0% found this document useful (0 votes)
5 views

Module-5 Notes

The document outlines the advantages of digital communication over analog, including noise immunity, efficient bandwidth usage, and enhanced security. It describes various digital modulation schemes such as ASK, FSK, PSK, and QPSK, and their applications in wireless transmission systems. Additionally, it explains multiple access techniques like FDMA, TDMA, and CDMA used in mobile communication systems.

Uploaded by

hydranishanth
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Module-5 Notes

The document outlines the advantages of digital communication over analog, including noise immunity, efficient bandwidth usage, and enhanced security. It describes various digital modulation schemes such as ASK, FSK, PSK, and QPSK, and their applications in wireless transmission systems. Additionally, it explains multiple access techniques like FDMA, TDMA, and CDMA used in mobile communication systems.

Uploaded by

hydranishanth
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Advantages of Digital Communication over Analog Communication

1.Immunity to Noise (possibility of regenerating the original digital signal if signal power to noise
power ratio (SNR) is relatively high by using of devices called repeaters along the path of
transmission).

2. Efficient use of communication bandwidth (through use of techniques like compression).

3. Digital communication provides higher security (data encryption).

4. The ability to detect errors and correct them if necessary.

5. Design and manufacturing of electronics for digital communication systems is much easier and
much cheaper than the design and manufacturing of electronics for analog communication systems.

Digital modulation schemes

ASK – Amplitude Shift Keying

The amplitude of the resultant output depends upon the input data whether it should be a zero level
or a variation of positive and negative, depending upon the carrier frequency.

WAVE FORMS:

MODULATION WAVEFORMS: ASK output


DEMODULATION WAVEFORMS:

FSK – Frequency Shift Keying

The frequency of the output signal will be either high or low, depending upon the input data applied.
PSK – Phase Shift Keying

The phase of the output signal gets shifted depending upon the input

vious value.
Radio Signal transmission

Figure 1 shows the most important components of a wireless transmission system. In the
figure, the transmitter accepts a stream of bits from the application software. It then encodes
these bits onto a radio wave, known as a carrier, by adjusting parameters of the wave such as
its amplitude or phase.

As shown in the figure, the transmitter usually processes the information in two stages. In the
first stage, a modulator accepts the incoming bits, and computes symbols that represent the
amplitude and phase of the outgoing wave. It then passes these to the analogue transmitter,
which generates the radio wave itself.

Fig.1 architecture of a wireless communication Transmitter

The modulation scheme used in Fig. 1 is known as quadrature phase shift keying (QPSK). A
QPSK modulator takes the incoming bits two at a time and transmits them using a radio wave
that can have four different states. These have phases of 45°, 135°, 225° and 315°

diagram, the distance of each state from the origin represents the amplitude of the
transmitted wave, while the angle (measured anti-clockwise from the x-axis) represents its
phase.

Usually, it is more convenient to represent each symbol using two other numbers, which are
known as the in-phase (I) and quadrature (Q) components. These are computed as follows:

I = a cos ϕ

Q = a sin ϕ,
where a is the amplitude of the transmitted wave and is its phase. Mathematicians will
recognize the in-phase and quadrature components as the real and imaginary parts of a
complex number.

As shown in Fig. 2, LTE uses four modulation schemes altogether. Binary phase shift keying
(BPSK) sends bits one at a time, using two states that can be interpreted as starting phases of
0° and 180°, or as signal amplitudes of +1 and-1. LTE uses this scheme for a limited number of
control streams, but does not use it for normal data transmissions. 16 quadrature amplitude
modulation (16-QAM) sends bits four at a time, using 16 states that have different amplitudes
and phases. Similarly, 64-QAM sends bits six at a time using 64 different states, so it has a
data rate six times greater than that of BPSK.

Fig 2. Modulation scheme used by LTE

Multiple Access Techniques

Mobile communication systems use a few different multiple access techniques, two of which
are shown in Fig.3 Frequency division multiple access (FDMA) was used by the first
generation analogue systems. In this technique, each mobile receives on its own carrier
frequency, which it distinguishes from the others by the use of analogue filters. The carriers
are separated by unused guard hands, which minimizes the interference between them.

In time division multiple access (TDMA), mobiles receive information on the same carrier
frequency but at different times.
GSM uses a mix of frequency and time division multiple access, in which every cell has several
carrier frequencies that are each shared amongst eight different mobiles. LTE uses another
mixed technique known as orthogonal frequency division multiple access (OFDMA).

Fig. 3 Example multiple access techniques

Third generation communication systems used a different technique altogether known a

Code division multiple access (CDMA). In this technique, mobiles receive on the same carrier
frequency and at the same time, but the signals are labelled by the use of codes, which allow
a mobile to separate its own signal from those of the others. LTE uses a few of the concepts
from CDMA for some of its control signals, but does not implement the technique otherwise.

Multiple access is actually a generalization of a simpler technique known as multiplexing. The


difference between the two is that a multiple access system can dynamically change the
allocation of resources to different mobiles, while in a multiplexing system the resource
allocation is fixed.

You might also like