Beruflich Dokumente
Kultur Dokumente
1 0 1 1 0 1
1 0 0 1 0 1
(4 states)
1
Digital Carrier Systems
In the last lecture we studied baseband digital signals; that is, the
modulating signal m(t) have not been frequency shifted.
However, for wireless and satellite communications we must use higher
frequencies to transmit and receive communication signals.
There are two basic forms of carrier modulation – they are (1) amplitude
modulation and (2) angle modulation (phase and frequency modulation).
We have already studied both of these under the heading of analog
modulation.
2
Example of Amplitude Shift Keying (ASK)
3
Example of Multilevel ASK with 2-Bit Coding
http://www.tmatlantic.com/encyclopedia/index.php?ELEMENT_ID=10420
4
Band Limiting Softens the Edges of ASK Waveforms
m(t)
time
You can see the similarity between ASK and analog AM because the amplitude
of the modulated signal is proportional to m(t).
http://www.slideshare.net/Zeolite27/dc-ppt-final
5
Next, Phase Shift Keying (PSK)
Angle modulation gives rise to both phase modulation and frequency modulation.
Starting with phase modulation; this is generally known as “phase shift keying.”
Example: m(kTb) = +1
m(kTb) = -1
http://electronicdesign.com/communications/understanding-modern-digital-modulation-techniques
6
Constellation Diagram For PSK
PSK
A special case: on-off keying (OOK)
Q
I
0
I
We can also express as I and Q components.
7
Expressing PSK in I and Q Components
8
Binary PSK (BPSK) Transmitter and Receiver
BPSK Modulator:
Carrier Balanced
Amplifier
cos(ct) Modulator BPF
PSK
BPSK Demodulator:
LPF S&H Comparator
PSK
+ d(t)
r (t ) B cos[2C t (t )] B cos[ (t )]
9
Binary PSK (BPSK) Received Waveforms
10
Frequency Shift Keying (FSK)
In frequency shift keying each digital symbol has its own unique carrier
signal frequency for encoding it. The signal amplitude and phase remain
the same, only the frequency is varied. In the figure binary frequency
shift keying (BFSK) is illustrated.
11
FSK Modulation and Demodulation
FSK Modulator:
NRZ Data Voltage
input Controlled Amplifier
oscillator BPF
t FSK
Vcontrol RF
Output
FSK Demodulator:
BPF Amplifier LPF Comparator
FSK
+ m(t)
12
Multilevel Frequency Shift Keying (FSK)
13
Comparing PSDs For Binary ASK, PSK and FSK
ASK
PSK
FSK
14
BPSK Waveforms and Noise
15
Quadrature Phase Shift Keying (QPSK)
Sometimes this is known as quadri-phase PSK, 4-PSK, or 4-QAM. QPSK uses
four points on the constellation diagram, equi-spaced around a circle. With
four phases, QPSK can encode two bits per symbol,
Q
I = -1; Q = +1 I = +1; Q = +1
I = -1; Q = -1 I = +1; Q = -1
16
Digital I/Q Modulation
Anticipating our coverage of digital communication systems
i(t)
q(t)
17
Simple QPSK Modulator
-135
-45
18
Widely-Used QPSK Modulator
QPSK Modulator
LPF
I
NRZ Data Amplifier
input BPF
Serial-to PSK
-Parallel
Parser
cos(C t )
LPF
t
Q
sin(C t )
19
Basic Building Block: Quadrature Modulator
I and Q can be
either analog or cos(C t )
digital signals (t )
Q
sin(C t )
(t ) I 2 Q 2 cos(C t (t ))
Q(t )
where (t ) tan 1
I ( t )
20
QPSK Time Domain Waveforms
QPSK
21
Data Demultiplexer (Serial to Parallel) For QPSK
22
QPSK Demodulator
23
M-ary Signaling With Quadrature Amplitude Modulation (QAM)
APSK definition
Definition: Amplitude and Phase-Shift Keying, APSK, is a digital
modulation scheme that uses both the amplitude and the phase changes
of on the carrier signal to provide the data transport mechanism for the
information. Also called QAM.
16-ary QAM
Quadrature Amplitude
Modulation, QAM is a
form of modulation that
is a combination of
phase modulation and
amplitude modulation.
The QAM scheme
represents bits as
points in a quadrant
grid know as a
constellation map.
24
Number-Bases in M-ary Constellations
Variants of QAM are also used for many wireless and cellular technology
applications. In addition, 64-QAM and 256-QAM are commonly used in digital
cable television and cable modem applications. In the US, 64-QAM and 256-
QAM are the mandated modulation schemes for digital cable as standardized by
the SCTE in the standard ANSI/SCTE 07 2000.
25
Bits/Symbol and Symbol Rates
Bits per
Modulation Symbol Rate
Symbol
BPSK 1 1 bit rate
QPSK 2 1/2 bit rate
8-PSK 3 1/3 bit rate
16-QAM 4 1/4 bit rate
32-QAM 5 1/5 bit rate
64-QAM 6 1/6 bit rate
26
Greater Number of States Leads to Greater Demand Upon Communication
System
http://farhek.com/jd/i1t1154/up-to/7i45u1/
27
Bit Error Rate versus Energy/Noise Ratio
Eb / N 0 (dB)
energy per bit-to-noise power ratio
28
Signal-to-Noise Ratio vs. Energy/Bit-to-Noise Ratio
Increasing the data rate Rb increases the SNR. However, in general it also
increases the noise in the denominator, which lowers the SNR.
29
What Modulation Schemes Does Wi-Fi Use?
802.11b (≤ 11 Mbps) − The 802.11b radio link uses a direct sequence spread
spectrum technique (DSSS) called complementary coded keying (CCK). The
bit stream is processed and then modulated using Quadrature Phase Shift
Keying (QPSK).
802.11a and 802.11g (≤ 54 Mbps) − The 802.11a and g systems use 64-
channel orthogonal frequency division multiplexing (OFDM). The
transmitter encodes the bit streams onto 64 subcarriers using Binary Phase
Shift Keying (BPSK), Quadrature Phase Shift Keying (QPSK), or one of two
levels of Quadrature Amplitude Modulation (16-QAM, or 64-QAM).
30
Bandwidth Efficiency (aka Spectral Efficiency)
31
32
Circuit Switched Networks vs. Packet-Switched Network
33
Circuit-Switched Network
PSTN = public switched telephone network
Once a connection is
Caller established, this
connection is
Central Office maintained until call
Telephone is terminated.
Telephone Switch
Many paths are Switch
possible, but only Full Telephone
one is selected per Duplex
Switch
call. Telephone
Switch
Trunks
Telephone (links between
Switch Exchanges) Telephone
Subscriber lines
(or local loops) Switch
Central Office Telephone
Switch Central Office
Router
or Switch
Sender
(source) Internet
35
Network Organization
In 1962, Paul Baran (RAND Corp.) envisioned a network of unmanned nodes using
intelligent switches to route data node to node to their final destinations. Baran
called this "hot-potato routing" or distributed communications. This was
implemented in ARPANET which became the Internet.
A network
of routers
This is an
example of
“bursty” data
37
An Internet Packet and its Headers
Internet Packet
IP header TCP/UDP header Application Data
The rules that govern communication – any form – are called “protocols.”
38
TCP versus UDP Transmission
39
TCP/IP Protocol Architecture Model
Data or SMTP
Application Data Message HTTP, DNS
40