unit 4
unit 4
This document is confidential and intended solely for the educational purpose of RMK
Group of Educational Institutions. If you have received this document through email in
error, please notify the system manager. This document contains proprietary
information and is intended only to the respective group / learning community as
intended. If you are not the addressee you should not disseminate, distribute or copy
through e-mail. Please notify the sender immediately by e-mail if you have received
this document by mistake and delete this document from your system. If you are not
the intended recipient you are notified that disclosing, copying, distributing or taking
any action in reliance on the contents of this information is strictly prohibited.
R.M.K ENGINEERING
COLLEGE
2 Pre Requisites 8
3 Syllabus 9
4 Course outcomes 10
6.1 13
Lecture Plan
6.2 14
Activity based learning
6.3 18
Lecture Notes
6.3.1 Geometric Representation of signals 21
6.3.5 BFSK 35
BPSK
6.3.6 41
6.3.7 QPSK 47
QAM
6.3.8 55
6.3.9 57
Comparison of all digital Modulation Techniques.
S.No Contents Page
Number
6.4 58
Assignments
6.5 61
Part A Q & A
6.6 68
Part B Questions
6.7 72
Supportive online Certification courses
6.8 Real time Applications in day to day life and
74
to Industry
6.9 78
Content beyond the Syllabus
7 Assessment Schedule 83
6
1. COURSE OBJECTIVES:
22EC403- ANALOGAND
Semester IV
DIGITAL
COMMUNICATION
OUTCOMES:
Program
Specific
Course Program Outcomes
Level Outcomes
Outcom es
of CO
K3/k4/k6
K3/k4/k6
K3/K6
K4/K6
K3 K4 K6 A3 A2 A3 A3 A3 A3 A2 K3
PO-1 PO-2 PO-3 PO-4 PO-5 PO-6 PO-7 PO-8 PO-9 PO-10 PO-11 PO-12 PSO-1 PSO-2 PSO-3
C214.1 K3 3 2 1 - 3 - - 1 - - - - 1 1 -
C214.2 K3 3 2 1 - 3 - - 1 - - - - 1 1 -
C214.3 K3 3 2 1 - 2 - - 1 - - - - 1 - -
C214.4 K2 2 1 - - 2 - - 1 - - - - 1 - -
C214.5 K4 3 3 1 3 3 1 - 1 - - - - 1 - -
C214.6 K4 3 3 1 - 3 1 - 1 - - - - 1 1 -
11
6 UNIT IV
12
6.1 LECTURE PLAN
Taxonomy level
Proposed Date
Pertaining CO
No. of Periods
Actual Date
Reason for
Deviation
S.No
Topic
Delivery
Mode of
17.2.25 Black Board
1 Geometric 1 CO4
Representation of
K2 Teaching
signals
18.2.25 Black Board
2 Generation and 1 CO4 K2
Teaching
detection of coherent
systems
19.2.25 Black Board
3 Digital modulation 1 CO4 K2 Teaching
techniques – ASK, FSk
& PSK
BASK 20.2.25 Black Board
4 1 CO4 K2 Teaching
BFSK 21.2.25
5 1 CO4 K2 PPT
13
6.2 ACTIVITY BASED LEARNING
Sl. Activity Topic
No
14
Quiz Questions:
1. The bandwidth of BFSK is than BPSK.
a) Lower
b) Same
c) Higher
d) Not predictable
Answer C) Higher
11. The technique that may be used to reduce the side band power is
a) MSK
b) BPSK
c) Gaussian minimum shift keying
d) BFSK
Answer: c) Gaussian minimum shift keying
12.In DPSK technique, the technique used to encode bits is
a) AMI
b) Differential code
c) Uni polar RZ format
d) Manchester format
Answer: b) Differential code
13. Synchronization of signals is done using
a) Pilot clock
b) Extracting timing information from the received signal
c) Transmitter and receiver connected to master timing source
d) All of the above
Answer: d) All of the above
16. If we correlate the received signal with any one of the two orthogonal function,
the obtained inner product will be
a) In phase
b) Quadrature
c) Zero
d) Cannot be determined
Answer: c) Zero
17. Every frequency has orthogonal functions.
a) One
b) Two
c) Four
d) Six
Answer: b) Two
18. Which FSK has no phase discontinuity?
a) Continuous FSK
b) Discrete FSK
c) Uniform FSK
d) None of the mentioned
Answer: a) Continuous FSK
19. Average energy per bit is given by
a) average energy symbol/log2 M
b) average energy symbol * log2 M
c) log2 M/ Average energy symbol
d) none of the mentioned
Answer: c) log2 M/ Average energy symbol
15
UNIT –IV
DIGITAL MODULATION TECHNIQUES
Geometric Representation of signals-`Generation & Detection of Coherent
systems – BASK, BFSK, BPSK, BFSK, QPSK, QAM and Comparison of Digital
Modulation Techniques.
𝑇
𝑖 = 1,2, … 𝑀
𝑆𝑖𝑗 = 𝑆𝑖 𝑡 ∅𝑗 𝑡 𝑑𝑡
0
𝑗 = 1,2, … . 𝑁
The Real- Valued basis functions ∅1 𝑡 , ∅2 𝑡 … . ∅𝑛 𝑡 are erthoneral, and it is
given by
𝑇
1 𝑖𝑓 𝑖 = 𝑗
∅𝑖 𝑡 ∅𝑗 𝑡 𝑑𝑡 =
0
0 𝑖𝑓 𝑖 ≠ 𝑗
First condition proves that each basis function is normalized to have unit energy
Second condition proves that all basis functions are orthogonal to each other.
0≤𝑡≤𝑇
𝑆𝑖 (t)=∑𝑁
𝑗 =1 𝑆𝑖𝑗 ∅𝑗 𝑡 (4.1)
𝑗 = 1,2, … . 𝑁
𝑖 = 1,2, … 𝑀
𝑆𝑖𝑗 =𝑆𝑖 ∅𝑗 𝑡 𝑑𝑡 (4.2)
𝑗 = 1,2, … . 𝑁
Each signal in the set 𝑆𝑖(𝑡) is determined by the vector co- efficient
𝑆𝑖1
Si= 𝑆𝑖2 i=1,2,3…M (4.3)
𝑆𝑖𝑁
The vector 𝑆𝑖 is called the signal vector. We can visualize the set of signal
vectors 𝑆𝑖 , as set of M points in an N- demendional Euclidean space. This N-
dimensional Euclidean space is called the signal space.
Fig 4.4 Shows a two – dimensional signal space with three signals that is
N=2 and M=3
In the Euclidean space, lengths of vectors and angles between vectors are defined. Length or
norm of vector is denoted by 𝑆𝑖.
1) The squared- length of any signal vector Si is equal to the inner product of the vector with itself
𝑆𝑖 2=(𝑆𝑖 , 𝑆𝑖 )
2
=∑𝑁
𝐽 =1 𝑆𝑖𝑗 (4.4)
Where 𝑆𝑖𝑗 are the elements of 𝑆𝑖
2) The cosine of the angle between two vectors is equal to the inner product of the two vectors
divided by the product of their individual norms.
that is cosine of angle between
Vectors 𝑆𝑖 and 𝑆𝑗 =(Si,Sj)/ 𝑆𝑖 𝑆𝑗
𝑇
=∑𝑀 𝑁
𝑗 =1 ∑𝑘=1 𝑆𝑖𝑗 𝑆𝑖𝑘 0 𝑖
𝑆 (𝑡) ∅𝑘 (t)dt
2
𝐸𝑖 =∑𝑁
𝑗 =1 𝑆ij (4.5)
Thus from equation 4 and 5
2
Ei = 𝑆𝑖
4.3 Digital Modulation Techniques:
Modulation is defined as the process by which some characteristic of a carrier is
varied in accordance with a modulating wave.
In digital modulation the modulating wave consists of a binary data or encoded
version of it[Line coding]
The carrier is a high frequency sinusoidal wave
The various digital modulation techniques are
1) Amplitude shift keying (ASK)
2) Frequency shift keying(FSK)
3) Phase shift keying (PSK)
Coherent detection- Receiver has exact knowledge of the carrier wave’s phase
reference ie) receiver is phase- locked to the transmitter.
Non- Coherent detection- Knowledge of carrier wave’s phase is not required less
complex.
Thus many modulation/ detection schemes are available. The choice of scheme
is based on the following criteria,
Maximum data rate
Minimum probability of symbol error
Minimum transmitted power
Minimum channel BW
Minimum circuit complexity
Minimum resistance to interfering signals.
4.4 BINARY AMPLITUDE-SHIFT KEYING
The simplest digital modulation technique is amplitude-shift keying (ASK), where a binary
information signal directly modulates the amplitude of an analog carrier. ASK is similar to
standard amplitude modulation except there are only two output amplitudes possible.
Amplitude-shift keying is sometimes called digital amplitude modulation (DAM). Mathe-
matically, amplitude-shift keying is
where
vask (t) = amplitude-shift keying wave
vm (t) = digital information (modulating) signal (volts)
A/2 = unmodulated carrier amplitude (volts)
c = analog carrier radian frequency (radians per second, 2 fct)
Thus, the modulated wave vask(t), is either A cos( ct) or 0. Hence, the carrier is either “on” or
“off,” which is why amplitude-shift keying is sometimes referred to as on-off keying (OOK).
Fig.4.6 shows the input and output waveforms from an ASK modulator. From the figure, it can
be seen that for every change in the input binary data stream, there is one change in the ASK
waveform, and the time of one bit (tb) equals the time of one analog signaling element (ts). It
is also important to note that for the entire time the binary input is high, the output is a
constant-amplitude, constant-frequency signal, and for the entire time the bi- nary input is
low, the carrier is off. The bit time is the reciprocal of the bit rate and the time of one
signaling element is the reciprocal of the baud. Therefore, the rate of change of the
Binary
input
(a)
ASK waveform (baud) is the same as the rate of change of the binary input (bps); thus, the bit rate equals the
baud. With ASK, the bit rate is also equal to the minimum Nyquist bandwidth. The use of amplitude-modulated
analog carriers to transport digital information is a relatively low-quality, low-cost type of digital modulation
and, therefore, is seldom used except for very low- speed telemetry circuits.
To transmit symbol ‘0’, the signal s(t)=0 i.e., no signal is trasnmitted/ Signal s(t) contains some complete
cycle or carrier frequency fc.
Hence, the ASK waveform looks like an ON-OFF of the signal as shown in Fig.4.7. Therefore, it is also known
as the ON-OFF keying (OOK).
4.4.1 Signal Space Diagram of Binary Amplitude Shift Keying
The ASK waveform of the equation (1) for symbol ‘1’ can be represented as,
This means that there is only one carrier function Φ1(t). The signal space diagram will have two points on
Φ1(t). One will be at zero and other will be at √PsTb.
ASK signal may be generated by simply applying the incoming binary data and the sinusoidal carrier to the
two inputs of a product modulator (i.e. balanced modulator). the resulting output will be the ASK
waveform. This is shown in the fig.4.9 below. Modulation causes a shift of the baseband signal spectrum.
The spectrum of the ASK signal shows that it has infinite bandwidth. However, for practical purposes,
the bandwidth is often defined as the bandwidth of an ideal band pass filter centered at fc whose
output contains about 95% of the total average power content of the ASK signal. It may be proved
that according to this criterion the bandwidth of the ASK signal is approximately 3/Tb Hz. The
bandwidth of the ASK signal can, however, be reduced by using smoothed versions of the pulse
waveform instead of rectangular pulse waveforms.
Binary ASk signal can also be demodulated non-coherently using envelope detector as shown in Fig.4.12.
This greatly simplifies the design consideration required in synchronous detection. Non-coherent detection
schemes do not require a phase-coherent local oscillator. This method involves some form of rectification
and low-pass filtering at the receiver.
Frequency-shift keying (FSK) is another relatively simple, low-performance type of digital modulation. FSK
is a form of constant-amplitude angle modulation similar to standard frequency modulation (FM) except the
modulating signal is a binary signal that varies between two discrete voltage levels rather than a
continuously changing analog waveform. Consequently, FSK is sometimes called binary FSK (BFSK). The
general expression for FSK is
From Equation , it can be seen that the peak shift in the carrier frequency (Δ f) is proportional to
the amplitude of the binary input signal (vm[t]), and the direction of the shift is determined by the
polarity
With binary FSK, the carrier center frequency (fc) is shifted (deviated) up and down in the frequency
domain by the binary input signal as shown in Fig.4.13. As the binary in- put signal changes from a logic 0
to a logic 1 and vice versa, the output frequency shifts between two frequencies: a mark, or logic 1
frequency (fm), and a space, or logic 0 frequency (fs). The mark and space frequencies are separated from
the carrier frequency by the peak frequency deviation (Δf) and from each other by 2 Δf.
With FSK, frequency deviation is defined as the difference between either the mark or space frequency and
the center frequency, or half the difference between the mark and space frequencies. Frequency deviation
is illustrated in Fig.4.13 and expressed mathematically as
where
Fig.4.14 a shows in the time domain the binary input to an FSK modulator and the cor- responding FSK
output. As the figure shows, when the binary input (fb) changes from a logic 1 to a logic 0 and vice versa, the
FSK output frequency shifts from a mark (fm) to a space (fs) frequency and vice versa. In Figure 4a, the mark
frequency is the higher frequency (fc + Δf), and the space frequency is the lower frequency (fc — Δf),
although this relationship could be just the opposite. Fig.4.14 b shows the truth table for a binary FSK
modulator. The truth table shows the input and output possibilities for a given digital modulation scheme.
FIG 4.14 FSK in the time domain: (a) waveform; (b) truth
table
FSK is the exception to the rule for digital modulation, as the minimum bandwidth is not
determined from Equation 10. The minimum bandwidth for FSK is given as
B = |( fs — fb) — ( fm — fb)|
= |fs — fm| + 2 fb
and since |fs — fm| equals 2Δf, the minimum bandwidth can be approximated as
Note how closely this resembles Carson’s rule for determining the approximate bandwidth for
an FM wave. The only difference in the two equations is that, for FSK, the bit rate (fb) is
substituted for the modulating-signal frequency (fm).
Bessel functions can also be used to determine the approximate bandwidth for an
FSK wave. As shown in Fig.4.15, the fastest rate of change (highest fundamental
frequency) in a nonreturn-to-zero (NRZ) binary signal occurs when alternating 1s
and 0s are occurring (i.e., a square wave). Since it takes a high and a low to
produce a cycle, the highest funda- mental frequency present in a square wave
equals the repetition rate of the square wave, which with a binary signal is equal to
half the bit rate. Therefore,
FIG 4.15 FSK modulator, tb, time of one bit = 1/fb; fm, mark frequency; fs, space frequency;
T1, period of shortest cycle; 1/T1, fundamental frequency of binary square wave; fb, input bit
rate (bps)
4.5.2 FSK Transmitter
Fig.4.16 shows a simplified binary FSK modulator, which is very similar to a conventional FM
modulator and is very often a voltage-controlled oscillator (VCO). The center frequency (fc) is
chosen such that it falls halfway between the mark and space frequencies. A logic 1 input shifts the
VCO output to the mark frequency, and a logic 0 input shifts the VCO output to the space
frequency. Consequently, as the binary input signal changes back and forth between logic 1 and
logic 0 conditions, the VCO output shifts or deviates back and forth between the mark and space
frequencies.
In a binary FSK modulator, Δf is the peak frequency deviation of the carrier and is equal to the
difference between the carrier rest frequency and either the mark or the space frequency (or half
the difference between the carrier rest frequency) and either the mark or the space frequency (or
half the difference between the mark and space frequencies). A VCO- FSK modulator can be
operated in the sweep mode where the peak frequency deviation is
NR FSK
Z FSK output
bina Modulator
ry (VCO)
inpu k1 = Hz/v
t
– +
ƒ ƒ
ƒm ƒc ƒs
Logic 0
Logic 1
5
9
FIG 4.17 Noncoherent FSK demodulator
simply the product of the binary input voltage and the deviation sensitivity of the VCO. With the sweep mode
of modulation, the frequency deviation is expressed mathematically as
Δf = vm(t)kl
where
Δf = peak frequency deviation (hertz)
vm(t) = peak binary modulating-signal voltage (volts)
kl = deviation sensitivity (hertz per volt).
With binary FSK, the amplitude of the input signal can only be one of two values, one for a logic 1
condition and one for a logic 0 condition. Therefore, the peak frequency deviation is constant and always at its
maximum value. Frequency deviation is simply plus or minus the peak voltage of the binary signal times the
deviation sensitivity of the VCO. Since the peak voltage is the same for a logic 1 as it is for a logic 0, the
magnitude of the frequency deviation is also the same for a logic 1 as it is for a logic 0.
4.5.3 FSK Receiver
FSK demodulation is quite simple with a circuit such as the one shown in Fig.4.17. The FSK input signal is
simultaneously applied to the inputs of both band pass filters (BPFs) through a power splitter. The respective
filter passes only the mark or only the space frequency on to its respective envelope detector. The envelope
detectors, in turn, indicate the total power in each pass band, and the comparator responds to the largest of
the two powers. This type of FSK detection is referred to as non coherent detection; there is no frequency
involved in the demodulation process that is synchronized either in phase, frequency, or both with the
incoming FSK signal.
Fig.4.18 shows the block diagram for a coherent FSK receiver. The incoming FSK signal is multiplied by a
recovered carrier signal that has the exact same frequency and phase as the transmitter reference. However,
the two transmitted frequencies (the mark and space frequencies) are not generally continuous; it is not
practical to reproduce a local reference that is coherent with both of them. Consequently, coherent FSK
detection is seldom used.
FIG 4.19 PLL-FSK demodulator
The most common circuit used for demodulating binary FSK signals is the phase-locked loop (PLL), which is
shown in block diagram form in Fig.4.19. A PLL-FSK demodulator works similarly to a PLL-FM demodulator. As
the input to the PLL shifts between the mark and space frequencies, the dc error voltage at the output of the
phase comparator follows the frequency shift. Because there are only two input frequencies (mark and
space), there are also only two output error voltages. One represents a logic 1 and the other a logic 0.
Therefore, the output is a two-level (binary) representation of the FSK in- put. Generally, the natural
frequency of the PLL is made equal to the center frequency of the FSK modulator. As a result, the changes in
the dc error voltage follow the changes in the analog input frequency and are symmetrical around 0 V.
Binary FSK has a poorer error performance than PSK or QAM and, consequently, is seldom used for high-
performance digital radio systems. Its use is restricted to low-performance, low-cost, asynchronous data
modems that are used for data communications over analog, voice-band telephone lines.
4.5.4 Continuous-Phase Frequency-Shift Keying
Continuous-phase frequency-shift keying (CP-FSK) is binary FSK except the mark and space frequencies are
synchronized with the input binary bit rate. Synchronous simply implies that there is a precise time relationship
between the two; it does not mean they are equal. With CP-FSK, the mark and space frequencies are selected
such that they are separated from the center frequency by an exact multiple of one-half the bit rate (fm and fs
= n[fb /2]), where n = any integer). This ensures a smooth phase transition in the analog output signal when
it changes from a mark to a space frequency or vice versa. Fig.4.20 shows a non continuous FSK waveform.
It can be seen that when the input changes from a logic 1 to a logic 0 and vice versa, there is an abrupt
phase discontinuity in the analog signal. When this occurs, the demodulator has trouble following the
frequency shift; consequently, an error may occur.
Fig.4.21 shows a continuous phase FSK waveform. Notice that when the output frequency changes, it is a
smooth, continuous transition. Consequently, there are no phase dis- continuities. CP-FSK has a better bit-
error performance than conventional binary FSK for a given signal-to-noise ratio. The disadvantage of CP-FSK
is that it requires synchronization circuits and is, therefore, more expensive to implement.
Principle:
In a coherent binary psk system, binary 1 and 0 are represented by 𝑆1 (t) and
𝑆2 (t) respectively,
2𝐸𝑏
𝑆1 (t) = cos
(2𝜋𝑓𝑐 𝑡)
𝑇𝑏
𝐸𝑏
𝑆2 (t)= 2 cos
(2𝜋𝑓𝑐 𝑡 + 𝜋)
𝑇𝑏
𝐸
𝑆2 𝑡 = - 2 𝑇𝑏 cos(2𝜋𝑓𝑐 t)
𝑏
Where 0≤ t≤ 𝑇𝑏
𝑛
𝐸𝑏 → Energy per bit, 𝑓𝑐 =𝑇 𝑐 ; 𝑛𝑐 = fixed integer
𝑏
A pair of sinusoidal waves that differ only in relative phase-shift of 180• are referred
as antipodal signals
2
∅1 𝑡 = 𝑇𝑏
cos (2𝜋𝑓𝑐 t) 0≤ t < 𝑇𝑏 (4.6)
𝑆11 =+ 𝐸𝑏
𝑇𝑏
𝑠21 = 0
𝑆2 (t)∅2(t)dt
𝑆21=− 𝐸𝑏
Thus a BPSK system has a signal space that is one dimensional (N=1) and with two
message points (M=2). The two message points are given by 𝑆11 and 𝑆21. Message
point corresponding to 𝑠2 (t) is located at 𝑠11 =+ 𝐸𝑏 and message point corresponding
to 𝑆2 (t) is 𝑆21 =- 𝐸𝑏 .
At the receiver, the decision rule is to guess a binary 1 if the received signal point
falls in region z1 and guess binary o if the received signal point falls in region z2.
4.6.1 Generation:
Binary 0 →- 𝐸𝑏
This binary wave and a sinusoidal carrier ∅1 (t) are applied to a product modulator
whose o/p is a PSK wave.
4.6.2 Detection :
To detect the original binary sequence, the noisy psk wave x(t) is applied to a
correlator. Another i/p to correlator is a coherent reference signal ∅1 (t). The correlator
o/p 𝑥1 is given to a decision device. J6 𝑥1 <0, the receiver decides in favour of binary 1
and if 𝑥1 <0, it decides in favour of binary 0.
1) Signal 𝑆2 (t) is transmitted [binary 1] but the noise in the channel makes the
received signal point to fall inside region𝑧1 and so the receiver decides 𝑠1 (t) (ie)
binary o.
2) Signal 𝑆1 (t) is transmitted [binary 0] but the noise in the channel makes the
received signal point to fall inside region 𝑍2 and so receives decides 𝑆2 (t)(ie)
binary 1.
To calculate probability of error of first condition,
𝑍1 = 0 <𝑥1 <1
Where 𝑥1 is the observation scalar.
𝑇𝑏
𝑥1 = 0
𝑥( 𝑡)∅1 (t)dt
𝑤ℎ𝑒𝑟𝑒 𝑥 𝑡 → 𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑 𝑠𝑖𝑔𝑛𝑎𝑙
Probability density function,
1
𝑓𝑥1 𝑥1
=
1 exp[-𝑁 (𝑥1 -𝑠21 )2
0 𝜋 𝑁𝑂 0
1
𝑓𝑥1 (𝑥1/0 ) = exp −(𝑥1 + 𝐸𝑏 )2
𝜋𝑁𝑂
Probability of error,
∞
𝑃𝑒 (0)= 0
𝑓𝑥1 (𝑥1 /0)d𝑥1
1 ∝ 1
= 𝑒𝑥𝑝[-𝑁 (𝑥1 + 𝐸𝑏 )2 d𝑥1
𝜋 𝑁𝑂 0 𝑂
Take Z= (𝑥1 + 𝐸𝑏 )2
1 ∝
𝑃𝑒 (0) = 𝐸𝑏 (−𝑧 2 )dz
exp
𝜋
𝑁0
1 𝐸𝑏
𝑃𝑒 (0)=2erfc( )
𝑁0
simillarly,
1 𝐸𝑏
𝑃𝑒 (1) = 2erfc( 𝑁0
)
1 𝐸𝑏
𝑃𝑒 = erfc( )
2 𝑁𝑜
4.6.4 Power Spectrum:
From the generation of BPSK, it is clear that BPSK has only one in-phase
component which is 𝑡𝑔 (t) or –g(t).
2𝐸𝑏
; 0 ≤ 𝑡 ≤ 𝑇𝑏
g(t) = 𝑇𝑏
0 ; 𝑒𝑙𝑠𝑒 𝑤ℎ𝑒𝑟𝑒
4.7.1 Principle:
In binary FSK system, symbols 1 and 0 are represented by two sinusoidal waves that
differ in frequency. It is given as below,
2𝐸𝑏
𝑐𝑜𝑠2𝜋𝑓1 𝑡 𝑜≤𝑡≤
𝑆𝑖 (t) = 𝑇𝑏 𝑇𝑏
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
i=1,2
2𝐸𝑏
(ie) 𝑆1 (t) = 𝑇𝑏 cos2𝜋𝑓1 t 0 ≤ t≤ 𝑇𝑏
0
2𝐸𝑏
𝑐𝑜𝑠2𝜋𝑓1 𝑡 𝑜≤𝑡≤𝑏
𝑆2 (t) ={ 𝑇𝑏
𝑜 𝑒𝑙𝑠𝑒𝑤ℎ𝑒𝑟𝑒
2
0 ≤ 𝑡 ≤ 𝑇𝑏
∅𝑗 (t) = 𝑇𝑏
𝑜 𝑒𝑙𝑠𝑒𝑤ℎ𝑒𝑟𝑒
Where j=1,2
𝐸𝑏 𝑖=𝑗
Sij = (4.9)
0 𝑖≠𝑗
According to equation 4
S11= 𝐸𝑏 S21=0
S12=0 S22= 𝐸𝑏
𝐸𝑏 0
S1= S2 = (4.10)
0 𝐸𝑏
Thus a coherent BFSK system has a two dimensional (N=2) Signal space with
two message points (M=2).The message points are defined by signal vectors. The
signal space digram has two regions Z1 and Z2 as in fig.4.26
x1 and x2
𝑇𝑏
x1 = 0
𝑥 𝑡 ∅1 𝑡 𝑑𝑡 and
𝑇𝑏
x2 = 0
𝑥 𝑡 ∅2 𝑡 𝑑𝑡 (4.11)
x(t)->received signal
The receiver deceids in favor of symbol 1 if the vector x falls in region Z1 and
the receiver decides ie) x1>x2
To generate a binary FSK signal, the input binary sequence m(t) is represented
in on- off form. Symbol is represented by 𝐸𝑏 and symbol 0 by zero volts. An eveter is
used to generate 𝑚(𝑡). Now m(t) is s multiplied by ∅1 (t) and 𝑚(𝑡) is multiplied by ∅2 (t)
ie)
` For symbol 1, the frequency f1 is transmitted to the summer and for symbol 0,
frequency fz is transmitted to the summer,
Now the output of summer is a binary FSK wave. The frequency of modulated wave is
shifted with a continuous phase, So FSK is called as continuous phase frequency shift
keying (CP-FSK)
4.7.3 Detection:
The received noisy signal s(t) is given as a common input to two correlators,
Another input to the correlators are the coherent reference signals ∅1 (t) and ∅2 (t). The
correlator outputs are then subtracted to get the value of l.
l= x1-x2 (4.12)
E[L/1] = E[X1/1]-[X2/1]
= 𝐸𝑏 -0
= 𝐸𝑏
E[L/0] = E[X1/0]-[X2/0]
=0- 𝐸𝑏
=- 𝐸𝑏
𝑁0 𝑁
= 2
+ 20 =N0
1 −1
FL (l/0)= 2𝜋𝑁 0
exp[2𝑁 (l+ 𝐸𝑏 )2]
0
2
1 ∞ (𝑙+ 𝐸𝑏 )
= 2𝜋𝑁 0 0
𝑒𝑥𝑝[- 2𝑁0
]dl
(𝑙+ 𝐸𝑏 )
Take Z=-
2𝑁0
1 ∞
= 𝜋 𝐸𝑏 𝑒𝑥𝑝 −𝑍 2 𝑑𝑧
2𝑁 0
1 𝐸𝑏
Pe(0)= 𝑒𝑟𝑓𝑐
2 2𝑁0
similarly
1 𝐸𝑏
Pe(1)=2 𝑒𝑟𝑓𝑐 2𝑁0
1 𝐸𝑏
𝑃𝑒= 𝑒𝑟𝑓𝑐
2 2𝑁0
A binary FSK signal has two components, an is- phase component and a quadrature
component.
𝜋
In QPSK the phase of the carrier takes any one of the four values such as 4
3𝜋 5𝜋 7𝜋
4
, 4
and 4
.This is achieved by grouping the input binary sequence into dibits. Each
2𝐸
𝜋
0≤𝑡≤𝑇
Thus 𝑆𝑖 𝑡 = 𝑇 𝐶𝑜𝑠 2𝜋𝑓𝑐 + 2𝑖 + 1 4
0 elsewhere
(4.13)
where i=1,2,3&4
𝑛𝑐
𝑓𝑐= 𝑇
2𝐸 2𝐸
𝜋 𝜋
𝑆𝑖 𝑡 = 𝑇 𝑐𝑜𝑠 2𝑖 − 1 4
𝐶𝑜𝑠(2𝜋𝑓𝑐 𝑡) − 𝑇 𝑆𝑖𝑛 2𝑖 − 1 4
𝑆𝑖𝑛(2𝜋𝑓𝑐 𝑡) for 0<t<T
0 elsewhere
(4..14)
2
∅1 𝑡 = 𝐶𝑜𝑠(2𝜋𝑓𝑐 𝑡) 0≤𝑡≤𝑇
𝑇
2
∅2 𝑡 = 𝑆𝑖𝑛(2𝜋𝑓𝑐 𝑡) 0≤𝑡≤𝑇
𝑇
(4.15)
i==1,2,3,4
j=1,2
𝜋
𝐸 𝐶𝑜𝑠 (2𝑖 − 1) 4
Signal vector, Si= 𝜋
(4.16)
− 𝐸 𝐷𝑖𝑛 (2𝑖 − 1) 4
Where, i=1,2,3,4..
Phase of QPSK Co-ordinates of Message points
Input Dibit
signal Si1 Si2
𝜋
10 4 + 𝐸 2 − 𝐸 2
00 3𝜋 − 𝐸 2 − 𝐸 2
4
01 5𝜋 − 𝐸 2 + 𝐸 2
4
11 7𝜋 + 𝐸 2 + 𝐸 2
4
`
To realize the decision rule, the signal space is divided into four regions,
1. The set of points closest to the messange point associated with signal vector
S1→ Z1
2. The set of points closest to the message point associated with S2→ Z2
3. The set of points closest to the message point associated with S3→ Z3
4. The set of points closest to the message point associated with S4→ Z4
The received signal x(E) is difened by,
X(t)=s w(t) 0≤ t ≤ T
i=1,2,3,4
w(f)→ White Gaussian noise. The observation vector x of QPSK receive has to
elements x1 and x2
the observation vector x of QPSK receiver has two elements x1 and x2
𝑇 𝑇
x1 = 0
𝑥 𝑡 ∅1 𝑡 𝑑𝑡 x2= 0
𝑥 𝑡 ∅2 𝑡 𝑑𝑡
The input binary wave in represented in polar form. Symbol 1→+ 𝐸𝑏 & symbol
0→- 𝐸𝑏 . This wave is divided by means of a demultiplexer into two waves according
to odd & even numbered bits. The wave are represented by 𝑏1 (t) and 𝑏2 (t). These
waves separately modulate ∅1 (t) and ∅2 (t). The result is a pair of binary PSK waves
which are added to produce the desired QPSK wave.
Similarly E=2𝐸𝑏 .
𝑗6 𝑥1 >0, it is a binary 1
𝑗6 𝑥1 <0, it is a binary 0.
Finally the two binary sequences at the in – phase and quadrature o/p are
multiplexed to produce the binary wave.
`
2
𝐸 𝐸 2
− 𝑥1− ) (𝑥2− )
∝ 1 2 ∝ 1
𝑝𝑐 = exp exp d 𝑥2
2
0 𝜋
− 𝑁0
𝑑𝑥1 0 𝜋𝑁0 𝑁0
𝐸 𝐸
𝑥1− 𝑥2−
Take Z= =
2 2
𝑁0 𝑁0
2
1 ∝
𝑝𝑐 = 𝜋 − 𝐸 exp(−𝑧 2)
2𝑁 0
2
1 𝐸
𝑝𝑐 = 1 − 𝑒𝑟𝑓𝑐( )
2 2𝑁0
𝐸 𝐸
𝑝𝑐 = 1 − erf 2 c + ¼ erf 2 c
2𝑁0 2𝑁0
Now,
𝑝𝑐 = 1-𝑝𝑐
𝐸 𝐸
= 1 − erf 2 c 2𝑁0
− ¼ erf 2 c 2𝑁0
−𝐿 + 1, 𝐿 − 1 −𝐿 + 3, 𝐿 − 1 … … … . 𝐿 − 1, 𝐿 − 1
{ai,bi} = −𝐿 + 1, 𝐿 − 3 −𝐿 + 3, 𝐿 − 3 … … … . 𝐿 − 1, 𝐿 − 3
(−𝐿 + 1, −𝐿 + 1) −𝐿 + 3, −𝐿 + 1 … … (𝐿 − 1, −𝐿 + 1)
4.9 Quadrature Amplitude Modulation
L= 16 =4
00 01 11 10
1) Since the in-phase and quadrature components are independent, the probability
of correct detection is given by,
PC = (1-𝑃𝑒1 )2
𝑃𝑒1 = Probability of symbol error for either component
1 𝐸0
1) 𝑃𝑒1 = 1 − erfc
2 𝑁0
from above
1 𝐸0
𝑃𝑒 = 2(1-𝐿 ) 𝑒𝑟𝑓𝑐 𝑁0
1 𝐸0
𝑃𝑒 = 2(1- 𝑀
)𝑒𝑟𝑓𝑐 𝑁0
L= 𝑀
1 3𝐸𝑎𝑣
𝑃𝑒 =2 1 − 𝑀
𝑒𝑟𝑓𝑐 2 𝑀−1 𝑛0
and produces two parallel binary sequences whose bit rates are 𝑅𝑏 /2. The 2 to L level
converters L = 𝑀 generate polar L level signals in response to the respective in-
phase and quadrature channel inputs. The two polar L-level signals are combined to
produce QAM wave.
4.9.3 Detection:
The received signal is decoded to produce L- level signals which are then given
to decision circuit. In this circuit the L- level signals are compared with L-1 decision
thresholds.
The o/p of two decision circuits are then combined in the parallel –to-serial
converter to produce the original binary sequence.
4.10 Comparison of Digital Modulation Techniques :
Table 2 summarizes the relationship between the number of bits encoded, the number of output
conditions possible, the minimum bandwidth, and the baud for ASK, FSK, PSK, and QAM. Note that
with the three binary modulation schemes (ASK, FSK, and BPSK), n = 1, M = 2, only two output
conditions are possible, and the baud is equal to the bit rate. However, for values of n > 1, the
number of output conditions increases, and the minimum bandwidth and baud decrease. Therefore,
digital modulation schemes where n > 1 achieve bandwidth compression (i.e., less bandwidth is
required to propagate a given bit rate). When data compression is performed, higher data
transmission rates are possible for a given bandwidth.
Assignment Unit IV
1. Implement BPSK, BFSK in MATLAB and compute performance comparison
of BPSK and BFSK with respect to Probability of error and Bit Error Rate
Hint: Matlab program is available in net. Students can refer that and make the
comparison and tabulate it.
2. Compare QPSK, QAM and justify your answer with respect to an
practical example.
Hint: QAM is used in Tele Communication Systems.
QPSK is widely used in Satellite Communication.
Part A
Questions & Answers
(Unit-IV)
UNIT-IV DIGITAL MODULATION SCHEMES
PART – A (Q&A)
10. What is the value of maximum signal to noise ratio of the K2 CO4
matched filter?
When it becomes maximum? Maximum signal to noise ratio is
the ratio of energy to psd of white noise. i.e., ρmax = E/ (N0/2)
This maximum value occurs at the end of bit duration i.e. Tb
20. Write the expression for bit error rate for coherent K3 CO4
binary FSK.
Bit error rate for coherent binary FSK is given as,
Pe = 1/2erfc√0.6E/No.
21. Highlight the major difference between a QPSK & MSK K3 CO4
signal.
MSK signal have continuous phase in all the cases, where as
QPSK has phase shift of π/2 or π.
22. What are the advantages and disadvantages of differential K3 CO4
phase shift keying?
Advantages:
DPSK does not need carrier at its receiver. Hence the complicated
circuitry for generation of local carrier is avoided.
The bandwidth requirement of DPSK is reduced compare to that
of BPSK.
Disadvantages:
The probability of error or bit error rate of DPSK is higher than
that of BPSK.
Since DPSK uses two successive bits for its reception, error in the
first bit creates error in the second bit. Hence error propagation
in DPSK is more.
Whereas in PSK single bit can go in error since detection of each
bit is independent.
Noise interference in DPSK is more.
Questions Bloom’s
Level
K3 CO4
23. Define QPSK
In QPSK two successive bits in the data sequence grouped
together. This combination of two bits forms four distinct
symbols. When the symbol is changed to the next symbol the
phase of the carrier is changed by 450(0r π/4 ).
Became of combination of two bits ther will be four symbols.
Hence the phase shift will be π/4, 3π/4, 5π/4 or 7π/4.
QPSK reduces amplitude variations and required transmission
bandwidth..
28. A BPSK system makes errors at the average rate of 100 errors K3 CO4
per day. Date rate is 1Kbps. The single sided noise power spectral
density is 10-10* W/Hz. Assuming the system to be wide sense
stationary, what is the average bit error probability?
Bit error Probability,
Questions Bloom’s
Level
29. Differentiate QPSK from PSK in terms of transmission K2 CO4
bandwidth and bit information it carries.
a. Bandwidth of PSK is 2fb and bandwidth required is fb.
b. Where, fb – maximum frequency in baseband signal.
c. Bit information carried by BPSK is one bit (0 or 1) at a time.
d. Bit information carried by QPSK is dibit (00, 01, 10 & 11) at a
time.
30. What are the drawbacks of binary PSK system? K3 CO4
It is difficult to detect +b(t) or –b(t) because of squaring in the
receiver.
Problems of ISI and inter channel interference present.
31. Draw the Signal Space diagram for BFSK K3 CO4
7. A set of binary data is sent at the rate of Rb = 100 Kbps over a K3 CO4
channel with 60 dB transmission loss and power spectral
density = 10-12 W/Hz at the receiver. Determine the transmitted
power for a bit error probability Pe = 10-3 for the
following modulation schemes.
(i) FSK (ii) PSK
(iii) DPSK (iv) 16 QAM
1. https://nptel.ac.in/courses/117/101/117101051/
Topics covered:
1.Introduction to Digital Communication
2.Sampling
3.Quantization
4.Encoding
5.PCM and Delta Modulation
6.Channels and Models
7.Information Theory
8.Digital Modulation Techniques
9.Source Coding
10. Equalizers
11. Channel Coding
2. https://nptel.ac.in/courses/108/102/108102096/
Topics covered:
All the topics of Unit I to V
3.https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-450-
principles-of-digital-communications-i-fall-2006/video-lectures/
Topics covered:
All the topics of Unit I to V
4.http://www.infocobuild.com/education/audio-video-courses/electronics/modern-
digital-communication-iit-kharagpur.html
Topics covered:
All the topics of Unit I to V
Real time Applications
in Day to Day life and
to Industry
A. Implementation of High Order QAM Modulation on SDR
Link: https://iopscience.iop.org/article/10.1088/1742-
6596/1302/2/022095/pdf
B. QPSK in TTL upconverters
Link: https://nardamiteq.com/docs/SEC03C32.PDF
Link: https://www.cablefree.net/wirelesstechnology/ofdm-introduction/
OFDM (Orthogonal Frequency Division Multiplexing) is a form of signal waveform or modulation that
provides some significant advantages for data links.
Accordingly, OFDM, Orthogonal Frequency Division Multiplexing is used for many of the latest wide
bandwidth and high data rate wireless systems including Wi-Fi, cellular telecommunications and many
more.
The fact that OFDM uses a large number of carriers, each carrying low bit rate data, means
that it is very resilient to selective fading, interference, and multipath effects, as well
providing a high degree of spectral efficiency.
`Early systems using OFDM found the processing required for the signal format was relatively
high, but with advances in technology, OFDM presents few problems in terms of the processing
required.
Development of OFDM
The use of OFDM and multicarrier modulation in general has come to the fore in recent
years as it provides an ideal platform for wireless data communications transmissions.
However the concept of OFDM technology was first investigated in the 1960s and 1970s during
research into methods for reducing interference between closely spaced channels. IN addition
to this other requirements needed to achieve error free data transmission in the presence of
interference and selective propagation conditions.
Initially the use of OFDM required large levels of processing and accordingly it was not viable for
general use.
Some of the first systems to adopt OFDM were digital broadcasting - here OFDM was able to provide
a highly reliable form of data transport over a variety of signal path conditions. Once example was
DAB digital radio that was introduced in Europe and other countries. It was Norwegian
Broadcasting Corporation NRK that launched the first service on 1st June 1995. OFDM was also used
for digital television.
Later processing power increased as a result of rising integration levels enabling OFDM to be
considered for the 4G mobile communications systems which started to be deployed from
around 2009. Also OFDM was adopted for Wi-Fi and a variety of other wireless data systems.
What is OFDM?
To see how OFDM works, it is necessary to look at the receiver. This acts as a bank of
demodulators, translating each carrier down to DC. The resulting signal is integrated over
the symbol period to regenerate the data from that carrier. The same demodulator also
demodulates the other carriers. As the carrier spacing equal to the reciprocal of
the symbol period means that they will have a whole number of cycles in the symbol
period and their contribution will sum to zero - in other words there is no
interference contribution.
One requirement of the OFDM transmitting and receiving systems is that they must be
linear. Any non-linearity will cause interference between the carriers as a result of inter-
modulation distortion. This will introduce unwanted signals that would cause interference
and impair the orthogonality of the transmission.
In terms of the equipment to be used the high peak to average ratio of multi-
carrier systems such as OFDM requires the RF final amplifier on the output of the
transmitter to be able to handle the peaks whilst the average power is much lower and
this leads to inefficiency. In some systems the peaks are limited. Although this introduces
distortion that results in a higher level of data errors, the system can rely on the error
correction to remove them.
that the receiver can separate them using a filter and there must
be a guard band between them. This is not the case with OFDM.
Although the sidebands from each carrier overlap, they can still be received
without the interference that might be expected because they are orthogonal to
each another. This is achieved by having the carrier spacing equal to the
reciprocal of the symbol period.
OFDM advantages
OFDM has been used in many high data rate wireless systems because of
the many advantages it provides.
Immunity to selective fading: One of the main advantages of OFDM is that is
more resistant to frequency selective fading than single carrier systems because it
divides the overall channel into multiple narrowband signals that are affected
individually as flat fading sub-channels.
Resilience to interference: Interference appearing on a channel may be
bandwidth limited and in this way will not affect all the sub-channels. This means
that not all the data is lost.
Spectrum efficiency: Using close-spaced overlapping sub-carriers, a
significant OFDM advantage is that it makes efficient use of the available
spectrum.
Resilient to ISI: Another advantage of OFDM is that it is very resilient to inter-
symbol and inter-frame interference. This results from the low data rate on each of
the sub-channels.
Resilient to narrow-band effects: Using adequate channel coding and
interleaving it is possible to recover symbols lost due to the frequency selectivity of
the channel and narrow band interference. Not all the data is lost.
Simpler channel equalisation: One of the issues with CDMA systems was the
complexity of the channel equalisation which had to be applied across the whole
channel. An advantage of OFDM is that using multiple sub-channels, the channel
equalization becomes much simpler.
OFDM disadvantages
Whilst OFDM has been widely used, there are still a few disadvantages to its use
which need to be addressed when considering its use.
High peak to average power ratio: An OFDM signal has a noise like
amplitude variation and has a relatively high large dynamic range, or peak
to average power ratio. This impacts the RF amplifier efficiency as the
amplifiers need to be linear and accommodate the large amplitude variations
and these factors mean the amplifier cannot operate with a high efficiency level.
ASSESSMENT SCHEDULE
7. Assessment Schedule
UniversityExam 30.04.2025
65
Prescribed Text Books
and Reference Books
8. Prescribed Text Books & Reference Books
TEXT BOOKS:
India.
REFERENCES:
edition
77
MINI PROJECT
Mini Project List
1. GSM Based Home Security Alarm System Using Arduino
https://www.electronicshub.org/arduino-gsm-home-security-alarm-system/
Disclaimer:
This document is confidential and intended solely for the educational purpose of RMK Group
of Educational Institutions. If you have received this document through email in error, please notify
the system manager. This document contains proprietary information and is intended only to
the respective group / learning community as intended. If you are not the addressee you
should not disseminate, distribute or copy through e-mail. Please notify the sender immediately by e-
mail if you have received this document by mistake and delete this document from your system. If you
are not the intended recipient you are notified that disclosing, copying, distributing or taking
any action in reliance on the contents of this information is strictly prohibited.