Experiment on Digital Modulation Techniques: Part I
Version: August 2009
Bigital Nouulation Techniques: Pait I August 2uu9 Page 1
Digital Modulation Techniques: Part I OBJECTIVES
Understand the basic concepts of MPSK and MQAM digital modulation techniques. Demonstrate and analyze MPSK and MQAM modulation techniques. Evaluate the performance of MPSK and MQAM modulation techniques. THEORETICAL BACKGROUND A. INTRODUCTION The main blocks of a digital communication system are illustrated in Figure 1. The information source produces a message or sequence of messages to be communicated to the receiver. The message may be of various types: a sequence of letters, a voice waveform, an image, a temperature measurement, etc. If the signal is analog in nature, A/D conversion is performed which is mainly composed of sampling and quantization blocks. The digital output of the A/D converter is then fed into a source encoder for data compression. The output of the source encoder is then processed by a channel encoder in order to add redundancy to overcome errors at the receiver due to channel distortion. Next, the digital modulator maps the codeword bits into modulated analog signals for transmission over the channel. Because the channel is subject to various types of noise, distortion, and interference, the channel output differs from the channel input. The channel is the medium used to transmit the signal from transmitter to receiver. It may be a pair of wires, a coaxial cable, a band of radio frequencies, a beam of light, etc. At the receiver side, the demodulator converts each received channel output signal into one of the channel codeword symbols. Because of the channel distortion, the demodulator might make errors in detecting the received symbols. The channel decoder uses the redundancy introduced by the channel encoder in order to try to correct symbol errors. If all errors are corrected, the estimated codeword matches the original source codeword. The source decoder performs the inverse operation of the source encoder and delivers its output to the sink. Bigital Nouulation Techniques: Pait I August 2uu9 Page 2
Figure 1: A block diagram of a digital communication system. This experiment deals with the modulator block at the transmitter side of a digital communication system. The main considerations in choosing a particular digital modulation technique are the following: data rate, spectral efficiency (data rate per unit bandwidth), power efficiency (minimum required energy per bit for a given quality), robustness to channel distortion (probability of bit error or block error), and cost (function of implementation complexity). B. DIGITAL MODULATION SCHEMES There are several digital modulation schemes that that have been proposed for digital communication systems. These digital modulation schemes include basic schemes such as MPSK (M-ary Phase Shift Keying), MPAM (M-ary Pulse Amplitude Modulation), MQAM (M-ary Quadrature Amplitude Modulation), and MFSK (M-ary Frequency Shift Keying). Other more advanced digital modulation techniques that build on these basic schemes include GMSK (Gaussian Minimum Shift Keying) which is used in the GSM cellular standard, Spread Spectrum Modulation which is used in the UMTS cellular standard, and OFDM (Orthogonal Frequency Division Modulation) which is used in the WiFi, WiMAX, and LTE standards. Transmitter Source A/D Converter Source Encoder Channel Encoder Digital Modulator Channel Sink D/A Converter Source Decoder Channel Decoder Digital Demodulator Receiver Bigital Nouulation Techniques: Pait I August 2uu9 Page S
Given an M-ary digital modulation scheme, the constellation set is composed of M constellation points (also called symbols) where each symbol represents K = log 2 H bits. The constellation set can be represented as points in a two-dimensional space where each point has specific coordinates. The coordinates of a given constellation point can be represented either via a real (x-axis) and imaginary (y-axis) components or via amplitude and phase components (polar coordinates). The symbol duration is represented as I s and the symbol rate is given byR s = 1I s . The bit duration is represented as I b and the bit rate is given byR b = 1I b . The symbol rate is normally a function of the pulse shaping filter used after the modulator, the bandwidth occupied, and the channel characteristics. Since one symbol represents K bits, the following relation holds: R b = KR s . Therefore, for a given symbol rate over the channel, it is better to use higher order modulation schemes with a larger value of M in order to achieve higher bit rate. On the other hand, as the value of M increases, the constellation points in the constellation set become closer to each other for a given fixed energy per bit. The closer the constellation points are, the higher is the probability of making demodulation errors due to noise in the channel. Therefore, as M increases, there is a tradeoff between bit rate and bit error probability. This requires careful analyses in order to select the most suitable digital modulation scheme for a given system design. This experiment deals with MPAM, MPSK, and MQAM modulation schemes with emphasis on the tradeoffs between energy per bit, number of constellation points, and the constellation set properties. The eye diagram is used to assess the performance characteristics as a function of various parameters. The MFSK modulation scheme and digital demodulation techniques are covered in other experiments. C. AMPLITUDE AND PHASE MODULATION In amplitude and phase modulation schemes, the information bit stream is modulated via the amplitude and the phase of the transmitted signal, respectively. The transmitted signal over symbol duration can be represented as: s(t) = s I (t)cos(2n c t) - s
(t)sin(2n c t) where s I (t) is the in-phase component (real component), s
(t) is the quadrature
component (imaginary component), and c is the carrier frequency. Figure 2 presents the general structure of an amplitude and/or phase modulator. Bigital Nouulation Techniques: Pait I August 2uu9 Page 4
Figure 2: Amplitude and/or phase modulator. The bandwidth of the transmitted signal is determined by the characteristics of the pulse shaping filter g(t). The selection of the pulse shaping filter provides a tradeoff between the required bandwidth and the level of intersymbol interference between consecutive pulses. The most commonly used pulse shaping filter in practice is the raised cosine pulse shaping filter. The characteristics of the raised cosine pulse shaping filter depend on a filter parameter known as the roll-off factor . Figure 3 presents the frequency domain and time domain properties of a raised cosine pulse shaping filter with different values of .
Figure 3: Frequency-domain and time-domain properties of a raised cosine pulse shaping filter. sin(2fct) cos(2fct) cos(2fct) s(t) Quadrature component In-phase component Pulse shaping filter g(t) Pulse shaping filter g(t) 2 Bigital Nouulation Techniques: Pait I August 2uu9 Page S
For more background information on pulse shaping filters, check Sections 8.2-8.3 in [1], Sections 7.4-7.5 in [2], and/or Section 5.5 in [3]. C.1 M-ARY PULSE AMPLITUDE MODULATION (MPAM) MPAM modulation schemes do not have a quadrature component and, thus, can be represented using a one-dimensional constellation set. For MPAM, the information is encoded in the amplitude of the transmitted signal. The coordinates of the points on the constellation set and the distance between consecutive points depend on the symbol energy. The mapping of bits to symbols is usually done via Gray encoding in order to reduce the bit error rate for a given symbol error rate. With Gray mapping, consecutive symbols differ by only one bit position. Figure 4 presents the constellation set for MPAM with M = 8 and Gray mapping. It can be seen that each symbol represents three bits and that there is only one bit difference between consecutive symbols.
Figure 4: Example constellation set with Gray mapping for 8PAM. For more background information on MPAM modulation schemes, check Section 7.2 in [1], Sections 6.3 and 7.7 in [2], and/or Section 5.3 in [3]. C.2 M-ARY PHASE SHIFT KEYING (MPSK) For MPSK modulation schemes, the information is encoded in the phase of the transmitted signal with constant amplitude. Therefore, the MPSK constellation set can be represented as a circle of equidistant constellation points. The number of points and the angular difference between them depend on the value of M. Figure 5 presents the constellation sets for MPSK with M = 4 and M = 8. The case with M = 2 is normally referred to as BPSK (Binary PSK) whereas the case with M = 4 is normally referred to as QPSK (Quadrature PSK). For more background information on MPSK modulation schemes, check Section 7.3 in [1], Sections 8.11, 8.13, and 8.19 in [2], and/or Section 5.3 in [3]. Bigital Nouulation Techniques: Pait I August 2uu9 Page 6
Figure 5: Example constellation sets with Gray mapping for MPSK. C.3 M-ary Quadrature Amplitude Modulation (MQAM) For MQAM modulation schemes, the information is encoded in both the amplitude and the phase of the transmitted signal. Therefore, the constellation set of MQAM can have any shape depending on the allocation of the constellation points. The most common MQAM constellation sets are rectangular MQAM where the constellation points are placed on a rectangular grid. It is important to realize that MPAM and MPSK are special cases of MQAM. Figure 6 presents the constellation sets for rectangular MQAM with M = 4 and M = 8. For more background information on MQAM modulation schemes, check Section 7.3 in [1], Section 8.19 in [2], and/or Section 5.3 in [3].
Figure 6: Example constellation sets for MQAM. Bigital Nouulation Techniques: Pait I August 2uu9 Page 7
D. ADDITIVE WHITE GAUSSIAN NOISE (AWGN) In communication systems, the most common type of noise added over the channel is the Additive White Gaussian Noise (AWGN). It is additive because the received signal is equal to the transmitted signal plus the noise. It is white because it has a constant power spectral density. It is Gaussian because its probability density function can be accurately modeled to behave like a Gaussian distribution. It is noise because it distorts the received signal. The higher the variance of the noise, the more is the deviation of the received symbols with respect to the constellation set and, thus, the higher is the probability to demodulate a wrong symbol and make errors. For more background information on AWGN, check Sections 4.4 and 5.5 in [1] and/or Sections 4.13-4.14 in [2].
PREPARATION EXERCISE FOR MPAM MODULATION TECHNIQUES
This demo presents a PAM system implemented using built in LabVIEW SubVIs. It will be a good exercise to understand the role of each. Open the front panel of Demo_PAM.vi, and set the following parameters:
Quantity/Setting Value M 2 Symbol Rate 1000 Hz Pulse Shaping Filter Raised-Cosine Rolloff Factor 0.3 Size of input Bit stream 1024
Observe the following graphs: the PAM constellation at the transmitter, the Eye Diagram at transmitter. How are the bits modulated using PAM? Increase the number of bits per symbol. What are the advantages and disadvantages of increasing M (try values of M =4, 8, 32, 128)? Can we overcome the disadvantages by using other modulation schemes? List these modulation schemes and compare them with PAM.
Bigital Nouulation Techniques: Pait I August 2uu9 Page 8
EXPERIMENT DESCRIPTION
GENERAL RULES If you open a VI and are not asked to do any changes in it, then close it without saving changes by clicking on Defer decision. Save VIs as [GroupID]_name of VI.vi. Save plots as [GroupID]_Question number.jpg. For questions with more than one plot, append extra info to the name to differentiate between the plots. Remember to zip and upload only the files you created without the ones given to you in ModulationI.zip. PARTI: M-PSK MODULATION In this part, we will observe an M-PSK modulated signal and study the effects of power, bandwidth and pulse shaping filter. Q.1 How do we compare the different Modulation Schemes? A. BPSK MODULATION WITH DETERMINISTIC INPUT In this part, we will observe a BPSK modulated signal where the input is a deterministic signal to calculate the number of bits in error. Open the Block Diagram of thePSK.VI. The SubVIs are the following:
Generate Bits Generates the sequence of data bits to be modulated.
Generate System Parameters Calculates parameters for use with modulation and demodulation VIs.
Generate Filter Coefficients Calculates filter coefficients for pulse shaping and matched filters applied by the digital modulation VIs and demodulation VIs. Bigital Nouulation Techniques: Pait I August 2uu9 Page 9
Modulate PSK Inputs a sequence of data bits, performs PSK modulation, and returns the modulated complex baseband waveform in the output complex waveform parameter.
Add AWGN Generates zero-mean complex additive white Gaussian noise with uniform power spectral density and adds it to the complex baseband modulated waveform, returning a signalplusnoise waveform having a specified E b /N 0 .
Format Constellation Prepares a signal for presentation on a graph showing the detected symbol locations and the transitions between those symbols.
Format Eye Diagram Inputs a complex- or real-valued waveform, divides it into segments, and displays those segments as plots on a waveform graph. It determines the segment length based on the symbol rate and eye length input parameters. On the Block Diagram, the input bit stream to the SubVI Modulate PSK should be connected to the output of the SubVI Initialize Array that generates a 1D array of 1s whose dimension size is 20. On the Front Panel, set the following parameters: M 2 Symbol Rate 1000 Hz Pulse Shaping Filter Raised-Cosine Rolloff Factor 0.3
Q.2 Vary E b /N o according to the following values (30 and 10 dB). Run the VI then Stop it to observe the noisy constellation and count in each of the above cases the number of bits in error, given that the threshold value is set to zero. Q.3 How would you relate the number of bits in error to E b /N o . Bigital Nouulation Techniques: Pait I August 2uu9 Page 1u
B. BPSK MODULATION WITH ARBITRARY INPUT In this part, we will observe a BPSK modulated signal where the input is a random signal. We will study the effect of E b /N 0 on the constellation and Eye Diagram and the effect of filter parameter on bandwidth. On the Block Diagram, the input bit stream to the SubVI Modulate PSK should be connected to the output bit stream of the SubVI Generate Bits. On the Front Panel, set the following parameters: M 2 Symbol Rate 1000 Hz Pulse Shaping Filter Raised-Cosine Rolloff Factor 0.3 Size of input Bit stream 1024
Q.4 Provide plots of the Constellations and the Eye Diagrams at the transmitter and at the output of the channel for E b /N o = 17 and 30 dB. Q.5 What does the Eye Diagram represent? Q.6 What is the effect of decreasing E b /N o on the Constellations and the Eye Diagram. Q.7 By the way, how can one control the value of Eb/No over the channel from a practical point of view? Q.8 Why do we apply a Raised cosine instead of a rectangular pulse shaping filter? Q.9 Calculate the baseband bandwidth of the waveform (from the spectrum plot) for Rolloff Factor = 0 and 1 and compare it to the theoretical values. Q.10 From the bandwidth point of view, which value of Roll Off Factor is better (0 or 1) and why? Q.11 What is the disadvantage using this value of Rolloff Factor. Bigital Nouulation Techniques: Pait I August 2uu9 Page 11
C. BPSK PASSBAND SIGNAL Open the Block Diagram of the PSK.VI. Load the Sub-VI Passband.VI into PSK.VI, and connect the Symbols Out from the Modulate PSK SubVI to the Symbols In of Passband.VI. Create additional graph indicators to display the time domain waveform and the PSD of the passband modulated signal. Save the final VI as GroupID_PSK_PB.VI. On the Front Panel, set the following parameters: M 2 Symbol Rate 1000 Hz Pulse Shaping Filter Raised-Cosine Rolloff Factor 1 Size of input Bit stream 1024
Q.12 Why do we need to modulate the baseband signal on a carrier? Q.13 Observe the time domain waveform of the passband signal. Explain the phase differences and comment on how 0 and 1 are transmitted. Q.14 Provide a plot of the passband spectrum. Compare its bandwidth to that of the baseband signal. Note that you have to put the Y-axis in logarithmic scale. Q.15 Observe the time domain waveform of the passband signal for M=4. Explain the phase differences and comment. CloseGroupID_PSK_PB.VI.
Bigital Nouulation Techniques: Pait I August 2uu9 Page 12
D. M-PSK MODULATION Open thePSK.VI, and set on the Front Panel the following parameters: E b /N 0 25dB Symbol Rate 1000 Hz Pulse Shaping Filter Raised-Cosine Rolloff Factor 0.3 Size of input Bit stream 2048
Q.16 What type of modulation does M=4 correspond to? Is it more power efficient than BPSK? Refer to theoretical part to answer the Question. Q.17 Provide a plot for the noisy Eye Diagram for M=16. Observe the constellations and eye diagrams for M =8, 32 and 64 to answer the following Questions: Q.18 List an advantage and a disadvantage of increasing M at a constant E b /N o ? Q.19 Calculate for the above values of M (8, 32, 64) the bit rate taking into account the number of bits per symbol. ClosePSK.VI.
PART II: QAM MODULATION In this part, we will observe an MQAM modulated signal and compare it to an MPSK modulated signal. Open QAM.VI, and set on the Front Panel the following parameters: E b /N 0 25dB Symbol Rate 1000 Hz Pulse Shaping Filter Raised-Cosine Rolloff Factor 0.3 QAM symbols 500
Bigital Nouulation Techniques: Pait I August 2uu9 Page 1S
Q.20 Provide plots of Constellations and Eye Diagrams for M=16. Q.21 Compare the noisy Eye Diagrams of 16PSK (Q17) and 16QAM, what do you conclude? Q.22 For high order modulation schemes and at the same conditions, which is better MQAM or MPSK? Why? Observe the Constellations and Eye Diagrams for M=8, 32, 64 at E b /N 0 =20 and 30dB. Q.23 Given the above data, what is the highest M that can be used for the different values of E b /N o ?
REFERENCES
[1] J . Proakis and M. Salehi, Communication Systems Engineering. Prentice-Hall, 2 nd
edition, 2002. [2] S. Haykin, Communication Systems. J ohn Wiley & Sons, 3 rd edition, 1994. [3] A. Goldsmith, Wireless Communications. Cambridge University Press, 2005.
Evaluation of Some Websites that Offer Virtual Phone Numbers for SMS Reception and Websites to Obtain Virtual Debit/Credit Cards for Online Accounts Verifications
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux
Cybersecurity: A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
Palo Alto Networks: The Ultimate Guide To Quickly Pass All The Exams And Getting Certified. Real Practice Test With Detailed Screenshots, Answers And Explanations