Sie sind auf Seite 1von 40

Digital Carrier Systems

EE 442 – Spring Semester


Lecture 12

1 0 1 1 0 1

1 0 0 1 0 1

(4 states)

1
Digital Carrier Systems

In the last lecture we studied baseband digital signals; that is, the
modulating signal m(t) have not been frequency shifted.
However, for wireless and satellite communications we must use higher
frequencies to transmit and receive communication signals.

Now we require a modulator and a demodulator – together they form


a “modem.”

There are two basic forms of carrier modulation – they are (1) amplitude
modulation and (2) angle modulation (phase and frequency modulation).
We have already studied both of these under the heading of analog
modulation.

2
Example of Amplitude Shift Keying (ASK)

This is binary amplitude shift keying (BASK).

 ASK  m(t ) cos C t 

3
Example of Multilevel ASK with 2-Bit Coding

This is multilevel amplitude shift keying.

Symbols 00, 01, 10 & 11 translate into four amplitude levels.

http://www.tmatlantic.com/encyclopedia/index.php?ELEMENT_ID=10420

4
Band Limiting Softens the Edges of ASK Waveforms

This is more realistic case for actual ASK communication systems.


In fact, all waveforms are softened by bandwidth limitations.

m(t)
time

You can see the similarity between ASK and analog AM because the amplitude
of the modulated signal is proportional to m(t).

http://www.slideshare.net/Zeolite27/dc-ppt-final
5
Next, Phase Shift Keying (PSK)
Angle modulation gives rise to both phase modulation and frequency modulation.
Starting with phase modulation; this is generally known as “phase shift keying.”

Example: m(kTb) = +1

m(kTb) = -1

http://electronicdesign.com/communications/understanding-modern-digital-modulation-techniques

6
Constellation Diagram For PSK

AC  cos(C t ) for m( kTb )  1


AC  m(t ) cos(C t ) 
AC  cos(C t   ) for m( kTb )  1
Q

PSK
A special case: on-off keying (OOK)
Q
I

0
I
We can also express as I and Q components.

7
Expressing PSK in I and Q Components

For PSK we can write,

 PSK  AC cos C t   k  for kTb  t  kTb  Tb

 PSK  AC cos( k ) cos C t   AC sin( k )sin C t 


Therefore,
 PSK  ak cos C t   bk sin(C t ) for kTb  t  kTb  Tb

This is in polar form (I and Q)

For binary PSK we have k = 0 or  radians.


This is 2-QAM but we don’t generally use this terminology for binary PSK.

Note: Quadrature amplitude modulation (QAM) is a mixture of both


amplitude modulation and phase modulation.

8
Binary PSK (BPSK) Transmitter and Receiver
BPSK Modulator:
Carrier Balanced
Amplifier
cos(ct) Modulator BPF
PSK

NRZ Data LPF


input

BPSK Demodulator:
LPF S&H Comparator
PSK
+ d(t)

Sample at Binary data


center of output
cos(ct) symbol

r (t ) B cos[2C t   (t )]  B cos[ (t )]
9
Binary PSK (BPSK) Received Waveforms

Without noise With noise

After Lawrence Burns, “Digital Modulation and Demodulation,” Chapter 4


in RF and Microwave Circuit Design for Wireless Communications, edited
by Lawrence E. Larson, Artech House Publishers, 1996. Pages 99 to 233.
Lawrence Burns was an engineer at 3COM.

10
Frequency Shift Keying (FSK)
In frequency shift keying each digital symbol has its own unique carrier
signal frequency for encoding it. The signal amplitude and phase remain
the same, only the frequency is varied. In the figure binary frequency
shift keying (BFSK) is illustrated.

11
FSK Modulation and Demodulation
FSK Modulator:
NRZ Data Voltage
input Controlled Amplifier
oscillator BPF
t FSK
Vcontrol RF
Output

FSK Demodulator:
BPF Amplifier LPF Comparator
FSK
+ m(t)

Frequency Binary data


Discriminator output

12
Multilevel Frequency Shift Keying (FSK)

This animation shows frequency Symbol Binary code Frequency


shift keying of the sinusoidal “0” 00 4 kHz
carrier signal. A two-digit code “1” 01 3 kHz
modulates the carrier signal “2” 10 2 kHz
frequency into four frequencies “3” 11 1 kHz

13
Comparing PSDs For Binary ASK, PSK and FSK

ASK

Power spectral density [watts/Hz)

PSK

FSK

14
BPSK Waveforms and Noise

Sampled data points

15
Quadrature Phase Shift Keying (QPSK)
Sometimes this is known as quadri-phase PSK, 4-PSK, or 4-QAM. QPSK uses
four points on the constellation diagram, equi-spaced around a circle. With
four phases, QPSK can encode two bits per symbol,
Q

I = -1; Q = +1 I = +1; Q = +1

QPSK  I  cos C t   Q  sin C t  I

I = -1; Q = -1 I = +1; Q = -1

16
Digital I/Q Modulation
Anticipating our coverage of digital communication systems

i(t)

q(t)

17
Simple QPSK Modulator

QPSK modulator using delay lines to set phase delay:

Delay lines (depend upon fC)


+45

RF Input +135 RF Output

-135

-45

Switch Decoder and Driver

18
Widely-Used QPSK Modulator

QPSK Modulator

LPF
I
NRZ Data Amplifier
input BPF
Serial-to PSK
-Parallel
Parser
cos(C t ) 
LPF

t
Q

sin(C t )

19
Basic Building Block: Quadrature Modulator

I and Q can be
either analog or cos(C t ) 
digital signals  (t )
Q

sin(C t )

 (t )  I 2  Q 2  cos(C t   (t ))
 Q(t ) 
where  (t )  tan 1  
 I ( t ) 

20
QPSK Time Domain Waveforms

QPSK

21
Data Demultiplexer (Serial to Parallel) For QPSK

Demodulator uses three D-type flip-flops and is driven by clock


and clock/2 rates.

22
QPSK Demodulator

C/R = clock/carrier recovery

STR = symbol timing recovery

23
M-ary Signaling With Quadrature Amplitude Modulation (QAM)
APSK definition
Definition: Amplitude and Phase-Shift Keying, APSK, is a digital
modulation scheme that uses both the amplitude and the phase changes
of on the carrier signal to provide the data transport mechanism for the
information. Also called QAM.

16-ary QAM
Quadrature Amplitude
Modulation, QAM is a
form of modulation that
is a combination of
phase modulation and
amplitude modulation.
The QAM scheme
represents bits as
points in a quadrant
grid know as a
constellation map.

24
Number-Bases in M-ary Constellations

Variants of QAM are also used for many wireless and cellular technology
applications. In addition, 64-QAM and 256-QAM are commonly used in digital
cable television and cable modem applications. In the US, 64-QAM and 256-
QAM are the mandated modulation schemes for digital cable as standardized by
the SCTE in the standard ANSI/SCTE 07 2000.

25
Bits/Symbol and Symbol Rates

Bits per
Modulation Symbol Rate
Symbol
BPSK 1 1  bit rate
QPSK 2 1/2 bit rate
8-PSK 3 1/3 bit rate
16-QAM 4 1/4 bit rate
32-QAM 5 1/5 bit rate
64-QAM 6 1/6 bit rate

26
Greater Number of States Leads to Greater Demand Upon Communication
System

http://farhek.com/jd/i1t1154/up-to/7i45u1/
27
Bit Error Rate versus Energy/Noise Ratio

BER = Bit Error Rate

Eb / N 0 (dB)
energy per bit-to-noise power ratio

28
Signal-to-Noise Ratio vs. Energy/Bit-to-Noise Ratio

In analog and digital communications, signal-to-noise ratio, usually written S/N


or SNR, is a measure of signal strength relative to background noise strength.
The ratio is usually expressed in decibels (dB) and equals 10log10[S/N].
Another metric that is often more useful in digital systems is the energy per
bit-to-noise power ratio, denoted by Eb/N0.
Define: Rb = bit rate (in bits per second)
S = total signal power (watts)
Eb = energy per bit (in joules/bit)
N = total noise power (over entire bandwidth B in Hz)
N0 = noise spectral density (N = N0B where B = bandwidth)
Then,
S Eb S Rb Eb
 Eb and  and SNR 
Rb N Rb  N N0B

Increasing the data rate Rb increases the SNR. However, in general it also
increases the noise in the denominator, which lowers the SNR.

29
What Modulation Schemes Does Wi-Fi Use?

WiFi systems use two primary radio transmission techniques.

802.11b (≤ 11 Mbps) − The 802.11b radio link uses a direct sequence spread
spectrum technique (DSSS) called complementary coded keying (CCK). The
bit stream is processed and then modulated using Quadrature Phase Shift
Keying (QPSK).

802.11a and 802.11g (≤ 54 Mbps) − The 802.11a and g systems use 64-
channel orthogonal frequency division multiplexing (OFDM). The
transmitter encodes the bit streams onto 64 subcarriers using Binary Phase
Shift Keying (BPSK), Quadrature Phase Shift Keying (QPSK), or one of two
levels of Quadrature Amplitude Modulation (16-QAM, or 64-QAM).

30
Bandwidth Efficiency (aka Spectral Efficiency)

Given: Eb = energy per bit (joules or ergs)


Rb = bit rate (bits/second)
B = bandwidth of baseband signal (Hz)
N0 = noise spectral density (watts/Hz)
N = noise power = N0B (watts)

Therefore, EbRb = total signal power

We define the Bandwidth Use Efficiency as


Rb  bits/second  Example:
B  Hz  GSM Digital Cellular
Data rate = 270 kb/s
In general, B = 200 kHz, thus
Bandwidth efficiency =
Rb  ER 
 log 2  1  b b  1.35 bits/sec/Hz
B  NB 

31
32
Circuit Switched Networks vs. Packet-Switched Network

33
Circuit-Switched Network
PSTN = public switched telephone network

Once a connection is
Caller established, this
connection is
Central Office maintained until call
Telephone is terminated.
Telephone Switch
Many paths are Switch
possible, but only Full Telephone
one is selected per Duplex
Switch
call. Telephone
Switch
Trunks
Telephone (links between
Switch Exchanges) Telephone
Subscriber lines
(or local loops) Switch
Central Office Telephone
Switch Central Office

= Dedicated connection (point-to-point)


34
Packet Switched Network
Packet route
Message broken
Many paths possible
into packets and
for a single message as = Packet
each addressed
packets are routed to
the destination. (Data Packet or “Datagram”)

Router
or Switch
Sender
(source) Internet

Packets are routed Packets


according to the best sequentially
path available at the reassembled
time. to reveal
Large array of routers and data links. message
Receiver
(destination)

35
Network Organization
In 1962, Paul Baran (RAND Corp.) envisioned a network of unmanned nodes using
intelligent switches to route data node to node to their final destinations. Baran
called this "hot-potato routing" or distributed communications. This was
implemented in ARPANET which became the Internet.
A network
of routers

Centralized Network Decentralized Network Distributed Network


A highly vulnerable
network (e.g., PSTN) (e.g., Internet)
Concept of hardened networks to deal with disasters. 36
Packet-Switched Network Operation

• Adaptive routing – routers chose the best path by examining


traffic loading along available paths. Routers create a
“routing table” for the packet travel.
• All users share the same network resources.
• Packet-switching is more efficient than circuit-switching in
networks when data is bursty (i.e., variable delays
interspersed with periods of data transmission). More
“efficient” means a better utilization of the network
resources.

This is an
example of
“bursty” data

37
An Internet Packet and its Headers
Internet Packet
IP header TCP/UDP header Application Data

• In IPv4, each packet is restricted to 1,500 bytes of data (i.e., payload)


• Each packet consists of the application data and headers
• The headers contain control and routing information such as:
– Source IP address and destination IP address
– Packet numbering for reconstruction at destination
• Every computer on the Internet has the TCP/IP program. The client/server model
is used on the Internet.
• TCP (Transmission Control Protocol) puts the data or message into packets at the
source and reassembles the data or message at the destination
• IP (Internet Protocol) does the packet addressing for the routing over the Internet

The rules that govern communication – any form – are called “protocols.”
38
TCP versus UDP Transmission

TCP and UDP Analogies:


TCP Post Office
Registered Verifies delivery
Letter
TCP is “reliable” because
it has flow & congestion
control, retransmission, &
uses acknowledgements.

UDP does not use these UDP


because it is focused only
upon sending packets.

39
TCP/IP Protocol Architecture Model

Layer Pictorial View of Protocol Data Unit Entity Protocol

Data or SMTP
Application Data Message HTTP, DNS

Number of segments  1 Transport TCP


Transport Header
Data Segments
UDP

Internet Network Transport Packets or


Header Header Data IP
or Network Datagrams

Frame Network Transport


Data
Frame Ethernet
Network Header Header Header Trailer
Frames Modem
Access
FDDI
Bits transmitted over channel medium

40

Das könnte Ihnen auch gefallen