Lab Simulation
Lab Simulation
TABLE OF CONTENTS
Table of Contents ...................................................................................................... I
Table of Figures ........................................................................................................ II
List of Tables ............................................................................................................. III
1. INTRO ………………………………………………………………………………. ….1
2. ASK ...............................................................................................................2-6
2.5. ASK DEMODULATION ................................................................................7-11
3. FSK............................................................................................................12-13
3.1. FSK DEMODULATION ...............................................................................14-18
4. PSK………………………..…………………………………………………… .19-20
4.1 PSK Demodulation……………………………………………………………21-23
5. QAM……………………………………………………………………………..24-29
I
TABLE OF FIGURES
Figure 1 ......................................................................................................................................................... 2
Figure 2 ......................................................................................................................................................... 3
Figure 3 ......................................................................................................................................................... 7
Figure 4 ......................................................................................................................................................... 8
Figure 5 ....................................................................................................................................................... 12
Figure 6 ....................................................................................................................................................... 13
Figure 7 ....................................................................................................................................................... 14
Figure 8 ....................................................................................................................................................... 15
Figure 9 ....................................................................................................................................................... 20
Figure 10 ..................................................................................................................................................... 21
Figure 11 ..................................................................................................................................................... 22
Figure 12 ..................................................................................................................................................... 24
Figure 13 ..................................................................................................................................................... 24
Figure 14 ..................................................................................................................................................... 25
Figure 15 ..................................................................................................................................................... 25
Figure 16 ..................................................................................................................................................... 28
Figure 17 ..................................................................................................................................................... 28
Figure 18 ..................................................................................................................................................... 29
II
LIST OF TABLES
III
1. INTRODUCTION
1
2. AMPLITUDE SHIFT KEYING
Amplitude Shift Keying (ASK) is a digital modulation technique. It transmits the digital
information by varying the amplitude of a carrier signal. In ASK, a high-amplitude
carrier signal is used to represent a binary '1,' and a low-amplitude carrier signal
represents a binary '0.'
It involves the superimposition of a carrier signal and a digital message signal. The
carrier signal is often a high-frequency sinusoidal waveform, which serves as the
carrier for the digital information. The binary message signal, consisting of '1's and '0's,
is used to control the amplitude of the carrier signal. The resultant signal formed after
the superimposition of message and carrier is transmitted over the communication
channel.
Figure 1
1. Pulse Generator (Binary Signal Source): Produces a digital signal (either ‘0’ or
‘1’).
3. Multiplier Block: Multiplies the binary signal with the sinusoidal carrier signal.
2
Figure 2
The signal alternates between high (1) and low (0) at regular intervals.
When the binary signal is 1, the modulated signal is a sinusoidal wave (carrier
present).
When the binary signal is 0, the modulated signal is a flat line (carrier absent).
3
2.4 QUESTIONS
The carrier signal in Amplitude Shift Keying (ASK) is used to transmit the digital
information (binary data) over a communication channel. The amplitude of
the carrier signal is modulated based on the input binary data.
When the input bit is "1", the carrier signal is transmitted with a certain
amplitude.
When the input bit is "0", the carrier signal is suppressed (no signal is transmitted).
The carrier signal's high frequency allows it to carry the digital information
efficiently, while its sinusoidal nature ensures smooth transmission and
reception.
For example:
ASK is also used in RFID (Radio Frequency Identification) systems, where the
amplitude of the RF signal is modulated to transmit data between the RFID tag
and the reader.
4
3) Drawbacks of ASK modulation & their solution
Drawback 1
Susceptibility to Noise:
Solution
Drawback 2
Solution
Drawback 3
Bandwidth Usage:
Solution
5
4) Draw the ASK modulated waveform for 110010
6
2.5 ASK DEMODULATOR
Demodulation in Amplitude Shift Keying (ASK) involves extracting the original digital
message signal from the modulated carrier wave. The process reverses the
modulation applied to the carrier signal. The demodulation of ASK can be performed
through various methods, such as envelope detection or coherent detection.
Figure 3
7
Figure 4
Top Trace (ASK Modulated Signal): This trace represents the received ASK
signal at the input of the demodulator. You can observe that the amplitude
of the carrier sine wave varies. In some intervals, the amplitude is higher
(representing a '1'), and in other intervals, the amplitude is significantly lower
(representing a '0').
Bottom Trace (Demodulated Output): This trace shows the output of the
threshold detector. It represents the recovered binary data stream. Observe
how the output transitions between a high level (approximately 1) and a low
level (approximately 0), corresponding to the amplitude variations in the top
trace:
o When the amplitude of the ASK signal in the top trace is high, the
demodulator correctly outputs a high level (representing '1') in the
bottom trace.
o When the amplitude of the ASK signal in the top trace is low, the
demodulator correctly outputs a low level (representing '0') in the
bottom trace.
By comparing the two traces, you can see the process of ASK demodulation:
1. The top trace shows the received signal where the digital information is
encoded in the amplitude variations of the carrier.
2. The demodulator processes this signal using multiplication with a local carrier,
filtering, envelope detection, and thresholding.
3. The bottom trace demonstrates the successful recovery of the original binary
data stream from the amplitude variations of the received ASK signal
8
2.6 QUESTIONS
The product block multiplies the received ASK signal by a locally generated
carrier signal.
This process is called synchronous detection and helps in shifting the modulated
signal to the baseband frequency.
The multiplication step ensures that the signal components needed for
demodulation are extracted.
3. Use of comparator
The comparator is used to regenerate the original digital signal from the
demodulated analog waveform.
It compares the output of the LPF with a threshold value (e.g., 0.5).
If the signal is above the threshold, the output is logic 1, and if below, the output
is logic 0.
This restores the digital form of the transmitted data.
1. Coherent Demodulation
Definition:
Coherent demodulation requires the receiver to generate a local carrier signal that
is synchronized in frequency and phase with the carrier signal used at the transmitter.
This synchronization is critical for accurately recovering the original signal.
Key Features:
1. Synchronization: The receiver must generate a carrier signal that matches the
frequency and phase of the transmitted carrier.
2. Complexity: Coherent demodulation is more complex because it requires
precise synchronization.
3. Accuracy: It provides better performance in terms of noise immunity and signal
recovery, especially in low signal-to-noise ratio (SNR) conditions.
4. Applications: Used in modulation schemes like PSK (Phase Shift Keying), QAM
(Quadrature Amplitude Modulation), and coherent ASK (Amplitude Shift
Keying).
9
Working Principle:
1. The incoming modulated signal is multiplied by a locally generated carrier
signal that is synchronized with the transmitter's carrier.
2. The product of this multiplication is then passed through a low-pass filter to
extract the original baseband signal.
3. Example: In ASK demodulation, the product block multiplies the ASK signal with
the synchronized carrier, and the result is filtered to recover the binary data.
Advantages:
1. Higher accuracy and better noise performance.
Disadvantages:
1. Requires precise synchronization, which increases system complexity.
3. Non-Coherent Demodulation
Definition:
Key Features:
Working Principle:
10
Advantages:
Disadvantages:
1. Lower performance in low SNR conditions compared to coherent
demodulation.
2. Less accurate for high-data-rate or complex modulation schemes.
11
3. FSK
Frequency Shift Keying (FSK) is a digital modulation method where digital data is
represented by discrete frequency variations of a carrier signal. Unlike modulation
techniques that alter the carrier's amplitude or phase, FSK encodes binary
information by switching the carrier's frequency between two or more
predetermined levels. Binary FSK (BFSK) is the most common form, employing two
frequencies to signify binary 1s and 0s.
The efficiency and robustness of FSK make it suitable for various communication
systems. The design of FSK modulators and demodulators involves controlling and
detecting these frequency shifts. While conceptually simple, the precise
implementation of FSK systems requires careful consideration of factors like
frequency separation and demodulation techniques to ensure accurate data
recovery.
Figure 5
12
Figure 6
Top trace: This trace shows the input binary data stream. It consists of a sequence
of 0s and 1s, which are represented by rectangular pulses of equal width.
Middle trace: This trace shows the FSK modulated signal. It is a continuous waveform
that switches between two different frequencies to represent the binary data. The
higher frequency represents "1" and the lower frequency represents "0".
Bottom trace: This trace shows the output of the FSK demodulator, which is a filtered
and rectified version of the FSK modulated signal. It should be a sequence of pulses
that correspond to the original binary data stream.
13
3.1 FSK DEMODULATOR
Figure 7
14
Figure 8
1. Top Trace (Binary Input Data): This trace displays the output of the Bernoulli
Binary Generator. It's a sequence of rectangular pulses alternating between
approximately 0 and 1, representing the binary data being transmitted.
2. Middle Trace (FSK Modulated Signal): This trace shows the output of the
switch, which is the FSK modulated signal. Observe how the frequency of the
sine wave changes in accordance with the binary input data (top trace):
o When the top trace is high (representing '1'), the middle trace exhibits
a higher frequency.
o When the top trace is low (representing '0'), the middle trace exhibits a
lower frequency.
3. Bottom Trace (Demodulated Output): This trace shows the output of the
relational operator after the PLL attempts to track and demodulate the FSK
signal.
o The PLL's output voltage will vary depending on whether it's locked
onto the mark frequency or the space frequency.
o The relational operator compares this voltage to the threshold (0).
When the PLL is locked onto the mark frequency (higher frequency), its
output voltage will likely be above the threshold, resulting in a high
level (approximately 1) in the bottom trace.
o When the PLL is locked onto the space frequency (lower frequency), its
output voltage will likely be below the threshold, resulting in a low level
(approximately 0) in the bottom trace.
o Therefore, the bottom trace represents the recovered binary data
stream. Ideally, it should closely resemble the original binary input data
(top trace), although there might be some delay or slight distortions
due to the PLL's tracking behavior and the filtering involved.
15
4. Correlation between the Traces:
By examining all three traces together, you can see the entire FSK transmission
and reception process:
The scope readings in Figure 8 visually confirm the operation of the FSK modulation
and demodulation process using a Charge Pump PLL. The changes in frequency in
the modulated signal directly correspond to the binary data, and the demodulator
successfully (with some potential delay or filtering effects) recovers this original data.
16
3.2 QUESTIONS
In an ASK (Amplitude Shift Keying) modulator, only one sine wave generator is
required, and the amplitude of this carrier signal is switched between two
levels (representing 0 and 1) according to the input binary sequence.
In an FSK modulator, two sine wave generators are required, each producing
a different frequency. A switch is used to select one of the two frequencies
based on the input binary sequence. Thus, the key difference is the use of two
sine waves with different frequencies in FSK, compared to a single sine wave
with varying amplitude in ASK.
3. In an FSK system, the bits 0 and 1 are represented by sine waves of 10 kHz
and 25 kHz respectively. For what bit interval are these waveforms
orthogonal?
To find the bit interval for which the waveforms are orthogonal, the
frequencies and the interval need to satisfy the orthogonality condition. This
condition generally involves the integral of the product of the two signals over
the bit interval being zero or a multiple of the bit period.
You would typically need to use the formula for orthogonality of sinusoidal
functions and solve for the bit interval (Tb).
Tb= 1/(25-10kHz)=66.67μs
So, the bit interval for which the waveforms are orthogonal is 66.67
microseconds (µs).
17
5. What is the type of FSK demodulation being simulated?
18
4. PSK
Phase Shift Keying (PSK) is a modulation scheme that belongs to the family of digital
modulation techniques. It operates by modulating the phase of a sinusoidal carrier
wave in accordance with the digital information being transmitted. The core principle
involves discretely shifting the carrier's phase while keeping its amplitude and
frequency constant. The amount of phase shift corresponds to the specific digital
symbol, enabling the representation of binary or multi-level data. PSK is widely used in
digital communication systems due to its efficiency and robustness.
Figure 9
Components :
1. Top Input (Square Wave): This represents the digital binary data stream. The
waveform alternates between a high level (representing a '1') and a low level
(representing a '0'). This is the information we want to transmit.
2. Sine Wave Generator: This block generates the carrier signal, a pure sinusoidal
waveform at a specific frequency. This acts as the base signal onto which our
digital data will be modulated.
3. Constant Block (-1): This provides a constant value of -1.
4. Multiplier: This is the core of the BPSK modulator. It takes two inputs:
o The binary data stream (the square wave).
o The output of a switch.
5. Switch: This block acts as a selector. Its output depends on the value of the
binary data stream:
o When the binary data is high (representing '1'): The switch passes the
sine wave directly to the multiplier.
o When the binary data is low (representing '0'): The switch passes the
sine wave multiplied by -1 (from the constant block) to the multiplier.
Multiplying a sine wave by -1 is equivalent to a 180-degree phase shift.
6. Scope: This displays the waveforms at different points in the system, allowing
us to observe the signals.
19
Figure 9
Top Trace (PSK Modulated Signal): This is the output of the multiplier and
represents the BPSK modulated signal. Observe how the phase of the sine
wave changes in accordance with the binary input data (shown in the
bottom trace).
o When the bottom trace (binary data) is high: The top trace (modulated
signal) shows the carrier sine wave with its original phase (let's consider
this 0 degrees for reference).
o When the bottom trace (binary data) is low: The top trace (modulated
signal) shows the carrier sine wave with its phase shifted by 180
degrees. You can visually identify this as an inversion of the sine wave
compared to the segments where the binary data is high.
Bottom Trace (Binary Input Data): This trace shows the original binary data
stream that was fed into the modulator. It's the same square wave signal
mentioned as the top input in the modulator diagram. You can clearly see
the transitions between the high and low levels, representing the '1's and '0's
of the digital data.
By comparing the two traces, you can see the direct relationship between the
binary input and the phase of the modulated carrier:
A high level in the bottom trace corresponds to one phase of the carrier in
the top trace.
A low level in the bottom trace corresponds to the opposite phase (180
degrees shifted) of the carrier in the top trace.
Therefore, the scope readings in Figure 9 clearly demonstrate the principle of Binary
Phase Shift Keying, where the binary data is encoded by shifting the phase of the
carrier signal. The top trace visually represents the modulated signal with its two
distinct phases, while the bottom trace shows the original binary information that
caused these phase shifts.
20
4.1 PSK DEMODULATOR
Demodulation of PSK signals involves extracting the original digital data from the
received modulated signal. This process is crucial for ensuring accurate data
recovery in communication systems. The primary challenge in PSK demodulation is
correctly identifying phase changes in the presence of noise, phase shifts, and signal
distortions.
There are two main approaches to PSK demodulation: coherent and non-coherent
detection. Coherent demodulation requires synchronization with a reference carrier
and is commonly used in Binary PSK (BPSK) and Quadrature PSK (QPSK) systems for
improved performance. Non-coherent demodulation, on the other hand, does not
require phase synchronization and is suitable for simpler systems with lower
computational requirements.
Figure 10
21
Figure 11
Top Trace (PSK Modulated Signal): This trace represents the received BPSK
modulated signal. You can observe a continuous sine wave where the phase
abruptly changes at certain points. These phase shifts (likely 180°) correspond
to the transitions in the original binary data.
Middle Trace (Output of Low Pass Filter): This trace shows the signal after the
multiplier and the low pass filter. The multiplication with the coherent carrier
and the filtering process recover the baseband representation of the
transmitted data. You can see a waveform that transitions between positive
and negative levels (or around a DC offset), corresponding to the '1's and '0's.
The transitions are not perfectly sharp due to the filtering.
Bottom Trace (Demodulated Output): This trace shows the output of the
threshold detector. It represents the recovered binary data stream. The
waveform is a digital signal that transitions between a low level
(approximately 0) and a high level (approximately 1), corresponding to the
positive and negative levels (or levels above and below the threshold) in the
middle trace. This bottom trace should ideally resemble the original binary
data that was used to modulate the carrier.
By comparing the three traces, you can understand the coherent BPSK
demodulation process:
1. The top trace shows the received signal with phase shifts encoding the binary
data.
2. The middle trace shows the result of multiplying the received signal with a
synchronized local carrier and then filtering out high-frequency components,
effectively extracting the baseband data.
3. The bottom trace shows the final recovered binary data after comparing the
filtered signal with a threshold, converting the continuous-time signal back
into a digital sequence
22
4.2 QUESTIONS
1. Explain how a BPSK can be modified to a QPSK.
BPSK modulates the phase of a carrier signal with two phases (0° and
180°) to represent binary data (0 and 1).
QPSK modulates the phase of a carrier signal with four phases (0°, 90°,
180°, and 270°) to represent two bits of data simultaneously.
To modify a BPSK modulator to a QPSK modulator:
o The incoming bit stream is first converted into two separate bit streams,
often called the I (in-phase) and Q (quadrature) channels.
o Each of these bit streams then modulates a carrier. The I-channel
modulates a cosine wave, and the Q-channel modulates a sine wave
(which is phase-shifted by 90° from the cosine).
o These two modulated signals are then added together to produce the
QPSK signal.
o At the demodulator, the received signal is separated back into the I
and Q components and then demodulated to recover the original two
separate bit streams.
The document mentions that the PSK demodulator in the lab is a coherent
type but doesn't explain why this is the only option.
However, PSK demodulation generally requires coherent detection because
the phase of the carrier wave contains the information. To accurately recover
the data, the receiver must have a reference carrier that is phase-
synchronized with the received carrier. Any phase difference between the
reference and the received carrier will lead to incorrect demodulation. This
phase synchronization is achieved through coherent detection.
The document does not explicitly compare the limitations of PSK with ASK.
However, in general, ASK is more susceptible to noise and amplitude
variations because the data is encoded in the amplitude of the carrier. PSK is
more robust to amplitude variations since the data is encoded in the phase,
which is less affected by noise.
23
5. QAM
Figure 12
Figure 13
SA1
24
SA2 Figure 14
SA3 Figure 15
25
5.1 QUESTIONS
1. What can you infer about the frequency of the carrier signals?
The instructions specify setting the message signal frequency to 2*pi*10 and
the carrier signal (sine wave) frequency to 2*pi*200. A copy of the carrier
signal is used as a cosine wave carrier.
This indicates that the carrier signals (both sine and cosine) have a much
higher frequency (200) than the message signal (10).
In QAM, the higher frequency carrier signals are used to efficiently transmit
the lower frequency message signal by modulating both their amplitude and
phase.
2. How did you generate a cosine carrier signal from a sine carrier signal?
The lab instructions state: "Copy the carrier signal (sine wave) and paste it in
the model, renaming it to carrier signal (cosine wave). Modify the parameters
of the carrier signal (cosine wave) to get a quadrature signal.
This implies that to generate a cosine wave from a sine wave in Simulink, you
would adjust the phase of the sine wave by 90 degrees (or π/2 radians). A
cosine wave is essentially a sine wave shifted by 90 degrees.
Simulink's sine wave block likely has a "Phase" parameter that can be
adjusted to achieve this shift
The three spectrum analyzer scopes are likely observing the frequency spectrum
at different points in the QAM modulation process.
Spectrum Analyzer 1 (SA1): This scope is likely displaying the spectrum of one of the
baseband data signals (either the I or the Q component) after pulse shaping.
26
Spectrum Analyzer 2 (SA2): This scope is likely displaying the spectrum of the
QAM modulated signal.
o The spectrum is now centered around the carrier frequency (which is
not explicitly labeled on the frequency axis but is clearly shifted away
from 0 Hz).
o We can observe a main lobe centered at the carrier frequency and
side lobes on either side. These side lobes are related to the spectral
characteristics of the baseband data signals (as seen in Spectrum
Analyzer 1).
o The bandwidth of the modulated signal is approximately twice the
bandwidth of the baseband signal (due to the modulation process
creating upper and lower sidebands around the carrier).
o The symmetry of the spectrum around the carrier frequency is
expected for QAM.
Spectrum Analyzer 3 (SA3): This scope could be displaying the spectrum at a
few possible points:
o It might be displaying the spectrum of the other baseband data signal
(the one not shown in Spectrum Analyzer 1) after pulse shaping. In an
ideal QAM system with balanced I and Q channels carrying similar
data, this spectrum should look very similar to the spectrum in
Spectrum Analyzer 1. The visual similarity between Spectrum Analyzer 1
and 3 suggests this is a strong possibility.
o Alternatively, it could be displaying the spectrum of one of the
modulated components (either the I component multiplied by the
cosine carrier OR the Q component multiplied by the sine carrier)
before they are summed together. In this case, the spectrum would be
centered at the carrier frequency with sidebands, similar to Spectrum
Analyzer 2, but representing only one of the quadrature components.
However, the visual similarity to Spectrum Analyzer 1 makes the first
possibility more likely.
From the three spectrum analyzers, we can infer the following about the QAM
modulation process:
27
6. PART 2
Figure 16
Figure 17
28
Figure 18
What can you infer from Part 1 and Part 2 of this practical?
Inference: By comparing Part 1 and Part 2, we can infer that Part 1 provides a
simplified, hands-on understanding of the underlying signals and processes in
QAM, while Part 2 utilizes built-in QAM blocks to model a more complete
QAM communication system, highlighting its practical implementation and
key parameters.
29
7. CONCLUSION
This report has examined the characteristics of ASK, FSK, PSK, and QAM, demonstrating
the various ways digital data can be encoded onto a carrier signal.
ASK, while simple to implement, is susceptible to noise and power-inefficient. FSK offers
better noise immunity than ASK but requires more complex demodulation. PSK is more
power-efficient than ASK and less susceptible to noise but has phase ambiguity issues.
QAM provides the highest spectral efficiency by combining amplitude and phase
modulation, but it is also the most complex and sensitive to noise.
The choice of modulation technique depends on specific application requirements
and constraints, including noise levels, power limitations, bandwidth availability, and
system complexity. Understanding the trade-offs between these modulation methods
is crucial for designing effective and efficient digital communication systems.
30