Modified AMI codes are a digital telecommunications technique to maintain
system
A system is a group of Interaction, interacting or interrelated elements that act according to a set of rules to form a unified whole. A system, surrounded and influenced by its environment (systems), environment, is described by its boundaries, ...
synchronization
Synchronization is the coordination of events to operate a system in unison. For example, the conductor of an orchestra keeps the orchestra synchronized or ''in time''. Systems that operate with all parts in synchrony are said to be synchronou ...
.
Alternate mark inversion
In telecommunication, bipolar encoding is a type of return-to-zero (RZ) line code, where two nonzero values are used, so that the three values are +, −, and zero. Such a signal is called a duobinary signal. Standard bipolar encodings are designed ...
(AMI)
line code
In telecommunication, a line code is a pattern of voltage, current, or photons used to represent digital data transmitted down a communication channel or written to a storage medium. This repertoire of signals is usually called a constrained c ...
s are modified by deliberate insertion of
bipolar violation
A bipolar violation, bipolarity violation, or BPV, is a violation of the bipolar encoding rules where two pulses of the same polarity occur without an intervening pulse of the opposite polarity. This indicates an error in the transmission of the ...
s. There are several types of modified AMI codes, used in various
T-carrier
The T-carrier is a member of the series of carrier systems developed by AT&T Bell Laboratories for digital transmission of multiplexed telephone calls.
The first version, the Transmission System 1 (T1), was introduced in 1962 in the Bell System ...
and
E-carrier
The E-carrier is a member of the series of carrier systems developed for digital transmission of many simultaneous telephone calls by time-division multiplexing. The European Conference of Postal and Telecommunications Administrations (CEPT) orig ...
systems.
Overview
The
clock rate
In computing, the clock rate or clock speed typically refers to the frequency at which the clock generator of a processor can generate pulses, which are used to synchronize the operations of its components, and is used as an indicator of the pr ...
of an incoming T-carrier is extracted from its bipolar line code. Each signal transition provides an opportunity for the receiver to see the transmitter's clock. The AMI code guarantees that transitions are always present before and after each mark (1 bit), but are missing between adjacent spaces (0 bits). To prevent loss of
synchronization
Synchronization is the coordination of events to operate a system in unison. For example, the conductor of an orchestra keeps the orchestra synchronized or ''in time''. Systems that operate with all parts in synchrony are said to be synchronou ...
when a long
string of zeros is present in the
payload
Payload is the object or the entity which is being carried by an aircraft or launch vehicle. Sometimes payload also refers to the carrying capacity of an aircraft or launch vehicle, usually measured in terms of weight. Depending on the nature of ...
, deliberate bipolar violations are inserted into the line code, to create a sufficient number of transitions to maintain synchronization; this is a form of
run length limited
Run-length limited or RLL coding is a line coding technique that is used to send arbitrary data over a communications channel with bandwidth limits. RLL codes are defined by four main parameters: ''m'', ''n'', ''d'', ''k''. The first two, ''m''/ ...
coding. The receive
terminal equipment In telecommunication, the term terminal equipment has the following meanings:
* Communications equipment at either end of a communications link, used to permit the stations involved to accomplish the mission for which the link was established.
* I ...
recognizes the bipolar violations and removes from the user data the marks attributable to the bipolar violations.
T-carrier was originally developed for voice applications. When voice signals are digitized for
transmission
Transmission may refer to:
Medicine, science and technology
* Power transmission
** Electric power transmission
** Propulsion transmission, technology allowing controlled application of power
*** Automatic transmission
*** Manual transmission
*** ...
via T-carrier, the
data stream
In connection-oriented communication, a data stream is the transmission of a sequence of digitally encoded coherent signals to convey information. Typically, the transmitted symbols are grouped into a series of packets.
Data streaming has bec ...
always includes ample 1 bits to maintain synchronization. (To help this, the
μ-law algorithm
The μ-law algorithm (sometimes written Mu (letter), mu-law, often typographic approximation, approximated as u-law) is a companding algorithm, primarily used in 8-bit PCM Digital data, digital telecommunication systems in North America and Jap ...
for digitizing voice signals encodes silence as a continuous stream of 1 bits.) However, when used for the transmission of
digital data
Digital data, in information theory and information systems, is information represented as a string of discrete symbols each of which can take on one of only a finite number of values from some alphabet, such as letters or digits. An example i ...
, the conventional AMI line code may fail to have sufficient marks to permit recovery of the incoming clock, and synchronization is lost. This happens when there are too many consecutive zeros in the
user
Ancient Egyptian roles
* User (ancient Egyptian official), an ancient Egyptian nomarch (governor) of the Eighth Dynasty
* Useramen, an ancient Egyptian vizier also called "User"
Other uses
* User (computing), a person (or software) using an ...
data
In the pursuit of knowledge, data (; ) is a collection of discrete values that convey information, describing quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpreted ...
being transported.
The exact pattern of bipolar violations that is transmitted in any given case depends on the line rate (''i.e.'', the level of the line code in the
T-carrier
The T-carrier is a member of the series of carrier systems developed by AT&T Bell Laboratories for digital transmission of multiplexed telephone calls.
The first version, the Transmission System 1 (T1), was introduced in 1962 in the Bell System ...
hierarchy) and the polarity of the last valid
mark
Mark may refer to:
Currency
* Bosnia and Herzegovina convertible mark, the currency of Bosnia and Herzegovina
* East German mark, the currency of the German Democratic Republic
* Estonian mark, the currency of Estonia between 1918 and 1927
* Fi ...
in the user data prior to the unacceptably long string of zeros. It would not be useful to have a violation immediately following a mark, as that would not produce a transition. For this reason, all modified AMI codes include a space (0 bit) before each violation mark.
In the descriptions below, "" denotes a balancing mark with the opposite polarity to that of the preceding mark, while "" denotes a bipolar violation mark, which has the same polarity as the preceding mark. In order to preserve AMI coding's desirable absence of
DC bias
In signal processing, when describing a periodic function in the time domain, the DC bias, DC component, DC offset, or DC coefficient is the mean amplitude of the waveform. If the mean amplitude is zero, there is no DC bias. A waveform with no DC ...
, the number of positive marks must equal the number of negative marks. This happens automatically for balancing () marks, but the line code must ensure that positive and negative violation marks balance each other.
Zero length code suppression
The first technique used to ensure a minimum density of marks was zero code suppression a form of
bit stuffing
In data transmission and telecommunication, bit stuffing (also known—uncommonly—as positive justification) is the insertion of non-information bits into data. Stuffed bits should not be confused with overhead bits.
Bit stuffing is used for ...
, which set the least significant bit of each 8-bit byte transmitted to a 1. (This bit was already unavailable due to
robbed-bit signaling In communications systems, robbed-bit signaling (RBS) is a scheme to provide maintenance and line signaling services on many T1 digital carrier circuits using channel-associated signaling (CAS). The T1 carrier circuit is a type of dedicated circui ...
.) This avoided the need to modify the AMI code in any way, but limited available data rates to 56,000 bits per second per
DS0
Digital Signal 0 (DS0) is a basic digital signaling rate of 64 kilobits per second (kbit/s), corresponding to the capacity of one analog voice-frequency-equivalent communication channel. The DS0 rate, and its equivalents E0 in the E-carrier system ...
voice channel. Also, the low minimum density of ones (12.5%) sometimes led to increased clock
slip
Slip or SLIP may refer to:
Science and technology Biology
* Slip (fish), also known as Black Sole
* Slip (horticulture), a small cutting of a plant as a specimen or for grafting
* Muscle slip, a branching of a muscle, in anatomy
Computing and ...
page on the span.
Increased demand for bandwidth, and compatibility with the
G.703
G.703 is a 2016 ITU-T standard for encoding voice or data over digital carriers such as T1 and E1. G.703 provides specifications for pulse-code modulation (PCM).
G.703 also specifies E0 (64kbit/s). For information about E0 audio see G.711.
...
and
ISDN
Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the digitalised circuits of the public switched telephone network. Wo ...
PRI standards which called for 64,000 bits per second, led to this system being superseded by B8ZS.
B8ZS (North American T1)
Commonly used in the North American T1 (
Digital Signal 1
Digital Signal 1 (DS1, sometimes DS-1) is a T-carrier signaling scheme devised by Bell Labs. DS1 is the primary digital telephone standard used in the United States, Canada and Japan and is able to transmit up to 24 multiplexed voice and data cal ...
) 1.544 Mbit/s line code, bipolar with eight-zero substitution (B8ZS) replaces each string of 8 consecutive zeros with the special pattern "". Depending on the polarity of the preceding mark, that could be or .
B6ZS (North American T2)
At the North American T2 rate (6.312 Mbit/s), bipolar violations are inserted if 6 or more consecutive zeros occur. This line code is called bipolar with six-zero substitution (B6ZS), and replaces 6 consecutive zeros with the pattern "". Depending on the polarity of the preceding mark, that could be or .
HDB3 (European E-carrier)
Used in all levels of the European
E-carrier
The E-carrier is a member of the series of carrier systems developed for digital transmission of many simultaneous telephone calls by time-division multiplexing. The European Conference of Postal and Telecommunications Administrations (CEPT) orig ...
system, the high density bipolar of order 3 (HDB3) code replaces any instance of 4 consecutive 0 bits with one of the patterns "" or "". The choice is made to ensure that consecutive violations are of differing polarity; i.e., separated by an odd number of normal marks.
These rules are applied on the code as it is being built from the original string. Every time there are 4 consecutive zeros in the code they will be replaced by either 000−, 000+, +00+ or −00−. To determine which pattern to use, one must count the number of pluses (+) and the number of minuses (−) since the last violation bit V, then subtract one from the other. If the result is an odd number then 000− or 000+ is used. If the result is an even number then +00+ or −00− is used. To determine which polarity to use, one must look at the pulse preceding the four zeros. If 000V form must be used then V simply copies the polarity of last pulse, if B00V form must be used then B and V chosen will have the opposite polarity of the last pulse.
Examples
Here are some examples of bit streams codes with AMI and HDB3. All assume the same starting conditions: the previous 1 bit was −, and the previous violation was an even number of 1 bits ago. (E.g. the preceding bits could have been ++−.)
B3ZS (North American T3)
At the
North American T3 rate (44.736 Mbit/s), bipolar violations are inserted if 3 or more consecutive zeros occur. This line code is called bipolar with three-zero substitution (B3ZS), and is very similar to HDB3. Each run of 3 consecutive zeros is replaced by "" or "". The choice is made to ensure that consecutive violations are of differing polarity, i.e. separated by an odd number of normal marks.
See also
Other line codes that have 3 states:
*
Bipolar encoding
In telecommunication, bipolar encoding is a type of return-to-zero (RZ) line code, where two nonzero values are used, so that the three values are +, −, and zero. Such a signal is called a duobinary signal. Standard bipolar encodings are designed ...
or alternate mark inversion
*
Hybrid ternary code
In telecommunications, the hybrid (H-) ternary line code is a line code that operates on a hybrid principle combining the binary non-return-to-zero-level (NRZL) and the polar return-to-zero (RZ) codes.
The H-ternary code has three levels for sign ...
*
MLT-3 encoding
MLT-3 encoding (Multi-Level Transmit) is a line code (a signaling method used in a telecommunication system for transmission purposes) that uses three voltage levels. An MLT-3 interface emits less electromagnetic interference and requires less band ...
*
4B3T
4B3T, which stands for 4 (four) binary 3 (three) ternary, is a line encoding scheme used for ISDN PRI interface. 4B3T represents four binary bits using three pulses.
Description
It uses three states:
* + (positive pulse),
* 0 (no pulse), and
* â ...
{{FS1037C
Encodings
Line codes
Multiplexing