0% found this document useful (0 votes)
13 views27 pages

Unit 3 DC

The document discusses various digital modulation techniques including Amplitude Shift Keying (ASK), Phase Shift Keying (PSK), and Frequency Shift Keying (FSK), highlighting their applications in digital communication systems. It explains the differences between coherent and noncoherent techniques, binary and M-ary schemes, and the importance of bandwidth efficiency in communication. Additionally, it covers the necessity of modulation for transmitting digital signals over bandlimited channels, such as telephone lines, and the relationship between bit rate and baud rate.

Uploaded by

atmanyathakur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
13 views27 pages

Unit 3 DC

The document discusses various digital modulation techniques including Amplitude Shift Keying (ASK), Phase Shift Keying (PSK), and Frequency Shift Keying (FSK), highlighting their applications in digital communication systems. It explains the differences between coherent and noncoherent techniques, binary and M-ary schemes, and the importance of bandwidth efficiency in communication. Additionally, it covers the necessity of modulation for transmitting digital signals over bandlimited channels, such as telephone lines, and the relationship between bit rate and baud rate.

Uploaded by

atmanyathakur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 27
amplitude shift keyin shift keying (OPSk), M-Ary PSK, Binary yaduency Shift Keying (8FSk), Amplitude Modulation (QAM), MODEM, Introduction to prob: 81 Introduction : * We have discussed the baseband pulse ic rsmission earlier, In baseband pulse wansmission, the gbat data is represented in the form of Aiscrete PAM signal. These signals are transmitted over a low pass channel * However in the digital passband fransmission which is discussed in this el Imedulates a sinusoidal carrier. These Signals are transmitted over a bandpass chan * The examples of bandpass Channels are microwave radio link or a satell * There are three basic penaling schemes used in passband data transm 1 Amplitude shift ke ng (ASK) 2. Phase shift keying (PSKy 3. Frequency shift keying (FSK) ° They are Special cases of amplitude modulation (AM), phase modulation (PM) and frequency modulation (FM) respectively 844 Hierarchy of Digital Modulation Techniques : The digital my Wodulation techniques are 1 Coherent techniques 2 lassificd imto two Noncoherent techniques. Digital Modulation Technique, ADC (RGPV) 4. Coherent techniques + i we to use a phase synchroni, digital modulation techn TE tn signal. nat ole coher erated at the receiver to recover carrier to be gener! id be synchroni: nd phase of this carrier produced at the receiver shoul schon @ The frequency 3 s swith that at the transmitter dl formance. Coherent techniques are complex but yield better perfc 2, Noncoherent techniques : «In the noncoherent techniques, no phase synchronized local carrier is needed at te receiver “These techniques are less complex. But the performance is inferior to that of coherent techniques. 8.4.2 Binary and M-ary Schemes : ‘There are two types of digital modulation schemes = 1, Binary schemes 2. Meary schemes. In te binary schemes we send any one of the two possible signals during each signaling imerval of duration Ty. Examples are ASK, FSK and PSK. Whereas in M-ary schemes, we can send any one of the M possible signals during exh signaling interval of duration Ty, Exampi of M-ary schemes are M-ary PSK, M-ary FSK, QPSK, MSK, QASK or QAM ett. M-ary schemes need less bandwidth as compared to the binary schemes. * Bul Ue error performance of M-ary schemes is poor as compared to the binary schemes. £1.3 Probability of Error (Pg) : The iportant pol passband di is nthe : a mua ! 1 passband dati tansmission systems is to design the receive! ihe nuninum value of average proba error in pres ae awen ability of error in ence of additive white Gaussia The value of crior probability PL of as Te value of F should be as possible stem inulicates its performance in presence of AWGN Power Spectra + 814 © The features of ever : Very method can be Spectra of the modulated sip, ae 1s @ graph of power spe appreciated if and only if we study the powe! al densi c W elves us infommauon nn ar apc (RGPV) 8.1.5 83 Digital Modulation Techniques Bandwidth Efficiency : ‘The channel bandwidth and transmitted power are the two primary communication resources. The communication systems should be spectrally efficient The bandwidth efficiency is defined as the ratio of the data rate (bits/sec) to the effectively utilized channel bandwidth. It is denoted by p R, p= Sp bits / Hz ‘The bandwidth efficiency is dependent on the following factors 1, Multichannel encoding 2. Spectral shaping 8.2 Introduction to Digital Modulation Techniques : «PCM converts analog message signal into a digital signal. Now we will learn some techniques which convert the digital message signal into an analog signal and then transmits it * Such modulation schemes are called as digital carrier modulation schemes © This type of digital to analog conversion is essential when the digital message signal is to be sent over a bandlimited channel such as the telephone line. Fig, 8.2.1 : Digital carrier modulation © The best application of digital carrier modulation is MODEM. © The modem will modulate the digital data signal ‘from the DTE (computer) into an analog, signal 1 © This analog signal is then ansmitted on the telephone Tines ; ; © The question is why can’t we send the digital signal as it is on the telephone lines ? Why should we modulate it ? - fi © Here is the answer for it ‘The digital data consists of binary OS and #5, thereTore the waveform lunges its value abruptly from high to low or low 10 hugh . oe communication In order to carry such a signal without any distortion being introduced, the © , ange bandwidth medium needs to have a large ba therefore we hune 10 conver Unfortunately the telephone Jines do not have high bandwidth. ff the e by ‘means 0 the digital signal first into an analog signal which needs lower banelwidth by Modulation process. smissi digital signals. There are three basic types of modulation techniques for the transmission of digi " Digital Modulation Tec a4 ; setics of a sinusoidal signal; amp eth re then called as : ude ADC (RGPV) ‘act pe thee chon methods are based on th rod ¢, The corresponding 1 int keying (ASK) 2 Frequeney shi keying (Fsk) Phase shift keying oan emyatee ke dranure phase shift ( oy i aired amplitde modutation (QAM) eon jon in which four QPSK x a mulalevel modatation in. which © These methods frequeney and ples 1. Amplitude oe a combination of ASK and PSK is employed in order to minimize the ero, © At high bit rates. he received data / «Let us dome = thod is known as “Quadrature Amplitude Modulation (QAM) thes © This me methods one by one. ; 7 Fig 8.22 shows the classification of digital to analog modulation syste Digital to Analog Modulation Frequency shift Phase shift keying shtt keying ASK keying FSK PSK aPsk * QAM « Fig, 8.2.2 : Types of digital to analog modul €21 Need of Modulation : * Te modem will modulate the digital data Signal from the DTE (computer) into an analog 1a © This anog signal is then Wansmitted on the telephone lines, * Me qucsuon is why can't we send the digital si it i i * sital signal as © telephone 2 Why ciation ii ‘sual as it is on the telephone lines e Row as te answer fu e dipiti a cy ‘ clanpes it cal La i The digital data consists of binary Os and Is, therefore the wavefor® ; © ae abruptly fom high w low or low 1 high . In Order Ww cary a ¥ such a siznal without a st ing i i Med tess wave hare ban MY Asotin being intoduced, the communis © Unfonturestely the tet F plone tines donot have hie i the digits! signal fist ino an analog Eg ie Toate ener Hee we Ive to coms hedulition poses, Baal which needs lower bandwidth by means of Pigital © arulog modulation ig demonstrated in Fig, 8.2.3 noc (AGEY) oes as Digital Modulation Techniques ASK JL? , flame Digital to Analog n* Modulation ~ FSk Fig, 8.2.3 : Digital to log, modulation 8.2.2 Advantages and Disadvantages of cw Modulation : L a easier SE GW modulation techniques such as ASK, PSK, FSK etc. used for is is that we can use the telephone lines for transmiss data. Due to the use of CW modulation the BW Turned aes The disadvantage of CW modulation is we need to use a MODEM This makes the system costly and complex. alongwith every computer. 83 Bit Rate and Baud Rate : © The data can also be represented by a digital signal. « A digital signal is a discrete time signal having finite number of amplitudes. For example see the digital signal shown in Fig. 8.3.1. * AO is represented by zero volts and a 1 by some positive voltage Digital data [O° [1 ofotifs Amptitude f + ‘——1 Hig, 8.3.1 + Digit Bit interval (Th): e single bil. * The bit interval is the time required to send one SBS i. ; he bit interval 10 ora lis Tp which is As shown in Fig, 8.3.2, time required to send a - / f Digital Modulation Technye ADC (RGPV) © Bit rate : nv in one second, It is expressed in bj bits transmitted OF sent in 0 ber of Bit rate is the num ver al i Hows me pit rate and bit interval is as fol Relation between al Bit interval h can be transmitted ling mate is defined as the number of bits which in, Bit rate or signall a is at Ty” then bit rate will 4 duration is “7,” then bit Ta f — the pulse duration. be 1/Ty. Look at Fig. 8.3.2, you will see that ti pit duration is necessarily equal t0 In Fig 83.2 the first pulse is of two bit duration Ty Fig, 8.3.2 : A bit stream Bit rate is also called as signalling rate and it should be as high as possible. However with increase in bit rate the bandwidth of transmission medium must be increased, it order to transmit the signal without any distortion. Eauds (or Baud Rate) : Eaud 1s Ue unut of signalling speed or modulation rate or the rate of symbol transmission Windicates the rate at which a signal level changes over a given period of time. When binary bits are transmitted as an electric: signal with two levels “0” and Fae and the modulation rate be baud rite are same. This is as shown in Fig, 8.3.3(a). > the bil ute began * as, 7 T= 1 see { [Strats BUteswo Baud moze bauds} Fig 63.304) + Note that for 4 Mo level 5i, Now consider Fig. 8.3.3(b) wh Baud rate tor two te al (1 ‘vel modulation nary signal) the bit rate and bauds are equal 4 et _ rere four different levels ‘ are used to represerit the data. nc (RGPY) anc ( 87 Digital Modulation Techniques ae seo +! Bitrate = 8 bi Baud rate bauds = 4 lavels/sec: Fig. 8.3.3(b) : Baud te for a four level modulation «Each level is being represented by a combination of two bits ic. 00 or 01 etc. « The bit rate is therefore not equal to the baud rate. «Tie bit rate is 8 bits/sec, but baud rate is only 4 bauds as there are 4-levels per second. Ex. 8.3.1: For a binary PCM system, the number of bits per transmitted word is 8 and the ‘sampling frequency f, = 8 kHz. Calculate the bit rate and baud rate. soln. : Given : N = 8, f, = 8 kHz Bit rate = Nxf, = 8 x 8 kHz = 64 k bits/sec. Baud rate = Bit rate = 64 kHz (as transmission is binary) £x.83.2: For the same data in the previous example, calculate the bit rate and baud rate if a QPSK system is used Soin. : In the QPSK system, two successive bits are clubbed together to form one ‘one symbol corresponds to 2 bit duration. message. Hence Baud rate = 3x bit rite = 32 k bitssee Bit rate does not change. ssume 8 different voltage levels. It sencs 400 of Ex €3.3: A system sends a signal that can a: e baud and bit rates ? these signals per second. What are thi Soin. : : vital signal t have 8 1 As We signal assumes & different voltage levels we wed 3 bit digital sent ieee different combinations Hence the number of bits, per voltage level 8° level represent one symbol. Number of bits / symbol = 3 2. ‘The system sends 400 signal / sec. Hence the also 400. el is gq per second is ner of symbols tainsnuted: PEF second is Symbol rate = Number of sy pols / see = 400 symbols / sec 3. The baud rate is defined as the number of symbols per second Baud rate = Symbol rate Baud rate = 400 symbols / se wD Digital Modulation Techngye ADC (RGPV) 4, Weare using 3 bit to represent cach symbol. , So bit rte = 3x symbol rate = 3x 400= 1200 bits / sec. 8.4 Amplitude Shift Keying (ASK) : >>> [Asked in Exam - May 09, June 10 11) eS Jitude shift keying (ASK) is the simplest type of digital CW modulation. Here the carrier ig + Ania of frequency f. We can represent the carrier signal mathematically as follows : e, = sinQaft) .. (84) «The digital signal from the computer is a unipolar NRZ signal which acts as the modulating 8 nal, The ASK modulator is nothing but a multiplier followed by a band pass filter as shown inFig. 84.1(a). Due to the multiplication, the ASK output will be present only when a binary “1” is to be transmitted. The ASK output corresponding to a binary “O” is zero as shown in Fig, 8.4.1(b). Product modulator 1 LL 1 Band limited ates NRZunipolar ASK digital signal trom Computer, Carrier oscillator Bit rate R= 177 Fig, 8.4.1(a) : ASK generator From the waveforms of Fij ig. 8.4.1(6) we can conclude that the carri nsmitted when arrier is transmitted when & binary 1 is to be sent and no cartier is transmitted when a binary 0 is to be sent. Data signal trom computer | 1 Second, BuRate = 4, Baud rate Nyx 4 Bit Rate = Baud Rae” Fig. 8.4.11 SK waveforms aan 7 (RGPV), 8-9 Digital Modulation Techniques | poe The ASK signal can be mathematically expressed as follows : Vask(t) = dsin(2n ft) ww (8.4.2) where d= data bit which can take values I or 0. Vask(U = sin(2n ft) whend =1 wn (8.4.3) and Vas (t) = 0 when d=0 94.1 Baud Rate (N,) : « For ASK we use 1 bit (0 or 1) to represent one symbol. So the rate of symbol transmission ie. the baud rate. © Ng will be same as bit rate R as shown in Fig. 84.1(b) Baud rate = Bit rate ; its of ASK = 8.4.4 Merits and Demerits © vay, Ibis easy 10 generate and detect. Howeyey, i is its simplicity. : ate ‘The advantage of UsiNB ASK is fo noise, werefore Ht finds limited application in q,. disadvantage is that it is very sen ve pte 100 bits/sec. transmission. I{ is used al Very ow bit ral ‘on of AM and ASK: 8.4.5 Comparis : a ASK ‘Table 8.4.1: Comparison of AM an . ASK AM Sr. Parameter No. i i ‘Amplitude ‘Amplitude 1 | Variable characteristics of the carrier ——_———— san signal is ana Modulating signal is digital 2 | Nature of modulating Modulating signal is analog. lu ig SIB) ig) signal 3 | Modulated signal oma shape, f f\ \ /\ f\ \ 4 | Variation in the Continuous variation in | Carrier ON or OFF depending | carrier amplitude. accordance with the amplitude of | on whether a 1 or 0 is to be | modulating signal. transmitted. 5. | Number of sidebands Two Two produced 6 | Bandwidth 2a (toR + 7 | Noise immunity Poor Poor #1 Application Radio broadcasting Data transmission at low bit rat 9 | Detection Method Envelope Envelope 8.4.6 Probability of Error : >>> [ Asked in Exam - May oo! © Probability of error (P2) is an important parameter used for judging the performance ofa digit! Communication system. © P, should be as small as possible 8.4.7 Coherent Reception of ASK ; *° The col ator uk ent receiver for an ASK signal is shown in Fig. 8.4.3 in which a local oscil ynchnonized with the cartier is applied to a multiplier. © The ASK signal B angwith noise is also applied to the mul Ne ’ suulliphier output is then applied to an integrator which integrated over one bt duratio® RGPV) aoc ( 8-13 Digital Modulation Techniques integrator i - ie peti cura sampled at a particular instant corresponding to the maximum possible i he sampled value is held by the sample and hold circuit , The output of sample a . comparator. ple and hold circuit is compared with a reference voltage V by a If the S/H output is less tha eater han V, then comparator output is low which indicates that the «If the S/H output is greater than V, the : . Le He en ap eau a high which indicates that the Synchronous carrier ” 1 ASK + Noise Comparator Binary signal Bit sync Reference voltage V Fig. 8.4.3 : Coherent ASK receiver. © Thus at the receiver output we recover the original binary signal. in of ASK : 8.4.8 | Noncoherent Detec © The noncoherent ASK detector is as shown in Fig, 8.4.4. It consists of a bandpass filter followed by an envelope detector and a regenerator. Envelope Regenerator detector Bit v syne ASK +, Noise Original Binary output Fig, 8.44 + Noncoherent ASK receiver * The bandpass filter is a matched filter ‘a rectifier, If the ASK signal ts pr pinury 11s obtained at the output sent at the receiver input and cent (corresponding 10 1D ‘The envelope detector is basically then the output of envelope detector 1s high and a © IF ASK is absent (corresponding, to 0) then only the noe TS pre envelope detector output is not of a large amplitude: cI weed a pul Since it is less than the reference voltage y, a zero is produced at the output Digital Modulation 8-14 # SchM Gua, ADC (RGPV) (BPSK) : 5 Binary Phase Shift Keying >>> [Asked in Exam - June 05, June 19 ny SK) is the most efficient of the three modulation methods, j¢ : high bit rates Jhanged according (0 the data bit to be transmitted ry PSK (BPSK). The carrier phase i pif keying (BP: PSK. Therefore it is used [0 al carrier is © Binary phase ASK. FSK and In BPSK. phase of the sinusoid . r . Fig, 85.1 shows the simplest form of PSK called Binal changed between 0° and 180° by the bipolar digital signal. . A bipolar NRZ signal 1s used to represent the digital data coming from the digital source. 8.5.1 Mathematical Representation of BPSK Signal : EE © Let the peak amplitude of a sinusoidal carrier be “A”. Then the normalized power contained in this sinusoidal carrier is given by, P= A/2 (85.1) A= \2P, (85 * Then the ransmitted BPSK signal is given by, Verse (t) = -f2P, cos ot ...... When binary “1” is being transmitted and Via () = \/2P, Cos (0,1 + 2) =\)2P, [ cos @,t cos m-sin © , tsin* = =f 2P, COS Ot .....When binary “0” is being transmitted tung the above (wo conditions we can write that Vies(l) = Vian = b() >> [ Asked in Exam - June 07 !I!] Tre emphical representation of a BPSK signal is shown in Fig. 8.5.1(a). Note the versal of phase taking place corresponding to every changeover of the data from “0” to “I"" or from 1” to . Binary data sequence : 5 ; : Boolar NRZ _, - sonaibit) Th, ty BPSK signal Vepsx = bi VZF, cos at : im P08 0c BP 8 nef Phase shift of 180° (a) Binary phase shift keying (BPSK) signal Bina Bipolar e Gata” NRZ aa sequence encoder uy (0=94(0) =Y2T cost) ! 85.3 BPSK Generation : >>> [ Asked in Exam - Dec. 06, June 07 my sakes place as shown in Fig, 8.5.1(0). Which is then applied to a multiplier (product modulator), ee, The other input to the multiplier is the basis function >, (t) : an F j aes ‘The data bits 0s and 1s are first converted into a bipolar NRZ sign ( Table 8 41 8.5.4 i o, = ant. E/T, 8 “rentioned earlier and , = 27% ore P= Ey! Th 4 where P, >>> [ Asked in Exam — Dee. 06, June 07 1 BPSK Receiver = i in Fig. 8.5.2. sock diagram of a BPSK receiver is shown in Fig, 8.5. The bios ‘The input BPSK signal can be + sinat or-sino,t. Tre ii s Level Binary BPSK. converter data output rot PL Regenerated carrier Fig, 8.5.2 : BPSK receiver Operation : ‘The coltcrent carrier recovery circuit detects and regenerates a cartier signal sino.t This regenerated carrier has the same frequency and phase as the carrier used at the transmitter. So the regenerated carrier is known as coherent carrier. The Gitered EPSK sigral alongwith the regenerated carrier is applied to a balanced modulator mis as a product detector, ~ BM, output = BPSK x Regenerated carrier = (4sinotx sino,t = + sin? ,t) 2 11 Bu suto « Leos o9 + EM omnes 2 Jeo thy Joos2u a | poe (RGPY) 8-17 Digital Modulation Techniques “LPF ouput = Feos2 og ‘The LPF output is applicd to the level detector level detector we get the following output id clock recovery circuit. at the output of -toosot + Ly logic 1 2 el > > V Clogic 1) +heos ot > ~ FV (logico «Thus the binary signal is obtained at the output - 248 Digital Modulation Techniquy ADC (RGPV) - i a vice the highest fr Thus the minimum bandwidth of BPSK signal is equal to twice ig) requeney contained in the baseband signal. 8.5.7 Advantages of BPSK : . BPSK has a bandwidth which is lower than that of a BFSK signal. * BPSK has the best performance of all the systems in presence of noise. It gives the minimun possibility of error. © BPSK has a very good noise immunity. 8.5.8 Disadvantage of BPSK : ‘The only disadvantage of BPSK is that generation and detection of BPSK is not easy. It i quite complicated, because the synchronous (coherent) demodulation is used to recover th original signal from BPSK signal. 8.5.9 Applications : Phase shift keying is the most efficient of the three modulation methods and it is used for high bit rates even higher than 1800 bits/sec. Due to low bandwidth requirement the BPSK modems are preferred over the FSK modems, at | eher operating speeds. 7 L 87 Quadrature Phase Shift Keying (QPSK) : >>> | Asked in Exam - Dec. 05 I!! ] The modulation schemes discussed so far are all two level modulation (ASK and BPSK), because they can represent only two states of the digital data (0 or 1). Therefore the bit rate and the baud rate are same for these systems. The maximum bit rate which can be achieved using ASK, BFSK or BPSK systems does not meet the requirements of data communication systems: ‘This happens due to the limited bandwidth of the telephone voice channel. We can keep the baud rate same and increase the bit rate by using multilevel modulation lechniques, In this type of systems, the data groups are divided into groups of two or more bits and each Broup of bits is represented by a specific value of amplitude, frequency or phase the carrier QPSK (Quadrature PSK) is an example of such multilevel phase modulation. In QPSK system two successive bits in a bit stream are combined togetler to form a message and cach message is represented by a distinct value of phase shill of the cartier The process of combining two successive bits is demonstrated in Fig. 8.7.1 —— and ADC (RGPV) se svoam ea! Messages I 1 1 | ola oO Ne abot Symbal | Symbol | Symbat yy Note that every symbol consists of two bits Fig. 8.7.1: Grouping of bits in QPSK Each symbol or message contains two bits. So the symbol duration T, = 2 Ty. These symbols are trinsmitted by the same carrier at four different phase shifts as shown ig Table 8.7.1 and Fig. 8.7.2 * Since there are four phase shifis involved, thi: Phase shitt 4PsK Wave 1 Baud 1 1 Baud 1 Baud 1 Baud ———_ 1 Second —_, Bit rate = 8 bj Baud rate xq’ / S8° Fig. 8.7, Waveforms of QPSK — : Digital Modulation Techniques 82 490 (RGPY) Baud Rate : _ As illustrated in Fig, 8.7.3, the baud rate for QPSK is half of the bit ra Alternative representation ; : . 8.7.4, An alternate representation of QPSK symbols is shown in Table 8.7.2 and Fig Symbol | Input successive : bits Phase shift in the carrier B 0 n/4 rad 0 3n/4 rad 5/4 rad 77/4 rad. Table 8.7.2 Fig. 8.7.4 87.1 Mathematical Representation of QPSK : ®>> | Asked in Exam - Dec. 02 1! ] SET 4 QPSK signal can be represented mathematically as: >» M=0,1,2,3 x Vorsk (0) = Fee[ocrcameryd] By Substituting the values of m from 0 to 3 we get the four n ges listed in Table 8.7.2 77 x 1 Vopsy = S, Aas[ arr] . form =0 _ Ae Vorsk = 8) = BP, eal eet] nthe QPSK output for m e form=1 Similadly we can obi AS explained earlier wy a: Can Substitute Pin terms of symbol Sneiby and symbol time duration Pos BT Th ' "© QPSK system of Modulation is also called as four state PSK (or simply 4 PSK). v Stagoerad ana. — Offset aps (©CaPsk) o rigs sere 8.8 Frequency Shift Keying (FSK) : >>> [Asked in Exam — Dec. 05, Dec. 091!) ee «In “frequency shift keying (FSK)”, the frequency of a sinusoidal carrier is shifted between two discrete values. . One of these frequencies (f,) represents a binary “1” and the other value (f,) represents a binary "0" representation of digital data using FSK is as shown in Fig, 8.8.1(b). Note that there is change in the amplitude of the carrier. Po Carer 1 Y sn erg) Bandlimited FSK Bandpass filtor Castor? signal V andar) Fig, 8.8.1(a): FSK generation i, V) Digital Modulation Techniques Binary signal from computer BFSK output } eeiditgy | aedntyy PT baud Tbaud Tbaud T baud Thaud 1 bt cn Bit rate =5, Baud rate=5 Fig, 8.8.1(b) : Representation of digital signal using FSK | 681 FSK Generation : >>> [Asked in Exam - Dec. 02, June 04, Dec. 05 I!!] «Refer to the FSK generator shown in Fig. 8 8.1(a). It consists of two oscillators which produce sinewaves at frequencies f, and fy, respectively. The oscillator outputs are applied to the inputs of two multipliers (product modulators). The other input to the two multipliers are the signals p, and Py ‘The relation between p,, p) and | the data bit d (t)is as follows = | | Data bit to be transmitted | Value of d(t) | Value of p, | Value of py | binary 0 -1 1 0 | binary 1 +1 | 1 : = 1 and p, = 0 therefore the output of the first © When a binary 0” is to be transmitted, Py modulator only is present and the frequency of the transmitted signal ts * Similarly when a binary “1” is 10 be transmitted, p) = and P= | we other multiplier only is present and the frequency of the transmitted signal fore the output of the sch * ‘The binary FSK signal is mathematically represented as sn) View (= pysin 2x 60) *P sine hO i 882 82 ; pectrum of BFSK : ¢ 04, Dec. 09 I re 04, Dec. sked in Exam ~~ Fig. 88.2 shows the spectrum of BFSK b _e ADC (RGPV) spectral density Power SP" Srsx(l) Fig. 8.8.2 : Spectrum of BFSK . Similarly the second term produces a power spectral density which consists of an impulse at ¢ . ‘Note that these patterns have been drawn with an assumption that f, ~ f, = 2 f,, . With this separation, the bandwidth of BFSK is, BW (BFSK) = 4f, Note that this bandwidth is twice the bandwidth of BPSK, ‘Thus shows that FSK requires larger bandwidth than ASK and PSK (to be discussed next). 8.8.3 Bandwidth for FSK in terms of Baud Rate : >>> [Asked in Exam - June 04, Dec. 09!) hho. For FSK also bit rate is equal to baud rate. We can imagine the FSK spectrum to be a combi nation of tw toned frequencies , and f, as shown in Fig, 883 aan Amplitude 1h Frequency Ny2 Qu ef oo ko 837 Digital Modulation Techniques | | | | Fon Fig. 8.8.3 the expression for bandwidth is given by N, N, BW = SHB) =f +N 882) where Ny = haud mate = Sit rate = f, | Minimum bandwidth will correspond to the situation in which (f,~ f,) = Ny BW (min) = N,+N,=2N, (8.8.3) Calculate the bandwidth of an FSK system in ‘which, the transmission takes place at 4000 bits per second rate and the frequency difference between the two catriers is 3000 Hz goln.: Given : (f~ {) = 3000 Hz, Bit rate = 4000 bps. Tofind: Bandwidth «Bandwidth = (f\- f,) +N, . But N, = baud rate = bit rate = 4000 881! BW = 3000+ 4000 = 7000 Hz Ans. 682: For ahalf duplex FSK transmission, the bandwidth of medium is 8000 Hz. If the frequency difference between the two carriers is 4000 Hz calculate the maximum bit rate. soln. : Given : FSK, half duplex, BW = 8000 Hz, (f,-f,) = 4000 Hz. Tofind: Maximum bit rate 1 BW = (f-f)+N, 8000 = 4000+N, s.Ny = 4000 bauds/sec. 2. For FSK system baud rate is equal to bit rate. Bit rate = 4000 bits per second 884 Noncoherent FSK Detection : st >>> [Asked in Exam - Dec. 09 I!) — Fig. 8.84, It is supposed to regenerate the Ans * The FSK receiver block diagram is as shown in original digital data signal from the FSK signal at its input Received BFSK sgnal Comparator Binary signal Fig, 8.8.4 : FSK receiver + Digital Modulation Techniqug RGPV) _ tors one with center frequen fy and the other With, ‘The reoeiver consists of two band p3 frequency of A" - - center rT exccors ae simple diode detectors which rectify and filler their inpus, reae al to the ac input. < voltage proportion: are ang the received signal will be . received. That means the Suppose a binary “IIS Vogsx (t) = sin 2m fit) (8.84) «Thus the BPF, will pass this signal to D,. The output of BPF, will be 0, hence output of Dis zero. Therefore the comparator output will be positive representing a logic “1”. 5 Similarly if a binary “0” is received, the received FSK signal will have a frequency “f,". Te output of BPF, will be zero. «The BPF; will pass this signal to D, to produce @ propo © Therefore comparator output will be zero which represe! recovered by the receiver. 8.85 Coherent FSK Demodulator : tional dc voltage. Output of D, is zero. nts a logic “0”. Thus the original datais >>> [Asked in Exam - Dec. 091} Se Fig 885 shows the block diagram of a coherent FSK receiver. Data out Operation : Fig, 8.8.5; Coherent FSK. demodulator . The snvomng FSK signal is mul exactly the tly the sane frequency and pl Hiplics : ki plied with the recovered carrier signals. This sigt!™ Hu the (Wo transsmatied frequen wase of the referen nce carrier a i me at the transmitter. . ‘The multy nd f, ) are not gener plier outputs are generally contin compat Outs te passed though low pass filters uous. ® " Fillers and the filter outputs are applies The compara lors output is a dipita 886 FSK Damacdietest__ eal signal with 0 or 1 y: ‘alues. 32 Quadrature Amplitude Shift Keying (QAM) . fhe PSK methods discussed till now, one symbol is distinguished from the other in Inall U mbols transmitted using BPSK, QPSK or M-ary PSK are of “same vse, but al the syn amplitude”. rte ability of @ receiver to distinguish between one signal vector from another in presence of noise. depends on the distance between the vector end points ‘pus suggests that the noise immunity will improve if the signal vectors differ not only in phase, but also in amplitude. Such a system is called as amplitude and phase shift keying system. In this system the direct modulation of carriers in quadrature (ic. coso,t and sin@,t) is involved, therefore this system is called as the quadrature amplitude phase shift keying ie QAPSK or simply QASK. It is also known as quadrature amplitude modulation (QAM). 8121 Types of QAM : Depending on the number of bits per message the QAM signals are classified as follows Digital Modulation Teeny ie, +. systems * 8 ain SY’ a 1(a). All the symbols hay me on M system IS shown in Fig, 8.12.16 VAM § tion of 4 oe a aitterent pheises amplitt __ 4 Amplitude on 2 ao 4 Phase of 00 010 000 001 110 10 1 411 (a) 4 QAM () & QAM Fig, 8.12.1 : Constellation diagrams ¢ 8.12.1(b) shows the constellation diagram of 8-QAM. Note that there are two ampline jevels and four phases involved. «Te tme domain display of 8 QAM is shown in Fig. 8.12.2. Sots ais bits bis bits sbi bi bis Ee oe a oe 2 BS te a es [7 c oe oe O10. on soo {to 3110 an rast Sue ° 20 30" 180° a ” 70" Bo | 180" 270° 270" | Voeud He V baud T baud Toaud baud 1 baud irate 24 os Vig, 4.12.2 5 1 12.3 QASK Transmitter : The block diagram of ASK tansmiter wn in Fig. 8.1 gram of 2.3. Q Mer is shown in Serial 0) e 7 ans avail Adder -—* aa converter -— Vans) Frsinog Clock at every Ts Fig, 8.12.3 : QASK transmitter operation : «The QASK signal shown in Fig. 8.12.3 can be mathematically represented as, Veask = kau, (t)+k,au,(t) (8.12.1) where k, and k, are each equal to +1 or £3. + The QASK generator is as shown in Fig. 8.12.3. The bit stream b(t) is applied to a serial to parallel converter operating on a clock which has a period of T, sec. which is the symbol duration. The bits b(t) are stored by the converter and then presented in the parallel form. The four bit symbol is by 43 P42 O41 Oe © Out of these four bits, the first two bits are applied to a D to A converter and the other two bits are applied to the second D to A converter. + The output of the first D/A converter is A,(t) which is used to modulate Ue camer VP, cos a,, whereas the output of the second D/A converter ie. A, (t) is used to modulate Ue carrier VP, sino,t in the balanced modulators The balance modulator outputs are added together to get the QASK output signal, which is expressed as follows oAR12.2) Voask (0) = A, (4) VP, cos 0.44, (OV, si 8124 nacw n--.

You might also like