ch5-digital modulation techniques

177
Chapter 5 Digital Modulation Techniques

Upload: others

Post on 11-May-2022

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ch5-Digital Modulation Techniques

Chapter 5Digital Modulation

Techniques

Riaz
Typewriter
Collected; Available @: http://web.ee.ccu.edu.tw/~wl/
Riaz
Typewriter
Page 2: Ch5-Digital Modulation Techniques

Main difference between the analog modulation and digital modulation:

Digital modulation system represents a small set of abstract symbols, e.g., 0 and 1 for a binary transmission system.

Analog modulation system represents a continuous waveform.

Page 3: Ch5-Digital Modulation Techniques

To transmit a digital message, a digital modulation allocates a piece of time called signal interval and generates a continuous function that represents the symbol.

The message signal is often transformed onto a baseband signal.

Page 4: Ch5-Digital Modulation Techniques

In a wireless communication system, a second part of the modulator converts the baseband signal to a radio-frequency (RF)signal, modulating the phase, frequency, or amplitude of the carrier.

A digital demodulator: it outputs a decided symbol.An analog demodulator: it produces an output that approximately equals to the message signal.

Page 5: Ch5-Digital Modulation Techniques

5.1 Baseband Pulse Transmission

Baseband pulse transmission: a transmission technique which does not require carrier modulation.

The digital information for the basebandpulse transmission is transformed to a pulse train.

Page 6: Ch5-Digital Modulation Techniques

Symbols 1 and 0 are represented by positive and negative rectangular pulses of equal amplitude and equal duration .

Fig. 5.1-1(a): the pulse is a rectangular pulse, and the binary information stream of “1001101”is transformed onto a baseband signal in where Tb is assumed to be 1 sec.

bT

Page 7: Ch5-Digital Modulation Techniques

Fig. 5.1-1 Signals for baseband pulse transmission. (a) baseband pulse signal, (b) the received signal corrupted by noise and the sampled points, (c) the output of the correlatorand the corresponding sampling points.

Page 8: Ch5-Digital Modulation Techniques

Let m be the transmitted symbol,i.e., transmitted signal denoted as:

(5.1-1) for .

In this case, is called the bit rate.

{ }1,0∈m

( )⎩⎨⎧

=−=+

=0if1if

mAmA

ts

0 bt T≤ ≤

1 / bT

Page 9: Ch5-Digital Modulation Techniques

Given the received signal, the receiver is required to make a decision in each signaling interval as to whether the transmitted symbol is a 1 or a 0.

Recover the original digital stream:1. sample the received signal at the sampling rate . 2. based on the sampled value, the decision device is used to “guess” the transmitted symbol.

1 / bT

Page 10: Ch5-Digital Modulation Techniques

Short distance wired transmission, e.g., RS232 standard:If the sampled value is positive, then it decides that a 1 was transmitted. If the sampled value is negative, then it decides that a 0 was transmitted.

it is not suitable for long distance transmission systems.

Long distance transmissions:Noise will add to the transmitted signal.

Page 11: Ch5-Digital Modulation Techniques

Fig. 5.1-1(b):It gives a noise version of the received signal and the corresponding sampled points that are denoted by circles.

Sampled value is directly used to decide which symbol was transmitted.

Page 12: Ch5-Digital Modulation Techniques

The decisions made based on the sampled values produce the output “1101001” which contains two errors as compared with the transmitted sequence “1001101”.

It is very possible that the sampled value goes to the opposite polarity at the sampling instance.

Page 13: Ch5-Digital Modulation Techniques

Fig. 5.1-1 (c) :Assume the starting and ending times of the pulse are known.

Compare the area of the received signal-plus-noise waveform by integrating the received signal over the Tb-second signaling interval.

The decisions based on these sampled values are “1001101” which contains no error as compared with the transmitted sequence.

Page 14: Ch5-Digital Modulation Techniques

Fig. 5.1-2 A receiver for baseband pulse transmission.

The integrator will integrate the waveform over with the output being sampled at time .

the integrate-and-dump device is called a ”correlator”.

(0, )bT

bT

0( )

Tdt•∫

bt T=

Page 15: Ch5-Digital Modulation Techniques

A noise component is present at the output of the integrator.

Since the additive noise is always assumed to be of zero mean, it takes on positive and negative values with equal probability.

Noise will be “averaged” over by the integrator, and hence the noise component will be suppressed by the integrator.

Page 16: Ch5-Digital Modulation Techniques

The integrator can be thought as an energy collector that collects the energy of the received signal.

Based on the sampled values, the decision device makes a decision on the transmitted symbol.

If the output of the correlator at the sampling instance is positive, it decides that a 1 was transmitted.

Page 17: Ch5-Digital Modulation Techniques

It is very important to determine the required bandwidth for the transmitted signal.

For broadband transmission, if the signal has a bandwidth which is greater than the bandwidth of the channel, the transmitted signal will not be able to transmit through the channel without distortion.

Page 18: Ch5-Digital Modulation Techniques

The digital signaling is transmitted consecutively one-by-one.

We express the transmitted signal as:

(5.1-2)

where for binary transmission and is a pulse shaping function.

( ) ( )k bk

s t b h t kT∞

=−∞

= −∑

( )h t{ 1, 1}kb ∈ + −

Page 19: Ch5-Digital Modulation Techniques

1 0( )

0 otherwiset T

h t≤ <⎧

= ⎨⎩

(5.1-3)

Page 20: Ch5-Digital Modulation Techniques

Power Spectral Density (PSD)

In communication systems, we have to know how the transmitted power is distributed over the frequencies.

The question is what the power distribution of the signal is. ( )s t

Page 21: Ch5-Digital Modulation Techniques

A formal explanation of the PSD of requires the knowledge of random

process.

The meaning of the PSD is similar to the Fourier transform, we may explain it intuitively.

( )s t

Page 22: Ch5-Digital Modulation Techniques

Let be a truncated signal of given by:

(5.1-4)

The PSD for is defined as(5.1-5)

where is the Fourier transform of .

( )Ts t ( )s t

( )( ) / 2 / 20 otherwiseT

s t T t Ts t

− ≤ ≤⎧= ⎨⎩

( )s t21( ) lim | ( ) |s TT

P f S fT→∞

=

)( fST )(tsT

Page 23: Ch5-Digital Modulation Techniques

The power of the signal is defined as

(5.1-6)

Parseval’s theorem:

(5.1-7)

( )s t

dttsT

PT

TTs

22/

2/)(1lim ∫−∞→

=

dffSdtts T

T

T

222/

2/)()( ∫∫

∞−−=

Page 24: Ch5-Digital Modulation Techniques

(5.1-8)

Substituting (5.1-5) into (5.1-8):

(5.1-9)

dfT

tS

dffST

dttsT

P

T

T

TT

T

TTs

∞− ∞→

∞−∞→

−∞→

⎟⎟

⎜⎜

⎛=

=

=

2

2

2/

2/

2

)(lim

)(1lim

)(1lim

( )s sP P f df∞

−∞= ∫

Page 25: Ch5-Digital Modulation Techniques

The power of is exactly equal to the integration of the PSD over frequency.This is why is called PSD of .

From Equation (5.1-2), the signal is a combination of the same waveform of different delays and amplitudes.

( )s t

( )sP f ( )s t

( )s t( )h t

Page 26: Ch5-Digital Modulation Techniques

Let be the Fourier transform of . The PSD of can be shown:

(5.1-10)

In this case, is a rectangular pulse, according to Equation (3.3-19), the Fourier transform of is

(5.1-11)

( )H f ( )h t( )sP f ( )s t

21( ) | ( ) |sb

P f H fT

=

( )h t

( )h tsin( )( ) sinc( )b bj f T j f Tb

b bfTH f e e T fTf

π πππ

− −= =

Page 27: Ch5-Digital Modulation Techniques

where (5.1-12)

Therefore, we have and the PSD of is:

(5.1-13)

Figure 5.1-3 plots the PSD of with .

sin( )sinc( ) xxxππ

=

( ) sinc( )b bH f T fT=

( )sP f ( )s t

2( ) sinc ( )s b bP f T fT=

( )s t1bT =

Page 28: Ch5-Digital Modulation Techniques

Figure 5.1-3 The PSD of the transmitted baseband signal . ( )s t

Page 29: Ch5-Digital Modulation Techniques

Figure 5.1-3: Most of the power of concentrates over .

PSD is zero at and .define is the bandwidth of the

baseband signal.

also called the null-to-null bandwidth.

( )s t[ 1/ ,1/ ]b bT T−

1/ bT− 1/ bT2 / bT

2 / bT

Page 30: Ch5-Digital Modulation Techniques

Identify the differences between data rateand signal bandwidth:

Data rate: defined as the number of bits transmitted per second.

For example: a data rate of 1 Mbits/sec means that the system is capable of transmitting 1 Mega bits every second.

Page 31: Ch5-Digital Modulation Techniques

Signal bandwidth: defined as the bandwidth for which most of the signal power is concentrate on.

define 1: the width of the spectrum for which 99% of the power of the signal is concentrated on.

or define 2: simply use the null-to-null bandwidth.

Page 32: Ch5-Digital Modulation Techniques

Bandwidth is proportional to the bit rate.

If the bit rate is high, is small and the bandwidth becomes very large.

The communication system handling high data rate transmission must be able to cope with a wide range of frequencies.

bT

Page 33: Ch5-Digital Modulation Techniques

Where more than one users are using the channel, the baseband pulse transmission method does not work because there is no way to distinguish these users.

Page 34: Ch5-Digital Modulation Techniques

5.2 Amplitude-Shift Keying (ASK)

We will add carrier waves into the modulation scheme.

ASK is the simplest modulation technique.

ASK is modulated over the carrier's amplitude, similar to the amplitude modulation for analog modulation.

Page 35: Ch5-Digital Modulation Techniques

Binary transmission: we require two waveforms and .

If the transmitted symbol is “1”, is used over the signaling interval .

If the transmitted symbol is “0”, is used over the signaling interval .

Assume the probabilities of transmitting a “1" and a “0" are equal.

( )1s t )(2 ts

)(1 ts (0, )bT

)(2 ts (0, )bT

Page 36: Ch5-Digital Modulation Techniques

For ASK, the transmitted waveforms can be expressed as

(5.2-1)

for , where is the averaged transmitted signal energy per bit and is the carrier frequency which is equal to

for some fixed integer .

( )

( ) 0

)2cos(4

2

1

=

=

ts

tfTE

ts cb

b π

bTt≤≤0 bEcf

/c bn T cn

Page 37: Ch5-Digital Modulation Techniques

The averaged transmitted energy which is expressed as follows:

(5.2-2)

(5.2-2) is equal to .

( ) ( )∫∫ + bb TTdttsdtts

0

220

21 5.05.0

bE

Page 38: Ch5-Digital Modulation Techniques

The transmitted signal s(t) can be expressed as

(5.2-3)

for .

ASK is often referred to as on-off keying.

( ) ( )( )⎩

⎨⎧

="0"symbolfor"1"symbolfor

2

1

tsts

ts

bTt ≤≤0

Page 39: Ch5-Digital Modulation Techniques

Fig. 5.2-1(a) gives a transmitted waveform resulting from the digital transmission of “1001101”, where ,

Hz, and sec. 1=bE

5=cf 1=bT

Page 40: Ch5-Digital Modulation Techniques

Fig. 5.2-1 Signals for ASK, (a) transmitted signal, (b) the signal , (c) the output of the integrator and the corresponding sampling points.

( ) ( )×= tsty ( )tfT cb π2cos2

Page 41: Ch5-Digital Modulation Techniques

Use Fig. 5.2-2. to explain how the demodulation works.

Fig. 5.2-2 A receiver for amplitude-shift keying

0( )

Tdt•∫

bt T=

x( )r t ( )y t

2 / cos(2 )b cT f tπ

λ

Say "1" if Say "0" if

xx

λλ

><

Page 42: Ch5-Digital Modulation Techniques

Assuming that the received signal is noise freeand multiplied by a unit-energy signal .

The expression after multiplication:

(5.2-4)

Fig. 5.2-1(b) shows the corresponding signal .

( )tfT cb π2cos/2

( ) ( ) ( )tfT

tsty cb

π2cos2×=

( )y t

Page 43: Ch5-Digital Modulation Techniques

If

(5.2-5),

we have

(5.2-6)

for the corresponding period.

4( ) cos(2 )bc

b

Es t f tT

π=

28( ) cos (2 )b

cb

Ey t f t

Tπ=

0)( ≥ty

Page 44: Ch5-Digital Modulation Techniques

An integrator is then employed to integrate the signal over with the output being sampled at time .

Defining the sampled signal as :

(5.2-7)

( )y t [0, ]bT

bT

x

( ) ( )

( ).

24cos18

2cos22cos4

0

0

+=

=

b

b

T c

b

b

cb

c

T

b

b

dttf

TE

dttfT

tfTE

x

π

ππ

Page 45: Ch5-Digital Modulation Techniques

Replacing in (5.2-7):

(5.2-8)

The second term in the brackets is zero.

/c c bf n T=

( ).2

4sin4

121

218

4cos21

218

00

0 0

b

T

b

c

bc

T

b

b

T T

b

c

b

b

E

tTn

Tnt

TE

dttTn

dtT

Ex

bb

b b

=

⎟⎟⎠

⎞⎜⎜⎝

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛+=

⎟⎟⎠

⎞⎜⎜⎝

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛+= ∫ ∫

ππ

π

Page 46: Ch5-Digital Modulation Techniques

If was transmitted, the sampled signal is x = 0 since .

In summary:

(5.2-9)

)(2 ts0)(2 =ts

2 if 1 is transmitted0 if 0 is transmitted

bEx⎧⎪=⎨⎪⎩

Page 47: Ch5-Digital Modulation Techniques

Fig. 5.2-1(c):gives the resulting signal from the integrator and the corresponding sampled points.

The decision device based on the sampled values makes a decision of “1001101” which is exactly the same as the transmitted sequence.

Page 48: Ch5-Digital Modulation Techniques

Although there are only two possible outcomes for the noiseless case, the actual received signal may be corruptedby noise.

For certain systems, we have infinitelymany outcomes for the output of the correlator.

decision device require a thresholdvalue to distinguish which symbol was transmitted.

λ

Page 49: Ch5-Digital Modulation Techniques

Threshold value is set to the center of 0 and , i.e., , so that minimum bit error probability can be achieved.

If , the decision device makes a decision of 1. If , the decision device makes a decision of 0.

bE2 2bE=λ

λ>x

λ<x

Page 50: Ch5-Digital Modulation Techniques

The detection method requires a carrier with the same frequency and phase as those of the carrier in the transmitter.

Those kinds of receivers are called coherent detector.

Without the knowledge of the carrier frequency and phase

noncoherent detector.

Page 51: Ch5-Digital Modulation Techniques

Fig. 5.2-3 Noncoherent detector for amplitude-shift keying

0( )

Tdt•∫

bt T=

x

λ

Say "1" if Say "0" if

xx

λλ

><

Page 52: Ch5-Digital Modulation Techniques

Fig. 5.2-3:The envelope detector is used to recoverthe envelope of the carrier wave.

The band-pass filter is used to remove the out-of-band noise.

The receiver is not optimal since an envelope detector will enhance the noiseat the input of the correlator and hence increase the bit error probability.

Page 53: Ch5-Digital Modulation Techniques

In general, the transmitted energy for the noncoherent detector must be doubled to achieve the same bit error probability as that of the coherent detector.

The collection of all possible signal points is called the signal constellation.

For binary ASK:

(5.2-10) ( ) ( )tfT

t cb

πφ 2cos21 =

Page 54: Ch5-Digital Modulation Techniques

which is a unit energy signal over (0, Tb).

All the possible signal si(t) for i = 1, 2, can be represented as

(5.2-11)

and .

The geometric interpretation of these two signal points can be illustrated in Fig. 5.2-4.

( ) ( )tsts ii 11φ=

bEs 211= 021 =s

Page 55: Ch5-Digital Modulation Techniques

Fig. 5.2-4 Geometric representation of binary ASK signals.

The decision boundary is determined by the threshold value .

0 2 bEλ

φ

1Z2Z

λ

Page 56: Ch5-Digital Modulation Techniques

If x lies in the region Z1, then a decision of a “1” is made. If x lies in the region Z2, then a decision of a “0” is made.

One advantage in using the signal space representation is that it is much easier toidentify the “distance” between signal points.

Page 57: Ch5-Digital Modulation Techniques

The distance between signal points is closely related to the symbol error rate of a given constellation.

Ex: ASKthe distance between two signal points is

Increase the transmitted energy of the signals, i.e. , can reduce the probability of detection error.

bE2

bE

Page 58: Ch5-Digital Modulation Techniques

The distance between two signal points will be increased which makes the received signal point less probable be located in the wrong region.

Increasing is equivalent to increasing the magnitude of the signal .

bE)(1 ts

Page 59: Ch5-Digital Modulation Techniques

multi-dimensional

For the N-dimensional case, a set of orthonormal functionsis required to present all the possible transmitted signals .

M = 2 for binary case.

( ) ( ) ( ){ }ttt Nφφφ ,...,, 21

( ) ( ) ( ){ }tststs M,...,, 21

Page 60: Ch5-Digital Modulation Techniques

Transmitted signal can be presented as a linear combination:

(5.2-12)

for i= 1,…, M and

And

(5.2-13)

( ) ( )∑=

=N

jjiji tsts

1

φ

Tt ≤≤0

( ) ( )0

10

T

i j

i jt t dt

i jφ φ

=⎧= ⎨ ≠⎩

Page 61: Ch5-Digital Modulation Techniques

We may plot the signal vectoras a point in the

N-dimensional signal space to represent the time-domain signal .

1 2, , ,i i i is s s s⎡ ⎤=⎣ ⎦N

)(tsi

Page 62: Ch5-Digital Modulation Techniques

5.3 Binary Phase-Shift Keying (BPSK)

In a BPSK system, we use a pair of signals and to represent binary symbols 1 and 0, respectively, as follows:

)(1 ts )(2 ts

( ) ( )

( ) ( ) ( )

1

2

2 cos 2 (5.3-1)

2 2cos 2 cos 2 (5.3 2)

bc

b

b bc c

b b

Es t f tT

E Es t f t f tT T

π

π π π

=

= + = − −

Page 63: Ch5-Digital Modulation Techniques

where 0 < t < Tb , Eb is the transmitted energy per bit, and fc is the carrier frequency which is chosen to be equal to

for some fixed integer nc.

The averaged transmitted signal energy which is expressed as

bc Tn

( ) ( )2 21 20 0

0.5 0.5T Tb b

bs t dt s t dt E+ =∫ ∫

Page 64: Ch5-Digital Modulation Techniques

A pair of sinusoidal waves that differ on in a relative phase shift of 180 degreesare referred to as antipodal signals.

Fig. 5.3-1(a):A transmitted signal when the binary stream is “1001101” where Eb = 1, fc = 5 Hz, and Tb = 1 sec.

Page 65: Ch5-Digital Modulation Techniques

Fig. 5.3-1 Signals of BPSK, (a) the transmitted signal, (b) the signal , (c) the output of the correlator and the corresponding sampling points.

( ) ( )tftr cπ2cos21

Page 66: Ch5-Digital Modulation Techniques

Fig. 5.3-2:An optimal detector for BPSK system.

Fig. 5.3-2 A coherent detector for BPSK.

0( )

Tdt•∫

bt T=

X( )r t ( )y t

2 / cos(2 )b cT f tπ

λ

Say "1" if Say "0" if

xx

λλ

><

Page 67: Ch5-Digital Modulation Techniques

Fig. 5.3-2:The received signal is first multiplied by the unit energy truncated signal

if and if otherwise.

Assuming the received signal is noise-free, we have the following expression after multiplication

(5.3-3)

( ) ( )tfTt cb πφ 2cos21 = bTt ≤≤0 0)(1 =tφ

( ) ( ) ( )tfT

tsty cb

π2cos2×=

Page 68: Ch5-Digital Modulation Techniques

Therefore,

(5.3-4)

Fig. 5.3-1 (b):An example of the signal y(t).

2

2

2cos (2 ) if 1 was transmitted

( )2

cos (2 ) if 0 was transmitted

bc

b

bc

b

Ef t

Ty t

Ef t

T

π

π

⎧⎪⎪= ⎨⎪−⎪⎩

Page 69: Ch5-Digital Modulation Techniques

The two possible outcomes from the output of the correlator for noiseless case can be shown to be:

(5.3-5)

The threshold value in this case must be set to 0 which corresponds to the center between and .

if 1 was transmitted

if 0 was transmittedb

b

Ex

E

⎧+⎪= ⎨−⎪⎩

λ

bE− bE

Page 70: Ch5-Digital Modulation Techniques

Fig. 5.3-1 (c):Plot the output signal of the integrator and the corresponding sampling points.

If the sampled value is greater then zero, a decision of 1 is made. If the sampled value is less than zero, a decision of 0 is made.

Page 71: Ch5-Digital Modulation Techniques

The decision device based on the sampled values makes a decision of “1001101” which is exactly the same as the transmitted sequence.

For geometric representation, and can be expressed in terms of

as follows:

(5.3-6)

)(1 ts)(2 ts

( ) ( )( ) ( ) .012

011

0,

0,

TttEts

TttEts

b

b

≤≤−=

≤≤=

φ

φ

( )1 2/ cos(2 )b ct T f tφ π=

Page 72: Ch5-Digital Modulation Techniques

Fig. 5.3-3:A coherent BPSK system is characterized by having a signal space that is one-dimensional, with a signal constellation consisting of two message points.

Page 73: Ch5-Digital Modulation Techniques

Fig. 5.3-3 Signal-space diagram for coherent BPSK.

The decision boundary is determined by the threshold value which in this case is equal to 0.

bE0λ = 1φ

1Z2Z

bE−

λ

Page 74: Ch5-Digital Modulation Techniques

If the received signal x lies in region Z1, then a decision of 1 is made. If the received signal x lies in region Z2, then a decision of 0 is made.

The transmitted BPSK signal can be expressed as:

(5.3-7)( ) 1 ( )b k bk

s t E b t kTφ∞

=−∞

= −∑

Page 75: Ch5-Digital Modulation Techniques

where .

is actually a truncated cosine waveform as shown in Figure 5.3-4.

Fig. 5.3-4 A truncated cosine waveform .

{ 1, 1}kb ∈ + −

1( )tφ

bTt

1( )tφ

0

1( )tφ

Page 76: Ch5-Digital Modulation Techniques

Let .

The PSD for can be calculated from Equation (5.1-10)

(5.3-8)

can be expressed as:

(5.3-9)

1( ) ( )bh t E tφ=

21( ) | ( ) |sb

P f H fT

=

1( )tφ

1/ 22( ) cos(2 )b

cb b

t Tt f tT T

φ π⎛ ⎞−

= Π ⎜ ⎟⎝ ⎠

( )s t

Page 77: Ch5-Digital Modulation Techniques

where is called the rectangular function and defined as follows:

so for ,

and , otherwise.

( )xΠ

1 11 if ( ) 2 2

0 otherwise

xx

⎧ − ≤ ≤⎪Π = ⎨⎪⎩

/ 2 1b

b

t TT

⎛ ⎞−Π =⎜ ⎟⎝ ⎠ bTt ≤≤0

/ 2 0b

b

t TT

⎛ ⎞−Π =⎜ ⎟⎝ ⎠

Page 78: Ch5-Digital Modulation Techniques

Fourier transform of the product of two functions in time-domain is equivalent to the convolution of the Fourier transformsof these two functions.

(5.3-11)/2( ) * [cos(2 )]b

b cb

t TH f E F F f tT

π⎡ ⎤⎛ ⎞−

= Π⎢ ⎥⎜ ⎟⎝ ⎠⎣ ⎦

Page 79: Ch5-Digital Modulation Techniques

From Equation (3.3-19), the Fourier transform of the rectangular function is:

(5.3-12)

From Equation (3.5-11), we have

(5.3-13)

/ 2 sinc( ) bj T fbb b

b

t TF T T f eT

π−⎡ ⎤⎛ ⎞−Π =⎢ ⎥⎜ ⎟⎝ ⎠⎣ ⎦

1 1[cos(2 )] ( ) ( )2 2c c cF f t f f f fπ δ δ= − + +

Page 80: Ch5-Digital Modulation Techniques

We can see:

(5.3-14)

Assume . Then

(5.3-15)

- ( ) - ( )( ) sinc( ( - )) sinc( ( ))4 4

b c b cj T f f j T f fb bb b c b b c

E EH f T T f f e T T f f eπ π− += + +

1/c bf T>>

2 2 2 2 2( ) sinc ( ( - )) sinc ( ( ))4 4b b

b b c b b cE EH f T T f f T T f f= + +

Page 81: Ch5-Digital Modulation Techniques

The PSD is:

(5.3-16)

The PSD for the case with , (data rate is ) and is illustrated in Fig. 5.3-5.

2

2 2

1( ) | ( ) |

sinc ( ( - )) sinc ( ( ))4 4

sb

b bb b c b b c

P f H fT

E ET T f f T T f f

=

= + +

1bE = 1bT sμ=

6MHzcf =1/ 1 Mbit/secbR T= =

Page 82: Ch5-Digital Modulation Techniques

Fig. 5.3-5 The PSD for a BPSK signal.

The main role of the signal concentrates over the carrier frequency =6MHz.The bandwidth of the signal is 2MHz.

cf

Page 83: Ch5-Digital Modulation Techniques

We use a carrier frequency to transmit the signal.

The signal bandwidth is determined by the data rate.

The higher the data rate, the smaller and the larger .

bT2/ bT

Page 84: Ch5-Digital Modulation Techniques

5.4 Binary Frequency-Shift Keying (FSK)

In a binary FSK system, symbols 1 and 0 are distinguished from each other by transmitting one of two sinusoidal wavesthat differ in frequency by a fixed amount.

Page 85: Ch5-Digital Modulation Techniques

A typical pair of sinusoidal waves is:

(5.4-1)

for , where is the transmitted signal energy per bit.

( ) ( )

( ) ( )tfTEts

tfTEts

b

b

b

b

22

11

2cos2

2cos2

π

π

=

=

bTt <≤0 bE

Page 86: Ch5-Digital Modulation Techniques

The transmitted frequency is:

for some fixed integer

and i = 1, 2. (5.4-2)

Note:

s1(t) symbol 1 s2(t) symbol 0

b

ci T

inf += cn

bTff 112 =−

Page 87: Ch5-Digital Modulation Techniques

s1(t) and s2(t) are orthogonal.

Define:

for i = 1, 2 and (5.4-3)

and are orthonormal basis functions.

( ) ( )tfT

t ib

i πφ 2cos2=

bTt <≤0

( )t1φ ( )t2φ

Page 88: Ch5-Digital Modulation Techniques

Show that and have unit energy:

The energy of the signal over (0,Tb) is given by:

(5.4-4)

( )t1φ ( )t2φ

( )tiφ

( ) ( )

( )

( ) .4sin8

12

2

4cos21

212

2cos2

00

00

0

2

0

2

⎟⎟⎠

⎞⎜⎜⎝

⎛+=

⎟⎠⎞

⎜⎝⎛ +=

=

∫∫

∫∫

bb

bb

bb

T

ii

T

b

T

i

T

b

T

ib

T

i

tff

tT

dttfdtT

dttfT

dtt

ππ

π

πφ

Page 89: Ch5-Digital Modulation Techniques

Substituting into the above equation, we have:

(5.4-5)

The last equality follows since nc + i is a positive integer. the second term in the brackets is zero.

( ) bci Tinf +=

( ) ( )

( ) ( )( )

.1

4sin8

12

2

04sin8

102

20

2

=

⎟⎟⎠

⎞⎜⎜⎝

⎛+

++=

⎟⎟⎠

⎞⎜⎜⎝

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛−⎟⎟⎠

⎞⎜⎜⎝

⎛ ++

+⎟⎠⎞

⎜⎝⎛ −=∫

ππ

ππ

φ

inTin

TT

TT

inTin

TT

dtt

cbc

b

b

bb

c

bc

b

b

T

ib

Page 90: Ch5-Digital Modulation Techniques

(5.4-6)

Substituting into the above equation:

(5.4-7)

( ) ( ) ( ) ( )

( )( ) ( )( ) .2cos2cos1

2cos2cos2

0 2121

0 210 21

∫∫

−++=

=

b

bb

T

b

T

b

T

dttfftffT

dttftfT

dttt

ππ

ππφφ

( ) bci Tinf +=

( ) ( ) ( ).12cos

322cos1

000 21 ⎟⎟⎠

⎞⎜⎜⎝

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛+⎟⎟

⎞⎜⎜⎝

⎛ += ∫∫∫

bbb T

b

T

b

c

b

Tdtt

Tdt

Ttn

Tdttt ππφφ

Page 91: Ch5-Digital Modulation Techniques

Since 2nc+1 is a positive integer, the first integration integrates the cosine term over exactly 2nc + 1 periods.

the first term is zero.

The second term is integrated over one period of a cosine signal and hence the result is also zero.

(5.4-8)( ) ( )1 200.

Tb t t dtφ φ∴ =∫

Page 92: Ch5-Digital Modulation Techniques

Let .

By Equation (5.4-2), we haveand

By using Equations (3.1-6) and (3.1-7), we can conclude that and are orthonormal.

0 1/ bf T=

02 )2( fnf c += 01 )1( fnf c +=

( )t1φ ( )t2φ

Page 93: Ch5-Digital Modulation Techniques

To generate a binary FSK signal:

Fig. 5.4-1 A modulator for an FSK system.

1 1( ) 2 / cos(2 )bt T f tφ π=

2 2( ) 2 / cos(2 )bt T f tφ π=

∑( )s t

( )m t

( )m t

Page 94: Ch5-Digital Modulation Techniques

Fig. 5.4-1:symbol 1 is represented by a constant amplitude of . symbol 0 is represented by zero.

If the transmitted symbol is 1, the carrier of the upper channel will be turned on, and that of the lower channel will be turned off.

If the transmitted symbol is 0, the carrier of the upper channel will be turned off, and that of the lower channel will be turned on.

bE

Page 95: Ch5-Digital Modulation Techniques

The resulting output signal is altered between two carriers of different frequencies controlled by the input symbol.

Fig. 5.4-2 (a) gives an example of resulting waveform when the input binary stream is “1001101”, where , sec,

Hz, and Hz.1=bE 1=bT

31 =f 42 =f

Page 96: Ch5-Digital Modulation Techniques

Fig. 5.4-2 Signals for an FSK system, (a) the transmitted signal, (b) the multiplication output

( ) ( ) ( )tfTtstz b 11 2cos2 π=

Page 97: Ch5-Digital Modulation Techniques

Fig. 5.4-2 Signals for an FSK system(c) the multiplication output (d) the difference between two outputs of the

integrators and the corresponding sampling points.

( ) ( ) ( )tfTtstz b 22 2cos2 π=

Page 98: Ch5-Digital Modulation Techniques

If we want to detect , we multiply the received signal by and integrate.

part will disappear totally and only the coefficient of remains.

Since only one of the coefficients is nonzero, we can easily see whether 1 or 0 is transmitted.

( )t1φ( )t1φ

( )t2φ( )t1φ

Page 99: Ch5-Digital Modulation Techniques

Fig. 5.4-3 A coherent detector for an FSK system.

1( )tφ

2 ( )tφ

0( )bT

dt•∫

0( )bT

dt•∫

( )r t ∑

1x

2x

y

Page 100: Ch5-Digital Modulation Techniques

Fig. 5.4-3:The correlator outputs are subtracted, one from the other, and the resulting difference, y, is compared with a thresholdof zero.

If y > 0, the receiver decides in favor of 1. If y < 0, the receiver decides in favor of 0.

Page 101: Ch5-Digital Modulation Techniques

Noiseless case:The received signal is exactly the transmitted signal.

If the signal (representing 1) was transmitted, the outputs and of the correlators can be expressed as:

(5.4-9)

1x 2x

( ) ( )

( ) ( ) .02cos22cos2

2cos22cos2

0 212

0 111

==

==

∫T

bb

b

b

T

bb

b

dttfT

tfTE

x

EdttfT

tfTE

x

ππ

ππ

Page 102: Ch5-Digital Modulation Techniques

If the signal (representing 0) was transmitted, the outputs of the correlatorscan be expressed as:

(5.4-10)

If was transmitted,If was transmitted,

( ) ( )

( ) ( ) .2cos22cos2

02cos22cos2

0 222

0 121

b

T

bb

b

T

bb

b

EdttfT

tfTE

x

dttfT

tfTE

x

==

==

ππ

ππ

1 2 0y x x= − >( )1s t( )2s t

1 2 0y x x= − <

Page 103: Ch5-Digital Modulation Techniques

Fig. 5.4-2(b):The received signal multiplied by carrier with Hz and the result is

.

Fig. 5.4-2(c):The received signal multiplied by carrier with Hz and the result is

( ) ( ) ( )1 12 cos 2bz t s t T f tπ= ×

31 =f

( ) ( ) ( )2 22 cos 2bz t s t T f tπ= ×2 4f =

Page 104: Ch5-Digital Modulation Techniques

The decision device based on the sampled values makes a decision of “1001101” which is exactly the same as the transmitted sequence.

This FSK system is based upon the basic concept that we are transmitting two signals which are orthonormal to each other and form a basis.

Page 105: Ch5-Digital Modulation Techniques

If we transmit two signals (1,0) and (0,1):These two vectors form a basis.

the inner product of (1,0) and (0,1) is 0 and .

Detect signals:use the inner product.

)1,0()0,1( =

Page 106: Ch5-Digital Modulation Techniques

Ex: When we perform an inner product of the received signal with (1,0):

If the transmitted signal is (1,0), the resulting inner product is 1. If the transmitted signal is (0,1), the resulting inner product is 0.

Page 107: Ch5-Digital Modulation Techniques

In Equation (5.4-3), and are two orthonormal basis functions.

The signal points s1(t) and s2(t) can be expressed as:

for i = 1, 2 and . (5.4-11)

( )t1φ ( )t2φ

( ) ( ) ( )tststs iii 2211 φφ +=

Tt <≤0

Page 108: Ch5-Digital Modulation Techniques

Fig. 5.4-4:A coherent binary FSK system is characterized by having a signal space which is two-dimensional with two message points.

The two message points are defined by and . 1 ( ,0)bs E= ),0(2 bEs =

Page 109: Ch5-Digital Modulation Techniques

Fig. 5.4-4 Signal space diagram for binary FSK.

bE

bE

2

RegionZ

1

RegionZ

2 bE

1s

2s

Page 110: Ch5-Digital Modulation Techniques

Fig. 5.4-4:The decision boundary is characterized by the line with .

If (the received signal point lies in region Z1) , the decision device makes a decision of 1. If (the received signal point lies in region Z2) , the decision device makes a decision of 0.

021 =− xx

1 2 0x x− >

1 2 0x x− <

Page 111: Ch5-Digital Modulation Techniques

The bandwidth of the FSK system is .

By Figures 5.2-4 ,5.3-3, and 5.4-4: The distances between two signal points for the binary ASK, BPSK, and FSK systems are , and ,respectively.

Under the same transmitted bit energy and the same level of noise corruption, the BPSK system gives the lowest bit error ratesince BPSK system has the largest distance between two signal points.

bE2 bE2 bE2

2 / bT

Page 112: Ch5-Digital Modulation Techniques

5.5 Quadriphase-Shift Keying (QPSK)

The important goals in the design of a digital communication system are:1. provide a reliable communication, i.e.,

achieve a very low probability of error. 2. the efficient utilization of channel

bandwidth.

Page 113: Ch5-Digital Modulation Techniques

113QPSK transmit two bits simultaneously during one signaling interval .

QPSK double the transmitted bit ratewithout increasing the transmitted bandwidth.

The two transmitted bits denoted as and . They are separated from a

single bit stream .

T

1m 2mm

Page 114: Ch5-Digital Modulation Techniques

Fig. 5.5-1 A schematic diagram of QPSK.

01

m⎧

= ⎨⎩

1

/ 2

/ 2

Ea

E

⎧+⎪= ⎨−⎪⎩

2

/ 2

/ 2

Ea

E

⎧+⎪= ⎨−⎪⎩

2 / cos(2 )cT f tπ

∑ ( )s t

2 / sin(2 )cT f tπ

Page 115: Ch5-Digital Modulation Techniques

Fig. 5.5-1:represents even bits of and represents odd bits of .

will go up and will go down.

The following rules will follow: 1. will trigger signal a1 and will trigger

signal a2.

1m m2m m

1m 2m

1m 2m

Page 116: Ch5-Digital Modulation Techniques

2. If is equal to 1(0), a1 is set to be .

3. If is equal to 1(0), a2 is set to be .

4. a1 (a2) will be multiplied by .

1m( )2 2EE+ −

2m

( )2 2EE+ −

( ) ( )( )2 cos 2 2 sin 2c cT f t T f tπ π

Page 117: Ch5-Digital Modulation Techniques

5. The signal transmitted at any time t is

(5.5-1)

The relationship between and is as shown in Table 5.5-1.

( ) ( ) ( )tfT

atfT

ats cc ππ 2sin22cos221 +=

),( 21 mm ),( 21 aa

Page 118: Ch5-Digital Modulation Techniques

Table 5.5-1 The mapping of ’s to ’s

),( 21 mm),( 21 aa

),( 21 mm ),( 21 aa

⎟⎠⎞⎜

⎝⎛

2,2EE(1 , 1 )

(1, 0 )

(0 ,1)

(0, 0)

⎟⎠⎞⎜

⎝⎛ − 2,2

EE

⎟⎠⎞⎜

⎝⎛− 2,2

EE

⎟⎠⎞⎜

⎝⎛ −− 2,2

EE

Page 119: Ch5-Digital Modulation Techniques

In Equation (5.5-1), we can easily show that

(5.5-2)

where and

, .

is related to the values of and .

)2cos(2)( θπ −= tfrT

ts c

22

21 aar +=

1

21tanaa−=θ

221Eaa == Er =

θ 1is 2is

Page 120: Ch5-Digital Modulation Techniques

There are four possible values of , corresponding to four distinct combinations of and .

Every assumes an integer multiplication of .

From Equation 5.5-2: There are four different ’s, denoted as

for i = 1, 2, 3, 4.

θ

1a 2a

θ4π

)(ts)(tsi

Page 121: Ch5-Digital Modulation Techniques

for

(5.5-3)

Ex: and

i = 1, and

( ) ( ) ⎟⎠⎞

⎜⎝⎛ −+=

4122cos2 ππ itf

TEts ci .0 Tt <≤

11 =m 02 =m

1 2Ea = 2 2

Ea =−

Page 122: Ch5-Digital Modulation Techniques

(5.5-4)

Expand Equation (5.5-3) as follows:

(5.5-5)

1( ) (cos(2 ) sin(2 ))

2 2( 2( cos(2 ) sin(2 ))2 2

2 (cos( )cos(2 ) sin( )sin(2 ))4 4

2 cos(2 ).4

c c

c c

c c

c

Es t f t f tTE f t f tTE f t f t

TE f t

T

π π

π π

π ππ π

ππ

∴ = −

= −

= −

= +

( ) ( ) ( ) ( ) ( )tfiTEtfi

TEts cc ππππ 2sin

412sin22cos

412cos2

1 ⎟⎠⎞

⎜⎝⎛ −−⎟

⎠⎞

⎜⎝⎛ −=

Page 123: Ch5-Digital Modulation Techniques

By Equation (5.5-5): and

(5.5-6)

for corresponds to respectively.

( see Table 5.5-1. )

( )1 cos 2 14

a E i π⎛ ⎞= + −⎜ ⎟⎝ ⎠

( )2 sin 2 14

a E i π⎛ ⎞=− −⎜ ⎟⎝ ⎠

)(tsi ,4,3,2,1=i,11,01,00,1021 =mm

Page 124: Ch5-Digital Modulation Techniques

Fig. 5.5-1:The stream of input data is 10011011.

The upper stream (odd numbered bits) is 1011 and the lower stream (even numbered bits) is 0101.

At each time slot, one bit from the upper stream is combined with a corresponding bit from the lower stream.

output data stream is (10, 01, 10, 11).

Page 125: Ch5-Digital Modulation Techniques

From Table 5.5-2:The signals sent for these four time slots are .

signal is determined by and .

Rewrite Equation (5.5-1) as follows:

The job of demodulation is to detect A and B..

)(),(),(),( 4131 tstststs

)(tsi 1m 2m

)2sin()2cos()( tfBtfAts cc ππ +=

Page 126: Ch5-Digital Modulation Techniques

Table 5.5-2 Signal-space Characterization of QPSK.

2E+

2E−

2 cos (2 4)cE T f tπ π+

43π 2E− 2E− 2 cos(2 3 4)cE T f tπ π+

45π

2E−

2E+ 2 cos(2 5 4)cE T f tπ π+

47π 2E+

2E+

2 cos(2 7 4)cE T f tπ π+11s4(t)

01s3(t)

00s2(t)

10s1(t)

si(t)a2a1PhaseInput Digit

(m1m2)

Page 127: Ch5-Digital Modulation Techniques

Fig. 5.5-2 The four QPSK signals .for where fc = 1

(a) signal of , (b) signal of,4,3,2,1=i

)(1 ts )(2 ts

Page 128: Ch5-Digital Modulation Techniques

Fig. 5.5-2 The four QPSK signals .for where fc = 1

(a) signal of , (b) signal of,4,3,2,1=i

)(3 ts )(4 ts

Page 129: Ch5-Digital Modulation Techniques

Basic principle of QPSK demodulation

and are orthogonal.

To detect A, we multiply by and integrate.

eliminate B and only A remains.

To detect B, we multiply by and integrate.

eliminate A and only B remains.

)2cos( tfcπ )2sin( tfcπ

)(tsi )2cos( tf cπ

)(tsi )2sin( tf cπ

Page 130: Ch5-Digital Modulation Techniques

Fig. 5.5-3 Demodulator for QPSK.

2 / cos(2 )cT f tπ

0( )

Tdt•∫

0( )

Tdt•∫

t T=

t T=

1x

2x

Page 131: Ch5-Digital Modulation Techniques

Fig. 5.5-3:The received signal is first multiplied by two sinusoids and

The results are then integrated respectively by two integrators.

The outputs of the integrators are sampled at t = T.

( )tfT cπ2cos2 ( )tfT cπ2sin2

Page 132: Ch5-Digital Modulation Techniques

For noiseless case, the resulting sampled output x1 can be expressed as:

(5.5-7)

( ) ( ) ( )

( ) ( ) ( )

( ) ( ) .4sin2124cos

21

212

2cos2sin22cos2

2cos22sin22cos2

0201

020

21

0 211

⎟⎠⎞

⎜⎝⎛+⎟

⎠⎞

⎜⎝⎛ +=

⎟⎠⎞⎜

⎝⎛+⎟

⎠⎞⎜

⎝⎛=

×⎟⎟⎠

⎞⎜⎜⎝

⎛+=

∫∫

∫∫

T

c

T

c

T

cc

T

c

c

T

cc

dttfT

adttfT

a

dttftfT

adttfT

a

dttfT

tfT

atfT

ax

ππ

πππ

πππ

Page 133: Ch5-Digital Modulation Techniques

Replacing in the above equation where is a positive integer:

(5.5-8)

Tnf cc =

cn

( ) ( )

( ) ( ) ( ) .8

18

120002

2

4cos8

124sin8

12

2

21

02

011

⎟⎟⎠

⎞⎜⎜⎝

⎛+−+⎟⎟

⎞⎜⎜⎝

⎛+−⎟

⎠⎞

⎜⎝⎛ +=

⎟⎟⎠

⎞⎜⎜⎝

⎛⎟⎠⎞

⎜⎝⎛−+⎟⎟

⎞⎜⎜⎝

⎛⎟⎠⎞

⎜⎝⎛+=

TnTnTaT

Ta

tTn

TnTat

Tn

Tnt

Tax

cc

Tc

c

Tc

c

ππ

ππ

ππ

Page 134: Ch5-Digital Modulation Techniques

and for any positive integer .

(5.5-9)

Similarly,

(5.5-10)

0)4sin( =cnπ 1)4cos( =cnπ

cn

11 ax =

( ) ( ) ( ) .2sin22sin22cos220 212 adttfTtf

Tatf

Tax c

T

cc =×⎟⎟⎠

⎞⎜⎜⎝

⎛+=∫ πππ

Page 135: Ch5-Digital Modulation Techniques

The original messages and can be separated at the receiver and can be detected independently.

Decision devices: for upper channel:If , decide .If , decide .

1a 2a

1 0x > 1 1m =

1 0x < 1 0m =

Page 136: Ch5-Digital Modulation Techniques

for lower channel: If , decide .If , decide .

Finally, these two binary sequences are combined in a parallel-to-serial converter to reproduce the original binary sequence at the transmitter input.

2 0x > 2 1m =

2 0x < 2 0m =

Page 137: Ch5-Digital Modulation Techniques

Fig. 5.5-4 Signals of QPSK for fc = 1(a) the transmitted signal, (b) the signal ( ) ( ) ( )tfTtsty cπ2cos21 ×=

Page 138: Ch5-Digital Modulation Techniques

Fig. 5.5-4 Signals of QPSK for fc = 1(c) the signal of(d) the output of the upper integrator and the

corresponding sampling points

( ) ( ) ( )tfTtsty cπ2sin22 ×=

Page 139: Ch5-Digital Modulation Techniques

Fig. 5.5-4 Signals of QPSK for fc = 1(e) the output of the lower integrator and the corresponding sampling points.

Page 140: Ch5-Digital Modulation Techniques

Fig. 5.5-4:Transmitted signal is given in Fig. 5.5-4 (a) which is a modulated signal with the input bit stream “10011011”, where , fc = 1 Hz and T = 2 sec.

At the receiver, the signals after the multiplication of carriers denoted by

and are given in Fig. 5.5-4(b) and Fig. 5.5-4(c) respectively.

( ) ( ) ( )1 2 cos 2 cy t s t T f tπ= × ( ) ( ) ( )2 2 sin 2 cy t s t T f tπ= ×

Page 141: Ch5-Digital Modulation Techniques

The outputs from the integrators and the corresponding sampling points and

are given in Fig. 5.5-4(d) and Fig. 5.5-4(e), respectively.

Based on the sampled values, the decision output after the parallel-to-serial converter is “1001101” which is exactly the same as the transmitted sequence.

1x2x

Page 142: Ch5-Digital Modulation Techniques

Consider the input datum is 1 0. According to Table 5.5-1:

).4

2cos(2)( ππ += tTEts

Page 143: Ch5-Digital Modulation Techniques

Thus,

).293.0)8

2(cos2(

)707.01)8

2(cos2(

)221)

82(cos2(

))4

cos()4

4(cos(

))4

cos()4

4)(cos(21(2

)2cos(2)4

2cos(2)(

2

2

2

1

−+=

+−+=

+−+=

++=

++=

+=

ππ

ππ

ππ

πππ

πππ

πππ

tTE

tTE

tTE

tTE

tT

E

tT

tTEty

Page 144: Ch5-Digital Modulation Techniques

For this case, is positive for most time, as shown in Fig. 5.5-4(b).

Basic principle of the QPSK system:Mixes two bits together and transmits them at the same time.

They can be detected correctly because there are two orthonormal functions and

contained in the expansion of .

)(1 ty

( )1 tφ

( )2 tφ )(tsi

Page 145: Ch5-Digital Modulation Techniques

(5.5-11)

It is easy to verify that and are orthonormal basis functions:

(5.5-12)and

for i=1,2. (5.5-13)

( ) ( )

( ) ( ) .02sin2

02cos2

2

1

TttfT

t

TttfT

t

c

c

≤≤=

≤≤=

πφ

πφ

( )1 tφ ( )2 tφ

( ) ( )1 200

Tt t dtφ φ =∫

( )∫ =T

i dtt0

2 1φ

Page 146: Ch5-Digital Modulation Techniques

The transmitted signal can be expressed as:

(5.5-14)

Equation (5.5-14) :Demodulation of the QPSK system can be done by multiplying by and

and integrating over .

( ) ( ) ( )tststs iii 2211 φφ +=

)(tsi )(1 tφ)(2 tφ [0, ]T

Page 147: Ch5-Digital Modulation Techniques

In the QPSK system, there are four vectors for which can be

represented as signal points in the signal space diagram as shown in Fig. 5.5-5.

The bandwidth of the system is .in terms of bit duration is .

The higher the bit rate, the larger the bandwidth.

),( 21 iii sss = 4,3,2,1=i

2 / 2 / 2 bT T=1 / bT

Page 148: Ch5-Digital Modulation Techniques

Fig. 5.5-5 Signal-space diagram of a QPSK system.

E

/ 2E

/ 2E

/ 2E−

/ 2E−1s2s

3s4s

Page 149: Ch5-Digital Modulation Techniques

It is possible to increase the transmitted bit rate by increasing the number of signals in the signal constellation.

Ex: Double the number of QPSK signals, resulting in 8 signal points as shown in Fig. 5.5-6.

Page 150: Ch5-Digital Modulation Techniques

For this QPSK system, there is a carrier frequency as the transmitted signal is a cosine function with frequency . The bandwidth of the system is still . Since for QPSK , the bandwidth of the system in terms of bit duration is . The higher the bit rate, the larger the bandwidth.

Page 151: Ch5-Digital Modulation Techniques

Fig. 5.5-6 Signal-space diagram of coherent 8PSK system.

E

/ 2E

/ 2E

/ 2E−

/ 2E−1s

2s

5s

4s

3s

3s

6s

7s

8s

Page 152: Ch5-Digital Modulation Techniques

Fig. 5.5-6:The signal constellation is called 8PSK which can transmit three bits at each signaling interval without increasing the transmitted bandwidth.

Under the same transmitted signal energy per symbol:the distance between two nearest points is: 8PSK <QPSK

an 8PSK detector will make more errors than those of the QPSK systems.

Page 153: Ch5-Digital Modulation Techniques

Increase the transmitted signal energy can achieve the same bit error rate as that of a QPSK system.

Page 154: Ch5-Digital Modulation Techniques

5.6 Quadrature Amplitude Modulation

Fig. 5.6-1:BPSK, QPSK and 8PSK systems can be viewed as special cases of a more general class of digital modulation system, called the PSK.

The signals sent are only different in their phases.

Page 155: Ch5-Digital Modulation Techniques

Fig. 5.6-1 The Signal-space diagrams for BPSK, QPSK and 8PSK

1φEE−

E

/ 2E

/ 2E

/ 2E−

/ 2E−1s2s

3s4s

E

/ 2E

/ 2E

/ 2E−

/ 2E−1s

2s

5s

4s

3s

3s

6s

7s

8s

Page 156: Ch5-Digital Modulation Techniques

BPSK: the phase difference is . QPSK: the phase difference is .8PSK: the phase difference is .

M-ary PSK system:Let , and k is the number of transmitted bits.

π2

π

kM 2=

Page 157: Ch5-Digital Modulation Techniques

The transmitted signal can be represented:

for (5.6-1)

Each represents a possible state of sending k bits together.

( ) ( )2 cos 2 2 1i cEs t f t i

T Mππ⎛ ⎞= + −⎜ ⎟

⎝ ⎠

1, 2,...,i M=

)(tsi

Page 158: Ch5-Digital Modulation Techniques

Similar to Equation (5.5-14), the signal can be equivalently written by

for (5.6-2)where and are defined in (5.5-10) as follows:

( ) ( ) ( )tststs iii 2211 φφ +=

1, 2,...,i M=( )1 tφ ( )2 tφ

Page 159: Ch5-Digital Modulation Techniques

(5.6-3)

It can be easily seen that

(5.6-4)

)2sin(2)(

)2cos(2)(

2

1

tfT

t

tfT

t

c

c

πφ

πφ

=

=

( )1 cos 2 1is E iMπ⎛ ⎞= −⎜ ⎟

⎝ ⎠

( ) ⎟⎠⎞

⎜⎝⎛ −−=

MiEsi

π12sin2

Page 160: Ch5-Digital Modulation Techniques

Plot the locations of the vectors on a signal-space diagram.

For PSK systems, the locations of the vector are on a circle of radius .

(see Fig. 5.5-5 and Fig. 5.5-6 )

In an M-ary PSK system, the message points are always on a circle of radius .

1 2( , )i is s

1 2( , )i is s E

E

Page 161: Ch5-Digital Modulation Techniques

8PSK system:Three bits are sent together.

there are possible states.

Label these 8 states arbitrarily by .

Each state is represented by where each or 0.

823 =

8,,2,1=i

),,( 321 xxx1=ix

Page 162: Ch5-Digital Modulation Techniques

Each corresponds to a number if we use the binary numbering system.

For instance (0,0,0) corresponds to 0, and (1,0,0) corresponds to 4 and (0,1,1) corresponds to 3.

Suppose a vector corresponds to j. Label

),,( 321 xxx

i

1+= ji

Page 163: Ch5-Digital Modulation Techniques

Table 5.6-1 A possible labeling of ),,( 321 mmm

),,( 321 mmm

8(1,1,1)7(1,1,0)6(1,0,1)5(1,0,0)4(0,1,1)3(0,1,0)2(0,0,1)1(0,0,0)

i

Page 164: Ch5-Digital Modulation Techniques

The modulating algorithm for the 8PSK system is as follows:

Step 1: For the particular transmitted bits , find its corresponding index i from the table relating ’s to i’s.

Step 2: Send the signal out according to Equation (5.6-1) by using the determined i.

),,( 321 mmm),,( 321 mmm

Page 165: Ch5-Digital Modulation Techniques

The received signal is in the form of Equations (5.6-2) and (5.6-3).

and are orthogonal, and can be obtained by the concept of inner product.

The index i can be found by using Equation (5.6-4).

)2cos(2)(1 tfT

t cπφ = )2sin(2)(2 tfT

t cπφ =

1is 2is

Page 166: Ch5-Digital Modulation Techniques

After i is determined, can be determined through Table (5.6-1).

The demodulating algorithm for the 8PSK system is as follows:

Step 1. For the received signal , perform an inner product

to determine ( ) based upon Equations (5.6-2) and (5.6-3).

),,( 321 mmm

)(tsi( )tfts ci π2cos),(

( )tfts ci π2sin),( 1is 2is

Page 167: Ch5-Digital Modulation Techniques

Step 2. Use the value of or to find the index i based upon Equation (5.6-4).

From the table relating ’s to i’s, determine the corresponding .

The above scheme can be used for any PSK system.

1is 2is

),,( 321 mmm),,( 321 mmm

Page 168: Ch5-Digital Modulation Techniques

When we send k bits together, we label each possible state as a distinct i , and later when this state occurs, we use Equation (5.6-4) to determine and

If we send more bits together, we will have more points on the circle and a higher error rate.

),,,( 21 kxxxki 21 ≤≤

1is .2is

Page 169: Ch5-Digital Modulation Techniques

Now, introduce a method to send bits together which avoids above problem.

M-ary quadrature amplitude modulation (M-QAM) system.

M-QAM system:The constraint expressed in Equation (5.6-1) is removed, and the components

and are modulated independently. 1is 2is

Page 170: Ch5-Digital Modulation Techniques

An M-ary QAM signal can be expressed:

for (5.6-5)where and are orthogonal.

Two independent messages can be modulated over the amplitudes and of and , respectively.

( ) ( ) ( )tststs iii 2211 φφ +=

1, 2 , ...,i M=( )1 tφ ( )2 tφ

1is 2is( )1 tφ ( )2 tφ

Page 171: Ch5-Digital Modulation Techniques

The and can take values from a finite set of numbers.

Ex: 16-QAM modulation and may take values from

.

All the possible signal points (signal constellation) for the 16-QAM are shown in Fig. 5.6-2.

1is 2is

1is 2is{ 3, 1, 1, 3}− − + +

Page 172: Ch5-Digital Modulation Techniques

Fig. 5.6-2 A signal constellation for 16-QAM.

1is

2is

Page 173: Ch5-Digital Modulation Techniques

Fig. 5.6-2:There are 16= points in the signal constellation, the system is capable of transmitting 4 bits per signaling interval.

The message bits are denoted by the vector with .

The message vector is divided into two vectors and .

42

1 2 3 4( , , , )b b b b {0,1}ib ∈

1 2 3 4( , , , )b b b b

1 2( , )b b 3 4( , )b b

Page 174: Ch5-Digital Modulation Techniques

The first vector is mapped to , related to the first two bits, and the second vector is mapped to , related to the last two bits, according to Table 5.6-2.

1 2( , )b b 1is

2is

Page 175: Ch5-Digital Modulation Techniques

Table 5.6-2 Mapping of bit patterns to the signal points

1 2 3 4( , , , )b b b b1 2( , )i is s

1 2( , )b b 1is 3 4( , )b b 2is

3(1,1)3(1,1)

1(1,1)1(1,1)

-1(0,1)-1(0,1)

-3(0,0)-3(0,0)

Page 176: Ch5-Digital Modulation Techniques

Extend the signal constellation to 64-QAM or even higher level of signal constellation, e.g., 256-QAM.

Advantage for a large signal constellation: a larger number of bits can be sent together and the transmission data ratecan be increased.

Page 177: Ch5-Digital Modulation Techniques

If a PSK system is used, for a transmitter with fixed transmission power, the symbol error probability is increased by increasing the size of the signal constellation, since the distance between signal points is decreased due to a dense constellation.

M-QAM system is more desirable because the constellation is not so dense as that in a PSK system.