Communication Engineering-Ec8395 Unit I Analog Communication
Communication Engineering-Ec8395 Unit I Analog Communication
net
COMMUNICATION ENGINEERING-EC8395
UNIT I
ANALOG COMMUNICATION
Communication is the process of conveying or transferring of information from one point to another
point. Information can be image, text or any other data. Communication between any two points or places
t
requires a medium in between them. This medium can be wired or wireless medium. The information that needs
ne
to be transmitted may not be in a form that is suitable for all medium. It needs to be processed. This processing
of raw information to convert it into a form that is suitable for a medium is called as modulation.
TYPES OF COMMUNICATION
.
pz
Communication can be of two types- Analog & Digital
In Analog communication the transmit information is continuous in nature, whereas in digital communication
it is discrete in nature.
Source
ee Transmitter Transmission Receiver Destination
Channel
ad
Basic block diagram for communication System
Information from the source should be modulated before transmission to enable proper transmission of
information from transmitter to receiver. The process of modifying or changing any characteristics of any
signal is called modulation. Any signal has three characteristic they are
.p
1. Amplitude
2. Frequency
3. Phase
MODULATION:
w
The process of changing any one of the characteristics of carrier signal with respect to information signal is
known as modulation.
w
w
www.padeepz.net
www.padeepz.net
TYPES OF MODULATION
Modulation is classified into two types they are, Analog modulation and Digital modulation. In
analog modulation both information and carrier signal are analog in nature, whereas in digital information signal
is digital but carrier signal is analog.
Modulation
t
ne
Analog modulation Digital modulation
.
AM (Amplitude modulation):
pz
It is the process of changing the amplitude of high frequency carrier signal in accordance with
low frequency information signal. Here frequency and phase angle of carrier remains unchanged.
FM (Frequency modulation):
ee
It is the process of changing the frequency of carrier signal accordance with amplitude of
information signal.
PM (Phase modulation):
ad
It is the process of changing the phase of carrier signal accordance with amplitude of information
signal..
.p
AMPLITUDE MODULATION
w
It is the process of changing the amplitude of a relatively high frequency carrier signal in proportion
with the instantaneous value of the modulating signal. AM is used for commercial broadcasting of audio and
video signals.
w
AM VOLTAGE DISTRIBUTION
www.padeepz.net
www.padeepz.net
The modulating signal is represented as, em(t) = Em sinωmt
According to the definition, the amplitude of the carrier signal is changed after modulation.
t
ne
EAM = Ec(1+ ma sin ωmt ) -------------- (3)
.
carrier signal.
pz
Em
ma = –––––
Ec
Percent modulation is indicated as M
ee Em
M = ––––– x 100 or M = ma x 100
Ec
Relationship between m, Em & Ec
ad
From the figure.
.p
w
w
Em = ½ (Emax - Emin)
w
EC = ½ (Emax + Emin)
www.padeepz.net
www.padeepz.net
Where ma= Em/Ec Where ma is the modulation index (or) depth of modulation. The value Em must be
less than value of Ec to avoid distortion in the modulated signal. Hence maximum value of ma will be
equal to 1. When ma is expressed in percentage it is called percentage modulation.
t
Substitute equation (3) in (4)
ne
eAM(t) = Ec (1 + ma sinωmt)sinωct
(1) (2)
.
Expand the second term (sinωmt sinωct) according to ( SinASinB) formula, we get
pz
𝒎𝒂𝑬𝒄 𝒎𝒂𝑬𝒄
𝒆𝑨𝑴 (𝒕) = 𝑬𝒄 𝒔𝒊𝒏𝝎𝒄 𝒕 + 𝒄𝒐𝒔(𝝎𝒄 − 𝝎𝒎 )𝒕 − 𝒄𝒐𝒔(𝝎𝒄 + 𝝎𝒎 )𝒕 ------------------ (5)
𝟐 𝟐
EAM(t)
Ec
ad
LSB USB
.p
ω
0
BW=2 fm
Bandwidth of AM.
The Bandwidth of Am wave is equal to the difference b/w the highest upper side frequency and
lowest lower side frequency.
B = fc + fm (max) – [fc - fm (max)]
www.padeepz.net
www.padeepz.net
= fc + fm (max) - fc + fm (max)
BW = 2fm (max)
AM Waveform
t
a) Message signal
ne
b) Carrier signal
.
pz
ee
The shape of modulated waveform is known as AM envelope.
Phasor representation of AM
ad
Carrier
A
Ec
.p
VAM(t)
0
w
www.padeepz.net
www.padeepz.net
t
. ne
Em > Ec leads to over modulation.
pz
ee
AM POWER DISTRIBUTION
ad
The modulated wave contains three terms such as carrier wave, LSB, USB.
The modulated wave contains more power than the unmodulated carrier.
Total Power in modulated wave will be,
Pt = PC + PUSB + PLSB
i.e. total power Pt of AM wave is the sum of carrier power and side band power.
.p
PC - Carrier power, PUSB - Upper Side Band power, PLSB - Lower Side Band power
The lower and upper sideband powers are same which is given by
R 8R
In terms of carrier power
www.padeepz.net
www.padeepz.net
Pt = Pc + PUSB + PLSB
ma 2 Pc ma 2Pc
Pt = Pc + ––––––– + ––––––
4 4
2
ma
Pt = Pc 1 + ––––
2
t
ne
AM CURENT DISTRIBUTION
.
Pt
–––– =
pz
Pc
Pt = It2 R
ee Pc = Ic2 R
ma 2
It2 = Ic2 1 + ––––
2
ad
ma 2
It= Ic 1 + ––––
2
.p
Efficiency:
Total Power
= PLSB+PLSB * 100
w
PTotal
ma2
= * 100
w
2+ma 2
If ma = 1 , Then %η = 33.33 %
In this only one third of total power is carried by the sidebands and the rest two third is wasted.
www.padeepz.net
www.padeepz.net
If the modulating signal contains two frequencies say fm1 & fm2, the modulated wave will contain the
carrier and two sets of side frequencies. Spaced symmetrically about the carrier.
Vam (t) = sin 2 fct + ½ sin 2 (fc - fm1) t - ½sin 2 (fc+ fm1) t
+ ½sin 2 (fc- fm2) t - ½sin 2 (fc+ fm2) t
t
In general for n different signals mt = √m12 + m22 + . . . mn2
ne
Pusbt = Plsst = Pcmt2 / 4
Pt = Pc (1+mt2 / 2)
Advantages, Disadvantages and Applications of AM (DSBFC)
.
Advantages
pz
1. Simple and inexpensive receivers. Easy to detect with simple equipment even if the signal is not very
strong
2. Narrow bandwidth than FM
3. Wider coverage
4. Well-established, mature art used for broadcasting almost exclusively
Disadvantages
ee
1. Received signal affected by electrical storms and other radio frequency interference
2. Receivers able to reproduce frequencies up to 5 MHz or less
3. Inefficient use of transmitter power
ad
Applications
1. Low quality form of modulation that is used for commercial broadcast of both audio and video signals
2. Two way mobile radio communications such as citizen band (CB) radio
3. Aircraft communication in the VHF frequency range
.p
TYPES OF AM MODULATION
www.padeepz.net
www.padeepz.net
5. Vestigial sideband
t
Advantages
ne
1. Simple and inexpensive receivers. Easy to detect with simple equipment even if the signal is not
very strong.
2. Narrow bandwidth than FM
3. Wider coverage
4. Well-established, mature art used for broadcasting almost exclusively
.
Disadvantages
pz
1. Received signal affected by electrical storms and other radio frequency interference
2. Receivers able to reproduce frequencies up to 5 MHz or less
3. Inefficient use of transmitter power
Applications ee
1. Low quality form of modulation that is used for commercial broadcast of both audio and video
signals
2. Two way mobile radio communications such as citizen band (CB) radio
3. Aircraft communication in the VHF frequency range
ad
AM modulating Circuits
Based on the location in the transmitter AM modulating circuits are classified as
a. Low level AM modulator
b. High level AM modulator
Modulation takes place prior to the final stage Modulation takes place in the final element of
w
Less modulating signal power is required More modulating signal power is required.
w
www.padeepz.net
www.padeepz.net
NON LINEAR MODULATORS:
These modulators are operated in nonlinear region.These are used in low level modulation.
The types of non linear modulators are,
Square law modulator,
Product modulator,
Balanced modulator.
LOW LEVEL AM MODULATOR
t
Class A amplifier can perform amplitude modulation.
Amplifier must have 2 inputs one for the carrier signal & second for modulating signal.
ne
With no modulating signal present, the circuit operates as a linear class A amplifier, and the output is
simply the carrier amplified by the quiescent voltage gain .
The carrier is applied the base and the modulating signal to the emitter. Hence it is also called as Emitter
Modulation.
The modulating signal varies the gain of the amplifier at a sinusoidal rate equal to the frequency of the
.
modulating signal.
pz
The depth of modulation achieved is proportional to the amplitude of the modulating signal.
ee
ad
.p
w
Av = Aq (1 + m sin 2fmt)
Av Amplifier voltage gain with modulation.
Aq Amplifier quiescent (without modulation) voltage gain.
sin 2fmt varies from + 1 to -1
w
Hence, Av = Aq (1m)
Av max = 2Aq, when m = +0
Av min = 0, when m = -1
The modulating signal drives the circuit into both saturation and cutoff, thus producing the nonlinear
amplification necessary for modulation to occur. The collector waveform includes the carrier and the upper
www.padeepz.net
www.padeepz.net
and lower side frequencies as well as a component at the modulating signal frequency from the waveform,
thus producing a symmetrical AM envelop at Vout.
t
Amplifiers following modulator stage must be linear. At high operating powers linear amplifiers are very
inefficient.
ne
HIGH POWER AM MODULATOR / MEDIUM POWER AM MODULATOR
The class C amplifier is used. It operates nonlinear and is capable of nonlinear mixing (modulation).
This is known as collector modulator because modulating signal is applied to the collector.
.
When the amplitude of the carrier exceeds the barrier potential (0.7V) Q1 turns on collector current
pz
flows.
ee
ad
.p
When carrier voltage drops below 0.7V Q1 turns off and collector current cases.
The corresponding current and voltage waveforms are shown.
When the modulating signal is applied it adds up with the Ecc and gets submitted from Ecc
producing an Am o/p.
w
AM TRANSMITTERS
www.padeepz.net
www.padeepz.net
The crystal oscillator is followed by a tuned buffer amplifier (class B) and drive amplifier.
t
ne
Low level AM Transmitter
The modulator circuit used is generally a class C power amplifier that is a collector modulator.
The audio signal is amplified by a chain of low level audio amplifiers and a power amplifier. This
.
amplifier is controlling the power being delivered to the final RF amplifier. Class B push pull amplifier
pz
is usually used for this purpose.
The amplified modulating signal is applied to the modulator along with the carrier. AM wave is got at
the output of the modulator.
This AM signal is then amplified using a chain of linear amplifiers to raise its power level. Class B
amplifiers are used for this purpose. The linear power amplifier is used to avoid the distortion in the AM
ee
wave.
The amplitude modulated signal is then transmitted using transmitting antenna. The matching network
matches the output impedance of the final amplifier to the transmission line and antenna.
Application of Low Level AM Transmitter: It is used in low capacity system such as wireless intercoms,
ad
Remote control units, pagers, shot range talkie.
Here modulating signal power should be higher than the low level.
w
www.padeepz.net
www.padeepz.net
The non linear portion of V-I characteristics of diode is used as a element for non-linear modulators.
This is suited at low voltage levels because of the fact that current-voltage characteristics of a diode is
highly nonlinear particularly in the low voltage region as shown in figure.
Diode current
t
ne
Diode Voltage
.
A non linear element
pz
Band pass filter for extracting desired modulating products.
ee
ad
Modulated
Modulating
Summer Non linear Signal
Signal Filter
device
.p
Carrier
w
Signal
Principle of operation:
w
From the figure the non linear device diode is used to produce low level amplitude modulation.
Here the carrier and modulating signals are applied across the diode.
A dc battery Ecc is connected across the diode to get a fixed operating point on the V-I characteristics
w
of the diode.
This amplitude modulation that is low level can be explained by considering the fact when two
different frequencies are passed through the non linear device.
So when we apply carrier and modulating frequencies different frequency terms appear at the output of
diode.
These different frequency terms are applied across the tuned circuit which is tuned to carrier frequency
and has a narrow bandwidth just to pass two sidebands along with the carrier and reject other
frequencies.
www.padeepz.net
www.padeepz.net
So the output of the tuned circuit will be carrier and two sidebands that is amplitude modulated wave
is produced.
Mathematical analysis:
Let the modulating voltage will be
em(t)= Em sinωm t ------------------- (1)
t
ec(t)= Ec sinωc t ------------------- (2)
ne
So the input voltage applied to the diode will be
e1(t) = em+ec
= Em sinωm t+ Ec sinωc t --------------------------- (3)
We know that the current and voltage relationship of a linear circuit is,
.
i=av
pz
where i=current through linear device
v=voltage through the linear device
a=proportionality constant
The current and voltage relationship of a nonlinear circuit may be expressed as,
ee i=a V1+b V12+c V13+ - - - - - - - - - -
This means that due to non-linearity in the V-I characteristics of a non-linear circuits, the current
becomes proportional not only to voltage but also to the square, cube and higher powers of voltage. So
i= a1V1+a2 V12+a3 V13+ ---------------------- (4)
Where a1, a2, a3 are proportionality constants and V1 is the input voltage applied to the diode or FET.
Sub eqn (3) in (4)then
ad
i= a1(Em sinωm t+ Ec sinωc t)+ a2(Em sinωm t+ Ec sinωc t)2+------------
= a1 Em sinωm t+ a1 Ec sinωc t+ a2 Em2 sinωm2 t+ a2 Ec2 sinωc2 t+
2a2EmEc sinωm tsinωc t+---
Neglecting second and higher order terms, we get
.p
The tuned circuit is tuned to the carrier frequency and it allows only ω c, ωc+ωm, ωc-ωm terms and
w
The
main drawback of using diode modulator is it does not provide amplification and a single diode is
unable to balance out the frequency completely. These limitations can be eliminated by using
amplifying devices like transistor, FET in a balanced mode.
We can also use the square law modulator with FET instead of diode.
www.padeepz.net
www.padeepz.net
From the final equation we know that it consists only the carrier and USB and LSB frequency
components and all the components are removed.
It is assumed that the two transistors are identical and the circuit is symmetrical. The operation is confined
in the nonlinear region of the active devices employed in this circuit. The carrier voltage across the upper
and lower part of the secondary windings of the center tap transformers are equal in magnitude and opposite
t
in phase.
. ne
pz
ee BALANCED MODULATOR
In this the carrier voltage across the two windings of a centre tap transformers are equal and
opposite in phase Vbe= -Vbe’
Input voltage to the transistor T1 is given by,
Vbe =ec(t)+ em(t)
ad
Vbe= Ec sinωc t +Em sinωm t --------- (1)
By using the non-linearity property the collector current can be written as per square law equation
-----------(3)
ic = a1 [Ec sinωc t +Em sinωm t]+ a2 [Ec sinωc t +Em sinωm t]2
w
ic= a1 [Ec sinωc t +Em sinωm t]+ a2E2c sin2ωc t+a2E2m sin2ωm t+2a2Em Ec sinωm tsinωc t ---(5)
i’c = a1 [-Ec sinωc t +Em sinωm t]+ a2 [-Ec sinωc t +Em sinωm t]2
i’c = a1 [-Ec sinωc t +Em sinωm t]+ a2E c 2 sin2ωc t+a2Em2 sin2ωm t-2a2Em Ec sinωm tsinωc t---(6)
www.padeepz.net
www.padeepz.net
since ic, i’c flows in the opposite direction and ‘K’ is a constant depending on impedance or other circuit
parameters.
Vo = K [ ic – ic’ ]
t
= 2KEc a1 Sinωct 1 + 2 a2 EmSinωmt
ne
a1
.
a1
This equation represents the output modulated voltage which contains carrier and side band
pz
terms but no modulating terms. Thus this circuit is used as AM modulator. The advantage of this circuit is that
the undesired harmonics are automatically balanced out and hence there is no need for separate filter.
The square law detector circuit is used for detecting low level modulated signal.
Here the diode is used in V – I characteristics of the device i.e. non linear characteristics of the diode.
The square law detector is similar to the square law modulator. The only difference lies in the filter
w
circuit.
In square law modulator we are using band pass filters, in square law detector; a low pass filter is used.
The operation is limited to the non-linear region of the diode characteristics, so the lower half portion
w
This may cause envelope distortion due to this diode current will not be constant, and varies with time.
I
www.padeepz.net
www.padeepz.net
t
ne
SQUARE LAW DETECTOR
.
pz
The distorted output diode current is expressed by the non-linear V-I relationship (i.e. square law) is,
i0=a1 eAM + a2 eAM 2 ------------------------------(1)
where eAM =i/p modulated signal.
The equation of AM wave is
ee eAM = Ec (1 + ma sinωmt) sinωct -----------------------------(2)
2
= a1 Ec sinωct + a1 ma Ec sinωct sinωmt + a2 Ec2 - a2 Ec2 cos2ωct + a2 Ec2 ma2 sin2 ωmt +
2 2 2
- a2 Ec2 ma2 sin2 ωmt cos2ωct + a2 Ec2 masinωmt - a2 Ec2 masinωmt cos2ωct
w
2
The carrier term is filtered by using a low pass filter and high frequency term are also reduced then,
i0= a2 Ec2 masinωmt
w
So the final output contains a signal with modulating frequency. Hence original signal is recovered.
ENVELOPE DETECTOR
w
A detector circuit whose output follows the envelope of the modulated signal which is used to
reproduce the modulating or message signal is called as “Envelope Detector”.
This is most popular commercial receiver circuits since it is very simple and not expensive, and also it
gives satisfactory performance.An envelope detector of the series type is shown in Figure which
consists of a diode and a resistor capacitor filter a time constant network.
www.padeepz.net
www.padeepz.net
t
. ne
Principle Of Operation:
pz
Modulated signal is applied to the series combination of diode and the load impedance consisting of a
resistor R and C.
Operation takes place over the linear region of VI characteristics of Diode.
For positive cycle of carrier signal the diode D conducts thereby the capacitor charges to the peak
voltage with the time constant τ =R C of the carrier signal through the resistor R.
ee
As the input falls below the peak value, the diode reaches cut-ff. The diode acts as open switch and
hence the capacitor gets discharge path through R.
During negative half cycle the diode is reverse biased and the carrier voltage is disconnected from the
RC circuit. So the capacitor discharges continuously until next positive cycle appears.
From the peak of one positive cycle to the next the capacitor discharges slowly and this process
ad
continues.Thus the voltage across ‘C’ is same as the envelope of the modulated carrier but spikes are
introduced. So the output voltage across capacitor is a spiky modulating or base band signal. So the
envelope is detected at the output of capacitor. Thus from the average value the original signal is
recovered by extracting the envelope.
The spikes can be reduced to a negligible amount by keeping the time constant RC large so that the
.p
Large (or) small value of time constant makes problem. So time constant is important consideration.
w
If time constant RC is quite low: Discharge curve during non conductive period is almost
vertical, so fluctuations may occur in output voltage. This results in Diagonal clipping
If RC is very large: Discharge curve is almost horizontal, so several peaks will be missed in the
w
Diagonal clipping.
Diagonal clipping:
It results when time constant of detector is not selected properly. If the modulating
voltage is faster than the rate of voltage fall across RC combination resulting in distorted output. This
type of distortion is called diagonal clipping which results in distorted output.
www.padeepz.net
www.padeepz.net
t
ne
To avoid the diagonal clipping proper value of RC needs to be selected. The voltage across RC
combination during the non-conducting period of diode is Vc at an instant t which is given by
t
VC t V0 e RC
.
The rate of slope in capacitor due to period discharging is calculated by differentiating V C(t) So
pz
t
dVC t dVC V0 e RC VC t
...................(1)
dt dt RC RC
The decrease in capacitor voltage must follow the modulation envelope if distortion is to be avoided.
The envelope of the modulated voltage is given by
ee e AM EC 1 ma cos m t
The slope of the envelope is given by
EC 1 ma cos m t
de AM d
dt dt
ma EC m sin m t --------------------------(2)
ad
To avoid the clipping the slope of capacitor voltage VC should be algebraically equal or less than the
slope of envelope voltage, so
V t
C EC ma m sin m t
RC
VC t
EC ma m sin m t
.p
RC
EC 1 ma cos m t
EC mam sin m t
RC
Mathematically the above equation is written as
w
1 ma m sin m t
RC 1 ma cos m t ------------------------(3)
w
To find the maximum amount of RC differentiate the equation 3 and equate it to zero
d ma m sin m t
0
dt 1 ma cos m t
w
www.padeepz.net
www.padeepz.net
ωm cos ωm t + ma ωm (cos2ωmt+ sin2ωmt)=0
ωm cos ωm t + ma ωm =0
cos ωm t = - ma ------------------------(4)
on substituting the value of cosωm t in cos2ωmt+ sin2ωmt =1 we get sinωmt = √1-ma2 -----(5)
t
1 m 1 - ma2
a m
ne
substituting equation 4 and 5 in 3 we get RC 1 ma2
1 ma2
By simplifying RC
ma m
.
pz
So RC depends on the ma value. So the RC to be selected by satisfying the condition in order to avoid
distortion and the modulation index value should be correct, if it is large then it will provide negative
peak clipping. So the envelope detector will be changed for smooth functioning by attaching a
section low pass filter at the output.
In AM with carrier scheme, there is wastage in both transmitted power and bandwidth. In order to save
.p
the power in amplitude modulation the carrier is suppressed because it does not contain any useful information.
This scheme is called as the double side band suppressed carrier amplitude Modulation (DSB-SC). It contains
LSB and USB terms, resulting in a transmission bandwidth that is twice the bandwidth of the message signal.
w
For obtaining the DSB-SC wave multiply both carrier signal and message signal hence,
e(t)DSB-SC = em(t).ec(t)
=Em.Ec sinωm t sinωc t
w
www.padeepz.net
www.padeepz.net
t
. ne
pz
(a) Baseband signal (b) DSBSC
It shows that carrier term ωc is suppressed. It contains only two sideband terms having frequency (ωc - ωm)
and (ωc + ωm). Hence this scheme is called as DSB-SC AM.
Carrier
A
Vc
VSSB
0
w
POWER CALCULATION:
www.padeepz.net
www.padeepz.net
The total power transmitted in AM is
Pt =Pcarrier +PLSB +PUSB
t
Pt’ = ma 2 Ec2 + ma 2 Ec2
ne
8R 8R
= ma 2 Ec2 = ma 2 Pc
4R 2
.
Therefore the power saving with respect to AM is
pz
Power Saving = Pt - Pt’ x 100
Pt
= [ 1+ ma 2 / 2] PC - [ma 2 / 2] PC
=
ee PC
[1+ ma 2 / 2] PC
[1+ ma 2 / 2] PC
ad
% Power Saving = 2 x 100
2+ ma 2
Advantages
DSB-SC is more efficient in transmitted power as compared to DSB-FC.
w
GENERATION OF AM-DSBSC
w
www.padeepz.net
www.padeepz.net
The same circuit can be used to generate AM with carrier. The main difference between AM with
carrier generation and DSB-SC –AM is the feeding points of the carrier and modulating signals are
interchanged.
The transistor is operated in a balanced mode thus heavy filtering is not required to remove the
unwanted harmonics.
It is assumed that the two transistors are identical and the circuit is symmetrical. The operation is
confined in the nonlinear region of the active devices employed in this circuit. The carrier voltages
across the upper and lower part of the secondary windings of the center tap transformers are equal in
t
magnitude and opposite in phase.
. ne
pz
ee BALANCED MODULATOR
Principle of operation:
The modulating signal is applied as the input to the transistor T1 and T2 and the carrier signal is
applied to the common input of the push pull amplifier configuration. Because of centre tap
transformers are equal and opposite in phase V m= -Vm’
Input to the transistor T1 is given by,
ad
Vbe = em(t)+ ec(t)
Vbe = Em sinωm t +Ec sinωc t --------------------------- (1)
Similarly Input to the transistor T2,
V’be = - em(t)+ ec(t)
V’be = - Em sinωm t +Ec sinωc t ---------------------------- (2)
By using the non-linearity property the collector current can be written as per square law equation
.p
ic = a1 [Em sinωm t +Ec sinωc t]+ a2 [Em sinωm t +Ec sinωc t]2
ic= a1 [Em sinωm t +Ec sinωc t]+ a2E2m sin2 ωm t+a2Ec sin2ωc t+2a2Em Ec sinωm tsinωc t-------(5)
w
Similarly
w
ic = a1 [-Em sinωm t +Ec sinωc t]+ a2 [-Em sinωm t +Ec sinωc t]2
ic= a1 [-Em sinωm t +Ec sinωc t]+ a2E2m sin2ωm t+a2E2c cos2ωc t - 2a2Em Ec sinωm tsinωc t------------(6)
www.padeepz.net
www.padeepz.net
Because ic, i’c flows in the opposite direction and ’K’is a constant depending on impedance or other circuit
parameters.
Vo = K[ ic – i’c ]
t
The output contains the original modulating signal and the two sidebands. The modulating signal has been
ne
suppressed by tuning the tank circuit to the center frequency ±ωc
So only the side bands are present in the o/p. Hence the DSB-SC-AM generated.
.
The main advantage of this modulator is saving power and efficiency because of the suppressing of
pz
the carrier.
The balanced Ring modulator circuit is widely used in carrier telephony suppresses both unwanted
ee
modulating and carrier signal in its output.
Ring modulator is a type of product modulator which is used to generate DSB-SC Signal.
The band pass filter is not used at the output hence the harmonic frequencies are automatically
controlled.
In a ring modulator circuit four diode are connected in the form of ring in which all the four diodes
ad
are connected in the same manner and are controlled by a square wave carrier signal
ec (t).
The carrier signal acts as a switching signal to alternate the polarity of the modulating signal at the
carrier frequency.
When no modulating signal is present diode D1 and D2 or D3 and D4 will conduct depending upon
polarity of the carrier.
.p
Diodes D1 and D3 are forward biased. At this time D2 and D4 are reverse biased and act like open
w
circuits. The current divides equally in the upper and lower portion of the primary winding T2.
The current in the upper part of the winding produces a magnetic field that is equal and opposite to the
magnetic field produced by the current in the lower half of the secondary.
Therefore the magnetic fields cancel each other out and no output is induced in the secondary. Thus
w
When the polarity of the carrier reverses. Diodes D1 and D2 are reverse biased and the diodes D3 and
D4 will conduct. Again the current flows in the secondary winding of T1 and the primary winding of
T2.
The equal and opposite magnetic fields produced in T2 cancel each other and thus result in zero carrier
output. The carrier is effectively balanced out.
www.padeepz.net
www.padeepz.net
PRINCIPLE OF OPERATION
When both the carrier and the modulating signals are present, during positive half cycle of the carrier
diodes D1 and D2 conduct, while diodes D3 and D4 does not conduct.
During negative half cycle of the carrier voltage diodes D3 and D4 conduct and D1 and D2 does not
conduct.
When polarity of the modulating signal changes the result is a 180 phase reversal. At the time
D3 and D4 are in forward bias.
t
Let us consider the modulating voltage,
em(t) = Em sinωmt -------------------(1)
ne
ec(t) = Ec sin ωct ------------------(2)
The output voltage is V0(t) = em(t).ec(t)
=Em.Ec sinωm tsinωc t
V0(t) =Em.Ec [ cos(ωc - ωm )t - cos(ωc + ωm )t] -----------------(3)
2
.
LSB USB
pz
The equation 3 shows that the o/p is free from the carrier and other higher order terms and it contains upper and
lower sidebands only. The ring modulator circuit is also known as double balanced modulator because it is
balanced with respect to both the baseband signal and the square wave carrier. The main advantage is the o/p is
stable and long life, no external source to activate the diodes.
Circuit diagram: Waveform:
ee
ad
.p
w
w
DEMODULATION/DETECTION OF AM-DSBSC
w
www.padeepz.net
www.padeepz.net
The coherent detector uses exact carrier synchronization for retrieving the message signal from
modulated signal. These types of detectors are mainly used for detecting DSB&SSB signals.
It consists of a product modulator with a low pass filter.
For detecting signal local oscillator at the receiver end is required. The frequency and phase of the
locally generated carrier and transmitter carrier must be synchronized that is exactly coherent.
All types of linear modulation can be detected by using synchronous detector. It consists of a product
modulator with LPF.
t
ne
The incoming signal is first multiplied with locally generated carrier and then passed through low pass
filter. The filter bandwidth is same as the message bandwidth ωm
.
Tthe local oscillator should be exactly synchronized with carrier signal in both phase and velocity.
pz
Considering the case of DSB-SC signal, the signal I/p is
=Em.Ec E sinωmt cosφ - Em.EcE sinωmt cosφcos2ωct + Em.Ec E sinωmt sin ωc t cos ωc t sinφ
2 2
After passing through the LPF the second order harmonic term is eliminated.
www.padeepz.net
www.padeepz.net
2
If φ = 90 then e(t) is minimum e(t) = 0
The demodulated signal Vo(t) is therefore proportional to the message signal when the phase error, 𝜑 =
𝜋
0 and it is minimum (zero) when 𝜑 = ± 2 . Thus the phase error 𝜑 in the local oscillator causes the
detector output to be attenuated by a factor equal to 𝑐𝑜𝑠𝜑. As long as the phase error is constant, the
detector provides an undistorted version of the original baseband signal.
t
ne
COSTAS PLL DETECTOR
I-channel Output
Product LPF
modulator
.
900 phase discriminator
pz
shifter
Product LPF
ee modulator Q-channel
Costas receiver is one of the method for obtaining a practical synchronous receiver suitable for
demodulating DSB-SC waves. It consists of two coherent detectors supplied with the same input signal.
ad
One detector is supplied with the DSB-SC AM and locally generated carrier which is in phase with the
transmitted carrier. This detector is known as “In-phase coherent detector or I channel”.
The other detector is supplied with the DSB-SC AM and locally generated carrier which is quadrature
phase with the transmitted carrier. This detector is known as “Quadrature coherent detector or Q
channel”.
These two detectors are coupled together to form a negative feedback system designed in such a way as
.p
In this case I channel output contains the desired demodulated signal where as Q channel output is zero
due to the quadrature null effect of Q channel.
Suppose there is some phase shift φ radians between local oscillator carrier and the transmitting carrier
w
then I channel output will remain essentially unchanged. But Q channel output contains some signal
which is proportional to sin φ
This Q channel output will have same polarity as the I channel output for one direction of local oscillator
whereas the polarity will be opposite to the I channel for the other direction of phase shift.
w
www.padeepz.net
www.padeepz.net
SINGLE SIDEBAND SUPPRESSED CARRIER
In AM with carrier both the transmitting power and bandwidth is wasted. Hence the DSB-SC AM
scheme has been introduced in which power is saved by suppressing the carrier component but the
bandwidth remains same.
Increase in the saving of power is possible by eliminating one sideband in addition to the carrier
component because the USB and LSB are uniquely related by symmetry about the carrier frequency. So
t
either one sideband is enough for transmitting as well as recovering the useful message. The block
diagram of SSB-SC AM is shown in figure.
ne
As for as transmission information is concerned only one side band is necessary. So if the carrier and
one of the two sidebands are suppressed at the transmitter, no information is lost.
This type of modulation is called as single side band suppressed carrier-AM and the SSB system reduces
.
the band width by half.
pz
Block diagram of SSB-SC AM is shown in figure.
Ф = 90° e1 AM
ee
em(t) Ф = 90°
∑
ad
ec(t) SSB-SC
AM
AM
e2
.p
When comparing equations of e(t) SSB-SC and eDSB-SC (t) , one of the sideband is suppressed. Hence this scheme
is known as SSB-SC AM.
www.padeepz.net
www.padeepz.net
t
ne
The Frequency spectrum shows that only one side band signal is present , the carrier and the other
sideband signal are suppressed. Thus the bandwidth required reduces from 2 ω m to ωm i.e., bandwidth
requirement is reduced to half compared to AM & DSB-SC signals.
.
pz
USB
Resultant
eC (t)
carrier
ee eAM(t)
LSB
Power calculation:
[1+ ma 2 / 2] PC [1+ ma 2 / 2] PC
2
w
m
1 a
4 100
2
ma
1
w
2
4 ma
2
= 4 100
w
2 ma
2
2
4 ma
2
100
4 2m a
2
www.padeepz.net
www.padeepz.net
We can also find the power in SSB-SC-AM with respect to AM with DSB-SC system,
p ' pt ' '
powersaving t 100
pt '
2 2
ma Pc ma Pc
2 4 100
2
ma Pc
2
t
If ma=1 then %power saving=50%.therefore 50%power is saved with respect to DSB-SC System.
ne
Applications of SSB
1. Used to save applications where such a power saving is warranted, i.e., in mobile system, in which
weight and power consumption must naturally be kept low.
2. Single sideband modulation is at a premium. Point-to-Point communication, land, air, maritime mobile
communication, TV, Telemetry, Military and Radio navigation are the greatest use of SSB in one form
.
or another.
pz
SSB Advantages
Power conservation: Much less total transmitted power required to produce the same quality signal.
Bandwidth conservation: Half of the bandwidth of conventional AM bandwidth.
Selective Fading: Not present in SSBSC.
ee
Noise Reduction: Since SSB uses half the bandwidth, the thermal noise power is reduced to half.
Hence immunity to selective fading is improved.
SSB Disadvantages
Complex Receivers: Required carrier recovery and synchronization circuit adds cost, complexity and
ad
size.
Tuning Difficulties: Complex and Expensive Tuning Circuits.
GENERATION OF SSB
1. Filter Method
.p
FILTER METHOD
w
w
In this method of SSB generation, after the BM, the unwanted sideband is removed (actually heavily
attenuated) by a filter and hence this name. The filter may be LC, ceramic or mechanical depending upon
www.padeepz.net
www.padeepz.net
the carrier frequency and other requirements. Such a filter must have a flat bandpass and extremely high
attenuation outside the passband.
In radio communication system, the frequency range used for voice is 300 Hz to about 2800 Hz in most
cases. If it is required to suppress the lower sideband and if the transmitting frequency is fc , then the lowest
frequency that this filter must pass without attenuation is fc+300 Hz whereas the highest frequency that
must be fully attenuated is fc-300 Hz. So we need a filter whose transition band is very low. This situation
becomes worse if lower modulating frequencies are employed, such as the 50 Hz minimum in AM
t
broadcasting. In order to obtain a filter response curve with skirts as steep the ‘Q’ of the tuned circuits must
ne
be very high.
The initial modulation takes place in the balanced modulator at a low frequency (such as 100 kHz)
because of the difficulty of making adequate filters at higher frequencies. The filter is a BPF with a sharp
cutoff frequency at either side of the bandpass to obtain satisfactory adjacent sideband rejection. The
.
filtered signal is up-converted in a mixer to the final transmitter frequency and then amplified before being
pz
coupled to the antenna. The integrated ceramic filters are used as sideband filters. The drawback of filter
method is that it requires sharp filtering, which requires filters with high Q. Primary modulation cannot be
done at the transmitting frequency which is another drawback of the filter method.
ee
PHASE SHIFT METHOD
This method avoids the prime disadvantage of filtering method. That is requirement of a sideband
filter with a narrow transition band and it cannot be used for very low and very high frequencies.
This method does not have any sideband filters and the primary modulation can be done at the
ad
transmitting frequency. The unwanted sideband can be removed by generating the components of
sideband out of phase.
If the undesired sideband is LSB then the two LSB are generated such that they are 180 out of phase
with each other. So that USB add with each other and LSB cancel each other. When two undesired
sideband components are added they cancel each other with only the presence of desired signal.
.p
Two balanced modulators and two phase shifters are used. One of the modulator BBM1 receives the
carrier voltage shifted by 900 and the modulating voltage, where as another balanced modulator BBM2
receives the modulating voltage shifted by 900 and the carrier voltage.
The carrier signal is cancelled out by both the balanced modulator and then unwanted sidebands cancel
w
at the output of the summing amplifiers and hence produces SSB signal.
Balanced V1
w
amplifier
Carrier 900 Adder SSB
Phase
Carrier shifter
Signal
AF 900 Balanced
Phase Modulator
V2
www.padeepz.net
shifter BM2
www.padeepz.net
Mathematical analysis:
For modulator1 (BM1)
ec(t) = Ec sin(ωc t+900) = Ec cosωc t
t
em(t)= Em sinωm t
ne
For modulator2(BM2)
ec(t) = Ec sinωc t
em(t)= Em sin(ωm t+ 900) = Em cosωm t
.
V1=Ec cosωc t Em sinωm t ------------------------------(1)
pz
Output for modulator(BM2)isV2
V2=Ec sinωc t. Em cosωm t ------------------------------(2)
Thus one of the side band is cancelled where as the other is reinforced. This method avoids the use of filters.
ad
MODIFIED PHASE SHIFT METHOD (OR) WEAVER’S METHOD
The modified phase shift method overcomes the limitation of phase shift method. That is AF phase
shift network is required to operate over a large range of audio frequencies but also retains the
.p
advantage like its ability to generate SSB at any frequency and use of low audio frequency.
This method provides both RF and AF oscillator phase shift and also used in low frequency and so it
can be used for both audio and radio frequencies.
e1 e3 e5
w
(1)
w
RF carrier
AF i/p 0 2Ecsinωc t
90 900 SSB-SC-AM
Oscillator
phase phase Adder
w
shifter shifter
2Eosinωo t AF carrier
oscillator
www.padeepz.net
www.padeepz.net
WEAVER’S METHOD
Modulators 1 and 2 both have the unshifted modulating signal as inputs. BM1 takes low frequency
subcarrier with a 90 phase shift from the AF oscillator. BM2 receives the subcarrier signal directly
from the oscillator.
This method tries to aEoid the phase shift of audio frequencies and combine the audio frequency
carrier with AF which lies in the middle of audio frequency.
t
The low pass filter at the output of BM1 and BM2 with cut off frequency ensures the input to the
balance modulator BM3 and BM4. The output of BM3 and BM4 gives the desired sideband
ne
suppression.
MATHEMATICAL ANALYSIS
.
The A.F carrier(sub carrier signal) eo(t) = 2E0 sinω0 t ---------(2)
pz
The R.F carrier ec(t)= 2Ec sinωc t ----------(3)
--------(5)
The LPF1, 2 eliminates the upper sidebands of the modulator. Hence USB is suppressed
www.padeepz.net
www.padeepz.net
=sin[(ωc + ωo – ωm)t +900] + sin[(ωc - ω0 + ωm)t - 900] -------------(8)
t
Assume Em =E0 =Ec=1,then
e6 = 2 cos(ω0 t - ωm t) sin (ωc t+900)
ne
= sin[(ωc + ωo – ωm)t +900] + sin[(ωc - ω0 + ωm)t + 900] ------------(9)
.
=2 sin[(ω0 + ωc – ωm)t+900]
pz
The other two terms cancel with each other because it is out of phase.
The final RF output frequency is ω0 + ωc – ωm which is essentially the lower side band of RF carrier
ω0 + ωc .
DEMODULATION/DETECTION OF AM-SSBSC
ad
SYNCHRONOUS OR COHERENT DETECTOR
The coherent detector uses exact carrier synchronization for retrieving the message signal from
modulated signal. These types of detectors are mainly used for detecting DSB&SSB signals.
It consists of a product modulator with a low pass filter.
.p
For detecting signal local oscillator at the receiver end is required. The frequency and phase of the
locally generated carrier and transmitter carrier must be synchronized that is exactly coherent.
All types of linear modulation can be detected by using synchronous detector. It consists of a product
modulator with LPF.
w
w
w
The incoming signal is first multiplied with locally generated carrier and then passed through low pass
filter. The filter bandwidth is same as the message bandwidth ωm
Tthe local oscillator should be exactly synchronized with carrier signal in both phase and velocity.
Considering the case of SSB-SC signal, the signal I/p is
www.padeepz.net
www.padeepz.net
The output of the non linear device which acts as a multiplying device is given by
e(t)= e1(t). e2(t)= Em.Ec E cos (ωc - ωm)t sinωc t
2
t
demodulating SSB-SC signal
ne
e(t)= Em.Ec Esinωm t
4
The synchronous detector is effective only when locally generated carrier is properly synchronize with
the transmitter power. Assume the local oscillator carrier to have a phase difference with the transmitted
carrier. The carrier is represented by
.
e2(t)=Esin( ωc t + φ )
pz
The output of the non linear device is given by
e(t)= e1(t). e2(t)= Em.Ec cos (ωc - ωm)t Esin ( ωc t + φ )
2
ee = Em.Ec E cos (ωc - ωm)t sin ( ωc t + φ )
2
=Em.Ec E ( cosωct cosωmt+sinωmt sin ωc t)(sinωc t cosφ + cosωc t sin φ )
2
2 2
Cos 2ωc t cosωmt sin φ + cosωct sin ωc t cosωmt cosφ ]
After passing through the LPF the second order harmonic term is eliminated.
w
www.padeepz.net
www.padeepz.net
Generation and demodulation of VSB:
A VSB signal is obtained as shown figure below by suppressing one of the sidebands of a DSBSC using
a VSB filter.
t
ne
VSB filter is a BPF having an asymmetric frequency response in the transition band, positioned in such
a way that the carrier frequency corresponds to the middle of the transition band. From the figure,
𝑆𝐷𝑆𝐵−𝑆𝐶 (𝑡) = 𝐴𝑐 𝑚(𝑡)𝑐𝑜𝑠(𝜔𝑐 𝑡)
The transfer function of the VSB filter is 𝐻𝑣 (𝜔).
.
pz
ee
The inverse FT of 𝐻𝑣 (𝜔) gives the unit impulse, ℎ𝑣 (𝑡). We can express the VSB filter output as:
ad
𝑆𝑉𝑆𝐵−𝑆𝐶 (𝑡) = 𝑆𝐷𝑆𝐵−𝑆𝐶 (𝑡) ∗ ℎ𝑣 (𝑡) = 𝐴𝑐 𝑚(𝑡)𝑐𝑜𝑠(𝜔𝑐 𝑡) ∗ ℎ𝑣 (𝑡) -------------(1)
Taking FT on both sides,
𝐴
𝑆𝑉𝑆𝐵−𝑆𝐶 (𝜔) = { 2𝑐 [𝑀(𝜔 − 𝜔𝑐 ) + 𝑀(𝜔 + 𝜔𝑐 )] × 𝐻𝑣 (𝜔)} -----------(2)
The coherent detector is a sort of universal detector of AM signals in the sense that DSBSC, conventional
.p
AM and SSBSC can all be detected successfully by using it. It would be natural to expect that coherent detection
to work for the VSB-SC signal too.
w
w
w
The output of the multiplier in the VSB demodulator in the figure is given by:
𝑥 (𝑡) = 𝑆𝑉𝑆𝐵−𝑆𝐶 (𝑡) × 𝐴0 𝑐𝑜𝑠(𝜔𝑐 𝑡) ------------ (3)
It is assumed perfect synchrony between the transmitter and demodulator carriers.
www.padeepz.net
www.padeepz.net
Using (2) in (4),
𝐴0𝐴𝑐
𝑋 (𝜔 ) = ( ) {[𝑀(𝜔) + 𝑀(𝜔 − 2𝜔𝑐 )]𝐻𝑣 (𝜔 − 𝜔𝑐 ) + [𝑀(𝜔 + 2𝜔𝑐 ) + 𝑀 (𝜔)]𝐻𝑣 (𝜔 + 𝜔𝑐 )}
4
-----------(5)
The signal 𝑥(𝑡) is passed through an ideal filter (LPF) to obtain 𝑦(𝑡) . If the VSB modulation is
successful, then 𝑦(𝑡) should be proportional to the message signal, 𝑚(𝑡).
t
It is observed from (5) that 𝑀 (𝜔 − 2𝜔𝑐 ) and 𝑀(𝜔 + 2𝜔𝑐 ) are high pass terms, since they represent
ne
𝑀 𝜔 translated by ±2𝜔𝑐 . These terms are blocked by the LPF which yields an output signal 𝑦(𝑡) with the FT
( )
𝑌(𝜔) given by
𝐴 𝐴
𝑌(𝜔) = ( 0 𝑐 ) 𝑀(𝜔)[𝐻𝑣 (𝜔 − 𝜔𝑐 ) + 𝐻𝑣 (𝜔 + 𝜔𝑐 )] ------------(6)
4
.
proportionality constant. Hence, for perfect demodulation, the required condition is:
pz
[𝐻𝑣 (𝜔 − 𝜔𝑐 ) + 𝐻𝑣 (𝜔 + 𝜔𝑐 )] = 𝑐𝑜𝑛𝑠𝑡𝑎𝑛𝑡 𝑓𝑜𝑟 |𝜔| ≤ 𝜔𝑚 .
It is seen that the VSB bandwidth exceeds the corresponding SSB bandwidth 𝜔𝑚 by 𝜔𝑣 /2. Thus, the
filter transition bandwidth 𝜔𝑣 is an important parameter which decides the VSB bandwidth. It is observed in
filter design that spectral components that lie in the transition region suffer distortion causing phase shifts.
w
www.padeepz.net
www.padeepz.net
t
. ne
Advantages:
pz
1. Low frequencies, near fc are, transmitted without any attenuation.
2. Bandwidth is reduced compared to DSB.
Applications:
VSB is mainly used for TV transmission, since low frequencies near fc represent significant picture details.
ee
They are unaffected due toVSB.
ad
UNIT -2
.p
Angle Modulation
w
Definition
w
We know that amplitude, frequency or phase of the carrier can be varied by the modulating signal.
Amplitude is varied 'in AM. When frequency or phase of the carrier is varied by the modulating signal, then it
is called angle modulation, There are two types of angle modulation.
w
1. Frequency Modulation :
When frequency of the carrier varies as per amplitude variations of modulating signal, then it is called
Frequency Modulation (FM). Amplitude of the modulated carrier remains constant.
www.padeepz.net
www.padeepz.net
2. Phase Modulation :
When phase of the carrier varies as per amplitude variations of modulating signal, then it is called Phase
Modulation (PM). Amplitude of the modulated carrier remains constant,
Frequency Modulation:
t
The frequency of the high frequency carrier signal is carried in accordance with the modulating signal.
ne
Vm = Em sin 2fmt
Vc = Ec sin 2fct
.
Vfm = Ec sin (2fct + mf sin 2fmt)
pz
Vfm = Ec sin (wct + mf sin wmt)
mf modulating index of fm
ee
Relationship/Difference between FM and PM:
The basic difference between FM and PM lies in which property of the carrier isdirectly varied by
ad
modulating signal. Note that when frequency of the carrier varies,phase of the carrier also varies and
viceversa.
But if frequency is varied directly, thenit .is called FM.,
.p
Instantaneous phase =
w
...................(1)
w
Here θ(t) is the instantaneous phase deviation and ωc is the carrier frequency. Now the instantaneous frequency
deviation is defined as
................(2)
www.padeepz.net
www.padeepz.net
Definition for instantaneous frequency deviation: It is the instantaneous change in carrier frequency. It is
equal to the rate at which instantaneous phase deviation takes place.
Definition of instantaneous frequency:It is the frequency of the carrier t a given instant of time. It is given as
t
...................(3)
ne
Instantaneous phase deivation θ(t) is proportional to modulating signal voltage
-....................(4)
.
pz
Where K is the deviation sensitivity of phase
ee ........................(5)
.......................(6)
.p
.......................(7)
w
.......................(8)
Using the value of θ(t) in the above equation from equation (7)
www.padeepz.net
www.padeepz.net
....(9)
Similarly using the value of θ(t) from equation (5) in equation (8) we get
t
..........(10)
ne
FM and PM waveforms:
.
pz
ee
ad
waveform we can
note the following
w
For PM signal the maximum frequency. deviation takes place near zero crossings of the modulating
signal.
w
www.padeepz.net
www.padeepz.net
M=KEm
For FM It is the ratio of maximum frequency deviation () to the modulating frequency (fm).
t
ne
is maximum.
f = K1 Em (Hz)
K1 = Deviation sensitivity.
.
pz
By Carson’s rule the Bandwidth needed by fm is given as,
B = 2 ( + fmmax)
Deviation Ratio :
The modulation index corresponding to maximum modulating frequency is called deviation ratio.
ad
Maximum frequency deviation
Deviation Ratio = –––––––––––––––––––––––––––––
Maximum modulating frequency
.p
FM and PM analysis is quite complicated. It is derived with the help of Bessel function.
Efm = Ec sin (wct + mf cos wmt)
w
Efm = A {Jomf sin wct + J1mf [sin (wc + wm)t – sin (wc - wm)t]
+ J2mf [sin (wc + 2wm)t – sin (wc - 2wm)t] + J3mf [sin (wc + 3wm)t
– sin (wc - 3wm)t] + J4mf [sin (wc + 4wm)t – sin (wc - 4wm)t] …..}
www.padeepz.net
www.padeepz.net
J0, J1, J2, J3 …. Are Bessel functions. The value of this depends on modulation index mf.
t
From the figure the Bandwidth of FM is given by
ne
B = fc + nfm – fc + nfm
BW = 2nfm
.
Bessel Function Table :
pz
m J0 J1 J2 J3 J4 J5 J6 J7 J8 J9 J10
0 1 - - - - - - - - - -
0.5
1
0.94
0.77
ee
0.24
0.44
0.03
0.11
-
0.02
-
-
-
-
-
-
-
-
-
-
-
-
-
Classification of FM:
1. Narrowband FM
w
2. Wide band FM
Narrow band FM:
w
When the modulation index is less than I, it is called narrowband FM. The FM Equation given by eq. 9
can also be expressed as,
…………………(1)
www.padeepz.net
www.padeepz.net
………(2)
t
ne
For narrowband FM, the modulation index, m is very small therefore following approximations can be
considered.
.
pz
Using this in equation (2)
Expanding
ee
ad
This equation gives the spectrum of narrowband FM. Observe that there is carrier frequency fc, upper sideband
(fc + fm) and lower sideband (fc - fm).
Wide band FM
.p
www.padeepz.net
www.padeepz.net
t
. ne
pz
ee
The above integral is known as the nth order Bessel function of the first kind. It is given as
ad
………………(3)
www.padeepz.net
www.padeepz.net
This equation shows that there are infinite number of components located
t
Comparison between narrowband and wideband FM
ne
Sr.no Narrow band FM Wide band FM
.
2
pz
3 Spectrum contains 2 sidebands and carrier Spectrum cont6ains infinite number of
sidebands and carrier
4
5
BW=2fm
ee
It is used for mobile communication It is used for broadcasting and entertainment
1 The maximum frequency deviation depends The maximum phase deviation depends only
w
upon amplitude of modulating voltage and upon the amplitude of modulating voltage
modulating frequency
w
4 Noise immunity is bette than AM and PM Noise immunity is better than AM but worse
than FM
www.padeepz.net
www.padeepz.net
5 FM is widely used PM is used in some mobile systems.
Generation of FM waves:
t
1. Direct Method
ne
2. Indirect Method
.
pz
Direct FM Modulators : In this type the frequency of the carrier is varied directly by the modulating signal.
ee
Indirect FM Modulators: In this type FM is obtained by phase modulation of the carrier.
ad
.p
www.padeepz.net
www.padeepz.net
t
ne
It behaves as reactance across terminal A-B.
The terminal A-B of the circuit may be connected across the tuned circuit of the oscillator to get fm o/p.
The varying voltage (modulating voltage) V, across the terminals A-B changes the reactance of FET.
.
This charge in reactance can be inductive or capacitive.
pz
Neglecting the gate current, let the current through C & R be I 1.
At the carrier freq. the reactance of C is much larger than
ee V
R & I1 = ––––––––––
R + 1/ jwc
Jwc >> R
I1 = jwcV
From the Circuit,
Vg = I1R = jwcrv
ad
Id = gmvgs = gmVg
Id = jwcRgm V
From the circuit impedance of the FET is,
V
Z = ––––
.p
Id
V 1 1
= ––––––––––– = ––––––––––– = –––––––––
w
By carrying the modulating voltage across FET, the operating paint g m can be varied and hence Ceq.
This change in the capacitance will change the frequency of the oscillator.
w
www.padeepz.net
www.padeepz.net
t
ne
We know that the junction capacitance of the varactor diode changes as the reverse bias across it is
.
varied.
pz
L1 & C1 forms the tank circuit of the carrier oscillator.
The capacitance of the varactor diode depends on the fixed bias set by R1 & R2 & AF modulating signal.
Either R1 or R2 is made variable.
The radio frequency choke [RFC] has high reactance at the carrier frequency to prevent carrier signal
ee
from getting into the modulating signal.
At +ve going modulating signal adds to the reverse bias applied to the varactor diode D, which decreases
its capacitance & increases the carrier frequency.
ad
A –ve going modulating signal subtracts from the bias, increasing the capacitance, which decreases the
carrier frequency.
.p
Direct Fm Transmitters :
w
w
w
www.padeepz.net
www.padeepz.net
Fig. shows the FM Crosby transmitter with an AFC loop. (Automatic frequency correction loop).
The Frequency modulator can be either a reactance modulator or voltage controlled oscillator.
The carrier freq is 5.1MHz. which multiplies by 18 in three steps to produce a final frequency of 91.8
MHz.
When the frequency modulated carrier is multiplied, its frequency & phase deviations are also
multiplied.
t
ne
The rate at which the carrier is deviated is unaffected by the multiplication process. Hence the
modulation index is multiplied.
When an angle modulated carrier is heterodyned with another freq in a non linear mixer, the carrier can
either be up converted or down converted.
.
pz
AFC loop :
ee
ad
The purpose of the AFC loop is the achieve near crystal stability of the transmit carrier freq. without
.p
Frequency discriminator is a device whose o/p voltage is proportional to difference b/w i/p freq and its
resonant freq.
w
Discriminator responds to low freq changes in the carrier center freq because of master oscillator freq
drift.
When the discriminator responds to frequency deviation, the feedback loop would cancel the deviation
w
www.padeepz.net
www.padeepz.net
PLL Direct FM transmitter:
t
. ne
pz
Fig shows a wide band FM transmitter.
The VCO o/p freq is divided by N & fed bark to the PLL phase comparator, where it is compared to a
stable reference freq.
ee
The phase comparator generator a correction voltage that is proportional to the difference b/w the 2
frequencies.
The correction voltage is added to the modulating signal & applied to the VCO i/p.
ad
The correction voltage adjusts the VCO centre freq to its proper value.
The LPF prevents the changes in the VCO o/p frequency due to the modulating signal from being
converted to a voltage & fed back to VCO.
The LPF also prevents the loop from locking onto a side frequency.
.p
Indirect Fm transmitter
w
w
w
www.padeepz.net
www.padeepz.net
t
. ne
Here the modulating signal directly deviates the phase of the carrier, which indirectly changes the
pz
frequency.
The carrier source is a crystal oscillator hence stability can be achieved without a AFC.
A carrier is phase shifted to 900 & fed to the Balanced modulator. Where it is mixed with the i/p
ee
modulating signal.
The o/p of balanced modulator is DSBSC.
The o/p of Balanced modulator is combined with original carrier in the combining N/W. to produce a
low index, phase modulated wavefrom.
ad
Fig (b) shows phasor of original carrier, modulating signal and the resultant Vector.
Fig (b) shows the phasors for the side freq. components of the suppressed carrier wave. As suppressed
carrier is out of phase with Vc, the upper & Lower side bands combine to produce Vm – 90o with Vc.
.p
The phase modulated signal is obtained by vector addition of carrier and modulating signal.
Modulating signal vector adds to the carrier OA with 900 phase Shift.
The resultant phase modulated vector is OB with phase shift .
w
This works only if both have the same frequency. The means carrier & modulating signal should have
same frequency. Under this condition phase modulation produces FM o/p.
w
FM Demodulators / Detectors
www.padeepz.net
www.padeepz.net
Round Travis Detector or Balanced discriminator.
Foster – Seley Discriminator or Phase discriminator.
Ratio Detector.
t
. ne
pz
ee
Consists of 2 identical circuit connected back to back.
FM signal is applied to the tuned LC circuit.
ad
Two tuned LC circuits are connected in series.
The inductance of the secondary tuned LC circuit is coupled with the inductance of the primary LC
circuit this forms a tuned transformer.
Upper tuned circuit is T1 & lower tuned circuit is T2.
.p
When i/p freq is fc + f, the upper circuit T1 produces maximum voltage since it is tuned to this freq.
Hence this produces maximum votalge.
V01 is high compared to V02.
www.padeepz.net
www.padeepz.net
When i/p freq is fc - f. T2 produces maximum signal since it is tuned to it. But T 1 produces minimum
voltage. Hence o/p Volt = V01 – V02 is negative. Thus we get a modulating signal.
Foster - Seeley Discriminator :
t
. ne
pz
ee
ad
.p
The primary voltage is coupled through C3 & RFC to the centre tap on the secondary.
w
The capacitor C3 passes all the frequencies of Fm. The voltage V 1 is generated across RFC.
RFC offers high impedance to frequencies of Fm.
w
w
www.padeepz.net
www.padeepz.net
t
. ne
pz
ee
ad
.p
The voltage V1 thus appears across centre tap of secondary and ground also.
w
The voltage of secondary is V2 & equally divided across upper half & lower half of the secondary.
In the figure the voltage across diode D1 is VDI = V1 + 0.5 V2 and that across D2 is VD2 = V1 + 0.5 V2
w
.
The o/p of upper rectifier is V01 and lower rectifier is V02.
The net o/p V0 = V01 – V02 V0 = | VD1 | - | VD2 |
w
At carrier frequency VD1 x VD2 are equal hence the net o/p of the discriminator will be zero.
When the i/p frequency increases above fc the phase shift b/w V1 & V2 reduces | VD1 | > | VD2 | hence
V01 = | VD1 | - | VD2 | will be +ve.
When the i/p frequency reduces below fc then | VD1 | > | VD2 | hence V01 = | VD1 | - | VD2 | will be –ve.
www.padeepz.net
www.padeepz.net
Ratio detector :
t
. ne
pz
Ratio detector can be obtained by sight modifications in the foster-Seeley discriminator. Fig shows the
circuit diagram of ratio detector. As shown in the diagram the diode D 2 is reversed, and output is taken from
different points. In the above circuit the regular conversion from frequency to phase shift and phase shift to
ee
amplitude takes place as in faster–Seeley discriminator. The polarity of voltage in the lower capacitor is
reversed. Hence the voltages V01 and V02 across two capacitors add. (Note that these voltages subtract in faster-
seely circuit). And we know that when V01 increases, V02 decreases and vice-versa as we have seen in faster-
Seeley circuit. Since, V0' is sum of V01 and V02, it remains constant. From the circuit of Fig we can write two
equations for the output voltage V0 (Note that V0 is the net output voltage and taken across points A and B).
ad
The First equation will be,
V0 = ½ V'0 – V02
2 V0 = V01 - V02
V0 = ½ (V01 - V02)
w
V0 = ½ ( | VD1 | - | VD2 |)
w
Here VD1 & VD2 are obtained as discussed earlier in foster seeley circuit.
From the equation we know that the output of ratio detector is half compared to that of Foster-Seeley
circuit
www.padeepz.net
www.padeepz.net
As frequency increases above fc' | VD1 | > | VD2| hence o/p is +ve.
III rly as frequency decreases below fc = | VD2 | > | VD1|, hence o/p is –ve.
Advantage :
t
PLL Demodulator circuit
. ne
pz
ee
Fig. shows the block diagram of PLL FM demodulator.
The output frequency of VCO is equal to the frequency of unmodulated carrier.
The phase detector generates the voltage which is proportional to difference between the FM signal and
VCO output.
ad
This voltage is filtered and amplified. It is the required modulating voltage.
Here frequency correction is not required in VCO since it is already done at transmitter
Comparison of FM and AM
.p
3. Most of the power is in carrier hence less All the transmitted power is useful.
w
efficient.
www.padeepz.net
www.padeepz.net
6. Am Broadcast operates in MF and HF FM Broadcost operates in VHF and
range UHF range.
7. In Am only carrier and two sidebands are Infinite number of sidebands are
present present
t
ne
9. Transmitted power varies according to Transmitted power remains constant
modulation index. irrespective of modulation index.
.
increasing frequency deviation.
pz
ee
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
UNIT 3 & 4
2. Deduce the ultimate transmission rate for reliable communication over a noisy
channel.
t
3. Define Channel Capacity - the intrinsic ability of a channel to convey information.
ne
Communication system
The function of any communication system is to convey the information from source to
destination.
.
pz
Discrete message
During one time one message is transmitted. During the next time interval the next from
ee
the set is transmitted.
Memory source
A source with memory for which each symbol depends on the previous symbols.
ad
Memoryless source
Memoryless in the sense that the symbol emitted at any time is independent of previous
choices.
.p
with probabilities
We assume that the symbols emitted by the source during successive signaling intervals are
statistically independent. A source having the properties is described is called discrete
memoryless source, memoryless in the sense that the symbol emitted at any time is
independent of previous choices.
www.padeepz.net
www.padeepz.net
Source alphabet
Symbols or letters
t
Uncertainty
ne
The amount of information contained in each symbols is closely related to its uncertainty
or surprise.
.
pz
We can define the amount of information contained in each symbols.
Here, generally use log2 since in digital communications we will be talking about bits.
ee
The above expression also tells us that when there is more uncertainty(less probability) of the
symbol being occurred then it conveys more information.
UNIT b VALUE
.p
Binit 2
Natural unit(nat) e
www.padeepz.net
www.padeepz.net
4. I(sksi) = I(sk)+I(si) if sk and si are statistically independent.
Proof:
p(sj, sk) = p(sj) p(sk) if sk and si are statistically independent.
I (sj, sk) = log (1 / p(sj, sk))
= log (1 / p(sj) p(sk))
t
= log (1 / p(sj)) + = log (1 / p(sk))
ne
= I(sj) I(sk)
Average information or entropy
The amount of information I(sk) produced by the source during an arbitrary signalling
interval depends on the symbol sk emitted by the source at that time. Indeed, I(sk) is a discrete
.
random variable that takes on the values I(s0), I(s1), · · · , I(sK-1) with probabilities p0, p1, · · · ,
pz
pK-1 respectively.
symbol. Note the entropy H(φ) depends only on the probabilities of the symbols in the alphabet
φ of the source.
w
Problem
1. A DMS has four symbols S1 , S2, S3 S4 with probabilities 0.40, 0.30, 0.20,
w
0.10
a. Calculate H(φ).
b. Find the amount of information contained in the message S 1S2S3 S4
w
t
I(S4S3S3 S2) > 7.4 ( 4 H(φ) )
ne
Some properties of entropy
.
0 ≤ H(φ) ≤ log2(K)
pz
where K is the radix (number of symbols)of the alphabet S of the source.
2. H(φ) = log2(K), if and only if pk = 1/ K for all k; this upper bound on entropy
ad
corresponds to maximum uncertainty.
Proof:
H(φ) ≥0.
.p
Since each probability pk is less than or equal to unity, it follows that each term
The term Pk is zero if, and only if, pk = 0 or 1. That is pk =1 for some k and
H(φ) ≤ log2(K)
To prove this upper bound , we make use of a property of the natural logarithm.
w
To proceed with this proof, consider any two probability distributions {p0, p1, · · · , pk-1 }
and {q0, q1, q2, · · · , qk-1 } on the alphabet φ = {s0, s1, s2, · · · , sk-1 } of a discrete
memoryless source. Then changing to the natural logarithm, we may write
www.padeepz.net
www.padeepz.net
t
. ne
pz
We thus have the fundamental inequality
ee
Where the equality holds only if pk = qk for all k. Suppose we next put
ad
.p
w
So,
Thus H(φ) is always less than or equal to log 2k. This equality holds only if the symbols
w
are equiprobable.
Consider a discrete memoryless binary source shown defined on the alphabet φ = {0, 1}.
Let the probabilities of symbols 0 and 1 be p0 and 1- p0 respectively.
www.padeepz.net
www.padeepz.net
t
3. The entropy attains its maximum value, Hmax = 1 bit, p0= p1= 1/2., that is, symbols 1
ne
and 0 are equally probable.
.
pz
Figure - Entropy of a discrete memoryless binary source
ee
Information rate
If the source of the message generates messages at the rate of r messages per second,
then the information rate is defined to be
ad
R= rH = average number of bits of information / second.
Example problem
An analog signal is bandlimited to B Hz,sampled at the nyquist rate, and the samples are
.p
quantized into four levels. The quantization levels Q1,Q2,Q3,Q4(messages ) are assumed
independent and occur with probabilities P1=P4=1/8 and P2=P3=3/8. Find the information rate
of the source.
w
Solution
w
www.padeepz.net
www.padeepz.net
An important problem in communication is the efficient representation of data generated
by a discrete source. The process by which this representation is accomplished is called source
encoding. The device that performs that representation is called a source encoder.
t
If some source symbols are known to be more probable than others, then the source
ne
code is generated by assigning short code to frequent source symbols, and long code to rare
source symbols.
EX : Morse code, in which the letters and alphabets are encoded into streams of marks
and spaces, denoted as dots “.” And dashes “-“.
.
pz
Our primary interest is in the development of an efficient source encoder that satisfies
two functional requirements:
In physical terms, the parameter L represents the average number of bits per source
symbol used in the source encoding process. Let Lmin denote the minimum possible value of L.
.p
η = Lmin / L
w
L ≥ H(φ)
Data Compaction:
t
3. A source code which represents the output of a discrete memoryless source should be
ne
uniquely decodable.
Prefix Coding
.
pz
and statistics {p0, p1, p2, · · · , pk-1}.
For each finite sequence of symbols emitted by the source, the corresponding sequence
of code words is different from the sequence of code words corresponding to any other source
ee
sequence. For the above mentioned symbol, let the code word be denoted by
Prefix condition
The initial part of the code word is represented by the elements {m k0, mk1, mk2, · · · , mki}
.p
Any sequence made up of the initial part of the code word is called prefix.
Prefix code
w
1. The Prefix Code is variable length source coding scheme where no code is the prefix
of any other code.
w
3. But, the converse is not true i.e., all uniquely decodable codes may not be prefix
w
codes.
www.padeepz.net
www.padeepz.net
t
ne
From 1 we see that Code I is not a prefix code. Code II is a prefix code. Code III is also
uniquely decodable but not a prefix code. Prefix codes also satisfies Kraft-McMillan inequality
.
which is given by
pz
Code I violates the Kraft – McMillan inequality.
ee
Both codes II and III satisfies the Kraft – McMillan inequality, but only code II is a prefix code.
Decoding procedure
ad
1. The source decoder simply starts at the beginning of the sequence and decodes one
codeword at the time.
2. The decoder always starts at the initial state of the tree.
3. The received bit moves the decoder to the terminal state if it is 0,or else to next
.p
decision point if it is 1.
w
w
w
Given a discrete memoryless source of entropy H(φ), a prefix code can be constructed
with an average code-word length l, which is bounded as follows:
H(φ)≤L≤ H(φ)+1
www.padeepz.net
www.padeepz.net
The left hand side of the above equation, the equality is satisfied owing to the condition
that, any symbol sk is emitted with the probability
t
Shannon – fano coding
ne
Procedure
.
2. Partition the set into two sets that are as close to equiprobable as possible, and assign
pz
0 to the upper set and 1 to the lower set.
3. Continue the process, each time partitioning the sets with nearly equal probabilities as
possible until further partitioning not possible.
ee
Example problems
1. A DMS has six symbols S1 , S2, S3 S4, S5, S6, with corresponding probabilities 0.30,
0.25, 0.20, 0.12, 0.08, 0.05. construct a Shannon – fano code for S.
Sk pk Step 1 Step 2 Step 3 Step 4 Step 5
S1 0.30 0 0 00
ad
0
S2 0.25 1
01
S3 0.20
1 0 10
S4 0.12
1 1 0 110
.p
S5 0.08
1 1 1 0 1110
S6 0.05
1 1 1 1 1111
w
2. A DMS has six symbols S1 , S2, S3, S4 with corresponding probabilities, 1/2 , 1/4, 1/8, 1/8,
construct a Shannon – fano code for S.
Sk pk Step 1 Step 2 Step 3 Step 4
w
S1 1/2 0
0
S2 1/4
w
1 0 10
S3 1/8
1 1 0 110
S4 1/8
1 1 1 111
www.padeepz.net
www.padeepz.net
3. A DMS has five equally likely symbols S1 , S2, S3 S4, S5 construct a Shannon – fano
code for S.
t
S2 0.20
ne
0 1 01
S3 0.20
1 0 10
S4 0.20
1 1 0 110
S5 0.20
.
1 1 1 111
pz
Huffman coding
ee
It is to assign to each symbol of an alphabet a sequence of bits roughly equal in length
to the amount of information conveyed by the symbol in question.
Algorithm
ad
1.The source symbols are listed in order of decreasing probability. The two source
symbols of lowest probability are assigned a 0 and a 1. This part of the step is reffered to as a
splitting stage.
.p
2. These two source symbols are regarded as being combined into a new source symbol
with probability equal to the sum of the original probabilities. The probability of the new symbol
is placed in the list in accordance with its value.
w
3. The procedure is repeated until we are left with a final list of source statistics of only
two for which a 0 and a 1 are assigned.
w
S0, 0.4 00
S1 0.2 10
t
S2 0.2 11
ne
S3 0.1 010
S4 0.1 011
Drawbacks:
.
pz
1. Requires proper statistics.
3. When applied to English text it achieves 55% in contrast to Huffman coding which achieves
only 43%.
.p
4. Encodes patterns in the text This algorithm is accomplished by parsing the source data
stream
into segments that are the shortest subsequences not encountered previously.
w
Problems
w
000101110010100101.........
w
subsequences stored : 0, 1
The shortest subsequence of the data stream encountered for the first time and not seen before
www.padeepz.net
www.padeepz.net
is 00
subsequences stored: 0, 1, 00
The second shortest subsequence not seen before is 01; accordingly, we go on to write
t
Subsequences stored: 0, 1, 00, 01
ne
Data to be parsed: 01110010100101.........
We continue in the manner described here until the given data stream has been completely
parsed. The
.
pz
code book is shown below:
Numerical positions: 1 2 3 4 5 6 7 8 9
Numerical Repre
sentations: 11 12 42 21 41 61 62
ad
Binary encoded
Let X and Y be the random variables of symbols at the source and destination
w
www.padeepz.net
www.padeepz.net
The channel is described by an input alphabet
an output alphabet
t
{y0, y1, y2, · · · , yK-1}, K – output alphabet size
ne
and a set of transition probabilities
.
pz
channel matrix or transition matrix
p(y0/x0)
ee p(y1/x0) ……… p(yK-1/x0)
P= .
.
ad
.
Input probability distribution p(xj) , j=1,2,……J-1, the event that the channel input X= xj
w
www.padeepz.net
www.padeepz.net
= p(yk/xj) p(xj)
Marginal probability distribution of the output random variable Y is obtained by averaging out the
dependence of p(xj, yk) on xj,
t
. ne
pz
Binary Symmetric Channel
1).
ee
– The Channel has two input symbols(x0 = 0, x1 = 1)and two output symbols(y0 = 0, y1 =
www.padeepz.net
www.padeepz.net
Mutual Information
If the output Y as the noisy version of the channel input X and H(X) is the uncertainity
associated with X, then the uncertainity about X after observing Y , H(X|Y) is given by
t
. ne
pz
The quantity H(X|Y) is called Conditional Entropy. It is the amount of uncertainity about
the channel input after the channel output is observed. Since H(X) is the uncertainity in channel
ee
input before observing the output, H(X) - H(X|Y) represents the uncertainity in channel input that
is resolved by observing the channel output. This uncertainity measure is termed as Mutual
Information of the channel and is denoted by I(X; Y).
ad
.p
Where the H(Y) is the entropy of the channel output and H(Y/X) is the conditional
entropy of the channel output given the channel input.
w
w
Property 1:
w
I(X; Y) = I(Y;X)
www.padeepz.net
www.padeepz.net
Where the mutual information I(X; Y) is a measure of the uncertainty about the channel input
that is resolved by observing the channel output, and the mutual information I(Y;X) is a measure
of the uncertainty about the channel output that is resolved by sending the channel output.
t
Proof:
. ne
pz
ee
ad
www.padeepz.net
www.padeepz.net
Property 2:
Proof:
We know,
t
ne
Substituting Eq. 14 in Eq. 13, we get
.
pz
Using the following fundamental inequality which we derived discussing the properties of
Entropy, ee
ad
Drawing the similarities between the right hand side of the above inequality and the left hand
side of Eq. 13, we can conclude that
.p
Property 2 states that we cannot lose information, on the average, by observing the
output of a channel. Moreover, the mutual information is zero if, and only if, the input and output
symbols of the channel are statistically independent.
w
Property 3:
w
The mutual information of a channel is related to the joint entropy of the channel input and
channel output by
www.padeepz.net
www.padeepz.net
Proof:
t
. ne
pz
ee
ad
.p
w
Channel Capacity
Channel Capacity, C is defined as ‘the maximum mutual information I(X; Y) in any single
use of the channel(i.e., signaling interval), where the maximization is over all possible input
probability distributions {p(xj)} on X”
www.padeepz.net
www.padeepz.net
Example:
t
ne
For, the binary symmetric channel discussed previously, I(X; Y) will be maximum when
.
pz
Since, we know
ee
ad
Using the probability values in Eq. 3 and Eq. 4 in evaluating Eq. 2, we get
.p
w
w
w
www.padeepz.net
www.padeepz.net
1. When the channel is noise free, p=0, the channel capacity C attains its maximum
value of one bit per channel use. At this value the entropy function attains its
minimum value of zero.
2. When the conditional probability p=1/2 due to noise, the channel capacity C attains
its minimum value of zero,whereas the entropy function attains its maximum value of
unity, in such a case the channel is said to be useless.
t
Channel Coding Theorem:
ne
Goal: Design of channel coding to increase resistance of a digital communication system
to channel noise.
.
Channel coding
pz
Mapping of the incoming data sequence into channel input sequence. It is performed in
the transmitter by a channel encoder.
ee
Channel decoding (inverse mapping)
Mapping of the channel output sequence into an output data sequence. It is performed in
the receiver by a channel decoder.
ad
The channel coding theorem is defined as process to introduce redundancy in order to
reconstruct the original source sequence as accurately as possible.
– with an alphabet φ
– have capacity C
3. Then if,
www.padeepz.net
www.padeepz.net
There exists a coding scheme for which the source output can be transmitted over the channel
and be reconstructed with an arbitrarily small probability of error. The parameter C / Tc
t
4. Conversly, if
ne
it is not possible to transmit information over the channel and reconstruct it with an arbitrarily
.
small probability of error.
pz
Example:
ee
Considering the case of a binary symmetric channel, the source entropy H(Φ) is 1. Hence, from
the above equation, we have
ad
.p
But the ratio Tc / Ts equals the code rate, r of the channel encoder.
w
r≤C
w
Hence, for a binary symmetric channel, if r ≤ C, then there exists a code capable of achieving an
arbitrarily low probability of error.
w
www.padeepz.net
www.padeepz.net
The Information Capacity Theorem is defined as ‘The information capacity of a
continuous channel of bandwidth B hertz, perturbed by additive white Gaussian noise of power
spectral Density N0/ 2 and limited in bandwidth to B, is given by
t
ne
where P is the average transmitted power. Proof:
.
pz
Assumptions:
3. These samples are transmitted in T seconds over a noisy channel, also band-limited
to B hertz.
ad
The number of samples, K is given by
.p
We refer to Xk as a sample of the transmitted signal. The channel output is mixed with additive
white Gaussian noise(AWGN) of zero mean and power spectral density N0/2. The noise is
band-limited to B hertz. Let the continuous random variables Yk, k = 1, 2, · · · ,K denote samples
w
'
w
The noise sample Nk is Gaussian with zero mean and variance given by
w
www.padeepz.net
www.padeepz.net
Now, let I(Xk; Yk) denote the mutual information between X k and Yk. The capacity of the channel
is given by
t
The mutual information I(Xk; Yk) can be expressed as
ne
This takes the form
.
pz
When a symbol is transmitted from the source, noise is added to it. So, the total power is P + σ 2.
ee
For the evaluation of the information capacity C, we proceed in three stages:
1. The variance of sample Yk of the received signal equals P + σ 2. Hence, the differential
entropy of Yk is
ad
2. The variance of the noise sample Nk equals σ 2. Hence, the differential entropy of Nk is given
.p
by
w
www.padeepz.net
www.padeepz.net
The number K equals 2BT. Accordingly, we may express the information capacity in the
equivalent form:
t
. ne
pz
ee
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
t
. ne
UNIT-5
pz
Spread Spectrum and
Multiple Access Techniques
ee
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
Spread Spectrum
t
ne
• Analog or digital data
• Analog signal
•
.
Spread data over wide bandwidth
pz
• Makes jamming and interception harder
• Frequency hoping
– Signal broadcast over seemingly random series of frequencies
ee
• Direct Sequence
– Each bit is represented by multiple bits in transmitted signal
ad
– Chipping code
www.padeepz.net
www.padeepz.net
– Spreading code/sequence
– Typically generated by pseudonoise/pseudorandom number generator
t
ne
• Increases bandwidth significantly
– Spreads spectrum
• Receiver uses same sequence to demodulate signal
.
pz
• Demodulated signal fed into channel decoder
ee
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
Pseudorandom Numbers
t
ne
• Generated by algorithm using initial seed
• Deterministic algorithm
.
– Not actually random
pz
– If algorithm good, results pass reasonable tests of randomness
• Need to know algorithm and seed to predict sequence
ee
Frequency Hopping Spread Spectrum (FHSS)
•
•
•
ad
Signal broadcast over seemingly random series of frequencies
Receiver hops between frequencies in sync with transmitter
Eavesdroppers hear unintelligible blips
.p
• Jamming on one frequency affects only a few bits
w
w
w
www.padeepz.net
www.padeepz.net
Basic Operation
t
ne
• Typically 2k carriers frequencies forming 2k channels
• Channel spacing corresponds with bandwidth of input
.
• Each channel used for fixed interval
pz
– 300 ms in IEEE 802.11
– Some number of bits transmitted using some encoding
scheme
ee
• May be fractions of bit (see later)
– Sequence dictated by spreading code
ad
Frequency Hopping Example
.p
w
w
w
www.padeepz.net
www.padeepz.net
t
. ne
pz
ee
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
Frequency Hopping Spread Spectrum System (Transmitter)
t
. ne
pz
ee
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
Frequency Hopping Spread Spectrum System (Receiver)
t
. ne
pz
ee
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
Slow and Fast FHSS
t
ne
• Frequency shifted every Tc seconds
• Duration of signal element is Ts seconds
• Slow FHSS has Tc Ts
• Fast FHSS has Tc < Ts
.
pz
• Generally fast FHSS gives improved performance in noise
(or jamming)
ee
Direct Sequence Spread Spectrum (DSSS)
• Each bit represented by multiple bits using spreading code
• Spreading code spreads signal across wider frequency band
ad
– In proportion to number of bits used
– 10 bit spreading code spreads signal across 10 times bandwidth of 1 bit
code
.p
• One method:
– Combine input with spreading code using XOR
w
www.padeepz.net
www.padeepz.net
– Data rate equal to original spreading code
• Performance similar to FHSS
t
ne
Direct Sequence Spread Spectrum Transmitter
.
pz
ee
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
Direct Sequence Spread Spectrum Transmitter
t
. ne
pz
ee
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
Multiple Access Techniques
t
ne
• The transmission from the BS in the downlink can be heard by each and every
mobile user in the cell, and is referred as broadcasting. Transmission from the
mobile users in the uplink to the BS is many-to-one, and is referred to as
multiple access.
.
pz
• Multiple access schemes to allow many users to share simultaneously a finite
amount of radio spectrum resources.
– Should not result in severe degradation in the performance of the system as
ee
compared to a single user scenario.
– Approaches can be broadly grouped into two categories: narrowband
and wideband.
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
Multiple Access Techniques
t
ne
• Multiple Accessing Techniques : with possible conflict and conflict- free
– Random access
.
pz
– Frequency division multiple access (FDMA)
– Time division multiple access (TDMA)
– Spread spectrum multiple access (SSMA) : an example is Code division
ee
multiple access (CDMA)
– Space division multiple access (SDMA)
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
Duplexing
t
ne
• For voice or data communications, must assure two way communication
(duplexing, it is possible to talk and listen simultaneously). Duplexing may be
.
done using frequency or time domain techniques.
pz
– Forward (downlink) band provides traffic from the BS to the mobile
– Reverse (uplink) band provides traffic from the mobile to the BS.
ee
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
Frequency division duplexing (FDD)
t
ne
• Provides two distinct bands of frequencies for every user, one for downlink and
.
one for uplink.
pz
• A large interval between these frequency bands must be allowed so that
interference is
ee
minimized.
Reverse Forward
Channel Channel
ad f
c,
f
c,, frequency
.p
w
R
Frequency separation
w
www.padeepz.net
www.padeepz.net
Time division duplexing (TDD)
t
ne
• In TDD communications, both directions of transmission use one contiguous
frequency allocation, but two separate time slots to provide both a forward and
.
pz
reverse link.
• Because transmission from mobile to BS and from BS to mobile alternates in
time, this scheme is also known as “ping pong”.
ee
• As a consequence of the use of the same frequency band, the
communication quality in both directions is the same. This is different from
FDD.
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
FDMA
t
ne
• In FDMA, each user is allocated a unique frequency band or channel. During the
period of the call, no other user can share the same frequency band.
.
pz
ee
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
FDMA
t
ne
• All channels in a cell are available to all the mobiles. Channel assignment
is carried out on a first-come first- served basis.
• The number of channels, given a frequency spectrum BT , depends on the
.
modulation technique (hence Bw or Bc ) and the guard bands between the channels
pz
2Bguard . These guard bands allow for imperfect filters and oscillators and can be
used to minimize adjacent channel interference.
• FDMA is usually implemented in narrowband systems.
ee
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
Main features
t
ne
• Continuous transmission : the channels, once assigned, are used on a non-time-
sharing basis. This means that both subscriber and BS can use their
corresponding allotted channels continuously and simultaneously.
.
pz
• Narrow bandwidth : Analog cellular systems use 25-30 kHz. Digital FDMA
systems can make use of low bit rate speech coding techniques to reduce the
channel band even more.
ee
• If FDMA channels are not in use, then they sit idle and cannot be used by other
users to increase capacity.
• Low ISI : Symbol time is large compared to delay spread. No equalizer is required
(Delay spread is generally less than a few μs – flat fading).
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
Main features
t
ne
• Low overhead : Carry overhead messages for control, synchronization purposes. As
the allotted channels can be used continuously, fewer bits need to be dedicated
compared to TDMA channels.
.
pz
• Simple hardware at mobile unit and BS : (1) no digital processing needed to
combat ISI (2) ease of framing and synchronization.
• Use of duplexer since both the transmitter and receiver operate at the same time.
ee
This results in an increase in the cost of mobile and BSs.
• ad
FDMA required tight RF filtering to minimize adjacent channel
interference.
.p
w
w
w
www.padeepz.net
www.padeepz.net
TDMA
t
• TDMA systems divide the channel time into frames. Each frame is further
ne
partitioned into time slots. In each slot only one user is allowed to either transmit
or receive.
• Unlike FDMA, only digital data and digital modulation must be used.
.
• Each user occupies a cyclically repeating time slot, so a channel may be
pz
thought of as a particular time slot of every frame, where N time slots comprise
a frame.
ee
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
Features
t
• Multiple channels per carrier or RF channels.
ne
• Burst transmission since channels are used on a timesharing basis. Transmitter can
be turned off during idle periods.
• Narrow or wide bandwidth – depends on factors such as modulation scheme,
.
number of voice channels per carrier channel.
pz
• High ISI – Higher transmission symbol rate, hence resulting in high ISI. Adaptive
equalizer required.
ee
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
Features
t
ne
• High framing overhead – A reasonable amount of the total transmitted bits
must be dedicated to synchronization purposes, channel identification. Also
.
guard slots are necessary to separate users.
pz
ee
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
TDMA Frame
t
ne
One TDMA Frame
.
Preamble Information Trail Bits
pz
ee
Slot 1 Slot 2 Slot 3 … Slot N
ad
.p
Contr
Guard Sync ol Information CRC
Bits Bits Bits
w
www.padeepz.net
www.padeepz.net
t
Code Division Multiple Access (CDMA)
ne
• In CDMA, the narrowband message signal is multiplied by a very large bandwidth
signal called spreading signal (code) before modulation and transmission over the
.
air. This is called spreading.
pz
• CDMA is also called DSSS (Direct Sequence Spread Spectrum). DSSS is a more
general term.
ee
• Message consists of symbols
ad
– Has symbol period and hence, symbol rate
.p
w
www.padeepz.net
www.padeepz.net
Code Division Multiple Access (CDMA)
t
ne
• Spreading signal (code) consists of chips
– Has Chip period and and hence, chip rate
.
– Spreading signal use a pseudo-noise (PN) sequence (a pseudo-random
pz
sequence)
– PN sequence is called a codeword
– Each user has its own cordword
ee
– Codewords are orthogonal. (low autocorrelation)
– Chip rate is oder of magnitude larger than the symbol rate.
• The receiver correlator distinguishes the senders signal by examining the
• ad
wideband signal with the same time-synchronized spreading code
The sent signal is recovered by despreading process at the receiver.
.p
w
w
w
www.padeepz.net
www.padeepz.net
CDMA Advantages
t
• Low power spectral density.
ne
– Signal is spread over a larger frequency band
– Other systems suffer less from the transmitter
• Interference limited operation
.
– All frequency spectrum is used
pz
• Privacy
– The codeword is known only between the sender and receiver. Hence other users
can not decode the messages that are in transit
ee
• Reduction of multipath affects by using a larger spectrum
ad
.p
w
w
w
www.padeepz.net
www.padeepz.net
CDMA Advantages
t
ne
• Random access possible
– Users can start their transmission at any time
.
• Cell capacity is not concerete fixed like in TDMA or FDMA systems. Has
pz
soft capacity
• Higher capacity than TDMA and FDMA
• No frequency management
ee
• No equalizers needed
• No guard time needed
• Enables soft handoff
ad
.p
w
w
w
www.padeepz.net