0% found this document useful (0 votes)
12 views26 pages

Modulation

Uploaded by

ezedinawol130
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views26 pages

Modulation

Uploaded by

ezedinawol130
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

Introduction

Modulation
Modulation is a technique used in communications and signal
processing to encode information onto a carrier signal, typically to
transmit it over a medium such as radio waves, cables, or optical
fibers.
Modulation
Techniques
Modulation is crucial for efficient data transmission.

It encodes information onto a carrier signal.

This allows transmission over various media.


Types of Modulation
1 1. Amplitude 2 2. Frequency
Modulation (AM) Modulation (FM)
AM varies the carrier FM changes the carrier's
signal's amplitude. frequency. Amplitude
Frequency and phase stays constant. It offers
remain constant. It's better noise immunity.
susceptible to noise.

3 3. Phase Modulation (PM)


PM modulates the carrier's phase. Closely related to FM.
Used in digital communication.
Amplitude Modulation (AM)
Amplitude modulation (AM) is a technique used in telecommunications to transmit information by varying the amplitude of a carrier wave. In AM, the amplitude of the carrier wave is varied in proportion to the amplitude of
the modulating signal, which contains the information to be transmitted. The frequency and phase of the carrier wave remain constant.

AM is a relatively simple and widely used modulation technique, particularly for radio broadcasting. It is well-suited for transmitting audio signals, which have a relatively low bandwidth. However, AM is susceptible to noise
and interference, as noise can easily affect the amplitude of the carrier wave.

Applications of AM include:

• AM Radio Broadcasting: AM radio broadcasts rely on amplitude modulation to transmit audio signals over the airwaves. The carrier waves used for AM radio are in the medium frequency (MF) band, typically between 535 k
• Amateur Radio: AM is used by amateur radio operators for communication over long distances. It's popular due to its simplicity and ease of implementation.
• Navigation Systems: Some navigation systems utilize AM to transmit location information and guidance data.

Limitations of AM in wireless communication:

• Noise Susceptibility: AM is highly susceptible to noise and interference. Noise can easily distort the amplitude of the carrier wave, leading to errors in the received signal.
• Limited Bandwidth Efficiency: AM requires a relatively large bandwidth to transmit information, which can be a constraint in crowded wireless environments.
• Power Inefficiency: AM transmission can be less power-efficient than other modulation techniques like FM and digital modulation.

Key Principles of AM:

Carrier Wave: Modulating Signal: Amplitude Modulation:


A high-frequency signal used as the base for modulation. The information signal that is superimposed on the carrier wave. Varying the amplitude of the carrier wave in proportion to the modulating signa
Frequency Modulation (FM)
Frequency modulation (FM) is a modulation technique used in telecommunications to transmit information by varying the frequency of a carrier wave. In FM, the
frequency of the carrier wave is varied in proportion to the amplitude of the modulating signal, which contains the information to be transmitted. The amplitude and
phase of the carrier wave remain constant.
FM is a widely used modulation technique, particularly for radio broadcasting and other applications requiring high fidelity and noise immunity. FM is less susceptible
to noise and interference than AM, as noise primarily affects the amplitude of the signal, while FM focuses on frequency variations.

Applications of FM include:

• FM Radio Broadcasting: FM radio broadcasts utilize frequency modulation to transmit audio signals over the airwaves. The carrier waves used for FM radio
are in the very high frequency (VHF) band, typically between 88 MHz and 108 MHz.
• Mobile Phone Networks: Some mobile phone networks utilize FM for voice and data transmission. It's often used in combination with other modulation techniques.
• Telemetry: FM is used in telemetry systems to transmit data from remote sensors or devices to a central monitoring station.

Limitations of FM in wireless communication:

• Bandwidth Requirements: FM requires a wider bandwidth than AM for transmitting the same information. This can be a constraint in congested wireless environments
• Complex Receiver Design: FM receivers are generally more complex than AM receivers, requiring additional circuitry to demodulate the frequency variations.
• Multipath Distortion: FM signals can experience multipath distortion, where reflected waves interfere with the direct path signal, leading to signal
degradation. However, this is less of an issue with FM compared to AM.

Carrier Wave Modulating Signal Frequency Modulation


A high-frequency signal used as the base for The information signal that is superimposed on Varying the frequency of the carrier wave in
modulation. the carrier wave. proportion to the modulating signal.
Phase Modulation (PM)
Phase modulation (PM) is a modulation technique where the phase of the carrier wave is varied in accordance with the instantaneous amplitude of the modulating signal. This means that the phase of the carrier
signal is shifted based on the amplitude of the information being transmitted. Unlike frequency modulation (FM), where the frequency of the carrier is changed, in PM, the frequency remains constant, while the
phase is altered.
PM is widely used in digital communication systems due to its advantages like high data rates and efficient bandwidth utilization. However, it is not as commonly used in analog communication like radio
broadcasting as FM due to its more complex receiver design.

**Principles of PM:**

Phase Shifting Carrier Wave Modulating Signal


The phase of the carrier wave is altered based on the amplitude of The high-frequency signal used as the base for modulation. The information signal that is superimposed on the carrier wave.
the modulating signal. This phase shift is directly proportional to the
amplitude of the modulating signal. This phase shift is then used to
carry the information.
**Applications of PM in Wireless Communication:**

PM finds its applications in various wireless communication scenarios, including:

• Digital Communication Systems: PM is widely used in digital communication systems, such as digital mobile phones and wireless data networks.
• Satellite Communication: PM is a preferred modulation technique in satellite communication due to its robustness against noise and its ability to transmit high data rates.
• Microwave Communication: PM is also used in microwave communication systems, which operate at higher frequencies and are more susceptible to interference and noise.

**Limitations of PM in Wireless Communication:**

Despite its advantages, PM also has some limitations, including:

• Complex Receiver Design: PM receivers are generally more complex than AM and FM receivers due to the need to demodulate the phase variations. This complexity can make the receivers more expensive and les
• Interference Susceptibility: PM is susceptible to interference from other signals, which can distort the phase of the carrier wave and corrupt the transmitted information.
• Limited Bandwidth: PM requires a certain bandwidth to transmit information effectively. In congested wireless environments, where bandwidth is limited, PM can be less efficient than other modulation techniques
Digital Modulation Techniques
Amplitude-Shift Frequency-Shift Phase-Shift Keying Quadrature
Keying (ASK) Keying (FSK) (PSK) Amplitude
Modulation (QAM)
In ASK, the amplitude of FSK involves changing PSK alters the phase of
the carrier signal is the frequency of the the carrier signal to QAM combines both
varied to represent the carrier signal to represent digital data. amplitude and phase
digital data. Different represent digital data. Different phase angles modulation. It allows for
amplitude levels Each binary value (0 or correspond to different transmitting multiple
correspond to different 1) is assigned a unique binary values. PSK is bits per symbol,
binary values (0 or 1). frequency, allowing the efficient in terms of resulting in higher data
This technique is simple receiver to distinguish bandwidth usage but can rates. QAM is a complex
to implement but between them. FSK is be complex to technique but offers
susceptible to noise and more robust to noise implement. high spectral efficiency.
interference. than ASK but requires
wider bandwidth.
Digital Modulation Techniques Comparison
Amplitude Shift Frequency Shift Phase Shift Keying Quadrature
Keying (ASK) Keying (FSK) (PSK) Amplitude
Modulation (QAM)
Low bandwidth Low to Moderate High bandwidth
efficiency (1 bps/Hz for bandwidth efficiency efficiency. High noise Very High bandwidth
binary ASK). Poor noise (depends on the resilience; more robust efficiency. Very High
resilience; sensitive to separation of than ASK and FSK. High noise resilience; most
amplitude noise and frequencies). Moderate complexity; more robust amongst all the
interference. Low noise resilience; more complex than ASK and techniques mentioned
complexity; simple robust than ASK but less FSK, but less complex above. Very High
transmitter and receiver than PSK and QAM. than QAM. complexity; most
design. Moderate complexity; complex amongst all the
more complex than ASK, techniques mentioned
but less complex than above.
PSK and QAM.
Modulation Comparison
Media Access Control (MAC)
MAC (Media Access Control) is a crucial layer in the network architecture responsible for regulating access to
shared communication media. It acts as a traffic cop, ensuring that multiple devices can communicate effectively
on the same network without collisions and interference.

The need for MAC arises in scenarios where multiple devices share a common transmission medium, such as a
wireless network or an Ethernet cable. Without a mechanism for managing access, multiple devices transmitting
simultaneously would result in data collisions, making communication unreliable and inefficient.

MAC protocols achieve this by establishing rules and procedures that determine which device can transmit at a
given time. These rules can be based on various criteria, including time slots, contention-based access, or
addressing schemes. By defining these rules, MAC protocols enable orderly and controlled access to the shared
communication media, ensuring that data is transmitted and received without disruption and conflicts.
Media Access Control (MAC)
Collision Avoidance Efficient Medium Access
MAC protocols employ various Efficient medium access is
techniques to prevent crucial. MAC protocols optimize
collisions. These include carrier resource use. This minimizes
sensing and random backoff delays and maximizes
algorithms. This ensures throughput.
efficient data transmission.

Addressing & Data Interference Handling


Delivery
Wireless networks face
MAC addresses uniquely interference. MAC protocols
identify devices. This enables mitigate interference effects.
reliable data delivery. This maintains signal quality
Addressing is fundamental for and reliability.
network operation.
Channel Access Methods

Frequency Division Multiple Access (FDMA)


FDMA divides the frequency spectrum. Each user gets a unique band. This
prevents signal collisions.

Time Division Multiple Access (TDMA)


TDMA divides time into slots. Users take turns using the channel. This improves
spectral efficiency.

Code Division Multiple Access (CDMA)


CDMA uses unique codes for each user. Simultaneous transmission is possible.
This offers high capacity.
Carrier Sense Multiple Access (CSMA)
CSMA is a channel access method used in networking. It allows multiple devices to share a common transmission
medium, such as a wireless network or an Ethernet cable, while minimizing collisions. The core principle of CSMA
is for each device to "sense" the medium before transmitting data.

If a device detects that the medium is busy (another device is transmitting), it waits until the medium becomes
idle. Once idle, the device can transmit its data. This "carrier sense" mechanism helps prevent collisions by
ensuring that only one device transmits at a time.
Carrier Sense Multiple Access (CSMA) Variations
CSMA/CA (Collision Avoidance) CSMA/CD (Collision Detection)

CSMA/CA is commonly used in wireless networks. It includes mechanisms to prevent collisions before CSMA/CD is typically used in wired networks. It allows devices to detect collisions while data is being
they occur. Devices send a "request-to-send" (RTS) signal before transmitting data. This signal reserves transmitted. If a collision occurs, devices stop transmitting and send a jamming signal. They then wait a
the channel. If another device receives the RTS and is also interested in transmitting, it replies with a random amount of time before trying to transmit again. This backoff mechanism helps to prevent
"clear-to-send" (CTS) signal. This ensures that only the device with the CTS can transmit. This process further collisions. CSMA/CD is well-suited for wired networks due to the ability to detect collisions
helps avoid collisions. quickly and efficiently.
Role of CSMA in Wi-Fi
Networks
Carrier Sense Multiple Access (CSMA) is a fundamental channel
access method used in Wi-Fi networks, particularly in 802.11
standards. CSMA helps manage the shared wireless medium by
minimizing collisions between multiple devices attempting to
transmit data simultaneously. In Wi-Fi, CSMA/CA (Collision
Avoidance) is employed, where devices sense the channel and
send a "request-to-send" (RTS) signal before transmitting data.
This signal reserves the channel, preventing other devices from
transmitting simultaneously. This helps avoid collisions and
ensures efficient data transmission.
MAC in Wireless
LAN (802.11)
MAC Frame Structure
Preamble 1
This field helps synchronize the
receiver and sender and provides
timing information. 2 Start Frame Delimiter
(SFD)
This marks the beginning of the
MAC Header frame and indicates that data is
3
about to be transmitted.
This contains information about
the source and destination
addresses of the frame, the frame Data
4
type, and other control
This field contains the actual data
information.
being transmitted, such as user
Frame Check Sequence data, control information, or other
5
(FCS) network-related data.

This field contains a checksum


calculated over the entire frame.
The receiver uses the FCS to
verify the integrity of the received
data.
The MAC Layer: The Traffic Cop of Wireless
Networks
Think of the MAC layer as the traffic cop of wireless networks. It's responsible for ensuring that data packets flow smoothly between devices and avoids congestion. Here are
7 key functionalities that the MAC layer handles in wireless LANs:

Address Management Channel Access Control Error Detection and Correction

Every device on the network gets a This ensures that only one device transmits at a The MAC layer ensures that data packets arrive
time. It prevents collisions and chaos on the without errors. This is like a quality control
unique MAC address, like a license plate
airwaves. Think of it as a traffic light system for inspector for your network data.
for your car. The MAC layer uses these your network.
addresses to route data packets correctly.

Data Framing Fragmentation and Reassembly Security


The MAC layer puts data into neat packages called The MAC layer can split large data packets into The MAC layer can help secure wireless networks
frames. These frames contain information about the smaller fragments for easier transmission. It then using encryption techniques. This protects your data
sender, receiver, and the data itself. It's like putting reassembles these fragments at the receiver. It's like from unauthorized access. It's like installing security
your data into envelopes. breaking a large box into smaller parcels for easier cameras and locks on your network.
shipping.

Power Management
The MAC layer helps devices conserve battery life by switching between active and sleep modes. It's like a power management system for your devices.

Understanding the MAC layer is crucial for building efficient and reliable wireless networks. So next time you use Wi-Fi, remember the silent traffic cop working behind the scenes!
Classification of Wireless Networks
Personal Area Network (PAN) Local Area Network (LAN)
These are short-range networks designed for personal For smaller areas, like a home or office, covering
use, typically covering a small area of around 10 distances up to a few hundred meters.
meters. They are often used for connecting devices
like smartphones, laptops, and peripherals to each
other.

Metropolitan Area Network (MAN) Wide Area Network (WAN)


Covering a city or metropolitan area, with ranges up Spanning large geographical distances, connecting
to tens of kilometers. cities, countries, or even continents.

Ad hoc Network Hybrid Network


A temporary network created without a central access A network combining elements of different network
point, where devices directly communicate with each types, often used to enhance performance or security.
other.
Personal Area Networks (PANs)
Bluetooth Popular for wireless headsets, speakers, and other
devices. Offers good range (up to 100 meters) and
power efficiency.
Has limited range, lower data rates.

Zigbee Commonly used for smart home devices like sensors,


lighting, and appliances. Offers low power
consumption, long battery life, and secure
communication.
Near Field Communication (NFC) Short-range technology for contactless payments,
data transfer, and device pairing. Requires very close
proximity (a few centimeters) for communication.
The Power of LAN

1 Wi-Fi: The Familiar Friend 2 WLAN: The Underlying Network


Wi-Fi, short for Wireless Fidelity, is what we use to connect our WLAN stands for Wireless Local Area Network. It's the underlying
devices wirelessly to the internet. It's the technology that powers our technology that makes Wi-Fi possible. WLANs use radio waves to
laptops, phones, smart TVs, and more. create a local network, allowing devices to communicate wirelessly
within a specific area, typically a home or office.

3 802.11: The Standards Behind It All 4 From 11 Mbps to 10 Gbps: The Evolution of Wi-Fi
The IEEE 802.11 family of standards defines how Wi-Fi and WLAN Each new 802.11 standard brings faster speeds and improved
operate. These standards determine things like data transmission features. Let's explore some of the key advancements:
rates, frequency bands, and security protocols. • 802.11a (5 GHz, up to 54 Mbps): Early high-speed Wi-Fi, but limited r
• 802.11b (2.4 GHz, up to 11 Mbps): The first widespread Wi-Fi
standard, but slower.
• 802.11g (2.4 GHz, up to 54 Mbps): Faster than 802.11b, still common
• 802.11n (2.4/5 GHz, up to 600 Mbps): Major leap forward in
speed and range.
• 802.11ac (5 GHz, up to 1.3 Gbps): Even faster speeds, ideal
for demanding applications.
• 802.11ax (2.4/5 GHz, up to 10 Gbps): The latest standard,
delivering blazing fast speeds and better efficiency.
Metropolitan Area Networks (MANs): WiMAX & City-
Wide Wireless
WiMAX City-Wide Wireless Networks

WiMAX (Worldwide Interoperability for Microwave Access) is a City-wide wireless networks use a variety of technologies, such
technology that provides high-speed wireless broadband internet as Wi-Fi, WiMAX, and cellular, to provide internet access within a
access over long distances. city.
They often offer free or low-cost internet service to residents and visitors
It operates in the microwave frequency range and offers a range
Limitations:
of up to 50 kilometers.
• Can be crowded and slow during peak hours.
Limitations:
• May have limited coverage in certain areas of the city.
• Susceptible to interference from weather and other radio signals.
Applications:
• Not as widely deployed as other wireless technologies like Wi-Fi.
• Connecting public spaces like parks, libraries, and schools
Applications:
to the internet.
• Providing internet access to rural areas and underserved communities.
• Providing internet access to businesses and residents.
• Backhaul for cellular networks. • Supporting smart city initiatives and applications.
• Supporting public safety and emergency communications.
Cellular Networks in WAN

2G (Second Generation) 3G (Third Generation)


Introduced in the early 1990s, 2G networks enabled voice calls and Enabled faster data speeds, supporting mobile internet browsing
text messaging. and multimedia content.

4G (Fourth Generation) 5G (Fifth Generation)


Brought significant speed enhancements, enabling streaming, The latest generation, offering ultra-fast speeds, low latency, and
video calls, and mobile gaming. massive connectivity for emerging technologies like IoT and
autonomous vehicles.

Satellite Communication in WAN


Satellite communication plays a vital role in WANs, particularly in areas with limited terrestrial infrastructure. It offers global coverage and
enables connectivity to remote locations. Satellites act as relay stations, transmitting data between ground stations across vast distances. Satellite
communication is commonly used for:
• Broadcasting and television distribution
• Internet access in remote areas
• Emergency communication and disaster relief
• Navigation and maritime communication
Ad-hoc: Mobile Ad-Hoc Networks (MANETs)
and Wireless Sensor Networks (WSNs)
• MANETs are self-organizing wireless networks where nodes can communicate directly with each other
without a central infrastructure.
• WSNs are networks of small, low-power devices that sense and collect data from their environment.
• **MANET Features:** - Dynamic topology - Decentralized control - Robustness to node failures - Limited bandwidth
• **WSN Features:** - Low power consumption - Scalability - Limited processing capabilities - Sensor data aggregation
• **MANET Use Cases:** - Emergency response - Military operations - Disaster relief - Mobile gaming
• **WSN Use Cases:** - Environmental monitoring - Smart homes - Industrial automation - Healthcare
Hybrid Networks
• Combining different network types to leverage the strengths of each.
• Examples: Combining wired and wireless, satellite and cellular, or fiber and copper, to extend coverage,
improve reliability, and enhance performance. For instance, a hybrid network could use fiber for high-speed
data transfer, cellular for wide coverage, and Wi-Fi for local access.
• Mesh networks: Nodes connect directly to each other, creating redundancy and improved performance.
• Applications: Wi-Fi hotspots in public spaces, smart home networks, disaster relief.
Got questions?
Don't be shy, ask away!

You might also like