0% found this document useful (0 votes)
7 views41 pages

Eeet2477 Lecture 8 Hd-3

The document covers Carrier Communications, focusing on various modulation techniques including Amplitude Modulation (AM), Angular Modulation (Phase and Frequency Modulation), and Binary Modulation Schemes. It explains the process of encoding a message signal into a carrier signal for transmission, and the subsequent demodulation process to recover the original message. Additionally, it highlights the importance of bandwidth and the impact of modulation types on signal transmission and recovery.

Uploaded by

Cao Le Minh Nhat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views41 pages

Eeet2477 Lecture 8 Hd-3

The document covers Carrier Communications, focusing on various modulation techniques including Amplitude Modulation (AM), Angular Modulation (Phase and Frequency Modulation), and Binary Modulation Schemes. It explains the process of encoding a message signal into a carrier signal for transmission, and the subsequent demodulation process to recover the original message. Additionally, it highlights the importance of bandwidth and the impact of modulation types on signal transmission and recovery.

Uploaded by

Cao Le Minh Nhat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

RMIT Classification: Trusted

EEET2477 Signal and Systems 2


Lecture 8
Carrier Communications

Dr Alexandru Fechete (CC) and Dr Dao Thanh Hai (Lecturer)


RMIT Classification: Trusted

Overview

• Amplitude Modulation
• Angular Modulation
▪ Frequency Modulation
▪ Phase Modulation
• Binary Modulation Schemes
▪ Binary Phase Shift Keying

2
RMIT Classification: Trusted

Carrier Communications

Let’s assume that our transmission signal 𝒔 𝒕 is equal to a transmission


encoded version of our digital message signal 𝒎𝒃 𝒌

3
RMIT Classification: Trusted

Carrier Communications

• This is known as Baseband Communications where the message signal


𝒎 𝒕 is known as the Baseband signal.

• Some baseband signals however are not suitable for direct transmission over a
given channel (e.g. transmission using electromagnetic waves)

• Instead the message signal 𝑚 𝑡 is encoded in a carrier signal 𝑐 𝑡 =


cos 𝜔𝑐 𝑡 , where 𝝎𝒄 is the carrier frequency – Carrier Communications

• The process of encoding is known as Modulation and the process of


decoding the signal at the receiver is known as Demodulation.

4
RMIT Classification: Trusted

Carrier Communications

Classification of Communication Schemes:


• Analog Communications – The message signal 𝒎 𝒕 is sent directly without converting it
to a discrete-time digital signal (i.e. no sampling, no quantization and no digital encoding).

▪ Amplitude Modulation - The message signal is encoded in the amplitude of the carrier
signal 𝒄 𝒕 .

▪ Angular Modulation - The message signal is encoded in the angular component of the
carrier signal 𝒄 𝒕 .
▪ Phase Modulation – Encoding in Phase

▪ Frequency Modulation – Encoding in Frequency

• Digital Communications – The message signal 𝒎 𝒕 is first converted to a discrete-time


digital signal 𝒎𝒃 𝒌 (via sampling, quantization and digital encoding). This signal is then
converted to a continuous-time digital signal via transmission encoding and sent to the
transmitter.
5
RMIT Classification: Trusted

Amplitude Modulation

The transmission signal for AM is formed as follows:


Carrier Signal
𝒄 𝒕 = 𝐜𝐨𝐬 𝝎𝒄 𝒕

Message Signal Transmission Signal


𝒎(𝒕) 𝒔 𝒕 =𝒎 𝒕 𝒄𝒕

The transmission signal is:


𝒔 𝒕 = 𝒎 𝒕 𝐜𝐨𝐬 𝝎𝒄 𝒕

The Amplitude of the carrier signal is now dependent upon the Message signal.
Note that this is also known as linear modulation.

6
RMIT Classification: Trusted

Amplitude Modulation

The transmission signal for AM is formed as follows:


Carrier Signal
𝒄 𝒕 = 𝐜𝐨𝐬 𝝎𝒄 𝒕

Message Signal Transmission Signal


𝒎(𝒕) 𝒔 𝒕 =𝒎 𝒕 𝒄𝒕

Example:
Modulation

7
RMIT Classification: Trusted

Amplitude Modulation

The transmission signal for AM is formed as follows:


Carrier Signal
𝒄 𝒕 = 𝐜𝐨𝐬 𝝎𝒄 𝒕

Message Signal Transmission Signal


𝒎(𝒕) 𝒔 𝒕 =𝒎 𝒕 𝒄𝒕

Now what does this amplitude modulation mean in frequency?


𝓕
Message Signal: 𝒎 𝒕 ⟶ 𝑴 𝝎
𝓕
Carrier Signal: 𝒄 𝒕 ⟶ 𝑪 𝝎
𝓕
Transmission Signal: 𝒎(𝒕)𝒄 𝒕 ⟶ 𝑴 𝝎 ∗𝑪 𝝎
8
RMIT Classification: Trusted

Frequency Analysis of AM signal


Fourier Spectrum of the Message Signal:

Note that the spectrum has a bandwidth of 𝑩 Hz

Fourier Spectrum of the Transmission Signal:


USB = Upper Side Band

LSB = Lower Side Band

𝟏
Recall: 𝑪 𝝎 = 𝓕 𝐜𝐨𝐬 𝝎 𝒕
𝒄 = 𝜹 𝝎 − 𝝎𝒄 + 𝜹 𝝎 + 𝝎𝒄
𝟐 9
RMIT Classification: Trusted

Frequency Analysis of AM signal


Fourier Spectrum of the Message Signal:

Note that the spectrum has a bandwidth of 𝑩 Hz

Fourier Spectrum of the Transmission Signal:


USB = Upper Side Band

LSB = Lower Side Band

𝑴 𝝎 𝟏
Thus: 𝑴= 𝝎 ∗𝑪 𝝎 ∗ [𝜹 𝝎 − 𝝎𝒄 + 𝜹 𝝎 + 𝝎𝒄 ] = 𝑴 𝝎 − 𝝎𝒄 + 𝑴 𝝎 + 𝝎𝒄
𝟐 𝟐
10
RMIT Classification: Trusted

Frequency Analysis of AM signal


Fourier Spectrum of the Message Signal:

Note that the spectrum has a bandwidth of 𝑩 Hz

Fourier Spectrum of the Transmission Signal:


USB = Upper Side Band

LSB = Lower Side Band

Important : The spectrums must not overlap ⟶ 𝝎𝒄 ≥ 𝟐𝝅𝑩

If 𝝎𝒄 < 𝟐𝝅𝑩 ⟶ The message signal cannot be recovered!!! 11


RMIT Classification: Trusted

Frequency Analysis of AM signal


Fourier Spectrum of the Message Signal:

Note that the spectrum has a bandwidth of 𝑩 Hz

Fourier Spectrum of the Transmission Signal:


USB = Upper Side Band

LSB = Lower Side Band

Observe : The transmission signal 𝒔 𝒕 does not contain any frequency content relating
to the carrier signal – it has been supressed.
12
RMIT Classification: Trusted

Frequency Analysis of AM signal


Fourier Spectrum of the Message Signal:

Note that the spectrum has a bandwidth of 𝑩 Hz

Fourier Spectrum of the Transmission Signal:


USB = Upper Side Band

LSB = Lower Side Band

Therefore this type of AM is known as Double-Sideband Supressed Carrier (DSB-SC)


13
RMIT Classification: Trusted

Demodulation of AM at the Receiver


How can we recover the message signal at the receiver?
r(t)

We need to move the spectrum of 𝑀(𝜔) back to original:


Let us examine the following: 𝒔 𝒕 = 𝒎 𝒕 𝒄𝒕 ⋅𝒄 𝒕

𝒔 𝒕 = 𝒎 𝒕 𝒄𝒐𝒔 𝝎𝒄 𝒕 𝒄𝒐𝒔 𝝎𝒄 𝒕 = 𝒎 𝒕 𝒄𝒐𝒔𝟐 𝝎𝒄 𝒕

Now using a trigonometric identity:


𝟏
𝐜𝐨𝐬 𝟐 𝝎𝒄 𝒕 = 𝟏 + 𝐜𝐨𝐬(𝟐𝝎𝒄 𝒕)
𝟐 14
RMIT Classification: Trusted

Demodulation of AM at the Receiver


How can we recover the message signal at the receiver?
r(t)

We need to move the spectrum of 𝑀(𝜔) back to original:

Thus:
𝟏
𝒔 𝒕 = 𝒎 𝒕 𝟏 + 𝐜𝐨𝐬(𝟐𝝎𝒄 𝒕)
𝟐 The original message signal!!!
In the frequency domain:
𝟏 𝟏
𝑺 𝝎 = 𝑴 𝝎 + 𝑴 𝝎 − 𝟐𝝎𝒄 + 𝑴 𝝎 + 𝟐𝝎𝒄 15
𝟐 𝟒
RMIT Classification: Trusted

Demodulation of AM at the Receiver


How can we recover the message signal at the receiver?
r(t)

Multiplication with the c(t)

16
RMIT Classification: Trusted

Demodulation of AM at the Receiver

Demodulation at the receiver:


Carrier Signal
𝒄 𝒕 = 𝐜𝐨𝐬 𝝎𝒄 𝒕

Received Signal Low-Pass Output Signal


𝟏
𝒓(𝒕) Filter 𝒎(𝒕)
𝟐

Comments:
• A key aspect of this demodulation configuration is that we need to know the exact frequency
and phase of the carrier signal ↬ known as a Synchronous or Coherent detector

• We cannot recover the carrier signal from 𝒓 𝒕 as it has been supressed, we are using DSB-
SC

• Such a detector is quite costly to build


17
RMIT Classification: Trusted

True Amplitude Modulation


Can we redesign our modulator such that the carrier signal is not supressed?
• Answer: Yes!!!
• Change the transmission signal such that:
𝒔𝑨𝑴 𝒕 = 𝑨 + 𝒎 𝒕 𝐜𝐨𝐬 𝝎𝒄 𝒕
Added a constant offset

• In the frequency domain this means:


𝓕 𝒔𝑨𝑴 𝒕 = 𝓕 𝑨 𝐜𝐨𝐬 𝝎𝒄 𝒕 + 𝓕 𝒎 𝒕 𝐜𝐨𝐬 𝝎𝒄 𝒕

Frequency component Frequency component


relating to Carrier Signal from DSB-SC

𝟏
𝑺𝑨𝑴 𝝎 = 𝝅𝑨 𝜹 𝝎 − 𝝎𝒄 + 𝜹 𝝎 + 𝝎𝒄 + 𝑴 𝝎 − 𝝎𝒄 + 𝑴 𝝎 + 𝝎𝒄
𝟐
18
RMIT Classification: Trusted

Demodulation of AM using Envelop Detector


Consider the following:

Message Signal 𝒎 𝒕 Message Signal (𝐀 + 𝒎 𝒕 )

The envelope of the signal


After Modulation
𝒔(𝒕) is equal to 𝒎 𝒕
Signal 𝒔(𝒕)

19
RMIT Classification: Trusted

Demodulation of AM using Envelop Detector


Estimating the envelope of the signal:
Transmission Signal
𝒔𝑨𝑴 (𝒕)

20
RMIT Classification: Trusted

Demodulation of AM using Envelop Detector


Estimating the envelope of the signal:
Transmission Signal
𝒔𝑨𝑴 (𝒕)
Rectification

21
RMIT Classification: Trusted

Demodulation of AM using Envelop Detector

Estimating the envelope of the signal:


Transmission Signal
Rectification Low-Pass Output Signal
𝒔𝑨𝑴 (𝒕) Filter 𝑨 + 𝒎(𝒕)

22
RMIT Classification: Trusted

Demodulation of AM using Envelop Detector

Estimating the envelope of the signal:


Transmission Signal Low-Pass Message Signal
Rectification
𝒔𝑨𝑴 (𝒕) Filter 𝑨 + 𝒎(𝒕)

Design of Low-Pass
Filter is important

If the cut off frequency


is too high

23
RMIT Classification: Trusted

Demodulation of AM using Envelop Detector

Estimating the envelope of the signal:


Transmission Signal Low-Pass Message Signal
Rectification
𝒔𝑨𝑴 (𝒕) Filter 𝑨 + 𝒎(𝒕)

Choice of RC values controls the low pass filter

24
RMIT Classification: Trusted

True Amplitude Modulation


• Choice of the offset constant 𝐴:
The constant 𝑨 must satisfy the following inequality in order the message signal to be recovered
from the transmission signal

𝑨 + 𝒎(𝒕) ≥ 𝟎 for all values of t


• Therefore:
𝑨 ≥ 𝒎𝒂𝒙 𝒎 𝒕
• IF 𝑨 < 𝐦𝐚𝐱 𝒎 𝒕

Then the envelope of


𝒔 𝒕 will be distorted!

25
RMIT Classification: Trusted

Angular Modulation
The message signal is now encoded in the angular information of the carrier signal

Rewrite the Carrier Signal 𝒄 𝒕 = 𝑨 𝐜𝐨𝐬 𝜽 𝒕

𝜽 𝒕 = Angular information of the carrier

Note : that this type of modulation is non-linear in nature

26
RMIT Classification: Trusted

Phase Modulation
The message signal is now encoded in the angular information of the carrier signal

Rewrite the Carrier Signal 𝒄 𝒕 = 𝑨 𝐜𝐨𝐬 𝜽 𝒕

𝜽 𝒕 = Angular information of the carrier

Phase modulation (PM):

𝜽 𝒕 = 𝝎𝒄 𝒕 + 𝒌𝒑 𝒎 𝒕 𝒌𝒑 = 𝐜𝐨𝐧𝐬𝐭𝐚𝐧𝐭

Transmission signal for PM is:

𝒔𝑷𝑴 𝒕 = 𝑨 𝐜𝐨𝐬 𝝎𝒄 𝒕 + 𝒌𝒑 𝒎 𝒕

27
RMIT Classification: Trusted

Phase Modulation
PM Example:

28
RMIT Classification: Trusted

Frequency Modulation
The message signal is now encoded in the angular information of the carrier signal

Rewrite the Carrier Signal 𝒄 𝒕 = 𝑨 𝐜𝐨𝐬 𝜽 𝒕

𝜃 𝑡 = Angular information of the carrier

Frequency modulation (PM):

𝝎 𝒕 = 𝝎𝒄 + 𝒌𝒇 𝒎 𝒕 𝒌𝒇 = 𝐜𝐨𝐧𝐬𝐭𝐚𝐧𝐭

𝒕
Convert Phase: 𝜽 𝒕 = ‫׬‬−∞ 𝝎 𝝉 𝒅𝝉
𝒕 𝒕
𝜽 𝒕 =න 𝝎𝒄 + 𝒌𝒇 𝒎 𝝉 𝒅𝝉 = 𝝎𝒄 𝒕 + න 𝒌𝒇 𝒎 𝝉 𝒅𝝉
−∞ −∞

29
RMIT Classification: Trusted

Frequency Modulation
The message signal is now encoded in the angular information of the carrier signal

Rewrite the Carrier Signal 𝒄 𝒕 = 𝑨 𝐜𝐨𝐬 𝜽 𝒕

𝜽 𝒕 = Angular information of the carrier

Frequency modulation (PM):

𝝎 𝒕 = 𝝎𝒄 + 𝒌𝒇 𝒎 𝒕 𝒌𝒇 = 𝐜𝐨𝐧𝐬𝐭𝐚𝐧𝐭

Transmission signal for FM is:


𝒕
𝒔𝑭𝑴 𝒕 = 𝑨 𝐜𝐨𝐬 𝝎𝒄 𝒕 + 𝒌𝒇 න 𝒎 𝝉 𝒅𝝉
−∞

30
RMIT Classification: Trusted

Phase Modulation
FM Example:

31
RMIT Classification: Trusted

Relationship between PM and FM

We are able to obtain phase from frequency and frequency from phase

𝒅𝜽 𝒕
Frequency: 𝝎 𝒕 = known as instantaneous frequency
𝒅𝒕

𝒕
Angular (or Phase): 𝜽 𝒕 = ‫׬‬−∞ 𝝎 𝝉 𝒅𝝉

Therefore in terms of the message signal we can write:

32
RMIT Classification: Trusted

Relationship between PM and FM


Therefore PM and FM are inseparable:

Do not need separate demodulators for PM and FM


33
RMIT Classification: Trusted

Angular Demodulation

Transmission signal for FM is:

Now let us take the differential of 𝒔𝑭𝑴 𝒕 :


𝒕
𝒅𝒔𝑭𝑴 𝒕
= 𝑨 𝝎𝒄 + 𝒌𝒇 𝒎 𝒕 𝐬𝐢𝐧 𝝎𝒄 𝒕 + 𝒌𝒇 න 𝒎 𝝉 𝒅𝝉
𝒅𝒕 −∞

We have a time varying function that modulates the amplitude of a sine wave

In fact, as 𝑨 and 𝝎𝒄 , does it remind us of true AM?

34
RMIT Classification: Trusted

Angular Demodulation

Therefore we can use an envelope detector to obtain the message signal

Received Signal 𝒅 Envelope Output Signal


𝒓𝑭𝑴 (𝒕) 𝒅𝒕 Detector 𝑨 𝝎𝒄 + 𝒎 𝒕

35
RMIT Classification: Trusted
Binary Phase Shift Keying (BPSK)
Digital Carrier Transmission
We now return to looking at transmitting a continuous-time digital signal
using a carrier signal
Therefore our message signal 𝒎𝒅 𝒕 is:

‘1’ = 𝒑 𝒕 where 𝒑 𝒕 is a pulse function ‘0’ = −𝒑 𝒕

36
RMIT Classification: Trusted

Modulating a Digital Signal

Now let us introduce a carrier signal 𝒄 𝒕 and multiply this with our message signal
as if we were going to perform AM
𝒎𝒅 𝒕 𝒄 𝒕 = 𝒎𝒅 𝒕 𝐜𝐨𝐬 𝝎𝒄 𝒕
Now when there is a ‘1’ in 𝒎𝒅 𝒕 , we obtain:
𝒑 𝒕 𝐜𝐨𝐬 𝝎𝒄 𝒕
and for ‘0’ we obtain:
−𝒑 𝒕 𝐜𝐨𝐬 𝝎𝒄 𝒕
Due to the properties of a cosine this becomes:
𝒑 𝒕 𝐜𝐨𝐬 𝝎𝒄 𝒕 + 𝝅
The phase of the transmission
Therefore we have: signal is dependent on the
message signal!!!
𝒑 𝒕 𝐜𝐨𝐬 𝝎𝒄 𝒕 , 𝒊𝒇 ′𝟏′
𝒎𝒅 𝒕 𝒄 𝒕 = ቊ
𝒑 𝒕 𝐜𝐨𝐬 𝝎𝒄 𝒕 + 𝝅 , 𝒊𝒇 ′ 𝟎′
37
RMIT Classification: Trusted

Binary Phase Shift Keying


This type of transmission scheme is know as Phase Shift Keying (PSK) and in particular when we
are sending just ‘0’ or ‘1’ it is Binary PSK (BPSK)
𝑨𝐜𝐨𝐬 𝝎𝒄 𝒕 , 𝒊𝒇 ′𝟏′
𝒔𝑩𝑷𝑺𝑲 𝒕 = ቊ
𝑨𝐜𝐨𝐬 𝝎𝒄 𝒕 + 𝝅 , 𝒊𝒇 ′ 𝟎′
Where 𝑨 is some constant

38
RMIT Classification: Trusted

Binary Phase Shift Keying


This type of transmission scheme is know as Phase Shift Keying (PSK) and in particular when we
are sending just ‘0’ or ‘1’ it is Binary PSK (BPSK)
𝑨𝐜𝐨𝐬 𝝎𝒄 𝒕 , 𝒊𝒇 ′𝟏′
𝒔𝑩𝑷𝑺𝑲 𝒕 = ቊ
𝑨𝐜𝐨𝐬 𝝎𝒄 𝒕 + 𝝅 , 𝒊𝒇 ′ 𝟎′

Where 𝑨 is some constant

𝑻𝒃 = Bit duration (Equal


to the duration of the
pulse 𝒑 𝒕 )
Therefore the Data
rate is : 𝑹𝒃 = 𝟏/𝑻𝒃
39
RMIT Classification: Trusted

Binary Phase Shift Keying - Demodulation


Similar to the example show last lecture, BPSK can be demodulated using a correlator detector

40
RMIT Classification: Trusted

Acknowledgment

• I would like Thank and to Acknowledge the support of : Professor Margaret


Lech, the course coordinator of EEET2113 Signal and Systems 2 course
from RMIT University Melbourne.

41

You might also like