0% found this document useful (0 votes)
5 views

03- Modulation and Multiple Access

The document provides an overview of modulation techniques and multiple access methods used in communication systems, including digital modulation types such as ASK, FSK, and PSK. It discusses various multiple access techniques like FDMA, TDMA, CDMA, and SDMA, highlighting their advantages and disadvantages. Additionally, it covers duplexing, characteristics of wireless channels, spreading spectrum methods, and error control mechanisms.

Uploaded by

Alizafar Bayani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

03- Modulation and Multiple Access

The document provides an overview of modulation techniques and multiple access methods used in communication systems, including digital modulation types such as ASK, FSK, and PSK. It discusses various multiple access techniques like FDMA, TDMA, CDMA, and SDMA, highlighting their advantages and disadvantages. Additionally, it covers duplexing, characteristics of wireless channels, spreading spectrum methods, and error control mechanisms.

Uploaded by

Alizafar Bayani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

Modulation and Multiple Access

Prepared By: Alizafar Bayani


Bachler of Computer Science at Kabul University
Master of Communication Systems at Yazd University, Iran.
Table of contents:

✓ Modulation Techniques
✓ Digital modulation
✓ Advanced Phase Shift Keying
✓ Multiple Access Techniques
✓ FDMA, TDMA, CDMA and SDMA
✓ Duplexing
✓ Characteristics of the Wireless Channel
✓ Spreading Spectrum
✓ FHSS, DSSS
✓ OFDM, OFDMA
✓ Error Control 2 From 23
Modulation Techniques

✓ Digital modulation
o Digital data (0 and 1) is translated into an analog signal.
o Required if digital data has to be transmitted over a media that only allows for
analog transmission - old analog telephone system and wireless networks.
✓ Digital modulation techniques
o Amplitude Shift Keying (ASK)
o Frequency Shift Keying (FSK)
o Phase Shift Keying (PSK)

o Differences in spectral efficiency, power efficiency, robustness

3 From 23
Digital modulation

✓ Modulation of digital signals known as Shift


Keying
❖ Amplitude Shift Keying (ASK):
o very simple
o low bandwidth requirements
o very susceptible to interference
❖ Frequency Shift Keying (FSK):
o needs larger bandwidth
o Binary FSK (BFSK): 1 is represented by fc + k
and 0 by fc – k.
❖ Phase Shift Keying (PSK):
o more complex
o robust against interference 4 From 23
Advanced Phase Shift Keying

✓ BPSK (Binary Phase Shift Keying):


o bit value 0: sine wave
o bit value 1: inverted sine wave
o very simple PSK
o low spectral efficiency
o robust, used e.g. in satellite systems
✓ QPSK (Quadrature Phase Shift Keying):
o 2 bits coded as one symbol
o symbol determines shift of sine wave
o needs less bandwidth compared to BPSK
o more complex
5 From 23
Advanced Phase Shift Keying

✓ Quadrature Amplitude Modulation (QAM): combines amplitude and phase


modulation
▪ It is possible to code n bits using one symbol
▪ 2𝑛 discrete levels, n=2 identical to QPSK
▪ bit error rate increases with n, but less errors compared to comparable PSK
schemes
✓ Example: 16-QAM (4 bits = 1 symbol)
▪ Symbols 0011 and 0001 have the same phase φ,
▪ but different amplitude a. 0000 and 1000 have
▪ different phase, but same amplitude.
▪ used in standard 9600 bit/s modems

6 From 23
Multiple Access Techniques

✓ Multiplexing in 4 dimensions
▪ frequency (f)
▪ time (t)
▪ code (c)
▪ space (s)

✓ Goal: multiple use of a shared medium

✓ Important: guard spaces needed!

7 From 23
FDMA

✓ Separation of the whole spectrum


into smaller frequency bands
✓ A channel gets a certain band of
the spectrum for the whole time
❖ Advantages:
▪ no dynamic coordination necessary
▪ works also for analog signals
❖ Disadvantages:
▪ waste of bandwidth if the traffic is
distributed unevenly
▪ guard spaces
8 From 23
TDMA

✓ A channel gets the whole spectrum


for a certain amount of time

❖ Advantages:
▪ only one carrier in the medium at
any time

❖ Disadvantages:
▪ waste of time if the traffic is
distributed unevenly
▪ Precise synchronization necessary

9 From 23
Time and Frequency Multiplexing

✓ Combination of both methods


✓ A channel gets a certain frequency band for a certain amount of time
✓ Example: GSM

10 From 23
CDMA

✓ Each channel has a unique code


✓ All channels use the same spectrum at
the same time
❖ Advantages:
o Bandwidth efficient
o No coordination and synchronization
necessary
o Good protection against interference
and tapping
❖ Disadvantages:
o more complex signal regeneration

✓ Implemented using spread spectrum


technology 11 From 23
SDMA

✓ Space division multiple access (SDMA) uses


directional transmitters/antennas to cover angular
regions.
✓ Different areas/regions can be served using the same
frequency channel.

12 From 23
Comparison SDMA/TDMA/FDMA/CDMA

13 From 23
Duplexing

✓ Duplex = Bi-Directional
Communication
✓ Frequency division
duplexing (FDD) (Full-
Duplex)
✓ Time division duplex
(TDD): Half-duplex

14 From 23
Duplexing

✓ In order to conserve energy at the MS, the uplink frequency is


always lower than the downlink frequency.
✓ Wireless devices should avoid transmitting and receiving at the same
time, since duplex filters increase the cost:
▪ TDD: this problem is automatically avoided
▪ FDD: IEEE 802.16 offers Half-duplex operation as an option in
Subscriber Stations.

15 From 23
Characteristics of the Wireless Channel

✓ Measures used for countering the effects of channel problems are:


Diversity and Adaptive modulation.
❖ Diversity:
▪ Frequency diversity: spread the transmission over frequencies. Example: the
direct sequence spread spectrum and the frequency hopping spread spectrum.
▪ Space diversity: use different physical transmission paths. An antenna array could
be used.

❖ Adaptive modulation: the transmitter adjusts the transmission based on the


feedback from the receiver.
❖ For far distance is used BPSK and for near distance we can use 64 PSK or 16PSK

16 From 23
Spreading Spectrum

✓ In spread spectrum (SS), our goals are to prevent eavesdropping


and jamming.
✓ Spread spectrum techniques, spread signal to fit into a larger
bandwidth, so add redundancy.

✓ Two Methods:
▪ Frequency Hopping Spread Spectrum (FHSS)
▪ Direct Sequence Spread Spectrum (DSSS)

17 From 23
FHSS

✓ The data signal is modulated with a narrowband carrier signal that "hops"
in a random but predictable sequence from frequency to frequency as a
function of time over a wide band of frequencies.
✓ Discrete changes of carrier frequency
▪ The pattern of channel usage is called the hopping sequence, the time
spent on a channel with a certain frequency is called the dwell time.
▪ Sequence of frequency changes determined via pseudo random number
sequence.
✓ Two versions
▪ Fast Hopping: several frequencies per user bit
▪ Slow Hopping: several user bits per frequency (not immune to
narrowband interference).
18 From 23
DSSS

✓ Data signal is combined with a higher data rate bit sequence, or


chipping code. The chipping code which increases the signal's resistance
to interference.
✓ XOR of the signal with pseudo-random number (chipping sequence)
▪ many chips per bit (e.g., 128) result in higher bandwidth of the signal

19 From 23
OFDM

20 From 23
Advantages of OFDM

✓ Easy to implement using FFT/IFFT


✓ Robustness against frequency selective burst errors
✓ Allows adaptive modulation and coding of subcarriers
✓ Robust against narrowband interference (affecting only
some subcarriers)
✓ Allows pilot subcarriers for channel estimation

21 From 23
OFDMA

✓ Orthogonal Frequency Division Multiple Access


✓ Each user has a subset of subcarriers for a few slots
✓ OFDM systems us TDMA
✓ OFDMA allows Times + Freq DMA => 2D Scheduling

22 From 23
Error Control

✓ Error-correcting codes/forward error correction


▪ include enough redundant information to enable the receiver to deduce the
correct transmitted data.
▪ Used in unreliable channel such as wireless links
✓ Error-detecting codes
▪ include only enough redundancy to allow the receiver to request a
retransmission.
▪ Used in reliable channel such as fiber
✓ N-bit codeword = m-bit data + r-bit check

23 From 23
AT THE END!

24 From 23

You might also like