0% found this document useful (0 votes)
94 views37 pages

Digital Modulation Schemes

Digital modulation schemes can be categorized as amplitude, frequency, or phase shift keying depending on which characteristic of the carrier wave is varied in response to the digital signal. The document describes several common schemes including ASK, FSK, BPSK, and PSK. It provides analytical expressions and diagrams to illustrate how each scheme encodes digital data by varying the amplitude, frequency, or phase of the carrier signal.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views37 pages

Digital Modulation Schemes

Digital modulation schemes can be categorized as amplitude, frequency, or phase shift keying depending on which characteristic of the carrier wave is varied in response to the digital signal. The document describes several common schemes including ASK, FSK, BPSK, and PSK. It provides analytical expressions and diagrams to illustrate how each scheme encodes digital data by varying the amplitude, frequency, or phase of the carrier signal.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 37

Digital Modulation Schemes

 Basic Digital Modulation Schemes:


 Amplitude Shift Keying (ASK)

 Frequency Shift Keying (FSK)

 Phase Shift Keying (PSK)

 Amplitude Phase Keying (APK)

 For Binary signals (M = 2), we have


 Binary Amplitude Shift Keying (BASK)

 Binary Phase Shift Keying (BPSK)

 Binary Frequency Shift Keying (BFSK)

 For M > 2, many variations of the above techniques exit usually


classified as M-ary Modulation/detection

1
Linear Modulation Methods

 In linear modulation techniques, the amplitude of the


transmitted signal varies linearly with the modulating
digital signal.
 Performance is evaluated with respect to Eb / No

3
BPSK

 BPSK → Binary Phase Shift Keying

4
 Phase transitions force carrier amplitude to
change from “+” to “−”.
 Amplitude varies in time
5
Figure4.5: digital modulations, (a) PSK (b) FSK (c) ASK (d) ASK/PSK (APK)

6
Amplitude Shift Keying
 Modulation Process
 In Amplitude Shift Keying (ASK),
the amplitude of the carrier is
switched between two (or more)
levels according to the digital data
 For BASK (also called ON-OFF
Keying (OOK)), one and zero are
represented by two amplitude
levels A1 and A0

7
 Analytical Expression:
 Ai cos(c t ), 0  t  T binary 1
s (t )  
0, 0  t  T binary 0
where Ai = peak amplitude

s (t )  A cos(0t )  2 Arms cos(0t )  2


2 Arms cos(0t )

2E V2
 2 P cos(0t )  cos(0t )  P 
T R
Hence,
 2 Ei (t )
 cos(i t ), 0  t  T binary 1 , i  0,2,......M  1
si (t )   T

 0, 0  t  T binary 0
where
T
E   s i2 (t )dt , i  0,2,......M  1
0

8
 Where for binary ASK (also known as ON OFF Keying (OOK))

s1 (t )  Ac m(t ) cos(c t   ), 0  t  T binary 1


s0 (t )  0, 0  t  T binary 0

 Mathematical ASK Signal Representation


 The complex envelope of an ASK signal is:
g (t )  Ac m(t )
 The magnitude and phase of an ASK signal are:

A(t )  Ac m(t ),  (t )  0
 The in-phase and quadrature components are:

x (t )  Ac m(t )
y (t )  0, the quadrature component is wasted.

9
10
• It can be seen that the
bandwidth of ASK
modulated is twice that
occupied by the source
baseband stream

 Bandwidth of ASK
 Bandwidth of ASK can be found from its power spectral density

 The bandwidth of an ASK signal is twice that of the unipolar NRZ

line code used to create it., i.e., 2


B  2 Rb 
Tb
 This is the null-to-null bandwidth of ASK

11
Detectors for ASK
Coherent Receiver

 Coherent detection requires the phase information


 A coherent detector mixes the incoming signal with a locally generated
carrier reference
 Multiplying the received signal r(t) by the receiver local oscillator (say
Accos(wct)) yields a signal with a baseband component plus a
component at 2fc
 Passing this signal through a low pass filter eliminates the high
frequency component
 In practice an integrator is used as the LPF

12
 The output of the LPF is sampled once per bit period
 This sample z(T) is applied to a decision rule
 z(T) is called the decision statistic
 Matched filter receiver of OOK signal

 A MF pair such as the root raised


cosine filter can thus be used to shape
the source and received baseband
symbols
 In fact this is a very common
approach in signal detection in most
bandpass data modems

13
Noncoherent Receiver
 Does not require a phase reference at the receiver
 If we do not know the phase and frequency of the carrier, we can

use a noncoherent receiver to recover ASK signal


 Envelope Detector:

 The simplest implementation of an envelope detector comprises


a diode rectifier and smoothing filter

14
Frequency Shift Keying (FSK)
 In FSK, the instantaneous carrier frequency is switched between 2 or
more levels according to the baseband digital data
 data bits select a carrier at one of two frequencies

 the data is encoded in the frequency

 Until recently, FSK has been the most widely used form of digital
modulation;Why?
 Simple both to generate and detect

 Insensitive to amplitude fluctuations in the channel

 FSK conveys the data using distinct carrier frequencies to represent


symbol states
 An important property of FSK is that the amplitude of the modulated
wave is constant
 Waveform

15
 Analytical Expression
2 Es
si (t )  cos( i t   ), i  0,1,....M  1
Ts   
t
 i (t )  [ 0t   d  m( )d ] 
 
d Analog form
fi   i (t )  f 0  f d m(t ) 
dt 
 General expression is
2 Es
si (t )  cos(2f 0t  2ift ), i  0,1,....M  1
Ts

Where f  f i  f i 1

f i  f 0  if and Es  kEb , Ts  kTb

16
Binary FSK
 In BFSK, 2 different frequencies, f1 and f2 = f1 + ∆ f are used to
transmit binary information

 Data is encoded in the frequencies


 That is, m(t) is used to select between 2 frequencies:
 f1 is the mark frequency, and f2 is the space frequency
2 Es
s0 (t )  cos 2 ( f1  1 ), 0  t  Tb
Tb

2 Es
s1 (t )  cos 2 ( f 2   2 ), 0  t  Tb
Tb
17
 Ac cos(1t  1 ), when m(t )  1 or X n  1
s (t )  
 Ac cos(2t   2 ), when m(t )  1 or X n  0

 Binary Orthogonal Phase FSK

 When w0 an w1 are chosen so that f1(t) and f2(t) are orthogonal, i.e.,




1 (t )2 (t )  0
 form a set of K = 2 basis orthonormal basis
functions
18
Phase Shift Keying (PSK)

 General expression is

2 Es
si (t )  cos[2f 0t  i (t )], i  0,1,....M  1
Ts

 Where
2i
i (t )  i  0,1,....M  1
M

19
3. Coherent Detection of Binary FSK

 Coherent detection of Binary FSK is similar to that for


ASK but in this case there are 2 detectors tuned to the 2
carrier frequencies

 Recovery of fc in receiver is made simple if the


frequency spacing between symbols is made equal to
the symbol rate.

20
Non-coherent Detection
 One of the simplest ways of detecting binary FSK is to pass the
signal through 2 BPF tuned to the 2 signaling freqs and detect
which has the larger output averaged over a symbol period

21
Phase Shift Keying (PSK)
 In PSK, the phase of the carrier signal is switched between 2 (for
BPSK) or more (for MPSK) in response to the baseband digital data
 With PSK the information is contained in the instantaneous phase of
the modulated carrier
 Usually this phase is imposed and measured with respect to a fixed
carrier of known phase – Coherent PSK
 For binary PSK, phase states of 0o and 180o are used

 Waveform:

22
 Analytical expression can be written as

si (t )  A g (t ) cos[ ct  i (t )], 0 �t �Tb , i  1, 2,...., M


where
 g(t) is signal pulse shape

 A = amplitude of the signal

 ø = carrier phase

 The range of the carrier phase can be determined using

2 (i  1)
i (t )  i  1,....M
M
 For a rectangular pulse, we obtain
2
g (t )  , 0  t  Tb ; and assume A  Eb
Tb

23
 We can now write the analytical expression as

2 Eb  2 (i  1) 
si (t )  cos  c t  , 0  t  Tb , and i  1,2,....M
Tb  M 
carrier phase changes
Constant envelope abruptly at the beginning of
each signal interval

 In PSK the carrier phase changes abruptly at the beginning of each


signal interval while the amplitude remains constant

24
 We can also write a PSK signal as:
2E  2 (i  1) 
si (t )  cos  c t  
T  M 

2E  2 (i  1) 2 (i  1) 
  cos cos  ct  sin sin cos  ct 
T  M M 

 Furthermore, s1(t) may be represented as a linear combination of


two orthogonal functions ψ1(t) and ψ2(t) as follows
2 (i  1) 2 (i  1)
si (t )  E cos  1 (t )  E sin  2 (t )
M M
Where
2 2
 1 (t )  cos[ c t ] and  2 (t )  sin[ ct ]
T T

25
 Using the concept of the orthogonal basis function, we can represent
PSK signals as a two dimensional vector

 2 (i  1) 2 (i  1) 
si (t )   Eb cos  1 , Eb sin 2 
 M M 
 For M-ary phase modulation M = 2k, where k is the number of
information bits per transmitted symbol

 In an M-ary system, one of M ≥ 2 possible symbols, s1(t), …, sm(t), is


transmitted during each Ts-second signaling interval

 The mapping or assignment of k information bits into M = 2k possible


phases may be performed in many ways, e.g. for M = 4

26
 A preferred assignment is to use “Gray code” in which adjacent phases
differ by only one binary digit such that only a single bit error occurs in
a k-bit sequence. Will talk about this in detail in the next few slides.

 It is also possible to transmit data encoded as the phase change


(phase difference) between consecutive symbols
 This technique is known as Differential PSK (DPSK)

 There is no non-coherent detection equivalent for PSK except for


DPSK

27
M-ary PSK
 In MPSK, the phase of the carrier takes on one of M possible values
2 (i  1)
i (t )  , i  1,2,....., M
M
 Thus, MPSK waveform is expressed as
M  2k MPSK
2E  2 (i  1)  2 BPSK
si (t )  cos  0t 
T  M  4 QPSK
8 8  PSK
 2 (i  1) 
si (t )  g (t ) cos  0t  16 16  PSK
 M 
...........

 Each si(t) may be expanded in terms of two basis function Ψ1(t) and
Ψ2(t) defined as
2 2
 1 (t )  cos  c t ,  2 (t )  sin  c t ,
Ts Ts

28
Quadrature PSK (QPSK)

 Two BPSK in phase quadrature


 QPSK (or 4PSK) is a modulation technique that transmits 2-bit of
information using 4 states of phases
 For example
2-bit Information ø
00 0 Each symbol corresponds
01 π/2 to two bits
10 π
11 3π/2
 General expression:
2 Es  2 (i  1) 
sQPSK (t )  cos 2f c t   , i  1,2,3,4 0  t  Ts
Ts  M 

29
 The signals are:
2 Es 2 Es  2 Es
s0  cos( c t ) s1  cos( c t  )   sin( c t )
Ts Ts 2 Ts

2 Es 2 Es
s2  cos( c t   )   cos( c t )
Ts Ts

2 Es 3 2 Es
s3  cos( c t  )  sin( c t )
Ts 2 Ts

2 Es
s0, 2 (t )   cos c t ,   shift o f 00 and 1800
Ts

2 Es
s1,3 (t )   sin  c t ,   shift o f 900 and 2700
Ts

30
 We can also have:
2 Es  2 (i  1)  
sQPSK (t )  cos c t   , i  1,2,3,4 0  t  Ts
Ts  M 4

31
 One of 4 possible waveforms is transmitted during each signaling
interval Ts
 i.e., 2 bits are transmitted per modulation symbol → Ts=2Tb)

 In QPSK, both the in-phase and quadrature components are used


 The I and Q channels are aligned and phase transition occur once
every Ts = 2Tb seconds with a maximum transition of 180 degrees
 From
2 Es  2 (i  1) 
sQPSK (t )  cos 2f c t  
Ts  M

 As shown earlier we can use trigonometric identities to show that

2 Es  2 (i  1)  2 Es  2 (i  1) 
sQPSK (t )  cos   cos( c t )  sin   sin( c t )
Ts  M  Ts  M 

32
 In terms of basis functions
2 2
 1 (t )  cos 2f c t and  2 (t )  sin 2f c t
Ts Ts
we can write sQPSK(t) as

  2 (i  1)   2 (i  1)  
sQPSK (t )   Es cos   1 (t )  Es sin   2 (t ) 
  M   M  
 With this expression, the constellation diagram can easily be drawn
 For example:

33
Coherent Detection
1. Coherent Detection of PSK
 Coherent detection requires the phase information
 A coherent detector operates by mixing the incoming data signal with
a locally generated carrier reference and selecting the difference
component from the mixer output

 Multiplying r(t) by the receiver LO (say A cos(ωct)) yields a signal


with a baseband component plus a component at 2fc
 The LPF eliminates the high frequency component
 The output of the LPF is sampled once per bit period
 The sampled value z(T) is applied to a decision rule
 z(T) is called the decision statistic

34
 Matched filter receiver

 A MF pair such as the root raised cosine filter can thus be used
to shape the source and received baseband symbols
 In fact this is a very common approach in signal detection in most
bandpass data modems

35
2. Coherent Detection of MPSK
 QPSK receiver is composed of 2 BPSK receivers
 one that locks on to the sine carrier and
 the other that locks onto the cosine carrier

 1 (t )  A cos  0t

 2 (t )  A sin  0t

Ts Ts A2Ts
z0 (t )  �s0 (t ) 1 (t ) dt  �( A cos  0t ) ( A cos  0t ) dt   L0
0 0 2
Ts Ts
z1 (t )  �s 0 (t ) 2 (t )dt  �( A cos  t ) ( A sin  t )dt  0
0 0
0 0

36
Output S0(t) S1(t) S2(t) S3(t) A2Ts 
Z0 Lo 0 -Lo 0
L0  cos
2 4
Z1 0 -Lo 0 Lo
If  1 (t )  A cos( 0t  45 ) and  2 (t )  A cos( 0t  45 )
o o

Output S0(t) S1(t) S2(t) S3(t)


Z0 Lo -Lo -Lo Lo
Z1 Lo Lo -Lo -Lo
 Decision:
1. Calculate zi(t) as
T
zi (t )  
0
r (t )  i (t ) dt
2. Find the quadrant of (Z0, Z1)

37
 A coherent QPSK receiver requires accurate carrier recovery using
a 4th power process, to restore the 90o phase states to modulo 2π

38

You might also like