Mid 2 Unit 35
Mid 2 Unit 35
o The system begins with an analog signal, such as voice or music, that
needs to be digitized.
2. Low-Pass Filter (Anti-Aliasing Filter):
o The input analog signal passes through a low-pass filter to limit its
bandwidth. This ensures that the signal adheres to the Nyquist criterion
to prevent aliasing.
3. Sampler:
o The quantized values are encoded into a binary format. The number of
bits used in encoding depends on the number of quantization levels.
6. PCM Signal:
o The quantized levels are held constant for the duration of a sampling
interval, forming a Pulse Amplitude Modulated (PAM) signal.
4. Reconstruction of Analog Signal:
o Each sample is rounded off to the nearest level within a set of discrete
amplitude levels.
4. Encoding:
o The quantized samples are converted into binary codes for digital
representation.
The Nyquist Theorem
The Nyquist theorem, also known as the Sampling Theorem, states that:
𝑓𝑠 ≥ 2 ⋅ 𝑓𝑚
Where:
• 𝑓𝑠 = Sampling frequency
• 𝑓𝑚 = Maximum frequency component of the signal
The theorem implies that the sampling frequency must be at least twice the highest
frequency component of the band-limited signal to accurately reconstruct the
original signal from its samples.
o If the sampling rate is less than 2𝑓𝑚 , aliasing occurs, where higher
frequency components are incorrectly represented as lower frequencies in
the sampled signal. This distorts the reconstructed signal.
2. Accurate Reconstruction:
Modulation in DPCM
The modulation process in DPCM involves predicting the current signal sample based
on past samples and then transmitting the difference between the actual and predicted
values.
o The difference (𝑒(𝑛)) between the actual sample value (𝑥(𝑛)) and the
predicted sample value (𝑥ˆ(𝑛)) is computed:𝑒(𝑛) = 𝑥(𝑛) − 𝑥ˆ(𝑛)
3. Quantization:
o The difference 𝑒(𝑛) is quantized to reduce the number of bits required for
transmission. This step introduces quantization noise.
4. Encoding:
Demodulation in DPCM
The demodulation process in DPCM involves reconstructing the signal at the receiver
by using the received differences and the same prediction mechanism as the transmitter.
o DPCM works well for signals with high correlation between consecutive
samples, such as speech and audio.
Disadvantages of DPCM
1. Quantization Noise:
Applications of DPCM
1. Speech Compression:
o Forms the basis for predictive coding techniques in video standards like
H.264.
Conclusion
DPCM is a highly efficient modulation technique that uses prediction and differential
encoding to minimize redundancy. The modulation process involves encoding the
differences, while demodulation reconstructs the original signal using the same
prediction algorithm. Despite its limitations, DPCM remains widely used in applications
where efficient bandwidth and storage utilization are essential.
Block Diagram of Delta Modulation (DM) System
1. Transmitter (Modulation Process):
+------------------+ +-----------------+ +-----------
-------+
| Input Signal x(t)| ---> | Comparator | ---> |
Quantizer |
+------------------+ +-----------------+ +-----------
-------+
| |
v v
+---------------------+ +----------
--------+
| Integrator (Σ) | | Pulse
Generator |
+---------------------+ +----------
--------+
| Output DM Signal
v
o Compares the current sample of the input signal (𝑥(𝑡)) with a predicted
signal (𝑥ˆ(𝑡)), generated from the integrator.
3. Quantizer:
o The quantized bit stream forms the Delta Modulated signal, which is
transmitted.
o Converts the bit stream into pulses with appropriate amplitudes (+𝛥 or
−𝛥).
3. Integrator:
unit 5
Amplitude Shift Keying (ASK) is a modulation technique where the amplitude of a
carrier signal is varied in accordance with the binary data (digital information). Below is
an explanation of the generation and detection processes for ASK signals:
1. Generation of ASK Signal
The ASK signal is generated by varying the amplitude of a high-frequency carrier wave
based on the binary input signal.
Components Required:
• Binary message signal (digital input, e.g., 1s and 0s).
• Carrier signal (sinusoidal wave of a fixed frequency and amplitude).
• Multiplier or modulator circuit.
Steps:
1. Binary Data Input: The binary data stream (e.g., 101100) serves as the
modulating signal.
𝑐(𝑡) = 𝐴sin(2𝜋𝑓𝑐 𝑡)
3. Modulation:
o When the binary input is 1, the carrier signal is transmitted at its full
amplitude.
o When the binary input is 0, the carrier signal's amplitude is reduced to
zero or a smaller value (depends on the type of ASK: On-Off Keying
(OOK) or binary ASK).
4. The resulting ASK signal can be expressed as:
Types of Detection:
• Coherent Detection: Requires phase synchronization with the carrier.
• Non-Coherent Detection: Does not require phase synchronization.
Applications:
• Optical communication systems.
• Radio frequency identification (RFID).
• Low-speed digital communication systems.
Frequency Shift Keying (FSK) is a digital modulation technique where the frequency of a
carrier wave is varied to represent binary data. Here's a detailed explanation of the
generation and detection processes for FSK signals:
Components Required:
• Binary message signal (digital input: 1s and 0s).
• Two sinusoidal carrier signals with different frequencies (𝑓1 and 𝑓2).
• A switch or modulator circuit.
Steps:
1. Binary Data Input: A binary message signal is provided as the input.
o Binary 1 is represented by a sinusoidal carrier wave with frequency 𝑓1.
o Binary 0 is represented by a sinusoidal carrier wave with frequency 𝑓2.
2. Carrier Signal Generation:
o For binary 1: 𝑠1 (𝑡) = 𝐴sin(2𝜋𝑓1 𝑡)
o For binary 0: 𝑠2 (𝑡) = 𝐴sin(2𝜋𝑓2 𝑡)
where 𝐴 is the amplitude and 𝑓1 , 𝑓2 are the carrier frequencies.
3. Switching or Modulation:
o The modulator selects 𝑠1 (𝑡) or 𝑠2 (𝑡) based on the binary input.
4. FSK Signal: The output FSK signal alternates between the two carrier
𝐴sin(2𝜋𝑓1 𝑡), if binary input is 1,
frequencies depending on the input:𝑠(𝑡) = {
𝐴sin(2𝜋𝑓2 𝑡), if binary input is 0.
Types of Detection:
• Coherent Detection: Requires phase synchronization with the carrier.
• Non-Coherent Detection: Does not require phase synchronization.
Applications:
• Modems for data communication.
• Radio teletype systems.
• Low-speed data transmission in wireless systems.
Phase Shift Keying (PSK) is a digital modulation technique where the phase of the
carrier signal is varied to represent binary data. Below is a detailed explanation of the
generation and detection processes for PSK signals:
Types of PSK:
• Binary Phase Shift Keying (BPSK): Two distinct phases (0° and 180°)
represent binary 1 and 0.
• Quadrature Phase Shift Keying (QPSK): Four distinct phases (0°, 90°,
180°, 270°) represent two bits per symbol.
• M-ary PSK: Uses more than four phases.
Components Required:
• Binary message signal.
• Carrier signal.
• Phase modulator.
Types of Detection:
• Coherent Detection: Requires phase synchronization with the carrier.
• Differential Detection (Non-Coherent): Does not require phase
synchronization.
Applications:
• Wireless communication systems (Wi-Fi, Bluetooth).
• Satellite communication.
• RFID systems.
• High-speed modems.
Would you like to see a waveform illustration, circuit diagram, or further explanation of
QPSK or higher-order PSK?