Engineering science / 12. The automated control systems on manufacture

Kulyk A.J., Krivogubtchenko S.G., Kulyk J.A.

Vinnitsa national technical university, Ukraine

An information transmission in the conditions of the adaptations of transmission information system to communication channel parameters

 

As it has been shown above, in real conditions information transfers a large|великую | role are played protective cod|coding of information. Volume of final file, and accordingly, and time of transmission essentially depend both from chosen|избрал | algorithm of the coding, and on quantity of errors which must be corrected for every code combination. During development of transfer protocol arises up exactly problems (to the choice of code algorithm with determination|definition| or with the correction of errors, and also determination|definition| quantity|quantity| of errors|mistake|, which|what| need to be corrected). The choice of parameters with a supply|припасом | often results often results in|to| the uneffective use|utillizing| of channel. Proceeding from it is expedient to develop an algorithm which|what| would allow correcting|repair| this ambiguity.

The specified problems directly linked|повязал | from time of the use of|употребления | information interchange channel. Except speed of transfer this parameter depends on length of a message of information (to volume of a file which should be transferred), lengths of the block of details what are transmitted, and quantities of errors which should be corrected:

 

 ,                                                 (1)

where tk – time of use of a communication channel, s;

Le – length of an elementary message of information, bit;

Ke – quantity of control categories which are added to an elementary message of information, bit;

Nequantity of elementary messages which make a transmitted file;

хk speed of transmission, bit/s.

The comparative analysis of algorithms of construction of elementary messages taking into account quantity of control bits is already considered above. For modern transfer information system, which|what| is built on the base of microprocessor means, the most widespread formats for protective |codings is the byte or half-byte. The quantity|quantity| of check bits what are added to|до | information, does not depend on algorithm of the coding (Hemming, cyclic|цикличный | etc.), and is defined only|только | by quantity of errors which should be corrected, and in the length of an elementary message of information. Thus, the basic problem is the choice most economic|экономичного | algorithm of the coding by a communication channel operating time.

The use|utillizing| of microprocessor tools allows to divide the process of data preparation and process of transfer in time, spending at first the coding and, in case of need, repacking |data, and then|а then | them transfer by a communication channel. It allows to liberate the channel for a while processed | data on the transfer and reception sides.

If the algorithm of the coding with correction of errors is not used, and there is enough only|только | their fixing, serial interfaces during data transformation|conversion| time from|с | a parallel code on successive are able to add the check bit of odd-even check without implementation of superfluous|spare| operations during preparation of information. For algorithms of the coding with correction of errors it is necessary to predict quantity of errors, which|какие | can arise up during transfer|pass| of elementary message. It can be carried out only after communication channel testing. In the literature [1] theoretical |foundtransfer of information are considered by a communication channel with hindrances and it is shown, that conditional entropy is:

 

,                                   (2)

                                                    (3)

 

Also characterises the particle|долю | symbols, which are distorted hindrances during information transfer. Proceeding from it, it is expedient to realise device adaptation |до |to transmission conditions so that depending on probability distortion |обезображивания | signals and zeros|ноля | to define quantity of errors, which is necessary to correct in the elementary message [2, 3, 4, 5].

Thus, stages of information transfer define sequence of operations:

Ø       on the first testing of communication channel is carried out for what it transfers sequence of signals and zeros which is processed on the reception party, where middle probabilities of distortion of signals р1 and zeros р0 are determined, the results of calculations are passed to the transmitter;

Ø       on the second stage the most effective algorithm of code is determined and preparation of information is carried out to|by| the transfer process|pass| which|what|, except for a protective coding, in the case of necessity contains and transformation of| information to elementary message|communication|;

Ø       on the third stage the transfer of information is carried out by a communication channel.

As well as the majority of microprocessor structures, the information transfer device can be built with use of a mode of programmatic exchange by information or a mode of interruptions. Both of them have certain advantages and lacks, but in this case it is expedient to use the second of them that the personal computer had possibility except function of information transfer to execute|implement| et al.

Process of exchange information by|by means of| a classic structure, resulted|pointed| on figure 1, it is expedient to execute in a few|a little| stages.

At the first stage communication channel testing is carried out. Thus|до | the test sequence of signals and zeros|ноля | for probability definition hindrances |обезображивания | elementary binary signals is sent to a reception side. Signals transform after the proper law of modulation.

 

 

Figure 1. The generalised structure of realisation of method of

information transfer with information adaptation

 

From a reception part the message on quantity of deformed signals and zeros proceeding from what it is possible to calculate probabilities of errors in a communication channel for signals р1 and zeros р0 that should be transferred, behind formulas arrives:

 

,                                                        (4)

  ,                                                      (5)

where N0.c  and N1.c – accordingly quantity of zeros and signals of the test message which have been deformed by hindrances during information transfer by a communication channel;

N0.In and N1.In – accordingly quantity of zeros and signals in the test message.

 

The error on quantities of the information which is transferred by a communication channel, is equaled that part of this information, which|какая | is absent in the accepted signal, in other words, that uncertainty in relation|в the relation | of transmitted signal, which|какая | takes place when the accepted signal is known. Actually it will be defined middle entropy:

 

.                                                (6)

 

Taking into account principles of formation of data in microprocessor systems, it is possible to consider them not correlated. Proceeding from the formula (6) entropy for signals Н1 and zero Н0 will make:

 

,                                (7)

.                             (8)

 

Calculated to entropy will show the particle|stake| of signals, which|what| can be distorted|disfigures||обезобразил | during an information transfer. For simplification it is expedient to choose greater from them, getting|receive| a result with a supply |припасом |:

 

 .                                                  (9)

 

The quantity|quantity| of elementary signals which can be distorted|disfigures| hindrances during a transfer|pass| of communication channel, is:

 

,                                                    (10)

where n volume of a file which should be transferred, byte.

Quantity of errors, what|какие | it is necessary to correct in each message, is|сдает |:

 

,                                                              (11)

where k – quantity of information bits in each message.

 

Thus, at the first stage the quantity of information bits in each message, which|what| can be distorted|disfigures|, are determined|обезобразил |. For realization of code algorithm this parameter must be rounded off in a greater side|flank| to|by| the integer:

 

.                                                          (12)

 

On the second stage an algorithm gets out and the code of information is carried out in accordance with the chosen|chooses| algorithm. If it is necessary to correct|repair| two errors|mistake|, the transmission|pass| must be carried|perform| out half-bytes (four informative and nine check bits). If correcting|repair| is necessary one error|mistake|, it is possible to transmit information half-bytes (four information and three control categories) or bytes (eight information and four control categories). The type of algorithm of the coding (Hemming, cyclic|цикличный | and so forth) has no principle value. But taking into account that consecutive interfaces carry out|свершают | transmission only|только | eight bits (if digits|discharge| less than|less|, they are complemented zeros |нолем |), for time reduction of information transfer channel use after protective |coding it is necessary to carry out transformation data, complementing insufficient to eight quantity|quantity| of digits|discharge| from a next byte.

At the third stage is carried out transfer of official messages relation |касательно | algorithm of the coding (type and quantity of errors which are corrected) by an arbitration method. Thus the same message|link| is transmitted|pass| a few|a little| times, and|but| on a receiving side|flank| on receipt the most credible|probable| gets out on bits. After that, enters to the action the transmission of basic information.

The test message can be transmitted|pass| a few|a little| times on different|diverse| speeds for the purpose of determination|definition| such on which|what| distortion|disfigurement| will be the least. Transmission of the results of processing | from a receiving side to the transfer is expedient to carry|perform| out in the mode|regime| a reiteration with the majority decoding, when data are transferred odd|нечетное | quantity of times|свершать | and the bit-by-bit| comparison of code combinations|petticoat| is make for determination|definition| of correct.

If the channel is symmetric (р1 = р0 = р) calculation of conditional entropy does not cause the difficulties:

 

.                   (13)

 

If the channel is asymmetrical, for calculation it is necessary to use greater from the got|receive| probabilities. In principle, it is possible to count up quantity of  signals and zeros|ноля | in a file which must be transferred|pass| and precisely enough to calculate value of conditional entropy   taking into account distortion |обезображивания | zeros|ноля | and signals for an asymmetrical channel. But, except large|великой | complication of calculations, the result will not be reliable as after carrying out protective |coding the quantity of signals and zeros|ноля | will change. For determination|definition| of eventual|end| parameter of recommended approximate calculations it|computation| fully sufficiently.

After definition of conditional entropy it is possible to choose|избрать | optimum length of the elementary message and to define the quantity|quantity| of errors, which|какие | can arise after its transmission and which|какие | will need to be corrected. 

As the communication channel is used during|for| the enough limited |на an extent |time, hindrances in it can be considered as stationary casual process. Then the estimation of length of test sequence zeros|ноля | and signals can be spent behind a method considered above.

The developed adaptive method allows to define necessary parameters for protective | coding and to optimise information transfer process at the expense of the proved choice of quantity of errors which should be corrected, and reductions of time of the use|употребления | of communication channel.

 

References.

1.                 Шеннон К. Математическая теория связи. // К. Шеннон Работы по теории информации и кибернетике. М.: Иностранная литература, 1963. – с. 243 – 332.

2.                 Кветный Р.Н. Применение метода мажоритарного декодирования в адаптивных системах передачи информации / Р.Н. Кветный, А.Я. Кулик // Оралдын Fылым Жаршысы. – 2007. – № 7. – С. 83 – 92.

3.                 Кулик А. Алгоритм адаптації до умов передавання інформації каналом зв’язку / А.  Кулик, С. Кривогубченко, М. Компанець, Д. Кривогубченко // Контроль і управління в складних системах: VI міжнар. конф. Вінниця, 8 – 12 жовтня 2001 р. – Вінниця: ВДТУ, 2001. – С. 151 – 152.

4.                 Квєтний Р.Н. Методи адаптації пристроїв передавання інформації до параметрів каналу зв’язку: монографія / Р.Н. Квєтний, А.Я. Кулик, С.Г. Кривогубченко, Д.С. Кривогубченко. – Вінниця: УНІВЕРСУМ-Вінниця, 2005. – 161 с.

5.                 Патент 48409А України, МПК7 Н03М 13/00. Спосіб кодування та передавання дискретної інформації з адаптацією до умов передавання та пристрій для його здійснення / Квєтний Р.Н., Кулик А.Я., Кривогубченко С.Г. та ін. (Україна); ВДТУ. – № 2001064411; заявл. 23.06.01, опубл. 15.08.02, Бюл. № 8. – 10 с.