Digital Modulation Techniques (Prof Z. K. Adeyemo)
Digital Modulation Techniques (Prof Z. K. Adeyemo)
Modulation is defined as the process by which some characteristics of a carrier are varied
in accordance with a modulating signal. In digital communications, the modulating signals consists
of binary data or an M-ary encoded version of it. These data are used to modulate a carrier wave
(usually sinusoidal). In fact, the input data may represent the digital computer outputs or PCM
waves generated by digitizing voice or video signals. The channel may be a telephone channel,
microwave radio link, satellite channel or an optical fiber. In digital communication, the
modulation process involves switching or keying the amplitude, frequency or phase of the carrier
Thus, there are three basic modulation techniques for the transmission of digital data. They
are known as Amplitude Shift Keying (ASK), Frequency Shift Keying (FSK) and Phase Shift
Keying (PSK) which can be viewed as special cases of amplitude modulation, frequency
The Figure 1 shows the waveforms for Amplitude Shift Keying, Phase Shift Keying and
Frequency Shift Keying. In teach of hese waveforms, a single feature of the carrier (i.e. amplitude,
1
Fig 1
simultaneously. This is known as M-ary transmission. This type of transmission results in reduced
channel bandwidth. However, sometimes, we use two quadrature carriers for modulation. This
Thus, we see that there are a number of modulation schemes available to the designers of
a digital communication system required for data transmission over a bandpass channel. Every
scheme offers system trade-offs of its own. However, the final choice made by the designer is
determined by the way in which the available primary communication resources such as
transmitted power and channel bandwidth are best exploited. In particular, the choice is made of a
(ii) Minimum Probability of Symbol Error or Minimum Bit Error Rate (BER)
2
(v) Maximum resistance to interfering signals
techniques, depending on whether the receiver is equipped with a phase-recovery circuit or not.
The phase-recovery circuit ensures that the oscillator supplying the locally generated carrier wave
receiver is synchronized with the oscillator supplying the carrier wave used to originally modulate
Coherent digital modulation techniques are those techniques which employed coherent
detection. In coherent detection, the local carrier generated at the receiver is phase locked with the
carrier at the transmitter. Thus, the detection is done by correlating received noisy signal and
Non-coherent digital modulation techniques are those techniques in which the detection
process does not need receiver carrier to be phase locked with transmitter carrier. The advantage
of this type of system is that the system becomes simple. But the drawback of the system is that
the error probability increases. In fact, the different digital modulation techniques are used for
3
Coherent Binary Amplitude Shift Keying (ASK) or On-Off Keying (OOK)
Definition:
Amplitude Shift Keying (ASK) or ON-OFF Keying (OOK) is the simplest digital modulation
technique. In this method, there is only one-unit energy carrier and it is switched on or off
Fig 2
4
Signal 𝑠(𝑡) contains some complete cycles of carrier frequency ‘𝑓𝑖 ’. Hence, the ASK waveform
looks like an ON-OFF of the signal. Therefore, it is also known as the ON-OFF Keying (OOK).
ASK signal may be generated by simply applying the incoming binary data (representing in
unipolar form) and the sinusoidal carrier to the two inputs of a product modulation (i.e. balanced
modulation). The resulting output will be the ASK waveform. This is shown below.
1 1
ASK Band pass Band limited ASK
Signal Filter (BPF)
0 0 0
T b
Working operation:
The demodulation of binary ASK waveform can be achieved with the help of coherent detector
decision-making device. The incoming ASK signal is applied to one input of the product
modulator. The other input is connected to sinusoidal carrier which is generated with the help of a
local oscillator. The output of the modulator goes to the input of the integrator. The integrator acts
5
on the output of the multiplier for successive bit intervals and essentially performs a Low Pass
Filtering action. The output of the integrator goes to the input of a decision making devcice.
Symbol , 1
Demodulated
Tb
if threshold
A output
dt
Incoming Binary
Decision
ASK waveform device exceed
0
Symbol 0 ,
cos ( 2 f t)
c
otherwise
Threshold
The decision-making device compares the output of the integrator with a preset threshold. It makes
a decision in favour of bit ‘1’ when the threshold is exceeded and in favour of bit ‘0’ otherwise. In
this method, we have assumed that the local carrier is in perfect synchronization with the carrier
used in the transmitter. Synchronization requirements are phase synchronization and timing
synchronization.
Drawback of BASK
(1) It is very sensitive to noise, therefore, finds limited application in data transmission.
(2) It is used at very low bit rates, up to 100 bit per sec.
6
Bit Error Rate (BER) or Probability of Error (𝑷𝒆 )
1 𝐸
BER or 𝑃𝑒 = 2 𝑒𝑟𝑓𝑐√4𝑁
𝑜
Definition:
Binary Phase Shift Keying (BPSK) is the most efficient scheme of all the basic digital
modulations i.e. ASK, FSK and PSK. BPSK is used for high bit rates. In this case, phase of the
sinusoidal carrier is changed according to the data bit to be transmitted. Also, a bipolar NRZ
signal is used to represent the digital data coming from the digital source.
In BPSK, the bits ‘1’and ‘0’ modulate the phase of the carrier. Let us assume that the carrier
is given as
Here ‘A’ = peak value of sinusoidal carrier. For the standard 1Ω load resistor, the power
dissipated would be
1
𝑃 = 2 𝐴2 (2)
or 𝐴 = √2𝑃
7
Now, when the bit is changed, then the phase of the carrier will be changed by an amount of 180𝑜
(𝜋 radian).
With the above equation, we can define BPSK signal as 𝑆(𝑡) = 𝑏(𝑡)√2𝑃 cos(2𝜋𝑓𝑐 𝑡)
BPSK signal may be generated by applying carrier signal to a balanced modulator. The binary data
(0s and 1s) are converted into NRZ bipolar signal by a NRZ encoder. The binary signal b(t) is
8
Bipolar NRZ
Bipolar A product
Binary Signal b(t)
NRZ Modulator or BPSK
Data Level Balanced signal
sequence encoder modulator
Carrier signal
Carrier signal
generator
Fig.6 shows the block diagram of the scheme to retrieve the BPSK signal. The transmitted BPSK
signal is given as
cos ( 2 f
Incoming
t )
A 2 A Frequency
c
A Square law
BPSK Bandpass c Divider by
Device
Signal filter two
Reference
signal
Integrator
C
cos ( 2 f t )
2
Synchronous b (t ) 2 p
c s 2
Demodulator
(multiplier) s (k T )
0 b
s 1
9
The signal undergoes the phase change depending on the time delay from the transmitter end to
receiver end. The phase change is, usually, a fixed phase shift in the transmitted signal. Let us
consider that the phase shift is 𝜃. As a result of this, the input of the receiver can be written as
Therefore, a carrier is separated because this is coherent detection. As depicted above, the received
signal is allowed to pass through a sequence law device. At the output of square law device, we
Note that we have neglected the amplitude, since we are only interested in the carrier of the signal.
1+𝑐𝑜𝑠2𝜃
Therefore, 𝐶𝑜𝑠 2 = 2
1 + 𝑐𝑜𝑠 2(2𝜋𝑓𝑐 𝑡 + 𝜃) 1 1
𝐶𝑜𝑠 2 (2𝜋𝑓𝑐 𝑡 + 𝜃) = = + cos 2 (2𝜋𝑓𝑐 𝑡 + 𝜃)
2 2 2
1
Where represents a DC level. This signal is allowed to pass through a BandPass Filter (BPF)
2
1
whose passband is centered around 2𝑓𝑐 . Bandpass filter removes the DC level of and at the
2
This signal is having frequency equal to 2𝑓𝑐 . Therefore, it is passed through a frequency divider
by two. Thus, at the output of frequency divider. We get a carrier signal whose frequency is 𝑓𝑐 i.e.
𝑐𝑜𝑠 (2𝜋𝑓𝑐 𝑡 + 𝜃). The synchronous demodulator multiplies the input signal and recovered carrier.
𝑃
= 𝑏(𝑡)√2 [1 + cos 2(2𝜋𝑓𝑐 𝑡 + 𝜃)]
10
This signal is then applied to the bit synchronizer and integrator. The integrator integrates bit over
one-bit period. The bit synchronized takes care of starting and ending time of a bit. At the end of
bit duration 𝑇𝑏 , the bit synchronizer closes switch 𝑆2 temporarily. This connects the output of an
integrator to the decision device. The synchronizer then opens switch 𝑆2 and switch 𝑆1 is closed
temporarily. This resets the integrator voltage to zero. Then the integrator integrates next bit.
BW = 𝑓𝑐 + 𝑓𝑏 − (𝑓𝑐 − 𝑓𝑏 )
BW = 2𝑓𝑏
The minimum BW of BPSK signal is equal to twice the highest frequency contained in baseband
signal.
(i) BPSK has a bandwidth which is lower than that of a BFSK signal.
(ii) BPSK has the best performance of all the three digital modulation techniques in the
Drawback of BPSK
(1) To regenerate the carrier in the receiver, we start by squaring 𝑏(𝑡)√2𝑃 cos(2𝜋𝑓𝑐 𝑡 + 𝜃).
If the received signal is −𝑏(𝑡)√2𝑃 cos(2𝜋𝑓𝑐 𝑡 + 𝜃), then the squared signal remains
same as before. Hence, the recovered carrier is unchanged even if the input signal has
11
changed its sign. Therefore, it is not possible to determine whether the received signal is
1 𝐸
BER or 𝑃𝑒 = 𝑒𝑟𝑓𝑐 √
2 𝑁 𝑜
This indicates that 𝑃𝑒 or BER depends on the energy contents of the signal i.e. E. Also, as the
energy increases, the value of complementary error function (erfc) decreases and the value of 𝑃𝑒
reduces.
In Binary Frequency Shift Keying (BFSK), the frequency of a sinusoidal carrier is shifted
according to the binary symbol. In other words, the frequencies of a sinusoidal carrier are shifted
between two discreet values. However, the phase of the carrier is unaffected. This means that we
have two different frequencies according to binary symbols. Let there be a frequency shift by Ω.
12
Hence, there is increase or decrease in frequency by Ω. Let us use the following conversion
1 + 1V + 1V 0V
0 −1V 0V +1V
Ω
Hence, if symbol ‘1’ is to be transmitted, the carrier frequency will be 𝑓𝑐 + (2𝜋) and is represented
Ω
by 𝑓𝐻 . If symbol ‘0’ is to be transmitted, then the carrier frequency will be 𝑓𝑐 − (2𝜋) and is
Ω
Thus, 𝑓𝐻 = 𝑓𝑐 + (2𝜋) for symbol ‘1’
Ω
𝑓𝐿 = 𝑓𝑐 − (2𝜋) for symbol ‘0’
Generation of BFSK
It may be observed from the table that 𝑃𝐻 (𝑡) is same as 𝑏 (𝑡) and also 𝑃𝐿 (𝑡) is inverted
version of 𝑏 (𝑡). The block diagram for BFSK generation is shown in Figure 7.
13
(t )
2
cos(2 f t)
1
T b
H
P (t)
H A Level PT P
s b H
(t )
shifter
b(t) BFSK
An input Signal
sequence s(t)
An P (t)
L A Level P T P (t)
s b L
Inverter shifter
2
(t ) cos( 2 f t)
2
T b
L
We know that input sequence 𝑏 (𝑡) is the same as 𝑃𝐻 (𝑡). An inverter is added after 𝑏 (𝑡)
to get 𝑃𝐿 (𝑡). The level shifter 𝑃𝐻 (𝑡) and 𝑃𝐿 (𝑡) are unipolar signals. The level shifter converts the
‘+1’ level to √𝑃𝑠 𝑇𝑏 . Zero level is affected. Thus, the output of the level shifters will be either
√𝑃𝑠 𝑇𝑏 (if ‘+1’) or zero (if input is zero). In other words, when a binary ‘0’ is to be transmitted,
𝑃𝐿 (𝑡) = 1 and 𝑃𝐻 (𝑡) = 0, and for a binary ‘1’ to be transmitted, 𝑃𝐻 (𝑡) = 1 and 𝑃𝐿 (𝑡) = 0. Hence,
the transmitted signal will have frequency of either 𝑓𝐻 or 𝑓𝐿 . Furthermore, there are product
modulators after level shifter. The two carrier signals ∅1 (𝑡)and ∅2 (𝑡) are used . ∅1 (𝑡) and ∅2 (𝑡)
are orthogonal to each other. In one bit period of input signal (i.e. 𝑇𝑏 ), ∅1 (𝑡) or ∅2 (𝑡) have integral
number of cycles.
Thus, the modulated signal is having continuous phase. Figure 8 shows such type of BFSK
14
1 0 1 1 0 1
T b T b
BW = 4𝑓𝑏
Now, let compare this bandwidth with that of BPSK, we note that,
BW (BFSK) = 2 × BW (BPSK)
Figure 9 shows the block diagram of a scheme for demodulation of BFSK wave using
coherent detection technique. The detector consists of two correlators that are individually turned
to two different carrier frequencies to represent symbols ‘1’ and ‘0’. A correlator consists of a
multiplier followed by an integrator. Then, the received binary FSK signal is applied to the
multiplier of both the correlators. To the other input of the multipliers, carriers with frequency 𝑓𝑐1
and 𝑓𝑐2 are applied as shown in Figure 9. The multiplied output of each multiplier is subsequently
passed through the integrators generating output 𝑙1and 𝑙2 in the two paths. The output of the two
integrators are then fed to the decision making device. The decision making device is essentially
a comparator which compares the output 𝑙1 (in the upper path) and output 𝑙2 (in the lower path). If
the output 𝑙1 produced in the upper path (associated with frequency 𝑓𝑐1 ) is greater than the output
15
𝑙2 produced in the lower path (associated with frequency 𝑓𝑐2 ), the detector makes a decision in
favour of symbol 1 (say). If the output 𝑙1 is less than 𝑙2 then the decision making device decides
in favour of symbol 0. This type of the digital communication receivers are also called correlation
receivers. As discussed earlier detector based upon coherent detection requires phase and timing
synchronization.
Correlator 1
T b
dt
Symbol 1,
0 l 1
cos(2 f t)
c2
(ii) It has better noise immunity than ASK. Hence, the probability of error free reception
of data is high.
Drawback of BFSK
The major drawback is its high bandwidth requirement. Therefore, FSK is extensively
used in low speed modems having bit rates below 1200 bits/sec.
16
1 𝐸
BER or 𝑃𝑒 = 𝑒𝑟𝑓𝑐 √
2 2𝑁𝑜
As discussed earlier, coherent detection exploits knowledge of the carrier wave’s phase
reference, and thus providing the optimum error performance attainable with a digital modulation
format of interest. However, when it is impractical to have knowledge of the carrier phase at the
receiver, we make use of non-coherent detection. Thus, in this section, we shall study non-coherent
binary modulation techniques i.e. we study non-coherent detection of ASK and FSK. In the case
of Phase Shift Keying (PSK), we cannot have “non-coherent PSK” since non-coherent means
doing without phase information. However, there is a “pseudo PSK” technique known as
Differential Phase Shift Keying (DPSK) which can be viewed as the non-coherent form of PSK.
Binary ASK signal can also be demodulated non-coherently using envelope detector. The
detection schemes do not require a phase-coherent local oscillator. This method involves some
forms of rectification and low pass filtering at the receiver. The block diagram of a non-coherent
17
A Low pass A
Incoming Rectifier Output
Bandpass Filter Decision
signal circuit signal
filter (LPF) Device
Envelope detctor
Threshold
The effect of noise on the capacity of the channel when the bandwidth is known has been explained
using Shannon Hartley theorem
18