baseband modulation techniques

45
Baseband Modulation Techniques Lecture 07

Upload: others

Post on 28-May-2022

12 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Baseband Modulation Techniques

Baseband Modulation Techniques

Lecture 07

Page 2: Baseband Modulation Techniques

Block diagram of a DCS

FormatSource

encode

FormatSource

decode

Channel

encode

Pulse

modulate

Bandpass

modulate

Channel

decode

Bandpass

Demod.Detect

Chan

nel

Digital modulation

Digital demodulation

Page 3: Baseband Modulation Techniques

3

Bandpass Modulation and Demodulation

• Bandpass Modulation is the process by which some characteristics of a sinusoidal waveform is varied according to the message signal.

• Modulation shifts the spectrum of a baseband signal to some high frequency.

• Demodulator/Decoder baseband waveform recovery

Page 4: Baseband Modulation Techniques

4

4.1 Why Modulate?• Most channels require that the baseband signal be shifted to a higher

frequency

• For example, in case of a wireless channel antenna size is inversely proportional to the center frequency, this is difficult to realize for baseband signals.

– For speech signal f = 3 kHz =c/f=(3x108)/(3x103)

– Antenna size without modulation /4=105 /4 meters = 15 miles -practically unrealizable

– Same speech signal if amplitude modulated using fc=900MHz will require an antenna size of about 8cm.

– This is evident that efficient antenna of realistic physical size is needed for radio communication system

• Modulation also required if channel has to be shared by several transmitters (Frequency division multiplexing).

Page 5: Baseband Modulation Techniques

5

4.2 Digital Bandpass Modulation Techniques

Three ways of representing bandpass signal:• (1) Magnitude and Phase (M & P)

– Any bandpass signal can be represented as:

• A(t) ≥ 0 is real valued signal representing the magnitude

• Θ(t) is the generalized angle

• φ(t) is the phase

– The representation is easy to interpret physically, but often is not mathematically convenient

– In this form, the modulated signal can represent information through changing three parameters of the signal namely:

• Amplitude A(t) : as in Amplitude Shift Keying (ASK)

• Phase φ(t) : as in Phase Shift Keying (PSK)

• Frequency dΘ(t)/ dt : as in Frequency Shift Keying (FSK)

)](cos[)(cos[)()( 0 tttAttAts

Page 6: Baseband Modulation Techniques

• Consider a signal with constant frequency:

• Its instantaneous frequency can be written as:

• or

6

0( ) ( ) cos( ( )) ( )cos( )s t A t t A t t

0

)()(

dt

tdti

dtt

i )()(

Angle Modulation

Page 7: Baseband Modulation Techniques

7

• Consider a message signal m(t), we can write the phase modulated signal as

)()( tmKtt pc

)](cos[)( tmKtAts pcPM

)()( tmKdt

dt pci

Phase Shift Keying (PSK) or PM

Page 8: Baseband Modulation Techniques

8

• In case of Frequency Modulation

0( ) ( )i ft K m t

0( ) [ ( )]t

ft K m t d

0 ( )t

ft K m d

0

0

( ) cos[ ( ) ]

cos[ ( )]

t

FM f

f

s t A t K m d

A t K a t

where:

( ) ( )t

a t m d

Frequency Shift Keying (FSK) or FM

Page 9: Baseband Modulation Techniques

10

0 0.05 0.1 0.15

-1

-0.5

0

0.5

1

The message signal

0 0.05 0.1 0.15

-1

-0.5

0

0.5

1

Time

The modulated signal

Example

Page 10: Baseband Modulation Techniques

12

4.2.1 Phasor Representation of Sinusoid

Consider the trigonometric identity called the Euler’s theorem:

Using this identity, we can have the phasor representation of the sinusoids. Figure 4.2 below shows such relation:

The phasor representation simplifies the representation of modulators and demodulators.

0

0 0cos( ) sin( )j t

e t j t

Page 11: Baseband Modulation Techniques

13

Phasor Representation of Amplitude Modulation

Consider the AM signal in phasor form:

ωo is the radian frequency of the carrier

ωm is the radian frequency of the message signal

0( ) Re 12 2

m mj t j tj t e e

s t e

Page 12: Baseband Modulation Techniques

14

Phasor Representation of FM

Consider the FM signal in phasor form:

Where β is modulation index

Page 13: Baseband Modulation Techniques

15

– Any bandpass signal can also be represented as

• x(t) is a real-valued signal called In-phase (I)

• y(t) is a real-valued signal called Quadrature (Q)

– This is often a convenient form which

• Emphasizes the fact that two signals may be transmitted within the same bandwidth

)sin()()cos()()( 00 ttyttxts

In-phase and Quadrature (I&Q) Representation

Page 14: Baseband Modulation Techniques

16

– Look at the correlation between

)sin()(:

)cos()(:

0

0

ttyportionQ

ttxportionI

dtttyttx

T

)sin()(.)(cos)( 00

0

dttttttytx

T

0

0000 ])sin())[sin(()(2

1

0])2sin()0)[sin(()(2

1

0

0 dtttytx

T

I and Q Portions of the Signal are Orthogonal

Page 15: Baseband Modulation Techniques

17

Digital Modulation Schemes

• Basic Digital Modulation Schemes:

– Amplitude Shift Keying (ASK)

– Frequency Shift Keying (FSK)

– Phase Shift Keying (PSK)

– Amplitude Phase Keying (APK)

• For Binary signals (M = 2), we have

– Binary Amplitude Shift Keying (BASK)

– Binary Phase Shift Keying (BPSK)

– Binary Frequency Shift Keying (BFSK)

• For M > 2, many variations of the above techniques exit usually classified as M-ary Modulation/detection

Page 16: Baseband Modulation Techniques

18

Bandpass Modulation and Demodulation

Page 17: Baseband Modulation Techniques

19

Figure4.5: digital modulations, (a) PSK (b) FSK (c) ASK (d) ASK/PSK (APK)

Page 18: Baseband Modulation Techniques

20

Amplitude Shift Keying

• Modulation Process

– In Amplitude Shift Keying (ASK), the amplitude of the carrier is switched between two (or more) levels according to the digital data

– For BASK (also called ON-OFF Keying (OOK)), one and zero are represented by two amplitude levels A1 and A0

Page 19: Baseband Modulation Techniques

21

Analytical Expression:

where Ai = peak amplitude

Hence, general expression for ASK

where

00,0

10),cos()(

binaryTt

binaryTttAts

ci

)cos(2)cos(2)cos()( 0

2

00 tAtAtAtsrmsrms

)cos(2

)cos(2 00 tT

EtP

Mit

T

Ets o

i

i ,......2,1),cos(

2)(

MidttsET

i i,......2,1,)(

0

2

Page 20: Baseband Modulation Techniques

22

• For binary ASK (also known as ON OFF Keying (OOK))

• Mathematical ASK Signal Representation– The complex envelope of an ASK signal is:

– The in-phase and quadrature components are:

the quadrature component is wasted.

10),cos()()(1 binaryTtttmAts cc

00,0)(0 binaryTtts

)()( tmAtg c

)()( tmAtx c

0)( ty

Page 21: Baseband Modulation Techniques

23

• It can be seen that the

bandwidth of binary ASK

modulated is twice that

occupied by the source

baseband stream

• Bandwidth of ASK

– Bandwidth of ASK can be found from its power spectral density

– The bandwidth of a binary ASK signal (OOK) is twice that of the unipolar NRZ line code used to create it, i.e.,

• This is the null-to-null bandwidth of ASKb

bT

RB2

2

Page 22: Baseband Modulation Techniques

24

• If raised cosine roll off pulse shaping is used, then the bandwidth is:

• Spectral efficiency of binary ASK is half that of a baseband unipolar NRZ line code

– This is because the quadrature component is wasted

bRrB )1(

Page 23: Baseband Modulation Techniques

25

Detectors for ASK: Coherent Receiver

Coherent detection requires the phase information.

A coherent detector mixes the incoming signal with a locally generated carrier reference.

Multiplying the received signal r(t) by the receiver local oscillator (say Accos(wct)) yields a signal with a baseband component plus a component at 2fc.

Passing this signal through a low pass filter eliminates the high frequency component.

Page 24: Baseband Modulation Techniques

26

• The output of the LPF is sampled once per bit period• This sample z(T) is applied to a decision rule

– z(T) is called the decision statistic• We know that Matched filter receiver for baseband

A MF pair such as the root raised cosine filter can thus be used to shape the source and received baseband symbols

In fact this is a very common approach in signal detection in most bandpass data modems

Page 25: Baseband Modulation Techniques

27

Non-coherent Receiver– Does not require a phase reference at the receiver

– If we do not know the phase and frequency of the carrier, we can use a noncoherent receiver to recover ASK signal

• Envelope Detector:

– The simplest implementation of an envelope detector comprises a diode rectifier and smoothing filter

Page 26: Baseband Modulation Techniques

28

Frequency Shift Keying (FSK)• In FSK, the instantaneous carrier frequency is switched between 2 or more

levels according to the baseband digital data

– data bits select a carrier at one of two frequencies

– the data is encoded in the frequency

• Until recently, FSK has been the most widely used form of digital modulation; Why?

– Simple both to generate and detect

– Insensitive to amplitude fluctuations in the channel

• FSK conveys the data using distinct carrier frequencies to represent symbol states

• An important property of FSK is that the amplitude of the modulated wave is constant

• Waveform

Page 27: Baseband Modulation Techniques

29

Binary FSK• In BFSK, 2 different frequencies, f1 and f2 = f1 + ∆ f are used to transmit

binary information

• Data is encoded in the frequencies

• That is, m(t) is used to select between 2 frequencies:

• f1 is the mark frequency, and f2 is the space frequency

ss Ttf

T

Ets 0),(2cos

2)( 110

ss Ttf

T

Ets 0),(2cos

2)( 221

Page 28: Baseband Modulation Techniques

30

0)(),cos(2

1)(),cos(2

)(

22

11

tmwhentT

E

tmwhentT

E

tss

s

• Binary Orthogonal Phase FSK

Page 29: Baseband Modulation Techniques

31

• When w1 and w2 are chosen so that f1(t) and f2(t) are orthogonal, i.e.,

– For the orthonormality of basis functions, following conditions must be satisfied

0)()( 21

tt

For Coherent demodulation, f2-f1 =k/(2T)

For non-coherent demodulation, 1 and 2 are unknown at

Receiver different, f2-f1=k/T

f1-f2 is also called minimum tone spacing

Page 30: Baseband Modulation Techniques

32

Coherent Detection of Binary FSK

• Coherent detection of Binary FSK is similar to that for ASK but in this case there are 2 detectors tuned to the 2 carrier frequencies

Page 31: Baseband Modulation Techniques

33

• One of the simplest ways of detecting binary FSK is to pass the signal through 2 BPF tuned to the 2 signaling freqs and detect which has the larger output averaged over a symbol period

Non-coherent Detection

Page 32: Baseband Modulation Techniques

34

Phase Shift Keying (PSK)

• In PSK, the phase of the carrier signal is switched between 2 (for BPSK) or more (for MPSK) in response to the baseband digital data

• With PSK the information is contained in the instantaneous phase of the modulated carrier

• Usually this phase is imposed and measured with respect to a fixed carrier of known phase – Coherent PSK

• For binary PSK, phase states of 0o and 180o are used

• Waveform:

Page 33: Baseband Modulation Techniques

35

• General for MPSK expression is

• Where

• 𝐸𝑠 Represents the symbol energy

• T represents symbol time period

MiTtttfT

Ets i

si ,....1,0)],(2cos[

2)( 0

M-ary Phase Shift Keying (MPSK)

MiM

iti ,....1

)1(2)(

Page 34: Baseband Modulation Techniques

36

• We can also write a PSK signal as:

• Furthermore, s1(t) may be represented as a linear combination of two orthogonal functions ψ1(t) and ψ2(t) as follows

Where

M

it

T

Ets c

si

)1(2cos

2)(

t

M

it

M

i

T

Ecc

s

sin)1(2

sincos)1(2

cos2

)()1(2

sin)()1(2

cos)( 21 tM

iEt

M

iEts ssi

]sin[2

)(]cos[2

)( 21 tT

tandtT

t cc

Page 35: Baseband Modulation Techniques

Two dimensional Modulation (MPSK)

)(1 t

2s1s

bE

“0” “1”

bE

)(2 t

3s

7s

“110”)(1 t

4s2s

sE

“000”

)(2 t

6s 8s

1s

5s

“001”“011”

“010”

“101”

“111” “100”

)(1 t

2s 1s

sE

“00”“11”

)(2 t

3s4s

“10”

“01”

QPSK (M=4)

BPSK (M=2)

8PSK (M=8)

16PSK (M=16)

sE

Page 36: Baseband Modulation Techniques

38

• A preferred assignment is to use “Gray code” in which adjacent phases differ by only one binary digit such that only a single bit error occurs in a k-bit sequence.

𝜓1

𝜓2

Page 37: Baseband Modulation Techniques

39

Quadrature PSK (QPSK)

• QPSK (or 4PSK) is a modulation technique that transmits 2-bit of information using 4 states of phases

• For example

• General expression:

2-bit Information ø

00 0

01 π/2

10 π

11 3π/2

Each symbol corresponds

to two bits

sc

s

sQPSK Tti

M

itf

T

Ets

04,3,2,1,

)1(22cos

2)(

Page 38: Baseband Modulation Techniques

40

• A QPSK signal can be generated as the sum of two BPSK signals with phase quadrature

• The signals are:

)cos(2

0 tT

Es c

s

s

)sin(2

)2

cos(2

1 tT

Et

T

Es c

s

sc

s

s

)cos(2

)cos(2

2 tT

Et

T

Es c

s

sc

s

s

)sin(2

)2

3cos(

23 t

T

Et

T

Es c

s

sc

s

s

Page 39: Baseband Modulation Techniques

41

00

3,1 27090f,sin2

)( andoshifttT

Ets c

s

s

00

2,0 1800f,cos2

)( andoshifttT

Ets c

s

s

We can also have:

sc

s

sQPSK Tti

M

it

T

Ets

04,3,2,1,

4

)1(2cos

2)(

Page 40: Baseband Modulation Techniques

42

Page 41: Baseband Modulation Techniques

Coherent Detection1. Coherent Detection of BPSK

• Coherent detection requires the phase information

• A coherent detector operates by mixing the incoming data signal with a locally generated carrier reference and selecting the difference component from the mixer output

– Multiplying r(t) by the receiver LO (say A cos(ωct)) yields a signal with a baseband component plus a component at 2fc

– The LPF eliminates the high frequency component

– The output of the LPF is sampled once per bit period

– The sampled value z(T) is applied to a decision rule

• z(T) is called the decision statistic

Page 42: Baseband Modulation Techniques

• Matched filter receiver

– A MF pair such as the root raised cosine filter can thus be used to shape the source and received baseband symbols

– In fact this is a very common approach in signal detection in most bandpass data modems

Page 43: Baseband Modulation Techniques

2. Coherent Detection of QPSK

• QPSK receiver is composed of 2 BPSK receivers– one that locks on to the sine carrier and

– the other that locks onto the cosine carrier

tAt 01 cos)(

tAt 02 sin)(

2

0 0 1 0 0 00 0

( ) ( ) ( ) ( cos ) ( cos )2

s sT TsA T

z t s t t dt A t A t dt L

1 0 2 0 00 0

( ) ( ) ( ) ( cos ) ( sin ) 0s sT T

z t s t t dt A t A t dt

Page 44: Baseband Modulation Techniques

• If

• Decision:

1. Calculate zi(t) as

2. Find the quadrant of (Z0, Z1)

Output S0(t) S1(t) S2(t) S3(t)

Z0 Lo 0 -Lo 0

Z1 0 -Lo 0 Lo

)45cos()()45cos()( 0201

oo tAtandtAt

Output S0(t) S1(t) S2(t) S3(t)

Z0 Lo -Lo -Lo Lo

Z1 Lo Lo -Lo -Lo

dtttrtz i

T

i )()()(0

4cos

2

2

0

sTAL

Page 45: Baseband Modulation Techniques

• A coherent QPSK receiver requires accurate carrier recovery using a 4th power process, to restore the 90o phase states to modulo 2π