0% found this document useful (0 votes)
50 views24 pages

Ec 2004 (PDC) - CS - End - May - 2023

The document discusses various topics related to communication systems including modulation techniques, network layer functions, multiplexing methods, and information theory concepts. The key points are: 1) Modulation is used to reduce antenna height, convert wideband to narrowband signals, allow frequency multiplexing, and effectively radiate power. Amplitude modulation varies the carrier amplitude per the message signal. 2) The network layer is responsible for logical addressing, routing data between devices, fragmentation/reassembly, and quality of service functions. 3) Frequency division multiplexing divides the spectrum into sub-bands to carry separate signals, while time division multiplexing divides transmission time into slots to transmit signal samples.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views24 pages

Ec 2004 (PDC) - CS - End - May - 2023

The document discusses various topics related to communication systems including modulation techniques, network layer functions, multiplexing methods, and information theory concepts. The key points are: 1) Modulation is used to reduce antenna height, convert wideband to narrowband signals, allow frequency multiplexing, and effectively radiate power. Amplitude modulation varies the carrier amplitude per the message signal. 2) The network layer is responsible for logical addressing, routing data between devices, fragmentation/reassembly, and quality of service functions. 3) Frequency division multiplexing divides the spectrum into sub-bands to carry separate signals, while time division multiplexing divides transmission time into slots to transmit signal samples.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

PDC (EC 2004) End Semester Solution Spring 2023

Q1. (1 x 10)
a) Modulation is needed as it
 Reduces height of antenna
 Converts wideband signals into a narrowband signals
 Allows frequency multiplexing
 Effectively radiates power

b) Amplitude modulation: In amplitude modulation, amplitude of the carrier changes according


to the message signal.
Advantages: AM is a versatile and reliable modulation technique that has found
widespread use in communication systems. It has several types such as DSB-FC, DSB-SC, SSB.

c)

d) The Network Layer is the third layer in the OSI (Open Systems Interconnection) model and is
responsible for providing logical addressing and routing functions for data transmission
between nodes on a network. The main functions of the Network Layer are:
 Logical Addressing: The Network Layer provides logical addressing to identify each
device on the network. This addressing is used to uniquely identify a device and to
route data between devices on the network.
 Routing: The Network Layer is responsible for routing data between devices on the
network. It determines the best path for data to travel between the source and
destination devices, taking into account factors such as network topology, traffic
congestion, and other conditions.
 Fragmentation and Reassembly: The Network Layer is also responsible for
fragmentation and reassembly of data packets if the packets are too large to be
transmitted across the network.
 Quality of Service: The Network Layer may also provide Quality of Service (QoS)
functions, which enable network administrators to prioritize certain types of data
traffic over others, based on their importance and latency requirements.

e) Given FM signal is WBFM signal with 𝛽 = 6 and 𝑓m = 50. Thus, by Carson’s rule, bandwidth
of FM = 2(𝛽 + 1)𝑓m =700 Hz.

f) PAM: Pulse Amplitude Modulation (PAM) is a digital modulation technique used in


communication systems that involves varying the amplitude of a series of regularly spaced
pulses to transmit analog information over a digital signal.
 Natural PAM: In natural PAM, the amplitude of the pulse is directly proportional to
the amplitude of the analog signal being transmitted.
 Flat-top PAM: In flat-top PAM, the pulse amplitude is held constant for a short
duration, regardless of the amplitude of the analog signal.
Here is a waveforms of natural and flat-top PAM.

g) FDM (Frequency Division Multiplexing) and TDM (Time Division Multiplexing) are two
techniques used in communication systems to transmit multiple signals over a single channel.
 FDM Principles: FDM works by dividing the available frequency spectrum into
multiple sub-bands, each of which can be used to carry a separate signal. The signals
are then modulated onto different carrier frequencies within each sub-band and
combined to form a composite signal for transmission. At the receiving end, the
composite signal is demodulated, and the individual signals are extracted by filtering
the appropriate frequency bands.
 TDM Principles: TDM works by dividing the available transmission time into discrete
time slots, each of which can be used to transmit a portion of a separate signal. The
signals are sampled at a fixed rate, and the samples are assigned to different time
slots for transmission. At the receiving end, the samples are reconstructed into the
original signal by demultiplexing the composite signal.
12–(–12)
h) 𝑆𝑡𝑒𝑝 𝑆𝑖𝑧𝑒 = = 0.0468, for 512 levels, n= 9 bits. Hence, SNR = 1.8+6n = 55.8 dB
512

i) BFSK (Binary Frequency Shift Keying): It is a digital modulation technique used in


communication systems that involves varying the frequency of a carrier signal to transmit
binary data.
In BFSK, the two binary values (0 and 1) are represented by two different carrier frequencies,
referred to as the mark frequency and the space frequency. When a binary '0' is to be
transmitted, the mark frequency is used, and when a binary '1' is to be transmitted, the
space frequency is used.

j) Shannon's source coding theorem: It is also known as the data compression theorem. It
states that any discrete memoryless source can be compressed to its entropy, which is the
lower bound on the number of bits required to represent its information content without
any loss of information.
Entropy represents the minimum average number of bits required to represent the
information content of a message. It provides a measure of the inherent information content
of a source and serves as a lower bound on the number of bits required to encode the source
data without any loss of information.
The formula for entropy of a discrete memoryless source with probability Pi is given by:
H = - Σ Pi log₂ (1/Pi)

Q2.
Q2 (a) (i) Find the Trigonometric Fourier series of 𝒙(𝒕) =
–𝝅 𝝅
𝒄𝒐𝒔𝒕, ≤ 𝒕 ≤ with a period 𝝅. ----------------------------
𝟐 𝟐
2 Marks

Q2 (a) (ii) Find the power of the signal 𝒙(𝒕) = 𝟔𝒄𝒐𝒔𝟏𝟎𝝅𝒕 +


𝟓𝒔𝒊𝒏𝟐𝟓𝝅𝒕 ∗ 𝑪𝒐𝒔𝟐𝟓𝝅𝒕. ------------------- 2
Marks
Q2 (b) (i) With a neat block diagram , explain data
communication with DTE and DCE .
(ii) Discuss the three different modes of data transmission.

(i) Block Diagram of Data Communication System ------------ 1


Mark

Data terminal equipment (DTE) refers to the interface equipment used


at the station (between the host and modem) to adapt the digital signals
from the computer and terminals to a suitable form for transmission
0.5 Mark
Data communications equipment (DCE) simply means the equipment
that converts digital signals to the analog signals and interfaces the data
terminal equipment to the analog transmission medium. DCE is nothing
but a modem (modulator / demodulator). It converts binary digital
signals to analog signals such as FSK, PSK, and QAM, and vice versa
0.5 Mark

(ii) Three Models of data transmission. 2


Marks
(1) Simplex
(2) Half Duplex
(3) Full Duplex

Q3.
A) . ( 1 x 4)
Am = 2, fm = 100 Hz
Ac = 4, fc = 500 Hz
Am 2
μ= = = 0.5
Ac 4

𝑆AM(𝑡) = [4 + 2 cos(2𝜋100𝑡)] cos(2𝜋500𝑡)

𝜑AM(𝑓) = 2[𝛿(𝑓 + 𝑓c) + 𝛿(𝑓 − 𝑓c)] + 0.5[𝛿(𝑓 + (𝑓c + 𝑓m)) + 𝛿(𝑓 + (𝑓c − 𝑓m)) + 𝛿(𝑓 −
(𝑓c + 𝑓m)) + 𝛿(𝑓 − (𝑓c − 𝑓m))]

Ac 2 Am2
P= + =8+1 = 9
2 4

μ2 1
η= = = 11.11%
2 + μ2 9

B). Envelope detector for AM (2 marks)

On the positive cycle of the input signal, the input grows and may exceed the
charged voltage on the capacity Vc (t), turning on the diode and allowing the
capacitor C to charge up to the peak voltage of the input signal cycle. As the input
signal falls below this peak value, it falls quickly below the capacitor voltage (which is
very nearly the peak voltage), thus causing the diode to open. The capacitor now
discharges through the resistor R at a slow rate (with a time constant RC). During the
next positive cycle, the same repeats. As the input signal rises above the capacitor
voltage, the diode conducts again. The capacitor again charges to the peak value of
this (new) cycle. The capacitor discharges slowly during the cutoff period.
The output voltage Vc (t), thus, closely follows the (rising) envelope of the input AM
signal. Capacitor discharge between positive peaks causes a ripple signal of
frequency ωc in the output. This ripple can be reduced by choosing a larger time
constant RC so that the capacitor discharges very little between the positive peaks
(RC » 1/ωc).

Balanced Modulator : ( 2 marks)

First we generate DSBSC with the help of the product modulator. Then, apply this
DSBSC as an input of band pass filter. This band pass filter produces an output,
which is SSBSC. Select the frequency range of band pass filter as the spectrum of the
desired SSBSC . This means the band pass filter can be tuned to either upper sideband
or lower sideband frequencies to get the respective SSBSC having upper sideband or
lower sideband.
Q4.
A. I) 2 marks + II) 2 marks
225 MHz

4b
I) Sampling theorem proof with proper diagram. (3 marks)

II) 1 marks
Q5 A ) 2 + 2
5 B) 2 + 2
6 A) 3 + 1
6 B) 2 + 2
Q7)A=4,B=4
258.1; L = 512

9 x 3 = 27 KHz
8 A) 4
8 B) 4

You might also like