Comments on “Document B08”
Background Every method of communication suffers degraded
performance when the signal-to-noise ratio (SNR) is low. This is true for
all forms of amateur radio voice communication, for “ear-and-brain” CW,
and for computer-assisted “digital modes.” Whatever the form of coding and
modulation, if the SNR is high enough then copy can be perfect, or nearly
so. When SNR is low the rate of information transfer decreases,
approaching zero at the threshold of signal detectability.
Modern communication technologies use structured redundancies that are much more powerful than simple repetition. The JT65 protocol uses a Reed-Solomon code optimized for the needs of amateur radio weak signal communication, together with a form of modulation (multi-tone frequency shift keying) known to be much more efficient than simple On-Off keying. JT65 has been implemented in a computer program called WSJT, of which I am the principal author. Standard JT65 transmissions convey exactly 72 bits of arbitrary “user information.” As a consequence, any one of 272 4.7 × 1021 distinct messages can be conveyed in a single transmission. The 72 user bits are augmented with an additional 306 bits of mathematically encoded redundancy; the redundant symbols are created in such a way that the exact transmitted message can be decoded, with extremely small probability of error, even if many symbols are corrupted or lost in the noise during transmission. Rather than being transmitted character-by-character, as in Morse code, message information is mathematically spread throughout a whole transmission. Signal dropouts do not cause the loss of isolated portions of a message; JT65 messages are copied in their entirety, or not at all. If enough channel symbols are received with adequate SNR, copy is complete and error-free, with very high confidence. If not, the decoder produces no result and a repeat transmission is required.
Prior information and the JT65 decoder Experienced weak-signal operators know that with
marginal signals it is much easier to recognize and copy one’s own
callsign (or a familiar one) than unknown calls or random characters.
Exactly analogous distinctions apply for the JT65 decoder implemented in
WSJT. A fully general algorithm reliably decodes any JT65 message down to
an SNR limit (1) of about −24 dB. In addition, WSJT offers a secondary
decoder that yields reliable copy of some signals about 4 dB weaker. This
“deep search” decoder is not sensitive to the full range of 272
possible messages; instead, it is programmed to determine specifically
whether one of a large number of hypothetical messages was the exact
message transmitted. Hypothetical messages are generated with the help of
a callsign database maintained by the user: calls found there are combined
with “CQ”, with the receiving station’s own callsign, and with optional
numerical signal reports. With the default database of more than 4800
callsigns known to have been active in VHF weak-signal communication, this
procedure yields more than 14,400 hypothetical messages. If one of the
hypothetical messages matches the transmitted one in every detail, that
message can be decoded with high confidence down to about −28 dB SNR. The
slightest difference between hypothetical and received messages — for
example, a single-character having been changed or omitted — will cause
the deep-search decoder to reject the hypothesis and produce no result.
Again, it should be emphasized that the fully general decoder will decode
any JT65 message whenever the SNR is adequate. Slightly weaker signals can
be decoded if the computer is given some information about the most
plausible and interesting message contents. The situation is really no
different than with human decoding of traditional-mode signals.
False assertion. Proposal B08 asserts that the JT65 decoding process: “. . . is comparing fragments of information, matching this with known calls and locators from a database, reconstructing and then printing the full information on the screen as if it had been received via the airwaves.” This statement is false, as can be easily confirmed in
a number of ways. Perhaps most fundamentally, the source code for WSJT is
openly available.2 Anyone can examine the code, compile it for him- or
herself, and test it — as many interested amateurs have done.The deep
search algorithm is wholly contained in 155 lines of straightforward,
easy-to-read code. It contains no “comparing” or “matching” of “fragments
of information.” Instead,
Demonstrated proof of integrity A live demonstration of the JT65 decoder was provided at the August 2006 EME Conference in W¨urzburg, Germany. JT65 signals could be transmitted at any chosen SNR, with any desired message content, and sent to a receiving computer running the standard WSJT program. Conference participants were invited to explore the operation of the decoder at different SNR levels, perhaps by selecting callsigns included (or not included) in the decoding computer’s database. Many tests were also made with completely arbitrary messages, including random cipher groups. Participants were especially invited to try to “trick” the receiving computer into decoding a message that had not been sent: for example, by transmitting at very low SNR a message different in only one character from one that would surely be tested by the deep-search decoder. The JT65 decoders made zero mistakes during all of these tests: they either produced the correct result, or no result at all. It was also plainly demonstrated that even with “stranger” callsigns or random cipher groups, correct decoding was always achievable (down to about −29 dB SNR) by using WSJT’s ability to average several successive transmissions. Everyone who bserved and participated in the demonstration was persuaded of the full integrity of the WSJT decoding process. (2 Note: See URL
http://developer.berlios.de/projects/wsjt/ ) Minimal valid QSOs For many years it has been accepted by weak-signal
amateur VHF/UHF operators worldwide that a minimum valid QSO requires each
station to copy both callsigns, a signal report or some other piece of
previously unknown information, and an acknowledgment of complete copy.
This easy-to-understand guideline wisely leaves other details concerning
the validity of a contact up to the integrity of individual operators. For
example, what does it mean to have copied both callsigns during a
scheduled QSO attempt, when all of the necessary information is known in
advance to both operators? Personal integrity requires that even if the
information is already known, it must still be copied over the air, with
confidence. Why is it commonly understood that completing a scheduled QSO
has a 3 or 4 dB advantage over a contact with an unknown station answering
one’s CQ? The answer, of course, is that it is “several dB easier” to be
sure that you copied something correctly, if you know in advance what to
expect. The sensitivity advantage of the WSJT deep-search decoder is the
computer equivalent of this well-known fact for human operators. The
principal difference is that the computer can be quantitative about how
many dB the advantage amounts to — and what it means to be “sure” that
information has been copied correctly. Pages 14–16 of Document B08 reveal
a fundamental lack of understanding of how JT65 works in practice, and
about modern coding techniques in general. The document fails to recognize
that state-of-the-art design of coding and modulation methods can be as
important to a reliable I do not consider it worthwhile to devote space here to detailed corrections of a number of additional misleading or false assertions in the text of Document B08. Instead, I will simply call the Committee’s attention to the need (if they should consider proposal worthy of any further consideration) to solicit input from individuals who actually use the techniques that the document attempts to criticize. (3 Note:J. Taylor, K1JT, “The JT65 Communications Protocol”, QEX, September-October 2005, pp. 3–12)
I believe it is self-evident to nearly everyone
that the basic guidelines for minimal valid QSOs should be independent of
operating mode. The fact is that our long-established guidelines are
sound, and JT65 QSOs meet them every bit as well as QSOs using traditional
modes. Indeed, under the most marginal SNR circumstances the reliability,
accuracy, and information content of JT65 QSOs far exceeds that of many CW
QSOs. In writing that statement I am not questioning the integrity of any
CW operator or the validity of any CW QSO; I am simply emphasizing the
fact that forward error correction makes the decoded content of JT65
messages much more reliable than the best achievable under marginal CW
conditions. Joe Taylor, K1JT (4 Note:“Open Source WSJT: Status, Capabilities, and Future Evolution.” J. Taylor, K1JT, in Proceedings of the 12th International EME Conference, W¨urzburg, August 25–27, 2006.) (5 Note: See URL http://pulsar.princeton.edu/~joe/K1JT/Documentation.htm )
|