0% found this document useful (0 votes)
2 views

Lab Simulation

The document provides an overview of digital modulation techniques, specifically Amplitude Shift Keying (ASK), Frequency Shift Keying (FSK), Phase Shift Keying (PSK), and Quadrature Amplitude Modulation (QAM). It details the principles of modulation and demodulation for each technique, including their applications, advantages, disadvantages, and methods for signal recovery. The report aims to offer a comparative understanding of these modulation methods in modern communication systems.

Uploaded by

ramgoolamgomesh7
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Lab Simulation

The document provides an overview of digital modulation techniques, specifically Amplitude Shift Keying (ASK), Frequency Shift Keying (FSK), Phase Shift Keying (PSK), and Quadrature Amplitude Modulation (QAM). It details the principles of modulation and demodulation for each technique, including their applications, advantages, disadvantages, and methods for signal recovery. The report aims to offer a comparative understanding of these modulation methods in modern communication systems.

Uploaded by

ramgoolamgomesh7
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

I

TABLE OF CONTENTS
Table of Contents ...................................................................................................... I
Table of Figures ........................................................................................................ II
List of Tables ............................................................................................................. III
1. INTRO ………………………………………………………………………………. ….1
2. ASK ...............................................................................................................2-6
2.5. ASK DEMODULATION ................................................................................7-11
3. FSK............................................................................................................12-13
3.1. FSK DEMODULATION ...............................................................................14-18
4. PSK………………………..…………………………………………………… .19-20
4.1 PSK Demodulation……………………………………………………………21-23
5. QAM……………………………………………………………………………..24-29

I
TABLE OF FIGURES
Figure 1 ......................................................................................................................................................... 2
Figure 2 ......................................................................................................................................................... 3
Figure 3 ......................................................................................................................................................... 7
Figure 4 ......................................................................................................................................................... 8

Figure 5 ....................................................................................................................................................... 12
Figure 6 ....................................................................................................................................................... 13
Figure 7 ....................................................................................................................................................... 14
Figure 8 ....................................................................................................................................................... 15

Figure 9 ....................................................................................................................................................... 20
Figure 10 ..................................................................................................................................................... 21
Figure 11 ..................................................................................................................................................... 22
Figure 12 ..................................................................................................................................................... 24

Figure 13 ..................................................................................................................................................... 24
Figure 14 ..................................................................................................................................................... 25
Figure 15 ..................................................................................................................................................... 25
Figure 16 ..................................................................................................................................................... 28

Figure 17 ..................................................................................................................................................... 28
Figure 18 ..................................................................................................................................................... 29

II
LIST OF TABLES

III
1. INTRODUCTION

Digital modulation is a cornerstone of modern communication systems, enabling the


transmission of digital data over analog channels. This report explores several
fundamental digital modulation techniques: Amplitude Shift Keying (ASK), Frequency
Shift Keying (FSK), Phase Shift Keying (PSK), and Quadrature Amplitude Modulation
(QAM).
ASK encodes digital information by varying the amplitude of a carrier signal, using
distinct amplitudes to represent binary '1' and '0'. FSK, in contrast, encodes data by
shifting the carrier signal's frequency between two or more predetermined levels. PSK
achieves modulation by altering the phase of the carrier wave. QAM is a more
advanced technique that combines both amplitude and phase modulation to
increase spectral efficiency.
For each modulation technique, this report will cover the principles of modulation and
demodulation, including signal generation, waveforms, advantages, disadvantages,
and applications. By examining these techniques, the report aims to provide a
comparative understanding of their characteristics and trade-offs, highlighting their
importance in digital communication.

1
2. AMPLITUDE SHIFT KEYING

Amplitude Shift Keying (ASK) is a digital modulation technique. It transmits the digital
information by varying the amplitude of a carrier signal. In ASK, a high-amplitude
carrier signal is used to represent a binary '1,' and a low-amplitude carrier signal
represents a binary '0.'

It involves the superimposition of a carrier signal and a digital message signal. The
carrier signal is often a high-frequency sinusoidal waveform, which serves as the
carrier for the digital information. The binary message signal, consisting of '1's and '0's,
is used to control the amplitude of the carrier signal. The resultant signal formed after
the superimposition of message and carrier is transmitted over the communication
channel.

Figure 1

1. Pulse Generator (Binary Signal Source): Produces a digital signal (either ‘0’ or
‘1’).

2. Sinusoidal Source (Carrier Signal): Generates a high-frequency sinusoidal


wave.

3. Multiplier Block: Multiplies the binary signal with the sinusoidal carrier signal.

4. Scope : Displays the waveforms.

2
Figure 2

2.1 CARRIER SIGNAL


This is the continuous sinusoidal waveform, representing the carrier signal.
It remains active at all times and is used to transmit data when allowed by the binary
signal.

2.2 MESSAGE SIGNAL


This is a square wave, representing the digital input data (0s and 1s).

The signal alternates between high (1) and low (0) at regular intervals.

When it is high (1), the carrier is transmitted.

When it is low (0), the carrier is turned off.

2.3 MODULATED SIGNAL


This is the ASK modulated waveform, which is the product of the binary signal and
the carrier signal.

When the binary signal is 1, the modulated signal is a sinusoidal wave (carrier
present).

When the binary signal is 0, the modulated signal is a flat line (carrier absent).

The output waveform clearly exhibits on-off behavior, characteristic of On-Off


Keying (OOK).

3
2.4 QUESTIONS

1) Purpose & Characteristics of Carrier Signal

The carrier signal in Amplitude Shift Keying (ASK) is used to transmit the digital
information (binary data) over a communication channel. The amplitude of
the carrier signal is modulated based on the input binary data.
When the input bit is "1", the carrier signal is transmitted with a certain
amplitude.
When the input bit is "0", the carrier signal is suppressed (no signal is transmitted).

The carrier signal's high frequency allows it to carry the digital information
efficiently, while its sinusoidal nature ensures smooth transmission and
reception.

2) Application of ASK modulation

One common application of ASK modulation is in optical communication


systems, such as fiber-optic communication. In these systems, ASK is used to
transmit digital data by modulating the intensity of light which acts as the
carrier signal.

For example:

A binary "1" is represented by the presence of light (high intensity).

A binary "0" is represented by the absence of light (low intensity).

ASK is also used in RFID (Radio Frequency Identification) systems, where the
amplitude of the RF signal is modulated to transmit data between the RFID tag
and the reader.

4
3) Drawbacks of ASK modulation & their solution

 Drawback 1

Susceptibility to Noise:

ASK is highly sensitive to noise and interference because the information


is encoded in the amplitude of the signal. Any variation in amplitude
due to noise can lead to errors in the received data.

Solution

To overcome noise sensitivity, error detection and correction techniques


can be employed. Additionally, coherent demodulation (which uses a
synchronized carrier signal at the receiver) can improve the detection
of the signal in the presence of noise.

 Drawback 2

Inefficient Power Usage:

ASK is not power-efficient because the carrier signal is transmitted even


when the input bit is "0" (in some implementations, the carrier is
suppressed for "0", but this still leads to power inefficiencies).

Solution

More efficient modulation techniques like PSK or FSK can be used, as


they are less affected by amplitude variations and provide better power
efficiency.

 Drawback 3

Bandwidth Usage:

ASK requires a relatively large bandwidth compared to other


modulation techniques like Frequency Shift Keying (FSK) or Phase Shift
Keying (PSK).

Solution

To reduce bandwidth usage, filtering techniques can be applied to limit


the bandwidth of the transmitted signal. Alternatively, more advanced
modulation schemes like Quadrature Amplitude Modulation (QAM) can
be used, which offer higher data rates within the same bandwidth.

5
4) Draw the ASK modulated waveform for 110010

6
2.5 ASK DEMODULATOR

Demodulation in Amplitude Shift Keying (ASK) involves extracting the original digital
message signal from the modulated carrier wave. The process reverses the
modulation applied to the carrier signal. The demodulation of ASK can be performed
through various methods, such as envelope detection or coherent detection.

Figure 3

7
Figure 4

The scope in Figure 4 shows two traces:

 Top Trace (ASK Modulated Signal): This trace represents the received ASK
signal at the input of the demodulator. You can observe that the amplitude
of the carrier sine wave varies. In some intervals, the amplitude is higher
(representing a '1'), and in other intervals, the amplitude is significantly lower
(representing a '0').
 Bottom Trace (Demodulated Output): This trace shows the output of the
threshold detector. It represents the recovered binary data stream. Observe
how the output transitions between a high level (approximately 1) and a low
level (approximately 0), corresponding to the amplitude variations in the top
trace:
o When the amplitude of the ASK signal in the top trace is high, the
demodulator correctly outputs a high level (representing '1') in the
bottom trace.
o When the amplitude of the ASK signal in the top trace is low, the
demodulator correctly outputs a low level (representing '0') in the
bottom trace.

Correlation between the Traces:

By comparing the two traces, you can see the process of ASK demodulation:

1. The top trace shows the received signal where the digital information is
encoded in the amplitude variations of the carrier.
2. The demodulator processes this signal using multiplication with a local carrier,
filtering, envelope detection, and thresholding.
3. The bottom trace demonstrates the successful recovery of the original binary
data stream from the amplitude variations of the received ASK signal

8
2.6 QUESTIONS

1. Determine the cutoff value in LPF


0.16

2. Use of product block in the ASK demodulator

The product block multiplies the received ASK signal by a locally generated
carrier signal.
This process is called synchronous detection and helps in shifting the modulated
signal to the baseband frequency.
The multiplication step ensures that the signal components needed for
demodulation are extracted.

3. Use of comparator

The comparator is used to regenerate the original digital signal from the
demodulated analog waveform.
It compares the output of the LPF with a threshold value (e.g., 0.5).
If the signal is above the threshold, the output is logic 1, and if below, the output
is logic 0.
This restores the digital form of the transmitted data.

4. Differentiate between coherent and non-coherent demodulation

1. Coherent Demodulation
Definition:
Coherent demodulation requires the receiver to generate a local carrier signal that
is synchronized in frequency and phase with the carrier signal used at the transmitter.
This synchronization is critical for accurately recovering the original signal.
Key Features:
1. Synchronization: The receiver must generate a carrier signal that matches the
frequency and phase of the transmitted carrier.
2. Complexity: Coherent demodulation is more complex because it requires
precise synchronization.
3. Accuracy: It provides better performance in terms of noise immunity and signal
recovery, especially in low signal-to-noise ratio (SNR) conditions.
4. Applications: Used in modulation schemes like PSK (Phase Shift Keying), QAM
(Quadrature Amplitude Modulation), and coherent ASK (Amplitude Shift
Keying).

9
Working Principle:
1. The incoming modulated signal is multiplied by a locally generated carrier
signal that is synchronized with the transmitter's carrier.
2. The product of this multiplication is then passed through a low-pass filter to
extract the original baseband signal.
3. Example: In ASK demodulation, the product block multiplies the ASK signal with
the synchronized carrier, and the result is filtered to recover the binary data.
Advantages:
1. Higher accuracy and better noise performance.

2. Suitable for high-data-rate communication systems.

Disadvantages:
1. Requires precise synchronization, which increases system complexity.

2. More susceptible to phase noise and frequency offsets.

3. Non-Coherent Demodulation

Definition:

Non-coherent demodulation does not require the receiver to generate a


carrier signal that is synchronized with the transmitter's carrier. Instead, it relies
on the envelope or energy of the received signal to recover the original
information.

Key Features:

1. No Synchronization: The receiver does not need to know the phase or


frequency of the transmitted carrier.
2. Simplicity: Easier to implement because it avoids the need for carrier recovery
circuits.
3. Robustness: Less sensitive to phase and frequency mismatches, making it more
robust in certain scenarios.
Applications: Commonly used in ASK (Amplitude Shift Keying), FSK (Frequency
Shift Keying), and OOK (On-Off Keying) systems.

Working Principle:

1. The demodulator detects the envelope or energy of the modulated signal.


2. For example, in ASK demodulation, a simple envelope detector (diode + low-
pass filter) can be used to extract the amplitude variations, which represent the
binary data.
3. No multiplication with a local carrier is required.

10
Advantages:

1. Simpler and less expensive to implement.


2. Does not require precise synchronization, making it more robust in environments
with phase noise or frequency drift.

Disadvantages:
1. Lower performance in low SNR conditions compared to coherent
demodulation.
2. Less accurate for high-data-rate or complex modulation schemes.

5.Block Diagram of a non-coherent ASK demodulator

11
3. FSK

Frequency Shift Keying (FSK) is a digital modulation method where digital data is
represented by discrete frequency variations of a carrier signal. Unlike modulation
techniques that alter the carrier's amplitude or phase, FSK encodes binary
information by switching the carrier's frequency between two or more
predetermined levels. Binary FSK (BFSK) is the most common form, employing two
frequencies to signify binary 1s and 0s.

The efficiency and robustness of FSK make it suitable for various communication
systems. The design of FSK modulators and demodulators involves controlling and
detecting these frequency shifts. While conceptually simple, the precise
implementation of FSK systems requires careful consideration of factors like
frequency separation and demodulation techniques to ensure accurate data
recovery.

Figure 5

12
Figure 6

Top trace: This trace shows the input binary data stream. It consists of a sequence
of 0s and 1s, which are represented by rectangular pulses of equal width.

Middle trace: This trace shows the FSK modulated signal. It is a continuous waveform
that switches between two different frequencies to represent the binary data. The
higher frequency represents "1" and the lower frequency represents "0".

Bottom trace: This trace shows the output of the FSK demodulator, which is a filtered
and rectified version of the FSK modulated signal. It should be a sequence of pulses
that correspond to the original binary data stream.

13
3.1 FSK DEMODULATOR

FSK demodulation can be implemented using various techniques. In some FSK


systems, demodulation requires coherent detection, where the receiver must be
synchronized with the phase of the received carrier signal. Devices like Charge Pump
Phase-Locked Loops (PLLs) are used to achieve this synchronization and accurately
demodulate the FSK signal. The demodulator processes the received signal to
differentiate between the 'mark' and 'space' frequencies and recover the original
binary sequence.

Figure 7

14
Figure 8

The scope in Figure 8 shows three traces:

1. Top Trace (Binary Input Data): This trace displays the output of the Bernoulli
Binary Generator. It's a sequence of rectangular pulses alternating between
approximately 0 and 1, representing the binary data being transmitted.
2. Middle Trace (FSK Modulated Signal): This trace shows the output of the
switch, which is the FSK modulated signal. Observe how the frequency of the
sine wave changes in accordance with the binary input data (top trace):
o When the top trace is high (representing '1'), the middle trace exhibits
a higher frequency.
o When the top trace is low (representing '0'), the middle trace exhibits a
lower frequency.
3. Bottom Trace (Demodulated Output): This trace shows the output of the
relational operator after the PLL attempts to track and demodulate the FSK
signal.
o The PLL's output voltage will vary depending on whether it's locked
onto the mark frequency or the space frequency.
o The relational operator compares this voltage to the threshold (0).
When the PLL is locked onto the mark frequency (higher frequency), its
output voltage will likely be above the threshold, resulting in a high
level (approximately 1) in the bottom trace.
o When the PLL is locked onto the space frequency (lower frequency), its
output voltage will likely be below the threshold, resulting in a low level
(approximately 0) in the bottom trace.
o Therefore, the bottom trace represents the recovered binary data
stream. Ideally, it should closely resemble the original binary input data
(top trace), although there might be some delay or slight distortions
due to the PLL's tracking behavior and the filtering involved.

15
4. Correlation between the Traces:

By examining all three traces together, you can see the entire FSK transmission
and reception process:

 The top trace shows the original digital information.


 The middle trace shows how this information is encoded by changing the
frequency of a carrier signal.
 The bottom trace demonstrates how the receiver (using a PLL) attempts to
identify these frequency changes and recover the original digital information.

The scope readings in Figure 8 visually confirm the operation of the FSK modulation
and demodulation process using a Charge Pump PLL. The changes in frequency in
the modulated signal directly correspond to the binary data, and the demodulator
successfully (with some potential delay or filtering effects) recovers this original data.

16
3.2 QUESTIONS

1. What is the purpose of the Bernoulli block in the model?

The Bernoulli Binary Generator block generates a sequence of random binary


numbers (0s and 1s). In this model, it simulates the digital information source
that needs to be transmitted using FSK.

2. What is the difference in ASK and FSK modulator block diagrams?

 In an ASK (Amplitude Shift Keying) modulator, only one sine wave generator is
required, and the amplitude of this carrier signal is switched between two
levels (representing 0 and 1) according to the input binary sequence.
 In an FSK modulator, two sine wave generators are required, each producing
a different frequency. A switch is used to select one of the two frequencies
based on the input binary sequence. Thus, the key difference is the use of two
sine waves with different frequencies in FSK, compared to a single sine wave
with varying amplitude in ASK.

3. In an FSK system, the bits 0 and 1 are represented by sine waves of 10 kHz
and 25 kHz respectively. For what bit interval are these waveforms
orthogonal?

To find the bit interval for which the waveforms are orthogonal, the
frequencies and the interval need to satisfy the orthogonality condition. This
condition generally involves the integral of the product of the two signals over
the bit interval being zero or a multiple of the bit period.

You would typically need to use the formula for orthogonality of sinusoidal
functions and solve for the bit interval (Tb).

f1=10 kHz, f2=25 kHz

Tb= 1/(25-10kHz)=66.67μs

So, the bit interval for which the waveforms are orthogonal is 66.67
microseconds (µs).

4. What is the main advantage of FSK over ASK?

FSK is less susceptible to noise and amplitude variations compared to ASK. In


ASK, information is encoded in the amplitude of the carrier, which can be
easily affected by noise. FSK encodes information in the frequency, which is
more robust to noise.

17
5. What is the type of FSK demodulation being simulated?

The demodulation method being simulated involves a Charge Pump PLL


(Phase-Locked Loop). This indicates that it's a coherent demodulation
technique, as PLLs are used for coherent detection where the receiver must
be synchronized with the incoming signal's phase.

6. Give an application of FSK.

o Telemetry systems: For transmitting data from remote locations.

18
4. PSK

Phase Shift Keying (PSK) is a modulation scheme that belongs to the family of digital
modulation techniques. It operates by modulating the phase of a sinusoidal carrier
wave in accordance with the digital information being transmitted. The core principle
involves discretely shifting the carrier's phase while keeping its amplitude and
frequency constant. The amount of phase shift corresponds to the specific digital
symbol, enabling the representation of binary or multi-level data. PSK is widely used in
digital communication systems due to its efficiency and robustness.

Figure 9

Components :

1. Top Input (Square Wave): This represents the digital binary data stream. The
waveform alternates between a high level (representing a '1') and a low level
(representing a '0'). This is the information we want to transmit.
2. Sine Wave Generator: This block generates the carrier signal, a pure sinusoidal
waveform at a specific frequency. This acts as the base signal onto which our
digital data will be modulated.
3. Constant Block (-1): This provides a constant value of -1.
4. Multiplier: This is the core of the BPSK modulator. It takes two inputs:
o The binary data stream (the square wave).
o The output of a switch.
5. Switch: This block acts as a selector. Its output depends on the value of the
binary data stream:
o When the binary data is high (representing '1'): The switch passes the
sine wave directly to the multiplier.
o When the binary data is low (representing '0'): The switch passes the
sine wave multiplied by -1 (from the constant block) to the multiplier.
Multiplying a sine wave by -1 is equivalent to a 180-degree phase shift.
6. Scope: This displays the waveforms at different points in the system, allowing
us to observe the signals.

19
Figure 9

 Top Trace (PSK Modulated Signal): This is the output of the multiplier and
represents the BPSK modulated signal. Observe how the phase of the sine
wave changes in accordance with the binary input data (shown in the
bottom trace).
o When the bottom trace (binary data) is high: The top trace (modulated
signal) shows the carrier sine wave with its original phase (let's consider
this 0 degrees for reference).
o When the bottom trace (binary data) is low: The top trace (modulated
signal) shows the carrier sine wave with its phase shifted by 180
degrees. You can visually identify this as an inversion of the sine wave
compared to the segments where the binary data is high.
 Bottom Trace (Binary Input Data): This trace shows the original binary data
stream that was fed into the modulator. It's the same square wave signal
mentioned as the top input in the modulator diagram. You can clearly see
the transitions between the high and low levels, representing the '1's and '0's
of the digital data.

Correlation between the Traces:

By comparing the two traces, you can see the direct relationship between the
binary input and the phase of the modulated carrier:

 A high level in the bottom trace corresponds to one phase of the carrier in
the top trace.
 A low level in the bottom trace corresponds to the opposite phase (180
degrees shifted) of the carrier in the top trace.

Therefore, the scope readings in Figure 9 clearly demonstrate the principle of Binary
Phase Shift Keying, where the binary data is encoded by shifting the phase of the
carrier signal. The top trace visually represents the modulated signal with its two
distinct phases, while the bottom trace shows the original binary information that
caused these phase shifts.

20
4.1 PSK DEMODULATOR

Demodulation of PSK signals involves extracting the original digital data from the
received modulated signal. This process is crucial for ensuring accurate data
recovery in communication systems. The primary challenge in PSK demodulation is
correctly identifying phase changes in the presence of noise, phase shifts, and signal
distortions.

There are two main approaches to PSK demodulation: coherent and non-coherent
detection. Coherent demodulation requires synchronization with a reference carrier
and is commonly used in Binary PSK (BPSK) and Quadrature PSK (QPSK) systems for
improved performance. Non-coherent demodulation, on the other hand, does not
require phase synchronization and is suitable for simpler systems with lower
computational requirements.

Figure 10

21
Figure 11

The scope in Figure 11 shows three traces:

 Top Trace (PSK Modulated Signal): This trace represents the received BPSK
modulated signal. You can observe a continuous sine wave where the phase
abruptly changes at certain points. These phase shifts (likely 180°) correspond
to the transitions in the original binary data.
 Middle Trace (Output of Low Pass Filter): This trace shows the signal after the
multiplier and the low pass filter. The multiplication with the coherent carrier
and the filtering process recover the baseband representation of the
transmitted data. You can see a waveform that transitions between positive
and negative levels (or around a DC offset), corresponding to the '1's and '0's.
The transitions are not perfectly sharp due to the filtering.
 Bottom Trace (Demodulated Output): This trace shows the output of the
threshold detector. It represents the recovered binary data stream. The
waveform is a digital signal that transitions between a low level
(approximately 0) and a high level (approximately 1), corresponding to the
positive and negative levels (or levels above and below the threshold) in the
middle trace. This bottom trace should ideally resemble the original binary
data that was used to modulate the carrier.

Correlation between the Traces:

By comparing the three traces, you can understand the coherent BPSK
demodulation process:

1. The top trace shows the received signal with phase shifts encoding the binary
data.
2. The middle trace shows the result of multiplying the received signal with a
synchronized local carrier and then filtering out high-frequency components,
effectively extracting the baseband data.
3. The bottom trace shows the final recovered binary data after comparing the
filtered signal with a threshold, converting the continuous-time signal back
into a digital sequence

22
4.2 QUESTIONS
1. Explain how a BPSK can be modified to a QPSK.
 BPSK modulates the phase of a carrier signal with two phases (0° and
180°) to represent binary data (0 and 1).
 QPSK modulates the phase of a carrier signal with four phases (0°, 90°,
180°, and 270°) to represent two bits of data simultaneously.
 To modify a BPSK modulator to a QPSK modulator:

o The incoming bit stream is first converted into two separate bit streams,
often called the I (in-phase) and Q (quadrature) channels.
o Each of these bit streams then modulates a carrier. The I-channel
modulates a cosine wave, and the Q-channel modulates a sine wave
(which is phase-shifted by 90° from the cosine).
o These two modulated signals are then added together to produce the
QPSK signal.
o At the demodulator, the received signal is separated back into the I
and Q components and then demodulated to recover the original two
separate bit streams.

2. Explain why a PSK demodulator can exist only as a coherent one.

 The document mentions that the PSK demodulator in the lab is a coherent
type but doesn't explain why this is the only option.
 However, PSK demodulation generally requires coherent detection because
the phase of the carrier wave contains the information. To accurately recover
the data, the receiver must have a reference carrier that is phase-
synchronized with the received carrier. Any phase difference between the
reference and the received carrier will lead to incorrect demodulation. This
phase synchronization is achieved through coherent detection.

3. What is the limitation of PSK when compared to ASK?

 The document does not explicitly compare the limitations of PSK with ASK.
 However, in general, ASK is more susceptible to noise and amplitude
variations because the data is encoded in the amplitude of the carrier. PSK is
more robust to amplitude variations since the data is encoded in the phase,
which is less affected by noise.

4. Provide 2 applications of the PSK scheme.

PSK is widely used for wireless LANs, bio-metric, and Bluetooth


communications.

23
5. QAM

Quadrature Amplitude Modulation (QAM) is a modulation technique that efficiently


uses the frequency spectrum by employing both amplitude and phase variations to
encode data. QAM involves modulating two carrier signals, a sine and a cosine wave,
which are 90 degrees out of phase with each other (in quadrature). These modulated
carriers, known as the In-phase (I) and Quadrature (Q) signals, are then combined,
resulting in a signal that carries information in both its amplitude and phase. Digital
QAM is particularly important for high-speed data communications and is found in
applications ranging from cellular technology (like LTE) to wireless systems (like Wi-Fi).

Figure 12

Figure 13

SA1

24
SA2 Figure 14

SA3 Figure 15

25
5.1 QUESTIONS

1. What can you infer about the frequency of the carrier signals?

 The instructions specify setting the message signal frequency to 2*pi*10 and
the carrier signal (sine wave) frequency to 2*pi*200. A copy of the carrier
signal is used as a cosine wave carrier.
 This indicates that the carrier signals (both sine and cosine) have a much
higher frequency (200) than the message signal (10).
 In QAM, the higher frequency carrier signals are used to efficiently transmit
the lower frequency message signal by modulating both their amplitude and
phase.

2. How did you generate a cosine carrier signal from a sine carrier signal?

 The lab instructions state: "Copy the carrier signal (sine wave) and paste it in
the model, renaming it to carrier signal (cosine wave). Modify the parameters
of the carrier signal (cosine wave) to get a quadrature signal.
 This implies that to generate a cosine wave from a sine wave in Simulink, you
would adjust the phase of the sine wave by 90 degrees (or π/2 radians). A
cosine wave is essentially a sine wave shifted by 90 degrees.
 Simulink's sine wave block likely has a "Phase" parameter that can be
adjusted to achieve this shift

3. What analysis can you make from the 3 spectrum analyzers?

The three spectrum analyzer scopes are likely observing the frequency spectrum
at different points in the QAM modulation process.

Spectrum Analyzer 1 (SA1): This scope is likely displaying the spectrum of one of the
baseband data signals (either the I or the Q component) after pulse shaping.

o The spectrum shows a main lobe centered around 0 Hz (DC) and


subsequent side lobes that decrease in amplitude as the frequency
moves away from the center.
o The shape of this spectrum is characteristic of a signal that has
undergone pulse shaping to limit its bandwidth. The specific shape
(e.g., raised cosine) would depend on the type of filter used.
o The bandwidth of this signal can be estimated by observing the width
of the main lobe and the rate at which the side lobes decay.

26
 Spectrum Analyzer 2 (SA2): This scope is likely displaying the spectrum of the
QAM modulated signal.
o The spectrum is now centered around the carrier frequency (which is
not explicitly labeled on the frequency axis but is clearly shifted away
from 0 Hz).
o We can observe a main lobe centered at the carrier frequency and
side lobes on either side. These side lobes are related to the spectral
characteristics of the baseband data signals (as seen in Spectrum
Analyzer 1).
o The bandwidth of the modulated signal is approximately twice the
bandwidth of the baseband signal (due to the modulation process
creating upper and lower sidebands around the carrier).
o The symmetry of the spectrum around the carrier frequency is
expected for QAM.
 Spectrum Analyzer 3 (SA3): This scope could be displaying the spectrum at a
few possible points:
o It might be displaying the spectrum of the other baseband data signal
(the one not shown in Spectrum Analyzer 1) after pulse shaping. In an
ideal QAM system with balanced I and Q channels carrying similar
data, this spectrum should look very similar to the spectrum in
Spectrum Analyzer 1. The visual similarity between Spectrum Analyzer 1
and 3 suggests this is a strong possibility.
o Alternatively, it could be displaying the spectrum of one of the
modulated components (either the I component multiplied by the
cosine carrier OR the Q component multiplied by the sine carrier)
before they are summed together. In this case, the spectrum would be
centered at the carrier frequency with sidebands, similar to Spectrum
Analyzer 2, but representing only one of the quadrature components.
However, the visual similarity to Spectrum Analyzer 1 makes the first
possibility more likely.

Overall Analysis and Inferences:

From the three spectrum analyzers, we can infer the following about the QAM
modulation process:

 Baseband Bandwidth: The spectrum in Analyzer 1 (and likely Analyzer 3) shows


the bandwidth occupied by the baseband data signals after pulse shaping.
This bandwidth is controlled by the design of the pulse shaping filters.
 Carrier Frequency: The spectrum in Analyzer 2 clearly shows that the
baseband signals have been modulated onto a carrier frequency, shifting
their spectral content to a higher frequency range.
 Modulated Signal Bandwidth: The bandwidth of the QAM modulated signal is
related to the bandwidth of the baseband signals and is centered around
the carrier frequency.
 Symmetry: The symmetrical nature of the modulated spectrum around the
carrier frequency is a characteristic of amplitude modulation techniques like
those used in QAM.

27
6. PART 2

Figure 16

Figure 17

28
Figure 18

What can you infer from Part 1 and Part 2 of this practical?

 Part 1 focuses on the fundamental principle of QAM modulation and


demodulation by building a basic Simulink model. It emphasizes the
generation of I and Q signals and observing the signals in the frequency
domain using spectrum analyzers.
 Part 2 builds a more complex QAM system using the "General QAM" blocks in
Simulink. This part likely explores aspects like:
o Generating random integer inputs.
o Using constellation diagrams to visualize the QAM signal.
o Parameters of QAM modulation like set size.

 Inference: By comparing Part 1 and Part 2, we can infer that Part 1 provides a
simplified, hands-on understanding of the underlying signals and processes in
QAM, while Part 2 utilizes built-in QAM blocks to model a more complete
QAM communication system, highlighting its practical implementation and
key parameters.

29
7. CONCLUSION

This report has examined the characteristics of ASK, FSK, PSK, and QAM, demonstrating
the various ways digital data can be encoded onto a carrier signal.
ASK, while simple to implement, is susceptible to noise and power-inefficient. FSK offers
better noise immunity than ASK but requires more complex demodulation. PSK is more
power-efficient than ASK and less susceptible to noise but has phase ambiguity issues.
QAM provides the highest spectral efficiency by combining amplitude and phase
modulation, but it is also the most complex and sensitive to noise.
The choice of modulation technique depends on specific application requirements
and constraints, including noise levels, power limitations, bandwidth availability, and
system complexity. Understanding the trade-offs between these modulation methods
is crucial for designing effective and efficient digital communication systems.

30

You might also like