Skip to main content Accessibility help
×
Hostname: page-component-6bb9c88b65-dwch4 Total loading time: 0 Render date: 2025-07-25T19:35:42.786Z Has data issue: false hasContentIssue false

2 - Modulation, Coding, Equalization, Diversity

Published online by Cambridge University Press:  21 July 2025

Mainak Chowdhury
Affiliation:
Techno India College of Technology, Kolkata
Arumita Biswas
Affiliation:
Bharat Sanchar Nigam Limited, Kolkata
Get access

Summary

Introduction

Wireless communication involves transmission of messages over radio channels which are prone to noise and interference. In order to ensure reliable transmission, several processes are involved both at the transmitting and receiving end. In Chapter 1, the block diagram of a wireless communication system was explained. This chapter will focus on coding, modulation, diversity and equalization techniques.

Source Coding

The end-user generates information that has to be transmitted towards the receiver. The generated user message may contain several redundancies that can be easily omitted such that the user message still remains in understandable format. Removal of redundancies to an acceptable limit is the main function of a source encoder. This main criterion behind the source coding principle leads to two types of coding techniques, namely lossless coding and lossy coding. The former type of source coding techniques ensures that the original user message is reconstructed at the receiver end. These coding variants are also referred to as entropy coding or noiseless coding techniques. On the other hand, in the latter type, the source coding is done in such a way that at the receiver end, only an approximation of the original user message can be reconstructed.

Depending upon the code length of the source encoder output and the corresponding user message length, lossless coding can be classified into four types:

  • • Fixed-to-fixed mapping: In this technique, a fixed number of user message symbols are mapped to codeword of fixed length.

  • • Fixed-to-variable mapping: In this technique, a fixed number of user message symbols are mapped to codeword of varying length. All the symbols in the user message do not have equal probability of occurrence.

Information

Type
Chapter
Information
Wireless Communication
Theory and Applications
, pp. 37 - 135
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Book purchase

Temporarily unavailable

Accessibility standard: Unknown

Accessibility compliance for the PDF of this book is currently unknown and may be updated in the future.

Save book to Kindle

To save this book to your Kindle, first ensure no-reply@cambridge-org.demo.remotlog.com is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×