Unit 2 Digital Communications
Unit 2 Digital Communications
Unit 2 Digital Communications
2 | Comm 2 Techniques
53
2.1. Introduction
In case of analog modulation techniques described so far, sine wave is used as the
carrier signal. Sine wave values are defined for all the instants of time and hence
analog modulation is also termed as continuous wave (CW) modulation. Nothing
prevents us from replacing the sine wave with another wave as the carrier. The most
useful one that helped in advancing the communication field is the pulse train in place
of sine wave. On the similar lines of sine wave being characterized in terms of its
parameters amplitude, frequency and phase, the pulse train can also be characterized
in terms of its parameters, namely, amplitude, width and position of the pulse. CW
modulation is obtained by varying one of the parameters of the sine wave with the
instantaneous variations of the message. Similarly, pulse modulation can be obtained
by varying one of the parameters of the pulse train with respect to the message. Pulse
modulation is further classified as pulse analog and pulse digital, depending on
whether the parameter of the pulse is continuous or discrete in nature. Collectively all
are termed as pulse modulation techniques. This chapter deals with studying different
pulse modulation techniques.
In case of pulse train, the pulses by themselves occur at discrete instants of time.
However, the parameters of the pulse, namely, amplitude, width and position are
continuous in nature. If amplitude of the pulse is made proportional to the message,
then it is termed as pulse amplitude modulation (PAM). Alternatively, if the width of
the pulse is made proportional to the message, then it is termed as pulse width
modulation (PWM). The position of the pulse, i.e., its instant of occurrence compared
to its position in the reference pulse train is varied in proportion to the message in
case of pulse position modulation (PPM). Finally, the amplitude of the pulse can be
approximately represented by a discrete amplitude value which leads to the pulse code
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
54
modulation (PCM). Further variants of PCM include delta modulation (DM) and
differential PCM (DPCM). To summarize, in case of pulse analog modulation, time is
discrete, but the pulse parameters are analog, whereas, both time and pulse
parameters are discrete in case of pulse digital modulation.
The pulse analog modulation techniques are of three types namely, PAM, PWM and
PPM. This section describes each of them and also about the recovery of message from
them.
Pulse amplitude modulation is defined as the process of varying the amplitude of the
pulse in proportion to the instantaneous variations of message signal. Let the message
signal be given by
𝑣𝑚 = 𝑉𝑚 𝑠𝑖𝑛𝜔𝑚 𝑡
If x(t) is a periodic signal with period 𝑇0 , then it should satisfy the definition stated
as x(t) = x (t + 𝑇0 ). The pulse train is a periodic signal with some fundamental period
say 𝑇0 . Then the information present in each period of the pulse train is given by
𝑝 = 𝑉𝑝 0≤𝑡≥∆
=0 ∆≤ 𝑡 ≥ 𝑇0
where ∆ is the width of the pulse and the leading edge of the pulse is assumed to be
coinciding with the starting of the interval in each period.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
55
The pulse amplitude modulated wave in the time domain is obtained by multiplying
the message with the pulse train and is given by
𝑃𝑎 = 𝑝 × 𝑣𝑚
Substituting p in the above equation we get
𝑃𝑎 = 𝑉𝑝 𝑉𝑚 𝑠𝑖𝑛𝜔𝑚 𝑡 0≤𝑡≥∆
=0 ∆≤ 𝑡 ≥ 𝑇0
Figure 5.1 shows the message, pulse train and PAM signal. The amplitude of the PAM
signal follows the message signal contour and hence the name. It can be shown that
the spectrum of PAM signal is a sine function present at all frequencies (for
derivation, please refer to the topic of Fourier series in any of the signals and systems
textbook). Of course, its significant spectral amplitude values will be in the low
frequency range and tapers off as we move towards the high frequency range. The
message signal is a low frequency signal. Multiplication of the two for generating the
PAM signal results in the convolution of their spectra in the frequency domain. Thus
PAM signal still retains the message spectrum in the low frequency range after
modulation. This is the difference between amplitude modulation of sine wave and
pulse train. Therefore, PAM is not useful like AM for communication. Alternatively,
PAM is found to be useful in understanding the sampling process to be described next.
Sampling Process Sampling is a signal processing operation that helps in sensing the
continuous time signal values at discrete instants of time. The sampled sequence will
have amplitudes equal to signal values at the sampling instants and undefined at all
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
56
other times. This process can be conveniently performed using PAM described above.
The sampling process can be treated as an electronic switching action as shown in Fig.
5.2, The continuous time signal to be sampled is applied to the input terminal. The
pulse train is applied as the control signal of the switch. When the pulse occurs, the
switch is in ON condition, that is, acts as short circuit between input and output
terminals. The output value will therefore be equal to input. During the other intervals
of the pulse train, the switch is in OFF condition, that is, acts as open circuit. The
output is therefore undefined. The output of the switch will be essentially a PAM
signal. Any active device like diode, transistor or FET can be used as a switch.
In the context of sampling process, there are other aspects that need to be considered
with respect to the pulse train. The first and foremost is how often the signal needs to
be sampled or sensed, so that when needed an approximate version of the continuous
time signal can be reconstructed. This is based on the well-known sampling theorem
which states that the sampling frequency (f) i.e., number a/samples per second should be
greater than or equal to twice the maximum frequency component (𝐹𝑚 ) of the input signal.
𝐹𝑠 ≥ 2𝐹𝑚
The minimum possible value of sampling frequency is termed as Nyquist rate. Thus
the sampling theorem will decide the periodicity associated with the pulse train. The
second important aspect is, the width of the pulse ∆ should not influence the
amplitude of the sampled value. Even though this point is not obvious in the time
domain, it can be understood by observing the frequency domain behavior of the
PAM process due to the convolution of sine function of pulse train with the input
signal spectrum. To minimize this effect, for all practical processing ∆→ 0. so that the
pulse train becomes on impulse train. The Fourier transform of an impulse train is
also an impulse train in the frequency domain. Therefore, convolution will not affect
the shape of the sampled signal. It only leads to periodicity of the spectrum!
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
57
Example 1:
A message signal made of multiple frequency; components has a maximum frequency
value of 4 kHz. Find out the minimum sampling frequency required according to the
sampling theorem.
Solution:
𝐹𝑚 = 4 𝑘𝐻𝑧
𝐹𝑠 ≥ 2 × 𝐹𝑚 = 2 × 4 𝑘𝐻𝑧 = 8 𝑘𝐻𝑧
Example 2:
A message signal has the following frequency components: a single tone sinewave
of 500 Hz and sound of frequency components with lowest value o/750 Hz and
highest value of 1800 Hz. What should be the minimum sampling frequency to sense
the information present in this signal according to the sampling theorem?
Solution:
𝐹𝑚 = 1800 𝐻𝑧
𝐹𝑠 ≥ 2 × 𝐹𝑚 = 2 × 1800 𝐻𝑧 = 3600 𝐻𝑧
Pulse width modulation (PWM) is defined as the process of varying the width of the
pulse in proportion to the instantaneous variations of message.
Let ∆ be the width of the pulse in the unmodulated pulse train. ln PWM
∆ 𝛼 𝑣𝑚
Mathematically, the width of pulse in PWM signal is given by
∆𝑚 = ∆ (1 + 𝑣𝑚 )
When there is no message, i.e., 𝑣𝑚 = 0, then the width of the pulse will be equal to the
original width ∆ For positive values of message, the width will be proportionately
increases by (1 + 𝑣𝑚 ) factor. For negative values of message, the width decreases by
(1 − 𝑣𝑚 ) factor.
Figure 5.3 shows the generation of PWM signal. The amplitude of the pulse remains
constant in this case. Thus, PWM is more robust to noise compared to PAM. This is
the difference with respect to PAM signal. The mathematical treatment about the
frequency domain aspect of PWM is an· involved process. However, the resulting
PWM will still have the spectrum in the baseband region itself. The illustration given
in Fig. 5.3 is made only using trailing edge of the pulse. We can also perform the same
using either leading edge or both. Even though, the PWM signal also contains the
message information in the pulse train, it is seldom used as a sampling process to
discretize the continuous time signal as in PAM case due to its indirect way of storing
message information and also the randomness involved in the width modification.
Thus, PWM has limited use in signal processing and communication field.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
58
Alternatively, PWM finds use in power applications like direct current (de) motor
speed control as described next.
Speech Control of DC Motors using PWM. The speed of the de motor depends on the
average dc voltage applied across its terminals. Suppose if V volts is the voltage for
running the de motor at its full speed, then 0 volt is the voltage for the rest condition
of dc motor. Now, the speed of the dc motor can be varied from its rest to full speed
value by varying the dc voltage. This can be conveniently performed with the help of
PWM as illustrated in Fig. 5.4. The constant dc voltage source is applied across the
terminals of dc motor through a gating circuit controlled by the PWM signal. The
gating circuit will essentially convert the constant dc source into a variable dc source.
Suppose when there is no modulation, the width of the pulse will be the original value
∆ and let this run the dc motor at some speed. Now when the width increases, the
voltage value increases from its unmodulated case and hence the speed. It happens in
the opposite way for the decrease in width. Thus, PWM provides a convenient and
efficient approach for the speed control of dc motors.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
59
Pulse position modulation (PPM) is defined as the process of varying the position of
the pulse with respect to the instantaneous variations of the message signal.
Let 𝑡𝑝 indicates the timing instant of the leading or trailing edge of the pulse in each
period of the pulse train. In PPM
𝑡𝑝 𝛼 𝑣𝑚
Mathematically, the position of the leading or trailing edge of the pulse (in each
period) in PPM signal is given by
𝑡𝑝 = 𝑓(𝑣𝑚 )
When there is no message, then the position of the leading or trailing edge of the
pulse will be equal to the original position and hence 𝑡𝑝 = 0. For positive values of
message, the position will be proportionately shifted right by 𝑡𝑝 = 𝑓(𝑣𝑚 ). For negative
values of message, the position will be proportionately shifted left by −𝑡𝑝 = −𝑓(𝑣𝑚 )
factor. One way of generating PPM is to generate PWM and post process the same to
get PPM.
Figure 5.5 shows the generation of PPM signal. As illustrated in the figure, if PWM is
generated by varying the width of the trailing edge, then this edge will be extracted
to get the position of the pulse in each period. Once the position is extracted, the
leading or trailing edge of the pulse is placed at this instant. The amplitude and width
of the pulse remain constant as in the original pulse train. Thus, PPM is equally robust
to noise like PWM. The mathematical treatment about the frequency domain aspect
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
60
of PWM is an involved process. However, the resulting PPM will also have the
spectrum in the baseband region itself. Alternatively, if PWM is generated by varying
the leading edge, then this edge needs to be extracted to generate PPM and any edge
can be used in case of modification of both edges. Even though, the PPM signal also
contains the message information in the pulse train; it is seldom used due to its
indirect way of storing message. information as in PWM and also the randomness
involved in the position modification. Thus, PPM is of theoretical interest only and
has limited use in signal processing and communication field.
PAM, PWM and PPM stores the message is the baseband itself. They essentially
represent the message information at discrete instants of time. Further the message
signal is coded in one of the pulse parameters. We can recover the message that is,
reconstruct the approximate version of the continuous time signal from them when
needed. This is illustrated in Fig. 5.6. The process is straightforward in case of PAM.
The PAM signal can be passed through a low pass niter which retains essentially the
low frequency message signal and smoothing out the pulse train information.
Alternatively, demodulation of message from PWM and PPM appears to be difficult,
since visually the message information is not available as amplin1de variations.
However, the same is available in the other forms as width and position variations.
One simple way of thinking the possibility of demodulation process is to first convert
PWM and PPM to PAM and then perform low pass filtering.
The most important pulse digital modulation techniques include PCM, DM and
DPCM. This section describes each of them and also recovering approximate analog
message signal from them.
The fundamental and most important pulse digital modulation technique is the pulse
code modulation (PCM). This technique is the breakthrough for moving from analog
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
61
The quantization can be carried out either by dividing the whole amplitude range
into uniform or nonuniform intervals. Accordingly, we have uniform and nonuniform
quantization. PCM is also named after the same as uniform or nonuniform PCM. The
nonuniform quantization and hence PCM are based on the observation of the
nonuniform distribution of signal values within the allowable limits. For instance,
in case of speech, most of the signal values are around the zero level and few will be
in the maximum range. Hence benefit can be achieved in terms of quantization noise
by using nonuniform quantization. However, nonuniform quantization is relatively
difficult to implement compared to uniform quantization.
Each of the discrete amplitude levels can be uniquely represented by a binary word.
To facilitate this, the total number of discrete levels are decided to be in powers of 2.
For instance, if the binary word is of 8-bit length, then we will have 256 discrete levels
possible. Thus, each analog value is sampled by PAM process, quantized and
represented by a binary word. Hence the name pulse code modulation where the
pulse modulation involves coding the sampled analog values. The PCM technique is
illustrated in Fig. 5.7. The sampler block essentially performs PAM process and the
only difference is the pulse width ∆→ 0. The input of sampler block will have signal
which is continuous both in time and amplitude. The output of sampler block will
have the signal which is discrete in time and continuous in amplitude. The output of
quantizer will have signal which is discrete both in time and amplitude. The output
of the encoder will have unique binary code for each discrete amplitude value. The
whole process of sampling, quantizing and encoding is also termed as analog to
digital conversion (ADC) operation. Thus, for any analog signal, the output of ADC is
nothing but PCM signal.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
62
The block diagram of delta modulator is given in Fig. 5.8 drawn by referring to the
block diagram of PCM given in Fig. 5.7. The sampler block remains 'same as in the
PCM, except that the sampling frequency is much higher than in PCM case (say 4
times or more). According to the principles of DM, the quantizer needs to discretize
the amplitude value by referring to the previous value and say whether it is larger or
smaller. Hence an accumulator is needed to store previous sample, a summer as a
comparing device and producing output into two discrete levels as +𝛿 and −𝛿 . The
encoder is trivial which directly maps the signs of 𝛿 into I or 0. The sequence of 1's
and 0's at the output of encoder constitutes the DM wave.
Differential pulse code modulation (DPCM) first estimates the predictable-part from
the signal and then codes the unpredictable or error signal in terms of unique binary
words as in PCM and hence the name. The motivation for the same is that most
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
63
The block diagram of DPCM modulator is given in Fig. 5.9 drawn again by referring
to the PCM block diagram in Fig. 5. 7. The input analog signal is passed through the
predictor block whose function is to segregate the information into predictable and
unpredictable parts. The unpredictable part is passed through sampler, quantizer and
encoder blocks to get PCM corresponding to it. The predictable part is directly passed
through the encoder to get the codes. Both these are combined to get the DPCM wave
representing sequence of binary words corresponding to both the parts.
The demodulation of PCM is straightforward. Figure 5.10 shows the block diagram
for the reconstruction of analog signal in case of PCM. For obtaining PCM from
analog signal, ADC was employed. Therefore, for obtaining analog signal from PCM,
the reverse of ADC namely, digital to analog conversion (DAC) is required. Thus, the
binary words are applied one at a time to a DAC circuit to obtain equivalent analog
value. How close the reconstructed analog value to the original depends on the
amount of approximation errors introduced due to ADC and DAC conversion. By
the proper choice of binary word length, it has been found that the errors are indeed
negligible from the perception point of view.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
64
The block diagram of demodulation in case of DM is given in Fig. 5. 11. The DM needs
to transmit the first sample and then the OM wave. By combining both, the analog
signal can be reconstructed from the DM wave in the following way: The second
sample is constructed from the first sample by adding to ±𝛿. The second sample is
then stored in the accumulator for future reference. The third sample is constructed
from the second sample using ±𝛿. The process continues till the last sample is
reconstructed.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
65
The basic motivation for analog modulation is to develop techniques for shifting the
analog message signal from low to high frequency range so that it can be conveniently
transmitted over high frequency communication channels. This resulted in AM, FM
and PM techniques. The pulse modulation represents the message signal at discrete
instants of time. However, the resulting message will still be in the low-frequency
region. Thus, pulse modulation is essentially used for the digitization of analog
message (like PCM) and represent if possible, in compact manner (like DPCM). The
digitized message is nothing but sequence of 0's and 1's termed more commonly as
digital or binary message. Thus, using a suitable pulse modulation technique, we can
convert analog message into digital from. Alternatively, the message may be directly
generated in digital form like in the case of computer.
The requirement in the digital communication field is to transfer the digital message
from one place to the other. There are broadly two approaches, namely, baseband
transmission and passband transmission. Baseband digital transmission involves
transmission of digital message in the low frequency (baseband) range itself. Passband
transmission involves transmission of digital message in the high frequency
(passband) range. Since, original digital message is in baseband range, it is first
modulated to the high frequency range and then transmitted. The set of modulation
techniques for shifting the digital message from the baseband to passband are termed
as digital modulation techniques. The detailed study of these techniques is the aim of this
chapter.
The digital modulation techniques are based on the conventional analog modulation
techniques. Since the digital message will have only two levels, 0 and l, the modulation
process needs to store this information in the high frequency range. This can be done
using AM, FM and PM techniques. Accordingly, we have amplitude shift keying (ASK),
frequency shift keying (FSK) and phase shift keying (PSK) as basic digital modulation
techniques. ASK deals with shifting the amplitude of the carrier signal between two
distinct values. FSK deals with shifting the frequency of the carrier signal between two
distinct values. Similarly, PSK deals with shifting the phase of the carrier signal
between two distinct values.
Apart from these basic digital modulation techniques, their variants are also available
termed as M-ary digital modulation techniques. These include M-ary ASK, M-ary FSK
and M-ary PSK. The hybrid schemes involving more than one parameter variation like
amplitude-phase shift keying (APK) are also present under M-ary digital modulation
techniques. The main merit of M-ary techniques is the increased transmission rate for
the given channel bandwidth. From the perspective of M-ary, the basic digital
modulation techniques are also termed as binary digital modulation techniques.
Accordingly, we have binary ASK (BASK), binary FSK (BFSK) and binary PSK
(BPSK).
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
66
Thus, there are a number of digital modulation techniques for passband digital
message transmission. The choice of a particular technique is based on the two
important resources of communication namely, transmitted power and channel
bandwidth. The ideal requirement is the one which uses minimum transmitted power
and channel bandwidth. But this will be conflicting requirements, i.e., to conserve
bandwidth we need to spend more power and hence trade off needs to be achieved.
ASK is a digital modulation technique defined as the process of shifting the amplitude
of the carrier signal between two levels, depending on whether 1 or 0 is to be
transmitted.
Let the message be binary sequence of 1's and 0's. It can be represented as a function
of time as follows:
𝑣𝑚 = 𝑉𝑚 when symbol is 1
=0 when symbol is 0
Figure 6.1 shows the time domain representation of the generation of ASK signal. The
digital message i.e., binary sequence can be represented as a message signal as shown
in Fig. 6.1 a. The carrier signal of frequency 𝑓𝑐 = 𝜔𝑐 /2𝜋 is generated continuously from
an oscillator circuit as shown in Fig. 6. lb. When the oscillator output is multiplied by
the message signal, it results in a signal as shown in Fig. 6.1 c termed as ASK signal.
When the binary symbol is 1, the ASK signal will have information equal to the carrier
multiplied by message amplitude and when the binary symbol is 0, it will be zero.
Thus the output shifts between two amplitude levels, namely, 𝑉𝑚 𝑉𝑐 and 0. Hence the
name amplitude shift keying. Based on this discussion a block diagram for the
generation of ASK signal can be written as given in Fig. 6.2. ASK modulator is
essentially an analog multiplier that takes baseband message 𝑉𝑚 and passband carrier
𝑉𝑐 and multiplies the two resulting in the product signal termed as ASK.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
67
The next question is whether such a process results in the shift of spectrum of
baseband message to the passband? The answer is from the amplitude modulation
process discussed in the earlier chapter. This can be illustrated pictorially as follows:
Without worrying about the mathematical intricacies, let the spectrum of 𝑉𝑚 be as
shown in Fig. 6.3a. It will be essentially a sine function in the frequency domain and
has information concentrated mainly in the low frequency range. The sinusoidal
carrier 𝑉𝑐 will have impulses 𝑓𝑐 and −𝑓𝑐 shown in Fig. 6.3b. The product of the two in
the time domain results convolution in the frequency domain giving rise to the
spectrum of ASK signal as shown in Fig. 6.3c. Thus, the ASK signal will have the
message shifted to the passband range.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
68
Demodulation of ASK Signal The demodulation is also tem1ed as detection. There are
two ways in which the message can be demodulated, namely, coherent and non-
coherent detection. Due to the requirement of carrier in the receiver which is in
synchronism with that of the transmitter, the coherent detection circuit is more
complex compared to non-coherent detector. However, the coherent detector
provides better performance under noisy condition.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
69
Figure 6.5 shows the block diagram of non-coherent ASK detector. The output of the
diode will be a unipolar signal containing the envelope information. The high
frequency variations are further removed by passing it through a low pass filter.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
70
The output of the low pass filter may be further refined by passing it through a
comparator which compares the output of the envelope detector to a preset
threshold and sets all values greater than or equal to the threshold to high level and
rest to the low level. The waveforms at various stages of the non-coherent ASK
detector are shown in Fig. 6.6.
FSK is a digital modulation technique defined as the process of shifting the frequency
of the carrier signal between two levels, depending on whether 1 or 0 is to be
transmitted.
Figure 6.7 shows the time domain representation of the generation of FSK signal. The
digital message, i.e., binary sequence can be represented as a message signal as shown
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
71
in Fig. 6.7a. Two carrier signals of frequencies 𝜔𝑐1 and 𝜔𝑐2 as shown in Figs. 6. 7 b
and c. When binary symbol is 1, the FSK signal will have the carrier signal with
frequency 𝜔𝑐1. Alternatively, the FSK signal will have the carrier signal with
frequency 𝜔𝑐2 when the binary symbol is 0. This can be achieved by using a suitable
combinational logic circuit which selects one of the two carrier signals based on the
input signal value applied at its control input. For instance, a 2 × 1 multiplexer can
be used for this purpose. Thus, the output of the multiplexer shifts between the two
distinct frequency values, namely, 𝜔𝑐1 and 𝜔𝑐2. Hence, the name frequency shift
keying. Based on this discussion a block diagram for the generation of FSK signal can
be written as given in Fig. 6.8. FSK modulator is essentially a 2 × 1 multiplexer that
takes baseband message 𝑣𝑚 at the control input and two carriers 𝑣𝑐1 and 𝑣𝑐2 at its
input, and produces the FSK signal at its output.
The next question is whether such a process results in the shift of spectrum of
baseband message to the passband? The answer is yes. To appreciate this, we can treat
the FSK modulation process conceptually as two ASK processes, one using carrier
signal with frequency 𝜔𝑐1, and other using 𝜔𝑐2. This is shown in Fig. 6.9. Thus the first
ASK modulator shifts the baseband message to passband centered around 𝜔𝑐1, and
the second ASK modulator shifts the baseband message to passband centered around
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
72
Demodulation of FSK Signal. In this case also, the message can be demodulated either
by coherent or non-coherent detection. Both demodulation processes can be
understood easily by considering the ASK view of FSK as illustrated in Fig. 6.9.
The block diagram for the coherent detection of FSK is drawn as given in Fig. 6.11.
The incoming FSK signal is multiplied by the carrier signal with frequency 𝜔𝑐1 in the
upper channel and carrier signal with frequency 𝜔𝑐2 in the lower channel. The output
of the multiplier in the upper channel will be low frequency message and ASK signal
at twice 𝜔𝑐1 during the intervals when the FSK is due to the carrier of frequency cod
and will be ASK signals at (𝜔𝑐1 ± 𝜔𝑐2 ) during intervals when the FSK is due to the
carrier of frequency 𝜔𝑐2. Thus the output of the low pass filter in the upper channel
will contain baseband message during intervals belonging to the carrier frequency
𝜔𝑐1 and zero during the intervals belonging to 𝜔𝑐2· Exactly opposite happens in the
lower channel. The outputs of the two channels are further passed onto a comparator.
The output of the comparator will be high where upper channel output is greater than
the lower channel and low when lower channel output is greater than the upper
channel. In this way the baseband message is retrieved from the FSK signal
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
73
The output of the multiplier in the upper channel during the interval having frequency
𝜔𝑐1 is given by
𝑉𝑚 𝑉𝑐 𝑉 ′ 𝑐
𝑆1𝑢 = 𝑣𝐹𝑆𝐾 𝑣′𝑐1 = (1 + cos 2𝜔𝑐1 𝑡)
2
The output of the multiplier in the upper channel during the interval having
frequency 𝜔𝑐2 is given by
𝑉𝑚 𝑉𝑐 𝑉 ′ 𝑐
𝑆1𝑢 = (cos(𝜔𝑐1 − 𝜔𝑐2 )𝑡 + cos(𝜔𝑐1 + 𝜔𝑐2 )𝑡)
2
The output of the low pass filter in the upper channel during the interval having
frequency 𝜔𝑐1 is given by
𝑉𝑚 𝑉𝑐 𝑉 ′ 𝑐
𝑆2𝑢 =
2
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
74
The output of the low pass filter in the upper channel during the interval having
frequency 𝜔𝑐2 is given by
𝑆2𝑢 = 0
Thus, the filter output in the upper channel is
𝑆2𝑢 𝛼 𝑣𝑚
during the interval having frequency 𝜔𝑐1 and
𝑆2𝑢 𝛼 0
during the interval having frequency 𝜔𝑐2.
The output of the multiplier in the lower channel during the interval having frequency
𝜔𝑐1 is given by
𝑉𝑚 𝑉𝑐 𝑉 ′ 𝑐
𝑆1𝑙 = (cos(𝜔𝑐1 − 𝜔𝑐2 )𝑡 + cos(𝜔𝑐1 + 𝜔𝑐2 )𝑡)
2
The output of the multiplier in the lower channel during the interval having frequency
𝜔𝑐2 is given by
𝑉𝑚 𝑉𝑐 𝑉 ′ 𝑐
𝑆1𝑙 = 𝑣𝐹𝑆𝐾 𝑣′𝑐1 = (1 + cos 2𝜔𝑐1 𝑡)
2
The output of the low pass filter in the lower channel during the interval having
frequency 𝜔𝑐1 is given by
𝑆2𝑙 = 0
The output of the low pass tilter in the lower channel during the interval having
frequency 𝜔𝑐2 is given by
𝑉𝑚 𝑉𝑐 𝑉 ′ 𝑐
𝑆2𝑙 =
2
Thus, the filler output in the lower channel is
𝑆2𝑙 𝛼 0
during the interval having frequency 𝜔𝑐1 and
𝑆2𝑙 𝛼 𝑣𝑚
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
75
𝑆3 𝛼 𝑣𝑚
Hence. the recovery of baseband message is carried out.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
76
PSK is a digital modulation technique defined as the process of shifting the phase of
the carrier signal between two levels, depending on whether 1 or 0 is to be
transmitted.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
77
Figure 6.14 shows the time domain representation of the generation of PSK signal. The
digital message, i.e., binary sequence can be represented as a message signal as shown
in Fig. 6.14a. Two carrier signals of opposite phases generated from an oscillator and
an inverter (180° phase shifter) are as shown in Figs. 6.14b and c. When the binary
symbol is 1, the PSK signal will have the original carrier signal. Alternatively, the PSK
signal will have the 180° phase shifted carrier signal when the binary symbol is 0. This
can be achieved by using a suitable combinational logic circuit like 2 X l multiplexer
as described in the case of FSK. Thus, the output of the multiplexer shifts between the
two distinct phase values; namely, 0° and 180°. Hence the name phase shift keying.
Based on this discussion a block diagram for the generation of PSK signal can be
written as given in Fig. 6.15.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
78
We can also treat the PSK modulation process conceptually ns two ASK processes,
one using carrier signal, with 0°phase shift and other using l80° phase shift. This is
shown in Fig. 6. 16. Thus the first ASK modulator shift is the baseband message to
passband centered around 𝜔𝑐 , but with phase shift of 0° and the second ASK
modulator also shifts the baseband message to passband centered around 𝜔𝑐 , but with
phase shift of 180°. This can be illustrated pictorially as follows: Let the spectrum 𝑣𝑚
be as shown in Fig. 6. l 7a. Since the difference he1ween the two carrier signals are in
terms of phase values. the magnitude spectrum of the output of both the ASK
modulators will be same as shown in Fig. 6. 17b. Thus the two ASK signals are
indistinguishable in their magnitude spectra. Their distinction lies only in their phase
spectra which are not shown. The magnitude spectnm1 of PSK modulator will also be
same as in Fig. 6.17b. However, we can appreciate the fact that the PSK signal will
have the message shifted to the passband range.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
79
Demodulation of PSK Signal The demodulation of PSK can also be understood easily
by considering the ASK view of PSK. However, the message can only be demodulated
by coherent detection. This can be appreciated from the non-coherent detection of FSK
signal which was made possible due to the frequency selective operation of the filters
present in the upper and lower channels. In PSK, the two ASK signals are separated
in phase values, not in frequency.
The block diagram for the coherent detection of PSK may be drawn as given in Fig.
6.18. The incoming PSK signal is multiplied with the carrier signal with phase shift
0° in the upper channel and carrier signal with phase shift 180° in the lower channel.
The output of the multiplier in the upper channel will be low frequency message and
ASK signal at twice 𝜔𝑐 , during the intervals when the PSK is due to the carrier with
phase shift 0°. It will be 180° phase shifted versions during intervals when the PSK is
due to the carrier of phase shift I 80°. Thus, the output of the low pass filter in the
upper channel will contain baseband message during intervals belonging to 0° phase
shift and its 180-phase shifted version during the intervals belonging to the phase shift
of 180°. Exactly opposite happens in the lower channel. The outputs of the two
channels arc further passed onto a comparator. The output of the comparator will be
high when upper channel output is greater than the lower channel and low when
lower channel output is greater than the upper channel. In this way the passband
message is retrieved from the PSK signal
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
80
The output of the multiplier is the upper channel during the interval having 0° phase
shift is given by
𝑉𝑚 𝑉𝑐 𝑉 ′ 𝑐
𝑠1𝑢 = 𝑣𝑃𝑆𝐾 𝑣′𝑐1 = (1 + 𝑐𝑜𝑠 2𝜔𝑐 𝑡)
2
The output of the multiplier in the upper channel during the interval having 180°
phase shift is given by
𝑉𝑚 𝑉𝑐 𝑉 ′ 𝑐
𝑠1𝑢 = − (1 + 𝑐𝑜𝑠 2𝜔𝑐 𝑡)
2
The output of the low pass filter in the upper channel during the interval having 0°
phase shift is given by
𝑉𝑚 𝑉𝑐 𝑉 ′ 𝑐
𝑠2𝑢 =
2
The output of the low pass filter in the upper channel during the interval having
180° phase shift is given by
𝑉𝑚 𝑉𝑐 𝑉 ′ 𝑐
𝑠2𝑢 = −
2
Thus, the filter output in the upper channel is
𝑠2𝑢 𝛼 𝑣𝑚
during the interval having 0° phase shift and
𝑠2𝑢 𝛼 − 𝑣𝑚
during the interval having 180° phase shift.
The exact opposite phenomenon happens in the lower channel. As a result, the filter
output in the lower channel is
𝑠2𝑙 𝛼 𝑣𝑚
during the interval having 0° phase shift and
𝑠2𝑙 𝛼 − 𝑣𝑚
during the interval having 180° phase shift.
In the previous section, we described the basic digital modulation techniques which
involve transmitting information in two levels. Hence, they may also be termed as
binary digital modulation techniques. Accordingly, we can rename them as binary ASK
(BASK), binary FSK (BFSK) and binary PSK (BPSK). We can extend the same
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
81
principles to transmit information in more than two levels, in general, M levels. These
modulation techniques are termed as M-ary digital modulation techniques. As will be
apparent from later description, the main merit of M-ary techniques is increased
transmission rate on the same channel bandwidth. The signals with M different levels
may be generated by changing the amplitude, frequency or phase of a carrier in M
discrete steps as opposed to two levels in binary modulation scheme. Accordingly, we
have M-ary ASK, M-ary FSK and M-ary PSK digital modulation techniques. Another
way of generating M-ary signals is to combine different methods of binary digital
modulation schemes. For instance, M-ary amplitude-phase shift keying (APK) is
obtained by combing ASK and PSK. A special fom1 of this hybrid modulation that
exploits the merits of quadrature amplitude modulation (QAM) and M-ary scheme is
M-ary QAM technique. Among all the M-ary digital modulation techniques the
mostly used ones include M-ary PSK, M-a.ry FSK and M-ary QAM which are
described in the rest of the section.
In BPSK, the phase of the carrier can take on only two values and most convenient
being 0° and 180°. As opposed to this, M-ary PSK can take on M different phase shift
values within 2𝜋 range, given by∅𝑖 = 2𝜋𝑖 /𝑀, where, i = 0, 1, ..., M·- 1. Accordingly,
we have M carrier signals for modulation. For instance, when 𝑀 = 4, we have ∅𝑖 =
0, 𝜋/2, 𝜋, 3𝜋/2. Such a scheme is termed as quaternary PSK, since the phase values are
separated by 𝜋/2. Alternatively, in BPSK, if the phase shifts are separated by 𝜋/2,
then it is termed as quadrature PSK (QPSK).
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
82
Demodulation of M-ary PSK Signal. For the demodulation. only coherent detection is
possible. In coherent detection. incoming quaternary PSK signal is multiplied with
four carrier signals 𝑣′𝑐1 , 𝑣′𝑐2 , 𝑣′𝑐3 and 𝑣′𝑐4 which are in synchronism with those at the
transmitter. In given symbol interval. the multiplier whose carrier phase matches
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
83
with that of the PSK signal will produce maximum output compared to other
multipliers. Accordingly, the corresponding binary word of two bits is decoded. For
instance, if the multiplier with 𝑣′𝑐1 produces maximum output, then 00 is decoded.
The two bit sequences can be separated to get the two message 𝑣𝑚1 and 𝑣𝑚2 . Figure
6.21 shows the block diagram for the demodulation of qutarne1y PSK. The
purpose of maximum finder is to find the channel that provides maximum output.
Accordingly, the binary word decoder will produce the corresponding binary word.
M-ary FSK is same as M-ary PSK, except that the carriers are separated in frequency
than phase. In BFSK, the frequency of the carrier can take only two values say, 𝜔𝑐1
and 𝜔𝑐2. As opposed to this, M-ary FSK can take on M different frequency values.
given by 𝜔 . where. 𝑖 = 0. 1, . . . . . , 𝑀 − 𝐼. Accordingly, we have M carrier signals for
modulation. For instance, when M = 4, we have 𝜔𝑐𝑖 = 𝜔𝑐1 , 𝜔𝑐2 , 𝜔𝑐3 and 𝜔𝑐4. Such a
scheme is termed as quaternary FSK.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
84
carriers are separated in frequency than phase. The two input message sequences are
applied to the control inputs. When 00 is to be transmitted 𝑣𝑐1 is selected, 01 is to be
transmitted 𝑣𝑐2 is selected, 𝑣𝑐3 for 10 and 𝑣𝑐4 for 11. Hence the generation of
quaternary FSK.
Demodulation M-ary FSK Signal FSK can be demodulated by either coherent or non-
coherent detection. ln coherent detection incoming quaternary FSK signal is applied
to four analog multipliers having carrier signals 𝑣𝑐1 , 𝑣𝑐2 , 𝑣𝑐3 and 𝑣𝑐4 which are
separated in frequency. ln a given symbol interval. the analog multiplier whose carrier
frequency matches with that of the FSK signal will produce maximum output.
Accordingly, the corresponding binary word of two bits is decoded. For instance, if
the analog multiplier with 𝑣′𝑐1 produces maximum output, then 00 is decoded. The
two-bit sequences can be separated to get the two messages 𝑣𝑚1 and 𝑣𝑚2 .The block
diagram for the coherent detection of quaternary FSK is same as that of quaternary
PSK shown in Fig. 6.21, except that the carrier signals are now separated in frequency.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
85
correlators or matched filters which are by design matched to the four carrier signals
𝑣′𝑐1 , 𝑣′𝑐2 , 𝑣′𝑐3 and 𝑣′𝑐4 . Thus, it avoids the requirement of reference carriers in the
receiver which is their main merit. The output of matched filter gives information
about the similarity of input wave with the matched filter design value. In a given
symbol interval, the matched filter which matches best with that of the FSK signal will
produce maximum output compared to other filters. The output of the matched filters
are passed through the envelope detectors. The output of the envelope detectors are
compared and the one with maximum output is taken as the channel and its
corresponding binary word is decoded. For instance, if the matched filter designed for
𝑣′𝑐1 produces maximum output, then 00 is decoded.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
86
ln the above equation, the first term is termed as in-phase component and the second
term is termed as quadrature component.
The message signals can be recovered at the receiver by coherent detection. The
incoming QAM is simultaneously applied to in-phase and quadrature channels. The
output of the analog multiplier in the in-phase channel is given by
𝑣𝑚1 𝑉𝑐 𝑉 ′ 𝑐 𝑣𝑚1 𝑉𝑐 𝑉 ′ 𝑐
𝑠1 = 𝑣𝑄𝐴𝑀 𝑉′𝑐 𝑐𝑜𝑠 𝜔𝑐 𝑡 = + 𝑐𝑜𝑠 2𝜔𝑐 𝑡 + 𝑣𝑚2 𝑉𝑐 𝑉 ′ 𝑐 𝑠𝑖𝑛 𝜔𝑐 𝑡 𝑐𝑜𝑠 𝜔𝑐 𝑡
2 2
The first term is the scaled version of the message 𝑣𝑚1 which can be retrieved by
passing through a low pass filter.
The output of the analog multiplier in the quadrature channel is given by
𝑣𝑚2 𝑉𝑐 𝑉 ′ 𝑐 𝑣𝑚2 𝑉𝑐 𝑉 ′ 𝑐
𝑠2 = 𝑣𝑄𝐴𝑀 𝑉′𝑐 𝑠𝑖𝑛 𝜔𝑐 𝑡 = + 𝑠𝑖𝑛 2𝜔𝑐 𝑡 + 𝑣𝑚1 𝑉𝑐 𝑉 ′ 𝑐 𝑠𝑖𝑛 𝜔𝑐 𝑡 𝑐𝑜𝑠 𝜔𝑐 𝑡
2 2
The first term is the scaled version of the message 𝑣𝑚2 which can be retrieved by
passing through a low pass filter.
In this way we can transmit two independent message signals on the same bandwidth
with the help of two carriers which are in phase quadrature. The conventional QAM
is used for analog communication, but it applies equally to digital message signal also.
The transmission rate of the M-ary PSK can be further increased by combining the
QAM concept with it resulting in the hybrid M-ary amplitude-phase shift keying
(APK) termed as M-ary QAM. In case of M-ary PSK, the M carrier signals separated
in phase are used to transmit binary words of length n bits, where 𝑀 = 2𝑛 . This
transmission rate can be further increased by replacing these carriers with in-phase
and quadrature components and amplitude modulating each component by a suitable
in-phase and quadrature value.
The generation of the in-phase and quadrature values can be illustrated with the help
of Fig. 6.24, termed more commonly as signal constellation diagram. ∅1 represents the
in-phase component and ∅2 represents the quadrature component. Any point in the
constellation diagram can be identified by a unique binary word obtained by
dividing the whole region into smaller square blocks as shown and giving unique
binary code for each square. For instance, the point in the second square block
around the origin of the first quadrant is uniquely identified by 10 for ∅1 and 10 for
∅2 and accordingly it represents the binary word 1010. This can be uniquely
transmitted by using the in-phase and quadrature components a1 and b1,
respectively, whose values are as indicated in the figure.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
87
As defined in the equation, 𝑣𝑖 (𝑡) can take M distinct shapes. Each pulse can be used
to transmit distinct binary word and accordingly for 𝑀 = 16, we have 16 words, each
of length 4 bits. Thus, in each symbol interval. The bit rate has doubled compared to
M-ary PSK.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
88
The digital modulation techniques are meant for translating the digital message from
baseband to passband. As described in this chapter it is indeed possible to do the same
with help of techniques that arc based on analog modulation techniques. Binary ASK
stores digital message infom1ation in two amplitude levels. Binary FSK stores the
same in two frequency levels and binary PSK in two phase levels. The transmission
rate possible is one bit per symbol interval. Alternatively, in M-ary digital modulation
techniques the transmission rate can be increased significantly. In case of M-ary
schemes, the transmission rate will be n bits per symbol interval where M = 2n. Except
for PSK and QAM, all other digital modulation schemes can employ both coherent
and non-coherent approaches for detecting the message. PSK and QAM schemes can
use only coherent detection scheme.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
89
Assessment of Learning
Quiz.
Assignment.
Using Matlab, show the graph of ASK, PSK, and FSK using the following digital input values:
1. 0111010001
2. 0110110011
3. 1011000110
Sample output:
Printscreen your answers and save in a PDF format. Indicate the date and time of your
answers in your respective computers.
C. M. D. Hamo-ay
Modulation and Coding
2 | Comm 2 Techniques
90
2.3. References
2.4. Acknowledgement
The images, tables, figures and information contained in this module were taken from
the references cited above. Some parts of the instructional materials were taken from
the articles published by the respective references. The writers and their valuable work
are highly acknowledged.
C. M. D. Hamo-ay