Attribution Non-Commercial (BY-NC)

Als PDF, TXT **herunterladen** oder online auf Scribd lesen

19 Aufrufe

Attribution Non-Commercial (BY-NC)

Als PDF, TXT **herunterladen** oder online auf Scribd lesen

- QPSK1
- Digital Communication
- Frequency shift keying FSK
- Digital Modulation - ASK
- Digit Modulat
- Reduced-Bandwidth Duobinary Differential
- IV B.E. (Computer Science and Engineering)
- Wireless_Transmission.ppt
- A See 2006 Digicom m
- Adc Lab Matlab
- IT part 2
- Assignment 1
- Digital Modulation Techniques
- Mô Hình Hóa Và Mô Phỏng Hệ Thống Truyền Thông
- Digit_Modulat
- modulation
- vtu 5th sem cn1 cn1 unit-IV
- MODULE2-2
- Optical Moulation Techniques
- Communication Systems - 4th edition - Carlson[616-631] MI APRTE.pdf

Sie sind auf Seite 1von 58

Digital Modulation

p. 1

Modulation (demodulation) maps (retrieves) the digital information into (from) an analog waveform appropriate for transmission over the channel. Generally involve translating (recovering) the baseband digital information to (from) a bandpass analog signal at a carrier frequency that is very high compared to the baseband frequency. Examples: ASK, FSK, QPSK, 16QAM

p. 2

Carrier

Communication Channel

Carrier

p. 3

Why Carrier?

Effective radiation of electromagnetic waves requires antenna dimensions comparable with the signals wavelength:

Antenna for 3 kHz carrier would be ~100 km long Antenna for 3 GHz carrier is 10 cm long

Shifting the baseband signals to different carrier frequencies Sharing the communication channel resources

p. 4

Geometric Representation (1) Digital modulation involves choosing a particular analog signal waveform si(t) from a finite set S of possible signal waveforms based on the information bits applied to the modulator. For binary modulation schemes, a binary information bit is mapped directly to a signal and S contains only 2 signals, representing 0 and 1. For M-ary modulations, S contains more than 2 signals and each represents more than a single bit of information. With a signal set of size M, it is possible to transmit up to log2M bits per signal.

p. 5 ELEC 7073 Digital Communications III, Dept. of E.E.E., HKU

Any element of set S, S={s1(t), s2(t),, sM(t)}, can be represented as a point in a vector space whose coordinates are basis signals j(t), j=1,2,,N, such that

( t ) ( t ) dt = 0, i j; ( orthogonal)

i j

E=

( t )

i

dt = 1; ( normalization)

si ( t ) = sij j ( t ) , i = 1, 2,

j =1

p. 6

,M

2 Eb cos ( 2 f c t + c ) , s1 ( t ) = Tb S BPSK = 2 Eb s2 ( t ) = cos ( 2 f c t + c ) ; Tb Eb = energy per bit; Tb = bit period ; 0 t Tb

Q I

1 ( t ) =

S BPSK

= Eb 1 ( t ) , Eb 1 ( t )

2 cos ( 2 f c t + c ) ; 0 t Tb Tb

-Eb

Constellation diagram

Eb

p. 7

Constellation Diagram A graphical representation of the complex envelope of each possible signal The x-axis represents the in-phase component and the y-axis represents the quadrature component of the complex envelope The distance between signals on a constellation diagram relates to how different the modulation waveforms are and how well a receiver can differentiate between them when random noise is present.

p. 8

Performance Measures (1) Two key performance measures of a modulation scheme are power efficiency and bandwidth efficiency Power efficiency is a measure of how favorably the tradeoff between fidelity and signal power is made, and is expressed as the ratio of the signal energy per bit (Eb) to the noise PSD (N0) required to achieve a given probability of error (say 105):

Eb p = N0

p. 9

Small p is preferred

Performance Measures (2) Bandwidth efficiency describes the ability of a modulation scheme to accommodate data within a limited bandwidth, In general, it is defined as the ratio of the data bit rate R to the required RF bandwidth B:

R B = (bps/Hz) B

Large B is preferred

B max

p. 10

C S = = log 2 (1 + ) B N

ELEC 7073 Digital Communications III, Dept. of E.E.E., HKU

Modulation Schemes Classification Linear modulation: the amplitude of the transmitted signal, s(t), varies linearly with the modulating digital signal, m(t).

Bandwidth efficient but power inefficient Example: ASK, QPSK

Nonlinear modulation: the amplitude of the transmitted signal, s(t), does not vary linearly with the modulating digital signal

Power efficient but bandwidth inefficient Example: FSK, constant envelope modulation

p. 11 ELEC 7073 Digital Communications III, Dept. of E.E.E., HKU

Demodulation (1) Coherent demodulation: requires a replica carrier wave of the same frequency and phase at the receiver

The received signal and replica carrier are cross-correlated Also known as synchronous demodulation Carrier recovery methods

Using PLL to recover the carrier phase and frequency from the transmitted pilot carrier signal, Recovering the carrier from the received signals using costas loop

p. 12

Carrier recovery

p. 13

Demodulation (3) Non-coherent demodulation: does not require a reference carrier wave

It is less complex than coherent demodulation (easier to implement), but has worse performance Applicable to: DPSK, FSK, etc. Example: FSK non-coherent demodulator

p. 14

p. 15

Modulation Process

f = f ( a1 , a2 , a3 ,...an , t ) ( carrier) a1 , a2 , a3 ,...an ( modulation parameters) t ( time)

Modulation implies varying one or more characteristics (modulation parameters a1, a2, an) of a carrier f in accordance with the information-bearing (modulating) baseband signal. Sinusoidal waves, pulse train, square wave, etc. can be used as carriers

p. 16

Continuous Carrier

Carrier: A cos[t +]

A = const = const = const Amplitude modulation (AM) A = A(t) carries information = const = const

Frequency modulation (FM) A = const = (t) carries information = const Phase modulation (PM) A = const = const = (t) carries information

p. 17 ELEC 7073 Digital Communications III, Dept. of E.E.E., HKU

Basic Modulation Modulation involves operations on one or more of the three characteristics of a carrier signal: amplitude, frequency and phase. The three basic modulation methods are:

Amplitude Shift Keying (ASK) Phase Shift Keying (PSK) Frequency Shift Keying (FSK)

These could be applied to binary or M-ary signals. There are other variants as well.

p. 18

si (t ) = Ai g (t ) cos [2 f ct + c ] , i = 1, 2, 0 t Ts ,M

Ts is the symbol period fc is the carrier frequency, c is the carrier initial phase g(t) is a real-value signal pulse whose shape influences the spectrum of the transmitted signal; Pulse shaping

Used to simultaneously reduce the intersymbol effects and the spectral width of a modulated digital signal Example: rectangular pulse, Nyquist pulse shaping, raised cosine pulse shaping, Gaussian pulse shaping, etc.

p. 19

2

g (t ) cos [2 f ct + c ]

si = Ai g 2

Rectangular pulse

p. 20

ASK demonstrates poor performance, as it is heavily affected by noise, fading, and interference. It is rarely used on its own.

ELEC 7073 Digital Communications III, Dept. of E.E.E., HKU

si (t ) = Ac g (t ) cos [2 f ct + c + i ] , 2 i = (i 1) M

Ac is the carrier amplitude, i carries information, each symbol represents log2M bits

i = 1, 2, 0 t Ts

,M

p. 21

Binary Phase Shift Keying (BPSK) M=2: minimum phase separation: 180 o

si (t ) = Ac g (t ) cos [2 f ct + c + (i 1) ] , i = 1, 2, 0 t Tb

s1(t) and s2(t) represent bit 0 and bit 1,respectively The single basis: 1 (t ) = The set :

2 g (t ) cos [2 f ct + c ]

g g 1 (t ), Ac 1 (t ) S = Ac 2 2

p. 22

Quadrature Phase Shift Keying (QPSK) M=4: symbol period Ts=2Tb, minimum phase separation: 90 o

si (t ) = Ac g (t ) cos 2 f ct + c + (i 1) , i = 1, 2,3, 4, 0 t Ts 2

The basis signals:

g Constellation diagram: 1 (t ) =

2 g (t ) cos [2 f ct + c ] , 2 (t ) = 2 g (t )sin [2 f c t + c ]

p. 23

The system using ideal Nyquist pulse shaping is operated in AWGN channel.

QPSK can be interpreted as two independent BPSK systems (one on the I-channel and the other on Q-channel), and thus the same performance but twice the bandwidth efficiency.

p. 24 ELEC 7073 Digital Communications III, Dept. of E.E.E., HKU

si (t ) = Ai g (t ) cos 2 f c t + c + j , i = 1, 2, , M 1 , j = 1, 2, , M 2 ,0 t Ts

As both amplitude and phase are used to carry symbol information, it is very bandwidth efficient Signal set size M=M1M2: 21 21 = 4, 22 22 = 16, 23 23 = 64, etc 4QAM, 16QAM, 64QAM The larger M is, the better bandwidth efficiency but lower robustness against noise and fading

p. 25

Rectangular constellation

p. 26

The system using optimum raised cosine pulse shaping is operated in AWGN channel.

p. 27

si (t ) = Ac cos [2 f i t + c ] , i = 1, 2, , M ,0 t Ts

BFSK: M=2

Bit 0: Bit 1:

f1 = f c f , s1 (t ) = 2 b cos(2 ( f c f )t + c ) Tb

f 2 = f c + f , s2 (t ) =

2 b cos(2 ( f c + f )t + c ) Tb

p. 28

Nonlinear modulation: bandwidth inefficient but power efficient, no need for expensive linear amplifiers

p. 29

The input binary sequence is differentially encoded before BPSK modulation ( d k = mk d k 1 ) Avoids the need for a coherent reference signal at the receiver

Offset QPSK

The phase transitions are limited to 900, the transitions on the I and Q channels are staggered.

/4 QPSK

The phase transitions are limited to 1350

Avoids sudden change in the signal frequency, i.e., large spectral side lobes outside of the main spectral band Minimum shift keying (MSK), Gaussian MSK(GMSK)

p. 30 ELEC 7073 Digital Communications III, Dept. of E.E.E., HKU

Performance in AWGN Channel (1) The channel is assumed to corrupt the signal by the additive white Gaussian noise.

Channel s(t) r(t)=s(t)+n(t)

2 noise power: n =

N0 2

Distortion

n(t)

Perfect channel

p. 31

White noise

ELEC 7073 Digital Communications III, Dept. of E.E.E., HKU

Performance in AWGN Channel (2) The optimum ML AWGN receiver: max P(r(t)|si(t))

1 2 2

p. 32 ELEC 7073 Digital Communications III, Dept. of E.E.E., HKU

p. 33

2 s sin , M > 4 PM 2Q M N0 s = ( log 2 M ) b is the symbol energy 2 b BPSK & QPSK: PM = Q N0

p. 34

For rectangular QAM constellations:

p. 35

s PM ( M 1)Q , N0 s = ( log 2 M ) b

p. 36

p. 37

Conventional coding

Separate from modulation, performed at the digital level before modulation The insertion of redundant bits

Given the same information transmission rate, the symbol rate must be (n/k) times that of the uncoded system. The redundancy provides coding gain, however, requires extra bandwidth.

p. 38

The combination of coding and modulation Coding gain without expanding bandwidth

Using a constellation with more points than that required without coding Typically, the number of points is doubled The symbol rate is unchanged and the bandwidth remains unchanged.

p. 39

Introducing dependancy between every successive symbols

Only certain sequences of successive constellation points are allowed

Minimum distance between the possible sequences of transmitted symbols in signal space (dmin) determines the performance:

Pe e

d2 min

2 n

It actually decreases the error probability for a given SNR, thus achieving coding gain

p. 40

History of TCM

p. 41

Basic Principles of TCM (1) TCM is to devise an effective method for mapping the coded bits into signal points such that the minimum Euclidean distance is maximized. Ungerboek idea: mapping by set partitioning

The signal constellation is partitioned in a systematic manner to form a series of smaller subsets. The resulting subsets have a larger minimum distance than their parent. The goal of partitioning: each partition should produce subsets with increased minimum distance.

p. 42

p. 43

A block of m information bits is separated into two groups of length k1 and k2, respectively. The k1 bits are encoded into n bits, while the k2 bits are left uncoded. The n bits from the encoder are used to select one of the possible subsets in the partitioned signal set, while the k2 bits are used to select one of 2k2 signal points in each subset.

The coder need not code all the incoming bits. When k2=0, all m information bits are encoded. There are many ways to map the coded bits into symbols. The choice of mapping will drastically affect the performance of the code.

p. 44

Convolutional encoder

p. 45

Basic Principles of TCM (4) The basic rules for the assignment of signal subsets to state transitions in the trellis

Use all subsets with equal frequency in the trellis Transitions originating from the same state or merging into the same state in the trellis are assigned subsets that are separated by the largest Euclidean distance Parallel state transitions (when they occur) are assigned signal points separated by the largest Euclidean distance.

Parallel transitions in the trellis are characteristic of TCM that contains one or more uncoded information bits.

p. 46

p. 47

p. 48

Minimum Euclidean distance: d min,uncoded = 2

Uncoded QPSK

2 d 000212 = d 02 + 2d12

= (2 2) + 4 = 4.585

Parallel transition: Distance : (0, 0, 0) (4, 0, 0)

2 2 d 000400 = d 2 = 4

p. 49

p. 50

No parallel transition

Distance : (0, 0, 0) (6, 7, 6)

2 2 d 000676 = d 0 + 2d12

= (2 2) + 4 = 4.585

p. 51

Coding Gain (1) The minimum Euclidean distance between paths that diverge from any state and remerge at the same state in the trellis code is called free Euclidean distance Dfed Asymptotic coding gain:

Euncoded Ecoded = 2 2 D fed ,coded d min,uncoded where E is the normalized average received engergy when Euncoded = Ecoded , = D 2 ,coded fed

2 d min,uncoded

p. 52 ELEC 7073 Digital Communications III, Dept. of E.E.E., HKU

Coding Gain (2) Asymptotic coding gain can be increased by increasing the number of states and the rate of the convolutional encoder.

p. 53

p. 54

Two steps:

Step 1: At each branch in the trellis,

Compare the received signal to each of the siganls allowed for that branch. Save the signal closest to the received signal Label the branch with a metric proportional to the Euclidean distance between the two signals. Branch metric calculation

Determining the best signal within each subset, i.e., the signal with the smallest distance to the received signal subset decoding

p. 55 ELEC 7073 Digital Communications III, Dept. of E.E.E., HKU

Two steps:

Step 2:

Apply the Viterbi algorithm to the trellis, with surviving partial paths corresponding to partial signal sequences that are closest to the received sequences. Select the ML path (the complete signal sequence closest in Euclidean distance to the received sequence) at the end of the trellis. Path metric calculation Trellis update

p. 56

Error Rate Performance An error event happens when an erroneous path is selected at the decoder Error-event probability in AWGN channel:

N fed the number of signal sequences with distance Dfed that diverge at any state and remerge at that state after one or more transitions

p. 57

Announcement

Dr. Yuk's lecture notes could be downloaded from the department course material web page under "ELEC7073(tiyuk)".

https://www.eee.hku.hk/courses.msc/elec7073a/

p. 58

- QPSK1Hochgeladen vonHemal Vyas
- Digital CommunicationHochgeladen vonNipun Sharma
- Frequency shift keying FSKHochgeladen vonapi-19937584
- Digital Modulation - ASKHochgeladen vonmelaku
- Digit ModulatHochgeladen vonkrishna
- Reduced-Bandwidth Duobinary DifferentialHochgeladen vonsukshrad
- IV B.E. (Computer Science and Engineering)Hochgeladen von9y9a
- Wireless_Transmission.pptHochgeladen vonervaishu5342
- A See 2006 Digicom mHochgeladen vonelhenshire_h
- Adc Lab MatlabHochgeladen vonram
- IT part 2Hochgeladen vonSaurav Sharma
- Assignment 1Hochgeladen vonplkr6165659
- Digital Modulation TechniquesHochgeladen vonAbdulnaser
- Mô Hình Hóa Và Mô Phỏng Hệ Thống Truyền ThôngHochgeladen vonCuong Pham
- Digit_ModulatHochgeladen vonVagi Gowda
- modulationHochgeladen vonArun Kumar
- vtu 5th sem cn1 cn1 unit-IVHochgeladen vonBelgaum Ramesh Nayak
- MODULE2-2Hochgeladen vonAligato John Ray
- Optical Moulation TechniquesHochgeladen vonprachir_beriwal815
- Communication Systems - 4th edition - Carlson[616-631] MI APRTE.pdfHochgeladen vonDiego Jampier Muñoz Arroyo
- Bandpass-Modulation.pdfHochgeladen vonAyan Chakravorty
- DCN_Lec_16Hochgeladen vonzainjamil
- ECE549_M1L2Hochgeladen vonAli Ahmad
- Transmission Overview-final11.pptHochgeladen vonAnonymous ITG3EeN
- Coherent Detection of Optical Quadrature PskHochgeladen vonnisargshah0796
- simindigialcomm7aHochgeladen vonMohd Fauzi
- FALLSEM2016-17_ECE403_TH_1668_18-JUL-2016_RM001_Lecture 7Hochgeladen vonVamsi Krishna
- Digital Comm and Info TheoryHochgeladen vonNuman Nawab
- Chapter 01Hochgeladen vonHaider Ali
- Module 6Hochgeladen von2613078

- 2009-2012 IBC Steel Framing Catalog-12!6!12_0Hochgeladen vonjvane7
- Class II Cavity PreperationHochgeladen vonirfanuk69
- Utm9310 Manual EngHochgeladen vonRemke Schuurmans
- PEX-05-01Hochgeladen vonJila Hafizi
- PythonHochgeladen vonhimalnepali
- dzvxvbfdhHochgeladen vonAranyAmarasingam
- Code for My ProjHochgeladen vonSalahAL-Hakimi
- TitrationHochgeladen vonJoshua Hicks
- HSM_knowledge_document.pdfHochgeladen vonjunaid112
- CFS-B0807.pdfHochgeladen vonRath Asypaden
- FM200 KIDDEHochgeladen vonNguyen Van Tuan
- Manual de Manutencion VolvoHochgeladen vonOtoniel Nuñez
- Rin HeaterHochgeladen vonbalbianj
- 2L415B Instruction Rev.EHochgeladen vonalaedrin
- Kaji an LalinHochgeladen vonIntan Ari Budiastuti
- Brunvoll as Complete Thruster SystemsHochgeladen vonilhangulumser
- jjjjjjjjjHochgeladen vonparveenjakhar
- Section38 Properties of Geometric ShapesHochgeladen vonmarchelo_chelo
- AB Breathers FillersHochgeladen vonBalaji Jayadevan
- Experimental Physics - Wikipedia, The Free EncyclopediaHochgeladen vondonodoni0008
- Design and Manufacturing of a Propeller for Axial Flow FanHochgeladen voncbaraj
- Oracle Supplied PackagesHochgeladen vonramyaru
- 1st-Sem-Q-GroupHochgeladen vonanirudh
- EM3_Suppl_Examples_2013_07_19.pdfHochgeladen vonsuudfiin
- #3 Oob Woolf SataHochgeladen vonShylaJain
- Meitsec Soc Nf v11Hochgeladen vonim
- Developing Enterprise JavaBeansHochgeladen vonRobson Mamede
- Observations of Applying DFM_A_ in MW Mechanics and Sheet Metal WorkHochgeladen vonSatadal Gupta
- Cable-Stayed Bridges, Theory and Design, 2nd ed.pdfHochgeladen vonmekkawi6650
- New Physical Effects in Metal Deuterides.pdfHochgeladen vonSouthlakeguy