Disclaimer: 1. Bernard Sklar, Digital Communication: Fundamental and Application, Second Edition

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

Disclaimer

The material used in this presentation to deliver the


lecture i.e., pictures/graphs. text etc. does not solely
belong to the author/presenter. The presenter has gathered
this lecture material from various sources on
web/textbooks. Following sources are especially
acknowledged:

1. Bernard Sklar, Digital Communication: Fundamental and Application, Second Edition


Digital Communication

2
Amplitude Shift Keying
 Modulation Process
 In Amplitude Shift Keying (ASK),
the amplitude of the carrier is
switched between two (or more)
levels according to the digital data
 For BASK (also called ON-OFF
Keying (OOK)), one and zero are
represented by two amplitude
levels A1 and A0

3
 Analytical Expression:
 Ai cos(c t ), 0  t  T binary 1
s(t )  
0, 0  t  T binary 0
where Ai = peak amplitude

s (t )  A cos(0t )  2 Arms cos(0t )  2


2 Arms cos(0t )

2E V2
 2 P cos(0t )  cos(0t )  P 
T R
Hence,
 2 Ei (t )
 cos(i t ), 0  t  T binary 1 , i  0,2,......M  1
si (t )   T

 0, 0  t  T binary 0
where
T
E   s i2 (t )dt , i  0,2,......M  1
0

4
 Where for binary ASK (also known as ON OFF Keying (OOK))

s1 (t )  Ac m(t ) cos(c t   ), 0  t  T binary 1


s0 (t )  0, 0  t  T binary 0

5
• It can be seen that the
bandwidth of ASK
modulated is twice that
occupied by the source
baseband stream

 Bandwidth of ASK
 Bandwidth of ASK can be found from its power spectral density

 The bandwidth of an ASK signal is twice that of the unipolar NRZ

line code used to create it., i.e.,


B  2 Rb

 This is the null-to-null bandwidth of ASK

6
Detectors for ASK
Coherent Receiver

 Coherent detection requires the phase information


 A coherent detector mixes the incoming signal with a locally generated
carrier reference
 Multiplying the received signal r(t) by the receiver local oscillator (say
Accos(wct)) yields a signal with a baseband component plus a
component at 2fc
 Passing this signal through a low pass filter eliminates the high
frequency component

7
 The output of the LPF is sampled once per bit period
 This sample z(T) is applied to a decision rule
 z(T) is called the decision statistic
 Matched filter receiver of OOK signal

 A MF pair such as the root raised


cosine filter can thus be used to shape
the source and received baseband
symbols
 In fact this is a very common approach
in signal detection in most bandpass
data modems

8
Noncoherent Receiver
 Does not require a phase reference at the receiver
 If we do not know the phase and frequency of the carrier, we can
use a noncoherent receiver to recover ASK signal
 Envelope Detector:

 The simplest implementation of an envelope detector comprises


a diode rectifier and smoothing filter

9
Frequency Shift Keying (FSK)
 In FSK, the instantaneous carrier frequency is switched between 2 or
more levels according to the baseband digital data
 data bits select a carrier at one of two frequencies

 the data is encoded in the frequency

 Until recently, FSK has been the most widely used form of digital
modulation;Why?
 Simple both to generate and detect

 Insensitive to amplitude fluctuations in the channel

 FSK conveys the data using distinct carrier frequencies to represent


symbol states
 An important property of FSK is that the amplitude of the modulated
wave is constant
 Waveform

10
 Analytical Expression

 General expression is

2 Es
si (t )  cos(2f 0t  2ift), i  0,1,....M  1
Ts
Where
f  f i  f i 1

f i  f 0  if and Es  kEb , Ts  kTb

11
Binary FSK
 In BFSK, 2 different frequencies, f1 and f2 = f1 + ∆ f are used to
transmit binary information

 Data is encoded in the frequencies


 That is, m(t) is used to select between 2 frequencies:
 f1 is the mark frequency, and f2 is the space frequency
2 Es
s0 (t )  cos 2 ( f1  1 ), 0  t  Tb
Tb

2 Es
s1 (t )  cos 2 ( f 2   2 ), 0  t  Tb
Tb
12
 Ac cos(1t  1 ), when m(t )  1 or X n  1
s(t )  
 Ac cos(2t   2 ), when m(t )  1 or X n  0

 Binary Orthogonal Phase FSK

 When w0 an w1 are chosen so that f1(t) and f2(t) are orthogonal, i.e.,



1 (t )2 (t )  0
 form a set of K = 2 basis orthonormal basis
functions
13
3. Coherent Detection of Binary FSK

 Coherent detection of Binary FSK is similar to that for


ASK but in this case there are 2 detectors tuned to the 2
carrier frequencies

14
Non-coherent Detection
 One of the simplest ways of detecting binary FSK is to pass the
signal through 2 BPF tuned to the 2 signaling freqs and detect
which has the larger output averaged over a symbol period

15
Phase Shift Keying (PSK)

 General expression is

2 Es
si (t )  cos[2f 0t  i (t )], i  0,1,....M  1
Ts

 Where
2i
i (t )  i  0,1,....M  1
M

16
Phase Shift Keying (PSK)
 In PSK, the phase of the carrier signal is switched between 2 (for
BPSK) or more (for MPSK) in response to the baseband digital data
 With PSK the information is contained in the instantaneous phase of
the modulated carrier
 Usually this phase is imposed and measured with respect to a fixed
carrier of known phase – Coherent PSK
 For binary PSK, phase states of 0o and 180o are used

 Waveform:

17
 Analytical expression can be written as

si (t )  A g (t ) cos[c t  i (t )], 0  t  Tb , i  1, 2,...., M


where
 g(t) is signal pulse shape

 A = amplitude of the signal

 ø = carrier phase

 The range of the carrier phase can be determined using

2 (i  1)
i (t )  i  1,....M
M
 For a rectangular pulse, we obtain
2
g (t )  , 0  t  Tb ; and assume A  Eb
Tb

18
 We can now write the analytical expression as

2 Eb  2 (i  1) 
si (t )  cos  ct  , 0  t  Tb , and i  1,2,....M
Tb  M 
carrier phase changes
Constant envelope abruptly at the beginning of
each signal interval

 In PSK the carrier phase changes abruptly at the beginning of each


signal interval while the amplitude remains constant

19
 We can also write a PSK signal as:
2E  2 (i  1) 
si (t )  cos  ct  
T  M 

2E  2 (i  1) 2 (i  1) 
 cos cos  t  sin sin  t
T 
c c 
M M 

 Furthermore, s1(t) may be represented as a linear combination of


two orthogonal functions ψ1(t) and ψ2(t) as follows
2 (i  1) 2 (i  1)
si (t )  E cos  1 (t )  E sin  2 (t )
M M
Where
2 2
 1 (t )  cos[ ct ] and  2 (t )  sin[ ct ]
T T

20
 Using the concept of the orthogonal basis function, we can represent
PSK signals as a two dimensional vector

 2 (i  1) 2 (i  1) 
si (t )   Eb cos  1 , Eb sin 2 
 M M 
 For M-ary phase modulation M = 2k, where k is the number of
information bits per transmitted symbol

 In an M-ary system, one of M ≥ 2 possible symbols, s1(t), …, sm(t), is


transmitted during each Ts-second signaling interval

 The mapping or assignment of k information bits into M = 2k possible


phases may be performed in many ways, e.g. for M = 4

21
22
M-ary PSK

 In MPSK, the phase of the carrier takes on one of M possible values


2 (i  1)
i (t )  , i  1,2,....., M
M
 Thus, MPSK waveform is expressed as
M  2k MPSK
2E  2 (i  1)  2 BPSK
si (t )  cos 0t 
T  M  4 QPSK
8 8  PSK
 2 (i  1) 
si (t )  g (t ) cos 0t  16 16  PSK
 M 
...........

 Each si(t) may be expanded in terms of two basis function Ψ1(t) and
Ψ2(t) defined as
2
 1 (t ) 
2
cos c t ,  2 (t )  sin  c t ,
Ts Ts

23
Coherent Detection
1. Coherent Detection of PSK
 Coherent detection requires the phase information
 A coherent detector operates by mixing the incoming data signal
with a locally generated carrier reference and selecting the
difference component from the mixer output

 Multiplying r(t) by the receiver LO (say A cos(ωct)) yields a signal


with a baseband component plus a component at 2fc
 The LPF eliminates the high frequency component
 The output of the LPF is sampled once per bit period
 The sampled value z(T) is applied to a decision rule
 z(T) is called the decision statistic
24
 Matched filter receiver

 A MF pair such as the root raised cosine filter can thus be used to
shape the source and received baseband symbols
 In fact this is a very common approach in signal detection in most
bandpass data modems

25

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy