Digital Modulation Technique (U-2)
Digital Modulation Technique (U-2)
Digital Modulation Technique (U-2)
Digital Modulation
Technique
Sudhansu Sekhar Behera
Asst. Professor
Dept. of ECE
Modulation
• The baseband signals have an adequately large power at low frequencies. So, they can be
transmitted over a pair of wires or coaxial cable.
• But, it is not possible to transmit the baseband signals over radio links or satellite because
impractically large antenna would be required to be used.
• Hence the spectrum of the message signal has to be shifted to higher frequencies. This can be
achieved by modulation.
• Modulation is a process in which one characteristics of the carrier signal varied in accordance
with the message signal amplitude.
• Both modulator and demodulator are packed in one unit is called MODEM for two way duplex
communication.
Digital modulation Technique
• It is classified into two categories
I. Coherent technique
II. Non-coherent Technique
I. Coherent Technique:-
Here, we have to used a phase synchronized carrier to be generated at the receiver to
recover the information signal. The frequency and phase of the carrier produced at the
receiver should be synchronized at the transmitter.it is complex but yield better
performance.
II. Non-Coherent Technique :-
Here, no phase synchronized local carrier is needed at the receiver.it is less complex
and performance is less as compared to Coherent Detector.
Binary and M-ary Schemes
• Basically ,there are two types of digital modulation schemes as under
I. Binary Schemes
II. M-ary Schemes
I. Binary Schemes :- In binary schemes ,we send any one of the two possible signals
during each signalling interval of duration Tb. ex:-ASK,PSK,FSK
II. M-ary Schemes :-In this case we can send any one of the M possible signals during
each signalling interval of duration Tb.
ex- M-ary PSK,M-ary FSK,QPSK,QASK,QAM
it needs less bandwidth as compared to the binary schemes.
error performance of M-ary schemes is poor as compared to binary schemes.
• Probability of error:-
The most important goal of passband data transmission system is to design the receiver having
minimum value of average probability of error in presence of additive white gaussian
noise(AWGN).
The value of error probability Pe of a system indicates its performance in presence of AWGN.
The value of Pe should be as small as possible.
• Power Spectra:-
It is the graph of power spectral density in Y-axis and frequency in X-axis.
It gives information about the bandwidth requirements and co-channel interference.
Passband Transmission Model
• It consists of
I. Transmitter
II. Communication channel
III. Receiver
• The message source emits one symbol per Ts second.
• Let the symbols be denoted as m1,m2,m3…mM
• The message source output is applied to the encoder which produces a corresponding vector S i.
• The modulator produces a distinct signal Si(t) of duration Ts seconds to represent the symbol mi
produced by the message source
• The output of modulator Si(t) is transmitted over the communication channel
• At the receiver the reverse operation of transmitter will be done.
Types of Digital Modulation Technique
• It is a special types of modulation, where the message signal (modulating signal) is of
digital in nature and the carrier wave to be modulated is of usually sinusoidal(analog) in
nature.
• The ASK,PSK,FSK are analogues to AM,PM and FM respectively.
• There are 3 basic signalling schemes used in passband data transmission. Those are
I. Amplitude Shift Keying(ASK)
II. Phase Shift Keying(PSK)
III. Frequency Shift Keying(FSK)
Amplitude Shift Keying(ASK)
• ASK is a type of amplitude modulation which represents the binary data in the form of
variation in the amplitude of a carrier signal.
• The binary signal when ASK modulated ,gives a zero value for low input and gives the
carrier output for high input.
0
=
=[ +]
=b(t)
= b(t)
• Whenever the binary data arrive at the i/p of the integrating and
dump device circuit , the switches are made open ,so that the
capacitor gets charged to +ve or –VE voltage depending upon the
received signal ‘1’ or ‘0’
• In between the time gap of 2-bits both the switches are get closed by
the help of bit synchronizer, so that the capacitor discharged to its
initial value through the short circuit path before the 2nd bit arrive and
at the same time the previous data is dumped through the switches
to a decision device which is compared with a threshold voltage (
• If incoming voltage greater than then ‘1’ will be output
if incoming voltage is less than then ‘0’ will be output.
For b(t)=1, o/p =
for b(t)=0, o/p=
Geometrical representation or Constellation Diagram of BPSK
signal
Advantages of BPSK
• It has a bandwidth which is lower than that of a BFSK signal
• BPSK has a very good noise immunity.
• Out of 3 modulation technique, it yields minimum value of probability
of error.
Drawbacks of BPSK
• IN CASE of BPSK , at the receiver point the output is .Hence by using
the squaring circuit it is difficult to determine whether ‘one’ or ‘zero’
is transmit.
• To avoid this ambiguity we go for DPSK.
DPSK
• DIFFERENTIAL phase shift keying as the non-coherent version of PSK.
• DPSK does not need synchronous carrier at the receiver.
• The input sequence of binary bits is modified such that the next bit
depend upon the previous bit. Therefore ,in the receiver the previous
received bits are used to detect the present bit.
Generation of DPSK
• To eliminate the need for phase synchronization of coherent receiver
with PSK ,a differential encoding system is used with PSK.
• The digital information content of the binary data is encoded in terms
of signal transitions.
• As an example 0 may be used to represent transition in a given binary
sequence(with respect to the previous encoded bit) and 1 to indicate
no transition.
• This new signalling technique which combines differential encoding
with PSK is known as DPSK.
DPSK Tx
• For the generation of DPSK Signal the data strength b(t),which is to be
actual transmitted to apply one input to the xnor gate and other input
is delayed version of d(t),hence the output of balance modulator is
=
d(t)=b(t)d
DPSK Rx
example
Advantages and disadvantages
• Advantages:-
I. DPSK does not need carrier at the receiver end.This means that the
complicated circuitry for generation of local carrier is not required.
II. The bandwidth requirement of DPSK is reduced as compared to
that of BPSK
• Disadvantages:-
I. The probability of error of DPSK is higher than BPSK.
II. Noise interference in DPSK is more.
question
1. Given on binary sequence 10010011 is applied DPSK transmitter .
Sketch the transmitter output.
Binary Frequency Shift keying ( BFSK)
• In BFSK modulation technique the binary data are transmitted by
varying the frequency of the carrier signal
i.e. for transmitting ‘1’ we will use high frequency carrier of
frequency and for transmitting ‘0’ we will use low frequency carrier
having frequency .
• The mathematical equation for BFSK signal is given by
For ‘1’
For’0’
=1v ,
=-1v ,
1v ,
v,
(t) = +
+ +
Spectrum of BFSK signal
• Taking Fourier transform of (t) we will get
(f)=
+
+
+
• Bandwidth:-
BW = ()-()
=()+
Minimum BW= + For no overlapping
=
= =>
BFSK Receiver
• To recover the binary data the incoming signal is pass through
BPF1 ,having centre frequency and BPF2 having centre frequency.
• If ‘1’ is received then BPF1 is activated which will be passed through
envelope detector and the output of it will be +ve where as output of
BPF2 will be 0.so the comparator output will be +ve that means ‘1’ is
received.
• Similarly for ‘0’ ,BPF2 will be activated and we will get some +ve value at
the output of envelope detector, which is connected to the -ve terminal
of comparator.BPF1 output will be 0 which is connected to the +ve
terminal of comparator. Hence the output of comparator will be -ve and
that will be considered as ‘0’ received
Constellation diagram
• The mathematical equation is given by as
(t) = . + .
=.+ .
=+.
Let and
Where are orthogonal function
• (t)= +.
For ‘1’ , and ( , 0)
For ‘0’ , and (0, )
Disadvantages
• By comparing Euclidian distance of BFSK with BPSK ,we will observe
Euclidian of BFSK is less as compared to BPSK.Hence the probability of
error is more as compared to BPSK.
• Also the bandwidth requirement is high.
QPSK(Quadrature Phase Shift Keying)
• In QPSK 4-symbols are derived by considering 2-bit at a time i.e. 00 ,
01, 10, 11.
• In this case
• Here the carrier has 4-phase shift depending upon the input stream.
• The mathematical equation for QPSK signal
• Depending upon the input binary stream the carrier has 4-phase
change by putting i=1,2,3,4.
QPSK Transmitter
• The bit stream b(t) is converted into two parallel bit stream (even and
odd) by the help of D-FF.
• The even bit stream is superimposed on the carrier by the help of
PSKI and the output of BM1 will be .
• Similarly the output of PSKQ will be
• Hence the output QPSK wave is
Phasor diagram
• 00 =
01 =
10 =
11 =
• It is found that ,it will move from 1st quadrant to 2nd quadrant and so
on.
• There is a change of 1bit position, therefore a 900 phase shift occur
between the consecutive symbol i.e. at the end of Ts either bo(t) or
be(t) will change.
QPSK Receiver
• In this method we can recover the binary data from the incoming
QPSK signal as shown above.
• Since QPSK uses two carrier ,hence the first step is to recover the
carrier.it can be recovered by using bellow carrier recover circuit.
• The output of PSKI Is
=
=[]
=
=
Output of LPF1 =
Similarly output of LPF2 =
Depending upon the polarity we can receive the data stream
i.e. (0 0),(0 1), (1 0),(1 1)
PSD of QPSK
Waveform of QPSK signal
M-ary PSK
• In case of M-ary PSK ‘M’ symbols are transmitted by vary the phase of the
carrier, where the carrier has ‘M’ no. of phase shift.
M=2= = 1bit/symbol (BPSK) (Ts=Tb)
M=4= = 2bit/symbol (QPSK) (Ts=2Tb)
M=8= = 3bit/symbol (8PSK) (Ts=3Tb)
M=16= = 4bit/symbol (16PSK) (Ts=4Tb)
• In general , Ts=NTb of M=
• Phase shift is 2π/M.
• Mathematical equation for M-ary PSK is given by
where i=1,2,3,…..M
8-ary PSK
• M=8
• Mathematical equation for 8-ary PSK is
3. Assume that you are required to transmit fb=90Mb/s data in authorised bandwidth of 20MHz.which
modulation scheme would you consider? Explain why?
4. If the input bit stream 0001101110 is given to the modulator draw the following waveform
1. ASK WAVEFORM
2. BPSK WAVEFORM
3. BFSK WAVEFORM
4. INPHASE AND QUADRATURE COMPONENT OF QPSK
5. QPSK WAVEFORM