Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Digital Modulation Technique (U-2)

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 82

UNIT-III

Digital Modulation
Technique
Sudhansu Sekhar Behera
Asst. Professor
Dept. of ECE
Modulation
• The baseband signals have an adequately large power at low frequencies. So, they can be
transmitted over a pair of wires or coaxial cable.
• But, it is not possible to transmit the baseband signals over radio links or satellite because
impractically large antenna would be required to be used.
• Hence the spectrum of the message signal has to be shifted to higher frequencies. This can be
achieved by modulation.
• Modulation is a process in which one characteristics of the carrier signal varied in accordance
with the message signal amplitude.
• Both modulator and demodulator are packed in one unit is called MODEM for two way duplex
communication.
Digital modulation Technique
• It is classified into two categories
I. Coherent technique
II. Non-coherent Technique
I. Coherent Technique:-
Here, we have to used a phase synchronized carrier to be generated at the receiver to
recover the information signal. The frequency and phase of the carrier produced at the
receiver should be synchronized at the transmitter.it is complex but yield better
performance.
II. Non-Coherent Technique :-
Here, no phase synchronized local carrier is needed at the receiver.it is less complex
and performance is less as compared to Coherent Detector.
Binary and M-ary Schemes
• Basically ,there are two types of digital modulation schemes as under
I. Binary Schemes
II. M-ary Schemes
I. Binary Schemes :- In binary schemes ,we send any one of the two possible signals
during each signalling interval of duration Tb. ex:-ASK,PSK,FSK
II. M-ary Schemes :-In this case we can send any one of the M possible signals during
each signalling interval of duration Tb.
ex- M-ary PSK,M-ary FSK,QPSK,QASK,QAM
it needs less bandwidth as compared to the binary schemes.
error performance of M-ary schemes is poor as compared to binary schemes.
• Probability of error:-
 The most important goal of passband data transmission system is to design the receiver having
minimum value of average probability of error in presence of additive white gaussian
noise(AWGN).
 The value of error probability Pe of a system indicates its performance in presence of AWGN.
 The value of Pe should be as small as possible.
• Power Spectra:-
 It is the graph of power spectral density in Y-axis and frequency in X-axis.
 It gives information about the bandwidth requirements and co-channel interference.
Passband Transmission Model
• It consists of
I. Transmitter
II. Communication channel
III. Receiver
• The message source emits one symbol per Ts second.
• Let the symbols be denoted as m1,m2,m3…mM
• The message source output is applied to the encoder which produces a corresponding vector S i.
• The modulator produces a distinct signal Si(t) of duration Ts seconds to represent the symbol mi
produced by the message source
• The output of modulator Si(t) is transmitted over the communication channel
• At the receiver the reverse operation of transmitter will be done.
Types of Digital Modulation Technique
• It is a special types of modulation, where the message signal (modulating signal) is of
digital in nature and the carrier wave to be modulated is of usually sinusoidal(analog) in
nature.
• The ASK,PSK,FSK are analogues to AM,PM and FM respectively.
• There are 3 basic signalling schemes used in passband data transmission. Those are
I. Amplitude Shift Keying(ASK)
II. Phase Shift Keying(PSK)
III. Frequency Shift Keying(FSK)
Amplitude Shift Keying(ASK)
• ASK is a type of amplitude modulation which represents the binary data in the form of
variation in the amplitude of a carrier signal.
• The binary signal when ASK modulated ,gives a zero value for low input and gives the
carrier output for high input.

• If input is ‘1’  ASK Output is Ac Cos(2*pi*fc*t) => S1(t)= Ac Cos(2*pi*fc*t)


If input is ‘0’ - ASK output is 0 =>S2(t)=0
ASK Waveform
ASK Tx
• For Ask generation ON-OFF coding will be used
• Ask signal may be generated by simply applying the incoming signal or binary data and
the sinusoidal carrier to the two inputs of a product modulator.
• The resultant output is a ASK wave.
ASK Rx
• The demodulation of binary ASK waveform can be achieved with the help of coherent
detector.it consists of a product modulator ,which is followed by a LPF and a decision
making Device.
• The incoming ASK signal is applied to one input of the product modulator and the other
input of the product modulator is supplied with a sinusoidal carrier which is generated
with the help of local oscillator.
• The output of product modulator is given as input to the LPF and output of LPF is given
as input to the decision making device.
• Then the decision making device compares the output of the LPF with a present
threshold.
• If the output of LPF is greater than threshold value then decision device output will be ‘1’
if the output of LPF is less than threshold value then decision device output will be ‘0’
• In this method ,we will consider the local carrier is in perfect synchronization with the
carrier wave used in transmitter.
ASK Rx Block Diagram
QNE effects
Tx Bandwidth
Energy per bit
Signal space/constellation Diagram
• Constellation diagram is a representation of digital modulated signal.
• This diagram helps us to define phase and amplitude of a single
element.
• In this x-axis represents in phase component and Y-axis represents
quadrature phase component.
Distance between signalling point
• It is important to specify probability of error of given signal.
Advantages and Drawbacks of BASK
• Advantage :- ask signal can be generate and detect easily.
• Drawbacks:- it is very sensitive to noise.
Phase Shift Keying(BPSK)
• It is a digital modulation technique in which the carrier has 2 phase
shift i.e. 0 or π,depending upon the voltage level of the binary
modulating signal.
• In this method the binary data is converted from unipolar to bipolar
unipolar Bipolar
1  1v 1 1v
0  0v 0  -1v
• The mathematical equation of BPSK signal is given bellow
b(t)=Binary data
= carrier signal [Note: P=]
S(t)=b(t)*c(t)
=b(t)*
For b(t)=1, S1(t)= => S1
For b(t)=0, S2(t)=-
=

S2( t )= √2 𝑃 cos ⁡(2 𝜋 𝑓 𝑐 𝑡 +π)


In general, we can write ,

𝑆 𝐵𝑃𝑆𝐾 ( 𝑡 ) =𝑑 ( 𝑡 ) . √2 𝑃 cos ⁡(2 𝜋 𝑓 𝑐 𝑡 )


BPSK waveform
Generation of BPSK signal

 The BPSK signal will be generated by


the help of an Balanced modulator.
 The binary data will given to the
balance modulator through a Bipolar
encoder.
 The Bipolar signal will be multiplied
with carrier signal by balanced
modulator .
 At the output of balance modulator
we will get the BPSK signal .
Reception of BPSK signal
• At the receiver point there may be certain phase change for the BPSK signal ,
hence the received signal is given by
S(t)=b(t).
• Since the received signal does not contain the carrier separately hence the
first step is to recover the carrier signal. So that we can go for
synchronization and coherent detection by the help of carrier recovering
circuit.
• The output of square law device
=2P
=
=P
The output of BPF is having passband centred frequency 2 is
The output of frequency divider is =
The output of synchronization detector is =
• The output of the integrating and dump device circuit in a time interval

0
=
=[ +]
=b(t)

= b(t)
• Whenever the binary data arrive at the i/p of the integrating and
dump device circuit , the switches are made open ,so that the
capacitor gets charged to +ve or –VE voltage depending upon the
received signal ‘1’ or ‘0’
• In between the time gap of 2-bits both the switches are get closed by
the help of bit synchronizer, so that the capacitor discharged to its
initial value through the short circuit path before the 2nd bit arrive and
at the same time the previous data is dumped through the switches
to a decision device which is compared with a threshold voltage (
• If incoming voltage greater than then ‘1’ will be output
if incoming voltage is less than then ‘0’ will be output.
For b(t)=1, o/p =
for b(t)=0, o/p=
Geometrical representation or Constellation Diagram of BPSK
signal

• The BPSK signal is given by


S(t)=b(t).
= b(t).
S(t)= b(t).

For b(t)=1 => S(t)=


For b(t)=0 => S(t)=
Constellation Diagram of BPSK signal
• Distance between two signalling point is, Euclidean distance
d=2
• As the distance ‘d’ increases ,the isolation between the symbols in
BPSK signal is more. Thus probability of error reduces.
bandwidth of BPSK
• Bw=
=2

Advantages of BPSK
• It has a bandwidth which is lower than that of a BFSK signal
• BPSK has a very good noise immunity.
• Out of 3 modulation technique, it yields minimum value of probability
of error.
Drawbacks of BPSK
• IN CASE of BPSK , at the receiver point the output is .Hence by using
the squaring circuit it is difficult to determine whether ‘one’ or ‘zero’
is transmit.
• To avoid this ambiguity we go for DPSK.
DPSK
• DIFFERENTIAL phase shift keying as the non-coherent version of PSK.
• DPSK does not need synchronous carrier at the receiver.
• The input sequence of binary bits is modified such that the next bit
depend upon the previous bit. Therefore ,in the receiver the previous
received bits are used to detect the present bit.
Generation of DPSK
• To eliminate the need for phase synchronization of coherent receiver
with PSK ,a differential encoding system is used with PSK.
• The digital information content of the binary data is encoded in terms
of signal transitions.
• As an example 0 may be used to represent transition in a given binary
sequence(with respect to the previous encoded bit) and 1 to indicate
no transition.
• This new signalling technique which combines differential encoding
with PSK is known as DPSK.
DPSK Tx
• For the generation of DPSK Signal the data strength b(t),which is to be
actual transmitted to apply one input to the xnor gate and other input
is delayed version of d(t),hence the output of balance modulator is
=
d(t)=b(t)d
DPSK Rx
example
Advantages and disadvantages
• Advantages:-
I. DPSK does not need carrier at the receiver end.This means that the
complicated circuitry for generation of local carrier is not required.
II. The bandwidth requirement of DPSK is reduced as compared to
that of BPSK
• Disadvantages:-
I. The probability of error of DPSK is higher than BPSK.
II. Noise interference in DPSK is more.
question
1. Given on binary sequence 10010011 is applied DPSK transmitter .
Sketch the transmitter output.
Binary Frequency Shift keying ( BFSK)
• In BFSK modulation technique the binary data are transmitted by
varying the frequency of the carrier signal
i.e. for transmitting ‘1’ we will use high frequency carrier of
frequency and for transmitting ‘0’ we will use low frequency carrier
having frequency .
• The mathematical equation for BFSK signal is given by

• Where if b(t)=1,then d(t)=+1


Bipolar output
if b(t)=0,then d(t)=-1
• for b(t)=1
• for b(t)=0
High frequency, => /2
Low frequency, => /2
BFSK Waveform
BFSK Tx
o/p of BM1 = .
o/p of BM2= .
o/p of ADDER = (t) = . + .
• In this above circuit for transmit ‘1’ or ‘0’ we use two carrier i.e.
frequency.
• When we transmitting ‘1’,
for transmitting ‘0’ ,
since are unipolar, therefore we modified the value of by taking

Where and are Bipolar

For ‘1’
For’0’
=1v ,
=-1v ,
1v ,
v,
(t) = +
+ +
Spectrum of BFSK signal
• Taking Fourier transform of (t) we will get
(f)=
+
+
+
• Bandwidth:-
BW = ()-()
=()+
Minimum BW= + For no overlapping
=
= =>
BFSK Receiver
• To recover the binary data the incoming signal is pass through
BPF1 ,having centre frequency and BPF2 having centre frequency.
• If ‘1’ is received then BPF1 is activated which will be passed through
envelope detector and the output of it will be +ve where as output of
BPF2 will be 0.so the comparator output will be +ve that means ‘1’ is
received.
• Similarly for ‘0’ ,BPF2 will be activated and we will get some +ve value at
the output of envelope detector, which is connected to the -ve terminal
of comparator.BPF1 output will be 0 which is connected to the +ve
terminal of comparator. Hence the output of comparator will be -ve and
that will be considered as ‘0’ received
Constellation diagram
• The mathematical equation is given by as
(t) = . + .
=.+ .
=+.
Let and
Where are orthogonal function
• (t)= +.
For ‘1’ , and ( , 0)
For ‘0’ , and (0, )
Disadvantages
• By comparing Euclidian distance of BFSK with BPSK ,we will observe
Euclidian of BFSK is less as compared to BPSK.Hence the probability of
error is more as compared to BPSK.
• Also the bandwidth requirement is high.
QPSK(Quadrature Phase Shift Keying)
• In QPSK 4-symbols are derived by considering 2-bit at a time i.e. 00 ,
01, 10, 11.
• In this case
• Here the carrier has 4-phase shift depending upon the input stream.
• The mathematical equation for QPSK signal

• Depending upon the input binary stream the carrier has 4-phase
change by putting i=1,2,3,4.
QPSK Transmitter
• The bit stream b(t) is converted into two parallel bit stream (even and
odd) by the help of D-FF.
• The even bit stream is superimposed on the carrier by the help of
PSKI and the output of BM1 will be .
• Similarly the output of PSKQ will be
• Hence the output QPSK wave is
Phasor diagram
• 00  =
01  =
10  =
11  =
• It is found that ,it will move from 1st quadrant to 2nd quadrant and so
on.
• There is a change of 1bit position, therefore a 900 phase shift occur
between the consecutive symbol i.e. at the end of Ts either bo(t) or
be(t) will change.
QPSK Receiver
• In this method we can recover the binary data from the incoming
QPSK signal as shown above.
• Since QPSK uses two carrier ,hence the first step is to recover the
carrier.it can be recovered by using bellow carrier recover circuit.
• The output of PSKI Is
=
=[]
=
=
Output of LPF1 =
Similarly output of LPF2 =
Depending upon the polarity we can receive the data stream
i.e. (0 0),(0 1), (1 0),(1 1)
PSD of QPSK
Waveform of QPSK signal
M-ary PSK
• In case of M-ary PSK ‘M’ symbols are transmitted by vary the phase of the
carrier, where the carrier has ‘M’ no. of phase shift.
M=2= = 1bit/symbol (BPSK) (Ts=Tb)
M=4= = 2bit/symbol (QPSK) (Ts=2Tb)
M=8= = 3bit/symbol (8PSK) (Ts=3Tb)
M=16= = 4bit/symbol (16PSK) (Ts=4Tb)
• In general , Ts=NTb of M=
• Phase shift is 2π/M.
• Mathematical equation for M-ary PSK is given by

where i=1,2,3,…..M
8-ary PSK
• M=8
• Mathematical equation for 8-ary PSK is

where i=1 , 2, 3, ….8


• Hence by varying i=1,2,…8 we will get 8-different symbols, and two
consecutive symbols have a phase difference of π/4.
• ).sin()]
Phasor diagram
• Assume
• S(t)= -

From this figure it is clear that for


M-ary PSK the distance between
two signalling point decreases by
the factor 2pi/M ,by increasing the
value of ‘M’ ,hence probability of
error increases.
• In the above diagram the bit stream b(t) is applied to a serial to
parallel converter and this converter has the facility to store ‘N’ bits of
a symbol.
• The converter output generates an o/p voltage which assume one of
the M-different values,in a one to one correspondence to ‘M ‘
possible symbols as applied to the input.
• The D/A output is m(t) which depends on the symbol i.e.
Sm(m=1,2,..M) generates the no of carrier signal depending the
number of values of ‘M’.
• Phase shift between two carrier is 2pi/M ,hence by summing all the
output we can get M-ary PSK signal.
• M-ary PSK equation is
).sin()
=
• From the above incoming data we get back the carrier signal by using
the carrier recovering circuit. Then we get back in-phase and
quadrature-phase component i.e. and
• The LPF o/p voltage amplitude is proportional to TsPe and TsPo
respectively and change at symbol rate, these voltage measure
component of the received signal in the direction of in phase and
quadrature phase.
• The BPSK having bandwidth 2fb and QPSK having fb and 16-PSK
fb/2 ,hence as M increases the bandwidth goes decreasing.
M-ary FSK
• It is the extension of BFSK i.e. at the transmitting end an N-bit symbol
is presented to a D/A converter
• The converter o/p is applied to a frequency modulator to generates a
carrier wave whose frequency is determine by the modulating
waveform.
M-ary FSK Transmitter
• In M-ary FSK transmitter ,we transmit ‘N’ no of data bit .initially the
data bit is passing through a serial to parallel converter.
• At one time N-bit data will be available at the o/p of serial to parallel
converter which will be given as input to the D/A converter.
• M=2^N , for each combination of N-bit ,the o/p will give an analog
voltage value.
• The o/p of D/A converter will have M-different analog voltage value.
That will be given as input to the frequency modulator.
• For each (M-different) analog value ,the O/P of frequency modulator
will give a specific frequency carrier.
• BW|MFSK = 2Mfb
M-ary FSK Receiver
• At the receiver the incoming signal is applied to the ‘M’ no. of BPF
following the envelope detector.
• The BPF has centre frequency f1,f2,f3,….fM, assuming ‘M’ no of
symbols are transmitted.
• The o/p of envelope detector is applied to a device which determine
which o/p is detected out of “M’ symbols.
• The O/P fed through a A/D converter so as to get desire O/P signal.
Performance comparison
questions
1. Given an 8-level PSK signal that employes two different amplitude as shown in fig.calculate the distance between
the nearest neighbours in term of signal energy.compare the minimum distance for standard 8-level PSK.Which
scheme will result in the smallest probability of error.
2. In a digital continuous time communication system,the bit rate of NRZ data stream is 1Mbps and carrier
frequency of transmission is 100MHz.Find the symbol rate of transmission and the bandwidth requirement of
channel in the following cases of different technique used:
A. BPSK system
B. QPSK system
C. 16-ary PSK system

3. Assume that you are required to transmit fb=90Mb/s data in authorised bandwidth of 20MHz.which
modulation scheme would you consider? Explain why?
4. If the input bit stream 0001101110 is given to the modulator draw the following waveform
1. ASK WAVEFORM
2. BPSK WAVEFORM
3. BFSK WAVEFORM
4. INPHASE AND QUADRATURE COMPONENT OF QPSK
5. QPSK WAVEFORM

You might also like