Digital Communication Unit 4
Digital Communication Unit 4
This document is confidential and intended solely for the educational purpose of
RMK Group of Educational Institutions. If you have received this document
through email in error, please notify the system manager. This document
contains proprietary information and is intended only to the respective group /
learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender
immediately by e-mail if you have received this document by mistake and delete
this document from your system. If you are not the intended recipient you are
notified that disclosing, copying, distributing or taking any action in reliance on
the contents of this information is strictly prohibited.
R.M.K COLLEGE OF ENGINEERING
AND TECHNOLOGY
Date : 16.09.2023
Table of Contents
Page
S. No Contents
Number
1 Course Objectives 7
2 Pre Requisites 8
3 Syllabus 9
4 Course outcomes 11
❖ Gram-Schmidt Orthogonalization 25
❖ Principle of DPSK 57
6.4 Assignments 60
Semester :4
Reason : Students should be familiar with Proabiliy and random processes
3. Syllabus
20EC501 DIGITAL COMMUNICATION
OBJECTIVES:
•To study the limits set by information theory
•To familiarize with the various waveform coding schemes
•To learn the functional behavior of various baseband transmission
schemes
•To compare the performance metrics of various bandpass signaling
schemes
• To illustrate the error correction and detection capabilities of various
channel coding techniques
TOTAL:45 PERIODS
TEXT BOOK:
1. S. Haykin, ―Digital Communications, John Wiley, 2005 (Unit I –V)
2. Sklar B, Digital Communication Fundamentals and Applications, Pearson
Education, 2nd Edition, 2009.
REFERENCES
1. J.G Proakis, Digital Communication, 4th Edition, Tata Mc Graw Hill Company, 2001.
2. B.P.Lathi, Modern Digital and Analog Communication Systems, 3rd Edition, Oxford
University Press 2007.
3. H P Hsu, Schaum, Outline Series -Analog and Digital Communications, TMH 2006.
4. Roody D, Coolen J, Electronic Communications, PHI, 4th Edition, 2006.
5. Wayne Tomasi - Electronic Communication Systems, Pearson Education India, 2008
NPTEL LINK:
https://nptel.ac.in/courses/108/102/108102120/
4. COURSE OUTCOMES
Level in
Course
After successful completion Description
of the course, the Bloom’s
Outcomesstudents should be able to Taxonomy
Describe the concepts of information theory and
C301.1 K2
coding
Program
-
- Specific
- Program Outcomes Outcomes
-
-
Course
- Level
Out K3
- of CO K3 K4 K4 K5 K5 A3 A2 A3 A3 A3 A3 A2
Comes K6 K6 K5 K6
Sl.
No Activity Topic
16.If we correlate the received signal with any one of the two orthogonal function,
the obtained inner product will be
a) In phase
b) Quadrature
c) Zero
d) Cannot be determined
Answer: c) Zero
17. Every frequency has orthogonal functions.
a) One
b) Two
c) Four
d) Six
Answer: b) Two
18. Which FSK has no phase discontinuity?
a) Continuous FSK
b) Discrete FSK
c) Uniform FSK
d) None of the mentioned
Answer: a) Continuous FSK
19. Average energy per bit is given by
a) average energy symbol/log2 M
b) average energy symbol * log2 M
c) log2 M/ Average energy symbol
d) none of the mentioned
Answer: c) log2 M/ Average energy symbol
2. BPSK
Link: https://www.youtube.com/watch?v=Sbo5JLBv_3k
3. BFSK
Link: https://www.youtube.com/watch?v=k7UvtvW8uck
4. QPSK
Link: https://www.youtube.com/watch?v=L0KIHbUXF_Y
5. QAM
Link: https://www.youtube.com/watch?v=IbUflaeJcU8
6. Carrier Recovery
Link: https://www.youtube.com/watch?v=MHDWiK04QN0
Organization of Topics
𝑀.
𝑇
𝑖 = 1,2, … 𝑀
𝑆𝑖𝑗 = ∫ 𝑆𝑖 (𝑡)∅𝑗 (𝑡)𝑑𝑡 {
0
𝑗 = 1,2, … . 𝑁
The Real- Valued basis functions ∅1(𝑡), ∅2(𝑡) … . ∅𝑛(𝑡)are erthoneral, and it is
given by
𝑇
1 𝑖𝑓 𝑖 = 𝑗
∫ ∅𝑖 (𝑡)∅𝑗 (𝑡)𝑑𝑡 = { 0 𝑖𝑓 𝑖 ≠
0
𝑗
First condition proves that each basis function is normalized to have unit energy
Second condition proves that all basis functions are orthogonal to each other.
𝑖 = 1,2, … 𝑀
𝑆𝑖𝑗 =𝑆𝑖 ∅ 𝑗 (𝑡) 𝑑𝑡 (4.2)
𝑗 = 1,2, … . 𝑁
Each signal in the set {𝑆𝑖(𝑡)} is determined by the vector co- efficient
𝑆𝑖1
Si=[𝑆𝑖2 ] i=1,2,3…M (4.3)
𝑆𝑖𝑁
The vector 𝑆𝑖 is called the signal vector. We can visualize the set of signal
vectors {𝑆𝑖 }, as set of M points in an N- demendional Euclidean space. This N-
dimensional Euclidean space is called the signal space.
Fig 4.4 Shows a two – dimensional signal space with three signals that is
N=2 and M=3
In the Euclidean space, lengths of vectors and angles between vectors are
defined. Length or norm of vector is denoted by|𝑆𝑖. |
1) The squared- length of any signal vector Si is equal to the inner product of the
vector with itself
2) The cosine of the angle between two vectors is equal to the inner product of the
two vectors divided by the product of their individual norms.
that is cosine of angle between
Vectors 𝑆𝑖 and 𝑆𝑗 =(Si,Sj)/" 𝑆𝑖 " ǁ 𝑆𝑗 ǁ
𝑇
=∑𝑗𝑀=1 ∑𝑘=1
𝑁 𝑆𝑖𝑗 𝑆𝑖𝑘 ∫0 𝑆𝑖 (𝑡) ∅𝑘 (t)dt
Ei =" 𝑆𝑖 " 2
Therefore energy of a signal Si(t) is equal the squared- length of the signal
vector Si
In the case of a pair of signals 𝑆𝑖 (t) and 𝑆𝑘 (t),
"𝑆𝑖 − 𝑆𝑘 " 2 =∑ 𝑁
𝑗 =1 (𝑆𝑖𝑗 − 𝑆𝑘𝑗 )
2
Coherent detection- Receiver has exact knowledge of the carrier wave’s phase
reference ie) receiver is phase- locked to the transmitter.
Non- Coherent detection- Knowledge of carrier wave’s phase is not required less
complex.
Thus many modulation/ detection schemes are available. The choice of scheme
is based on the following criteria,
Principle:
In a coherent binary psk system, binary 1 and 0 are represented by 𝑆1(t) and
𝑆2 (t) respectively,
2𝐸𝑏
𝑆1 (t) =√ 𝑇𝑏
cos(2𝜋𝑓 𝑐𝑡)
𝐸
𝑆2 (t)= √2 𝑇𝑏 cos(2𝜋𝑓 𝑐𝑡 + 𝜋)
𝑏
𝐸
𝑆2(𝑡) = - √ 2 𝑇𝑏 cos(2𝜋𝑓𝑐 t)
𝑏
Where 0≤ t≤ 𝑇𝑏
𝑛𝑐
𝐸𝑏 → Energy per bit, 𝑓𝑐 = ; 𝑛𝑐 = fixed integer
𝑇𝑏
A pair of sinusoidal waves that differ only in relative phase-shift of 180• are referred
as antipodal signals
2
∅1(𝑡) = √ cos (2𝜋𝑓𝑐 t) 0≤ t < 𝑇𝑏 (4.6)
𝑇 𝑏
𝑆11 =+√𝐸𝑏
𝑇
𝑠21=∫0 𝑏 𝑆2(t) ∅2(t)dt
𝑆21=−√𝐸𝑏
Thus a BPSK system has a signal space that is one dimensional (N=1) and with two
message points (M=2). The two message points are given by 𝑆11 and 𝑆21 . Message
point corresponding to 𝑠2(t) is located at 𝑠11 =+√𝐸𝑏 and message point corresponding
At the receiver, the decision rule is to guess a binary 1 if the received signal point
falls in region z1 and guess binary o if the received signal point falls in region z2.
4.3.1 Generation:
Binary 0 →-√𝐸𝑏
This binary wave and a sinusoidal carrier ∅1 (t) are applied to a product modulator
whose o/p is a PSK wave.
4.3.2 Detection :
To detect the original binary sequence, the noisy psk wave x(t) is applied to a
correlator. Another i/p to correlator is a coherent reference signal ∅1 (t). The correlator
o/p 𝑥1 is given to a decision device. J6 𝑥1<0, the receiver decides in favour of binary 1
and if 𝑥1<0, it decides in favour of binary 0.
1) Signal 𝑆2 (t) is transmitted [binary 1] but the noise in the channel makes the
received signal point to fall inside region𝑧1 and so the receiver decides 𝑠1(t) (ie)
binary o.
2) Signal 𝑆1 (t) is transmitted [binary 0] but the noise in the channel makes the
received signal point to fall inside region 𝑍2 and so receives decides 𝑆2 (t)(ie)
binary 1.
To calculate probability of error of first condition,
𝑍1= 0 <𝑥1<1
Where 𝑥1 is the observation scalar.
𝑥 = ∫𝑇 𝑏 𝑥( 𝑡)∅ (t)dt
1 0 1
1
𝑓𝑥 1 (𝑥1/0 ) = exp −(𝑥1 + √𝐸𝑏 ) 2 ]
√𝜋𝑁 𝑂
Probability of error,
∞
𝑃𝑒 (0)= ∫0 𝑓𝑥 1 (𝑥1 /0)d𝑥1
𝖺 1
1
= ∫0 𝑒𝑥𝑝[- 𝑁 (𝑥1 + √𝐸 𝑏 )2d𝑥 1
√𝜋 𝑁𝑂 𝑂
Take Z= (𝑥1 +√ 𝐸𝑏 )2
1
𝑃𝑒 (0) = ∫𝐸 (−𝑧2)dz
exp
√𝜋 √ 𝑏
𝑁0
1 𝐸
𝑃𝑒 (0)= erfc( √ 𝑏 )
2 𝑁 0
simillarly,
1 𝐸
𝑃𝑒 (1) = erfc( √ 𝑏 )
2 𝑁 0
1 𝐸𝑏
𝑃𝑒 = erfc(√ )
2 𝑁𝑜
4.3.4 Power Spectrum:
From the generation of BPSK, it is clear that BPSK has only one in-phase
component which is 𝑡𝑔 (t) or –g(t).
2𝐸𝑏
; 0 ≤ 𝑡 ≤ 𝑇𝑏
g(t) = √ 𝑇𝑏
0 ; 𝑒𝑙𝑠𝑒 𝑤ℎ𝑒𝑟𝑒
1. Principle:
In binary FSK system, symbols 1 and 0 are represented by two sinusoidal waves that
differ in frequency. It is given as below,
2𝐸𝑏
𝑆 (t) = √ 𝑐𝑜𝑠2𝜋𝑓1 𝑡 𝑜≤𝑡≤
𝑖 𝑇𝑏 𝑇𝑏
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
i=1,2
2𝐸𝑏
(ie) 𝑆1 (t) = {√ 𝑇𝑏 cos2𝜋𝑓1 t 0 ≤ t≤ 𝑇𝑏
0
2𝐸
𝑏
𝑆2 (t) ={ √ 𝑇𝑏 𝑐𝑜𝑠2𝜋𝑓1 𝑡 𝑜≤𝑡≤𝑏
𝑜 𝑒𝑙𝑠𝑒𝑤ℎ𝑒𝑟𝑒
2
∅𝑗 (t) = √ 𝑇𝑏 0 ≤ 𝑡 ≤ 𝑇𝑏
𝑜 𝑒𝑙𝑠𝑒𝑤ℎ𝑒𝑟𝑒
Where j=1,2
𝑖=𝑗
Sij = { √𝐸𝑏 (4.9)
0 𝑖≠𝑗
According to equation 4
S11=√𝐸𝑏 S21=0
S12=0 S22=√𝐸𝑏
√0
S1=[ √ 𝐸𝑏 ] S2=[ ] (4.10)
0 √𝐸𝑏
Thus a coherent BFSK system has a two dimensional (N=2) Signal space with
two message points (M=2).The message points are defined by signal vectors. The
signal space digram has two regions Z1 and Z2 as in fig
x1 and x2
𝑇
x2 =∫0 𝑏 𝑥(𝑡)∅2(𝑡)𝑑𝑡 (4.11)
x(t)->received signal
The receiver deceids in favor of symbol 1 if the vector x falls in region Z1 and
the receiver decides ie) x1>x2
To generate a binary FSK signal, the input binary sequence m(t) is represented
in on- off form. Symbol is represented by √𝐸𝑏 and symbol 0 by zero volts. An eveter is
used to generate 𝑚(𝑡). Now m(t) is s multiplied by ∅1 (t) and 𝑚(𝑡) is multiplied by ∅2 (t)
ie)
` For symbol 1, the frequency f1 is transmitted to the summer and for symbol 0,
frequency fz is transmitted to the summer,
Now the output of summer is a binary FSK wave. The frequency of modulated wave is
shifted with a continuous phase, So FSK is called as continuous phase frequency shift
keying (CP-FSK)
4.4.3 Detection:
The received noisy signal s(t) is given as a common input to two correlators,
Another input to the correlators are the coherent reference signals ∅1 (t) and ∅2 (t). The
correlator outputs are then subtracted to get the value of l.
l= x1-x2 (4.12)
E[L/1] = E[X1/1]-[X2/1]
= √𝐸𝑏 -0
=√𝐸𝑏
E[L/0] = E[X1/0]-[X2/0]
=0-√𝐸𝑏
=-√𝐸𝑏
1 −1
FL (l/0)=
√2𝜋𝑁0
exp[2𝑁 (l+√𝐸𝑏 )2]
0
2
1
= √2𝜋𝑁 ∫∞ 𝑒𝑥𝑝[-(𝑙+√ 𝐸𝑏 ) ]dl
0 0 2𝑁0
(𝑙+√𝐸𝑏 )
Take Z=- 2𝑁0
∞
= 1 ∫ 𝐸𝑏 𝑒𝑥𝑝[−𝑍2]𝑑𝑧
√𝜋 √
2𝑁 0
Pe(0)=1 𝑒𝑟𝑓𝑐 ( √ 𝐸𝑏 )
2 2𝑁0
similarly
Pe(1)=1 𝑒𝑟𝑓𝑐 ( √ 𝐸𝑏 )
2 2𝑁0
1 𝐸𝑏
𝑃𝑒= 𝑒𝑟𝑓𝑐 ( √ )
2 2𝑁0
A binary FSK signal has two components, an is- phase component and a quadrature
component.
𝜋
In QPSK the phase of the carrier takes any one of the four values such as 4
3𝜋 5𝜋 7𝜋
, and .This is achieved by grouping the input binary sequence into dibits. Each
4 4 4
√ 2𝐸 𝜋 0≤𝑡≤𝑇
Thus 𝑆𝑖 (𝑡) = { 𝑇 𝐶𝑜𝑠 [2𝜋𝑓𝑐 + (2𝑖 + 1) 4 ]
0 elsewhere
(4.13)
where i=1,2,3&4
𝑛𝑐
𝑓𝑐= 𝑇
2𝐸 2𝐸
√ [𝑐𝑜𝑠 [(2𝑖 − 1) ] 𝐶𝑜𝑠(2𝜋𝑓𝑐 𝑡)] −√
𝜋 𝜋
𝑆𝑖 (𝑡) = { 𝑇 𝑇 [𝑆𝑖𝑛 [(2𝑖 − 1) ] 𝑆𝑖𝑛(2𝜋𝑓𝑐 for 0<t<T
4 4
𝑡)]
0 elsewhere
(4..14)
2
∅1 (𝑡) = √ 𝐶𝑜𝑠(2𝜋𝑓𝑐𝑡) 0≤𝑡≤𝑇
𝑇
2
∅2 (𝑡) = √ 𝑆𝑖𝑛(2𝜋𝑓𝑐𝑡) 0≤𝑡≤𝑇
𝑇
(4.15)
i==1,2,3,4
j=1,2
𝜋
√𝐸 𝐶𝑜𝑠 [(2𝑖 − 1) ]
Signal vector, Si=[ 4
] (4.16)
𝜋
−√𝐸 𝐷𝑖𝑛 [(2𝑖 − 1) 4 ]
Where, i=1,2,3,4..
Phase of QPSK Co-ordinates of Message points
Input Dibit
signal Si1 Si2
10 𝜋/ +√𝐸/2 −√𝐸/2
4
`
To realize the decision rule, the signal space is divided into four regions,
1. The set of points closest to the messange point associated with signal vector
S1→ Z1
2. The set of points closest to the message point associated with S2→ Z2
3. The set of points closest to the message point associated with S3→ Z3
4. The set of points closest to the message point associated with S4→ Z4
The received signal x(E) is difened by,
X(t)=s w(t) 0≤ t ≤ T
i=1,2,3,4
w(f)→ White Gaussian noise. The observation vector x of QPSK receive has to
elements x1 and x2
the observation vector x of QPSK receiver has two elements x1 and x2
𝑇
x1 =∫ 𝑥(𝑡)∅ (𝑡)𝑑𝑡 x2= ∫𝑇 𝑥(𝑡)∅ (𝑡)𝑑𝑡
0 1 0 2
The input binary wave in represented in polar form. Symbol 1→+√𝐸𝑏 & symbol
0→-√𝐸𝑏 . This wave is divided by means of a demultiplexer into two waves according
to odd & even numbered bits. The wave are represented by 𝑏1 (t) and 𝑏2 (t). These
waves separately modulate ∅1 (t) and ∅2 (t). The result is a pair of binary PSK waves
which are added to produce the desired QPSK wave.
Similarly E=2𝐸𝑏 .
𝑗6 𝑥1 >0, it is a binary 1
𝑗6 𝑥1 <0, it is a binary 0.
Finally the two binary sequences at the in – phase and quadrature o/p are
multiplexed to produce the binary wave.
`
2
𝐸 𝐸
𝖺 1 −(𝑥1−√ )) 𝖺 1 (𝑥2−√ ) 2
2
d 𝑥2
2
𝑝𝑐 = ∫0 √𝜋
exp[− 𝑁0
] 𝑑𝑥1 ∫0 √𝜋𝑁 0
exp 𝑁0
𝐸 𝐸
𝑥1−√ 𝑥2−√
Take Z=
2
= 2
√𝑁0 √𝑁0
2
1 ∫
𝑝𝑐 =[ √𝜋 −√ 𝐸
exp(−𝑧 2)]
2𝑁 0
2
1 𝐸
𝑝𝑐 = [1 − 𝑒𝑟𝑓𝑐(√ )]
2 2𝑁0
𝐸 𝐸
𝑝𝑐 = ( 1 − erf 2 c√ ) + ¼ (erf 2 c√ )
2𝑁0 2𝑁0
Now,
𝑝𝑐 = 1-𝑝𝑐
𝐸 𝐸
= (1 − erf c√ 2𝑁 ) − ¼ (erf c√ 2𝑁 )
2 2
0 0
The coefficients of the message powl are 𝑎𝑖 √𝐸0 E0 and 𝑏𝑖 √𝐸0 where (𝑎𝑖 , 𝑏𝑖 ) is an
element of the L-by –L matrix, where L=√M => M=L2
(−𝐿 + 1, 𝐿 − 1) (−𝐿 + 3, 𝐿 − 1) … … … . (𝐿 − 1, 𝐿 − 1)
{ai,bi} = (−𝐿 + 1, 𝐿 − 3) (−𝐿 + 3, 𝐿 − 3) … … … . (𝐿 − 1, 𝐿 − 3)
(−𝐿 + 1, −𝐿 + 1) (−𝐿 + 3, −𝐿 + 1) … … (𝐿 − 1, −𝐿 + 1)
4.6 Quadrature Amplitude Modulation
L=√16 =4
00 01 11 10
1. Probability of error:
1) Since the in-phase and quadrature components are independent, the probability
of correct detection is given by,
PC = (1-𝑃𝑒1 )2
𝑃𝑒1 = Probability of symbol error for either component
1 𝐸
1) 𝑃𝑒1 = (1 − 2) erfc ( √ 𝑁0 )
0
from above
1 𝐸0
𝑃𝑒 = 2(1- )𝑒𝑟𝑓𝑐 ( √ ) L=√𝑀
√𝑀 𝑁0
1
𝑃𝑒 =2(1 − ) 𝑒𝑟𝑓𝑐 ( √3𝐸𝑎𝑣
)
√𝑀 2(𝑀−1)𝑛0
and produces two parallel binary sequences whose bit rates are 𝑅𝑏 /2. The 2 to L level
converters [L = √𝑀]generate polar L level signals in response to the respective in-
phase and quadrature channel inputs. The two polar L-level signals are combined to
produce QAM wave.
4.6.3 Detection:
The received signal is decoded to produce L- level signals which are then given
to decision circuit. In this circuit the L- level signals are compared with L-1 decision
thresholds.
The o/p of two decision circuits are then combined in the parallel –to-serial
converter to produce the original binary sequence.
7. Carrier Synchronization:
In this method, the binary data is modulated by a carrier in such a way that the
power spectrum of the modulated signal contains a discrete component at the carrier
frequency.
PLL is used to track this component. It consists of a VCO, loop filter and
multipller that are connected in the form of a negative feed back system.
Disadvantage:
• The discrete component at the carrier frequency does not conveys any
information. So its transmission is waste of power.
It is used in M-ary PSK. When M=2, it is called as squaring loop. This method
exhibits phase ambiguity problem.
Fig: 4.21 Mth Power Loop
In case of BPSK, the squaring loop contains a squaring device at its input end.
Due to this changing the sign of i/p signal does not affects the recovered carrier. So
the squaring loop exhibits a 180• phase ambiguity.
Costas loop includes two paths → in – phase path and quadrature path. The two
paths are coupled together via a common VCO to form a negative feedback system.
When synchronization is achieved the demodulated data appears at the o/p of in –
phase path and corresponding o/p of quadrature path is zero.
Costas loop also exhibits phase ambiguity problem. In M-ary PSK it exhibits M-
phase ambiguities in the interval (0,2𝜋).
2𝐸𝑏
𝑆1 (𝑡) ={ √ 𝑇𝑏 cos (2𝜋𝑓𝑖 𝑡) 0 ≤ 𝑡 ≤ 𝑇𝑏
0 𝑒𝑙𝑠𝑒 𝑤ℎ𝑒𝑟𝑒
Where fi equals one of two possible values𝑓1 & 𝑓2. The transmission of frequency
f1 represents symbol 1 and transmission of frequency f2 represents symbol 0.
For non- coherent detection of FSK, the receiver consists of a pair of matched
filters followed by envelope detectors as in fig.
The filter in the upper path of the receiver is matched to √2/Tb cos(2𝜋f 2𝑡) and
0≤ t≤ 𝑇𝑏
The o/p of envelope detector are sampled at t=𝑇𝑏 and their values are
compased.
If l1>l2, the receiver decides in favour of symbol 1. If l1<l2, the receiver decides in
favour of symbol 0.
𝑃𝑒 =1exp(−𝐸𝑏 )
2 2𝑁0
𝑏𝐸 √ ﻟcos(2𝜋fct) 0 ≤ t ≤ 𝑇𝑏
2𝑇𝑏
𝑆2 (𝑡) =
❪ 𝐸𝑏 cos(2𝜋𝑓𝑐𝑡 + 𝜋) 𝑇 ≤ t ≤ 2𝑇
√ 𝑏 𝑏
𝗅 2𝑇 𝑏
Therefore,
1 −𝐸𝑏
𝑃𝑒 = 𝑒𝑥𝑝 ( )
2 𝑁0
modulo –2
bk→ i/p binary digit at KTb
dk-1 → previous va;ie pf differentially encoded bit
d-k-1 & b-k →logical inversion
Fig: 4.24 DPSK Transmitter
The transmitter of DPSK consists of a logic network and a one- bit delay
element to convert an i/p binary sequence {bk} into a differentially encoded sequence
dk according to eqn1. This sequence is amplitude level shifted and used to modulate a
carrier wave of frequency fc, and results DPSK wave.
Unit IV
1. Implement BPSK, BFSK in MATLAB and compute performance comparison of
BPSK and BFSK with respect to Probability of error and Bit Error Rate
Hint: Matlab program is available in net. Students can refer that and make the
comparison and tabulate it.
2. Implement QPSK, QAM u s i n g m a t l a b c o d e a n d c o m p a r e
the performance of both modulation.
6.5 Part A
Questions & Answers
(Unit-IV)
UNIT-IV DIGITAL MODULATION SCHEMES
PART – A (Q&A)
Bloom’s
Questions CO’S
Level
1. Define ASK.
In ASK, carrier is switched on when binary 1 is to be
K2 CO4
transmitted and it is switched off when binary D is to be
transmitted ASK is also called on-off keying.
A. Coherent detection:
In this method the local carrier generated at the receiver is CO4
phase locked with the carrier at the transmitter. Hence it is K2
called synchronous detection
B. Non coherent detection:
In this method, the receiver carrier need not be phase locked
with transmitter carrier. Hence it is called envelope detection.
14. Write the expression for bit error rate for coherent binary
FSK.
CO4
Bit error rate for coherent binary FSK is given as, Pe = K3
1/2erfc√0.6E/No.
K3 CO4
K3 CO4
6.6 Part B
Questions
(Unit - IV)
UNIT-IV Digital Modulation Schemes
PART – B (Questions)
Bloom’s
Questions CO’S
Level
1. https://nptel.ac.in/courses/117/101/117101051/
Topics covered:
1. Introduction to Digital Communication
2. Sampling
3. Quantization
4. Encoding
5. PCM and Delta Modulation
6. Channels and Models
7. Information Theory
8. Digital Modulation Techniques
9. Source Coding
10. Equalizers
11. Channel Coding
2. https://nptel.ac.in/courses/108/102/108102096/
Topics covered:
All the topics of Unit I to V
3. https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-450-
principles-of-digital-communications-i-fall-2006/video-lectures/
Topics covered:
All the topics of Unit I to V
4. http://www.infocobuild.com/education/audio-video-courses/electronics/modern-
digital-communication-iit-kharagpur.html
Topics covered:
All the topics of Unit I to V
6.8 Real time
Applications in Day to
Day life and to
Industry
A. Implementation of High Order QAM Modulation on SDR
Link: https://iopscience.iop.org/article/10.1088/1742-6596/1302/2/022095/pdf
B. QPSK in TTL upconverters
Link: https://nardamiteq.com/docs/SEC03C32.PDF
The higher carrier power level of this operating mode makes carrier to
output (LO-to-RF) isolation especially important so that QPSK phase and
amplitude accuracy is maintained. The model SMC0206LI1CD QPSK modulator is
an example of high-isolation (50 dB LO to RF) mixers driven by the carrier at +16
dBm which achieves ±4°, ±0.4 dB phase and amplitude accuracy with +10 dBm
I/Q inputs.. In many cases, the hardware is identical; but the catalog test data
describes and guarantees either QPSK amplitude/phase accuracy for the
modulation driven units or sideband suppression for the carrier driven units.
Optional data is available in both modes. Many of the QPSK/QAM modulators in
this section of the catalog are wide RF bandwidth units intended for test and
Link: https://www.cablefree.net/wirelesstechnology/ofdm-introduction/
Accordingly, OFDM, Orthogonal Frequency Division Multiplexing is used for many of the latest wide
bandwidth and high data rate wireless systems including Wi-Fi, cellular telecommunications and
many more.
The fact that OFDM uses a large number of carriers, each carrying low bit rate data,
means that it is very resilient to selective fading, interference, and multipath effects, as well
providing a high degree of spectral efficiency.
`Early systems using OFDM found the processing required for the signal format was
relatively high, but with advances in technology, OFDM presents few problems in terms of the
processing required.
Development of OFDM
The use of OFDM and multicarrier modulation in general has come to the fore in recent
years as it provides an ideal platform for wireless data communications transmissions.
However the concept of OFDM technology was first investigated in the 1960s and 1970s
during research into methods for reducing interference between closely spaced channels. IN
addition to this other requirements needed to achieve error free data transmission in the presence
of interference and selective propagation conditions.
Initially the use of OFDM required large levels of processing and accordingly it was not viable for
general use.
Some of the first systems to adopt OFDM were digital broadcasting - here OFDM was able
to provide a highly reliable form of data transport over a variety of signal path conditions. Once
example was DAB digital radio that was introduced in Europe and other countries. It was
Norwegian Broadcasting Corporation NRK that launched the first service on 1st June 1995. OFDM
was also used for digital television.
Later processing power increased as a result of rising integration levels enabling OFDM to
be considered for the 4G mobile communications systems which started to be deployed from
around 2009. Also OFDM was adopted for Wi-Fi and a variety of other wireless data systems.
What is OFDM?
To see how OFDM works, it is necessary to look at the receiver. This acts as a bank of
demodulators, translating each carrier down to DC. The resulting signal is integrated over
the symbol period to regenerate the data from that carrier. The same demodulator also
demodulates the other carriers. As the carrier spacing equal to the reciprocal of the
symbol period means that they will have a whole number of cycles in the symbol period
and their contribution will sum to zero - in other words there is no interference
contribution.
One requirement of the OFDM transmitting and receiving systems is that they must be
linear. Any non-linearity will cause interference between the carriers as a result of inter-
modulation distortion. This will introduce unwanted signals that would cause interference
and impair the orthogonality of the transmission.
In terms of the equipment to be used the high peak to average ratio of multi-carrier
systems such as OFDM requires the RF final amplifier on the output of the transmitter to
be able to handle the peaks whilst the average power is much lower and this leads to
inefficiency. In some systems the peaks are limited. Although this introduces distortion
that results in a higher level of data errors, the system can rely on the error correction to
remove them.
that the receiver can separate them using a filter and there must be a
guard band between them. This is not the case with OFDM. Although the
sidebands from each carrier overlap, they can still be received without the
interference that might be expected because they are orthogonal to each another.
This is achieved by having the carrier spacing equal to the reciprocal of the
symbol period.
To see how OFDM works, it is necessary to look at the receiver. This acts
as a bank of demodulators, translating each carrier down to DC. The resulting
signal is integrated over the symbol period to regenerate the data from that
carrier. The same demodulator also demodulates the other carriers. As the carrier
spacing equal to the reciprocal of the symbol period means that they will have a
whole number of cycles in the symbol period and their contribution will sum to
zero - in other words there is no interference contribution.
One requirement of the OFDM transmitting and receiving systems is that
they must be linear. Any non-linearity will cause interference between the carriers
as a result of inter-modulation distortion. This will introduce unwanted signals that
would cause interference and impair the orthogonality of the transmission.
In terms of the equipment to be used the high peak to average ratio of
multi-carrier systems such as OFDM requires the RF final amplifier on the output
of the transmitter to be able to handle the peaks whilst the average power is
much lower and this leads to inefficiency. In some systems the peaks are limited.
Although this introduces distortion that results in a higher level of data errors, the
system can rely on the error correction to remove them.
Key features of OFDM
The OFDM scheme differs from traditional FDM in the following interrelated ways:
Multiple carriers (called subcarriers) carry the information stream
OFDM advantages
OFDM has been used in many high data rate wireless systems because of the
many advantages it provides.
Immunity to selective fading: One of the main advantages of OFDM is that
is more resistant to frequency selective fading than single carrier systems because
it divides the overall channel into multiple narrowband signals that are affected
individually as flat fading sub-channels.
Resilience to interference: Interference appearing on a channel may be
bandwidth limited and in this way will not affect all the sub-channels. This means
that not all the data is lost.
Spectrum efficiency: Using close-spaced overlapping sub-carriers, a
significant OFDM advantage is that it makes efficient use of the available
spectrum.
Resilient to ISI: Another advantage of OFDM is that it is very resilient to inter-
symbol and inter-frame interference. This results from the low data rate on each
of the sub-channels.
Resilient to narrow-band effects: Using adequate channel coding and
interleaving it is possible to recover symbols lost due to the frequency selectivity
of the channel and narrow band interference. Not all the data is lost.
Simpler channel equalisation: One of the issues with CDMA systems was the
complexity of the channel equalisation which had to be applied across the whole
channel. An advantage of OFDM is that using multiple sub-channels, the channel
equalization becomes much simpler.
OFDM disadvantages
Whilst OFDM has been widely used, there are still a few disadvantages to its use
which need to be addressed when considering its use.
High peak to average power ratio: An OFDM signal has a noise like
amplitude variation and has a relatively high large dynamic range, or peak to
average power ratio. This impacts the RF amplifier efficiency as the amplifiers
need to be linear and accommodate the large amplitude variations and these
factors mean the amplifier cannot operate with a high efficiency level.
7. ASSESSMENT SCHEDULE
TEST SCHEDULE
Internal Assessment Test I : 9.09.2023 TO 15.09.2023
ADDITIONAL REFERENCES
1. Herbert Taub & Donald L Schilling, “Principles of Communication
Systems”, 3rd Edition, Tata McGraw Hill, 2008
2. Bruce Carlson, ”Communication Systems”, 3rd Edition, Tata Mc Graw
Hill.
3. R.P Singh and S.D.Sapre, “Communication Systems – Analog and
Digital”,Tata McGraw Hill, 2nd Edition, 2007.
4. J.G.Proakis, M.Salehi, “Fundamentals of Communication Systems”,
Pearson Education 2006.
5. Couch.L., “Modern Communication Systems”, Pearson, 2001.
6. S. Haykin, “Communication Systems”, John Willy & Sons.
7. A.B. Carlson, “Communication Systems”, Mc-Graw-HW.
8. P Chakrabarti Dhanpat Rai, “Analog Communication Systems”.
9. Taub, Herbert & Schilling, Donald L. “Communication Systems” Tata
McGraw-Hill
10. Carlson, A. Bruce, Crilly, Paul B. & Rutledge, Janet C, “Communication Systems an
Introduction to Signals & Noise in Electrical Communication” , Tata McGraw-Hill.
11. Kennedy, George & Davis, Bernard “Electronic Communication Systems”, 4th
Edition, Tata McGraw-Hill.
12. Singh, R.P. & Sapre, S.D. “Communication Systems: Analog Digital” Tata McGraw-
Hill.
13. Sanjay Sharma, “Communication Systems (Analog and Digital)”, Reprint 2013
Edition , S.K. Kataria & Sons, 2013.
9. MINI PROJECT
Mini Project List
1. Hand Gesture Controlled Robot using Arduino
https://www.electronicshub.org/hand-gesture-controlled-robot/
Disclaimer:
This document is confidential and intended solely for the educational purpose of RMK Group of
Educational Institutions. If you have received this document through email in error, please notify the
system manager. This document contains proprietary information and is intended only to the
respective group / learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender immediately by e-mail if you
have received this document by mistake and delete this document from your system. If you are not
the intended recipient you are notified that disclosing, copying, distributing or taking any action in
reliance on the contents of this information is strictly prohibited.