket
calculators for interconnections with printers. From then on many infrared communication
systems penetrated the market and became the heart of almost any remote control system. It soon
became obvious that for interoperability between the devices of different companies an infrared
transmission standard was required. Therefore in 1993 the Infrared Data Association (IrDA) has
been founded by about 50 companies with the purpose of establishing a ubiquitous, low-cost,
point-to-point serial infrared standard. Just one year later in 1994 IrDA published its first
standards. The standard for the physical layer was mainly based on the initial work of Hewlett-
Packard (HP) [20][21] and also the name was taken over from HP: Serial Infrared (SIR). The
Link Access Protocol (IrLAP) standard was based on proposals of IBM [22][23][24]. In the
meantime IrDA has come up with several improvements and extensions of its standards and
almost any shortrange infrared communication system is based on the IrDA standard.
1.3 State of the Art at Wireless Infrared Communications
Wireless infrared communications systems are feasible for a wide range of applications like
remote controls, local area computer networks or inter-satellite communication. However, the
focus of this thesis are short-range, point to point, low power and low cost infrared data
interconnection applications as they are the focus of the IrDA standards [25]. The following
provides classification criteria of the different types of wireless infrared communications
systems and specifies the target configuration for this thesis.
In general, for the transmission of single bits over a physical channel, one has to convert the bits
into signals, which can be reliably transmitted over the channel. This process is performed in the
so called physical layer of a communications system [2]. At the physical layer of wireless
infrared communications systems the conversion is performed in two steps called electrical
modulation and optical modulation [17]. In the electrical modulation process the bit stream is
converted into an electrical waveform, which is adapted to the properties of the optical
modulator that finally converts the electrical signal into an infrared signal. The infrared signal is
4
transmitted via an optical link to the receiver, where the bit stream is retrieved by the consecutive
processes detection and electrical demodulation, which are the counterparts of optical
modulation and electrical modulation. Figure 1-2 provides an overview of the physical layer of
a wireless infrared communications system.
Figure 1-2. Wireless Infrared Communications System
ElectricalModulation
OpticalModulationBinary Source
Binary Sink ElectricalDemodulation Detection
Optical Link
1.3.1 Optical Link Design
The optical link between the optical modulator and the detector can be classified by two
independent criteria [26][27] as shown in Figure 1-3 (source: [17]):
• directed vs. non-directed link design
• Line-of-Sight vs. non-Line-of-Sight link design
Directed links employ directional transmitters and receivers, which must be aimed in order to
establish a link. Non-directed links employ wide-angle transmitters and receivers, alleviating the
need for such pointing. Directed link design maximizes power efficiency, since it minimizes
path loss and reception of ambient light noise. On the other hand, non-directed links may be
more convenient to use, particular for mobile devices, since they do not require aiming each of
the receiver or the transmitter. It is also possible to establish hybrid links, which combine
transmitter and receivers having different degrees of directionality.
5
Figure 1-3. Classification of Optical Links
The second classification criterion relies on the existence of an uninterrupted line-of-sight (LOS)
path between the transmitter and the receiver. LOS links rely on such a path, while non-LOS
links generally rely on reflection of the light from the ceiling or some other diffusely reflecting
surfaces. LOS link design maximizes power efficiency and minimizes multipath distortion.
Non-LOS link design increases link robustness and ease of use, allowing the link to operate even
when barriers stand between the transmitter and receiver.
The greatest robustness and ease of use are achieved by the non-directed-non-LOS link design,
which is often referred to as a diffuse link. However, directed LOS link design require less power
and allow higher baud rates since multi-path distortion is negligible [17] [26]. Both, power
efficiency and high baud rates, are important features of IrDA's target application. Therefore
IrDA uses directed LOS link design and consequently the focus of this thesis will be put on
directed LOS links in the following.
1.3.2 Optical Modulation / Detection
Considering the best type of optical modulation and detection for mobile systems Otte et al. [17]
evidently indicated that intensity (i.e. optical power) modulation and the corresponding direct
detection are preferable against wavelength and polarization modulation techniques with their
6
coherent detection methods. Thus in the following we are assuming an intensity modulation and
direct detection system, which can be simply realized with an LED and a photodiode (PD)
respectively. Barry [26] presented various types of multi-level intensity modulation schemes
like Pulse Amplitude Modulation (PAM). In this thesis only binary-level intensity modulation
(i.e. LED on and LED off) is addressed, since in mobile applications the distance between the
transmitter and the receiver may vary and consequently a sophisticated adaptation of the
received signal power would be necessary in the receiver, which is not really feasible in low cost
devices. Modulation and demodulation are usually performed by digital signal processing, while
intensity modulation and direct detection are obviously analog tasks, which have to be
performed on an extra chip called infrared transceiver [1][28]. Since low cost infrared
transceivers usually perform binary hard decision, the demodulation and equalization techniques
introduced in [27] and [29], which require multi-bit analog to digital conversion, are not useful
for our applications. For that reason we assume, that the infrared transceiver performs a binary
hard decision in the reception path.
1.3.3 Electrical Modulation / Demodulation
In the electrical modulation process the bit stream that needs to be transmitted is converted into
an electrical waveform, which is adapted to the properties of the optical modulator. As
mentioned above the focus of this thesis lies upon binary-level intensity modulation and
consequently only binary-level electrical modulation techniques (i.e. voltage on and voltage off)
are considered here. In the electrical demodulation process the electrical waveform recovered by
the receiver path of the infrared transceiver is converted back into the original bit stream. Since
the infrared transceiver performs binary hard decision we can assume that the input waveform
of the electrical demodulator is identical to the output waveform of the electrical modulator. I.e.
electrical modulation and electrical demodulation are inverse processes. Currently, the
following binary-level electrical modulation techniques are used by IrDA [1]:
• Return-to-Zero Inverted (RZI)
• Pulse-Position-Modulation (PPM)
• Run-Length-Limited Code HHH(1,13)
7
With Edge Position Modulation (EPM) this thesis will present a completely new binary-level
modulation technique.
1.3.4 Overview of IrDA's Wireless Infrared Communications System
A good general overview of the complete wireless infrared communication system based on
IrDA can be found in [25]. However, IrDA has specified the type of the optical link, the optical
modulation and detection scheme and the electrical modulation techniques in its standards
IrPHY [1] and IrLAP [6] as described above1. Figure 1-4 provides an overview of the physical
layer of wireless infrared communications systems according to IrDA's standards. The binary
source and the binary sink represent the data link layer [30] of the transmitter and the receiver,
respectively. Note that each IrDA device is always both transmitter and receiver, since the IrDA
link is bi-directional.
Figure 1-4. Physical Layer according to IrDA Standard
ElectricalModulation
IntensityModulationBinary Source
Binary Sink ElectricalDemodulation
DirectDetection
Directed LOSLink
In order to illustrate how the physical layer is usually implemented, Figure 1-5 shows typical
system architectures of IrDA compliant devices. The data link layer and the upper protocol
layers of a device are basically implemented in software on a CPU. A digital hardware circuitry,
a so called infrared controller, performs the electrical modulation of the TX path as well as the
electrical demodulation of the RX path.
1. The IrLAP standard determines also the data link layer of an IrDA compliant device, i.e. the format of the data packets, the framing of data packets, error detection and error correction.
8
Figure 1-5. System Architecture
CPU CPUIRController
IRController
IR TransceiversDevice A Device B
In Laptops the IR controller is typically implemented by a dedicated chip [31], but e.g. for
mobile phones the IR controller is typically integrated with the CPU in one common chip [32].
All the optical signal processing tasks, including intensity modulation and direct detections, are
usually performed by a so called infrared transceiver (see also Figure 1-6).
Figure 1-6. Infrared Transceiver
9
2 Wireless Infrared Channel
2.1 Definition of Wireless Infrared Channel
The purpose of this Chapter 2 is to derive a mathematical baseband model that will be used in
later chapters for the evaluation of the various electrical modulation schemes. For that it is
assumed that the wireless infrared channel comprises the transmitter front-end of the infrared
transceiver, the optical link and the receiver front-end of the infrared transceiver as illustrated in
Figure 2-1 [33][26][17].
Figure 2-1. Wireless Infrared Channel
LED
UTX(t)
ElectricalModulation
IntensityModulation
ElectricalDe-
modulation
DirectDetection
Directed LOSLink
Wireless Infrared Channel
PreamplifierPD
iRX(t)
Optical Filter
Receiver Front-EndTransmitter Front-End Optical Link
11
2.2 Optical Link
2.2.1 Basics of Optics
2.2.1.1 What is Infrared Light?
[34][35] Light in general is radiant energy that is emitted by atoms when they are fed with a
certain amount of energy: At first the induced energy causes a quantum jump of valence
electrons, i.e. they are brought into a higher energy state. This state of atomic excitation is not
stable, so that after a short period of time the excited electrons spontaneously releases the stored
energy and performs a quantum jump back to the origin energy state1. This second step of energy
readjustment can occur by conversion to thermal energy or by the emission of light quantums.
Thus light can be described as a stream of discrete energy packets called photons. The energy of
a photon is equal to the energy difference between the excited and the ground state of the valence
electron that has caused the emission of the photon. A typical energy source that can cause light
emission is induced heat that results in atomic collisions and thereby in atomic excitation. The
creation of light emission by other energies than induced heat, e.g. electrical current, is called
luminescence.
Figure 2-2. Principle of Absorption and Emission of Photons
+
AbsorbedEnergy Quant
Emitted LightQuant (Photon)
1. At semiconductor devices, which are investigated in later sections, the quantum jump from the excited state back to the ground state is equivalent to the recombination process, where electrons moves from the conduction band back to the valence band.
12
Light cannot only be emitted by atoms, but also be absorbed by them. In that process the
absorbed photon brings a valence electron in an excited state1. Figure 2-2 illustrates both the
emission and the absorption process.
Since most of the phenomena of light can be described by the characteristics of waves, light can
also be considered as an electromagnetic wave. The frequency ν of the electromagnetic wave
depends on the energy Wp of the photon:
Wp hν= Eq. 2-1.
with the Plank's constant h
h 4.1356692 15–×10 eVs 6.6260755 34–×10 Js.= = Eq. 2-2.
I.e. the energy of the photons increases with higher frequencies and consequently the photons of
e.g. blue light (Wp = 2.7 eV) has more energy than the photons of red light (Wp = 1.8 eV),
because it has a higher frequency. The relation between the frequency ν and the wave length λ
is given by
λ cν---= Eq. 2-3.
with the speed of light c. The speed of light in vacuum is given by
c0 2.99792458 8×10 m s⁄ .= Eq. 2-4.
If light propagates through materia, then its speed is reduced by the refraction index n:
cc0n-----= Eq. 2-5.
1. The quantum jump of valence electrons from the ground state in the excited state is at semiconductors equiva-lent to the electron-hole generation, where electrons are moved from the valence band to the conduction band.
13
The whole frequency range of the electromagnetic waves is called electromagnetic spectrum and
is illustrated in Figure 2-3.
Figure 2-3. Electromagnetic Spectrum
[nm] Ultraviolet (UV)
Extreme
Far
Near
10
20
30
40
60
80100
200
300
400
1 XE
1 pm
1 A
1 nm
1 m
1 mm
1 cm
1 m
1 Km
1 Mm
µ
10
10
3
4
105
106
[nm]
380
400
500
600
700
800
Wavelengthin vacuum
[nm] 10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
1
24
23
22
21
20
19
18
17
16
15
14
13
12
11
10
9
8
7
6
5
4
3
2
1
Frequencyrange (Hz)
Rays
Cosmicheights
X-ray
1THZ
1GHZ
1MHz
1KHz
1Hz
Waveregion
Micro
Centi
Deci
VHF
HF
M
SF
Alter-natingcurrent
Violet
(Visible radiation)(light)
Ultramarine
Ice blue
Bluish green
Green
Yellowgreen
Yellow
Orange
Brightred
Darkred
[nm] Infrared (IR)
Near
Medium
Far
ExtremeFar
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
-6
-5
-4
-3
-2
-1
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Gamma
The spectrum has a wide range from the long waves with low-energy, radio waves, to high-
energy roentgen radiation and gamma radiation of atom cores. Light covers 24 decades of the
whole spectrum, which is only a small range. While the visible light goes from 380 nm (violet)
to 780 nm (red), the infrared light ranges from 780 nm to 1 mm.
The infrared range has been discovered by the astronom Sir William Herschel in the year 1800.
Infrared light is separated in 4 regions:
14
• Near IR (780 nm - 3000 nm),
• Intermediate IR (3000 nm - 6000 nm),
• Far IR (6000 nm - 15000 nm), and
• Extreme Far IR (15000 nm - 1 mm)
2.2.1.2 Energy related Quantities
As described above light transports energy. The following provides an overview of some energy
related quantities that are required for the characterization of optical links.
• Radiant Energy Q [J] refers to the total amount of energy emitted, transferred, or collected
in a radiation process.
• Radiant Power or Radiant Flux Φ [W] is the time rate of change of radiant energy.
• Radiant Intensity I [W/sr] represents the flux per unit solid angle radiated by an entire
source in a given direction. The direction can be represented by a vector n and thus the radi-
ant intensity is given by
I n( ) dΦ n( )dΩ
---------------- .= Eq. 2-6.
The radiant intensity is of interest if the source is far away so that it can be considered as
point source and if the detector is small so that all rays from the source onto the detector are
essentially parallel. Figure 2-4 illustrates the radiant intensity.
Figure 2-4. Radiant Intensity Illustration
( )ndr
ΦΩd
nr
( ) ( )Ω
Φ=d
ndnIr
r
Φ
15
• Irradiance E [W/m²] is the radiant flux per unit area incident onto a surface.
E dΦdA-------= Eq. 2-7.
All these quantities refer to total radiation of all wavelengths. Hence, the radiant intensity I and
the irradiance E are the sums of all their respective spectral components:
I I λ( )dλ0
∞
∫= Eq. 2-8.
E E λ( )dλ0
∞
∫= Eq. 2-9.
2.2.2 Directed LOS Link according to IrDA
Since the focus of the IrDA is a low power and low cost communication system, they use
directed LOS links as described in Section 1.3 on page 4. An overview of the specified directed
LOS link is illustrated in Figure 2-5 and described in the following:
• The Link Distance that must be supported by IrDA devices is 0 m to at least 1 m.
• The Radiant Intensity of the Transmitter within a cone with a half-angle of 15° must be
between a minimum of 40 - 100 mW/sr (depending on the used bit rate) and a maximum of
500 mW/sr. For a half-angle between 15° and 30° the radiant intensity of the transmitter may
be lower than the minimum value. For larger half-angles the intensity must be lower than the
minimum value.
• The Receiver Field of View (FOV) must be at least 15°.
• If the transmitter is in the receiver FOV, then the receiver must be able to operate correctly at
all Minimum and Maximum Irradiances that may be caused by the transmitter consider-
ing the allowed range of radiant intensities and the allowed range of link distances.
• The Peak Wavelength (wavelength with the maximum radiant intensity) must be between
850 nm and 900 nm.
• The Bit Error Ratio shall be no greater than 10-8.
16
Along with that standard specification, IrDA provides also a low power version with reduced
link distances and reduced radiant intensities. For the complete specification of the directed LOS
link of IrDA see [1].
Figure 2-5. Directed LOS Link according to IrDA
0 … 1 m
Transmitter
Receiver15°...30°>15°
2.2.3 Ambient Radiation and Optical Filtering
[19][17][26] At the optical link of wireless infrared communications systems intense ambient
infrared radiation must be taken into account. The most important sources of ambient infrared
radiation are the sun, incandescent and fluorescent lamps. The normalized optical power spectra
of that infrared sources are shown in Figure 2-6 (source: [26]). Additionally, electromagnetic
fields or other infrared transmitter (e.g. IR remote controls) can disturb the infrared link. Here it
should be emphasized that direct sun-light, when present, is typically much stronger than other
sources.
Hence, optical filtering is required to reduce the influence of those ambient light sources. For
that purpose usually bandpass filtering is used that is adapted to the frequency range of the LED.
The frequencies above the upper corner frequency of the LED are basically suppressed due to
the low pass characteristic of the photodiode (see Section 2.4.2 on page 26). The frequencies
below the lower corner frequency of the LED, i.e. the visible light, can be suppressed by means
of an absorption filter. Cheap absorption filters can be realized by colored glass [36].
17
Figure 2-6. Normalized Power Spectra of Ambient Infrared Radiation Sources
However, only the side-band components of those spectra are suppressed by optical filters or the
detector photodiode, but the in-band components result in a photocurrent at the receiver. That
photocurrent due to ambient radiation can be much larger than the photocurrent due to the
payload signal from the transmitter. Fortunately, the ambient radiation is basically constant and
hence the ambient photocurrent can be easily suppressed by a high-pass filter in the receiver.
Since ambient radiation has obviously a major impact on the link design, the IrDA specification
defines the maximum ambient radiation due to electromagnetic fields, sun-light, incandescent
and fluorescent lighting, where the receiver still has to operate correctly (see appendix A.1 in
[1]).
2.2.4 Optical Link Model
[37] In order to build up a mathematical model for the optical link two things needs to be
considered - the path loss and the induced ambient radiation.
18
2.2.4.1 Path Loss
The transfer function of the optical link is defined as the ratio between the irradiance at the
receiver and the radiant intensity of the transmitter in the direction of the receiver.
HLOS f( ) EI---= Eq. 2-10.
For the definition of radiant intensity and irradiance refer to Section 2.2.1.2 on page 15. Due to
the relatively small FOV of the receiver only the LOS propagation path needs to be considered
and multipath distortions can therefore be neglected. This allows us to assume a non frequency
selective channel, where only the path loss is relevant [27].
If the dimensions of the transmitter and the detector are small compared to the distance between
them, then the transmitter can be modelled as a point source with a radiant intensity I in the
direction of the detector and the irradiance E at the receiver can be derived as
E Id2-----Ω0 ϕ ,cos= Eq. 2-11.
whereby d denotes the distance between the transmitter and the detector, and ϕ denotes the
angle of incidence of the transmitter signal on the detector area Adet as shown in Figure 2-7. The
factor Ω0 1sr= is necessary for a correct dimension of E.
Figure 2-7. Optical Link Model
Transmitter Receiver
Adet
Filter
I ϕ
d
d … Link Distance
I … Radiant Intensity
Adet … Detector Area
ϕ … Angle of Incidence
19
Note that the absorption filter has no influence on the path loss, since it filters only visible light
and does not reduce the intensity of the emitted infrared light of the LED. With the Equation 2-
10 and Equation 2-11 the transfer function of a directed LOS link can be derived as
HLOS1d2-----Ω0 ϕ .cos= Eq. 2-12.
It can be seen that the channel is non frequency selective and the path loss is basically
determined by the square of the distance d between the transmitter and the detector [38][39].
2.2.4.2 Ambient Radiation
The ambient radiation due to sun, incandescent or fluorescent lamps are additive to the payload
radiation of the LED. Therefore we can simply add the irradiance Eamb due to the ambient light
to the irradiance due to the emitted radiation of the LED.
2.3 Transmitter Front-End
2.3.1 Transmitter Front-End Circuitry
The transmitter path of an infrared transceiver basically comprises of an LED and the
corresponding control logic as illustrated in Figure 2-8. By means of an electrical binary-level
input signal UTX(t) the LED can be turned on and off and thereby binary-level intensity
modulation can be performed [33][26][17].
Figure 2-8. TX Path of an Infrared Transceiver
LED
UTX(t)
20
2.3.2 Intensity Modulation by LEDs
[40][41] LEDs can transform an electrical signal into optical radiation, whereby the radiant
intensity has basically the same waveform as the applied electrical signal (voltage). Therefore
LEDs are perfectly suited for the above described intensity modulation.
2.3.2.1 Basic Functionality of LEDs
An LED consists of a semiconductor material containing both p-type and n-type regions that
form a p-n-junction. At the p-n-junction the carrier concentration gradients cause carrier
diffusion. Holes from the p-side diffuse into the n-side, and electrons from the n-side diffuse into
the p-side. As holes continue to leave the p-side, some of the negative acceptor ions near the
junction are left uncompensated, since the acceptors are fixed in the semiconductor lattice,
whereas the holes are mobile. Similarly, some of the positive donor ions near the junction are
left uncompensated as the electrons leave the n-side. Consequently, the uncompensated acceptor
and donor ions forms a potential difference UD that is in the direction opposite to the diffusion
current of the mobile holes and electrons, what hampers further mobile charge carrier diffusion.
The schematic of the p-n-junction in Figure 2-9.a illustrates the resulting charge carrier
distribution in thermal-equilibrium condition, i.e. without an applied external voltage. The
region of the uncompensated donor and acceptor ions is called depletion layer, since it contains
no mobile charge carriers. Figure 2-9.b shows the corresponding energy bands of the p-n-
junction in thermal-equilibrium condition. The potential difference results in potential energy
difference eUD that avoids an electrons diffusion from the n-type to the p-type region and a hole
diffusion from the p-type to the n-type region.
If a forward-bias voltage UF is applied as shown in Figure 2-10, then the potential difference is
reduced and the mobile charge carrier can diffuse through the depletion layer. Electrons from
the n-type region can diffuse into the p-type regions, where they recombine with the mobile
holes, the majority carriers of the p-type semiconductor region. On the other hand, holes from
the p-type region can diffuse into the n-type regions, where they recombine with the mobile
electrons, the majority carriers of the n-type semiconductor region. At LEDs that recombination
is a radiative recombination, i.e. the released energy due to the quantum jump of the
recombination process results in emitting photons as described in Section 2.2.1. That means that
the injected charge carriers due to forward-bias voltage results in light. This process is called
21
luminescence as mentioned in Section 2.2.1, and therefore LEDs are also called luminescence
diodes.
Figure 2-9. LED in Thermal-Equilibrium Condition
p n
Conduction Band
Valence Band
DepletionLayer
eUD
p n
UD
a) Schematic of p-n Junction
... Fix Donator Ion
... Fix Acceptor Ion
... Mobile Hole
... Mobile Electron
Ec
Ev
b) Energy Bands
The emitted photons have an energy equal to the energy gap between the conduction band and
the valence band
Wp EC EV–= Eq. 2-13.
and with Equation 2-1 and Equation 2-3 the wavelength λ of the emitted light depends on the
energy band gap of the semiconductor material of the LED:
hcλ------ EC EV–= Eq. 2-14.
22
Figure 2-10. LED in Forward Biased Condition
p n
Conduction Band
Valence Band
Ec
e(UD - UF)
p n
UD
... Fix Donator Ion
... Fix Acceptor Ion
... Mobile Hole
... Mobile Electron
h*fh*f
UF
IF
h*f
h*f
Ev
a) Schematic of p-n Junction
b) Energy Bands
For infrared radiation GaAs semiconductors can be used: GaAs emits photons with a nominal
wavelength λ0 of 870 nm, and GaAs with Si impurities emits photons with a nominal
wavelength λ0 of about 940 nm. Although LEDs are wavelength selective, they have a spectral
broad emission, since the energy gap is not perfectly constant for all emitted photons. A
dimension for the spectral width is the full width at half maximum (FWHM) as indicated in
Figure 2-11. A GaAs LED emits with a FWHM of about 40 nm [42]. The total emitted power P
is the integral over all spectrum components:
P P λ( ) λd0
∞
∫= Eq. 2-15.
23
Figure 2-11. Emission Spectrum of LEDs
1
0.5
FWHM( )
maxPP λ
λ0λ
2.3.2.2 Radiant Intensity versus Induced Diode Current
The relation between the diode current IF and the emitted power P is given by
P ηexthceλ0--------IF= Eq. 2-16.
whereby e denotes the electron charge
e 1.60217733 19–×10 C.= Eq. 2-17.
The efficiency ηext denotes the relation between the emitted optical power and the induced
electrical power. If all induced charge carrier would perform radiative recombination, then ηext
would be 1. Unfortunately this is not the case, because not each recombination is a radiative
recombination, and not all of the generated optical power is really emitted.
If the LED was an isotropic source, then the resulting intensity radiation in any direction would
be constant and given by
IisoΦ4π------ .= Eq. 2-18.
But since the emitted power is not constant in each direction, the intensity radiation depends on
the angular displacement. This relation highly depends on the geometry of the LED and is
usually provided in LED data sheets. Figure 2-12 provides a typical distribution of the
normalized radiant intensity over the angular displacement. For compliance to IrDA's standard
the LED must fulfill the corresponding requirements summarized in Section 2.2.2.
24
Figure 2-12. Normalized Radiant Intensity vs. Angular Displacement
0° 10° 20°30°
40°
50°
60°
70°
80°
1.00.9
0.7
0.6 0.4 0.2
0.8N
orm
aliz
ed R
adia
nt In
tens
ity I no
rm
0
Ang
ular
Dis
plac
emen
t
However, Equation 2-16 shows that the relation between the induced diode current and the
emitted power and consequently the radiant intensity in a dedicated direction is basically linear.
Therefore LEDs are very well suited for Intensity Modulation.
2.3.3 Transfer Function of Transmitter Front-End
[37] For Intensity Modulation by means of an LED the electrical input signal is usually
modulated at a frequency in the MHz range (e.g. 24 MHz for IrDA's VFIR standard). This signal
causes direct modulation of the injected current in an LED. However, the pulses on the optical
link are slightly distorted due to the low pass characteristics of the LED. This is due to parasitic
elements such as the depletion-layer capacitance and series resistance that can cause a delay of
carrier injection into the junction and a delay in the light output, i.e. in the radiant intensity. The
ultimate limit on how fast one can vary the radiant intensity depends on the carrier lifetime τ .
The corresponding modulation bandwidth B is given by
B 12πτ--------- .= Eq. 2-19.
Since we use voltage U [V] as electrical input signal, the transfer function is defined as
HLEDIU---- W
srV--------- .= Eq. 2-20.
25
According to [42] an LED can be modelled as a first order low pass filter. With a time constant
τLED and gain KLED the transfer functions HLED(f) is given by
HLED f( )KLED
j2πfτLED 1+--------------------------------.= Eq. 2-21.
2.4 Receiver Front-End
2.4.1 Receiver Front-End Circuitry
The receiver front-end circuitry comprises basically a photodiode and a preamplifier. The
photodiode transforms the irradiance of infrared light (light with a wavelength between around
850 nm and 1100 nm) into electrical current and thereby performs the direct detection. The
bandpass characteristic of the preamplifier suppresses especially the introduced DC-current due
to ambient light (e.g. from the sun). The receiver front-end is illustrated in Figure 2-13
[33][26][17].
Figure 2-13. Receiver Front-End
Preamplifier
PD
iRX(t)
Receiver Front-End
2.4.2 Direct Detection by Photodiodes
[41] While LEDs use the effect of light emission during the recombination process, photodiodes
use the effect of electron-hole generation due to light absorption. Hence photodiodes are
semiconductor devices that can convert optical radiation into an electrical signal, whereby the
electrical signal has basically the same waveform as the irradiance. Therefore photodiodes are
perfectly suited for the above described direct detection.
26
2.4.2.1 Basic Functionality of Photodiodes
Basically a photodiode is a p-n junction operated under reverse bias. When an optical signal
impinges on the photodiode, the depletion region serves to separate the photo-generated
electron-hole pairs and an electrical current flows in the external circuit. For high-frequency
operation, the depletion region must be kept thin to reduce the transit time. On the other hand
the depletion layer must be sufficiently thick to allow a large fraction of the incident light to be
absorbed and finally to be transformed to electrical current. Unfortunately at ordinary p-n
junctions the width of the depletion layer highly depends on the applied voltage, and therefore
the operation conditions are not stable. But by insertion of an intrinsic layer, the width becomes
independent from the applied voltage and therefore it can be well defined. The resulting photo
detector is called p-i-n photodiode. Figure 2-14 shows a cross section of such a p-i-n photodiode.
Figure 2-14. Cross-Section View of p-i-n Photodiode under Reverse Bias
h*f
in
p
Metal Contact
SiO2
Anti-ReflectionCoating
RL
UR
Figure 2-15.a shows the energy band diagram of the p-i-n photodiode under reverse-bias
condition. If the photon energy of the impinging light is at least equal to the bandgap energy
hc0λ
-------- EC EV,–≥ Eq. 2-22.
then light absorption in the semiconductor produces electron-hole pairs. Pairs produced in the
depletion region or within a diffusion length of it will eventually be separated by the electric
field, whereby a current flows in the external circuit as carriers drift across the depletion layer.
Figure 2-15.b shows the optical absorption characteristics of a p-i-n photodiode. It can be seen
that most of the photons, which penetrate the semiconductor material, are absorbed at the
intrinsic layer.
27
Figure 2-15. Operation of a p-i-n Photodiode
p
Drift Space
a) Energy Band Diagram under Reversed Bias
Ec
Ev
h*fh*f
h*f
i n
HoleDiffusion
ElectronDiffusion
0 wp w + wp x
Pho
ton
Inte
nsity
a) Carrier Absorption Characteristics
2.4.2.2 Photocurrent versus Irradiance
As described in Section 2.2.1.2 irradiance is the radiant flux per unit area incident onto a surface.
Hence, the total received optical power of photodiode is determined by the irradiance E and its
detection area Adet
Popt EAdet.= Eq. 2-23.
Considering that with the photon rate rp and the wavelength λ of the impinged light the optical
power Popt is given by
Popt EAdet rphc0λ
-------- ,= = Eq. 2-24.
28
and that with the electron rate re the photocurrent iphoto is given by
iphoto ree,=Eq. 2-25.
then the relation between the irradiance and the photodiode current can be given by
iphotoE
-------------rerp---- eλ
hc0--------Adet.= Eq. 2-26.
The relation between re and rp is often denoted as quantum efficiency η and it represents the
ratio of absorbed photons that generate an electron-hole pair in the photodiode. Clearly, the
quantum efficiency η depends on the characteristics of the p-i-n photodiode (e.g., width of the
instrinsic layer) and furthermore it is obviously a function of the wavelength λ of the impinged
photons:
η λ( )rerp---- ,= Eq. 2-27.
While the long-wavelength cutoff λ c of the quantum efficiency is established by the bandgap
(see Equation 2-22 on page 27), the short-wavelength cutoff comes about because radiation with
a low wavelength is mostly absorbed very near the surface, where the carriers can recombine
before they can diffuse to the drift space of the intrinsic layer (compare Figure 2-15 on page 28).
In the literature the relation between the irradiance and the photocurrent is often defined as
photodiode responsivity R. With the quantum efficiency the responsivity can be given as
Riphoto
E------------- η λ( ) eλ
hc0--------Adet.= = Eq. 2-28.
Figure 2-16 shows the normalized responsivity of a silicon and of a germanium diode as a
function of the wavelength. It can be seen that a silicon diode fits very well to the requirements
of the optical link defined by IrDA (see Section 2.2.2).
29
Figure 2-16. Normalized Responsivity of a Si Diode and a Ge Diode
1.0
0.0
0.2
0.4
0.6
0.8
500 1000 1500 2000 nm
Si Diode Ge Diode
Wavelength
Nor
mal
ized
Res
pons
ivity
2.4.3 Transfer Function of Receiver Front-End
[37] As described above the receiver front-end circuitry works in that way that a photodiode
transforms impinged optical radiation into electrical current, which is then preamplified. Hence,
the transfer function of a receiver front-end circuitry is defined as
HRXFEiphoto
E------------- A
W m2⁄---------------- .= Eq. 2-29.
Basically a photodiode has low-pass characteristic. This is because the drift time of the carriers
through the depletion layer limits the frequency response. For carriers that have been generated
in the p-region or in the n-region also the diffusion time must be considered. The diffusion time
is the time that is required by the carriers to diffuse into the depletion region. The diffusion time
can result in tails in the response to optical pulses. Therefore the photocurrent is considered as
the sum of drift current, which arises from carrier generated inside the depletion region, and
diffusion current, which arises due to carrier diffusion to the depletion region
iphoto idrift idiff+= Eq. 2-30.
whereby drift and diffusion current have different time constants. However, the frequency
response of the receiver front-end is mainly determined by the bandpass characteristic of the
preamplifier, so that the low-pass characteristic of the photodiode can be neglected. For the gain
30
factor we stick to the responsivity R of the photodiode for the sake of simplicity. Hence, the
transfer function of the receiver front-end is given by
HRXFE Rj2πfτHP
j2πfτHP 1+( ) j2πfτLP 1+( )-------------------------------------------------------------------- .= Eq. 2-31.
2.4.4 Receiver Noise Current
The main noise sources within the receiver are shot noise and amplifier noise [43][26][17].
2.4.4.1 Shot Noise
Shot noise occurs due to the discrete nature of energy and charge in the photodiode. Carrier pairs
are generated randomly due to the incident photons. Furthermore, carriers traverse the potential
barrier of the p-n junction in a random fashion dependent to their energy. The generation and
transport of carriers generate shot noise in the photocurrent. Basically, the shot noise generation
is a discrete Poisson process with a white power spectral density. Since a Poisson process can be
approximated by a Gaussian process, the shot noise can be modelled as an additive white
Gaussian noise with a variance of
σshot2 ishot
2 t( )⟨ ⟩ 2eBiphoto,= = Eq. 2-32.
whereby B denotes the bandwidth of the front-end circuitry.
2.4.4.2 Amplifier Noise
Due to the impedance of the preamplifier a thermal noise current occurs that also can be
modelled as an additive white gaussian noise. Basically, the variance of the thermal noise of an
impedance R is given by
σth2 ith
2 t( )⟨ ⟩ 4kTBR
-------------- ,= = Eq. 2-33.
31
whereby T is the absolute temperature, B is the front-end bandwidth and k is the Boltzmann
constant that is given by
k 1.3806568 23–×10 J K⁄ .= Eq. 2-34.
However, the actual value of the thermal noise highly depends on the used preamplifier type.
2.5 Baseband Model of Wireless Infrared Channel
2.5.1 General Channel Model
[37] Considering the above described transfer functions and noise sources the baseband model
can be implemented as shown in Figure 2-17.
Figure 2-17. Baseband Model of Wireless Infrared Channel
HRXFE(f)
TransmitterFront-End Optical Link Receiver Front-End
EAmbient
+HLOS(f)HTXFE(f)I(t) E(t)uTX(t)
ishot(t)
++
ith(t)
iRX(t)
Due to the disturbance variable EAmbient the high-pass filter of the receiver front-end requires
some settling time as illustrated in Figure 2-18. But under steady state conditions the disturbance
variable EAmbiant has no influence, and so we are able to provide a simple channel model as
shown in Figure 2-19.
32
Figure 2-18. Settling Time of the High-Pass Filter due to Disturbance EAmbient
curr
ent
time
Figure 2-19. Steady State Baseband Model of Wireless Infrared Channel
n(t)
+HWIrC(f)iRX(t)uTX(t)
The channel transfer function HWIrC(f) and the noise n(t) are given by
HWIrC f( ) HTXFE f( )HLOS f( )HRXFE f( )= Eq. 2-35.
n t( ) ishot t( ) ith t( ).+= Eq. 2-36.
The corresponding transfer functions are given by
HTXFE f( ) Iu---
KTXFEj2πfτLED 1+--------------------------------= = Eq. 2-37.
HLOSEI---
1d2-----Ω0 ϕcos= = Eq. 2-38.
33
HRXFEiphoto
E------------- R
j2πfτHPj2πfτHP 1+( ) j2πfτLP 1+( )
-------------------------------------------------------------------- .= =
2.5.2 Reference Parameters
In this section reference parameters for the baseband channel model are derived in order to be
able to provide a reference channel. By means of that reference channel the various electrical
modulation schemes are evaluated in the following Chapters. The parameters are basically taken
from the ''FIR standard implementation example'' of the IrPHY standard [1] of IrDA.
2.5.2.1 Time Constant τLED of Transmitter Front-End
In section 4.2 of the IrPHY standard the maximum rise and fall times for FIR are defined as
t10...90% t90...10% 40ns.= = Eq. 2-40.
From that we can derive the time constant τLED as follows. The rising curve of a low pass is
given by [44]
I t( ) I0 1 et– τLED⁄
–( ),= Eq. 2-41.
and with
0.1I0 I0 1 et10%– τLED⁄
–( )= Eq. 2-42.
the time t10% when the curve has reached 10% of its final value can be derived as
t10% τLED 0.9( ).ln–= Eq. 2-43.
Similarly, one can derive with
0.9I0 I0 1 et90%– τLED⁄
–( )= Eq. 2-44.
Eq. 2-39.
34
the time t90%
t90% τLED 0.1( ).ln–= Eq. 2-45.
Consequently, the relation between the rise time t10...90% and the time constant τLED is given by
t10...90% τLED 0.9ln 0.1ln–( ) 2.2τLED.= = Eq. 2-46.
Hence, the time constant τLED for our reference model is given by
τLEDt10...90%
2.2------------------ 40ns
2.2------------ 18.18ns.= = = Eq. 2-47.
2.5.2.2 Gain Factor KTXFE of Transmitter Front-End
Section 4.2 of the IrPHY standard defines also the radiant intensity of the LED. For FIR the
minimum and maximum values are
Imax 500mWsr
----------= Eq. 2-48.
Imin 100mWsr
----------= Eq. 2-49.
If we assume that high levels and low levels of the input signal are represented by a voltage of
1 V and 0 V respectively, then the gain KTXFE of the LED's transfer function can be defined as
KTXFE 100...500mWsrV---------- .= Eq. 2-50.
2.5.2.3 Path Loss of Optical Link
For the standard option of an IrDA link the worst case link condition in terms of path loss occurs
with a distance d 1m= and angle of incidence of ϕ 15°= . The best case in terms of path loss1
occurs with a distance of d 0m= and angle of incidence of ϕ 0°= . With Equation
35
Equation 2-12 one could derive the transfer function of the optical link. But since the equation
is not valid for very short distances, we have to use IrDA's active input interface specification
(section 4.3 of the IrPHY standard) that defines the minimum and the maximum irradiance at the
receiver as
Emax 500mWcm2---------- ,= Eq. 2-51.
Emin 10 µWcm2---------- ,= Eq. 2-52.
Hence, with the values for radiant intensity of Equation 2-48 and Equation 2-49 the transfer
function for our reference model can be derived as
HLOS 0.0001...1 srcm2---------- ,= Eq. 2-53.
whereby 1sr cm2⁄ corresponds to the best case channel conditions (link distances of d 0m= ,
transmitter half angle ϕ 0°= ) and 0.0001sr cm2⁄ corresponds to the worst case channel
conditions (d 1m= , ϕ 15° ... 30°= ).
2.5.2.4 Ambient Radiation of Optical Link
Regarding the ambient radiation in the reference model we refer to the 4.0 Mbit/s Standard
Implementation Example in the Appendix B.4.7. of the IrPHY standard. This example provides
at an assumed responsivity R of
R 44 µAmW c⁄ m2------------------------ ,= Eq. 2-54.
a typical sunlight in-band photocurrent of
iamb isun 21.5nA.= = Eq. 2-55.
1. As we will see later, this ''best case'' condition might cause pulse extension at the receiver and so it is not gener-ally the best case.
36
Since the sun is the dominant source of ambient light, other sources are neglected in our
reference model. Hence, with the definition of responsivity by Equation 2-28 on page 29 the
additive ambient radiation is given by
Eamb 489 µWcm2---------- .= Eq. 2-56.
2.5.2.5 Responsivity R of Receiver Front-End
Regarding the transfer function of the receiver front-end in the reference model we again refer
to the 4.0 Mbit/s Standard Implementation Example in the Appendix B.4.7. of the IrPHY
standard. As already indicated in Equation 2-54 this example proposes a responsivity R of
R 44 µAmW c⁄ m2------------------------ .= Eq. 2-57.
2.5.2.6 Time Constants of Receiver Front-End
The 4.0 Mbit/s Standard Implementation Example proposes also a lower 3 dB limit of the
receiver front-end of
fHP 0.04MHz= Eq. 2-58.
and an upper 3 dB limit of
fLP 6.04MHz.= Eq. 2-59.
Consequently, the time constants of the reference transfer function of the front-end can be
derived as
τHP1
2πfHP--------------- 3.979µs= = Eq. 2-60.
37
τLP1
2πfLP-------------- 0.0264µs.= =
2.5.2.7 Receiver Front-End Noise
The 4.0 Mbit/s Standard Implementation Example in the Appendix B.4.7. of the IrPHY standard
provides also values for the standard deviation of the shot noise and the amplifier noise:
σshot ishot2 t( )⟨ ⟩ 8.06nA= = Eq. 2-62.
σth ith2 t( )⟨ ⟩ 4.87nA.= = Eq. 2-63.
The shot noise current is derived from the sunlight induced photodiode current and the front-end
bandwidth. The amplifier noise current is derived from the thermal noise of the preamplifier
impedance and from the front-end bandwidth.
2.5.3 Reference Channel
With the channel models of Figure 2-20 and Figure 2-21 and the summary of the reference
parameters of Table 2-1 our reference channel is fully defined.
Figure 2-20. Reference Channel Model
TransmitterFront-End Optical Link Receiver Front-End
EAmbient
+HLOS
I(t) E(t)uTX(t)12
112
2+τπ+τπ
τπ
LPHP
HPfjfj
fjR12 +τπ LED
TXFEfjK
ishot(t)
++
ith(t)
iRX(t)
Eq. 2-61.
38
Figure 2-21. Reference Channel Model in Steady State
TransmitterFront-End Optical Link Receiver Front-End
ishot(t)
HLOS ++
ith(t)
I(t) E(t) iRX(t)uTX(t)12
112
2+τπ+τπ
τπ
LPHP
HPfjfj
fjR12 +τπ LED
TXFEfjK
Table 2-1. Reference Parameters Overview
Parameter Reference value
Low pass time constant of LED τLED 18.18 ns
Gain of transmitter front-end KTXFE 100...500 mW/srV
Path loss of optical link HLOS 0.0001...1 sr/cm²
Ambient radiation Eamb 489 µ W/cm²
Receiver front-end responsivity R 44 µ A/(mW/cm²)
Low pass time constant of receiver front-end τLP 26.4 ns
High pass time constant of receiver front-end τHP 3979 ns
Standard deviation σshot of the shot noise nshot 8.06 nA
Standard deviation σth of the amplifier noise nth 4.87 nA
2.5.4 Impulse Response of Reference Channel
As described in Section 1.3 on page 4 basically only binary-level pulses are transmitted over the
wireless infrared channel. IrDA has specified at its FIR mode the pulse length to be
Tpulse 125ns.= Eq. 2-64.
Therefore in this section the response of a single pulse with that length, i.e. basically the impulse
response, is presented in order to get an idea about the channel characteristic.
For the input of the reference model we assume that high levels and low levels of the input signal
are represented by voltages of 1 V and 0 V, respectively. The resulting reference input pulse of
the wireless infrared channel is illustrated in Figure 2-22.
39
Figure 2-22. Reference Input Pulse
time [us]
0
0.2
0.4
0.6
0.8
1
0.995 1 1.05 1.1 1.15 1.2 1.25 1.30.99
Figure 2-23 shows the impulse response after the transmitter front-end that transforms the input
voltage into radiant intensity.
Figure 2-23. Impulse Response after the Transmitter Front-End
time [us]
0.995 1 1.05 1.1 1.15 1.2 1.25 1.3
0
10
20
30
40
50
60
70
80
90
100
radi
ant i
nten
sity
[mW
/sr]
0.99
Figure 2-24 shows the irradiance of the receiver front-end resulting from the pulse transmitted
from the transmitter front-end via the optical link. Obviously the irradiance due to the ambient
light is much larger than the irradiance due to payload signal from the LED.
40
Figure 2-24. Impulse Response after Transmitter Front-End and Optical Link
460
465
470
475
480
485
490
495
500
time [us]
0.995 1 1.05 1.1 1.15 1.2 1.25 1.30.99
irrad
ianc
e [µ
W/c
m2 ]
Figure 2-25 shows the resulting impulse response after the receiver front-end. Obviously, the
DC current due to ambient radiation is here already suppressed by the high-pass filter.
Figure 2-25. Impulse Response of complete Wireless Infrared Channel
time [us]
curr
ent [
nA]
0.995 1 1.05 1.1 1.15 1.2 1.25 1.30.99
-50
0
50
100
150
200
250
300
350
400
450
Figure 2-26 shows the required settling time of the channel, where no reasonable transmission
is possible.
41
Figure 2-26. Settling Time of the High-Pass Filter of the Receiver Front-End
curre
nt [u
A]
0 5 10 15 20 25
0
5
10
15
20
time [us]
42
3 Electrical Modulation and Demodulation
This chapter shall provide the fundamentals of the electrical modulation and demodulation, and
for that a mathematical signal description according to [45] is used throughout the chapter. In
general a wireless infrared transmission system is used to transmit arbitrary messages from a
digital information source to a digital information sink, whereby one particular message is
represented by a unique sequence an( )0 n N<≤ = a0, a1, a2,..., aN-1 | an 0 1 , .∈ In order to
transmit the corresponding message signal a(t)
a t( ) anδ t nTbit–( ),n 0=
N 1–
∑= Eq. 3-1.
that is basically a bit stream, in a reliable and efficient way, the electrical modulation and
demodulation are required as illustrated in Figure 3-1.
Figure 3-1. Binary-Level Electrical Modulation and Demodulation
ElectricalModulation
DigitalInformation
Source
DigitalInformation
Sink
ElectricalDemodulation
WirelessInfraredChannel
s(t)
t
r(t)
t
a(t)
t
a’(t)
t
Tbit
Tbit
Tpulse
43
By the electrical modulation process the binary time-discrete message signal a(t) is converted
into a binary time-continuous electrical signal s(t) that can be reliably transmitted over the
wireless infrared channel as defined in Section 2.1 on page 11. The output signal r(t) of the
channel is given by the convolution of s(t) with the impulse response hWIrC(t) of the wireless
infrared channel plus the channel noise n(t) [27]:
r t( ) hWIrC t( ) s t( ) n t( )+⊗= Eq. 3-2.
The corresponding transfer function HWIrC(f) and n(t) are described in Section 2.5 on page 32ff.
In the electrical demodulation process the electrical signal r(t) recovered by the receiver front-
end of the infrared transceiver is converted back into a binary time-discrete message signal a’(t)
that is delivered to the digital information sink. At an error free transmission the retrieved
message signal a’(t) is then identical to the original message signal a(t). The following provides
a rather theoretical inside in both electrical modulation and demodulation, in order to derive
evaluation criteria for the various modulation schemes.
3.1 Electrical Modulation
Basically, the electrical modulator consists of an encoder and a pulse shaper as illustrated in
Figure 3-2 on page 45. The pulse shaper converts the binary time-discrete signal b(t) from the
encoder into an analog binary level voltage signal s(t). For that it generates a voltage pulse of
length Tpulse each time it gets a trigger by a logical ’1’ from the encoder. Hence, the encoder
determines the distribution of the transmitted infrared pulses, and it is thereby responsible for a
good usage of the channel bandwidth and for reliable transmission, e.g. by avoiding
intersymbol-interferences. For that it converts the unconstrained digital bit stream a(t) from the
digital information source into a constrained digital chip stream b(t) that generates a proper
distribution of pulses.
44
Figure 3-2. Electrical Modulation Process
Encoder
Pulse Shaper
s(t)
0
1
tTchip
Digital InformationSource
a(t)
0
1
tTbit
b(t)
Vss
Vdd
tTpulse
s(t)
ElectricalModulation
a(t)
b(t)
Wireless InfraredChannel
0 1 0 0 1 11(an) = ...
3.1.1 Encoder Function
In general, the encoder transforms the binary time-discrete signal a(t) into the binary time-
discrete signal b(t):
Encoder: a t( ) anδ t nTbit–( ) b t( ) bmδ t mTchip–( )m 0=
M 1–
∑=→n 0=
N 1–
∑= Eq. 3-3.
with bm 0 1, ∈ . That means, the encoder transforms the sequence an( )0 n N<≤ into the
sequence bm( )0 m M<≤ , and changes the time base from Tbit to Tchip. While a(t) is an
unconstrained signal, i.e. each possible sequence (an) is allowed, the signal b(t) needs to be
constrained in order to avoid signal characteristics, e.g. high DC value, that are disadvantageous
for the transmission over the wireless infrared channel. Therefore the encoder has to add some
45
redundancy to the chip stream b(t), so that M > N and consequently Tchip < Tbit. With the code
rate Rcode that is given by
RcodeNM-----= Eq. 3-4.
the time base Tchip of the encoded chip stream b(t) is obviously given by
Tchip RcodeTbit.= Eq. 3-5.
The transformation of (an) to (bm) is done by the encoder map
encoder map: an( ) a0 a1 ..., aN 1–, , bm( )→ b0 b1 ..., bM 1– ,, ,= = Eq. 3-6.
which could be implemented by a look up table that provides for each arbitrary sequence (an) a
unique sequence (bm). But this straightforward implementation would require look-up tables of
unacceptable large sizes, if the input sequences were comparatively long. Therefore usually
encoding algorithms are used instead. For that the sequence (an) is split up into blocks αk with
the length p:
an( ) α0 α1 ..., αN p⁄ 1–, ,= Eq. 3-7.
αk apk apk 1+ ..., apk p 1–+ ,, ,= Eq. 3-8.
and the sequence (bm) is split up into blocks βk with the length q:
bm( ) β0 β1 ..., βM q 1–⁄, ,= Eq. 3-9.
βk bqk bqk 1+ ..., bqk q 1–+ ., ,= Eq. 3-10.
46
With that any output block βk can be derived from a limited number of input blocks by means
of a finite state machine:
βk f αk i– ... αk j+ ζk, , ,( )= Eq. 3-11.
ζk 1+ g αk i– ... αk j+ ζk, , ,( ),= Eq. 3-12.
where ζk denotes the internal state of the encoder. The parameters i and j, called memory and
anticipation, define the number of required input blocks. The function f is called the output
function and g the next state function. The block lengths p and q defines obviously the code rate
of an encoder that is based on a finite state machine:
RcodeNM----- p
q---= = Eq. 3-13.
and with Equation 3-5 on page 46 the chip duration is then given by
Tchip Tbitpq--- .= Eq. 3-14.
3.1.2 Pulse Shaper Function
At the pulse shaper, the second step of the electrical modulation, the encoded sequence b(t) is
convoluted with ps(t) that defines the shape of the transmitted pulses.
s t( ) b t( ) ps t( )⊗=
bmδ t mTchip–( ) ps t( )⊗m 0=
M 1–
∑=
bmps t mTchip–( )m 0=
M 1–
∑=
Eq. 3-15.
47
In our case we have rectangular pulses that are transmitted via the wireless infrared channel and
thus ps(t) is given by
ps t( ) rect tTpulse-------------- 1
2---–
,= Eq. 3-16.
so that the resulting output s(t) of the pulse shaper can be derived as
s t( ) bmrm 0=
M 1–
∑ ectt mTchip–
Tpulse------------------------- 1
2---–
.= Eq. 3-17.
Note that the pulse duration Tpulse is determined by the bandwidth B of the wireless infrared
channel, i.e. of the infrared transceiver
Tpulse1B---- .= Eq. 3-18.
3.2 Electrical Demodulation
Basically, the electrical demodulator consists of a quantization unit, a sampling unit and a
decoder as illustrated in Figure 3-3. With Equation 3-2 and Equation 3-17 the input signal r(t)
of the demodulator is given by
r t( ) hWIrC t( ) bmrm 0=
M 1–
∑ ectt mTchip–
Tpulse------------------------- 1
2---–
n t( )+⊗= Eq. 3-19.
bm
m 0=
M 1–
∑= hWIrC t( ) rectt mTchip–
Tpulse------------------------- 1
2---–
⊗ n t( ).+ Eq. 3-20.
48
If we introduce pd(t) as the convolution of the rectangular pulse ps(t) with the channel impulse
response hWIrC(t):
pd t( ) hWIrC t( ) rect tTpulse-------------- 1
2---–
,⊗= Eq. 3-21.
then r(t) can also be written down as
r t( ) bmpd t mTchip–( )m 0=
M 1–
∑ n t( ).+= Eq. 3-22.
That means r(t) is basically a sequence of distorted pulses pd(t) that originate from the
transmitted rectangular pulses ps(t).
The binary level quantization circuitry transforms r(t) into a binary level signal rb(t), whereby
the pulses pd(t) should result in a logical level of ’1’. The sampling unit transforms the binary
level signal rb(t), which is still time-continuous, into a time-discrete signal b’(t). After that the
decoder converts b’(t) finally into the bit stream a’(t).
3.2.1 Quantization
The quantization unit is basically a comparator that compares the output signal r(t) of the front-
end circuitry with a certain threshold value. If r(t) is below the threshold value, then the output
of the quantization unit has the logical value ’0’, otherwise it has the logical value ’1’. Usually
the quantization unit has a hysteresis in order to be not sensitive to the noise current. Hence, the
quantization unit has obviously a non-linear transfer function as illustrated in Figure 3-4.
49
Figure 3-3. Electrical Demodulation Process
Decoder
Digital InformationSink
rb(t)
0
1
tTchip
Sampling Unit withClock Recovery
b’(t)
0
1
tTbit
a’(t)
0
1
tTpulse
rb(t)
ElectricalDemodulation
a’(t)
b’(t)
Quantization Unit
0 1 0 0 1 11(an’) = ...
r(t)
Wireless InfraredChannel
0
i1
t
r(t)
Figure 3-4. Transfer Function of the Quantization Unit
i [nA]
Voltage [V]
Vdd
Vssioff ion
In order to handle the wide dynamic range of the signal r(t), the threshold value is adapted to the
actual amplitude of the input signal. I.e. the threshold is adjusted to approximately the half of the
50
signal's amplitude. Consequently, the 4.0 = Mbit/s Standard Implementation Example in the
Appendix B.4.7. of the IrPHY standard [1] defines as comparator threshold current
ithisignal
2------------- ,= Eq. 3-23.
and as minimum threshold current
ithmin 219.7 nA.= Eq. 3-24.
But if the adjustment is imprecisely as illustrated in Figure 3-5, then the length of the recovered
pulse becomes extended. This effect often occurs at low link distances, where the irradiance of
the receiver is very high and non-linear distortions are induced by signal amplitude clipping [33].
Additionally, the pulse extension at low link distances may be reinforced by the lower time
constant of the diffusion current of the photodiode as it is described in Section 2.4.3 on page 30.
That is basically the reason, why pulse width modulation (PWM) schemes are not feasible for
low cost wireless infrared transmission and why only pulses of fixed length are used.
Figure 3-5. Pulse Extension due to Imprecise Threshold
-100
0
100
200
300
400
500
600
700
time [us]
0.995 1 1.05 1.1 1.15 1.2 1.25 1.30.99
curr
ent [
nA]
Ideal Threshold
Imprecise Threshold
Pulse Extensions
51
However, if the threshold is precisely the half of the signal amplitude, then the recovered pulse
has the same length as the input pulse of the LED as one can see by comparing the Figure 2-22
on page 40 and Figure 3-6.
Figure 3-6. Output of the Binary Level Quantization with Ideal Threshold
time [us]
volta
ge [V
]
0.995 1 1.05 1.1 1.15 1.2 1.25 1.30.99
0
0.2
0.4
0.6
0.8
1
3.2.2 Sampling and Receiver Clock Recovery
Although the signal rb(t) from the quantization unit is already a binary-level signal, it is still an
analog signal with a continuous time domain. Thus for a proper synchronous digital signal
processing the received electrical signal from the infrared transceiver must be sampled so that it
becomes a real digital signal with a discrete time domain. For that the receiver logic needs to
know the frequency 1/Tchip and phase of the received electrical signal. At IrDA the frequency is
negotiated by upper layers of the protocol stack and so the receiver always knows the frequency
of the received signals. But the phase information must be retrieved from the received signal by
a clock recovery logic. This clock recovery logic must then provide a proper sample clock as
shown in Figure 3-7. Note, the sample phase offset Toffset is required in order to avoid sampling
on pulse edges, where the result is ambiguous.
For a simple phase recovery the receiver can be synchronized on the first detected edge of the
retrieved electrical signal from the infrared transceiver. Unfortunately phase recovery by means
of only one edge is insufficient for transmissions of long data packets. This is because minor but
unavoidable deviations of the sampling frequency compared to the signal frequency results in an
accumulating phase error of the sample clock. That phase error cannot be corrected by such a
simple phase recovery. Especially at long data packets the accumulated phase error can result in
an incorrect sampling and demodulation. Therefore a more sophisticated phase recovery by
52
means of a digital phase lock loop (DPLL) is required. A DPLL processes the phase information
of each received edge and thereby it can avoid a phase error accumulation.
Figure 3-7. Receiver Clock Recovery and Sampling
ClockRecovery
Sampling
SampleClock
0
1
t0
1
t
Tpulse b’(t)
01
tTchip
Tchiprb(t)
Toffset
However, mathematically the sampling process can be written down as the multiplication of rb(t)
with a Dirac sequence
b' t( ) rb t( ) δm 0=
M 1–
∑ t mTchip– Toffset–( ),= Eq. 3-25.
what results in
b' t( ) rb mTchip Toffset+( )m 0=
M 1–
∑ δ t mTchip Toffset––( ).= Eq. 3-26.
Considering that the binary time-discrete signal b’(t) can also be written down as
b' t( ) b'mδ t mTchip–( ),m 0=
M 1–
∑= Eq. 3-27.
53
then the terms of the sequence (b’m) with b'm 0 1, ∈ are obviously determined by
b'm rb mTchip Toffset+( ).= Eq. 3-28.
At some modulation schemes the sampling unit can also be used for error correction. If the
sampling unit detects a pulse at a position where it is not allowed to be due to the modulation
characteristic, then it may ignore this pulse. E.g. at some modulation schemes double pulses are
not allowed, and so the sampling unit may treat any double pulse as single pulse. This is very
helpful since pulse extension due to the wireless infrared channel lead very often to unwanted
double pulses.
3.2.3 Decoder Function
The decoder has to perform the inverse transformation of the encoder. Hence, it transforms the
binary time-discrete signal b’(t) into the binary time-discrete signal a’(t):
Decoder: b' t( ) b'mδ t mTchip–( )m 0=
M 1–
∑ a' t( )→ a'nδ t nTbit–( )n 0=
N 1–
∑= = Eq. 3-29.
That means, the decoder converts the sequence bm'( )0 m M<≤ into the sequence a'n( )0 n N<≤
and changes the time base from Tchip back to Tbit:
Tbit1
Rcode-------------Tchip.= Eq. 3-30.
The transformation of (bm) to (an) is done by the decoder map
Decoder map: b'm( ) b'0 b'1 ..., b'M 1– a'n( )→, , a'0 a'1 ..., a'N 1– ,, ,= = Eq. 3-31.
which again could be implemented by a look up table that provides for each possible sequence
(b’m) a unique sequence (a’n). But this again would require look-up tables of unacceptable large
sizes. Therefore usually decoding algorithms are used instead, which also make use of the blocks
54
as defined in the Equations 3-7 to 3-10. With that any output block α 'k of the decoder can be
derived from a limited number of input blocks by means of a finite state machine with an internal
state ζk :
α'k d β'k i–... β'k j+
ζk, , ,( )= Eq. 3-32.
ζk 1+ e β'k i–... β'k j+
ζk, , ,( ),= Eq. 3-33.
whereby the memory i and the anticipation j of the decoder define the number of required input
blocks.
The decoder may have error detection capabilities, i.e. it may be able to detect blocks or a
sequence of blocks that cannot be generated by the encoder. Such an error detection is usually
not mandatory, since transmission error detection is basically done on a higher protocol layer by
CRC codes.
3.3 Evaluation Criteria for Modulation Techniques
In order to be able to evaluate the various modulation techniques and to assess the new
modulation technique EPM, this section provides some evaluation criteria. Clearly, a low bit
error rate is desirable for any transmission system, and therefore the transmission reliability is a
strong criterion for a modulation technique. Additionally, two more things needs to be
considered. On the one hand the achievable bit rate of an infrared communication is mainly
limited by the bandwidth of the infrared transceivers. Therefore it is important to use a
modulation technique with high bandwidth efficiency. And on the other hand mobile devices are
usually battery powered and therefore power efficiency is also very important for our type of
application. Hence, the following provides evaluation criteria for
• the transmission reliability,
• the bandwidth efficiency and
• the power efficiency.
55
3.3.1 Reliability
The reliability of the transmission depends on the capability of the modulation technique to
adapt the signal to the wireless infrared channel in a way that allows demodulation at the receiver
with a low bit error rate. Basically there are two different errors that can occur at the receiver:
• Quantization error
• Sample error
In the following we provide evaluation criteria for the robustness of the various modulation
schemes against quantization and sample errors.
3.3.1.1 Quantization Error Robustness
A quantization error occurs, when the transmitter sends a pulse, but the quantization unit does
not detect anything, or when the transmitter does not send anything, but the quantization unit
detects a pulse. That can happen, when the signal to noise ratio is too low, so that the
quantization unit cannot distinguish between the noise and the signal. The reason for such a
quantization error is an insufficient optical link between the transmitter and the receiver, e.g.
when the distance or the alignment between the transmitter and the receiver is out of the
specification, or when a solid object lies between the transmitter and receiver.
Assuming an ideal sampling clock, the quantized signal rb(t) must take on the correct logical
levels at least at the sampling points in time. That means the signal level of r(t) must be beyond
or beneath the threshold value at least at the sampling points, if a pulse is transmitted or not,
respectively. With Equation 3-22 the value of signal r(t) at a sampling point kTchip + Toffset is
given by
r kTchip Toffset+( ) bmpd kTchip Toffset mTchip–+( ) +
m 0=
M 1–
∑=
n+ kTchip Toffset+( ).
Eq. 3-34.
56
If the respective bk is ’1’, then r(kTchip+Toffset) is given by
r kTchip Toffset+( ) r1k n kTchip Toffset+( ).+= Eq. 3-35.
with
r1k pd Toffset( ) bmpd kTchip Toffset mTchip–+( )m 0=
k 1–
∑ + +=
bmpd kTchip Toffset mTchip–+( ).m k 1+=
M 1–
∑+
Eq. 3-36.
The corresponding probability density function p1k of the level of r(t) at the sampling point
kTchip + Toffset is under the condition of bk = ’1’given by
p1k r kTchip Toffset+( )( ) 1
2πσ2-----------------
x r1k–( )2
2σ2------------------------–
.exp⋅= Eq. 3-37.
If the respective bk of Equation 3-34 is ’0’, then r(kTchip+Toffset) is given by
r kTchip Toffset+( ) r0k n kTchip Toffset+( ).+= Eq. 3-38.
with
r0k bmpd kTchip Toffset mTchip–+( )m 0=
k 1–
∑ +=
bmpd kTchip Toffset mTchip–+( ).m k 1+=
M 1–
∑+
Eq. 3-39.
57
The corresponding probability density function p0k of the level of r(t) at the sampling point
kTchip + Toffset is then given by
p0k r kTchip Toffset+( )( ) 1
2πσ2-----------------
x r0k–( )2
2σ2------------------------–
exp= Eq. 3-40.
Figure 3-8 shows both the probability density function p0k and p1k.
Figure 3-8. Probability Density Function p0k and p1k
r(kTchip+Toffset)r0k rth
p0k p1k
Pe1k
r1kPe0k
PropabilityDensity
The quantization error probability Pe1k for the case when a pulse has been transmitted, but
nothing is detected, is given by
Pe1k1
2πσ2-----------------
∞–
rth
∫x r1k–( )2
2σ2------------------------–
dxexp= Eq. 3-41.
12---erfc
r1k rth–
2σ2-------------------
= Eq. 3-42.
58
The quantization error probability Pe0k for the case when no pulse has been transmitted, but a
pulse is detected, is given by
Pe0k1
2πσ2-----------------
rth
∞
∫x r0k–( )2
2σ2------------------------–
dxexp= Eq. 3-43.
12---erfc
rth r0k–
2σ2-------------------
= Eq. 3-44.
The total quantization error probability Pek obviously depends on the probability of the logical
value of bk:
Pek P bk 0=( )Pe0 P bk 1=( )Pe1+= Eq. 3-45.
P bk 0=( )2
------------------------erfcrth r0k–
2σ2------------------- P bk 1=( )
2------------------------erfc
r1k rth–
2σ2-------------------
+= Eq. 3-46.
An extremum calculation evidently shows that the threshold value
rthr1k r0k+
2----------------------= Eq. 3-47.
is a very good approximation for the ideal threshold value1. With that the total quantization error
probability Pek for a single sample can be provided as
Pek12---erfc
r1k r0k–
2 2σ2--------------------- 1
2---erfc
r1k r0k–( )2
8σ2-----------------------------
.= = Eq. 3-48.
1. Actually it is the ideal threshold value in the case of P(bk = 0) = P(bk = 1) = 0.5.
59
By introducing the signal to noise ratio (SNR)
SNRk
r1k r0k–
2---------------------
2
σ2-----------------------------= Eq. 3-49.
the total quantization error probability of a single sample can be written down as
Pek12---erfc
SNRk2
-------------- .= Eq. 3-50.
Assuming that the complete transmitted sequence is erroneous as soon as a quantization error
has been occurred at one of the M samples, then the sequence error probability due to
quantization errors is given by
Pesequence 1 1 Pek–( ).k 0=
M 1–
∑–= Eq. 3-51.
Unfortunately Pek is generally different for each sample due to varying intersymbol
interferences, and therefore it is difficult to calculate the exact quantization error probabilities
analytically. However, there is a convenient way to determine the upper limit of the quantization
error probability Pemax of a single sample by means of the eye diagram without noise
disturbance [46] as shown in Figure 3-9. By using the vertical eye opening Ever one can easily
derive the minimum signal to noise ratio
SNRmin r1min r0max–( )2
4σ2---------------------------------------------
Ever2
4σ2----------= = Eq. 3-52.
60
and the corresponding upper limit of the quantization error probability Pemaxk of a single
sample is then given by
Pemaxk12---erfc SNRmin
2----------------------
.= Eq. 3-53.
Figure 3-9. Eye Diagram after Receiver Front-End without Noise
time
curre
nt
r0max
r1min
Tsample
Ever
For comparison of the quantization error robustness of the various modulation schemes one may
use the maximum bit error probability due to quantization errors, which can be calculated with
Equation 3-51 on page 60 and with the code rate Rcode of the respective encoder.
Pemaxbit 1 1 P– emaxk( )–1 Rcode⁄
= Eq. 3-54.
Note that this calculation of the quantization error probability is under the assumption of a
quantization with an ideal threshold value. Although this assumption does not hold in real
systems, it is fair to use the computed bit error rate in order to compare the various modulation
schemes.
61
3.3.1.2 Sampling Error Robustness
The sampling error robustness is basically determined by the required sampling clock phase
accuracy and the clock recovery support. Therefore, corresponding evaluation criteria are
derived in the following.
Sampling Clock Phase Accuracy Requirement
Basically, a sampling error occurs, when
• a pulse is not sampled by the corresponding sample beat Tk as illustrated in Figure 3-10
• or a pulse is mistakenly sampled by previous or by next sample beats as illustrated in
Figure 3-11.
Figure 3-10. Sample Error: Pulse not Sampled by Corresponding Sample Beat
Tk-1 Tk Tk+1Tk+2
rb(t)
tVss
Vdd
phaserange
Obviously, the sampling error occurs in both cases due to pulse form deviation, i.e. pulse
shortening or pulse extension, but could be prevented by a more accurate phase adjustment of
the sample clock. If the sample beat Tk was in the shown phase range, then there wouldn’t be a
sampling error. The optimal sampling time would be obviously in the middle of the indicated
62
phase range in order to be resistance against phase jitter. With the deviation T∆ from the optimal
sampling time we define the relative sampling clock deviation Θ as
Θ T∆Tchip------------ .±= Eq. 3-55.
Figure 3-11. Sample Error: Pulse Mistakenly Sampled by Next Sample Beat
Tk-1 Tk Tk+1 Tk+2
rb(t)
tVss
Vdd
phaserange
The maximum acceptable phase deviation of the sample clock can be determined by the
horizontal eye opening Ehor of the eye diagram of the signal rb(t) as shown in Figure 3-12.
Figure 3-12. Horizontal Eye Opening of rb(t)
Vss
Vdd
volta
ge le
vel
time
Vth
Ehor
Tchip
63
The horizontal eye opening Ehor under worst case conditions obviously determines the
maximum clock phase deviation. The maximum acceptable phase deviation Θmax is given by
Θmax Ehor
2Tchip--------------- .±= Eq. 3-56.
The maximum relative sampling clock deviation Θmax shall be used as an evaluation criterion
for the sampling error robustness.
Sampling Clock Recovery Support
The sampling error robustness depends besides on the eye opening also on the support of the
clock recovery for sampling phase synchronization. In general the clock recovery can be done
by means of ’0’ to ’1’ transitions of the received signal rb(t), and therefore long absences of ’0’
to ’1’ transitions can lead to a phase unlock of the sampling unit, what results in sampling errors
and finally in bit errors. Hirt et al. [33] stated that there should be at least one ’0’ to ’1’ transition
within 16 chips for an adequate sample clock recovery with a DPLL. Hence, the maximum
length of sequence of chips without any ’0’ to ’1’ transition is a further evaluation criterion for
the sampling error robustness.
3.3.2 Bandwidth Efficiency
Depending on the used modulation scheme more or less bits can be transmitted over the wireless
infrared channel within a certain time. The corresponding transmission speed is usually
measured by the so called bit rate Rbit that is given by
Rbit1
Tbit--------- .= Eq. 3-57.
The bandwidth efficiency factor ηB shall be used to classify the various modulation schemes in
terms of their achievable bit rate at a given infrared transceiver bandwidth. For that we define
64
the bandwidth efficiency ηB as the ratio between the achievable bit rate Rbit and the bandwidth
B of the infrared transceiver
ηBRbitB
--------- .= Eq. 3-58.
Consequently, the bandwidth efficiency ηB indicates how good a modulation scheme utilizes
the bandwidth of an infrared transceiver. Together with Equation 3-57 and Equation 3-18 on
page 48 the bandwidth efficiency ηB can be derived as the ratio between the pulse duration
Tpulse and the bit duration Tbit
ηBTpulseTbit
-------------- .= Eq. 3-59.
Note that the definition of the bandwidth efficiency of modulation schemes is very similar to the
code rate definition of channel codes (e.g. block codes, cyclic codes or RLL codes). But the code
rate indicates the added redundancy that can be used for error detection or error correction at the
receiver, while the bandwidth efficiency indicates the utilization of the bandwidth by a
modulation technique.
3.3.3 Power Efficiency
Depending on the used modulation scheme more or less energy is required to transmit a data
packet over the wireless infrared channel. The power efficiency factor ηP shall be used to
classify the various modulation schemes in terms of their power consumption. For that we define
the power efficiency ηP as the ratio between the energy per infrared pulse Epulse and the
required average energy per bit aveEbit.
ηPEpulse
aveEbit------------------= Eq. 3-60.
65
Consequently, the average required energy for the transmission of a data packet consisting of N
bits with a particular modulation technique can be calculated by
EpacketNEpulse
ηP------------------- .= Eq. 3-61.
At wireless infrared communications energy is only required, if an infrared pulse is transmitted.
If no infrared pulse is sent, then no energy is necessary. Therefore we need to know the average
high and low times of a modulated signal of a data packet in order to calculate the required
energy for the transmission of the packet. The ratio between high time and low time of a binary
signal is called duty cycle DC. At the modulation schemes introduced in the following the duty
cycles of the modulated signals are not always constant, but may vary between a minimum duty
cycle minDC and a maximum duty cycle maxDC. For calculating the average required energy
for the transmission of a data packet the average duty cycle aveDC of the modulated signal is
required. This average duty cycle can be gained by comparing the high and low times of a very
long data packet. Mathematically the average duty cycle is given by
aveDCThighTlow------------ ,
Thigh Tlow+( ) ∞→lim= Eq. 3-62.
Considering that we need on average aveDC ηB⁄ pulses for the transmission of one bit, then
the average required energy for the transmission of one bit can be derived as
aveEbit EpulseaveDC
ηB------------------ .= Eq. 3-63.
Following from this and Equation 3-60 the power efficiency ηP can be derived as the ratio
between the bandwidth efficiency ηB and the average duty cycle aveDC of the modulated
signal.
ηPηB
aveDC------------------= Eq. 3-64.
66
4 Pulse Position based Modulation Schemes
In this section we present several pulse position based modulation techniques, which are
currently used in the various wireless infrared transmission systems for mobile devices. The
descriptions are based on the detailed theoretical explanations of Chapter 3, and are therefore
rather straightforward. The various modulation techniques are assessed in terms of transmission
reliability, bandwidth efficiency and power efficiency by means of the evaluation criteria of
Section 3.3 on page 55ff. For the performed simulations a pulse length of 125 ns is used for all
modulation schemes and the reference channel derived in Section 2.5.3 on page 38 is applied.
4.1 Return to Zero Inverted
The simplest form of modulation is Return to Zero Inverted (RZI), which is determined by two
parameters n and m with n < m. Therefore n/m-RZI is a commonly used abbreviation. At n/m-
RZI a bit with the value ’0’ is represented by a pulse with a duration of
Tpulsenm----Tbit= Eq. 4-1.
and a bit with the value ’1’ is represented by the absence of a pulse. Basically, RZI with
n m⁄ 1= , which is de facto the modulation scheme Non Return to Zero Inverted (NRZI),
would have the best bandwidth efficiency, but it allows multiple consecutive pulses with no low
phase in between, so that the pulses would be suppressed by the high pass filter of the receiver.
Therefore NRZI is not feasible for our applications in terms of reliability. Consequently, IrDA
uses 3/16-RZI for bit rates up to 115.2 kbit/s and 1/4-RZI for the bit rates 576 kbit/s and
1.152 Mbit/s [1]. Therefore we will look more closely on the 1/4-RZI modulation.
67
4.1.1 1/4-RZI Modulation Scheme
In general RZI uses as encoder function the so called on-off-keying, where both the input block
αk and output block βk consist of only one term:
αk ak=Eq. 4-2.
βk bk,= Eq. 4-3.
so that the code rate is given by
pq--- 1
1--- 1,= = Eq. 4-4.
and the chip duration is equal to the bit duration
Tchip Tbit.= Eq. 4-5.
The encoder function is state independent:
βk f αk( )= Eq. 4-6.
and is given by
bk ak.= Eq. 4-7.
Basically, the pulse shaper at RZI generates pulses with a duration n/m times of the chip
duration, ergo at 1/4-RZI the pulse duration is given by
Tpulse14---Tchip.= Eq. 4-8.
Figure 4-1 provides an example for the 1/4-RZI modulation.
68
Figure 4-1. 1/4-RZI Modulation
0
1
tTchip
Tbit
Vss
Vdd
tTpulse
s(t)
a(t)
b(t)
0
1
t
4.1.2 1/4-RZI Demodulation Scheme
The quantization unit has to process the signal r(t), which has an eye diagram as shown in
Figure 4-6. The sampling unit has to sample the received signal r(t) with a sampling offset of
ToffsetTpulse
2-------------- .= Eq. 4-9.
The decoder function is also state independent:
α'k d β'k( )= Eq. 4-10.
and is given by
a'k b'k.= Eq. 4-11.
At RZI pulses may occur at any position and so there are no error detection or error correction
mechanism possible at the RZI demodulation process. Figure 4-3 provides an example for the
RZI demodulation.
69
Figure 4-2. 1/4-RZI Eye Diagram of r(t) after Receiver Front-End
-250 -200 -150 -100 -50 0 50 100 150 200 250
-200
-100
0
100
200
300
400
500
time [ns]
curr
ent [
nA]
Figure 4-3. 1/4-RZI Demodulation
0
1
tTchip
Tbit
Vss
Vdd
t
Tpulserb(t)
a’(t)
b’(t)
0
1
t
½ Tpulse
t
r(t)
rth
70
4.1.3 Reliability of 1/4-RZI
In the following the reliability of 1/4-RZI is analyzed according to the criteria derived in
Section 3.3.1 on page 56ff.
4.1.3.1 Quantization Error Robustness
The quantization error robustness of a modulation scheme can be determined by the maximum
bit error probability as derived in Section 3.3.1.1 on page 56ff with Equation 3-53 and
Equation 3-54. Figure 4-4 shows the maximum bit error probability due to a quantization error
for the 1/4-RZI modulation scheme at the receiver irradiance range from 0.0001 to 0.1 mW/cm².
Figure 4-4. 1/4-RZI Bit Error Probability due to Quantization Errors
1E-60
1E-50
1E-40
1E-30
1E-20
1E-10
1
0.0001 0.001 0.01 0.1
IrDA range
Receiver Irradiance E
Erro
r pro
babi
lity
Pe bi
t
d = 1m,=15°
2cm
mW
ϕ
Considering that IrDA specifies the operating range for the receiver irradiance from 0.01 to
500 mW/cm² one can evidently see that 1/4-RZI has a very good quantization error robustness.
For a quantitative comparison with the other modulation schemes the maximum bit error
probability due to a quantization error is derived in the following for IrDA’s worst case condition
of a receiver irradiance E of 0.01 mW/cm². Figure 4-5 shows the eye diagram of the received
71
signal after the receiver front-end r(t) under worst case condition and the corresponding eye
opening is given by
E 356nA.≅ Eq. 4-12.
The resulting maximum bit error probability due to quantization errors is then given by
Pemaxbit 5.499 10× 80– .≅ Eq. 4-13.
Figure 4-5. 1/4-RZI Eye Diagram of r(t) without Noise under Worst Case Condition
-250 -200 -150 -100 -50 0 50 100 150 200 250
-200
-100
0
100
200
300
400
500
time [ns]
curr
ent [
nA]
4.1.3.2 Sampling Error Robustness
Sampling Clock Phase Accuracy Requirements
The horizontal eye opening after the quantization of RZI under worst case conditions is shown
in Figure 4-6 and is given by
Ehor 106.67 ns= Eq. 4-14.
72
and with the RZI sampling clock frequency of 2 MHz the maximum relative sample clock phase
deviation is given by
Θmax 10.7%.±= Eq. 4-15.
Figure 4-6. 1/4-RZI Eye Diagram of rb(t) after Quantization Unit
-250 -200 -150 -100 -50 0 50 100 150 200 250
time [ns]
Vss
Vdd
volta
ge le
vel
Vth
Sampling Clock Recovery Support
Basically RZI has no real clock recovery support, because it allows theoretically an infinitive
sequence of chips without ’0’ to ’1’ transitions. Therefore bit insertion (e.g. start and stop bits)
is required at RZI what actually reduces the effective bandwidth efficiency, since the inserted
bits do not carry information.
4.1.4 Bandwidth Efficiency of 1/4-RZI
With Equation 4-1 the bandwidth efficiency of n/m-RZI is in general given by
ηBnm---- ,= Eq. 4-16.
73
and consequently the bandwidth efficiency of 1/4-RZI is then
ηB14--- .= Eq. 4-17.
The bandwidth efficiency of 1/4-RZI is obviously not very good, and as mentioned above RZI
do not support sample clock recovery at the receiver, because it allows a long low signal without
any ’0’ to ’1’ transition. The required bit stuffing further decreases the bandwidth efficiency,
since the enforced pulses carry no information.
4.1.5 Power Efficiency of 1/4-RZI
Assuming that the probability of the occurrence of bit with the logical value ’1’ is equal to the
probability of a ’0’, then the average duty cycle aveDC of n/m-RZI is generally given by
aveDC n2m--------= Eq. 4-18.
and thus the power efficiency ηP can be derived as
ηPηB
aveDC------------------
nm----
n2m---------------- 2.= = = Eq. 4-19.
4.2 N - Pulse Position Modulation
In order to overcome the shortcomings of RZI the N - Pulse Position Modulation (N-PPM)
technique has been introduced in many wireless optical applications [47]. With the N-PPM
technique information is transmitted by varying the position of a pulse within a symbol. It allows
one pulse to be set in one of the N possible positions, thus it is called N-PPM. Since data
processing is usually byte oriented, only 2-, 4-, 16- and 256-PPM are useful methods, because
they encode 1, 2, 4 and 8 bits, respectively. While in the physical layer IR PHY of the IEEE
802.11 standard [48] 4-PPM is foreseen for 2 Mbit/s operation and 16-PPM for 1 Mbit/s, IrDA
74
uses 4-PPM for its 4 Mbit/s FIR mode. Therefore 4-PPM is investigated in more detailed in the
following. Nevertheless the bandwidth and power efficiency for any N-PPM scheme are also
provided.
4.2.1 4-PPM Modulation Scheme
At 4-PPM two bits are encoded per encoding step and thereby one pulse is set in one of 4
possible positions. Therefore the dimensions of the input block αk and output block βk are
p 2= and q 4= , respectively:
αk a2k a2k 1+,=Eq. 4-20.
βk b4k b4k 1+ b4k 2+ b4k 3+ ., , ,= Eq. 4-21.
The resulting code rate is consequently given by
pq--- 2
4--- 1
2---= = Eq. 4-22.
and the chip duration is then
Tchip12---Tbit.= Eq. 4-23.
The N-PPM encoder are in general state independent:
βk f αk( )= Eq. 4-24.
and the 4-PPM encoder is in particular given by the encoding table provided by Table 4-1.
Table 4-1. Encoding Table for 4-PPM
a2k a2k+1 b4k b4k+1 b4k+2 b4k+3
0 0 1 0 0 0
0 1 0 1 0 0
75
The resulting logical 4-PPM encoder function is given by
b4k a2k a2k 1+⋅= Eq. 4-25.
b4k 1+ a2k a2k 1+⋅= Eq. 4-26.
b4k 2+ a2k a2k 1+⋅= Eq. 4-27.
b4k 3+ a2k a2k 1+⋅= .Eq. 4-28.
The pulse shaper generates pulses with a duration equal to the chip duration
Tpulse Tchip.= Eq. 4-29.
Figure 4-7 provides an example for the 4-PPM modulation.
4.2.2 4-PPM Demodulation Scheme
The quantization unit has to process the signal r(t), which has an eye diagram as shown in
Figure 4-8. The sampling unit has to sample the received signal rb(t) with a sampling offset of
ToffsetTpulse
2-------------- .= Eq. 4-30.
1 0 0 0 1 0
1 1 0 0 0 1
a2k a2k+1 b4k b4k+1 b4k+2 b4k+3
76
Figure 4-7. 4-PPM Modulation
0
1
t
Tchip
0
1
tTbit
Vss
Vdd
tTpulse
s(t)
a(t)
b(t)
Figure 4-8. 4-PPM Eye Diagram of r(t) after Receiver Front-End
-250 -200 -150 -100 -50 0 50 100 150 200 250
-200
-100
0
100
200
300
400
500
time [ns]
curr
ent [
nA]
One of the major reasons of errors at wireless infrared transmission are unwanted pulse
extension, where a single pulse appears to be a double pulse. 4-PPM has the characteristic that
77
double pulses may occur only at block borders. By knowing this fact the sampling unit can
perform error correction as proposed in [49] and illustrated in Figure 4-9.
Figure 4-9. 4-PPM Error Correction
Vss
Vdd
r(t)
0
1
b’(t)
a) b) c) d) e)
Note, that at case a) of Figure 4-9 the first pulse could occur due to a pulse extension of a pulse
in the previous block. Since there is no easy way to determine the pulse that has lead to the
unallowed double pulse, it is fair to use always the proposed error correction. (The mechanism
proposed in [49] would require a higher sampling clock.)
The N-PPM decoder are in general state independent:
α 'k d β'k( )= Eq. 4-31.
and the 4-PPM decoder is in particular given by the decoding table provided by Table 4-2.
Table 4-2. Decoding Table for 4-PPM
b’4k b’4k+1 b’4k+2 b’4k+3 a’2k a’2k+1
1 0 0 0 0 0
0 1 0 0 0 1
0 0 1 0 1 0
0 0 0 1 1 1
others error
78
The resulting logical 4-PPM decoder function is given by
a'2k b'4k b'4k 1+⋅ b'4k 2+ b'4k 3+⋅ ⋅ b'4k b'4k 1+⋅ b'4k 2+ b'4k 3+⋅ ⋅+= Eq. 4-32.
a'2k 1+ b'4k b'4k 1+⋅ b'4k 2+ b'4k 3+⋅ ⋅ b'4k b'4k 1+⋅ b'4k 2+ b'4k 3+ .⋅ ⋅+= Eq. 4-33.
Figure 4-10 provides an example for the 4-PPM demodulation.
Figure 4-10. 4-PPM Demodulation
0
1
tTchip
0
1
tTbit
Vss
Vdd
t
Tpulserb(t)
a’(t)
b’(t)
½ Tpulse
t
r(t)
rth
4.2.3 Reliability of 4-PPM
In the following the reliability of 4-PPM is analyzed also according to the criteria derived in
Section 3.3.1 on page 56ff.
79
4.2.3.1 Quantization Error Robustness
Due to its constant duty cycle 4-PPM has an even better robustness against quantization errors
than RZI as shown in Figure 4-11.
Figure 4-11. 4-PPM Bit Error Probability due to Quantization Errors
1E-60
1E-50
1E-40
1E-30
1E-20
1E-10
1
0.0001 0.001 0.01 0.1
IrDA range
Receiver Irradiance E
Erro
r pro
babi
lity
Pe bi
t
d = 1m,=15°
2cm
mW
ϕ
Figure 4-12 shows the eye diagram of the received signal after the receiver front-end r(t) under
worst case condition and the corresponding eye opening is given by
E 419nA.≅ Eq. 4-34.
The resulting maximum bit error probability due to quantization errors is then given by
Pemaxbit 6.04 10 110–× .≅ Eq. 4-35.
80
Figure 4-12.
0 50 100 150 200 250 300 350 400 450 500
-200
-100
0
100
200
300
400
500
time [ns]
curr
ent [
nA]
4-PPM Eye Diagram of r(t) without Noise under Worst Case Condition
4.2.3.2 Sampling Error Robustness
Sampling Clock Phase Accuracy Requirements
The horizontal eye opening of 4-PPM under worst case conditions is shown in Figure 4-13 and
is given by
Ehor 112.14 ns.= Eq. 4-36.
and with the 4-PPM sampling clock frequency of 8 MHz the maximum relative sample clock
phase deviation is given by
Θmax 45%.±= Eq. 4-37.
Sampling Clock Recovery Support
At 4-PPM the maximum length of a sequence of chips without ’0’ to ’1’ transitions is limited to
6. Therefore 4-PPM offers an excellent support for the clock recovery at the receiver.
81
Figure 4-13. 4-PPM Eye Diagram of rb(t) after Quantization Unit
-250 -200 -150 -100 -50 0 50 100 150 200 250
time [ns]
Vss
Vdd
volta
ge le
vel
Vth
4.2.4 Bandwidth Efficiency of 4-PPM
With N-PPM one pulse can be set in one of N possible positions, and so N different messages
can be sent within one block. For encoding of N messages log2(N) bits are required and
consequently the relation between Tbit and Tpulse is given by
N( )Tbit2log NTpulse.= Eq. 4-38.
The resulting bandwidth efficiency of N-PPM is then
ηBN( )2log
N------------------- ,= Eq. 4-39.
so that the bandwidth efficiency of 4-PPM can be derived as
ηB24---
12---.= = Eq. 4-40.
82
I.e. 4-PPM has twice the bandwidth efficiency as 1/4-RZI and furthermore it guarantees enough
’0’ to ’1’ transitions, so that bit stuffing is also not required. Therefore 4-PPM is a considerable
improvement against 1/4-RZI.
4.2.5 Power Efficiency of 4-PPM
Since the average duty cycle of N-PPM is obviously
aveDC 1N---- ,= Eq. 4-41.
the power efficiency of N-PPM is given by
ηPηB
aveDC------------------ N( ).2log= = Eq. 4-42.
Consequently, the power efficiency of 4-PPM can be derived as
ηP 2.= Eq. 4-43.
I.e. 4-PPM has the same power efficiency as n/m-RZI.
4.3 Run-Length-Limited Code Modulation RLL(d,k)
Run-Length-Limited Code modulation is basically a superset of the previous modulation
schemes. With RLL(d,k) codes the various modulation techniques are classified by means of
two parameters d and k, whereby d is the minimum number of ’0’s between ’1’s and k is the
maximum number of ’0’s between ’1’s after the encoder [50]. For example a 4-PPM can be
considered as a 1/2-RLL(0,6), or 1/4-RZI can be considered as a 1/4-RLL(3,∞ ) code. As derived
by Shannon [51] and presented in Section 5.2 on page 101 there exists a maximum achievable
code rate for a code with certain parameters d and k. This maximum code rate is usually called
code capacity. E.g. an RLL(0,6) code has a code capacity of 0.9942. Noting that 4-PPM has with
83
0.5 a relatively poor code rate although it allows error causing double pulses, Hirt, Hassner and
Heise were seeking for an RLL code with the capability to deal with the shortcomings of the
wireless infrared channel in a better way, and with an improved bandwidth efficiency [33]. The
result was a 2/3-RLL(1,13) code, which they called HHH(1,13) code by using their own initials.
With the parameter d = 1 this code guarantees that there are no legal double pulses as they can
occur with the PPM codes. The parameter k = 13 guarantees that there are enough ’0’ to ’1’
transitions for reliable clock recovery at the receiver. At IrDA this code is now used for the latest
physical layer standard called Very Fast Infrared (VFIR)[1]. Therefore we will look more
closely into the HHH(1,13) in the following.
4.3.1 HHH(1,13) Modulation Scheme
At HHH(1,13) two new bits are encoded per encoding step and thereby three chips are generated.
Consequently, the input block αk and the output block βk are given by
αk a2k a2k 1+,= Eq. 4-44.
βk b3k b3k 1+ b3k 2+ ., ,= Eq. 4-45.
The resulting code rate is derived as
pq---
23--- ,= Eq. 4-46.
and the chip duration is then
Tchip23---Tbit.= Eq. 4-47.
The HHH(1,13) encoder is a finite state machine:
βk f αk αk 1+ αk 2+ ζk, , ,( )= Eq. 4-48.
84
ζk 1+ g αk αk 1+ αk 2+ ζk, , ,( ),=
with the internal state
ζk z1k z2k z3k ,= Eq. 4-50.
and the corresponding initial state
ζ0 1 0 0( ).= Eq. 4-51.
The output function of the HHH(1,13) encoder state machine is given by
b3k z1k z2k⋅= Eq. 4-52.
b3k 1+ z1k z2k z1k z3k a2k a2k 1++( )⋅ ⋅ ⋅ ⋅=
z1k z2k z1k z3k⋅ a2k a2k 1+ a2 k 1+( ) a2 k 1+( ) 1+⋅ ⋅ ⋅ ⋅( )⋅ ⋅+
Eq. 4-53.
b3k 2+ z1k z3k a2k a2k 1++( )⋅ ⋅=
z1k z3k⋅ a2k a2k 1+ a2 k 1+( ) a2 k 1+( ) 1+⋅ ⋅ ⋅ ⋅( )+
Eq. 4-54.
and the next state function is
z1k 1+ z1k z3k⋅( ) z3k a2k⋅( ) z1k a2k a2k 1+ a2 k 1+( )⋅ ⋅ ⋅( )+ +=
z1k a2k a2k 1+ a2 k 1+( ) 1+⋅ a2 k 2+( ) a2 k 2+( ) 1+⋅ ⋅ ⋅ ⋅( )+
Eq. 4-49.
Eq. 4-55.
z2k 1+ z3k a2k⋅( ) z1k z2k a2k a2k 1+⋅ ⋅ ⋅( )+= Eq. 4-56.
85
z3k 1+ z3k a2k 1+⋅( ) z1k a2k a2k 1+⋅ ⋅( ) z1k z2k a2k a2k 1+⋅ ⋅ ⋅( )+ += .
The pulse shaper generates pulses with a duration equal to the chip duration
Tpulse Tchip.=Eq. 4-58.
Figure 4-14 provides an example for the HHH(1,13) modulation, whereby b(t) should only
illustrate the timing relation to a(t) and does not reflect a correct encoder result, since this
depends on the current internal encoder state, which is not taken into account here.
Figure 4-14. HHH(1,13) Modulation
0
1
t
Tchip
0
1
tTbit
Vss
Vdd
tTpulse
a(t)
b(t)
4.3.2 HHH(1,13) Demodulation Scheme
The quantization unit has to process the signal r(t), which has an eye diagram as shown in
Figure 4-15.
Eq. 4-57.
86
The sampling unit has to sample the received signal r(t) with a sampling offset of
ToffsetTpulse
2-------------- .= Eq. 4-59.
Figure 4-15. HHH(1,13) Eye Diagram of r(t) after Receiver Front-End
-100 -50 0 50 100
-200
-100
0
100
200
300
400
500
time [ns]
curr
ent [
nA]
As HHH(1,13) has the characteristic that double pulses are not allowed, the sampling unit can
perform a single-pulse correction as proposed in [33] and illustrated in Figure 4-16 in the case
of a double pulse occurrence.
Figure 4-16. HHH(1,13) Single-Pulse Correction
Vss
Vdd
r(t)
0
1
b’(t)
t
t
87
The HHH(1,13) decoder is a finite state machine
α'k d β'k β'k 1+ β'k 2+ β, 'k 3+ ζk, , ,( )= Eq. 4-60.
ζk 1+ e β'k β'k 1+ β'k 2+ β, 'k 3+ ζk, , ,( ),= Eq. 4-61.
with the internal state
ζk z1k z2k z3k z4k z5k = Eq. 4-62.
and the corresponding initial state
ζ 3– 0 0 0 0 0( ).= Eq. 4-63.
With the auxiliary variable
xk b3 k 3+( ) b3 k 3+( ) 1+ b3 k 3+( ) 2++ += Eq. 4-64.
the output function of the HHH(1,13) decoder is given by
a'2k z3k= Eq. 4-65.
a'2k 1+ b3 k 1+( ) 2+ z1k⋅ z2k z1k xk⋅ ⋅ z4k+ +=Eq. 4-66.
and the next state function is given by
z1k 1+ xk= Eq. 4-67.
z2k 1+ z1k= Eq. 4-68.
88
z3k 1+ z2k z1k xk⋅ ⋅ z2k z1k⋅ b3 k 1+( ) z5k+ + +=
Note that there are three decoding steps (i.e. k = -3, k = -2, k = -1) necessary that generates
invalid output before with the decoding step k = 0 the first valid output is generated. That is also
the reason why as initial state ζ 3– is given. Furthermore the decoder cannot decode the last three
blocks, and therefore dummy blocks that carries no information needs to be transmitted. IrDA
uses a so called flush byte with all bits equal zero for that purpose. Note one byte with eight bit
results in twelve chips and so the decoder can fully be flushed.
Figure 4-17. HHH(1,13) Demodulation
0
1
t
Tchip
0
1
tTbit
Vss
Vdd
t
Tpulserb(t)
a’(t)
b’(t)
rth
t
r(t)
Eq. 4-69.
z4k 1+ z2k z1k xk b3k 2+⋅ ⋅ ⋅ z2k z1k xk b3 k 2+( ) 2++( )⋅ ⋅ z5k+ += Eq. 4-70.
z5k 1+ z2k z1k xk⋅ ⋅= Eq. 4-71.
89
Figure 4-17 provides an example for the HHH(1,13) demodulation, whereby a’(t) should only
illustrate the timing relation to b’(t) and does not reflect a correct decoder result, since this
depends on the current internal decoder state, which is not taken into account here.
4.3.3 Reliability of HHH(1,13)
In the following the reliability of HHH(1,13) is analyzed also according to the criteria derived
in Section 3.3.1 on page 56ff.
4.3.3.1 Quantization Error Robustness
HHH(1,13) has a sufficient robustness against quantization errors as indicated in Figure 4-18,
but due to the high duty cycle variations the robustness is not as good as at RZI and 4-PPM.
Figure 4-18. HHH(1,13) Bit Error Probability due to Quantization Errors
1E-60
1E-50
1E-40
1E-30
1E-20
1E-10
1
0.0001 0.001 0.01 0.1
IrDA range
Receiver Irradiance E
Err
or p
roba
bilit
y P
e bit
d = 1m,=15°ϕ
2cm
mW
Figure 4-19 shows the eye diagram of the received signal after the receiver front-end r(t) under
worst case condition and the corresponding eye opening is given by
E 335nA.≅ Eq. 4-72.
90
The resulting maximum bit error probability due to quantization errors is then given by
Pemaxbit 4.46 10 71–× .≅ Eq. 4-73.
Figure 4-19. HHH(1,13) Eye Diagram of r(t) without Noise under Worst Case Condition
-200
-100
0
100
200
300
400
500
time [ns]
curr
ent [
nA]
-100 -50 0 50 100
In order to minimize the duty cycle variations for an improved bit error probability of
HHH(1,13) Hirt et al. introduced a scrambling mechanism for VFIR (see [1]).
4.3.3.2 Sampling Error Robustness
Sampling Clock Phase Accuracy Requirements
The horizontal eye opening of HHH(1,13) under worst case conditions is shown in Figure 4-20
and is given by
Ehor 107.17 ns.= Eq. 4-74.
91
and with the HHH(1,13) sampling clock frequency of 8 MHz the maximum relative sample
clock phase deviation is given by
Θmax 43%.±= Eq. 4-75.
Figure 4-20. HHH(1,13) Eye Diagram of rb(t) after Quantization Unit
Vss
Vdd
volta
ge le
vel
-100 -50 0 50 100
time [ns]
Vth
Sampling Clock Recovery Support
As mentioned above the HHH(1,13) modulation scheme limits the maximum length of a
sequence of chips without ’0’ to ’1’ transitions to 13. Therefore also HHH(1,13) offers an
efficient support for the clock recovery at the receiver.
4.3.4 Bandwidth Efficiency of HHH(1,13)
With Equation 4-47 and Equation 4-58 the bandwidth efficiency of HHH(1,13) can be derived
as
ηBTpulseTbit
--------------23--- .= = Eq. 4-76.
92
I.e. HHH(1,13) offers obviously a further improved bandwidth efficiency compared to 1/4-RZI
(ηB = 0.25) and 4-PPM (ηB = 0.5).
4.3.5 Power Efficiency of HHH(1,13)
According to Hirt et al. [33] HHH(1,13) has an average duty cycle of only 0.258 and with that
the power efficiency ηP of HHH(1,13) can be derived as
ηPηB
aveDC------------------
23---
0.258------------- 2.584 .= = = Eq. 4-77.
I.e. HHH(1,13) has not only a good bandwidth efficiency ηB , but also an attractive power
efficiency ηP .
93
5 Edge Position Modulation
In this chapter the novel modulation technique EPM is now introduced. After presenting the
basic idea of EPM we derive the achievable bandwidth efficiencies for different variations of
EPM. It is revealed that the variant EPM(5,12,1/3,1) is a promising alternative to the currently
used modulation techniques.
5.1 Basics of EPM
In general the modulation schemes described above are all pulse position based, i.e. time is
divided into discrete time slots Tchip with a duration equal to or longer than the pulse duration
Tpulse and depending on the information to be transmitted there is a pulse within such a time slot
or not (see Figure 5-1).
Figure 5-1. Principle of Pulse Position Modulation Techniques
ChannelCoded Data
ModulatedSignal
Tpulse
0
1
t
Vss
Vdd
t
Tchip Tpulse
An alternative way is the edge position based modulation scheme, i.e. time is divided into
discrete time slots Tchip with a duration shorter than the pulse duration Tpulse, and depending on
the information to be transmitted there is a rising edge of a pulse within such a time slot or not
(see Figure 5-2).
95
Figure 5-2. Principle of Edge Position Modulation Techniques
ChannelCoded Data
ModulatedSignal
Tpulse
0
1
t
Vss
Vdd
t
Tchip Tpulse
In order to avoid inter-symbol interferences a coding scheme is necessary, which guarantees,
that there is a long enough pause TOFFmin between two pulses, so that the rising edge of the
current pulse is not disturbed by the previous pulse. Furthermore the coding scheme should
guarantee that there is a maximum pause between two pulses TOFFmax, so that the receiver can
recover the clock from the received signal by means of a DPLL. Feasible coding schemes for
that purpose are RLL(d,k) codes, where d and k are the minimum and maximum number of ’0’s
between ’1’s after the encoder as already described in Section 4.3 on page 83. I.e. the bit stream
to be transmitted becomes RLL encoded and then the ’1’s of the encoded data stream indicate
the positions where the pulses should start as shown in Figure 5-2.
Figure 5-3 and Figure 5-4 show the required signal processing steps for data transmission by
means of EPM and the corresponding modulator and demodulator components. While the
modulator consists of an RLL(d,k) Encoder and a Pulse Shaper, the demodulator is built up by
an Edge Detector, a DPLL and an RLL(d,k) Decoder.
Figure 5-3 illustrates the corresponding data streams and waveforms of the EPM modulation
process at the transmitter. Data sequence (an) represents the data from an unconstrained digital
information source that should be transmitted over the wireless infrared channel. The
corresponding discrete signal a(t) is transformed by the RLL encoder into the discrete signal b(t).
Note that the ratio between the baud rates of a(t) and b(t) depends on the code rate RRLL of the
used RLL code. (In Figure 5-4 the code rate RRLL is 1/3.) Finally, the waveform s(t) represents
the EPM modulated binary output signal that is generated by the pulse shaper and is transmitted
over the channel. It can be seen that with each ’1’ of b(t) a new pulse starts.
96
Figure 5-3. EPM Modulator Components with Corresponding Signals
RLL Encoder
Pulse Shaper
s(t)
0
1
t
Digital InformationSource
a(t)
0
1
tTbit
b(t)
Vss
Vdd
tTpulse
s(t)
ElectricalModulation
a(t)
b(t)
Wireless InfraredChannel
0 1 0 0 1 11(an) = ...
Tchip
Figure 5-4 illustrates the data streams and waveforms of the EPM demodulation process at the
receiver. Waveform r(t) and rb(t) represent the EPM modulated signal from the transmission
channel before and after the quantization unit, respectively. The waveform rb(t) should be
basically identical to waveform s(t) of Figure 5-3, but due to the wireless infrared channel there
might be some phase jitter. The discrete signal b’(t) represents the recovered RLL encoded
binary data, which should be identical to discrete signal b(t). For that an edge detection process
is used, where each detected rising edge of rb(t) results in a ’1’, otherwise a ’0’ is generated. The
required phase information is retrieved by the DPLL. Data stream b’(t) is used as input for the
RLL decoder logic that finally recovers the original data represented by data stream a’(t). I.e. at
a transmission without bit errors data streams a(t) and a’(t) are identical.
97
Figure 5-4. EPM Demodulator Components with Corresponding Signals
Decoder
Digital InformationSink
rb(t)
0
1
t
EdgeDetection
b’(t)
0
1
t
a’(t)
rb(t)
ElectricalDemodulation
a’(t)
b’(t)
Quantization Unit
0 1 0 0 1 11(an’) = ...
r(t)
Wireless InfraredChannel
0
i1
t
r(t)
DPLL
Tbit
Vss
Vdd
tTpulse
Tchip
Obviously, the Edge Position Modulation technique has several degrees of freedom and so there
exist many different types of EPM. A specific type of EPM is fully defined by
• the parameter d of the used RLL code that defines the minimum number of ’0’s between ’1’s
of the RLL encoded data stream,
• the parameter k of the RLL code that defines the maximum number of ’0’s between ’1’s of
the encoded data stream,
• the code rate RRLL of the RLL code that defines the ratio between the time slot duration
Tchip and the bit duration Tbit, and
98
• the ratio r between the minimum pause TOFFmin between two pulses and the pulse duration
Tpulse.
Taking this into account the following naming convention is used in the following in order to
specify an EPM variant:
EPM d k RRLL r, , ,( ).
Considering that the previously described modulation technique HHH(1,13) has the parameters
d = 1, k = 13, RRLL = 2/3, and r = 1 one can see that EPM is obviously a superset of HHH(1,13).
In the EPM naming convention HHH(1,13) can be specified as EPM(1,13,2/3,1). The more
general approach of EPM has the advantage that one can find an optimized trade-off between
bandwidth efficiency and reliability. I.e. by setting the parameters accordingly one can adapt
EPM perfectly to the characteristics of the wireless infrared channel.
The ratio r should be chosen so that there are no inter-symbol interferences, i.e. there are
sufficient minimum pauses TOFFmin between two pulses. With a given pulse duration Tpulse the
minimum pause TOFFmin is given by
TOFFmin rTpulse.= Eq. 5-1.
The parameter d must be selected so that the time slot duration Tchip is larger than the jitter of
the rising edges of the received pulses as shown in Figure 5-5. Note that the jitter of the falling
edge does not influence the requirements on Tchip.
Figure 5-5. Lower Limit of Time Slot Duration Tchip
Tchip > Jitter
Jitter
Furthermore Tchip must be at least the double of the achievable granularity of the DPLL of the
receiver. The upper limit of the time slot duration Tchip is per definition the pulse duration Tpulse
99
as it is case at HHH(1,13). The relation between time slot duration Tchip and parameter d is given
by
TchipTpulse TOFFmin+
1 d+----------------------------------------- .= Eq. 5-2.
The parameter k must be selected such as to guarantee sufficient recurrence of signal transitions
for reliable clock recovery in the receiver. The relation between the maximum pause TOFFmax
between two pulses and the parameter k is given by
TOFFmax 1 k+( )Tchip Tpulse.–= Eq. 5-3.
Figure 5-6 illustrates the relations of Tpulse, TOFFmin, TOFFmax, Tchip and the parameters d, k and
r by means of an example.
Figure 5-6. EPM with r = 1, d = 5 and k = 10
RLL(d,k)Encoded Data
ModulatedSignal
TOFF maxTOFF minTpulse
d = 5 k = 10
0
1
t
b(t)
Tchip
tVss
Vdd
r = 1
With the code rate RRLL and the chosen time slot duration Tchip the bit duration Tbit is finally
given by
Tbit1
RRLL-------------Tchip.= Eq. 5-4.
100
Combining Equation 5-1, Equation 5-2 and Equation 5-4 results in the relation between bit
duration Tbit and pulse duration Tpulse given by
Tbit1
RRLL-------------
Tpulse 1 r+( )1 d+
------------------------------- .= Eq. 5-5.
I.e. for a high bandwidth efficiency the code rate RRLL of the RLL code should be as high as
possible. But the maximum achievable code rate, i.e. the code capacity, depends on the chosen
parameters d and k. Therefore we want to investigate the theory of RLL codes in the following
Section 5.2 in order to derive the capacity C(d,k) of the various RLL(d,k) codes.
5.2 RLL Codes in Theory
5.2.1 State Transition Matrix of RLL(d,k) Codes
In general, an RLL(d,k) code can be described as finite state machine by a state transition
diagram [50] as shown in Figure 5-7.
Figure 5-7. State Transition Diagram of RLL(d,k) Codes
1 2 d0 0 0
1
0k
0 0
11 1
d+1 d+2 k+1
The state transition diagram has k+1 states, which are denoted by σ1 ,...,σk 1+ . Transmission of
a ’0’ takes the state machine from state σi to state σi 1+ when i k≤ . A ’1’ may only be
transmitted when the state machine is in the states σd 1+ ,..., σk 1+ , while a ’1’ must be
101
transmitted, when the machine is in state σk 1+ . The corresponding map of states to output
values is given by
ϑ σ i( ) 0 , 2 i k≤ ≤1 , i 1=
= Eq. 5-6.
Any path through the state transition diagram results in a sequence with at least d and maximal
k ’0’s between ’1’s. The corresponding state transition matrix, which gives the number of paths
of going in one step from state σi to state σj , is given by the k 1+( ) k 1+( )× matrix D with
entries dij, where
di1 1= i d 1+≥ Eq. 5-7.
dij 1= j i 1+=
dij 0= otherwise.
For example, the state transition matrix for an RLL(2,7) code is given by
D
0 1 0 0 0 0 0 00 0 1 0 0 0 0 01 0 0 1 0 0 0 01 0 0 0 1 0 0 01 0 0 0 0 1 0 01 0 0 0 0 0 1 01 0 0 0 0 0 0 11 0 0 0 0 0 0 0
.= Eq. 5-8.
The state transition diagram of an RLL(d,k) code with k ∞→ is shown in Figure 5-8. The state
transition diagram has d+1 states, which are denoted by σ1 ,...,σd 1+ . Transmission of a ’0’ takes
the state machine from state σi to state σi 1+ when i d≤ , while a ’1’ may only be transmitted,
when the machine is in state σd 1+ . Any path through the state transition diagram results in a
sequence with at least d ’0’s between two ’1’s.
102
Figure 5-8. State Transition Diagram of RLL(d,∞ ) Codes
2 d d+10 0 0
1
01
The corresponding state transition matrix, which gives the number of paths of going in one step
from state σi to state σj , is given by the d 1+( ) d 1+( )× matrix D with entries dij, where
di1 1= i d 1+= Eq. 5-9.
dij 1= j i 1+=
dij 1= i j d 1+= =
dij 0= otherwise.
For example, the state transition matrix for an RLL(5,∞ ) code is given by
D
0 1 0 0 0 00 0 1 0 0 00 0 0 1 0 00 0 0 0 1 00 0 0 0 0 11 0 0 0 0 1
.= Eq. 5-10.
The finite state machine model allows us to compute the code capacity (see below in
Section 5.2.2), and it is also helpful to compute the number of sequences that start and end in
certain states. The number of distinct sequences of length m that emanate from state σi and
103
terminate in state σj is given by the ijth entry of the matrix Dm. For example the matrix D5 of
the RLL(2,7) code is of the following form:
D5
1 1 1 0 0 1 0 02 1 1 1 0 0 1 03 2 1 1 1 0 0 13 2 1 1 1 0 0 02 2 1 1 1 0 0 02 1 1 1 1 0 0 02 1 0 1 1 0 0 01 1 0 0 1 0 0 0
.=Eq. 5-11.
It can be seen, for instance, that there are exactly 3 sequences of length 5 that emanate from state
σ4 and terminate in state σ1 .
5.2.2 Capacity C(d,k) of RLL Codes
The code capacity C(d,k) is defined as the theoretical upper limit for the code rate p/q that can
be achieved by an RLL code with the parameters d and k:
C d k,( ) RRLL≥ Eq. 5-12.
Shannon [51] showed that the capacity of a code is determined by the largest real eigenvalue λ
of its state transition matrix. Therefore the capacity C(d,k) of RLL(d,k) codes is given by
C d k,( ) λ2log ,= Eq. 5-13.
where λ is the largest real root of the characteristic equation
det D zI–[ ] 0= Eq. 5-14.
with the transition matrix D and the identity matrix I. Table 5-1 lists the resulting code capacities
for various combinations of the runlength parameters d and k.
104
Table 5-1. RLL Code Capacity C(d,k)
k d = 0 d = 1 d = 2 d = 3 d = 4 d = 5 d = 6
2 0.8791 0.4057
3 0.9468 0.5515 0.2878
4 0.9752 0.6174 0.4057 0.2232
5 0.9881 0.6509 0.4650 0.3218 0.1823
6 0.9942 0.6690 0.4979 0.3746 0.2669 0.1542
7 0.9971 0.6793 0.5174 0.4057 0.3142 0.2281 0.1335
8 0.9986 0.6853 0.5293 0.4251 0.3432 0.2709 0.1993
9 0.9993 0.6888 0.5369 0.4376 0.3620 0.2979 0.2382
10 0.9996 0.6909 0.5418 0.4460 0.3746 0.3158 0.2633
11 0.9998 0.6922 0.5450 0.4516 0.3833 0.3282 0.2804
12 0.9999 0.6930 0.5471 0.4555 0.3894 0.3369 0.2924
13 0.9999 0.6935 0.5485 0.4583 0.3937 0.3432 0.3011
14 0.9999 0.6938 0.5495 0.4602 0.3968 0.3478 0.3074
15 0.9999 0.6939 0.5501 0.4615 0.3991 0.3513 0.3122
16 1.0000 0.6942 0.5515 0.4650 0.4057 0.3620 0.3282
Figure 5-9 illustrates that the capacity increases with a decreasing parameter d and an increasing
parameter k.
5.2.3 RLL Code Generation
In order to generate a decodable RLL(d,k) code with a certain code rate p/q, which fulfills the
requirement of Equation 5-12, one has to find a state machine that obeys the (d,k)-constraints
and where each input sequence of the length p can be assigned for each state to a distinctive state
transition that generates an output sequence of the length q. That means the corresponding
q 1+( ) q 1+( )× state transition matrix T with the entries tij must fulfill the following
requirement for each row i:
tij
j 1=
q 1+
∑ 2p≥ Eq. 5-15.
105
Figure 5-9. RLL Code Capacity CRLL(d,k) versus d and k
C(0, )
d=0
d=1
d=2
d=3d=4
d=5d=6
0.0
0.2
0.4
0.6
0.8
1.0
1.2
0 2 4 6 8 10 12 14 16 18 20
k
CR
LL(d
,k)
∞
C(1, )∞
C(2, )∞
C(3, )∞C(4, )∞C(5, )∞C(6, )∞
While the sums of each row provide the actual numbers of successor states of each state, the term
2p defines the required successor states of each state.
The state transition matrix Dq as defined in Section 5.2.1 would obey the (d,k)-constraints, but
unfortunately it does in general not fulfill the requirement of Equation 5-15. However, there
exist several different methods for deriving from Dq a proper state transition matrix as
summarized by Immink in [50]. In the following the sliding block code algorithm of Adler et al.
[52][53] is introduced, since this method results in general in the lowest logic complexity for the
implementation.
The key idea of the sliding block code algorithm is to split first some states of Dq so that
Equation 5-15 is fulfilled, and then to merge some states in order to reduce the complexity of the
106
encoder and the decoder. The number of offspring states of each state is defined by the
approximate characteristic vector v , that fulfills the following requirement:
Dq v⋅ 2p v⋅≥ Eq. 5-16.
According to the Perron-Frobenius theory of nonnegative matrices the existence of such an
eigenvector is guaranteed [54][55][56]. An algorithm to calculate the approximate characteristic
vector can be found in the appendix of [53].
In order to illustrate the RLL code generation by means of the sliding block code algorithm the
generation of a 1/2-rate RLL(1,3) code is provided as example in the following. For a
fundamental mathematical description of the method please refer directly to [53]. The state
transition diagrams D and D2 of an RLL(1,3) code are shown in Figure 5-10 and the
corresponding state transition matrices are given by
D
0 1 0 01 0 1 01 0 0 11 0 0 0
.= D2
1 0 1 01 1 0 11 1 0 00 1 0 0
.= Eq. 5-17.
Figure 5-10. RLL(1,3) Transition Diagram
1 20 0
1
30
4
11 1 2
3
4
10
0010
01
0001
01
10
Transition Diagram D Transition Diagram D2
The matrix D2 can also be written down in a state transition table as shown in Table 5-2, whereby
the alphabet AD2 = 1, 2, 3, 4 represents the four states.
107
Table 5-2. State Transition Table D2
ζk ζk 1+
1 1 3
2 1 2 4
3 1 2
4 2
One can easily verify that v 1 2 1 1, , ,( )T= is an approximate characteristic vector for D2 that
fulfills Equation 5-16. That means that state σ2 shall be split up into two offspring states.
Therefore we aim to construct a state transition matrix D2
with the alphabet AD2 = 11, 21, 22,
31, 41.
As a first step we exchange in the state transition table the alphabet AD2 by the new alphabet
AD2 as shown in Table 5-3.
Table 5-3. Splitting Step 0
ζk ζk 1+
1 = 11 11 31
2 = 21, 22 11 21, 22 41
3 = 31 11 21, 22
4 = 41 21, 22
It can be seen that now each state has at least two successor states as it is required for a decodable
1/2-rate RLL code. Now one can start to assign two dedicated successor states to each state by
splitting up the offspring states sequentially, whereby the offspring states from one parent state
(here 21 and 22) must not have the same successor states. In our example this splitting process
is quite straightforward as it can be seen in the following Table 5-4. However, in general the
splitting process with the assignment of 2p successor states is somewhat tricky and requires
usually several steps. Therefore Adler et al. provided in [53] an algorithm for this splitting
process, which is applied later in this work for the generation of an RLL(5,12) code (see
Section A.1).
108
Table 5-4. Splitting Step 1
ζk ζk 1+
11 11 31
21 11 41
22 21 22
31 21 22 (11)
41 21 22
With the following mapping of states to output values
ϑ i( )01 , i 11 ∈
10 , i 21 22, ∈
00 , i 31 41, ∈
,
=
Eq. 5-18.
which is besides the superscripts identical to the mapping shown in Figure 5-10, the encoding
table can be then derived as follows:
Table 5-5. Encoding Tableαk 0= αk 1=
ζk ζk 1+ βk ζk 1+ βk11 11 01 31 00
21 11 01 41 00
41, 31, 22 21 10 22 10
Note that the assignment of the successor states to the input values αk 0= and αk 1= is done
in that way so that the decoder has minimized complexity as we will see below. However, by
merging the states of the encoding table that have the same successor states and result in the
same output values βk the complexity of the encoder can be reduced as shown in Table 5-6 and
Table 5-7.
109
Table 5-6. Reduction of Encoding Tableαk 0= αk 1=
ζk ζk 1+ βk ζk 1+ βk11, 21 11 01 22 00
22 21 10 22 10
Table 5-7. Final Reduced Encoding Tableαk 0= αk 1=
ζk ζk 1+ βk ζk 1+ βk11 11 01 22 00
22 11 10 22 10
Figure 5-11 shows the final state transition diagram of the simplified 1/2-rate RLL(1,3) code,
which obviously fulfills the requirements of Equation 5-15, i.e. each state has 2p (= 2) successor
states.
Figure 5-11. Final State Transition Diagram 1/2-rate RLL(1,3)
1 2
0 / 10
1 / 00
1 / 100 / 01
The RLL(1,3) encoder can now be written down as a finite state machine:
βk f αk ζk,( )= Eq. 5-19.
ζk 1+ g αk ζk,( ),= Eq. 5-20.
with the internal state
ζk zk ,= Eq. 5-21.
110
and the corresponding initial state
ζ0 0.= Eq. 5-22.
The output function of the RLL(1,3) encoder state machine can be derived from Table 5-7 as
b2k zk= Eq. 5-23.
b2k 1+ zk ak⋅= Eq. 5-24.
and the next state function is
zk 1+ ak= . Eq. 5-25.
The decoding table as shown in Table 5-8 can be derived by using the unreduced encoder table
provided in Table 5-5 and the mapping of states to output values of Equation 5-18. For the
generation of the decoding table we make use of the fact that an incoming symbol ’10’
corresponds to the state 11 and a symbol ’01’ to either 21 or 22. With this knowledge one can
determine with at least two incoming symbols the state ζk and thereby the decoded value αk .
In the general case the required symbols are defined by the number of splitting steps of the
encoder table generation.
Table 5-8. Decoding Tableβk βk 1+ ζk ζk 1+ αk00 01 not in range of encoder
00 10 31
4121, 22
21, 221
01 00 11 - 0
01 01 11 - 0
10 00 21 41 0
10 01 21 11 0
10 10 22 21, 22 1
111
Note that it is obviously helpful that the states 31 and 41 have been assigned to the same output
value αk = 1 in Table 5-5, otherwise the decoder would require more input symbols. However,
our RLL(1,3) decoder is obviously a finite look-ahead but state independent machine:
αk d βk( ),= Eq. 5-26.
whereby the logical RLL(1,3) decoder function can be written down as
a'k b'2k 1+ b'2k 2+ b'2k 3+⋅ ⋅= . Eq. 5-27.
5.3 EPM Bandwidth Efficiency in General
As stated in Equation 3-59 on page 65 the bandwidth efficiency is given by
ηBTpulseTbit
-------------- .= Eq. 5-28.
Together with Equation 5-5 on page 101 the bandwidth efficiency of EPM is consequently given
by
ηB RRLL1 d+1 r+------------ .= Eq. 5-29.
Considering that the maximum achievable RLL code rate RRLL is given by the RLL code
capacity C(d,k), which we have derived above in Section 5.2.2 on page 104, the maximum
achievable bandwidth efficiency ηB is given by
ηBmax C d k,( )1 d+1 r+------------ .= Eq. 5-30.
Figure 5-12 shows the maximum achievable bandwidth efficiency ηBmax of EPM with r = 1 as
a function of d and k.
112
Figure 5-12. Maximum Bandwidth Efficiency ηBmax of EPM with r = 1
0
0.2
0.4
0.6
0.8
1.0
1.2
1.4
1.6
1.8
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
d
Max
imum
Ban
dwid
th E
ffici
ency
k = 9
k = 12
k = 15
k =∞
One can see that with EPM very attractive bandwidth efficiencies can be achieved. In the
following section we want to investigate some EPM variants.
5.4 EPM Variants
As shown above there exist many different variants of EPM with different parameters. This
section should highlight some EPM variants that are interesting for implementation in real
systems. Therefore some implementation requirements for the different EPM parameters are
defined in the following in order to select and classify the EPM variants.
5.4.1 EPM Implementation Requirements
5.4.1.1 Implementation Requirement for r
The required minimum pause TOFFmin between two consecutive pulses to avoid intersymbol-
interferences strongly depends on the filter characteristics of the receiver. However, the channel
simulations above and measurements of currently available infrared transceivers showed that
Tpulse is a reasonable lower limit for TOFFmin. On the other hand a minimal pause greater than
113
1.5 Tpulse does not increase the transmission reliability anymore. I.e. we want to limit
r TOFFmin Tpulse⁄= as follows:
1 r 1.5≤ ≤ . Eq. 5-31.
5.4.1.2 Implementation Requirements for Tchip
The upper limit of the time slot duration Tchip is per definition the pulse duration Tpulse. For the
lower limit we have to consider that Tchip must be larger than the jitter of the rising edges of the
received pulses. Taking the investigations of the wireless infrared channel into account we can
assume that the jitter is less than one third of Tpulse. I.e. we want to limit the relation Tchip/Tpulse
as follows:
13---
TchipTpulse-------------- 1≤ ≤ . Eq. 5-32.
Additionally the relation between Tchip and Tpulse should be chosen in a way that the respective
signals b(t) and s(t) can be both derived from the same system clock, which should be not larger
than the twelvefold of 1/Tpulse. This requirement can be written down as follows:
TchipTpulse--------------
uv--- v 6, and u, v are integer values≤= Eq. 5-33.
5.4.1.3 Implementation Requirement for k
As already mentioned in Section 3.3.1.2 on page 62 Hirt et al. [33] stated that there should be at
least one ’0’ to ’1’ transition within 16 chips for an adequate sample clock recovery with a
DPLL. Although this is certainly only a soft limitation, since the clock recovery capability
strongly depends on the DPLL itself, we will use a similar1 limitation for the parameter k.
k 16≤ . Eq. 5-34.
1. The limitation of Hirt et al. is with k 15≤ a bit lower, but this would exclude some interesting EPM variants as it can be seen in Table 5-9.
114
5.4.1.4 Implementation Requirement for RLL Code Rate
Unfortunately, using a code with the maximum channel capacity as shown in Figure 5-12 is
generally not feasible, since data processing is usually byte-orientated, and therefore we need an
RLL code that encodes 1, 2, 4 or 8 input bits and outputs an integer number of chips.
Additionally an RLL code with only 1 or 2 input bits are preferable, since the resulting RLL
logic circuitry is then less complex.
5.4.2 Selected EPM Variants
Table 5-9 lists some interesting EPM variants that fulfill the above defined requirements. While
the upper variants in the table excels with high bandwidth efficiency, the lower ones offer high
transmission reliability.
Table 5-9. EPM Variants
EPM variants Characteristics
RRLL = N/M d k r ηB Tchip/Tpulse
8/23 5 15 1 1.043 1/3
1/3 5 12 1 1 1/3
8/25 6 16 1.33 0.96 1/3
1/4 6 10 1.33 0.75 1/3
2/5 4 16 1 1 2/5
8/23 5 15 1.4 0.870 2/5
1/3 5 12 1.4 0.833 2/5
4/9 3 10 1 0.889 1/2
2/5 4 16 1.5 0.8 1/2
1/3 4 16 1.5 0.667 1/2
4/9 3 10 1.4 0.741 3/5
2/5 3 10 1.4 0.667 3/5
1/3 3 6 1.4 0.556 3/5
8/15 2 9 1 0.8 2/3
1/2 2 7 1 0.75 2/3
8/15 2 9 1.25 0.711 2/3
1/2 2 7 1.25 0.667 3/4
8/15 2 9 1.4 0.667 4/5
1/2 2 7 1.4 0.625 4/5
115
ηB
The EPM concept obviously allows to find an ideal trade-off between transmission speed and
reliability, and therefore EPM enables the implementation of communication systems that are
tailored to the targeted transmission channel.
In the following chapter we want to investigate EPM(5,12,1/3,1) in more detail, because this
variant appears to offer a high bandwidth efficiency at low hardware complexity.
8/15 2 9 1.5 0.64 5/6
1/2 2 7 1.5 0.6 5/6
2/3 1 13 1 0.667 1
EPM variants Characteristics
RRLL = N/M d k r Tchip/Tpulse
116
6 EPM(5,12,1/3,1) - Implementation Example
6.1 EPM(5,12,1/3,1) Evaluation
As derived in Section 5.4 the modulation scheme EPM(5,12,1/3,1) appears to be a promising
candidate for the electrical modulation of a wireless infrared communication system. Therefore
we analyze this EPM variant in this chapter in more detail and for that we use the a novel 1/3-
rate RLL(5,12) code that was presented by the author in [9]. The generation of this RLL(5,12)
code is provided in Appendix A of this work. Adler presented in [57] already an other 1/3-rate
RLL(5,12) code, but this one requires more states in the encoder and is therefore a bit more
complex than the new one.
6.1.1 EPM(5,12,1/3,1) Modulation Scheme
At EPM(5,12,1/3,1) one bit is encoded per encoding step and thereby three chips are generated.
Consequently, the input block αk and the output block βk are given by
αk ak= Eq. 6-1.
βk b3k b3k 1+ b3k 2+ ., ,= Eq. 6-2.
The resulting code rate is derived as
pq--- 1
3---= Eq. 6-3.
117
and the chip duration is then
Tchip13---Tpulse.= Eq. 6-4.
The EPM(5,12,1/3,1) encoder is a finite state machine:
βk f αk ζk,( )= Eq. 6-5.
ζk 1+ g αk ζk,( ),= Eq. 6-6.
with the internal state
ζk z1k z2k z3k z4k = Eq. 6-7.
and the corresponding initial state
ζ0 0 0 0 0( ).= Eq. 6-8.
The output function of the EPM(5,12,1/3,1) encoder state machine is given by
b3k z1k z2k z3k ak z1k z3k z4k⋅⋅⋅+⋅⋅= Eq. 6-9.
b3k 1+ z1k z2k z3k z4k z1k z2k z3k z4k⋅⋅ ⋅+⋅⋅ ⋅= Eq. 6-10.
b3k 2+ ak z2k z3k z4k ak z1k z2k z3k z4k⋅⋅⋅⋅+⋅⋅⋅=
ak z1k z3k z4k ak z2k z3k z4k⋅⋅⋅+⋅⋅⋅+Eq. 6-11.
118
and the next state function is
z1k 1+ ak z1k z3k z4k⋅ ⋅ ⋅( ) z1k z2k z3k z4k⋅ ⋅ ⋅( )+=
z1k z2k z3k z4k⋅ ⋅ ⋅( ) ak z1k z2k z4k⋅ ⋅ ⋅( )+ +
Eq. 6-12.
z2k 1+ ak z1k z3k z4k⋅ ⋅ ⋅( ) ak z2k z3k z4k⋅ ⋅ ⋅( )+=
ak z1k z2k z3k⋅ ⋅ ⋅( ) ak z1k z2k⋅ ⋅( ) ak z2k z3k z4k⋅ ⋅ ⋅( )+ + +
ak z2k z3k z4k⋅ ⋅ ⋅( ) z1k z2k z3k z4k⋅ ⋅ ⋅( )+ +
Eq. 6-13.
z3k 1+ ak z1k z2k z3k⋅ ⋅ ⋅( ) ak z1k z2k z4k⋅ ⋅ ⋅( )+=
z1k z2k z4k⋅ ⋅( ) ak z1k z3k⋅ ⋅( ) z1k z2k z4k⋅ ⋅( )+ + +
ak z1k z2k z4k⋅ ⋅ ⋅( ) ak z2k z3k z4k⋅ ⋅ ⋅( )+ +
ak z1k z2k z4k⋅ ⋅ ⋅( )+
Eq. 6-14.
z4k 1+ ak z1k z3k z4k⋅ ⋅ ⋅( ) ak z1k z2k z4k⋅ ⋅ ⋅( )+=
ak z⋅ 2k z3k z4k⋅ ⋅( ) ak z2k z3k z4k⋅ ⋅ ⋅( )+ +
ak z⋅ 1k z2k z3k z4k⋅ ⋅ ⋅( ) ak z1k z3k z4k⋅ ⋅ ⋅( )+ +
ak z2k z3k z4k⋅ ⋅ ⋅( ) ak z1k z2k z4k⋅ ⋅ ⋅( )+ +
ak z2k z3k z4k⋅ ⋅ ⋅( ) ak z2k z3k z4k⋅ ⋅ ⋅( )+ +
Eq. 6-15.
The pulse shaper generates pulses with a duration three times the chip duration
Tpulse 3Tchip.= Eq. 6-16.
Figure 6-1 provides an example for the EPM(5,12,1/3,1) modulation, whereby b(t) should only
illustrate the timing relation to a(t) and does not reflect a correct encoder result, since this
depends on the current internal encoder state, which is not taken into account here.
119
Figure 6-1. EPM(5,12,1/3,1) Modulation
0
1
t
Tchip
0
1
tTbit
Vss
Vdd
tTpulse
s(t)
a(t)
b(t)
6.1.2 EPM(5,12,1/3,1) Demodulation Scheme
The quantization unit has to process the signal r(t), which has an eye diagram as shown in
Figure 6-2.
Figure 6-2. EPM(5,12,1/3,1) Eye Diagram of r(t) after the Receiver Front-End
-80 0 80
-200
-100
0
100
200
300
400
500
time [ns]
curr
ent [
nA]
120
The sampling unit has to sample the received signal r(t) with a sampling offset of
ToffsetTchip
2------------ .= Eq. 6-17.
As at EPM(5,12,1/3,1) the pulse duration is three times of the chip duration, each pulse results
in at least three consecutive logical ’1’s. With potential pulse extensions even more logical ’1’s
can occur. But with the knowledge that with the used (5,12)-RLL code after one logical ’1’s
there are at least five logical ’0’, the sampling unit performs always a pulse correction as
illustrated in Figure 6-3, which is basically an edge detection. I.e. the sampling unit is only
sensitive on pulse edges and does not care about pulse durations.
Figure 6-3. Edge Detection for EPM(5,12,1/3,1)
Vss
Vdd
r(t)
0
1
b’(t)
„allowed“ pulseextension
The EPM(5,12,1/3,1) decoder is a finite look-ahead but state independent machine
α'k d β'k β'k 1+ β'k 2+ β, 'k 3+ β'k 4+, , ,( )= Eq. 6-18.
121
and the decoder function is given by
a'k b'3k b'3k 1+ b'3 k 1+( ) b'3 k 1+( ) 1+ b'3 k 1+( ) 2+ b'3 k 3+( ) 2+⋅ ⋅ ⋅ ⋅ ⋅ +=
b'3k b'3k 1+ b'3 k 1+( ) b'3 k 3+( )⋅ ⋅ ⋅ b'3 k 2+( ) b'3 k 4+( ) 1+⋅+ + +
b'3 k 1+( ) 2+ b'3 k 4+( ) 2+⋅ b'3 k 1+( ) 2+ b'3 k 4+( )⋅+ + +
b'3 k 1+( ) 1+ b'3 k 4+( ) 2+⋅ b'3 k 1+( ) 1+ b'3 k 4+( )⋅+ + +
b'3 k 1+( ) b'3 k 3+( ) b'3 k 3+( ) 1+ b'3 k 3+( ) 2+⋅ ⋅ ⋅+ +
b'3k 2+ b'3 k 2+( ) 2+ b'3 k 4+( ) 2+⋅ ⋅ b'3k 2+ b'3 k 4+( )⋅+ + +
b'3k 1+ b'3 k 2+( ) 1+ b'3 k 2+( ) 2+ b'3 k 4+( ) 2+⋅ ⋅ ⋅+ +
b'3 k 3+( ) 1++ b'3k 1+ b'3 k 2+( ) 1+⋅ b'3k 1+ b'3 k 4+( )⋅+ + +
b'3k b'3 k 2+( ) b'3 k 2+( ) 1+ b'3 k 2+( ) 2+ b'3 k 3+( ) b'3 k 3+( ) 1+ b'3 k 3+( ) 2+⋅ ⋅ ⋅ ⋅ ⋅ ⋅+
Eq. 6-19.
The decoder requires similar to the HHH(1,13) dummy chips in order to flush its content
completely. The EPM(5,12,1/3,1) decoder requires 12 flush chips, and therefore the transmitter
should add at least 4 bits to the payload data.
Figure 6-4 provides an example for the EPM(5,12,1/3,1) demodulation, whereby a’(t) should
only illustrate the timing relation to b’(t) and does not reflect a correct decoder result.
6.1.3 Reliability of EPM(5,12,1/3,1)
6.1.3.1 Quantization Error Robustness
Figure 6-5 shows the bit error probabilities due to quantization errors of EPM(5,12,1/3,1) and of
the other modulation schemes. It can be seen that EPM has a better robustness against
quantization errors than RZI and HHH(1,13) and is only outperformed by 4-PPM.
Figure 6-6 shows the eye diagram of the received signal after the receiver front-end r(t) without
noise under worst case condition and the corresponding eye opening is given by
E 377nA.≅ Eq. 6-20.
122
Figure 6-4. EPM(5,12,1/3,1) Demodulation
0
1
t
Tchip
0
1
tTbit
Vss
Vdd
t
Tpulserb(t)
a’(t)
b’(t)
rth
t
r(t)
The resulting maximum bit error probability due to quantization errors is then given by
Pemaxbit 1.96 10 89–× .≅ Eq. 6-21.
6.1.3.2 Sampling Error Robustness
Sampling Clock Phase Accuracy Requirements
The horizontal eye opening of EPM under worst case conditions is shown in Figure 6-7 and is
given by
Ehor 25.35 ns.= Eq. 6-22.
123
Figure 6-5. EPM(5,12,1/3,1) Bit Error Probability due to Quantization Errors
1E-60
1E-50
1E-40
1E-30
1E-20
1E-10
1
0.0001 0.001 0.01 0.1
HHH
RZI
EPM
4PPM
IrDA range
d = 1m,=15°
Receiver Irradiance E
Err
or p
roba
bilit
y P
e bit
2cm
mW
ϕ
Figure 6-6. EPM(5,12,1/3,1) Eye Diagram of r(t) without Noise under Worst Case Condition
-200
-100
0
100
200
300
400
500
curr
ent [
nA]
-100 -50 0 50 100
time [ns]
This results in a maximum sample clock deviation of
Tmax∆ 12.675 ns±= Eq. 6-23.
124
and with the EPM sampling clock frequency of 24 MHz the maximum relative sample clock
phase deviation is given by
Θmax 30%.±= Eq. 6-24.
Figure 6-7. EPM(5,12,1/3,1) Eye Diagram after Quantization Unit
time [ns]
-80 0 80
Vss
Vdd
volta
ge le
vel
Vth
EPM(5,12,1/3,1) obvioulsy requires at the receiver a phase recovery with a fairly high
granularity compared to the previous methods. Therefore this thesis presents in Section 6.2.3 a
DPLL that can provide the required granularity without the need of a higher system clock of the
receiver logic.
Sampling Clock Recovery Support
As mentioned above the EPM modulation scheme limits the maximum length of a sequence of
chips without ’0 to ’1’ transitions to 12. Therefore also EPM offers an efficient support for the
clock recovery at the receiver.
125
6.1.4 Bandwidth Efficiency of EPM(5,12,1/3,1)
As already described in Section 5.4.2 the bandwidth efficiency of EPM(5,12,1/3,1) can be
derived as
ηB RRLL1 d+1 δ+------------⋅ 1
3--- 1 5+
1 1+------------⋅ 1= = = Eq. 6-25.
Therefore the bandwidth efficiency of EPM(5,12,1/3,1) significantly excels the bandwidth
efficiencies of the current IrDA modulation schemes.
6.1.5 Power Efficiency of EPM
According to simulation results EPM(5,12,1/3,1) has an average duty cycle of 0.29, what causes
an outstanding power efficiency of
ηPηB
aveDC------------------ 1
0.29---------- 3.448 .= = = Eq. 6-26.
Note that the average duty cycle is slightly worse than the HHH(1,13) duty cycle, but due to
excellent bandwidth efficiency, also EPM’s power efficiency excels.
6.2 System Implementation with EPM(5,12,1/3,1)
This section describes how EPM(5,12,1/3,1) can be implemented in a wireless infrared
communication system. In particular it is shown that existing IrDA compliant systems can easily
enhanced by EPM.
6.2.1 System Impact of EPM Extension
Figure 6-9 shows the basic system architecture of an IrDA compliant communication system as
already described in Section 1.3.4 on page 8. The novel EPM modulation technique can be very
126
easily integrated in such a system just by enhancing the infrared controller by the EPM
modulator and demodulator. The infrared transceiver is not at all affected by EPM. The impact
on the IrDA protocol stack, which is running as SW on the CPU, is limited to the Hardware
Abstraction Layer (HAL) and the Infrared Link Access Protocol (IrLAP), which need to be
slightly enhanced so that the EPM mode of the IR controller can be utilized. Actually, the
required change of IrLAP is very similar to the change that was necessary at the introduction of
HHH(1,13) [58]. But since IrLAP is already prepared for an additional modulation scheme, the
effort for this modifications can be more or less neglected.
Figure 6-8. IrDA Compliant Infrared Communication System
CPU CPUIRController
IRController
IR TransceiversDevice A Device B
HALIrLAP
IrLMP
UpperLayers
SWApplication
HALIrLAP
IrLMP
UpperLayers
SWApplication
6.2.2 Infrared Controller with EPM Extension
Figure 6-9 illustrates how a typical architecture of an IrDA compliant infrared controller can be
extended by EPM(5,12,1/3,1). Basically the IR controller architecture can be subdivided into
five main building blocks as described in the following.
6.2.2.1 CRC Unit
The CRC unit serves to append a CRC flag to the outgoing IrLAP frames and it performs an error
detection by checking the CRC of the incoming frames. The CRC unit is not affected by the
127
EPM modulation technique, since for EPM the same CRC flags can be used as for FIR and
VFIR, i.e. for 4-PPM and HHH(1,13), respectively.
Figure 6-9. IrDA Compliant Infrared Controller with EPM(5,12,1/3,1) Extension
System Bus
CRCChecking
Serial/Parallel
TX SignalRX Signal
MUX
CRC Unit
Modulation UnitSynchronizationUnit
Infrared Controller
IrLAP frame +CRC
Demodulation Unit
RZI
FIFO
Bus InterfaceUnit
4PPM HHH(1,13) EPM(5,12,1/3,1)
RZI 4PPM HHH(1,13) EPM(5,12,1/3,1)
CRCGeneration
DPLL
MUX
Synchronization
Registers
IrLAP frame +CRC
IrLAP frame
6.2.2.2 Modulation Unit
The Modulation Unit modulates the bits of the IrLAP frame with the CRC flag from the CRC
unit in order to create the TX signal, which drives the off-chip infrared transceiver. Here the
novel EPM(5,12,1/3,1) modulation state machine as described in Section 6.1.1 can be
implemented in parallel to the state machines of the other modulation schemes of the IrDA
128
standard. Besides the pure modulation this unit has to perform also some framing operations as
described for EPM in Section 6.2.4.
6.2.2.3 Synchronization Unit
The synchronization unit detects and synchronizes the RX signal from the off-chip IrDA
infrared transceiver, and furthermore it performs the sample clock phase recovery. Since
EPM(5,12,1/3,1) requires a phase recovery with a high granularity, a somewhat more
sophisticated clock recovery method with a novel DPLL is recommended as described in
Section 6.2.3. However, the introduced DPLL can also be used for 4-PPM and for HHH(1,13)
and therefore the implementation overhead is negligible.
6.2.2.4 Demodulation Unit
The Demodulation Unit demodulates the synchronized RX signal in order to retrieve the RX
frame. The EPM edge detection and the RLL decoder of the EPM demodulator can be
implemented in parallel to the other demodulators. The EPM demodulation with the RLL
decoder is described in Section 6.1.2. The edge detection should be implemented as described
in Section 6.2.3.3 so that it fits to the introduced DPLL.
6.2.2.5 Bus Interface Unit
The bus interface unit with its data and control registers builds up the interface of the infrared
controller to the bus system of the system architecture. The FIFO is used as buffer in order to
compensate the bandwidth difference between the Infrared communication system and the bus
system. However, the EPM modulation technique does not influence the bus interface unit
besides some control bits that are required to control the EPM modulation and demodulation.
6.2.3 Clock Recovery and Edge Detection for EPM(5,12,1/3,1)
As described in Section 3.2.2 on page 52 the sample clock phase needs to be retrieved at the
receiver from the received signal. Since EPM(5,12,1/3,1) requires a relatively high sample clock
frequency of 24 MHz with a maximum sampling clock phase deviation of 12.675 ns (see
Section 6.1.3.2), a sophisticated clock recovery by means of a DPLL is required. Millar et al.
presented in [47] a DPLL that is suited for IrDA's FIR standard and that could be adapted to our
129
needs. But this DPLL requires a system clock that is six times higher than the sampling clock.
That means for EPM(5,12,1/3,1) we would need a system clock of 144 MHz. Such a high system
clock is usually available in modern system architectures, but nevertheless the following will
present an edge detection method for EPM with a DPLL that requires only a system clock of
48 MHz as it is typically used for today’s 4-PPM implementations. Figure 6-10 shows the main
building blocks that are required for the clock recovery and edge detection at EPM(5,12,1/3,1)
with a system clock of 48 MHz.
Figure 6-10. Clock Recovery and Edge Detection Circuitry for EPM(5,12,1/3,1)
rneg(t)
Edge detection
b’(t)
1:2 DPLL
Synchronization
rb(t)
rpos(t)
sample clock
polarity
The edge detection block detects any rising edge of the received signal and thereby the signal
b’(t) is recovered. The correct phase of the sampling clock is retrieved and provided by the
DPLL. In order to keep the required system clock frequency to a minimum, the incoming RX
signal rb(t) is synchronized on both the rising and the falling edge of the system clock resulting
in rpos(t) or rneg(t), respectively. The DPLL indicates with the signal ’polarity’ whether rpos(t) or
rneg(t) shall be used for the edge detection. The following describes the individual building
blocks in more detail.
130
6.2.3.1 Synchronization
In general input signals to digital circuits are usually synchronized to the rising edge of the
system clock in order to achieve a fully synchronous design. This is also done in our case with
the input signal rb(t) from the infrared transceiver, which is sampled by the rising edge of the
48 MHz system clock. But in addition to that the signal rb(t) is also sampled with the falling edge
of the system clock, as shown in Figure 6-11, in order to preserve important phase information
for the sample clock recovery.
Figure 6-11. Synchronization of Input Signal rb(t)
D Q
Clk
D Q
Clk
D Q
Clk
rpos(t) D Q
Clk
rneg(t)
rb(t)
Synchronization
Note that for each path two consecutive flip-flops are used. Although one flip-flop would be
sufficient from a pure functional perspective, it is recommend to use two flip-flops in order to
avoid unambiguous states after the synchronization.
6.2.3.2 Digital PLL for EPM(5,12,1/3,1)
Figure 6-12 shows the proposed DPLL for EPM(5,12,1/3,1) that retrieves the sample clock with
additional phase information, i.e. signal ’polarity’, from the synchronized RX signals rneg(t) and
rpos(t). The DPLL consists basically of a phase detector, a filter and a variable oscillator that are
all clocked by the positive edge of the 48 MHz system clock. They are described in the
following:
Phase Detector
The phase detector is a state machine that compares the rising edges of the synchronized RX
signals rpos(t) and rneg(t) with those of the recovered sample clock. If the rising edges of the RX
131
signals do not occur within the expected phase ranges, then the phase detector produces an UP
or DOWN signal. The following Figures 6-13 to 6-20 illustrate the behavior of the phase
detector depending on the deviation of the position of the rising edges from the expected phase
range.
Figure 6-12. DPLL Circuitry
Phasedetector
Filter(4-bit timer)
Variableoscillator
Up
Down
1st MSB
2nd MSB
rneg(t) rpos(t)
sample clock
polarity
If the 2nd MSB of the DPLL filter (see Figure 6-12) is ’1’, then the rising edge of the RX input
signal rb(t) should be within the phase range as shown in Figure 6-13. If the 2nd MSB of the
DPLL filter is ’0’, then the rising edge of the RX input signal rb(t) should be within the phase
range as shown in Figure 6-14. In both cases neither an UP signal nor a DOWN signal is
generated by the phase detector.
Figure 6-13. Phase Detector Behavior at Phase Lock when 2nd MSB = ’1’
48MHz system clock
RX input signal rb(t)
Recovered sample clock
UP
DOWN
rneg(t)
expectedphase range
132
Figure 6-14. Phase Detector Behavior at Phase Lock when 2nd MSB = ’0’
48MHz system clock
RX input signal rb(t)
Recovered sample clock
UP
DOWN
rpos(t)
expectedphase range
If the rising edge of the RX input signal rb(t) is a half system clock period earlier than expected,
then the phase detector generates an UP signal. Figure 6-15 and Figure 6-16 illustrate this
behavior if the 2nd MSB is ’1’ and if the 2nd MSB is ’0’, respectively.
Figure 6-15. Phase Detector Behavior at a Phase Error of Tsysclk/2 when 2nd MSB = ’1’
48MHz system clock
RX input signal rb(t)
Recovered sample clock
UP
DOWN
rneg(t)
expectedphase range
133
Figure 6-16. Phase Detector Behavior at a Phase Error of Tsysclk/2 when 2nd MSB = ’0’
48MHz system clock
RX input signal rb(t)
Recovered sample clock
UP
DOWN
rpos(t)
expectedphase range
If the rising edge of the RX input signal rb(t) is a full system clock period earlier than expected,
then the phase detector generates an UP signal. Figure 6-17 and Figure 6-18 illustrate this
behavior if the 2nd MSB is ’1’ and if the 2nd MSB is ’0’, respectively.
Figure 6-17. Phase Detector Behavior at a Phase Error of Tsysclk when 2nd MSB = ’1’
RX input signal rb(t)
UP
DOWN
rneg(t)
expectedphase range
134
Figure 6-18. Phase Detector Behavior at a Phase Error of Tsysclk when 2nd MSB = ’0’
48MHz system clock
RX input signal rb(t)
Recovered sample clock
UP
DOWN
rpos(t)
expectedphase range
If the rising edge of the RX input signal rb(t) is a half system clock period later than expected,
then the phase detector generates a DOWN signal. Figure 6-19 and Figure 6-20 illustrate this
behavior if the 2nd MSB is ’1’ and if the 2nd MSB is ’0’, respectively.
Figure 6-19. Phase Detector Behavior at a Phase Error of -Tsysclk/2 when 2nd MSB = ’1’
48MHz system clock
RX input signal rb(t)
Recovered sample clock
UP
DOWN
rneg(t)
expectedphase range
135
Figure 6-20. Phase Detector Behavior at a Phase Error of -Tsysclk/2 when 2nd MSB = ’0’
48MHz system clock
RX input signal rb(t)
Recovered sample clock
UP
DOWN
rpos(t)
expectedphase range
Figure 6-21 shows the circuitry of the phase detector and Table 6-1 shows the corresponding
value table of the phase detector logic.
Figure 6-21. Phase Detector
D Q
Clk
rpos(t)
rneg(t)
Phasedetector
logic
Up
2nd MSBrecoveredsample clock
Down
a
bc
d
D Q
Clk
D Q
Clk
D Q
Clk
Filter
The filter consists of a 4-bit counter, which is increased by 1, when it gets a DOWN and is
decreased by 1, when it gets an UP from the phase detector. The initial value of the counter is
0101.
136
The 2 most significant bits of the 4-bit counter determines the phase of the recovered clock and
whether the RX signal is sampled by the rising or the falling edge of the 48 MHz system clock.
The 2 least significant bits ensure that the counter acts as a low-pass filter, since several UP and
DOWN signals are required to change the phase of the sample clock.
Table 6-1.
Input Output
2nd MSB
recovered sample clock a b c d UP DOWN
1 0 0 0 1 0 1 0
0 0 1 0 1 0 1 0
0 0 0 0 1 0 1 0
1 1 0 0 1 0 0 1
0 1 1 0 1 0 0 1
1 1 1 0 1 0 0 1
otherwise 0 0
Value Table of Phase Detector Logic
Variable Oscillator
The variable oscillator generates the sample clock by means of a free-running 1-bit counter,
which is clocked by the 48 MHz system clock. The phase of the sample clock is shifted in
dependency of changes of the 2 MSBs from the Filter as indicated in Table 6-2.
Table 6-2. Phase Shift of Sample Clock
Change of the 2 MSBs Phase shift
’00’ ’11’→ ’10’ ’01’→
’01’ ’10’→ ’11’ ’00’→
137
6.2.3.3 Sampling and Edge Detection
Figure 6-22 shows the basic sampling and edge detection circuitry, which corresponds to the
above described DPLL. The signal rneg(t) is sampled with the rising edge and rpos(t) is sampled
with the falling edge of the 48 MHz system clock each time the recovered sampling clock is
high. The signal polarity, which is basically the 2nd MSB from the Filter of the DPLL,
determines, which recovered data stream is used for the following edge detection, which is
realized by a flip-flop and ’AND’ gate. The resulting signal b’(t) is then ready for being RLL
decoded in order to derive the origin data stream.
Figure 6-22. Sampling and Edge Detection
MUX
D
En
recoveredsample clock
rpos(t)
rneg(t)
polarity
Q
D Q
En
D Q
En
D Q
En
&
Signal b’(t) toRLL decoder
Sampled RXsignal
Edge detectorinput
6.2.3.4 Manner of Operation for Clock Phase Recovery
This section describes how the DPLL establishes phase lock, i.e. how it balances a phase offset
of the actual positions of the rising edges of the RX input signal rb(t) from the expected phase
range. As consecutively described in the following the clock phase recovery depends on the
value of the 2nd MSB and the degree of the average phase error.
Average Phase Offset of Tsysclk/2 and 2nd MSB = ’1’
Figure 6-23 illustrates the case when the 2nd MSB of the DPLL filter is ’1’ and when the
expected phase range of the rising edge of the RX input signal rb(t) is too late by a half system
clock period. The DPLL phase detector generates UP signals and thereby reduces the value of
the DPLL filter. As soon as the 2nd MSB changes from ’1’ to ’0’ the signal rpos(t), which is
138
sampled with the falling edge of the system clock, is used as edge detection input. Thereby the
expected phase range of the rising edge of the RX input signal rb(t) is earlier and matches with
the actual edge position. Consequently no UP signals are generated anymore and phase lock is
established.
Figure 6-23. Clock Recovery with Average Phase Offset Tsysclk/2 and with 2nd MSB = ’1’
48MHz system clock
Recovered sample clock
RX input signal rb(t)
rpos(t)
b’(t)
Sampled RX signal
Edge detection input
rneg(t)
UP
2 MSBs of filter ‚01' or ‚11' ‚00' or ‚10'
expectedphase range
expectedphase range
Average Phase Offset of Tsysclk/2 and 2nd MSB = ’1’
Figure 6-24 illustrates the case when the 2nd MSB of the DPLL filter is ’1’ and when the
expected phase range of the rising edge of the RX input signal rb(t) is too late by a full system
clock period. The DPLL phase detector generates UP signals and thereby reduces the value of
the DPLL filter. As soon as the 2nd MSB changes from ’1’ to ’0’ the signal rpos(t), which is
sampled with the falling edge of the system clock, is used as edge detection input. Thereby the
expected phase range of the rising edge of the RX input signal rb(t) is earlier, but is still too late
by a half system clock period. Consequently further UP signals are generated and phase lock is
139
not yet established. The final phase lock is then achieved as described below and illustrated in
Figure 6-26.
Figure 6-24. Clock Recovery with Average Phase Offset Tsysclk and with 2nd MSB = ’1’
48MHz system clock
Recovered sample clock
RX input signal rb(t)
rpos(t)
b’(t)
Sampled RX signal
Edge detection input
rneg(t)
UP
2 MSBs of filter ‚01' or ‚11' ‚00' or ‚10'
expectedphase range
expectedphase range
Average Phase Offset of -Tsysclk/2 and 2nd MSB = ’1’
Figure 6-25 illustrates the case when the 2nd MSB of the DPLL filter is ’1’ and when the
expected phase range of the rising edge of the RX input signal rb(t) is too early by a half system
clock period. The DPLL phase detector generates DOWN signals and thereby increases the
value of the DPLL filter. As soon as the 2nd MSB changes from ’1’ to ’0’ the signal rneg(t), which
is sampled with the rising edge of the system clock, is used as edge detection input. Thereby the
expected phase range of the rising edge of the RX input signal rb(t) is later and matches with the
actual edge position. Consequently no DOWN signals are generated anymore and phase lock is
established.
140
Figure 6-25. Clock Recovery with Average Phase Offset -Tsysclk/2 and with 2nd MSB = ’1’
48MHz system clock
Recovered sample clock
RX input signal rb(t)
rpos(t)
b’(t)
Sampled RX signal
Edge detection input
rneg(t)
DOWN
2 MSBs of filter ‚01' or ‚11' ‚10' or ‚00'
expectedphase range
expectedphase range
Average Phase Offset of Tsysclk/2 and 2nd MSB = ’0’
Figure 6-26 illustrates the case when the 2nd MSB of the DPLL filter is ’0’ and when the
expected phase range of the rising edge of the RX input signal rb(t) is too late by a half system
clock period. The DPLL phase detector generates UP signals and thereby increases the value of
the DPLL filter. As soon as the 2nd MSB changes from ’0’ to ’1’ the signal rneg(t), which is
sampled with the rising edge of the system clock, is used as edge detection input. Thereby the
expected phase range of the rising edge of the RX input signal rb(t) is earlier and matches with
the actual edge position. Consequently no UP signals are generated anymore and phase lock is
established.
141
Figure 6-26. Clock Recovery with Average Phase Offset Tsysclk/2 and with 2nd MSB = ’0’
48MHz system clock
Recovered sample clock
RX input signal rb(t)
rpos(t)
b’(t)
Sampled RX signal
Edge detection input
rneg(t)
UP
2 MSBs of filter ‚00' or ‚10' ‚11' or ‚01'
expectedphase range
expectedphase range
Average Phase Offset of Tsysclk and 2nd MSB = ’0’
Figure 6-27 illustrates the case when the 2nd MSB of the DPLL filter is ’0’ and when the
expected phase range of the rising edge of the RX input signal rb(t) is too late by a full system
clock period. The DPLL phase detector generates UP signals and thereby reduces the value of
the DPLL filter. As soon as the 2nd MSB changes from ’0’ to ’1’ the signal rneg(t), which is
sampled with the rising edge of the system clock, is used as edge detection input. Thereby the
expected phase range of the rising edge of the RX input signal rb(t) is earlier, but is still too late
by a half system clock period. Consequently further UP signals are generated and phase lock is
not yet established. The final phase lock is then achieved as described above and illustrated in
Figure 6-23.
142
Figure 6-27. Clock Recovery with Average Phase Offset Tsysclk and with 2nd MSB = ’0’
48MHz system clock
Recovered sample clock
RX input signal rb(t)
rpos(t)
b’(t)
Sampled RX signal
Edge detection input
rneg(t)
UP
2 MSBs of filter ‚00' or ‚10' ‚11' or ‚01'
expectedphase range
expectedphase range
Average Phase Offset of -Tsysclk/2 and 2nd MSB = ’0’
Figure 6-28 illustrates the case when the 2nd MSB of the DPLL filter is ’0’ and when the
expected phase range of the rising edge of the RX input signal rb(t) is too early by a half system
clock period. The DPLL phase detector generates DOWN signals and thereby increases the
value of the DPLL filter. As soon as the 2nd MSB changes from ’0’ to ’1’ the signal rpos(t), which
is sampled with the falling edge of the system clock, is used as edge detection input. Thereby the
expected phase range of the rising edge of the RX input signal rb(t) is later and matches with the
actual edge position. Consequently no DOWN signals are generated anymore and phase lock is
established.
143
Figure 6-28. Clock Recovery with Average Phase Offset -Tsysclk/2 and with 2nd MSB = ’0’
48MHz system clock
Recovered sample clock
RX input signal rb(t)
rpos(t)
b’(t)
Sampled RX signal
Edge detection input
rneg(t)
DOWN
2 MSBs of filter ‚00' or ‚10' ‚01' or ‚11'
expectedphase range
expectedphase range
6.2.3.5 Sampling Clock Phase Accuracy
The sampling clock phase can obviously be adjusted with a granularity of half the system clock
period. That means that the maximum phase deviation of the DPLL from the optimal sample
clock phase is given by
T∆Tsysclk 2⁄
2-----------------------± 1
4 48MHz×---------------------------- 5.208 ns±= = = Eq. 6-27.
With the EPM sampling clock frequency of 24 MHz the maximum relative sample clock phase
deviation of the DPLL is given by
Θ T∆Tchip------------
24MHz4 48× MHz---------------------------- 12.5%.±=±=±= Eq. 6-28.
144
Considering that the introduced EPM(5,12,1/3,1) scheme allows a maximum sample clock
deviation of Tmax∆ 12.675 ns±= respectively a maximum relative deviation of Θmax 30%±=
(see Section 6.1.3.2), one can see that the proposed clock recovery method fulfills obviously our
requirements for EPM.
6.2.4 Framing Structure for EPM
In order to transmit payload data (e.g. an IrLAP frame according to the IrDA standard) over the
wireless infrared channel in a secure manner, it needs to be packed into a frame that consists of
a preamble PA, a start flag STA, the payload data itself, Flush bits FB, a CRC field, a stop flag
STO and a NULL field [1][2].
The preamble is necessary for phase synchronization at the receiver. It should have enough ’0’
to ’1’ transitions, so that the DPLL at the receiver can achieve its phase-lock, and it should have
the same average duty cycle as the RLL code. We define the preamble PA for EPM as the
concatenation of ten times the 72-chip preamble period PP.
PP = [100000000 000100000 000100000 000000100 000000100 000100000 100000000]
PA = [PP PP PP PP PP PP PP PP PP PP]
The start and stop flags are necessary to indicate the beginning and the end of the frame. In order
to distinguish these flags from payload data we use a sequence that cannot be generated by the
RLL(5,12) encoder. By using such “illegal” sequences we can avoid bit or character stuffing as
it is necessary at the RZI modulation technique. The start and stop flags are given by:
STA = [000001000 000000000 100000000 000100000 010000001 000000000 000100000
000000100 000001000 000000000 100000000 000100000 010000001 000000000 000100000
000000100]
STO = [000001000 000000000 100000000 000100000 010000001 000000000 000100000
000000100 000001000 000000000 100000000 000100000 010000001 000000000 000100000
000000100]
145
The CRC (cyclic redundancy check) field is used for error detection at the receiver. Here we
propose to use the same 32-bit CRC code as it is specified for FIR and VFIR in the IrDA standard
[1].
The flush bits FB are necessary to flush the RLL(5,12) decoder at the receiver, so that the
payload data and the CRC field can be completely decoded. For that 4 flush bits are required,
which we define as
FB = [0000].
The NULL field is used to enforce a pause between two consecutive frames, so that the receiver
does not get a data overflow. It can also be used as end of frame detection, if the receiver did not
recognize the STO flag. The NULL field is defined as:
NULL = [000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000].
Figure 6-29 shows the complete frame generation process. It indicates that only the payload
data, the CRC field and the flush bits are fed through the RLL(5,12) encoder.
Figure 6-29.
Stop FlagStart FlagPreamble
TX Frame
IrLAP Frame + CRC32
IrLAP Frame + CRC32
FB appending
RLL(5,12) encoded TX Frame Null Flag
TX Signal with extended pulses
Pulse extension
RLL(5,12) encoding andflag appending
FB
EPM modulation and packet Generation Flow
146
6.3 HW Prototype and Measurements Results
In order to verify the functionality of EPM(5,12,1/3,1) a hardware prototype has been build up.
This section describes the prototype itself and the measurement results that have been achieved.
6.3.1 HW Prototype Implementation
Figure 6-30 describes the FPGA board that has been used for the prototype implementation of
the EPM(5,12,1/3,1) modulation scheme. The main components are the infrared transceiver,
which is compliant to the IrDA’s FIR standard, and the Xilinx FPGA, which comprises the
infrared controller with the EPM modulation and demodulation as described in Section 6.2.2.
Figure 6-30. FPGA Board Description
In order to control the FPGA board it has been plugged on an ARM7 evaluation board as shown
in Figure 6-31. On the ARM7 the hardware abstraction layer (HAL) and the lower layers of the
IrDA protocol stack are implemented, so that two prototype boards are able to establish a
connection and exchange data.
147
Figure 6-31. Piggyback Prototype with FPGA Board and ARM7 Evaluation Board
The prototype is describe in more detail in [59] and the implemented SW is described in [60].
6.3.2 Measured Eye Diagrams after Quantization
The first goal of the prototype was to verify the eye diagram simulation results of Section 6.1.3.
For that the measuring setup with an oscilloscope as shown in Figure 6-32 has been established.
Figure 6-32. Measuring Setup for Eye Diagram Measuring
FPGAwith IR
Controller
Prototype board B
Transmitter
Receiver
Oscilloscope
FPGA
with IR
Controller
Prototype board A
RX
TX
RX
TX
d
ϕ
Figure 6-33 to 6-35 show the measurement results for different distances d and different angles
ϕ . Obviously the simulation results are basically confirmed by the eye diagrams that has been
148
measured with an oscilloscope. In particular it is of interest that the trailing edges of the pulses
show much more jitter than the leading edges. Here the fact is of benefit that the EPM
demodulation is only sensitive on the trailing edges.
Figure 6-33. Eye Diagram after Quantization at d = 5cm, phi = 0°
Figure 6-34. Eye Diagram after Quantization at d = 10 cm, phi = 30°
6.3.3 Measured Frame Processing
The second goal of the prototype was to verify whether the infrared controller with the novel
DPLL is able to demodulate the received signals that have been measured above. For that the
measuring setup with a logic analyzer as shown in Figure 6-36 has been established. Table 6-3
describes the corresponding signals that have been measured by the logic analyzer.
149
Figure 6-35. Eye Diagram after Quantization at d = 100 cm, phi = 0°
Figure 6-36. Measuring Setup for Frame Processing Measuring
FPGAwith IR
Controller
Prototype board B
Transmitter Receiver
RX
TXFPGAwith IR
Controller
Prototype board A
TX
RX
Logic Analyzer
Con
nect
or fr
ame
Table 6-3. Description of Measured SignalsTX The frame sent by the board A, measured at the transceiver
RX The received signal measured at the transceiver of board B
RX_DELAYED The received signal from the transceiver looped through the FPGA
REC_EN_PULSE The recovered enable pulse signal from the DPLL
RX_SAMPLED The received signal sampled with rec_en_pulse
RX_EDGE The sampled signal after the edge detection
STARTFLAG Indicates the reception of a valid startflag
STOPFLAG Indicates the reception of a valid stopflag
DATAVALID Strobes for each decoded data bit
150
Figure 6-37 shows the measurement results for the transmission and demodulation of the byte
0x5952. It can be seen that the byte has been correctly demodulated and therefore the full
functionality of the EPM modulation technique has been verified on hardware.
Figure 6-37. Measurement Results of Logic Analyzer
LASTDATA Indicates the last decoded data bit
RX_DECODED The decoded user-data+crc
151
7 Conclusion and Outlook
This thesis investigated various modulation techniques that are appropriate for mobile, short-
range, point to point and low cost infrared data interconnection applications. In particular the
novel Edge Position Modulation with Run-Length-Limited coding has been introduced, which
is a consequent further development of the existing methods. The evaluation criteria of the
modulation techniques were the bandwidth efficiency, the power efficiency, and the
transmission reliability.
The achievable bit rate of infrared communications systems is mainly limited by the bandwidth
of the infrared transceivers, thus the bandwidth efficiency is a major criterion of the modulation
techniques. We showed that certain EPM variants offer a significantly increased bandwidth
efficiency over existing methods. For example by using EPM(5,12,1/3,1) in combination with a
FIR infrared transceiver, which has a specified bandwidth of 8 MHz, one could achieve a bit rate
of 8 Mbit/s in contrary to HHH(1,13) that would enable only a bit rate of 5.33 Mbit/s with a FIR
transceiver.
But EPM excels not only with superior bandwidth efficiency, but also with an excellent power
efficiency as proven in this thesis. This is in particular of importance, since mobile devices are
usually battery powered and therefore power efficiency is a key requirement for our type of
applications.
The transmission reliability mainly depends on the capability of the modulation technique to
adapt the signal to the wireless infrared channel in a way that allows demodulation at the receiver
with a low bit error rate. Therefore a linear baseband model of the wireless infrared channel had
been derived in this thesis and then the various modulation schemes were applied to this model.
The thesis revealed the strengths and weaknesses of the different methods and showed that EPM
can guarantee a reliable transmission, since it can easily be optimized for the wireless infrared
channel. However, EPM requires at the receiver a phase recovery with a fairly high granularity,
what is the only major drawback of this novel modulation technique. But this thesis presented
153
also a DPLL that can provide the required granularity without the need of a higher system clock
of the receiver logic.
Table 7-1 provides a comparison of the currently used modulation techniques with the
introduced EPM(5,12,1/3,1) variant, and thereby gives a summary of the key findings of this
thesis.
Table 7-1. Summary of Evaluation Parameters
Modulation scheme 1/4-RZI 4-PPM HHH(1,13) EPM(5,12,1/3,1)
Bandwidth efficiency 0.25 0.5 0.667 1
Bit rate with Tpulse = 125 ns 2 Mbit/s 4 Mbit/s 5.33 Mbit/s 8 Mbit/s
Power efficiency 2 2 2.584 3.448
Quantization error probabil-ity under worst case condi-tions
5.50E-80 6.04E-110 4.46E-71 1.96E-89
Sample clock frequency 2 MHz 8 MHz 8 MHz 24 MHz
Maximum absolute sample clock phase deviation
53.33 ns± 56.07 ns± 53.59 ns± 12.67 ns±
Maximum relative sample clock phase deviation
10.7%± 45%± 43%± 30%±
Maximum sequence length without ’0’ to ’1’ transitions
∞ 6 13 12
Finally this thesis has shown that EPM(5,12,1/3,1) could be very easily integrated into IrDA
compliant communication systems, since it is basically transparent for the infrared transceiver
and the IrDA SW protocol stack.
In order to give an outlook we want to refer to the latest development at IrDA. In [61] and [62]
the IrDA community has proposed a new standard called Ultra Fast Infrared (UFIR). This new
standard is supposed to support a data rate of 100 Mbit/s and shall therefore be a significant
improvement compared to VFIR (16 Mbit/s). This improvement shall be mainly achieved by an
enhanced infrared transceiver, but UFIR shall also use the faster 8B10B modulation code [63].
This modulation technique has a bandwidth efficiency of 8/10, which is better than the efficiency
of HHH(1,13), but is still worse than the bandwidth efficiency of EPM(5,12,1/3,1). However,
one would have to analyze how good EPM fits to the new infrared transceivers. This could be
subject of further investigations on EPM.
154
A RLL(5,12) Generation
This appendix describes the generation of the novel 1/3-rate RLL(5,12) code that has been
presented in Section 6.1 on page 117ff. The generation is done according to the sliding block
code algorithm, which has been provided by Adler et al. in [53] and briefly introduced in
Section 5.2.3 on page 105 of this work.
A.1 Encoder Generation
The state transition matrix D of an RLL(5,12) code is according to Equation 5-7 given by
D
0 1 0 0 0 0 0 0 0 0 0 0 00 0 1 0 0 0 0 0 0 0 0 0 00 0 0 1 0 0 0 0 0 0 0 0 00 0 0 0 1 0 0 0 0 0 0 0 00 0 0 0 0 1 0 0 0 0 0 0 01 0 0 0 0 0 1 0 0 0 0 0 01 0 0 0 0 0 0 1 0 0 0 0 01 0 0 0 0 0 0 0 1 0 0 0 01 0 0 0 0 0 0 0 0 1 0 0 01 0 0 0 0 0 0 0 0 0 1 0 01 0 0 0 0 0 0 0 0 0 0 1 00 0 0 0 0 0 0 0 0 0 0 0 10 0 0 0 0 0 0 0 0 0 0 0 0
,= Eq. A-1.
155
and the corresponding matrix D3, which we need for the 1/3-rate code, can be derived as
D3
0 0 0 1 0 0 0 0 0 0 0 0 00 0 0 0 1 0 0 0 0 0 0 0 00 0 0 0 0 1 0 0 0 0 0 0 01 0 0 0 0 0 1 0 0 0 0 0 01 1 0 0 0 0 0 1 0 0 0 0 01 1 1 0 0 0 0 0 1 0 0 0 01 1 1 0 0 0 0 0 0 1 0 0 01 1 1 0 0 0 0 0 0 0 1 0 01 1 1 0 0 0 0 0 0 0 0 1 01 1 1 0 0 0 0 0 0 0 0 0 11 1 1 0 0 0 0 0 0 0 0 0 00 1 1 0 0 0 0 0 0 0 0 0 00 0 1 0 0 0 0 0 0 0 0 0 0
.= Eq. A-2.
The matrix D3 can also be written down in a state transition table as shown in Table A-1,
whereby the alphabet AD2 = 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 represents the thirteen states.
Table A-1. State Transition Table D3
ζk ζk 1+
1 4
2 5
3 6
4 1 7
5 1 2 8
6 1 2 3 9
7 1 2 3 10
8 1 2 3 11
9 1 2 3 12
10 1 2 3 13
11 1 2 3
12 2 3
13 3
156
An approximate characteristic vector for D3 can be derived as
v 3 4 5 6 8 10 9 9 8 6 6 4 1, , , , , , , , , , , ,( )T= Eq. A-3.
and therefore we modify the state transition table as shown in Table A-2, whereby the offspring
states of a parent state i are written down as i1 vi,
. E.g. the term 21,4 represents the offspring states
21, 22, 23 and 24.
Table A-2. Splitting Step 0
ζk ζk 1+
1 = 11,3 41,6
2 = 21,4 51,8
3 = 31,5 61,10
4 = 41,6 11,3 71,9
5 = 51,8 11,3 21,4 81,9
6 = 61,10 11,3 21,4 31,5 91,8
7 = 71,9 11,3 21,4 31,5 101,6
8 = 81,9 11,3 21,4 31,5 111,6
9 = 91,8 11,3 21,4 31,5 121,4
10 = 101,6 11,3 21,4 31,5 131
11 = 111,6 11,3 21,4 31,5
12 = 121,4 21,4 31,5
13 = 131 31,5
In order to assign two dedicated successor states to each state we apply now the splitting
algorithm provided by Adler et al. in [53] as shown in Table A-3 to A-6. At each step the parent
states are of the form ij,k having weight vij k, k j– 1+= . Their offspring become symbols of the
form ij' k, ' , where j j'≤ , k' k≤ , having weight k' j'– 1+ . In addition ij j, is abbreviated by ij .
Table A-3. Splitting Step 1
ζk ζk 1+
11,3 41,6
21,4 51,6 57,8
31,5 61,4 65,6 67,10
41,6 11,3 71,4 75,6 77,9
51,6 11,3 81,4 85,6 87,9
157
ζk ζk 1+
Table A-4. Splitting Step 2
ζk ζk 1+
11,3 41,3 44,5 46
21,3 51,3 54,5 56
24 57,8
31,2 61,4
33 65,6
34,5 67,8 69 610
41,3 11,3 77,8 79
44,5 71,4
46 75,6
51,3 11,3 87,8 89
54,5 81,4
56 85,6
123,4, 115,6, 105,6, 95,6, 85,6, 75,6, 65,6, 57,8 21,3 24
111,4, 101,4, 91,4, 81,4, 71,4, 61,4 11,3 31,2 33 34,5
67,8 91,4
69 95,6
610 97 98
77,8 101,4
79 105,6
87,8 111,4
89 115,6
97 121,2
98 123,4
121,2 31,2 (33) 34,5
123,4, 115,6, 105,6, 95,6, 85,6, 75,6, 65,6, 57,8 21,4
111,4, 101,4, 91,4, 81,4, 71,4, 61,4 11,3 31,5
67,10 91,4 95,6 97,8
77,9 101,4 105,6
87,9 111,4 115,6
97,8 121,2 123,4
121,2 31,5
158
Table A-5. Splitting Step 3
ζk ζk 1+
11,2 41,2 43 46
13 44,5
21,2 51,2 53 56
23 54,5
24 57,8
31,2 61,2 63 64
33 65,6
34 67,8
35 69 610
41,2 11,2 13 79
43 77,8
44,5 71,2 73 74
46 75,6
51,2 11,2 13 89
53 87,8
54,5 81,2 83 84
56 85,6
123,4, 115,6, 105,6, 95,6, 85,6, 75,6, 65,6, 57,8 21,2 23 24
111,2, 101,2, 91,2, 81,2, 71,2, 61,2 11,2 13 33
121, 113, 103, 93, 83, 73, 63 31,2
122, 114, 104, 94, 84, 74, 64 34 35
67,8 91,2 93 94
69 95,6
610 97 98
77,8 101,2 103 104
79 105,6
87,8 111,2 113 114
89 115,6
97 121 122
98 123,4
Table A-6. Splitting Step 4
ζk ζk 1+
11 41 42
12 43 46
13 44 45
159
ζk ζk 1+
21 51 52
22 53 56
23 54 55
24 57 58
31 61 62
32 63 64
33 65 66
34 67 68
35 69 610
111, 101, 91, 81, 71, 61, 51, 41 11 12
42 13 79
43 77 78
44 71 72
45 73 74
46 75 76
52 13 89
53 87 88
54 81 82
55 83 84
56 85 86
123, 115, 105, 95, 85, 75, 65, 57 21 22
124, 116, 106, 96, 86, 76, 66, 58 23 24
112, 102, 92, 82, 72, 62 13 33
121, 113, 103, 93, 83, 73, 63 31 32
122, 114, 104, 94, 84, 74, 64 34 35
67 91 92
68 93 94
69 95 96
610 97 98
77 101 102
78 103 104
79 105 106
87 111 112
88 113 114
89 115 116
97 121 122
98 123 124
160
With the following mapping of states to output values
ϑ i( )
001 , i 11 12 13, , ∈
010 , i 21 22 23 24, , , ∈
100 , i 31 32 33 34 35, , , , ∈000 , else
,
= Eq. A-4.
the encoding table can be then derived as
Table A-7. Encoding Table
αk 0= αk 1=
ζk ζk 1+ βk ζk 1+ βk11 41 000 42 000
12 46 000 43 000
13 44 000 45 000
21 51 000 52 000
22 56 000 53 000
23 54 000 55 000
24 57 000 58 000
31 61 000 62 000
32 63 000 64 000
33 65 000 66 000
34 67 000 68 000
35 69 000 610 000
111, 101, 91, 81, 71, 61, 51, 41 11 001 12 001
42 79 000 13 001
43 77 000 78 000
44 71 000 72 000
45 73 000 74 000
46 75 000 76 000
52 89 000 13 001
53 87 000 88 000
54 81 000 82 000
55 83 000 84 000
56 85 000 86 000
123, 115, 105, 95, 85, 75, 65, 57 21 010 22 010
161
αk 0= αk 1=
ζk ζk 1+ βk ζk 1+ βk
Note that the assignment of the successor states to the input values αk 0= and αk 1= is done
in that way so that the decoder has minimized complexity as we will see below in Section A.2.
By merging the states of the encoding table, which have the same successor states and result in
the same output values βk , the complexity of the encoder can be reduced as shown in Table A-
8 to A-11.
Table A-8. First Reduction of Encoding Table
αk 0= αk 1=
ζk ζk 1+ βk ζk 1+ βk
124, 116, 106, 96, 86, 76, 66, 58 23 010 24 010
112, 102, 92, 82, 72, 62 33 100 13 001
121, 113, 103, 93, 83, 73, 63 31 100 32 100
122, 114, 104, 94, 84, 74, 64 34 100 35 100
67 91 000 92 000
68 93 000 94 000
69 95 000 96 000
610 98 000 97 000
77 101 000 102 000
78 103 000 104 000
79 105 000 106 000
87 111 000 112 000
88 113 000 114 000
89 115 000 116 000
97 121 000 122 000
98 123 000 124 000
11 41 000 42 000
12 46 000 43 000
13 44 000 45 000
21 41 000 52 000
22 56 000 53 000
23 54 000 55 000
98, 89, 79, 69, 56, 46, 33, 24 57 000 58 000
87, 77, 67, 54, 44, 31 41 000 62 000
162
αk 0= αk 1=
ζk ζk 1+ βk ζk 1+ βk
Table A-9. Second Reduction of Encoding Table
αk 0= αk 1=
ζk ζk 1+ βk ζk 1+ βk11 41 000 42 000
12 24 000 43 000
53, 43, 34, 23, 13 31 000 32 000
21 41 000 52 000
22 24 000 53 000
24 57 000 58 000
31 41 000 62 000
32 63 000 64 000
35 24 000 610 000
41 11 001 12 001
52, 42 24 000 13 001
57 21 010 22 010
58 23 010 24 010
62 24 100 13 001
63 31 100 32 100
64 34 100 35 100
610 24 000 32 000
97, 88, 78, 68, 55, 45, 32 63 000 64 000
34 67 000 68 000
35 69 000 610 000
41 11 001 12 001
42 79 000 13 001
43 77 000 78 000
52 89 000 13 001
53 87 000 88 000
57 21 010 22 010
58 23 010 24 010
62 33 100 13 001
63 31 100 32 100
64 34 100 35 100
610 98 000 97 000
163
Table A-10. Third Reduction of Encoding Table
αk 0= αk 1=
ζk ζk 1+ βk ζk 1+ βk21, 11 41 000 42 000
22, 12 24 000 13 000
13 31 000 32 000
24 57 000 58 000
31 41 000 62 000
32 63 000 64 000
35 24 000 610 000
41 11 001 12 001
42 24 000 13 001
57 21 010 22 010
58 13 010 24 010
62 24 100 13 001
63 31 100 32 100
64 13 100 35 100
610 24 000 32 000
Table A-11. Forth Reduction of Encoding Table
αk 0= αk 1=
ζk ζk 1+ βk ζk 1+ βk11 41 000 42 000
12 24 000 13 000
13 31 000 32 000
24 57 000 58 000
31 41 000 62 000
32 63 000 64 000
35 24 000 610 000
41 11 001 12 001
42 24 000 13 001
57 11 010 12 010
58 13 010 24 010
62 24 100 13 001
63 31 100 32 100
64 13 100 35 100
610 24 000 32 000
164
By introducing binary values one can derive from Table A-11 the encoder truth table for the
encoder logic as shown in Table A-12.
Table A-12. Encoder Truth Table
αk 0= αk 1=
ζk ζk 1+ βk ζk 1+ βk11 = 0000 0111 000 1000 000
12 = 0001 0011 000 0010 000
13 = 0010 0100 000 0101 000
24 = 0011 1001 000 1010 000
31 = 0100 0111 000 1011 000
32 = 0101 1100 000 1101 000
35 = 0110 0011 000 1110 000
41 = 0111 0000 001 0001 001
42 = 1000 0011 000 0010 001
57 = 1001 0000 010 0001 010
58 = 1010 0010 010 0011 010
62 = 1011 0011 100 0010 001
63 = 1100 0100 100 0101 100
64 = 1101 0010 100 0110 100
610 = 1110 0011 000 0101 000
From the encoder truth table one can easily derive the encoder state machine as described in
Section 6.1.1.
A.2 Decoder Generation
The decoding table as shown in Table A-13 can be derived by using the unreduced encoder table
provided in Table A-7 and the mapping of states to output values of Equation A-4. For the
generation of the decoding table we make use of the fact that an incoming symbol ’100’
corresponds to the states 11, 12 or 13, a symbol ’010’ to 21, 22, 23 or 24, and a symbol ’001’ to
31, 32, 33, 34 or 35. With this knowledge one can determine with at least five incoming symbols
the state ζk and thereby the decoded value αk .
165
Table A-13. Decoding Table
βk βk 1+ βk 2+ βk 3+ βk 4+ ζk ζk 1+ ζk 2+ ζk 3+ ζk 4+ αk000 000 000 001 000 43
5377
87101,2
111,211,3
11,31
000 000 000 010 000 42
52
610
79
89
98
105,6
115,6
123,4
21,4
21,4
21,4
1
000 000 000 100 000 43
53
610
77,8
87,8
97
102,4
112,4
121,2
31,5
31,5
31,5
1
000 000 001 44
54
67
77
87
71,2
81,2
91,2
101,2
111,2
11,3
11,3
11,3
11,3
11,3
0
000 000 010 46
56
69
79
89
98
75,6
85,6
95,6
105,6
115,6
123,4
21,4
21,4
21,4
21,4
21,4
21,4
0
000 000 100 000 000 45
55
68
78
88
97
74
84
94
104
114
122
34,5
34,5
34,5
34,5
34,5
34,5
67,10
67,10
67,10
67,10
67,10
67,10
91,8
91,8
91,8
91,8
91,8
91,8
1
000 000 100 000 001 45
55
68
78
88
97
73
83
93
103
113
121
31
31
31
31
31
31
61,2
61,2
61,2
61,2
61,2
61,2
11,3
11,3
11,3
11,3
11,3
11,3
1
000 000 100 000 010 44
54
67
77
87
72
82
92
102
112
33
33
33
33
33
65,6
65,6
65,6
65,6
65,6
21,4
21,4
21,4
21,4
21,4
0
000 000 100 000 100 45
55
68
78
88
97
73
83
93
103
113
121
31,2
31,2
31,2
31,2
31,2
31,2
62,4
62,4
62,4
62,4
62,4
62,4
31,5
31,5
31,5
31,5
31,5
31,5
1
000 001 000 000 000 41
51
61
71
81
91
101
111
11,2
11,2
11,2
11,2
11,2
11,2
11,2
11,2
42,3
42,3
42,3
42,3
42,3
42,3
42,3
42,3
77,9
77,9
77,9
77,9
77,9
77,9
77,9
77,9
101,6
101,6
101,6
101,6
101,6
101,6
101,6
101,6
0
166
βk βk 1+ βk 2+ βk 3+ βk 4+ ζk ζk 1+ ζk 2+ ζk 3+ ζk 4+ αk000 001 000 000 001 42
52
62
72
82
92
102
112
13
13
13
13
13
13
13
13
44
44
44
44
44
44
44
44
71,2
71,2
71,2
71,2
71,2
71,2
71,2
71,2
11,3
11,3
11,3
11,3
11,3
11,3
11,3
11,3
1
000 001 000 000 010 41
51
61
71
81
91
101
111
12
12
12
12
12
12
12
12
46
46
46
46
46
46
46
46
75,6
75,6
75,6
75,6
75,6
75,6
75,6
75,6
21,4
21,4
21,4
21,4
21,4
21,4
21,4
21,4
0
000 001 000 000 100 42
52
62
72
82
92
102
112
13
13
13
13
13
13
13
13
44,5
44,5
44,5
44,5
44,5
44,5
44,5
44,5
72,4
72,4
72,4
72,4
72,4
72,4
72,4
72,4
31,5
31,5
31,5
31,5
31,5
31,5
31,5
31,5
1
000 001 000 001 41
51
61
71
81
91
101
111
11
11
11
11
11
11
11
11
41,2
41,2
41,2
41,2
41,2
41,2
41,2
41,2
11,3
11,3
11,3
11,3
11,3
11,3
11,3
11,3
0
000 010 000 000 000 57
65
75
85
95
105
115
123
21,2
21,2
21,2
21,2
21,2
21,2
21,2
21,2
52,3
52,3
52,3
52,3
52,3
52,3
52,3
52,3
87,9
87,9
87,9
87,9
87,9
87,9
87,9
87,9
111,6
111,6
111,6
111,6
111,6
111,6
111,6
111,6
0
000 010 000 000 001 58
66
76
86
96
106
116
124
23
23
23
23
23
23
23
23
54
54
54
54
54
54
54
54
81,2
81,2
81,2
81,2
81,2
81,2
81,2
81,2
11,3
11,3
11,3
11,3
11,3
11,3
11,3
11,3
1
167
βk βk 1+ βk 2+ βk 3+ βk 4+ ζk ζk 1+ ζk 2+ ζk 3+ ζk 4+ αk000 010 000 000 010 57
65
75
85
95
105
115
123
22
22
22
22
22
22
22
22
56
56
56
56
56
56
56
56
85,6
85,6
85,6
85,6
85,6
85,6
85,6
85,6
21,4
21,4
21,4
21,4
21,4
21,4
21,4
21,4
0
000 010 000 000 100 58
66
76
86
96
106
116
124
23
23
23
23
23
23
23
23
54,5
54,5
54,5
54,5
54,5
54,5
54,5
54,5
82,4
82,4
82,4
82,4
82,4
82,4
82,4
82,4
31,5
31,5
31,5
31,5
31,5
31,5
31,5
31,5
1
000 010 000 001 57
65
75
85
95
105
115
123
21
21
21
21
21
21
21
21
51,2
51,2
51,2
51,2
51,2
51,2
51,2
51,2
11,3
11,3
11,3
11,3
11,3
11,3
11,3
11,3
0
000 010 000 010 58
66
76
86
96
106
116
124
24
24
24
24
24
24
24
24
57,8
57,8
57,8
57,8
57,8
57,8
57,8
57,8
21,4
21,4
21,4
21,4
21,4
21,4
21,4
21,4
1
000 100 000 000 64
74
84
94
104
114
122
34,5
34,5
34,5
34,5
34,5
34,5
34,5
67,10
67,10
67,10
67,10
67,10
67,10
67,10
91,8
91,8
91,8
91,8
91,8
91,8
91,8
1
000 100 000 001 63
73
83
93
103
113
121
31
31
31
31
31
31
31
61,2
61,2
61,2
61,2
61,2
61,2
61,2
11,3
11,3
11,3
11,3
11,3
11,3
11,3
0
000 100 000 010 62
72
82
92
102
112
33
33
33
33
33
33
65,6
65,6
65,6
65,6
65,6
65,6
21,4
21,4
21,4
21,4
21,4
21,4
1
168
βk βk 1+ βk 2+ βk 3+ βk 4+ ζk ζk 1+ ζk 2+ ζk 3+ ζk 4+ αk
From the decoding table one can easily derive the finite look-ahead but state independent
decoder as described in Section 6.1.2.
000 100 000 100 63
73
83
93
103
113
121
31,2
31,2
31,2
31,2
31,2
31,2
31,2
62,4
62,4
62,4
62,4
62,4
62,4
62,4
31,5
31,5
31,5
31,5
31,5
31,5
31,5
0
001 000 000 000 001 12 43 77 101,2 11,3 1
001 000 000 000 010 11 42 79 105,6 21,4 0
001 000 000 000 100 12 43 77,8 102,4 31,5 1
001 000 000 001 13 44 71,2 11,3 1
001 000 000 010 12 46 75,6 21,4 1
001 000 000 100 13 44,5 72,4 31,5 1
001 000 001 11 41,2 11,3 0
010 000 000 000 001 22 53 87 111,2 11,3 1
010 000 000 000 010 21 52 89 115,6 21,4 0
010 000 000 000 100 22 53 87,8 112,4 31,5 1
010 000 000 001 23 54 81,2 11,3 0
010 000 000 010 22 56 85,6 21,4 1
010 000 000 100 23 54,5 82,4 31,5 0
010 000 001 21 51,2 11,3 0
010 000 010 24 57,8 21,4 1
100 000 000 000 35 610 97,8 121,4 1
100 000 000 001 34 67 91,2 11,3 0
100 000 000 010 35 69 95,6 21,4 1
100 000 000 100 34 67,8 92,4 31,5 0
100 000 001 31 61,2 11,3 0
100 000 010 33 65,6 21,4 0
100 000 100 000 000 32 64 34,5 67,10 91,8 1
100 000 100 000 001 32 63 31 61,2 11,3 1
100 000 100 000 010 31 62 33 65,6 21,4 0
100 000 100 000 100 32 63 31,2 62,4 31,5 1
169
Bibliography
[1] Infrared Data Association, Serial Infrared Physical Layer Specification, Version 1.4, May 2001.
[2] A.S. Tanenbaum, Computer Networks, 3rd edition, Prentice Hall, 2000.
[3] R. Latuske, "USB (Universal Serial Bus), IEEE1394 (Firewire), IrDA (Infrared Data Association) und Bluetooth für embedded Systeme", ARS Software GmbH, Munich, 2000, in German.
[4] USB Implementers Forum, Inc., Universal Serial Bus Specification, Revision 2.0, 2000.
[5] Bluetooth, Specification of the Bluetooth System (Volume 1, Core), v1.0 B, 1999.
[6] Infrared Data Association, Serial Infrared Link Access Protocol (IrLAP), Version 1.1, June 1996.
[7] T. Lüftner, C. Kröpl, M. Huemer, J. Hausner, R. Hagelauer, R. Weigel, "Edge-position modulation for high-speed wireless infrared communications", IEE Proceedings on Optoelectronics, Vol. 150, No. 5, pp. 427-437, October 2003.
[8] T. Lüftner, M. Huemer, J. Hausner, R. Hagelauer, R. Weigel, "Wireless infrared commu-nication system based on Edge Position Modulation with novel RLL(5,12) code", Con-ference Proceedings - 6th European Conference on Wireless Technology, pp. 333-336, October 2003.
[9] T. Lüftner, M. Huemer, C. Kröpl, J. Hausner, R. Hagelauer, R. Weigel, "Wireless infrared communication system based on Edge Position Modulation", OVE Verbandszeitschrift E&I - elekrotechnik und informationstechnik , Heft 7/8.2003, pp. 251-255, Springer Wien New York, Juli/August 2003.
[10] T. Lüftner, C. Kröpl, M. Huemer, R. Weigel, R. Hagelauer, J. Hausner, "Wireless infrared Communications with Edge Position Modulation for mobile devices", IEEE Wireless Communications - Optical Wireless Communications, Vol. 10, No. 2, pp. 15-21, April 2003.
171
[11] T. Lüftner, Verfahren und System zur Übertragung binärer Datenfolgen mit Hilfe eines Pulsflanken-Positions-Modulationsverfahrens, German Patent No. DE 10310129 B3, Assignee: Infineon Technology AG, October 14th, 2004, in German.
[12] Infrared Data Association, IrDA Link Management Protocol (IrLMP), Version 1.1, Janu-ary 1996.
[13] Infrared Data Association, Tiny TP: A Flow-Control Mechanism for use with IrLMP, Ver-sion 1.1, October 1996.
[14] Infrared Data Association, IrDA Object Exchange Protocol (IrOBEX), Version 1.2, March 1999.
[15] Vishay, TFDU8108 - Very Fast Infrared Transceiver Module (VFIR, 16 Mbit/s), Datasheet, Rev. 1.3, November 2003, downloaded from www.vishay.com.
[16] Agilent Technologies, Agilent HSDL-3603 - IrDA Data Compliant 4 Mbit/s Infrared Transceiver, Datasheet, December 2003, downloaded from www.agilent.com/semicon-ductors.
[17] R. Otte, L.P. de Jong, A.H.M. van Roermund, Low-Power Wireless Infrared Communica-tions, Kluwer Academic Publishers, 1999.
[18] A.G. Bell, "On the Production and Reproduction of Sound by Light", Proc. Amer. Assoc. for the Advancement of Science, vol. 29, 1880.
[19] F.R. Gfeller, U. Bapst, "Wireless In-House Data Communication via Diffuse Infrared Radiation", Proceedings of the IEEE, Vol. 67, No. 11, pp. 1474-1486, November 1979.
[20] P.D. Brown, L.S. Moore, D.C. York, Low Power Optical Transceiver for Portable Com-puting Devices, U.S. Patent No. 5,075,792, Assignee: Hewlett-Packard Company, December 24, 1991.
[21] Infrared Data Association, Serial Infrared (SIR) Physical Layer Link Specification, Ver-sion 1.0, April 27, 1994.
[22] International Organisation for Standardisation (ISO), High Level Data Link Control (HDLC) Procedures - Elements of Procedures, ISO/IEC 4335, September 15, 1991.
[23] T.F. Williams, P.D. Hortensius and F. Novak, Proposal for Infrared Data Association Serial Infrared Link Protocol Specification, Version 1.0, IBM Corporation, August 27, 1993.
172
[24] Infrared Data Association, Serial Infrared Link Access Protocol (IrLAP), Version 1.0, June 23, 1994.
[25] S. Williams, I. Millar, The IrDA Platform, HP Laboratories, Bristol, 1995, downloaded from www.hpl.hp.com/techreports/95/.
[26] J.R. Barry, Wireless Infrared Communications, Kluwer Academic Publishers, 1994.
[27] J.M. Kahn, J.R. Barry, "Wireless Infrared Communications", Proceedings of the IEEE, Vol. 85, No. 2, pp. 265-298, February 1997.
[28] Agilent Technologies, Agilent IrDA Data Link Design Guide, 2002, downloaded from http://www.agilent.com/view/ir.
[29] M.D. Audeh, J.M. Kahn, J.R. Barry, "Decision-Feedback Equalization of Pulse-Position Modulation on Measured Non-Directed Indoor Infrared Channels", IEEE Transaction on Communications, Vol. 47, No. 4, pp. 500-503, April 1999.
[30] International Organisation for Standardisation (ISO), Information technology - Open Sys-tems Interconnection - Data link serivce definition, International standard, Second Edi-tion, Reference number ISO/IEC 8886:1996(E), September 15th 1996.
[31] IBM Corporation, IBM31TFIRC Infrared Communications Controller Macro Data Sheet, Data sheet, Release 2.7, April 1998.
[32] M. Huemer, T. Lüftner, J. Hausner, "A highly integrated single chip baseband IC for 2.5th generation multimedia oriented mobile phones", OVE Verbandszeitschrift E&I - elekro-technik und informationstechnik , Heft 11.2002, pp. 407-410, Springer Wien New York, November 2002.
[33] W. Hirt, M. Hassner, N. Heise, "IrDA-VFIR (16 Mbit/s): Modulation Code and System Design", IEEE Personal Communications, pp. 58-71, February 2001.
[34] M.V. Klein, Optics, John Wiley & sons, New York, 1970.
[35] E. Hecht, Optics, Second Edition, Addison-Wesley Publishing Company, 1987.
[36] M. Wolf, Zur breitbandigen Infrarot-Indoorkommunikation, PhD thesis, Fakultät für Ele-ktrotechnik und Informationstechnik, Technische Universität Ilmenau, 2001, in German.
[37] C. Kröpl, Modellierung und Simulation eines Infrarot-Übertragungssystems für mobile Geräte, Diploma thesis, Institute for Communications and Information Engineering, Johannes Kepler University Linz, January 2003, in German.
173
[38] J.M. Kahn, W.J. Krause, J.B. Carruthers, "Experimental Characterization of Non-Directed Indoor Infrared Channels", IEEE Transactions on Communications, Vol. 43, No. 4, pp. 1613-1623, April 1995.
[39] V. Jungnickel, V. Pohl, S. Nönning, C. von Helmolt, "A Physical Model of the Wireless Infrared Communication Channel", IEEE Journal On Selected Areas In Communica-tions, Vol. 20, No. 3, pp. 631-640, April 2002.
[40] S.M. Sze, Physics of Semiconductor Devices, Wiley-Interscience, New York, 1981.
[41] S.M. Sze, Semiconductor Devices, Physics and Technology, 2nd Edition, John Wiley & Sons, Inc., 2001.
[42] U. Barabas, Optische Signalübertragung, R. Oldenbourg Verlag München Wien, 1993, in German.
[43] A.C. Boucouvalas, "Indoor ambient light noise and its effect on wireless optical links", IEE Proceedings on Optoelectronics, Vol. 143, pp. 334-338, December 1996.
[44] U. Tietze, Ch. Schenk, Halbleiterschaltungstechnik, Springer-Verlag, Berlin Heidelberg, 1999, in German.
[45] H.D. Lüke, Signalübertragung, 5. Auflage, Springer-Verlag, 1992, in German.
[46] G. Söder, "Impulsinterferenzen & Entzerrung", Anleitung zum Praktikum Simulation dig-italer Übertragungssysteme, Lehrstuhl für Nachrichtentechnik, Technische Universität München, October 1997, in German.
[47] I. Millar, M. Beale, B.J. Donoghue, K.W. Lindstrom, S. Williams, "The IrDA Standards for High-Speed Infrared Communications", The Hewlett-Packard Journal, Article 2, Feb-ruary 1998.
[48] B. O'Hara, A. Petrick, "IR PHY Modulation Method", 802.11 Handbook: A Designer's Companion, p.135, Standards Information Network IEEE Press, 1999.
[49] H. Uno, K. Kumatani, H. Okuhata, I. Shirakawa, T. Chiba, "A 4Mbps infrared wireless communication system dedicated to mobile computing", Proceedings of IEEE Asia Pacific Conference on Circuits and Systems ’96, pp. 334-337, Seoul, November 1996.
[50] K.A.S. Immink, "Runlength-Limited Sequences", Proceedings of the IEEE, Vol. 78, No. 11, pp. 1745-1758, November 1990.
174
[51] C.E. Shannon, "A mathematical theory of communication", Bell Syst. Techn. J., Vol. 27, pp.379-423, July 1948.
[52] R.L. Adler, M. Hassner, J.P. Moussouris, Method and apparatus for generating a noise-less sliding block code for a (1,7) channel with rate 2/3, United States Patent 4'413'251, November 1983.
[53] R.L. Adler, D. Coppersmith, M. Hassner, "Algorithms for Sliding Block Codes", IEEE Transactions on Information Theory, Vol. IT-29, No. 1, pp 5-22, January 1983.
[54] F.R. Gantmacher, The Theory of Matrices, Vol.II, Chelsea, New York, 1959.
[55] R.S. Varga, Matrix Iterative Analysis, Prentice-Hall, Englewood Cliffs, 1962.
[56] E. Seneta, Non Negative Matrices, John Wiley, New York, 1973.
[57] R.L. Adler, R.K. Brayton, B.P. Kitchens, "A Rate 1/3 (5,12) RLL Code", IBM Technical Disclosure Bulletin, Vol.27, No. 8, pp. 4722-4724, January 1985.
[58] D.W. Suvak, IrDA Serial Infrared - Link Access Protocol Specification for 16 Mbit/s Addition (VFIR), Errata to IrLAP Version 1.1., January 1999.
[59] H.C. Margiol, Analyse und Messung von Infrarotübertragung nach IrDA-Standard und Aufbau eines Testprototypen, Project seminar, Institute for Communications and Informa-tion Engineering, Johannes Kepler University Linz, February 2002, in German.
[60] H.C. Margiol, Analyse und Implementierung des IrDA-Protokolls für die Infrarotkommu-nikation, Diploma thesis, Institute for Integrated Circuits, Johannes Kepler University Linz, September 2002, in German.
[61] T. Hiramatsu, Proposed Changes to Infrared Data Association Serial Infrared Physical Layer Link Specification for UFIR (100Mbit/s) Addition, Proposal Version 0.5, August 28, 2004.
[62] Infrared Data Association, IrDA Serial Infrared Link Access Protocol Specification for 100 Mbit/s Addition (UFIR) Errata to IrLAP Version 1.1, Draft Errata Proposal, Version 0.1.0, Aug 28th , 2004.
[63] A.N. Coles, A new 8B10B block code for high speed data transmission over unshielded twisted pair channels, Hewlett-Packard Laboratories, Bristol, October 1996, downloaded from www.hpl.hp.com/techreports/96/.
175
Lebenslauf
Thomas Lüftner
A-4040 Linz, Leopold-Figl-Str. 46
Persönliche Daten
Geburtsdatum / -ort: 16.04.1975 / Linz, Oberösterreich
Staatsbürgerschaft: Österreich
Familienstand: Ledig
Werdegang
1981 bis 1989 Grundschule in Oftering und Linz
1989 bis 1994 Höhere Technische Bundeslehranstalt für Maschinenbau Linz
Reifeprüfung mit ausgezeichnetem Erfolg bestanden
10/1994 bis 06/2000 Diplom-Studium der Mechatronik
Johannes Kepler Universität Linz
Abschluss mit Auszeichnung
07/1999 bis 10/1999 Forschungsaufenthalt an der University of California, Berkeley
01/2000 bis 09/2000 Präsenzdienst beim Österreichischen Bundesheer
10/2000 bis 06/2005 Mitarbeiter bei Danube Integrated Circuits Engineering
Design Center von Infineon Technologies in Linz
10/2002 Abschluss 1. Studienabschnitt Wirtschaftswissenschaften
Johannes Kepler Universität Linz
03/2002 bis 06/2003 Lehrbeauftragter für Project Engineering
Fachhochschule Hagenberg, Oberösterreich
seit 07/2005 Mitarbeiter bei Infineon Technologies in München
177
Curriculum Vitae
Thomas Lüftner
A-4040 Linz, Leopold-Figl-Str. 46
Personal Information
Day / Place of Birth: 16.04.1975 / Linz, Austria
Nationality: Austria
Maritial Status: Single
Educational and Professional Career
1981 to 1989 Elementary school in Oftering und Linz
1989 to 1994 Higher Technical School for Mechanical Engineering in Linz
Graduation with honors
10/1994 to 06/2000 Study of Mechatronics
Johannes Kepler University, Linz
Graduation with honors
07/1999 to 10/1999 Research internship at University of California, Berkeley
01/2000 to 09/2000 Military service
10/2000 to 06/2005 Employee at Danube Integrated Circuits Engineering
Design Center of Infineon Technologies in Linz
10/2002 Degree in Economics (1. Studienabschnitt)
Johannes Kepler University Linz
03/2002 to 06/2003 Visiting lecturer for Project Engineering
Fachhochschule Hagenberg, Upperaustria
since 07/2005 Employee at Infineon Technologies in Munich, Germany
178