0% found this document useful (0 votes)
105 views111 pages

Communication Engineering-Ec8395 Unit I Analog Communication

1. Analog communication involves modulating a carrier signal to transmit an analog information signal over a channel. Modulation involves changing characteristics like amplitude, frequency, or phase of the carrier signal. 2. In amplitude modulation (AM), the amplitude of a high frequency carrier signal is varied in proportion to the instantaneous amplitude of a lower frequency information signal. 3. The AM signal has components at the carrier frequency and sidebands located above and below the carrier frequency by the information signal frequency. The bandwidth of an AM signal is equal to two times the highest modulating frequency.

Uploaded by

subha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
105 views111 pages

Communication Engineering-Ec8395 Unit I Analog Communication

1. Analog communication involves modulating a carrier signal to transmit an analog information signal over a channel. Modulation involves changing characteristics like amplitude, frequency, or phase of the carrier signal. 2. In amplitude modulation (AM), the amplitude of a high frequency carrier signal is varied in proportion to the instantaneous amplitude of a lower frequency information signal. 3. The AM signal has components at the carrier frequency and sidebands located above and below the carrier frequency by the information signal frequency. The bandwidth of an AM signal is equal to two times the highest modulating frequency.

Uploaded by

subha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 111

www.padeepz.

net
COMMUNICATION ENGINEERING-EC8395

UNIT I

ANALOG COMMUNICATION
Communication is the process of conveying or transferring of information from one point to another
point. Information can be image, text or any other data. Communication between any two points or places

t
requires a medium in between them. This medium can be wired or wireless medium. The information that needs

ne
to be transmitted may not be in a form that is suitable for all medium. It needs to be processed. This processing
of raw information to convert it into a form that is suitable for a medium is called as modulation.

TYPES OF COMMUNICATION

.
pz
Communication can be of two types- Analog & Digital

In Analog communication the transmit information is continuous in nature, whereas in digital communication
it is discrete in nature.

Source
ee Transmitter Transmission Receiver Destination
Channel
ad
Basic block diagram for communication System

Information from the source should be modulated before transmission to enable proper transmission of
information from transmitter to receiver. The process of modifying or changing any characteristics of any
signal is called modulation. Any signal has three characteristic they are
.p

1. Amplitude
2. Frequency
3. Phase
MODULATION:
w

The process of changing any one of the characteristics of carrier signal with respect to information signal is
known as modulation.
w
w

www.padeepz.net
www.padeepz.net
TYPES OF MODULATION

Modulation is classified into two types they are, Analog modulation and Digital modulation. In
analog modulation both information and carrier signal are analog in nature, whereas in digital information signal
is digital but carrier signal is analog.

Modulation

t
ne
Analog modulation Digital modulation

AM FM PM ASK FSK PSK QAM

.
AM (Amplitude modulation):

pz
It is the process of changing the amplitude of high frequency carrier signal in accordance with
low frequency information signal. Here frequency and phase angle of carrier remains unchanged.

FM (Frequency modulation):
ee
It is the process of changing the frequency of carrier signal accordance with amplitude of
information signal.

PM (Phase modulation):
ad
It is the process of changing the phase of carrier signal accordance with amplitude of information
signal..

NEED FOR MODULATION


.p

Reduce height of antenna


 Transmit signal over a long distance
 Avoid noise and interference
 Multiplexing
w

 Improve the signal to noise ratio

AMPLITUDE MODULATION
w

It is the process of changing the amplitude of a relatively high frequency carrier signal in proportion
with the instantaneous value of the modulating signal. AM is used for commercial broadcasting of audio and
video signals.
w

Applications of AM: 1. Two-way mobile radio, Audio and video broadcast

AM VOLTAGE DISTRIBUTION

www.padeepz.net
www.padeepz.net
The modulating signal is represented as, em(t) = Em sinωmt

The carrier signal is represented as, ec (t) = Ec sinωct

According to the definition, the amplitude of the carrier signal is changed after modulation.

EAM = Ec + em(t) = Ec+ Em sinωmt ------------- (1)

= Ec [1+ (Em/Ec) sinωmt ] ------------- (2)

t
ne
EAM = Ec(1+ ma sin ωmt ) -------------- (3)

Depth of Modulation/Modulation Index:


Coefficient of modulation and percent modulation:
If is defined as the ratio of maximum amplitude of the message signal to the maximum amplitude of the

.
carrier signal.

pz
Em
ma = –––––
Ec
Percent modulation is indicated as M
ee Em
M = ––––– x 100 or M = ma x 100
Ec
Relationship between m, Em & Ec
ad
From the figure.
.p
w
w

Em = ½ (Emax - Emin)
w

EC = ½ (Emax + Emin)

½ (Emax - Emin) Emax - Emin


M = –––––––––––––– x 100 = –––––––––– x 100
½ (Emax + Emin) Emax + Emin

www.padeepz.net
www.padeepz.net
Where ma= Em/Ec Where ma is the modulation index (or) depth of modulation. The value Em must be
less than value of Ec to avoid distortion in the modulated signal. Hence maximum value of ma will be
equal to 1. When ma is expressed in percentage it is called percentage modulation.

But the instantaneous amplitude of modulated signal, i.e at any time

eAM(t)= EAM sinωct ------------- (4)

t
Substitute equation (3) in (4)

ne
eAM(t) = Ec (1 + ma sinωmt)sinωct

= Ec sinωct + ma Ec sinωmt sinωct

(1) (2)

.
Expand the second term (sinωmt sinωct) according to ( SinASinB) formula, we get

pz
𝒎𝒂𝑬𝒄 𝒎𝒂𝑬𝒄
𝒆𝑨𝑴 (𝒕) = 𝑬𝒄 𝒔𝒊𝒏𝝎𝒄 𝒕 + 𝒄𝒐𝒔(𝝎𝒄 − 𝝎𝒎 )𝒕 − 𝒄𝒐𝒔(𝝎𝒄 + 𝝎𝒎 )𝒕 ------------------ (5)
𝟐 𝟐

= Carrier + USB + LSB


ee
Frequency spectrum and Bandwidth of AM Wave

EAM(t)
Ec
ad
LSB USB
.p

ω
0
BW=2 fm

 The figure shows the frequency spectrum of Am.


w

 It extends from fc -fm (max) to fc + fm (max).


 The band of frequencies b/w f c and fc - fm (max) is called lower side band [LSB] and any frequency
w

within this band is called lower side frequency [LSF].


 The band of frequencies b/w f c and fc + fm (max) is called upper side band [USB] and any frequency
within this and is called upper side frequency [USF]
w

Bandwidth of AM.
The Bandwidth of Am wave is equal to the difference b/w the highest upper side frequency and
lowest lower side frequency.
B = fc + fm (max) – [fc - fm (max)]

www.padeepz.net
www.padeepz.net
= fc + fm (max) - fc + fm (max)

BW = 2fm (max)

AM Waveform

t
a) Message signal

ne
b) Carrier signal

c) Amplitude modulated signal.

.
pz
ee
The shape of modulated waveform is known as AM envelope.

Phasor representation of AM
ad

Carrier
A
Ec
.p

VAM(t)
0
w

 Based on the modulation index modulation can be either,


(i). Critical Modulation
w

(ii). Over Modulation


(iii). Under Modulation
 When Em = Ec modulation goes to 100% this situation is known as critical modulation.
w

www.padeepz.net
www.padeepz.net

 Em < Ec leads to under modulation.

t
. ne
 Em > Ec leads to over modulation.

pz
ee
AM POWER DISTRIBUTION
ad
 The modulated wave contains three terms such as carrier wave, LSB, USB.
 The modulated wave contains more power than the unmodulated carrier.
Total Power in modulated wave will be,
Pt = PC + PUSB + PLSB
i.e. total power Pt of AM wave is the sum of carrier power and side band power.
.p

PC - Carrier power, PUSB - Upper Side Band power, PLSB - Lower Side Band power

The carrier power is


w

Ec2 (Ec / √2 )2 Ec2


Pc = ––––––– = –––––– =
R R 2R
w

The lower and upper sideband powers are same which is given by

(ma Ec/ 2√2)2 m2a Ec2


PUSB = PLSB = ––––––– = ––––––
w

R 8R
In terms of carrier power

(ma Ec/ 2√2)2 m2a Ec2 m2a Pc


PUSB = PLSB = ––––––– = –––––– =
R 8R 4

www.padeepz.net
www.padeepz.net
Pt = Pc + PUSB + PLSB

ma 2 Pc ma 2Pc
Pt = Pc + ––––––– + ––––––
4 4
2
ma
Pt = Pc 1 + ––––
2

t
ne
AM CURENT DISTRIBUTION

The equation of Pt given by

.
Pt
–––– =

pz
Pc

Pt = It2 R
ee Pc = Ic2 R

ma 2
It2 = Ic2 1 + ––––
2
ad
ma 2
It= Ic 1 + ––––
2
.p

Where It = Total(or)modulated current, IC = Carrier current

Efficiency:

% η = Power in side band * 100


w

Total Power

= PLSB+PLSB * 100
w

PTotal

ma2
= * 100
w

2+ma 2

If ma = 1 , Then %η = 33.33 %

In this only one third of total power is carried by the sidebands and the rest two third is wasted.

Modulation by a complex information signal:

www.padeepz.net
www.padeepz.net
 If the modulating signal contains two frequencies say fm1 & fm2, the modulated wave will contain the
carrier and two sets of side frequencies. Spaced symmetrically about the carrier.

Vam (t) = sin 2 fct + ½ sin 2 (fc - fm1) t - ½sin 2 (fc+ fm1) t
+ ½sin 2 (fc- fm2) t - ½sin 2 (fc+ fm2) t

 The coefficient of modulation or modulation index is given by


mt = √m12 + m22

t
 In general for n different signals mt = √m12 + m22 + . . . mn2

ne
 Pusbt = Plsst = Pcmt2 / 4

Pt = Pc (1+mt2 / 2)
Advantages, Disadvantages and Applications of AM (DSBFC)

.
Advantages

pz
1. Simple and inexpensive receivers. Easy to detect with simple equipment even if the signal is not very
strong
2. Narrow bandwidth than FM
3. Wider coverage
4. Well-established, mature art used for broadcasting almost exclusively

Disadvantages
ee
1. Received signal affected by electrical storms and other radio frequency interference
2. Receivers able to reproduce frequencies up to 5 MHz or less
3. Inefficient use of transmitter power
ad
Applications
1. Low quality form of modulation that is used for commercial broadcast of both audio and video signals
2. Two way mobile radio communications such as citizen band (CB) radio
3. Aircraft communication in the VHF frequency range
.p

TYPES OF AM MODULATION

1. Double sideband with full carrier


w
w

2. Double side without carrier


w

3.Single sideband with carrier

4. Single sideband without carrier

www.padeepz.net
www.padeepz.net

5. Vestigial sideband

Advantages, Disadvantages and Applications of AM (DSBFC)

t
Advantages

ne
1. Simple and inexpensive receivers. Easy to detect with simple equipment even if the signal is not
very strong.
2. Narrow bandwidth than FM
3. Wider coverage
4. Well-established, mature art used for broadcasting almost exclusively

.
Disadvantages

pz
1. Received signal affected by electrical storms and other radio frequency interference
2. Receivers able to reproduce frequencies up to 5 MHz or less
3. Inefficient use of transmitter power

Applications ee
1. Low quality form of modulation that is used for commercial broadcast of both audio and video
signals
2. Two way mobile radio communications such as citizen band (CB) radio
3. Aircraft communication in the VHF frequency range
ad
AM modulating Circuits
 Based on the location in the transmitter AM modulating circuits are classified as
a. Low level AM modulator
b. High level AM modulator

Difference b/w low level and High level AM mod.


.p

Low level AM modulator High level AM modulator

Modulation takes place prior to the final stage Modulation takes place in the final element of
w

of the transmitter final stage.

Less modulating signal power is required More modulating signal power is required.
w

GENERATION OF AM-DSBFC (AM MODULATORS)

The generation method of AM waves are broadly divided in to two types


w

 Linear modulator(or)large signal modulator(or)high level modulation


 Non Linear modulator(or)small signal modulator(or)low level modulation
LINEAR MODULATOR:
In this type of modulators the devices are operated in linear region of its transfer characteristics. Linear
modulators are also divided in to two types,
 Transistor modulator
 Switching modulator.

www.padeepz.net
www.padeepz.net
NON LINEAR MODULATORS:
These modulators are operated in nonlinear region.These are used in low level modulation.
The types of non linear modulators are,
Square law modulator,
Product modulator,
Balanced modulator.
LOW LEVEL AM MODULATOR

t
Class A amplifier can perform amplitude modulation.
 Amplifier must have 2 inputs one for the carrier signal & second for modulating signal.

ne
 With no modulating signal present, the circuit operates as a linear class A amplifier, and the output is
simply the carrier amplified by the quiescent voltage gain .
 The carrier is applied the base and the modulating signal to the emitter. Hence it is also called as Emitter
Modulation.
 The modulating signal varies the gain of the amplifier at a sinusoidal rate equal to the frequency of the

.
modulating signal.

pz
The depth of modulation achieved is proportional to the amplitude of the modulating signal.

ee
ad
.p
w

 The voltage gain for an emitter modulator is expressed as,


w

Av = Aq (1 + m sin 2fmt)
Av  Amplifier voltage gain with modulation.
Aq  Amplifier quiescent (without modulation) voltage gain.
sin 2fmt varies from + 1 to -1
w

Hence, Av = Aq (1m)
Av max = 2Aq, when m = +0
Av min = 0, when m = -1
 The modulating signal drives the circuit into both saturation and cutoff, thus producing the nonlinear
amplification necessary for modulation to occur. The collector waveform includes the carrier and the upper

www.padeepz.net
www.padeepz.net
and lower side frequencies as well as a component at the modulating signal frequency from the waveform,
thus producing a symmetrical AM envelop at Vout.

Advantages of Low level modulation:


1. Less modulating signal power is required to obtain high percentage modulation.
2. Modulating circuit is designed for low power.

Disadvantage of Low level modulation

t
Amplifiers following modulator stage must be linear. At high operating powers linear amplifiers are very
inefficient.

ne
HIGH POWER AM MODULATOR / MEDIUM POWER AM MODULATOR

 The class C amplifier is used. It operates nonlinear and is capable of nonlinear mixing (modulation).
 This is known as collector modulator because modulating signal is applied to the collector.

.
 When the amplitude of the carrier exceeds the barrier potential (0.7V) Q1 turns on collector current

pz
flows.

ee
ad
.p

When carrier voltage drops below 0.7V Q1 turns off and collector current cases.
The corresponding current and voltage waveforms are shown.
When the modulating signal is applied it adds up with the Ecc and gets submitted from Ecc
producing an Am o/p.
w

Advantages of high level modulators:


 There is no constraint of linear operation on amplifiers preceding modulator stage.
 Power efficiency is good
w

Disadvantages of high level modulators:


 High modulating power is required.
 Final modulating signal amplifier has to supply all the sideband power.
w

AM TRANSMITTERS

Low Level AM Transmitter


 The block diagram of a typical AM transmitter is shown in which carrier source is a crystal oscillator.
The crystal oscillator is stabilized in order to maintain the carrier frequency deviation within a prescribed
limit.

www.padeepz.net
www.padeepz.net
 The crystal oscillator is followed by a tuned buffer amplifier (class B) and drive amplifier.

t
ne
Low level AM Transmitter

 The modulator circuit used is generally a class C power amplifier that is a collector modulator.
 The audio signal is amplified by a chain of low level audio amplifiers and a power amplifier. This

.
amplifier is controlling the power being delivered to the final RF amplifier. Class B push pull amplifier

pz
is usually used for this purpose.
 The amplified modulating signal is applied to the modulator along with the carrier. AM wave is got at
the output of the modulator.
 This AM signal is then amplified using a chain of linear amplifiers to raise its power level. Class B
amplifiers are used for this purpose. The linear power amplifier is used to avoid the distortion in the AM
ee
wave.
 The amplitude modulated signal is then transmitted using transmitting antenna. The matching network
matches the output impedance of the final amplifier to the transmission line and antenna.

Application of Low Level AM Transmitter: It is used in low capacity system such as wireless intercoms,
ad
Remote control units, pagers, shot range talkie.

High Level AM Transmitter


.p
w
w

High level AM Transmitter

 Here modulating signal power should be higher than the low level.
w

 The amplification takes place prior to modulation.

Application of High Level Transmitter: Used for long distance communications.

SQUARE LAW MODULATOR

www.padeepz.net
www.padeepz.net
 The non linear portion of V-I characteristics of diode is used as a element for non-linear modulators.
 This is suited at low voltage levels because of the fact that current-voltage characteristics of a diode is
highly nonlinear particularly in the low voltage region as shown in figure.
Diode current

t
ne
Diode Voltage

 A square law modulator has three features shown in figure.


 Summer - To sum carrier and modulating signal

.
 A non linear element

pz
Band pass filter for extracting desired modulating products.

ee
ad
Modulated
Modulating
Summer Non linear Signal
Signal Filter
device
.p

Carrier
w

Signal

Principle of operation:
w

 From the figure the non linear device diode is used to produce low level amplitude modulation.
 Here the carrier and modulating signals are applied across the diode.
 A dc battery Ecc is connected across the diode to get a fixed operating point on the V-I characteristics
w

of the diode.
 This amplitude modulation that is low level can be explained by considering the fact when two
different frequencies are passed through the non linear device.
 So when we apply carrier and modulating frequencies different frequency terms appear at the output of
diode.
 These different frequency terms are applied across the tuned circuit which is tuned to carrier frequency
and has a narrow bandwidth just to pass two sidebands along with the carrier and reject other
frequencies.

www.padeepz.net
www.padeepz.net
 So the output of the tuned circuit will be carrier and two sidebands that is amplitude modulated wave
is produced.

Mathematical analysis:
Let the modulating voltage will be
em(t)= Em sinωm t ------------------- (1)

Let the carrier voltage will be

t
ec(t)= Ec sinωc t ------------------- (2)

ne
So the input voltage applied to the diode will be
e1(t) = em+ec
= Em sinωm t+ Ec sinωc t --------------------------- (3)

We know that the current and voltage relationship of a linear circuit is,

.
i=av

pz
where i=current through linear device
v=voltage through the linear device
a=proportionality constant

 The current and voltage relationship of a nonlinear circuit may be expressed as,
ee i=a V1+b V12+c V13+ - - - - - - - - - -
 This means that due to non-linearity in the V-I characteristics of a non-linear circuits, the current
becomes proportional not only to voltage but also to the square, cube and higher powers of voltage. So
i= a1V1+a2 V12+a3 V13+ ---------------------- (4)
Where a1, a2, a3 are proportionality constants and V1 is the input voltage applied to the diode or FET.
 Sub eqn (3) in (4)then
ad
i= a1(Em sinωm t+ Ec sinωc t)+ a2(Em sinωm t+ Ec sinωc t)2+------------
= a1 Em sinωm t+ a1 Ec sinωc t+ a2 Em2 sinωm2 t+ a2 Ec2 sinωc2 t+
2a2EmEc sinωm tsinωc t+---
Neglecting second and higher order terms, we get
.p

i(t)= a1 Em sinωm t+ a1 Ec sinωc t +a2EmEc sinωm t sinωc t+---

= a1 Em sinωm t+ a1 Ec sinωc t +a2EmEc [cos(ωc-ωm)t - cos(ωc+ωm)t]

 The tuned circuit is tuned to the carrier frequency and it allows only ω c, ωc+ωm, ωc-ωm terms and
w

eliminates all other terms.hence we obtain

i(t)= a1 Ec sinωc t +a2EmEc [cos(ωc-ωm)t - cos(ωc+ωm)t]


w

i(t)= a1 Ec sinωc t +a2EmEc cos(ωc-ωm)t - a2EmEc cos(ωc+ωm)t -------(5)

(carrier) (LSB) (USB)


w

 The
main drawback of using diode modulator is it does not provide amplification and a single diode is
unable to balance out the frequency completely. These limitations can be eliminated by using
amplifying devices like transistor, FET in a balanced mode.

 We can also use the square law modulator with FET instead of diode.

www.padeepz.net
www.padeepz.net
 From the final equation we know that it consists only the carrier and USB and LSB frequency
components and all the components are removed.

BALANCE MODULATOR METHOD

It is assumed that the two transistors are identical and the circuit is symmetrical. The operation is confined
in the nonlinear region of the active devices employed in this circuit. The carrier voltage across the upper
and lower part of the secondary windings of the center tap transformers are equal in magnitude and opposite

t
in phase.

. ne
pz
ee BALANCED MODULATOR

 In this the carrier voltage across the two windings of a centre tap transformers are equal and
opposite in phase Vbe= -Vbe’
 Input voltage to the transistor T1 is given by,
Vbe =ec(t)+ em(t)
ad
Vbe= Ec sinωc t +Em sinωm t --------- (1)

 Similarly Input voltage to the transistor T2,


V’be = -ec(t)+ em(t)
.p

V’be = - Ec sinωc t +Em sinωm t --------- (2)

By using the non-linearity property the collector current can be written as per square law equation

ic = a1 Vbe + a2 Vbe2 + …….


w

-----------(3)

ic’ = a1 V’be + a2 V’be2 +……. ---------(4)


w

On substituting eqn 1 and 2 in 3 and 4 we get,

ic = a1 [Ec sinωc t +Em sinωm t]+ a2 [Ec sinωc t +Em sinωm t]2
w

ic= a1 [Ec sinωc t +Em sinωm t]+ a2E2c sin2ωc t+a2E2m sin2ωm t+2a2Em Ec sinωm tsinωc t ---(5)

i’c = a1 [-Ec sinωc t +Em sinωm t]+ a2 [-Ec sinωc t +Em sinωm t]2

i’c = a1 [-Ec sinωc t +Em sinωm t]+ a2E c 2 sin2ωc t+a2Em2 sin2ωm t-2a2Em Ec sinωm tsinωc t---(6)

The output AM Voltage V0 is given by V0 = K [ ic – ic’ ] ---------------(7)

www.padeepz.net
www.padeepz.net
since ic, i’c flows in the opposite direction and ‘K’ is a constant depending on impedance or other circuit
parameters.

On substituting equation 5 and 6 in 7 we get,

Vo = K [ ic – ic’ ]

Eo = K [2 a1 Ec Sinωct + 4a2 Em Ec Sinωmt Sinωct]

t
= 2KEc a1 Sinωct 1 + 2 a2 EmSinωmt

ne
a1

= 2KEc a1 Sinωct 1 + ma Sinωmt

where ma = 2 a2 Em is the modulation index

.
a1
This equation represents the output modulated voltage which contains carrier and side band

pz
terms but no modulating terms. Thus this circuit is used as AM modulator. The advantage of this circuit is that
the undesired harmonics are automatically balanced out and hence there is no need for separate filter.

DEMODULATION/DETECTION OF AM-DSBFC (AM DEMODULATORS)


ee
 Demodulation or detection is nothing but the process of extracting a modulating or information signal
from modulated signal. Otherwise in other words, demodulation or detection is the process by which
the message is recovered from the modulated signal at receiver.
 The devices used for demodulation or detection are called as demodulators or detector
ad
 For amplitude modulation, the detectors or demodulators are categorized are
Square law detectors or nonlinear detectors
Linear detectors
 The low level modulated signals are using non linear detectors to recover the original message signal

SQUARE LAW DETECTOR


.p

 The square law detector circuit is used for detecting low level modulated signal.
 Here the diode is used in V – I characteristics of the device i.e. non linear characteristics of the diode.
 The square law detector is similar to the square law modulator. The only difference lies in the filter
w

circuit.
 In square law modulator we are using band pass filters, in square law detector; a low pass filter is used.
The operation is limited to the non-linear region of the diode characteristics, so the lower half portion
w

of the modulated waveform is compressed.


 This produces the envelope distortion, so the average value of the diode – current is no longer constant
and varies with time. The average diode current consists of steady DC component and time varying
modulation frequency. Due to nonlinear region the lower half of its current wave form is compressed.
w

This may cause envelope distortion due to this diode current will not be constant, and varies with time.
I

Non linear Linear


region region

www.padeepz.net
www.padeepz.net

t
ne
SQUARE LAW DETECTOR

.
pz
The distorted output diode current is expressed by the non-linear V-I relationship (i.e. square law) is,
i0=a1 eAM + a2 eAM 2 ------------------------------(1)
where eAM =i/p modulated signal.
 The equation of AM wave is
ee eAM = Ec (1 + ma sinωmt) sinωct -----------------------------(2)

On substituting equation 2 in 1 we get

i0 = a1 Ec (1 + ma sinωmt) sinωct]+a2[Ec (1 + ma sinωmt) sinωct ]2


ad
i 0 = a1 Ec sinωct + a1 ma Ec sinωct sinωmt + a2 Ec2 sin2ωct (1 + ma sinωmt)2

= a1 Ec sinωct + a1 ma Ec sinωct sinωmt + a2 Ec2 sin2ωct(1 + ma2 sin2 ωmt + 2 masinωmt )

= a1 Ec sinωct + a1 ma Ec sinωct sinωmt + a2 Ec2 (1 + ma2 sin2 ωmt + 2 masinωmt ) 1-cos2ωct


.p

2
= a1 Ec sinωct + a1 ma Ec sinωct sinωmt + a2 Ec2 - a2 Ec2 cos2ωct + a2 Ec2 ma2 sin2 ωmt +
2 2 2
- a2 Ec2 ma2 sin2 ωmt cos2ωct + a2 Ec2 masinωmt - a2 Ec2 masinωmt cos2ωct
w

2
The carrier term is filtered by using a low pass filter and high frequency term are also reduced then,
i0= a2 Ec2 masinωmt
w

So the final output contains a signal with modulating frequency. Hence original signal is recovered.

ENVELOPE DETECTOR
w

 A detector circuit whose output follows the envelope of the modulated signal which is used to
reproduce the modulating or message signal is called as “Envelope Detector”.
 This is most popular commercial receiver circuits since it is very simple and not expensive, and also it
gives satisfactory performance.An envelope detector of the series type is shown in Figure which
consists of a diode and a resistor capacitor filter a time constant network.

www.padeepz.net
www.padeepz.net

t
. ne
Principle Of Operation:

pz
 Modulated signal is applied to the series combination of diode and the load impedance consisting of a
resistor R and C.
 Operation takes place over the linear region of VI characteristics of Diode.
 For positive cycle of carrier signal the diode D conducts thereby the capacitor charges to the peak
voltage with the time constant τ =R C of the carrier signal through the resistor R.
ee
 As the input falls below the peak value, the diode reaches cut-ff. The diode acts as open switch and
hence the capacitor gets discharge path through R.
 During negative half cycle the diode is reverse biased and the carrier voltage is disconnected from the
RC circuit. So the capacitor discharges continuously until next positive cycle appears.
 From the peak of one positive cycle to the next the capacitor discharges slowly and this process
ad
continues.Thus the voltage across ‘C’ is same as the envelope of the modulated carrier but spikes are
introduced. So the output voltage across capacitor is a spiky modulating or base band signal. So the
envelope is detected at the output of capacitor. Thus from the average value the original signal is
recovered by extracting the envelope.
 The spikes can be reduced to a negligible amount by keeping the time constant RC large so that the
.p

capacitor C discharges negligible amount.

CHOICE OF TIME CONSTANT RC

 Large (or) small value of time constant makes problem. So time constant is important consideration.
w

 If time constant RC is quite low: Discharge curve during non conductive period is almost
vertical, so fluctuations may occur in output voltage. This results in Diagonal clipping
 If RC is very large: Discharge curve is almost horizontal, so several peaks will be missed in the
w

rectified output voltage. This results in negative peak clipping.


Distortion in diode detector:
There are two clippings i.e. distortions available
Negative peak clipping
w

Diagonal clipping.
Diagonal clipping:

It results when time constant of detector is not selected properly. If the modulating
voltage is faster than the rate of voltage fall across RC combination resulting in distorted output. This
type of distortion is called diagonal clipping which results in distorted output.

www.padeepz.net
www.padeepz.net

t
ne
 To avoid the diagonal clipping proper value of RC needs to be selected. The voltage across RC
combination during the non-conducting period of diode is Vc at an instant t which is given by
t

VC t   V0 e RC

.
The rate of slope in capacitor due to period discharging is calculated by differentiating V C(t) So

pz
t

dVC t  dVC  V0 e RC  VC t 
   ...................(1)
dt dt RC RC
The decrease in capacitor voltage must follow the modulation envelope if distortion is to be avoided.
The envelope of the modulated voltage is given by
ee e AM  EC 1 ma cos m t 
The slope of the envelope is given by
 EC 1 ma cos m t 
de AM d
dt dt
 ma EC  m sin  m t --------------------------(2)
ad
To avoid the clipping the slope of capacitor voltage VC should be algebraically equal or less than the
slope of envelope voltage, so
V t 
 C   EC ma m sin m t
RC
VC t 
 EC ma m sin  m t
.p

RC
EC 1  ma cos m t 
 EC mam sin m t
RC
Mathematically the above equation is written as
w

1 ma  m sin  m t

RC 1  ma cos m t  ------------------------(3)
w

To find the maximum amount of RC differentiate the equation 3 and equate it to zero
d ma  m sin  m t
0
dt 1  ma cos m t 
w

1  ma cos m t  cos m t m  sin  m t ( ma ( sin  m t ) m


ma  m 0
1  ma cos m t 

ωm cos ωm t + (ma cos2ωmt)ωm + (ma sin2 ωmt)ωm =0

www.padeepz.net
www.padeepz.net
ωm cos ωm t + ma ωm (cos2ωmt+ sin2ωmt)=0

ωm cos ωm t + ma ωm =0

cos ωm t = - ma ------------------------(4)

on substituting the value of cosωm t in cos2ωmt+ sin2ωmt =1 we get sinωmt = √1-ma2 -----(5)

t
1 m  1 - ma2
 a m

ne
substituting equation 4 and 5 in 3 we get RC 1  ma2

1  ma2
By simplifying RC 
ma  m

.
pz
So RC depends on the ma value. So the RC to be selected by satisfying the condition in order to avoid
distortion and the modulation index value should be correct, if it is large then it will provide negative
peak clipping. So the envelope detector will be changed for smooth functioning by attaching a 
section low pass filter at the output.

Negative peak clipping:


ee
 The 2nd source of distortion in linear diode detector is the curvatures of the diode characteristics. So as
a result the efficiency varies. It will be reduced by selecting load resistance value large. So when RC is
large then ma will be low and signal becomes clipped at the negative peaks.
 The negative peak clipping provides ac and dc load impedances unequal.
ad

DOUBLE SIDEBAND SUPPRESSED CARRIER (DSBSC) MODULATION

In AM with carrier scheme, there is wastage in both transmitted power and bandwidth. In order to save
.p

the power in amplitude modulation the carrier is suppressed because it does not contain any useful information.
This scheme is called as the double side band suppressed carrier amplitude Modulation (DSB-SC). It contains
LSB and USB terms, resulting in a transmission bandwidth that is twice the bandwidth of the message signal.
w

Let us consider the message and carrier signal as,


em(t) = Em sin ωmt ------------(1)
ec(t) = Ec sin ωct -------------(2)
w

For obtaining the DSB-SC wave multiply both carrier signal and message signal hence,
e(t)DSB-SC = em(t).ec(t)
=Em.Ec sinωm t sinωc t
w

e(t)DSB-SC=Em.Ec [ cos(ωc - ωm )t - cos(ωc + ωm )t]


2
USB LSB
From this equation we know that the carrier is suppressed in double side band suppressed carrier.

Graphical Representation of DSB-SC AM:

www.padeepz.net
www.padeepz.net

t
. ne
pz
(a) Baseband signal (b) DSBSC

Frequency spectrum of DSB-SC AM


ee
ad
.p

It shows that carrier term ωc is suppressed. It contains only two sideband terms having frequency (ωc - ωm)
and (ωc + ωm). Hence this scheme is called as DSB-SC AM.

Phasor representation of DSB-SC AM:


w
w

Carrier
A
Vc
VSSB
0
w

POWER CALCULATION:

www.padeepz.net
www.padeepz.net
The total power transmitted in AM is
Pt =Pcarrier +PLSB +PUSB

If the carrier is suppressed , then the total power transmitted is


Pt’ = PLSB +PUSB

We know that, PLSB = PUSB = ma 2 Ec2


8R

t
Pt’ = ma 2 Ec2 + ma 2 Ec2

ne
8R 8R

= ma 2 Ec2 = ma 2 Pc
4R 2

.
Therefore the power saving with respect to AM is

pz
Power Saving = Pt - Pt’ x 100
Pt

= [ 1+ ma 2 / 2] PC - [ma 2 / 2] PC

=
ee PC
[1+ ma 2 / 2] PC

[1+ ma 2 / 2] PC
ad
% Power Saving = 2 x 100
2+ ma 2

If ma = 1, then power saving (2/3) x 100 = 66.7 %


.p

i.e 66.7% of power is saved by using DSB-SC-AM.

Advantages
DSB-SC is more efficient in transmitted power as compared to DSB-FC.
w

DSB-FC hs better signal to noise ratio as compared to SSB transmission.


Disadvantages
Bandwidth remains same as DSB-FC even though the carrier is suppressed.
w

GENERATION OF AM-DSBSC
w

1. Balanced Modulator Method


2. Ring Modulator Method

BALANCE MODULATOR METHOD

www.padeepz.net
www.padeepz.net
 The same circuit can be used to generate AM with carrier. The main difference between AM with
carrier generation and DSB-SC –AM is the feeding points of the carrier and modulating signals are
interchanged.
 The transistor is operated in a balanced mode thus heavy filtering is not required to remove the
unwanted harmonics.
 It is assumed that the two transistors are identical and the circuit is symmetrical. The operation is
confined in the nonlinear region of the active devices employed in this circuit. The carrier voltages
across the upper and lower part of the secondary windings of the center tap transformers are equal in

t
magnitude and opposite in phase.

. ne
pz
ee BALANCED MODULATOR
Principle of operation:
 The modulating signal is applied as the input to the transistor T1 and T2 and the carrier signal is
applied to the common input of the push pull amplifier configuration. Because of centre tap
transformers are equal and opposite in phase V m= -Vm’
 Input to the transistor T1 is given by,
ad
Vbe = em(t)+ ec(t)
Vbe = Em sinωm t +Ec sinωc t --------------------------- (1)
 Similarly Input to the transistor T2,
V’be = - em(t)+ ec(t)
V’be = - Em sinωm t +Ec sinωc t ---------------------------- (2)
By using the non-linearity property the collector current can be written as per square law equation
.p

ic = a1 Vbe + a2 Vbe2 + ……. -----------------------------(3)


i’c = a1 V’be + a2 V’be2 +……. -----------------------------(4)

On substituting eqn 3 and 4 in 1 and 2 we get


w

ic = a1 [Em sinωm t +Ec sinωc t]+ a2 [Em sinωm t +Ec sinωc t]2

ic= a1 [Em sinωm t +Ec sinωc t]+ a2E2m sin2 ωm t+a2Ec sin2ωc t+2a2Em Ec sinωm tsinωc t-------(5)
w

Similarly
w

ic = a1 [-Em sinωm t +Ec sinωc t]+ a2 [-Em sinωm t +Ec sinωc t]2

ic= a1 [-Em sinωm t +Ec sinωc t]+ a2E2m sin2ωm t+a2E2c cos2ωc t - 2a2Em Ec sinωm tsinωc t------------(6)

The output AM voltage V0 is given by V0 = K[ ic – i’c ] ---------------(7)

www.padeepz.net
www.padeepz.net
Because ic, i’c flows in the opposite direction and ’K’is a constant depending on impedance or other circuit
parameters.

On substituting equation 5 and 6 in 7 we get,

Vo = K[ ic – i’c ]

Vo = K [2a1 Em sinωmt + 4a2 Em Ec sinωmt sinωct]

t
The output contains the original modulating signal and the two sidebands. The modulating signal has been

ne
suppressed by tuning the tank circuit to the center frequency ±ωc

Vo = 4Ka2 Em Ec sinωmt sinωct


= 2Ka2 Em Ec[ cos(ωc - ωm )t - cos(ωc + ωm )t]

 So only the side bands are present in the o/p. Hence the DSB-SC-AM generated.

.
 The main advantage of this modulator is saving power and efficiency because of the suppressing of

pz
the carrier.

RING MODULATOR METHOD

 The balanced Ring modulator circuit is widely used in carrier telephony suppresses both unwanted
ee
modulating and carrier signal in its output.
 Ring modulator is a type of product modulator which is used to generate DSB-SC Signal.
 The band pass filter is not used at the output hence the harmonic frequencies are automatically
controlled.
 In a ring modulator circuit four diode are connected in the form of ring in which all the four diodes
ad
are connected in the same manner and are controlled by a square wave carrier signal
ec (t).
 The carrier signal acts as a switching signal to alternate the polarity of the modulating signal at the
carrier frequency.
 When no modulating signal is present diode D1 and D2 or D3 and D4 will conduct depending upon
polarity of the carrier.
.p

POSITIVE HALF CYCLE OF CARRIER:

 Diodes D1 and D3 are forward biased. At this time D2 and D4 are reverse biased and act like open
w

circuits. The current divides equally in the upper and lower portion of the primary winding T2.
 The current in the upper part of the winding produces a magnetic field that is equal and opposite to the
magnetic field produced by the current in the lower half of the secondary.
 Therefore the magnetic fields cancel each other out and no output is induced in the secondary. Thus
w

the carrier is effectively suppressed.

NEGATIVE HALF CYCLE OF CARRIER:


w

 When the polarity of the carrier reverses. Diodes D1 and D2 are reverse biased and the diodes D3 and
D4 will conduct. Again the current flows in the secondary winding of T1 and the primary winding of
T2.
 The equal and opposite magnetic fields produced in T2 cancel each other and thus result in zero carrier
output. The carrier is effectively balanced out.

www.padeepz.net
www.padeepz.net
PRINCIPLE OF OPERATION

 When both the carrier and the modulating signals are present, during positive half cycle of the carrier
diodes D1 and D2 conduct, while diodes D3 and D4 does not conduct.
 During negative half cycle of the carrier voltage diodes D3 and D4 conduct and D1 and D2 does not
conduct.
 When polarity of the modulating signal changes the result is a 180 phase reversal. At the time
D3 and D4 are in forward bias.

t
Let us consider the modulating voltage,
em(t) = Em sinωmt -------------------(1)

ne
ec(t) = Ec sin ωct ------------------(2)
The output voltage is V0(t) = em(t).ec(t)
=Em.Ec sinωm tsinωc t
V0(t) =Em.Ec [ cos(ωc - ωm )t - cos(ωc + ωm )t] -----------------(3)
2

.
LSB USB

pz
The equation 3 shows that the o/p is free from the carrier and other higher order terms and it contains upper and
lower sidebands only. The ring modulator circuit is also known as double balanced modulator because it is
balanced with respect to both the baseband signal and the square wave carrier. The main advantage is the o/p is
stable and long life, no external source to activate the diodes.
Circuit diagram: Waveform:
ee
ad
.p
w
w

DEMODULATION/DETECTION OF AM-DSBSC
w

 SYNCHRONOUS OR COHERENT DETECTOR


 COSTAS PLL DETECTOR

SYNCHRONOUS OR COHERENT DETECTOR

www.padeepz.net
www.padeepz.net
 The coherent detector uses exact carrier synchronization for retrieving the message signal from
modulated signal. These types of detectors are mainly used for detecting DSB&SSB signals.
 It consists of a product modulator with a low pass filter.
 For detecting signal local oscillator at the receiver end is required. The frequency and phase of the
locally generated carrier and transmitter carrier must be synchronized that is exactly coherent.
 All types of linear modulation can be detected by using synchronous detector. It consists of a product
modulator with LPF.

t
ne
 The incoming signal is first multiplied with locally generated carrier and then passed through low pass
filter. The filter bandwidth is same as the message bandwidth ωm

.
 Tthe local oscillator should be exactly synchronized with carrier signal in both phase and velocity.

pz
 Considering the case of DSB-SC signal, the signal I/p is

e1(t)= Em.Ec sinωm t sinωc t


e2(t)=E sinωc t
The output of the non linear device which acts as a multiplying device is given by
ee e(t)= e1(t). e2(t)= Em.Ec E sinωm t sin2ωc t

e(t)= Em.Ec Esinωm t 1-cos2ωc t


2
After passing through the LPF the second order harmonic term is eliminated.
ad
e(t)= Em.Ec Esinωm t
2
Assume the local oscillator carrier to have a phase difference with the transmitted carrier. The carrier is
represented by
e2(t)=Esin( ωc t + φ )
.p

The output of the non linear device is given by


e(t)= e1(t). e2(t)= Em.Ec E sinωmt sinωc t sin ( ωc t + φ )
w

= Em.Ec E sinωmt sinωc t [ sinωctcosφ + cosωctsinφ ]

=Em.Ec E sinωmt sin2 ωc t cosφ + Em.Ec E sinωmt sin ωc t cos ωc t sinφ


w

=Em.Ec E sinωmt cosφ 1-cos2ωc t + Em.Ec E sinωmt sin ωc t cos ωc t sinφ


2
w

=Em.Ec E sinωmt cosφ - Em.EcE sinωmt cosφcos2ωct + Em.Ec E sinωmt sin ωc t cos ωc t sinφ
2 2

After passing through the LPF the second order harmonic term is eliminated.

e(t)= Em.Ec Esinωm t cosφ


2
If φ = 0 then e(t) is maximum e(t) = Em.Ec Esinωm t

www.padeepz.net
www.padeepz.net
2
If φ = 90 then e(t) is minimum e(t) = 0

The demodulated signal Vo(t) is therefore proportional to the message signal when the phase error, 𝜑 =
𝜋
0 and it is minimum (zero) when 𝜑 = ± 2 . Thus the phase error 𝜑 in the local oscillator causes the
detector output to be attenuated by a factor equal to 𝑐𝑜𝑠𝜑. As long as the phase error is constant, the
detector provides an undistorted version of the original baseband signal.

t
ne
COSTAS PLL DETECTOR
I-channel Output
Product LPF
modulator

DSB-SC VCO Phase

.
900 phase discriminator

pz
shifter

Product LPF
ee modulator Q-channel

 Costas receiver is one of the method for obtaining a practical synchronous receiver suitable for
demodulating DSB-SC waves. It consists of two coherent detectors supplied with the same input signal.
ad
 One detector is supplied with the DSB-SC AM and locally generated carrier which is in phase with the
transmitted carrier. This detector is known as “In-phase coherent detector or I channel”.
 The other detector is supplied with the DSB-SC AM and locally generated carrier which is quadrature
phase with the transmitted carrier. This detector is known as “Quadrature coherent detector or Q
channel”.
 These two detectors are coupled together to form a negative feedback system designed in such a way as
.p

to maintain the local oscillator synchronous with the carrier wave.

Operation of the circuit:


w

 In this case I channel output contains the desired demodulated signal where as Q channel output is zero
due to the quadrature null effect of Q channel.
 Suppose there is some phase shift φ radians between local oscillator carrier and the transmitting carrier
w

then I channel output will remain essentially unchanged. But Q channel output contains some signal
which is proportional to sin φ
 This Q channel output will have same polarity as the I channel output for one direction of local oscillator
whereas the polarity will be opposite to the I channel for the other direction of phase shift.
w

 Thus the I and Q channel outputs are combined in phase discriminator


 The phase discriminator provides a d.c. control signal which may be used to correct local oscillator
phase error.
 The local oscillator is a voltage controlled oscillator. Its frequency can be adjusted by an error control
d.c signal.
 The costas receiver ceases phase control when there is no modulation and that phase lock has to be re-
established with reappearance of modulation.

www.padeepz.net
www.padeepz.net
SINGLE SIDEBAND SUPPRESSED CARRIER

In AM with carrier both the transmitting power and bandwidth is wasted. Hence the DSB-SC AM
scheme has been introduced in which power is saved by suppressing the carrier component but the
bandwidth remains same.

 Increase in the saving of power is possible by eliminating one sideband in addition to the carrier
component because the USB and LSB are uniquely related by symmetry about the carrier frequency. So

t
either one sideband is enough for transmitting as well as recovering the useful message. The block
diagram of SSB-SC AM is shown in figure.

ne
 As for as transmission information is concerned only one side band is necessary. So if the carrier and
one of the two sidebands are suppressed at the transmitter, no information is lost.

 This type of modulation is called as single side band suppressed carrier-AM and the SSB system reduces

.
the band width by half.

pz
Block diagram of SSB-SC AM is shown in figure.

Ф = 90° e1 AM
ee
em(t) Ф = 90°

ad
ec(t) SSB-SC
AM
AM
e2
.p

The single side band suppressed carrier can be obtained as follows,


In order to suppress one of the sideband, the input signal fed to the modulator1 is 90° out of phase
with that of the signal fed to the modulator’2’.
Let e1(t) = Em cosωm t .Ec cos ωc t
w

e2 (t) = Em sinωmt .Ec sinωc t


Therefore, e(t) SSB = e1(t) + e2(t)
= Em Ec [cosωm t. cosωc t + sin ωmt. sinωct]
w

e(t)SSB = Em Ec cos (ωc - ωm) t.


We know that for DSB-SC AM
eDSB-SC (t) = Em Ec [cos(ωc +ωm )t + cos(ωc - ωm)t]
2
w

When comparing equations of e(t) SSB-SC and eDSB-SC (t) , one of the sideband is suppressed. Hence this scheme
is known as SSB-SC AM.

Frequency Spectrum Of SSB-SC-AM:

www.padeepz.net
www.padeepz.net

t
ne
 The Frequency spectrum shows that only one side band signal is present , the carrier and the other
sideband signal are suppressed. Thus the bandwidth required reduces from 2 ω m to ωm i.e., bandwidth
requirement is reduced to half compared to AM & DSB-SC signals.

Phasor representation of SSB-SC-AM:

.
pz
USB
Resultant
eC (t)

carrier
ee eAM(t)
LSB

Power calculation:

Power in sidebands Pt” = P LSB = P USB = ma2Vc2/8R = ma2 Pc / 4


ad
Power saving with respect to AM with carrier
Power saving = Pt - Pt”x100
Pt

where Pt = Total power transmitted.


.p

Power saving = [ 1+ ma 2 / 2] PC - [ma 2 / 4] PC = PC +[ma 2 / 2] PC - [ma 2 / 4] PC

[1+ ma 2 / 2] PC [1+ ma 2 / 2] PC
2
w

m
1 a
4  100
2
ma
1
w

2
4  ma
2

= 4  100
w

2  ma
2

2
4  ma
2

  100
4  2m a
2

If ma=1 then %power saving= (5/6) x100=83.3%


So we can save 83.3% of power with respect to AM with carrier.

www.padeepz.net
www.padeepz.net
We can also find the power in SSB-SC-AM with respect to AM with DSB-SC system,
p ' pt ' '
powersaving  t  100
pt '
2 2
ma Pc ma Pc

 2 4  100
2
ma Pc
2

t
If ma=1 then %power saving=50%.therefore 50%power is saved with respect to DSB-SC System.

ne
Applications of SSB
1. Used to save applications where such a power saving is warranted, i.e., in mobile system, in which
weight and power consumption must naturally be kept low.
2. Single sideband modulation is at a premium. Point-to-Point communication, land, air, maritime mobile
communication, TV, Telemetry, Military and Radio navigation are the greatest use of SSB in one form

.
or another.

pz
SSB Advantages
 Power conservation: Much less total transmitted power required to produce the same quality signal.
 Bandwidth conservation: Half of the bandwidth of conventional AM bandwidth.
 Selective Fading: Not present in SSBSC.
ee
 Noise Reduction: Since SSB uses half the bandwidth, the thermal noise power is reduced to half.
Hence immunity to selective fading is improved.

SSB Disadvantages
 Complex Receivers: Required carrier recovery and synchronization circuit adds cost, complexity and
ad
size.
 Tuning Difficulties: Complex and Expensive Tuning Circuits.

GENERATION OF SSB

1. Filter Method
.p

2. Phase Shift Method


3. Modified Phase Shift Method or Weaver Method
w

FILTER METHOD
w
w

In this method of SSB generation, after the BM, the unwanted sideband is removed (actually heavily
attenuated) by a filter and hence this name. The filter may be LC, ceramic or mechanical depending upon

www.padeepz.net
www.padeepz.net
the carrier frequency and other requirements. Such a filter must have a flat bandpass and extremely high
attenuation outside the passband.

In radio communication system, the frequency range used for voice is 300 Hz to about 2800 Hz in most
cases. If it is required to suppress the lower sideband and if the transmitting frequency is fc , then the lowest
frequency that this filter must pass without attenuation is fc+300 Hz whereas the highest frequency that
must be fully attenuated is fc-300 Hz. So we need a filter whose transition band is very low. This situation
becomes worse if lower modulating frequencies are employed, such as the 50 Hz minimum in AM

t
broadcasting. In order to obtain a filter response curve with skirts as steep the ‘Q’ of the tuned circuits must

ne
be very high.

The initial modulation takes place in the balanced modulator at a low frequency (such as 100 kHz)
because of the difficulty of making adequate filters at higher frequencies. The filter is a BPF with a sharp
cutoff frequency at either side of the bandpass to obtain satisfactory adjacent sideband rejection. The

.
filtered signal is up-converted in a mixer to the final transmitter frequency and then amplified before being

pz
coupled to the antenna. The integrated ceramic filters are used as sideband filters. The drawback of filter
method is that it requires sharp filtering, which requires filters with high Q. Primary modulation cannot be
done at the transmitting frequency which is another drawback of the filter method.
ee
PHASE SHIFT METHOD

 This method avoids the prime disadvantage of filtering method. That is requirement of a sideband
filter with a narrow transition band and it cannot be used for very low and very high frequencies.
 This method does not have any sideband filters and the primary modulation can be done at the
ad
transmitting frequency. The unwanted sideband can be removed by generating the components of
sideband out of phase.
 If the undesired sideband is LSB then the two LSB are generated such that they are 180 out of phase
with each other. So that USB add with each other and LSB cancel each other. When two undesired
sideband components are added they cancel each other with only the presence of desired signal.
.p

 Two balanced modulators and two phase shifters are used. One of the modulator BBM1 receives the
carrier voltage shifted by 900 and the modulating voltage, where as another balanced modulator BBM2
receives the modulating voltage shifted by 900 and the carrier voltage.
 The carrier signal is cancelled out by both the balanced modulator and then unwanted sidebands cancel
w

at the output of the summing amplifiers and hence produces SSB signal.

Balanced V1
w

Modulating signal Modulator


BM1
Audio
w

amplifier
Carrier 900 Adder SSB

Phase
Carrier shifter
Signal

AF 900 Balanced
Phase Modulator
V2

www.padeepz.net
shifter BM2
www.padeepz.net

PHASE SHIFT METHOD

Mathematical analysis:
For modulator1 (BM1)
ec(t) = Ec sin(ωc t+900) = Ec cosωc t

t
em(t)= Em sinωm t

ne
For modulator2(BM2)
ec(t) = Ec sinωc t
em(t)= Em sin(ωm t+ 900) = Em cosωm t

Output for modulator(BM1)isV1

.
V1=Ec cosωc t Em sinωm t ------------------------------(1)

pz
Output for modulator(BM2)isV2
V2=Ec sinωc t. Em cosωm t ------------------------------(2)

The output of adder is


ee V0 = V1 + V2
V0= Ec Em cosωc t sinωm t + Ec Em sinωc tcosωm t
=Ec Em sin(ωc + ωm)t ------------------------------(3)

Thus one of the side band is cancelled where as the other is reinforced. This method avoids the use of filters.
ad
MODIFIED PHASE SHIFT METHOD (OR) WEAVER’S METHOD

 The modified phase shift method overcomes the limitation of phase shift method. That is AF phase
shift network is required to operate over a large range of audio frequencies but also retains the
.p

advantage like its ability to generate SSB at any frequency and use of low audio frequency.
 This method provides both RF and AF oscillator phase shift and also used in low frequency and so it
can be used for both audio and radio frequencies.
e1 e3 e5
w

BM (1) LPF BM (3)

(1)
w

RF carrier
AF i/p 0 2Ecsinωc t
90 900 SSB-SC-AM
Oscillator
phase phase Adder
w

shifter shifter
2Eosinωo t AF carrier
oscillator

BM (2) LPF BM (4)


e4 e6
(1)
e2

www.padeepz.net
www.padeepz.net
WEAVER’S METHOD

 Modulators 1 and 2 both have the unshifted modulating signal as inputs. BM1 takes low frequency
subcarrier with a 90 phase shift from the AF oscillator. BM2 receives the subcarrier signal directly
from the oscillator.
 This method tries to aEoid the phase shift of audio frequencies and combine the audio frequency
carrier with AF which lies in the middle of audio frequency.

t
 The low pass filter at the output of BM1 and BM2 with cut off frequency ensures the input to the
balance modulator BM3 and BM4. The output of BM3 and BM4 gives the desired sideband

ne
suppression.

MATHEMATICAL ANALYSIS

The modulating signal is em= Em sinωm t -------- (1)

.
The A.F carrier(sub carrier signal) eo(t) = 2E0 sinω0 t ---------(2)

pz
The R.F carrier ec(t)= 2Ec sinωc t ----------(3)

The input for Balanced modulator 1(BM1) is


em(t)= Em sinωm t
eo(t) = 2E0 sin (ω0 t +900)
ee
The output for Balanced modulator 1(BM1) is
e1 = Em sinωm t 2E0 sin (ω0 t +900)
= Em E0 [ cos(ω0 t+900 - ωm t) - cos(ω0 t+900+ ωm t)] --------(4)

The input for Balanced modulator 2(BM2) is


ad
em(t)= Em sinωm t
eo(t) = 2E0 sinω0 t

The output for Balanced modulator 2(BM2) is


e2 = Em sinωm t 2E0 sinω0 t
= Em E0 [ cos(ω0 t - ωm t) - cos(ω0 t+ ωm t)]
.p

--------(5)

The LPF1, 2 eliminates the upper sidebands of the modulator. Hence USB is suppressed

The Output of LPF1 is e3= Em E0 [ cos(ω0 t+900 - ωm t) -----------(6)


w

The Output of LPF2 is e4= Em E0 cos(ω0 t - ωm t) -----------(7)


w

The output of LPF1, 2 are given to BM3,BM4.

The input for Balanced modulator 3(BM3) is


e3= Em E0 [ cos(ω0 t+900 - ωm t)
w

ec(t) = 2Ec sinωc t

The output for Balanced modulator 3(BM3) is


e5 = 2Em E0 Ec cos(ω0 t+900- ωm t ) sinωc t

Assume Em =E0 =Ec=1,then


e5= 2cos(ω0 t+900- ωm t ) sinωc t

www.padeepz.net
www.padeepz.net
=sin[(ωc + ωo – ωm)t +900] + sin[(ωc - ω0 + ωm)t - 900] -------------(8)

The input for Balanced modulator 4(BM4) is


e4= Em E0 cos(ω0 t - ωm t)
ec(t) = 2Ec sin (ωc t+900)

The output for Balanced modulator 4(BM4) is


e6 = Em E0 cos(ω0 t - ωm t) 2Ec sin (ωc t+900)

t
Assume Em =E0 =Ec=1,then
e6 = 2 cos(ω0 t - ωm t) sin (ωc t+900)

ne
= sin[(ωc + ωo – ωm)t +900] + sin[(ωc - ω0 + ωm)t + 900] ------------(9)

The output of adder is e SSB-SC(t) = e5 + e6


= sin[(ωc + ωo – ωm)t +900] + sin[(ωc - ω0 + ωm)t - 900] +
sin[(ωc + ωo – ωm)t +900] + sin[(ωc - ω0 + ωm)t + 900]

.
=2 sin[(ω0 + ωc – ωm)t+900]

pz
The other two terms cancel with each other because it is out of phase.

ee eSSB-SC (t) = 2cos[(ω0 + ωc – ωm)]t

The final RF output frequency is ω0 + ωc – ωm which is essentially the lower side band of RF carrier
ω0 + ωc .

DEMODULATION/DETECTION OF AM-SSBSC
ad
SYNCHRONOUS OR COHERENT DETECTOR

 The coherent detector uses exact carrier synchronization for retrieving the message signal from
modulated signal. These types of detectors are mainly used for detecting DSB&SSB signals.
 It consists of a product modulator with a low pass filter.
.p

 For detecting signal local oscillator at the receiver end is required. The frequency and phase of the
locally generated carrier and transmitter carrier must be synchronized that is exactly coherent.
 All types of linear modulation can be detected by using synchronous detector. It consists of a product
modulator with LPF.
w
w
w

 The incoming signal is first multiplied with locally generated carrier and then passed through low pass
filter. The filter bandwidth is same as the message bandwidth ωm
 Tthe local oscillator should be exactly synchronized with carrier signal in both phase and velocity.
 Considering the case of SSB-SC signal, the signal I/p is

e1(t)= Em.Ec cos (ωc - ωm)t


2
e2(t)=Esinωc t

www.padeepz.net
www.padeepz.net
The output of the non linear device which acts as a multiplying device is given by
e(t)= e1(t). e2(t)= Em.Ec E cos (ωc - ωm)t sinωc t
2

e(t)= Em.Ec E sinωm t + sin (2ωc - ωm)t


2 2
The first term of the output is the modulating frequency signal that is passed on to the output. The second
component is a RF component and is attenuated by the filter. Thus the synchronous detector is capable of

t
demodulating SSB-SC signal

ne
e(t)= Em.Ec Esinωm t
4
The synchronous detector is effective only when locally generated carrier is properly synchronize with
the transmitter power. Assume the local oscillator carrier to have a phase difference with the transmitted
carrier. The carrier is represented by

.
e2(t)=Esin( ωc t + φ )

pz
The output of the non linear device is given by
e(t)= e1(t). e2(t)= Em.Ec cos (ωc - ωm)t Esin ( ωc t + φ )
2
ee = Em.Ec E cos (ωc - ωm)t sin ( ωc t + φ )
2
=Em.Ec E ( cosωct cosωmt+sinωmt sin ωc t)(sinωc t cosφ + cosωc t sin φ )
2

=Em.EcE [ cosωct cosωmt sinωc t cosφ + sinωmt sin2 ωc t cosφ +


ad
2
Cos 2ωc t cosωmt sin φ + cosωct sin ωc t cosωmt cosφ ]

=E m.Ec E [ cosωct cosωmt sinωc t cosφ + sinω mt cosφ 1-cos2ωc t


.p

2 2
Cos 2ωc t cosωmt sin φ + cosωct sin ωc t cosωmt cosφ ]

After passing through the LPF the second order harmonic term is eliminated.
w

e(t)= Em.Ec Esinωm t cosφ


4
w

If φ = 0 then e(t) is maximum e(t) = Em.Ec Esinωm t


4

If φ = 90 then e(t) is minimum e(t) = 0


w

Thus there is a phase delay due to improper synchronization.

VESTIGEAL SIDE BAND MODULATION


Definition : One of the sideband is partially suppressed and vestige (portion) of the other sideband is transmitted,
This vestige (portion) compensates the suppression of the sideband. It is called vestigial sideband transmission.

www.padeepz.net
www.padeepz.net
Generation and demodulation of VSB:

A VSB signal is obtained as shown figure below by suppressing one of the sidebands of a DSBSC using
a VSB filter.

t
ne
VSB filter is a BPF having an asymmetric frequency response in the transition band, positioned in such
a way that the carrier frequency corresponds to the middle of the transition band. From the figure,
𝑆𝐷𝑆𝐵−𝑆𝐶 (𝑡) = 𝐴𝑐 𝑚(𝑡)𝑐𝑜𝑠(𝜔𝑐 𝑡)
The transfer function of the VSB filter is 𝐻𝑣 (𝜔).

.
pz
ee
The inverse FT of 𝐻𝑣 (𝜔) gives the unit impulse, ℎ𝑣 (𝑡). We can express the VSB filter output as:
ad
𝑆𝑉𝑆𝐵−𝑆𝐶 (𝑡) = 𝑆𝐷𝑆𝐵−𝑆𝐶 (𝑡) ∗ ℎ𝑣 (𝑡) = 𝐴𝑐 𝑚(𝑡)𝑐𝑜𝑠(𝜔𝑐 𝑡) ∗ ℎ𝑣 (𝑡) -------------(1)
Taking FT on both sides,
𝐴
𝑆𝑉𝑆𝐵−𝑆𝐶 (𝜔) = { 2𝑐 [𝑀(𝜔 − 𝜔𝑐 ) + 𝑀(𝜔 + 𝜔𝑐 )] × 𝐻𝑣 (𝜔)} -----------(2)

The coherent detector is a sort of universal detector of AM signals in the sense that DSBSC, conventional
.p

AM and SSBSC can all be detected successfully by using it. It would be natural to expect that coherent detection
to work for the VSB-SC signal too.
w
w
w

The output of the multiplier in the VSB demodulator in the figure is given by:
𝑥 (𝑡) = 𝑆𝑉𝑆𝐵−𝑆𝐶 (𝑡) × 𝐴0 𝑐𝑜𝑠(𝜔𝑐 𝑡) ------------ (3)
It is assumed perfect synchrony between the transmitter and demodulator carriers.

Taking FT on both sides of equation (3), we obtain,


𝐴
𝑋 (𝜔) = 20 [𝑆𝑉𝑆𝐵−𝑆𝐶 (𝜔 − 𝜔𝑐 ) + 𝑆𝑉𝑆𝐵−𝑆𝐶 (𝜔 + 𝜔𝑐 )] -------------(4)

www.padeepz.net
www.padeepz.net
Using (2) in (4),

𝐴0𝐴𝑐
𝑋 (𝜔 ) = ( ) {[𝑀(𝜔) + 𝑀(𝜔 − 2𝜔𝑐 )]𝐻𝑣 (𝜔 − 𝜔𝑐 ) + [𝑀(𝜔 + 2𝜔𝑐 ) + 𝑀 (𝜔)]𝐻𝑣 (𝜔 + 𝜔𝑐 )}
4
-----------(5)

The signal 𝑥(𝑡) is passed through an ideal filter (LPF) to obtain 𝑦(𝑡) . If the VSB modulation is
successful, then 𝑦(𝑡) should be proportional to the message signal, 𝑚(𝑡).

t
It is observed from (5) that 𝑀 (𝜔 − 2𝜔𝑐 ) and 𝑀(𝜔 + 2𝜔𝑐 ) are high pass terms, since they represent

ne
𝑀 𝜔 translated by ±2𝜔𝑐 . These terms are blocked by the LPF which yields an output signal 𝑦(𝑡) with the FT
( )
𝑌(𝜔) given by
𝐴 𝐴
𝑌(𝜔) = ( 0 𝑐 ) 𝑀(𝜔)[𝐻𝑣 (𝜔 − 𝜔𝑐 ) + 𝐻𝑣 (𝜔 + 𝜔𝑐 )] ------------(6)
4

VSBSC modulation and demodulation is considered to be successful if 𝑌 (𝜔) = 𝑘𝑀(𝜔), where k is

.
proportionality constant. Hence, for perfect demodulation, the required condition is:

pz
[𝐻𝑣 (𝜔 − 𝜔𝑐 ) + 𝐻𝑣 (𝜔 + 𝜔𝑐 )] = 𝑐𝑜𝑛𝑠𝑡𝑎𝑛𝑡 𝑓𝑜𝑟 |𝜔| ≤ 𝜔𝑚 .

This is called vestigial symmetry condition.


ee
ad
.p

It is seen that the VSB bandwidth exceeds the corresponding SSB bandwidth 𝜔𝑚 by 𝜔𝑣 /2. Thus, the
filter transition bandwidth 𝜔𝑣 is an important parameter which decides the VSB bandwidth. It is observed in
filter design that spectral components that lie in the transition region suffer distortion causing phase shifts.
w

Magnitude Response of VSB Filter


Fig. shows the magnitude response of VSB filter.
 Here observe that fc to fc+W is USB. It's portion from fc to fc +fv is
w

suppressed partially. fc to fc - W is LSB. It's portion from fc -fv to fc is


transmitted as vestige.
 Observe that H(fc)=1/2. And the frequency response fc-fv ≤ H(f)≤ fc+fv exhibits odd symmetry. The
w

sum of any two frequency components in the range is


fc-fv< f <fc+fv
equal to unity. i.e H(f-fc) + H(f+fc) = 1
Phase response is linear

www.padeepz.net
www.padeepz.net

t
. ne
Advantages:

pz
1. Low frequencies, near fc are, transmitted without any attenuation.
2. Bandwidth is reduced compared to DSB.

Applications:
VSB is mainly used for TV transmission, since low frequencies near fc represent significant picture details.
ee
They are unaffected due toVSB.
ad
UNIT -2
.p

Angle Modulation
w

Definition
w

We know that amplitude, frequency or phase of the carrier can be varied by the modulating signal.
Amplitude is varied 'in AM. When frequency or phase of the carrier is varied by the modulating signal, then it
is called angle modulation, There are two types of angle modulation.
w

1. Frequency Modulation :

When frequency of the carrier varies as per amplitude variations of modulating signal, then it is called
Frequency Modulation (FM). Amplitude of the modulated carrier remains constant.

www.padeepz.net
www.padeepz.net
2. Phase Modulation :

When phase of the carrier varies as per amplitude variations of modulating signal, then it is called Phase
Modulation (PM). Amplitude of the modulated carrier remains constant,

Frequency Modulation:

t
The frequency of the high frequency carrier signal is carried in accordance with the modulating signal.

ne
Vm = Em sin 2fmt

Vc = Ec sin 2fct

.
Vfm = Ec sin (2fct + mf sin 2fmt)

pz
Vfm = Ec sin (wct + mf sin wmt)

mf  modulating index of fm
ee
Relationship/Difference between FM and PM:

 The basic difference between FM and PM lies in which property of the carrier isdirectly varied by
ad
modulating signal. Note that when frequency of the carrier varies,phase of the carrier also varies and
viceversa.
 But if frequency is varied directly, thenit .is called FM.,

.p

And if phase is varied. directly, then it is called PM.


The instantaneous phase deviation is denoted by θ (t). It is the instantaneous change in phase of the carrier
with respect to reference phase. The instantaneous phase of the carrier is precise phase of the carrier at a given
w

instant .It is mathematically expressed as,

Instantaneous phase =
w

...................(1)
w

Here θ(t) is the instantaneous phase deviation and ωc is the carrier frequency. Now the instantaneous frequency
deviation is defined as

................(2)

www.padeepz.net
www.padeepz.net
Definition for instantaneous frequency deviation: It is the instantaneous change in carrier frequency. It is
equal to the rate at which instantaneous phase deviation takes place.

Definition of instantaneous frequency:It is the frequency of the carrier t a given instant of time. It is given as

t
...................(3)

ne
Instantaneous phase deivation θ(t) is proportional to modulating signal voltage

-....................(4)

.
pz
Where K is the deviation sensitivity of phase

Similarly the instatneous frequency deviation is proportional to modulating Signal voltage.

ee ........................(5)

Where k1 is the deviation sensitivity of frequency.

From equation (2), We have


ad

.......................(6)
.p

Let the modulating signal be given as


w

Using the equation in equation (6)


w

.......................(7)
w

The angle modulated wave is mathematically expressed as

.......................(8)

Using the value of θ(t) in the above equation from equation (7)

www.padeepz.net
www.padeepz.net

....(9)

Similarly using the value of θ(t) from equation (5) in equation (8) we get

t
..........(10)

ne
FM and PM waveforms:

.
pz
ee
ad

From the above


.p

waveform we can
note the following
w

 For FM signal maximum frequency" deviation takes Place when


Modulating signal is at positive .and negative peaks.
w

 For PM signal the maximum frequency. deviation takes place near zero crossings of the modulating
signal.
w

 Both FM anid PM waveforms are identical except the phase shift.

Definition of Modulation index of PM and FM

The modulation index of PM is given as

www.padeepz.net
www.padeepz.net
M=KEm

For FM It is the ratio of maximum frequency deviation () to the modulating frequency (fm).

Maximum frequency deviation 


mf = ––––––––––––––––––––––––––––– = ––––
Modulating frequency fm
 The maximum frequency deviation is the shift from centre frequency f c when the amplitude of message

t
ne
is maximum.
 f = K1 Em (Hz)
K1 = Deviation sensitivity.

The Bandwidth of FM:

.
pz
 By Carson’s rule the Bandwidth needed by fm is given as,
B = 2 ( + fmmax)

  Maximum frequency Deviation


ee
fmmax is Maximum modulating frequency.

Deviation Ratio :

The modulation index corresponding to maximum modulating frequency is called deviation ratio.
ad
Maximum frequency deviation
Deviation Ratio = –––––––––––––––––––––––––––––
Maximum modulating frequency
.p

Frequency Spectrum of angle modualted wave :


w

 FM and PM analysis is quite complicated. It is derived with the help of Bessel function.
Efm = Ec sin (wct + mf cos wmt)
w

Using Bessel function this can be expanded as,


w

Efm = A {Jomf sin wct + J1mf [sin (wc + wm)t – sin (wc - wm)t]

+ J2mf [sin (wc + 2wm)t – sin (wc - 2wm)t] + J3mf [sin (wc + 3wm)t

– sin (wc - 3wm)t] + J4mf [sin (wc + 4wm)t – sin (wc - 4wm)t] …..}

www.padeepz.net
www.padeepz.net
J0, J1, J2, J3 …. Are Bessel functions. The value of this depends on modulation index mf.

t
From the figure the Bandwidth of FM is given by

ne
B = fc + nfm – fc + nfm
BW = 2nfm

.
Bessel Function Table :

pz
m J0 J1 J2 J3 J4 J5 J6 J7 J8 J9 J10

0 1 - - - - - - - - - -

0.25 0.98 0.12 - - - - - - - - -

0.5

1
0.94

0.77
ee
0.24

0.44
0.03

0.11
-

0.02
-

-
-

-
-

-
-

-
-

-
-

-
-

1.5 0.51 0.56 0.23 0.06 0.01 - - - - - -


ad
2 0.22 0.58 0.35 0.13 0.03 - - - - - -

2.5 -0.05 0.50 0.45 0.22 0.07 0.02 - - - - -

3 -0.26 0.34 0.49 0.31 0.13 0.04 0.01 - - - -

4 -0.04 -0.07 0.36 0.43 0.28 0.13 0.05 0.02 - - -


.p

5 0.18 -0.33 0.05 0.31 0.39 0.25 0.13 0.05 0.02 - -


w

Classification of FM:

1. Narrowband FM
w

2. Wide band FM
Narrow band FM:
w

When the modulation index is less than I, it is called narrowband FM. The FM Equation given by eq. 9
can also be expressed as,

…………………(1)

www.padeepz.net
www.padeepz.net

………(2)

t
ne
For narrowband FM, the modulation index, m is very small therefore following approximations can be
considered.

.
pz
Using this in equation (2)

Expanding
ee
ad
This equation gives the spectrum of narrowband FM. Observe that there is carrier frequency fc, upper sideband
(fc + fm) and lower sideband (fc - fm).

Wide band FM
.p

If the modulation index is higher than 10 it is called as wide band FM


w
w

then the above equation becomes


w

www.padeepz.net
www.padeepz.net

t
. ne
pz
ee
The above integral is known as the nth order Bessel function of the first kind. It is given as
ad

Using the value of Cn in equation (2)


.p
w

Using the value x(t) in equation (1)


w
w

………………(3)

The Fourier transform of the above equation becomes

www.padeepz.net
www.padeepz.net

This equation shows that there are infinite number of components located

fc±fm, fc±2fm,fc ±3fm…………….

t
Comparison between narrowband and wideband FM

ne
Sr.no Narrow band FM Wide band FM

1 Modulation index is < 1 Modulation index > 10

.
2

pz
3 Spectrum contains 2 sidebands and carrier Spectrum cont6ains infinite number of
sidebands and carrier
4

5
BW=2fm
ee
It is used for mobile communication It is used for broadcasting and entertainment

6 Maximum deviation =75Hz Maximum deviation = 5 Hz


ad
7 Range of modulating frequency Range of modulating frequency
30Hz to 15 Kz 30Hz to 3 Kz
Comparison between FM and PM
.p

Frequency modulation Phase modulation

1 The maximum frequency deviation depends The maximum phase deviation depends only
w

upon amplitude of modulating voltage and upon the amplitude of modulating voltage
modulating frequency
w

2 Frequency of the carrier is modulated by Phase of the carrier is modulated by modulating


modulating signal signal

3 Modulation index is increased as modulation Modulation index remains same if modulating


w

frequency is reduced and vice versa frequency is changed

4 Noise immunity is bette than AM and PM Noise immunity is better than AM but worse
than FM

www.padeepz.net
www.padeepz.net
5 FM is widely used PM is used in some mobile systems.

Generation of FM waves:

Fm Modulators: There are 2 types of FM modulators.

t
1. Direct Method

ne
2. Indirect Method

.
pz
Direct FM Modulators : In this type the frequency of the carrier is varied directly by the modulating signal.
ee
Indirect FM Modulators: In this type FM is obtained by phase modulation of the carrier.
ad
.p

Generation of Narrow band FM:


w
w
w

Direct FM reactance modulator.

www.padeepz.net
www.padeepz.net

t
ne
 It behaves as reactance across terminal A-B.
 The terminal A-B of the circuit may be connected across the tuned circuit of the oscillator to get fm o/p.
 The varying voltage (modulating voltage) V, across the terminals A-B changes the reactance of FET.

.
 This charge in reactance can be inductive or capacitive.

pz
 Neglecting the gate current, let the current through C & R be I 1.
 At the carrier freq. the reactance of C is much larger than

ee V
R & I1 = ––––––––––
R + 1/ jwc
Jwc >> R
I1 = jwcV
From the Circuit,
Vg = I1R = jwcrv
ad
Id = gmvgs = gmVg
Id = jwcRgm V
From the circuit impedance of the FET is,
V
Z = ––––
.p

Id

V 1 1
= ––––––––––– = ––––––––––– = –––––––––
w

jwCR gm V jw (gmCR) jw (Ceq)

 The impedance of FET is capacitive.


w

 By carrying the modulating voltage across FET, the operating paint g m can be varied and hence Ceq.
 This change in the capacitance will change the frequency of the oscillator.
w

Frequency Modulation using Varactor diode.

www.padeepz.net
www.padeepz.net

t
ne
 We know that the junction capacitance of the varactor diode changes as the reverse bias across it is

.
varied.

pz
 L1 & C1 forms the tank circuit of the carrier oscillator.
 The capacitance of the varactor diode depends on the fixed bias set by R1 & R2 & AF modulating signal.
 Either R1 or R2 is made variable.
 The radio frequency choke [RFC] has high reactance at the carrier frequency to prevent carrier signal
ee
from getting into the modulating signal.
 At +ve going modulating signal adds to the reverse bias applied to the varactor diode D, which decreases
its capacitance & increases the carrier frequency.
ad
 A –ve going modulating signal subtracts from the bias, increasing the capacitance, which decreases the
carrier frequency.
.p

Direct Fm Transmitters :
w
w
w

www.padeepz.net
www.padeepz.net
 Fig. shows the FM Crosby transmitter with an AFC loop. (Automatic frequency correction loop).
 The Frequency modulator can be either a reactance modulator or voltage controlled oscillator.
 The carrier freq is 5.1MHz. which multiplies by 18 in three steps to produce a final frequency of 91.8
MHz.
 When the frequency modulated carrier is multiplied, its frequency & phase deviations are also
multiplied.

t

ne
The rate at which the carrier is deviated is unaffected by the multiplication process. Hence the
modulation index is multiplied.
 When an angle modulated carrier is heterodyned with another freq in a non linear mixer, the carrier can
either be up converted or down converted.

.
pz
AFC loop :

ee
ad

 The purpose of the AFC loop is the achieve near crystal stability of the transmit carrier freq. without
.p

using a crystal in the carrier oscillator.


 The cassier frequency is mixed with a local oscillator freq and then down converted in freq. & the fed
to a frequency discriminator.
w

 Frequency discriminator is a device whose o/p voltage is proportional to difference b/w i/p freq and its
resonant freq.
w

 Discriminator responds to low freq changes in the carrier center freq because of master oscillator freq
drift.
 When the discriminator responds to frequency deviation, the feedback loop would cancel the deviation
w

and this remove the modulation.


 The dc correction voltage is added to the modulating signal to automatically adjust the master oscillator’s
centre frequency to compensate for low freq drift.

www.padeepz.net
www.padeepz.net
PLL Direct FM transmitter:

t
. ne
pz
 Fig shows a wide band FM transmitter.
 The VCO o/p freq is divided by N & fed bark to the PLL phase comparator, where it is compared to a
stable reference freq.
ee
 The phase comparator generator a correction voltage that is proportional to the difference b/w the 2
frequencies.
 The correction voltage is added to the modulating signal & applied to the VCO i/p.
ad
 The correction voltage adjusts the VCO centre freq to its proper value.
 The LPF prevents the changes in the VCO o/p frequency due to the modulating signal from being
converted to a voltage & fed back to VCO.
 The LPF also prevents the loop from locking onto a side frequency.
.p

Indirect Fm transmitter
w
w
w

www.padeepz.net
www.padeepz.net

t
. ne
 Here the modulating signal directly deviates the phase of the carrier, which indirectly changes the

pz
frequency.
 The carrier source is a crystal oscillator hence stability can be achieved without a AFC.
 A carrier is phase shifted to 900 & fed to the Balanced modulator. Where it is mixed with the i/p


ee
modulating signal.
The o/p of balanced modulator is DSBSC.
 The o/p of Balanced modulator is combined with original carrier in the combining N/W. to produce a
low index, phase modulated wavefrom.
ad
 Fig (b) shows phasor of original carrier, modulating signal and the resultant Vector.
 Fig (b) shows the phasors for the side freq. components of the suppressed carrier wave. As suppressed
carrier is out of phase with Vc, the upper & Lower side bands combine to produce Vm – 90o with Vc.

.p

The phase modulated signal is obtained by vector addition of carrier and modulating signal.
 Modulating signal vector adds to the carrier OA with 900 phase Shift.
 The resultant phase modulated vector is OB with phase shift .
w

 This works only if both have the same frequency. The means carrier & modulating signal should have
same frequency. Under this condition phase modulation produces FM o/p.
w

FM Demodulators / Detectors

FM demodulator must satisfy the following requirements


w

 It must convert the frequency variations into amplitude variations


 This conversion must be linear and efficient.
 The demodulator circuits must be insensitive to amplitude changes.
 It should not be too critical in its adjustment and operation.
Types of FM demodulator:

www.padeepz.net
www.padeepz.net
 Round Travis Detector or Balanced discriminator.
 Foster – Seley Discriminator or Phase discriminator.
 Ratio Detector.

Slope Detector / Round Travis Detector :

t
. ne
pz

ee
Consists of 2 identical circuit connected back to back.
 FM signal is applied to the tuned LC circuit.

ad
Two tuned LC circuits are connected in series.
 The inductance of the secondary tuned LC circuit is coupled with the inductance of the primary LC
circuit this forms a tuned transformer.
 Upper tuned circuit is T1 & lower tuned circuit is T2.
.p

 I/P side LC is tuned to be


T1 is tuned to fc + f - max freq fm.
w

T2 is tuned to fc - f - max freq fm.

 Secondary of T1 & T2 are connected to diodes D1 & D2 with RC loads.


w

 The total o/p is equal to difference b/w Vo1 & Vo2.


 When i/p freq is fc, both T1 & T2 produce the same voltage hence o/p = 0
w

 When i/p freq is fc + f, the upper circuit T1 produces maximum voltage since it is tuned to this freq.
Hence this produces maximum votalge.
V01 is high compared to V02.

Vout = V01 - V02 is positive for fc + f.

www.padeepz.net
www.padeepz.net
 When i/p freq is fc - f. T2 produces maximum signal since it is tuned to it. But T 1 produces minimum
voltage. Hence o/p Volt = V01 – V02 is negative. Thus we get a modulating signal.
Foster - Seeley Discriminator :

t
. ne
pz
ee
ad
.p

 The primary voltage is coupled through C3 & RFC to the centre tap on the secondary.
w

 The capacitor C3 passes all the frequencies of Fm. The voltage V 1 is generated across RFC.
 RFC offers high impedance to frequencies of Fm.
w
w

www.padeepz.net
www.padeepz.net

t
. ne
pz
ee
ad
.p

 The voltage V1 thus appears across centre tap of secondary and ground also.
w

 The voltage of secondary is V2 & equally divided across upper half & lower half of the secondary.
 In the figure the voltage across diode D1 is VDI = V1 + 0.5 V2 and that across D2 is VD2 = V1 + 0.5 V2
w

.
 The o/p of upper rectifier is V01 and lower rectifier is V02.
 The net o/p V0 = V01 – V02  V0 = | VD1 | - | VD2 |
w

 At carrier frequency VD1 x VD2 are equal hence the net o/p of the discriminator will be zero.
 When the i/p frequency increases above fc the phase shift b/w V1 & V2 reduces | VD1 | > | VD2 | hence
V01 = | VD1 | - | VD2 | will be +ve.
 When the i/p frequency reduces below fc then | VD1 | > | VD2 | hence V01 = | VD1 | - | VD2 | will be –ve.

www.padeepz.net
www.padeepz.net

Ratio detector :

t
. ne
pz
Ratio detector can be obtained by sight modifications in the foster-Seeley discriminator. Fig shows the
circuit diagram of ratio detector. As shown in the diagram the diode D 2 is reversed, and output is taken from
different points. In the above circuit the regular conversion from frequency to phase shift and phase shift to
ee
amplitude takes place as in faster–Seeley discriminator. The polarity of voltage in the lower capacitor is
reversed. Hence the voltages V01 and V02 across two capacitors add. (Note that these voltages subtract in faster-
seely circuit). And we know that when V01 increases, V02 decreases and vice-versa as we have seen in faster-
Seeley circuit. Since, V0' is sum of V01 and V02, it remains constant. From the circuit of Fig we can write two
equations for the output voltage V0 (Note that V0 is the net output voltage and taken across points A and B).
ad
The First equation will be,

V0 = ½ V'0 – V02

and V0 = - ½ V'0 – V01


.p

adding the above two equations,


w

2 V0 = V01 - V02

V0 = ½ (V01 - V02)
w

Since V01  | VD1| and | V02 | above equation will be,

V0 = ½ ( | VD1 | - | VD2 |)
w

 Here VD1 & VD2 are obtained as discussed earlier in foster seeley circuit.
 From the equation we know that the output of ratio detector is half compared to that of Foster-Seeley
circuit

www.padeepz.net
www.padeepz.net
 As frequency increases above fc' | VD1 | > | VD2| hence o/p is +ve.
 III rly as frequency decreases below fc = | VD2 | > | VD1|, hence o/p is –ve.

Advantage :

 Reduced fluctuations in the o/p voltage compared to foster seeley circuit

t
PLL Demodulator circuit

. ne
pz


ee
Fig. shows the block diagram of PLL FM demodulator.
The output frequency of VCO is equal to the frequency of unmodulated carrier.
 The phase detector generates the voltage which is proportional to difference between the FM signal and
VCO output.
ad
 This voltage is filtered and amplified. It is the required modulating voltage.
 Here frequency correction is not required in VCO since it is already done at transmitter
Comparison of FM and AM
.p

Amplitude Modulation Frequency Modulation

1. Amplitude of the carrier is varied Frequency of the carrier is varied


w

according to amplitude of modulating according to amplitude of the


signal. modulating signal.
w

2. Am has poor fidelity due to narrow Since the bandwidth is large,


bandwidth. fidelity is better.

3. Most of the power is in carrier hence less All the transmitted power is useful.
w

efficient.

4. Noise interference is more. Noise interference is minimum.

5. Adjacent Chennai Interference is present Adjacent Chennai Interference is


avoided due to guard bands.

www.padeepz.net
www.padeepz.net
6. Am Broadcast operates in MF and HF FM Broadcost operates in VHF and
range UHF range.

7. In Am only carrier and two sidebands are Infinite number of sidebands are
present present

8. The transmission equipment is simple. The transmission equipment is


complex.

t
ne
9. Transmitted power varies according to Transmitted power remains constant
modulation index. irrespective of modulation index.

10. Depth of modulation have limitation. It Depth of modulation have no


can not be increased above I. limitation. It can be increased by

.
increasing frequency deviation.

pz
ee
ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
UNIT 3 & 4

1. Determine the irreducible limit below which a signal cannot be compressed.

2. Deduce the ultimate transmission rate for reliable communication over a noisy
channel.

t
3. Define Channel Capacity - the intrinsic ability of a channel to convey information.

ne
Communication system

The function of any communication system is to convey the information from source to
destination.

.
pz
Discrete message

Message which is selected from a finite number of predetermined messages.

During one time one message is transmitted. During the next time interval the next from
ee
the set is transmitted.

Memory source

A source with memory for which each symbol depends on the previous symbols.
ad
Memoryless source

Memoryless in the sense that the symbol emitted at any time is independent of previous
choices.
.p

Probabilistic experiment involves the observation of the output emitted by a discrete


source during every unit of time. The source output is modeled as a discrete random variable,
S,which takes on symbols form a fixed finite alphabet.
w

S = s0, s1, s2, · · · , sk-1


w

with probabilities

P(S = sk) = pk, k = 0, 1, · · · ,K – 1


w

We assume that the symbols emitted by the source during successive signaling intervals are
statistically independent. A source having the properties is described is called discrete
memoryless source, memoryless in the sense that the symbol emitted at any time is
independent of previous choices.
www.padeepz.net
www.padeepz.net
Source alphabet

The set of source symbols is called the source alphabet.

Symbols or letters

The element of the set is called symbol.

t
Uncertainty

ne
The amount of information contained in each symbols is closely related to its uncertainty
or surprise.

If an event is certain (that is no surprise, of probability 1) it conveys zero information.

.
pz
We can define the amount of information contained in each symbols.

I(sk) = logb(1/ pk)

Here, generally use log2 since in digital communications we will be talking about bits.
ee
The above expression also tells us that when there is more uncertainty(less probability) of the
symbol being occurred then it conveys more information.

Unit of the information


ad
The unit of the information depends on the base of the logarithmic function.

UNIT b VALUE
.p

Binit 2

Decit (OR) Hartley 10


w

Natural unit(nat) e

When pk = ½ ,we have I(sk) = 1 bit.


w

Some properties of information are summarized here:

1. For certain event i.e, pk = 1 the information it conveys is zero, I(sk) = 0.


w

Absolutely certain of the outcome of an event.


2. For the events 0 ≤ pk ≤ 1 the information is always I(sk) ≥0.Either provides some
or no information, but never brings about a loss of information.
3. If for two events pk > pi, the information content is always I(sk) < I(si).
The less probable the event is, the more information we gain when it occurs.

www.padeepz.net
www.padeepz.net
4. I(sksi) = I(sk)+I(si) if sk and si are statistically independent.
Proof:
p(sj, sk) = p(sj) p(sk) if sk and si are statistically independent.
I (sj, sk) = log (1 / p(sj, sk))
= log (1 / p(sj) p(sk))

t
= log (1 / p(sj)) + = log (1 / p(sk))

ne
= I(sj) I(sk)
Average information or entropy

The amount of information I(sk) produced by the source during an arbitrary signalling
interval depends on the symbol sk emitted by the source at that time. Indeed, I(sk) is a discrete

.
random variable that takes on the values I(s0), I(s1), · · · , I(sK-1) with probabilities p0, p1, · · · ,

pz
pK-1 respectively.

The mean of I(sk) over the source alphabet S is given by


ee
ad

The important quantity H(φ) is called the entropy of a discrete memoryless


source with source alphabet φ. It is a measure of the average information content per source
.p

symbol. Note the entropy H(φ) depends only on the probabilities of the symbols in the alphabet
φ of the source.
w

Problem

1. A DMS has four symbols S1 , S2, S3 S4 with probabilities 0.40, 0.30, 0.20,
w

0.10
a. Calculate H(φ).
b. Find the amount of information contained in the message S 1S2S3 S4
w

and S4S3S3 S2 , and compare with the H(φ).


Solution
a. H(φ) = ∑ Pk log2(1/ Pk)
= - 0.4 log2 0.4 - 0.3 log2 0.3 - 0.2log2 0.2 - 0.1log20.1
= 1.85 b/symbol
www.padeepz.net
www.padeepz.net
b. P(S1S2S3 S4 ) = (0.4)(0.3)(0.2)(0.1) = 0.0096
I(S1S2S3 S4 )= - log2 (0.0096) = 0.60 b/symbol
I(S1S2S3 S4 ) < 7.4 ( 4 H(φ) )
P(S4S3S3 S2) = (0.1)(0.2)2 (0.3) = 0.0012
I(S4S3S3 S2) = -log2(0.0012) =9.70 b/ symbol

t
I(S4S3S3 S2) > 7.4 ( 4 H(φ) )

ne
Some properties of entropy

The entropy H(φ) of a discrete memoryless source is bounded as follows:

.
0 ≤ H(φ) ≤ log2(K)

pz
where K is the radix (number of symbols)of the alphabet S of the source.

Furthermore, we may make two statements:


ee
1. H(φ) = 0, if and only if the probability pk = 1 for some k, and the remaining
probabilities in the set are all zero; this lower bound on entropy corresponds to no uncertainty.

2. H(φ) = log2(K), if and only if pk = 1/ K for all k; this upper bound on entropy
ad
corresponds to maximum uncertainty.

Proof:

H(φ) ≥0.
.p

Since each probability pk is less than or equal to unity, it follows that each term

Pk logb(1/ pk) is always nonnegative. So H(φ) ≥0.


w

The term Pk is zero if, and only if, pk = 0 or 1. That is pk =1 for some k and

all the rest are zero.


w

H(φ) ≤ log2(K)

To prove this upper bound , we make use of a property of the natural logarithm.
w

To proceed with this proof, consider any two probability distributions {p0, p1, · · · , pk-1 }
and {q0, q1, q2, · · · , qk-1 } on the alphabet φ = {s0, s1, s2, · · · , sk-1 } of a discrete
memoryless source. Then changing to the natural logarithm, we may write

www.padeepz.net
www.padeepz.net

Hence, using the inequality, we get

t
. ne
pz
We thus have the fundamental inequality

ee
Where the equality holds only if pk = qk for all k. Suppose we next put
ad
.p
w

So,

Thus H(φ) is always less than or equal to log 2k. This equality holds only if the symbols
w

are equiprobable.

Entropy of a binary memoryless channel


w

Consider a discrete memoryless binary source shown defined on the alphabet φ = {0, 1}.
Let the probabilities of symbols 0 and 1 be p0 and 1- p0 respectively.

The entropy of this channel is given by

www.padeepz.net
www.padeepz.net

From which we observe the following:

1. When p0=0, the entropy H(φ) =0.


2. When p0=1, the entropy H(φ)=1.

t
3. The entropy attains its maximum value, Hmax = 1 bit, p0= p1= 1/2., that is, symbols 1

ne
and 0 are equally probable.

.
pz
Figure - Entropy of a discrete memoryless binary source
ee
Information rate

If the source of the message generates messages at the rate of r messages per second,
then the information rate is defined to be
ad
R= rH = average number of bits of information / second.

Example problem

An analog signal is bandlimited to B Hz,sampled at the nyquist rate, and the samples are
.p

quantized into four levels. The quantization levels Q1,Q2,Q3,Q4(messages ) are assumed
independent and occur with probabilities P1=P4=1/8 and P2=P3=3/8. Find the information rate
of the source.
w

Solution
w

The average information H is

H= p1log2(1/p1) + p2log2(1/p2) + p3log2(p3) + p4log2(1/ p4)


w

=1/8 log2(8) +3/8 log2(8/3) +3/8 log2(8/3) +1/8 log2(8)

= 1.8 bits / message

The information rate R is

R= rH =2B(1.8) = 3.6 bits /s.

Shannon source coding theorem

www.padeepz.net
www.padeepz.net
An important problem in communication is the efficient representation of data generated
by a discrete source. The process by which this representation is accomplished is called source

encoding. The device that performs that representation is called a source encoder.

Variable length code

t
If some source symbols are known to be more probable than others, then the source

ne
code is generated by assigning short code to frequent source symbols, and long code to rare
source symbols.

EX : Morse code, in which the letters and alphabets are encoded into streams of marks
and spaces, denoted as dots “.” And dashes “-“.

.
pz
Our primary interest is in the development of an efficient source encoder that satisfies
two functional requirements:

1. The code words produced by the encoder are in binary form.


ee
2. The source code is uniquely decodable, so that the original source sequence can be
reconstructed perfectly from the encoded binary sequence.

We define the average code word length, L, of the source encoder as


ad
L = ∑𝐾−1
𝑘=0 pkIk

In physical terms, the parameter L represents the average number of bits per source
symbol used in the source encoding process. Let Lmin denote the minimum possible value of L.
.p

We then define the coding efficiency of the source encoder as

η = Lmin / L
w

The source encoder is said to be efficient when η approaches unity.

Source coding theorem:


w

Given a discrete memoryless source of entropyH(φ) , the average code-word length L


for any distortionless source encoding scheme is bounded as
w

L ≥ H(φ)

According to the source-coding theorem, the entropy H(φ)represents a fundamental limit


on the average number of bits per source symbol necessary to represent a discrete memoryless
source in that it can be made as small as, but no smaller than, the entropy H(φ).Thus with Lmin
= H(φ), we may rewrite the efficiency of a source encoder in terms of the entropy H(φ)as
www.padeepz.net
www.padeepz.net
η = H(φ)/ L

Data Compaction:

1. Removal of redundant information prior to transmission.

2. Lossless data compaction – no information is lost.

t
3. A source code which represents the output of a discrete memoryless source should be

ne
uniquely decodable.

Prefix Coding

Consider a discrete memoryless source of alphabet {s 0, s1, s2, · · · , sk-1}

.
pz
and statistics {p0, p1, p2, · · · , pk-1}.

For each finite sequence of symbols emitted by the source, the corresponding sequence
of code words is different from the sequence of code words corresponding to any other source
ee
sequence. For the above mentioned symbol, let the code word be denoted by

{mk0, mk1, mk2, · · · , mkn-1}

– the element are 0s and 1s.


ad
n - denotes the code word length

Prefix condition

The initial part of the code word is represented by the elements {m k0, mk1, mk2, · · · , mki}
.p

Any sequence made up of the initial part of the code word is called prefix.

Prefix code
w

1. The Prefix Code is variable length source coding scheme where no code is the prefix
of any other code.
w

2. The prefix code is a uniquely decodable code.

3. But, the converse is not true i.e., all uniquely decodable codes may not be prefix
w

codes.

www.padeepz.net
www.padeepz.net

t
ne
From 1 we see that Code I is not a prefix code. Code II is a prefix code. Code III is also
uniquely decodable but not a prefix code. Prefix codes also satisfies Kraft-McMillan inequality

.
which is given by

pz
Code I violates the Kraft – McMillan inequality.
ee
Both codes II and III satisfies the Kraft – McMillan inequality, but only code II is a prefix code.

Decoding procedure
ad
1. The source decoder simply starts at the beginning of the sequence and decodes one
codeword at the time.
2. The decoder always starts at the initial state of the tree.
3. The received bit moves the decoder to the terminal state if it is 0,or else to next
.p

decision point if it is 1.
w
w
w

Given a discrete memoryless source of entropy H(φ), a prefix code can be constructed
with an average code-word length l, which is bounded as follows:

H(φ)≤L≤ H(φ)+1

www.padeepz.net
www.padeepz.net
The left hand side of the above equation, the equality is satisfied owing to the condition
that, any symbol sk is emitted with the probability

where, lk is the length of the codeword assigned to the symbol sk.

t
Shannon – fano coding

ne
Procedure

1. List the symbols in order of decreasing probability.

.
2. Partition the set into two sets that are as close to equiprobable as possible, and assign

pz
0 to the upper set and 1 to the lower set.
3. Continue the process, each time partitioning the sets with nearly equal probabilities as
possible until further partitioning not possible.
ee
Example problems
1. A DMS has six symbols S1 , S2, S3 S4, S5, S6, with corresponding probabilities 0.30,
0.25, 0.20, 0.12, 0.08, 0.05. construct a Shannon – fano code for S.
Sk pk Step 1 Step 2 Step 3 Step 4 Step 5
S1 0.30 0 0 00
ad
0
S2 0.25 1
01
S3 0.20
1 0 10
S4 0.12
1 1 0 110
.p

S5 0.08
1 1 1 0 1110
S6 0.05
1 1 1 1 1111
w

2. A DMS has six symbols S1 , S2, S3, S4 with corresponding probabilities, 1/2 , 1/4, 1/8, 1/8,
construct a Shannon – fano code for S.
Sk pk Step 1 Step 2 Step 3 Step 4
w

S1 1/2 0
0
S2 1/4
w

1 0 10
S3 1/8
1 1 0 110
S4 1/8
1 1 1 111

www.padeepz.net
www.padeepz.net
3. A DMS has five equally likely symbols S1 , S2, S3 S4, S5 construct a Shannon – fano
code for S.

Sk pk Step 1 Step 2 Step 3 Step 4


S1 0.20
0 0 00

t
S2 0.20

ne
0 1 01
S3 0.20
1 0 10
S4 0.20
1 1 0 110
S5 0.20

.
1 1 1 111

pz
Huffman coding
ee
It is to assign to each symbol of an alphabet a sequence of bits roughly equal in length
to the amount of information conveyed by the symbol in question.

Algorithm
ad
1.The source symbols are listed in order of decreasing probability. The two source
symbols of lowest probability are assigned a 0 and a 1. This part of the step is reffered to as a
splitting stage.
.p

2. These two source symbols are regarded as being combined into a new source symbol
with probability equal to the sum of the original probabilities. The probability of the new symbol
is placed in the list in accordance with its value.
w

3. The procedure is repeated until we are left with a final list of source statistics of only
two for which a 0 and a 1 are assigned.
w

Symbol Stage I Stage II Stage III Stage IV


w

S0, 0.4 0.4 0.4 0.6 0


S1 0.2 0.2 0.4 0 0.4 1
S2 0.2 0.2 0 0.2 1
S3 0.1 0 0.2 1
S4 0.1 1
www.padeepz.net
www.padeepz.net
The code for each source symbol is found by working backward and tracing the
sequence of 0s and 1s assigned to that symbol as well as its successors.

Symbol probability code word

S0, 0.4 00
S1 0.2 10

t
S2 0.2 11

ne
S3 0.1 010
S4 0.1 011

Drawbacks:

.
pz
1. Requires proper statistics.

2. Cannot exploit relationships between words, phrases etc.,

3. Does not consider redundancy of the language.


ee
Lempel-ziv coding

1. Overcomes the drawbacks of Huffman coding


ad
2. It is an adaptive and simple encoding scheme.

3. When applied to English text it achieves 55% in contrast to Huffman coding which achieves
only 43%.
.p

4. Encodes patterns in the text This algorithm is accomplished by parsing the source data
stream

into segments that are the shortest subsequences not encountered previously.
w

Problems
w

Let the input sequence be

000101110010100101.........
w

We assume that 0 and 1 are known and stored in codebook

subsequences stored : 0, 1

Data to be parsed: 000101110010100101.........

The shortest subsequence of the data stream encountered for the first time and not seen before
www.padeepz.net
www.padeepz.net
is 00

subsequences stored: 0, 1, 00

Data to be parsed: 0101110010100101.........

The second shortest subsequence not seen before is 01; accordingly, we go on to write

t
Subsequences stored: 0, 1, 00, 01

ne
Data to be parsed: 01110010100101.........

We continue in the manner described here until the given data stream has been completely
parsed. The

.
pz
code book is shown below:

Numerical positions: 1 2 3 4 5 6 7 8 9

subsequences: ee 0 1 00 01 011 10 010 100 101

Numerical Repre

sentations: 11 12 42 21 41 61 62
ad
Binary encoded

blocks: 0010 0011 1001 0100 1000 1100 1101


.p

Discrete Memoryless Channels

Let X and Y be the random variables of symbols at the source and destination
w

respectively. The description of the channel is shown in the Figure


w
w

www.padeepz.net
www.padeepz.net
The channel is described by an input alphabet

{x0, x1, x2, · · · , xJ-1}, J – input alphabet size

an output alphabet

t
{y0, y1, y2, · · · , yK-1}, K – output alphabet size

ne
and a set of transition probabilities

p(yk/xj) = p(Y= yk / X= xj ) for all j and k

.
pz
channel matrix or transition matrix

p(y0/x0)
ee p(y1/x0) ……… p(yK-1/x0)

p(y0/x1) p(y1/x1) ……… p(yK-1/x1)

P= .

.
ad
.

p(y0/xJ-1) p(y1/xJ-1) ……… p(yK-1/xJ-1)


.p

each row corresponds to a fixed channel input.


w

each column corresponds to a fixed channel output.


w

Input probability distribution p(xj) , j=1,2,……J-1, the event that the channel input X= xj
w

occurs with probability

p(xj) = p(X=xj) for all j.

joint probability distribution

p(xj, yk) = p(X=xj, Y= yk)

www.padeepz.net
www.padeepz.net
= p(yk/xj) p(xj)

Marginal probability distribution of the output random variable Y is obtained by averaging out the
dependence of p(xj, yk) on xj,

t
. ne
pz
Binary Symmetric Channel

– A discrete memoryless channel with J = K = 2.

1).
ee
– The Channel has two input symbols(x0 = 0, x1 = 1)and two output symbols(y0 = 0, y1 =

– The channel is symmetric because the probability of receiving a 1 if a 0 is sent is same


as the probability of receiving a 0 if a 1 is sent.
ad
– The conditional probability of error is denoted by p. Abinary symmetric channel is shown
in Figure and its transition probability matrix is given by
.p
w
w
w

www.padeepz.net
www.padeepz.net

Mutual Information

If the output Y as the noisy version of the channel input X and H(X) is the uncertainity
associated with X, then the uncertainity about X after observing Y , H(X|Y) is given by

t
. ne
pz
The quantity H(X|Y) is called Conditional Entropy. It is the amount of uncertainity about
the channel input after the channel output is observed. Since H(X) is the uncertainity in channel
ee
input before observing the output, H(X) - H(X|Y) represents the uncertainity in channel input that
is resolved by observing the channel output. This uncertainity measure is termed as Mutual
Information of the channel and is denoted by I(X; Y).
ad
.p

Where the H(Y) is the entropy of the channel output and H(Y/X) is the conditional
entropy of the channel output given the channel input.
w
w

Properties of Mutual Information

Property 1:
w

The mutual information of a channel is symmetric, that is

I(X; Y) = I(Y;X)
www.padeepz.net
www.padeepz.net
Where the mutual information I(X; Y) is a measure of the uncertainty about the channel input
that is resolved by observing the channel output, and the mutual information I(Y;X) is a measure

of the uncertainty about the channel output that is resolved by sending the channel output.

t
Proof:

. ne
pz
ee
ad

Substituting Eq.3 and Eq.10 in Eq.4 and then combining, we obtain


.p
w

From Bayes’ rule for conditional probabilities, we have


w
w

Hence, from Eq.11 and Eq.12

www.padeepz.net
www.padeepz.net
Property 2:

The mutual is always non-negative, that is I(X; Y) ≥0

Proof:

We know,

t
ne
Substituting Eq. 14 in Eq. 13, we get

.
pz
Using the following fundamental inequality which we derived discussing the properties of
Entropy, ee
ad
Drawing the similarities between the right hand side of the above inequality and the left hand
side of Eq. 13, we can conclude that
.p

With equality if, only if,

p(xj |yk) = p(xj)p(yk ) for all j and k.


w

Property 2 states that we cannot lose information, on the average, by observing the
output of a channel. Moreover, the mutual information is zero if, and only if, the input and output
symbols of the channel are statistically independent.
w

Property 3:
w

The mutual information of a channel is related to the joint entropy of the channel input and
channel output by

where, the joint entropy (X, Y) is defined as

www.padeepz.net
www.padeepz.net

Proof:

t
. ne
pz
ee
ad
.p
w

Therefore, from Eq. 18 and Eq. 23, we have


w
w

Channel Capacity

Channel Capacity, C is defined as ‘the maximum mutual information I(X; Y) in any single
use of the channel(i.e., signaling interval), where the maximization is over all possible input
probability distributions {p(xj)} on X”

www.padeepz.net
www.padeepz.net

C is measured in bits/channel-use, or bits/transmission.

Example:

t
ne
For, the binary symmetric channel discussed previously, I(X; Y) will be maximum when

p(x0) = p(x1) = 1/2 . So, we have

.
pz
Since, we know

ee
ad
Using the probability values in Eq. 3 and Eq. 4 in evaluating Eq. 2, we get
.p
w
w
w

FIGURE-Variation of channel capacity of a binary symmetric channel with transition


probability p.

www.padeepz.net
www.padeepz.net
1. When the channel is noise free, p=0, the channel capacity C attains its maximum
value of one bit per channel use. At this value the entropy function attains its
minimum value of zero.
2. When the conditional probability p=1/2 due to noise, the channel capacity C attains
its minimum value of zero,whereas the entropy function attains its maximum value of
unity, in such a case the channel is said to be useless.

t
Channel Coding Theorem:

ne
Goal: Design of channel coding to increase resistance of a digital communication system
to channel noise.

.
Channel coding

pz
Mapping of the incoming data sequence into channel input sequence. It is performed in
the transmitter by a channel encoder.
ee
Channel decoding (inverse mapping)

Mapping of the channel output sequence into an output data sequence. It is performed in
the receiver by a channel decoder.
ad
The channel coding theorem is defined as process to introduce redundancy in order to
reconstruct the original source sequence as accurately as possible.

1. Let a discrete memoryless source


.p

– with an alphabet φ

– with an entropy H(φ)


w

– produce symbols once every Ts seconds

2. Let a discrete memoryless channel


w

– have capacity C

– be used once every Tc seconds.


w

3. Then if,

www.padeepz.net
www.padeepz.net

There exists a coding scheme for which the source output can be transmitted over the channel
and be reconstructed with an arbitrarily small probability of error. The parameter C / Tc

is called critical rate.

t
4. Conversly, if

ne
it is not possible to transmit information over the channel and reconstruct it with an arbitrarily

.
small probability of error.

pz
Example:
ee
Considering the case of a binary symmetric channel, the source entropy H(Φ) is 1. Hence, from
the above equation, we have
ad
.p

But the ratio Tc / Ts equals the code rate, r of the channel encoder.
w

r≤C
w

Hence, for a binary symmetric channel, if r ≤ C, then there exists a code capable of achieving an
arbitrarily low probability of error.
w

Information Capacity Theorem:

www.padeepz.net
www.padeepz.net
The Information Capacity Theorem is defined as ‘The information capacity of a
continuous channel of bandwidth B hertz, perturbed by additive white Gaussian noise of power
spectral Density N0/ 2 and limited in bandwidth to B, is given by

t
ne
where P is the average transmitted power. Proof:

.
pz
Assumptions:

1. band-limited, power-limited Gaussian channels.

2. A zero-mean stationary process X(t) that is band-limited to B hertz, sampled at


ee
Nyquist rate of 2B samples per second

3. These samples are transmitted in T seconds over a noisy channel, also band-limited
to B hertz.
ad
The number of samples, K is given by
.p

We refer to Xk as a sample of the transmitted signal. The channel output is mixed with additive
white Gaussian noise(AWGN) of zero mean and power spectral density N0/2. The noise is
band-limited to B hertz. Let the continuous random variables Yk, k = 1, 2, · · · ,K denote samples
w

of the received signal, as shown by

'
w

The noise sample Nk is Gaussian with zero mean and variance given by
w

The transmitter power is limited; it is therefore

www.padeepz.net
www.padeepz.net

Now, let I(Xk; Yk) denote the mutual information between X k and Yk. The capacity of the channel
is given by

t
The mutual information I(Xk; Yk) can be expressed as

ne
This takes the form

.
pz
When a symbol is transmitted from the source, noise is added to it. So, the total power is P + σ 2.
ee
For the evaluation of the information capacity C, we proceed in three stages:

1. The variance of sample Yk of the received signal equals P + σ 2. Hence, the differential
entropy of Yk is
ad

2. The variance of the noise sample Nk equals σ 2. Hence, the differential entropy of Nk is given
.p

by
w

3. Now, substituting above two equations into


w
w

bits per transmission.

www.padeepz.net
www.padeepz.net
The number K equals 2BT. Accordingly, we may express the information capacity in the
equivalent form:

t
. ne
pz
ee
ad
.p
w
w
w

www.padeepz.net
www.padeepz.net

t
. ne
UNIT-5

pz
Spread Spectrum and
Multiple Access Techniques

ee
ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
Spread Spectrum

t
ne
• Analog or digital data
• Analog signal

.
Spread data over wide bandwidth

pz
• Makes jamming and interception harder
• Frequency hoping
– Signal broadcast over seemingly random series of frequencies

ee
• Direct Sequence
– Each bit is represented by multiple bits in transmitted signal

ad
– Chipping code

Spread Spectrum Concept


.p
• Input fed into channel encoder
w

– Produces narrow bandwidth analog signal around central frequency


• Signal modulated using sequence of digits
w
w

www.padeepz.net
www.padeepz.net
– Spreading code/sequence
– Typically generated by pseudonoise/pseudorandom number generator

t
ne
• Increases bandwidth significantly
– Spreads spectrum
• Receiver uses same sequence to demodulate signal

.
pz
• Demodulated signal fed into channel decoder

General Model of Spread Spectrum System

ee
ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
Pseudorandom Numbers

t
ne
• Generated by algorithm using initial seed
• Deterministic algorithm

.
– Not actually random

pz
– If algorithm good, results pass reasonable tests of randomness
• Need to know algorithm and seed to predict sequence

ee
Frequency Hopping Spread Spectrum (FHSS)




ad
Signal broadcast over seemingly random series of frequencies
Receiver hops between frequencies in sync with transmitter
Eavesdroppers hear unintelligible blips
.p
• Jamming on one frequency affects only a few bits
w
w
w

www.padeepz.net
www.padeepz.net
Basic Operation

t
ne
• Typically 2k carriers frequencies forming 2k channels
• Channel spacing corresponds with bandwidth of input

.
• Each channel used for fixed interval

pz
– 300 ms in IEEE 802.11
– Some number of bits transmitted using some encoding
scheme

ee
• May be fractions of bit (see later)
– Sequence dictated by spreading code

ad
Frequency Hopping Example
.p
w
w
w

www.padeepz.net
www.padeepz.net

t
. ne
pz
ee
ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
Frequency Hopping Spread Spectrum System (Transmitter)

t
. ne
pz
ee
ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
Frequency Hopping Spread Spectrum System (Receiver)

t
. ne
pz
ee
ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
Slow and Fast FHSS

t
ne
• Frequency shifted every Tc seconds
• Duration of signal element is Ts seconds
• Slow FHSS has Tc Ts
• Fast FHSS has Tc < Ts

.
pz
• Generally fast FHSS gives improved performance in noise
(or jamming)

ee
Direct Sequence Spread Spectrum (DSSS)
• Each bit represented by multiple bits using spreading code
• Spreading code spreads signal across wider frequency band
ad
– In proportion to number of bits used
– 10 bit spreading code spreads signal across 10 times bandwidth of 1 bit
code
.p
• One method:
– Combine input with spreading code using XOR
w

– Input bit 1 inverts spreading code bit


– Input zero bit doesn’t alter spreading code bit
w
w

www.padeepz.net
www.padeepz.net
– Data rate equal to original spreading code
• Performance similar to FHSS

t
ne
Direct Sequence Spread Spectrum Transmitter

.
pz
ee
ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
Direct Sequence Spread Spectrum Transmitter

t
. ne
pz
ee
ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
Multiple Access Techniques

t
ne
• The transmission from the BS in the downlink can be heard by each and every
mobile user in the cell, and is referred as broadcasting. Transmission from the
mobile users in the uplink to the BS is many-to-one, and is referred to as
multiple access.

.
pz
• Multiple access schemes to allow many users to share simultaneously a finite
amount of radio spectrum resources.
– Should not result in severe degradation in the performance of the system as

ee
compared to a single user scenario.
– Approaches can be broadly grouped into two categories: narrowband
and wideband.

ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
Multiple Access Techniques

t
ne
• Multiple Accessing Techniques : with possible conflict and conflict- free
– Random access

.
pz
– Frequency division multiple access (FDMA)
– Time division multiple access (TDMA)
– Spread spectrum multiple access (SSMA) : an example is Code division

ee
multiple access (CDMA)
– Space division multiple access (SDMA)

ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
Duplexing

t
ne
• For voice or data communications, must assure two way communication
(duplexing, it is possible to talk and listen simultaneously). Duplexing may be

.
done using frequency or time domain techniques.

pz
– Forward (downlink) band provides traffic from the BS to the mobile
– Reverse (uplink) band provides traffic from the mobile to the BS.

ee
ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
Frequency division duplexing (FDD)

t
ne
• Provides two distinct bands of frequencies for every user, one for downlink and

.
one for uplink.

pz
• A large interval between these frequency bands must be allowed so that
interference is

ee
minimized.
Reverse Forward
Channel Channel

ad f
c,
f
c,, frequency
.p
w

R
Frequency separation
w

Frequency separation should be carefully decided


Frequency separation is constant
w

www.padeepz.net
www.padeepz.net
Time division duplexing (TDD)

t
ne
• In TDD communications, both directions of transmission use one contiguous
frequency allocation, but two separate time slots to provide both a forward and

.
pz
reverse link.
• Because transmission from mobile to BS and from BS to mobile alternates in
time, this scheme is also known as “ping pong”.

ee
• As a consequence of the use of the same frequency band, the
communication quality in both directions is the same. This is different from
FDD.

ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
FDMA

t
ne
• In FDMA, each user is allocated a unique frequency band or channel. During the
period of the call, no other user can share the same frequency band.

.
pz
ee
ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
FDMA

t
ne
• All channels in a cell are available to all the mobiles. Channel assignment
is carried out on a first-come first- served basis.
• The number of channels, given a frequency spectrum BT , depends on the

.
modulation technique (hence Bw or Bc ) and the guard bands between the channels

pz
2Bguard . These guard bands allow for imperfect filters and oscillators and can be
used to minimize adjacent channel interference.
• FDMA is usually implemented in narrowband systems.

ee
ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
Main features

t
ne
• Continuous transmission : the channels, once assigned, are used on a non-time-
sharing basis. This means that both subscriber and BS can use their
corresponding allotted channels continuously and simultaneously.

.
pz
• Narrow bandwidth : Analog cellular systems use 25-30 kHz. Digital FDMA
systems can make use of low bit rate speech coding techniques to reduce the
channel band even more.

ee
• If FDMA channels are not in use, then they sit idle and cannot be used by other
users to increase capacity.
• Low ISI : Symbol time is large compared to delay spread. No equalizer is required
(Delay spread is generally less than a few μs – flat fading).
ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
Main features

t
ne
• Low overhead : Carry overhead messages for control, synchronization purposes. As
the allotted channels can be used continuously, fewer bits need to be dedicated
compared to TDMA channels.

.
pz
• Simple hardware at mobile unit and BS : (1) no digital processing needed to
combat ISI (2) ease of framing and synchronization.
• Use of duplexer since both the transmitter and receiver operate at the same time.

ee
This results in an increase in the cost of mobile and BSs.

• ad
FDMA required tight RF filtering to minimize adjacent channel
interference.
.p
w
w
w

www.padeepz.net
www.padeepz.net
TDMA

t
• TDMA systems divide the channel time into frames. Each frame is further

ne
partitioned into time slots. In each slot only one user is allowed to either transmit
or receive.
• Unlike FDMA, only digital data and digital modulation must be used.

.
• Each user occupies a cyclically repeating time slot, so a channel may be

pz
thought of as a particular time slot of every frame, where N time slots comprise
a frame.

ee
ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
Features

t
• Multiple channels per carrier or RF channels.

ne
• Burst transmission since channels are used on a timesharing basis. Transmitter can
be turned off during idle periods.
• Narrow or wide bandwidth – depends on factors such as modulation scheme,

.
number of voice channels per carrier channel.

pz
• High ISI – Higher transmission symbol rate, hence resulting in high ISI. Adaptive
equalizer required.

ee
ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
Features

t
ne
• High framing overhead – A reasonable amount of the total transmitted bits
must be dedicated to synchronization purposes, channel identification. Also

.
guard slots are necessary to separate users.

pz
ee
ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
TDMA Frame

t
ne
One TDMA Frame

.
Preamble Information Trail Bits

pz
ee
Slot 1 Slot 2 Slot 3 … Slot N

ad
.p
Contr
Guard Sync ol Information CRC
Bits Bits Bits
w

One TDMA Slot


w

A Frame repeats in time


w

www.padeepz.net
www.padeepz.net

t
Code Division Multiple Access (CDMA)

ne
• In CDMA, the narrowband message signal is multiplied by a very large bandwidth
signal called spreading signal (code) before modulation and transmission over the

.
air. This is called spreading.

pz
• CDMA is also called DSSS (Direct Sequence Spread Spectrum). DSSS is a more
general term.

ee
• Message consists of symbols

ad
– Has symbol period and hence, symbol rate
.p
w

EE 552/452 Spring 2007


w
w

www.padeepz.net
www.padeepz.net
Code Division Multiple Access (CDMA)

t
ne
• Spreading signal (code) consists of chips
– Has Chip period and and hence, chip rate

.
– Spreading signal use a pseudo-noise (PN) sequence (a pseudo-random

pz
sequence)
– PN sequence is called a codeword
– Each user has its own cordword

ee
– Codewords are orthogonal. (low autocorrelation)
– Chip rate is oder of magnitude larger than the symbol rate.
• The receiver correlator distinguishes the senders signal by examining the

• ad
wideband signal with the same time-synchronized spreading code
The sent signal is recovered by despreading process at the receiver.
.p
w
w
w

www.padeepz.net
www.padeepz.net
CDMA Advantages

t
• Low power spectral density.

ne
– Signal is spread over a larger frequency band
– Other systems suffer less from the transmitter
• Interference limited operation

.
– All frequency spectrum is used

pz
• Privacy
– The codeword is known only between the sender and receiver. Hence other users
can not decode the messages that are in transit

ee
• Reduction of multipath affects by using a larger spectrum

ad
.p
w
w
w

www.padeepz.net
www.padeepz.net
CDMA Advantages

t
ne
• Random access possible
– Users can start their transmission at any time

.
• Cell capacity is not concerete fixed like in TDMA or FDMA systems. Has

pz
soft capacity
• Higher capacity than TDMA and FDMA
• No frequency management

ee
• No equalizers needed
• No guard time needed
• Enables soft handoff

ad
.p
w
w
w

www.padeepz.net

You might also like