Академический Документы
Профессиональный Документы
Культура Документы
Digital Modulation
p. 1
p. 2
Carrier
Baseband
Modulation
Data in
p. 3
Communication
Channel
Carrier
Synchronization/Detection/
Decision
Data out
Why Carrier?
p. 4
( t ) ( t ) dt = 0, i j; ( orthogonal)
i
E=
( t )
i
dt = 1; ( normalization)
si ( t ) = sij j ( t ) , i = 1, 2,
,M
j =1
p. 6
2 Eb
cos ( 2 f c t + c ) ,
s1 ( t ) =
Tb
S BPSK =
2 Eb
s
t
=
cos ( 2 f c t + c ) ;
2 ( )
Tb
; 0 t Tb
1 ( t ) =
S BPSK
2
cos ( 2 f c t + c ) ; 0 t Tb
Tb
= Eb 1 ( t ) , Eb 1 ( t )
-Eb
Eb
Constellation diagram
p. 7
Constellation Diagram
A graphical representation of the complex envelope of
each possible signal
The x-axis represents the in-phase component and the
y-axis represents the quadrature component of the
complex envelope
The distance between signals on a constellation
diagram relates to how different the modulation
waveforms are and how well a receiver can
differentiate between them when random noise is
present.
p. 8
Eb
p =
N0
p. 9
Small p is preferred
R
B = (bps/Hz)
B
Large B is preferred
B max
p. 10
C
S
= = log 2 (1 + )
B
N
ELEC 7073 Digital Communications III, Dept. of E.E.E., HKU
Demodulation (1)
Coherent demodulation: requires a replica carrier
wave of the same frequency and phase at the receiver
The received signal and replica carrier are cross-correlated
Also known as synchronous demodulation
Carrier recovery methods
Using PLL to recover the carrier phase and frequency from the
transmitted pilot carrier signal,
Recovering the carrier from the received signals using costas
loop
p. 12
Demodulation (2)
Example of BPSK coherent demodulator:
p. 13
Carrier
recovery
Demodulation (3)
Non-coherent demodulation: does not require a
reference carrier wave
It is less complex than coherent demodulation (easier to
implement), but has worse performance
Applicable to: DPSK, FSK, etc.
Example: FSK non-coherent demodulator
p. 14
p. 15
Modulation Process
f = f ( a1 , a2 , a3 ,...an , t ) ( carrier)
a1 , a2 , a3 ,...an ( modulation parameters)
t ( time)
p. 16
Continuous Carrier
Carrier: A cos[t +]
A = const
= const
= const
Amplitude modulation (AM)
A = A(t) carries information
= const
= const
Basic Modulation
Modulation involves operations on one or more of the
three characteristics of a carrier signal: amplitude,
frequency and phase.
The three basic modulation methods are:
Amplitude Shift Keying (ASK)
Phase Shift Keying (PSK)
Frequency Shift Keying (FSK)
p. 18
i = 1, 2,
,M
0 t Ts
p. 19
g (t ) cos [2 f ct + c ]
si = Ai g 2
Rectangular pulse
p. 20
i = 1, 2,
,M
0 t Ts
p. 21
p. 22
g (t ) cos [2 f ct + c ]
g
g
1 (t ), Ac
1 (t )
S = Ac
2
2
si (t ) = Ac g (t ) cos 2 f ct + c + (i 1) , i = 1, 2,3, 4, 0 t Ts
2
g (t ) cos [2 f ct + c ] , 2 (t ) =
g
Constellation diagram:
p. 23
g (t )sin [2 f c t + c ]
si (t ) = Ai g (t ) cos 2 f c t + c + j ,
i = 1, 2,
, M 1 , j = 1, 2,
, M 2 ,0 t Ts
p. 25
Rectangular constellation
p. 26
p. 27
, M ,0 t Ts
BFSK: M=2
p. 28
Bit 0:
f1 = f c f , s1 (t ) =
Bit 1:
f 2 = f c + f , s2 (t ) =
2 b
cos(2 ( f c f )t + c )
Tb
2 b
cos(2 ( f c + f )t + c )
Tb
p. 29
Other Modulations
Differential phase shift keying (DPSK)
The input binary sequence is differentially encoded before
BPSK modulation ( d k = mk d k 1 )
Avoids the need for a coherent reference signal at the receiver
Offset QPSK
The phase transitions are limited to 900, the transitions on the
I and Q channels are staggered.
/4 QPSK
The phase transitions are limited to 1350
noise power: n2 =
s(t)
N0
2
r(t)=s(t)+n(t)
Distortion
Perfect channel
p. 31
n(t)
White noise
ELEC 7073 Digital Communications III, Dept. of E.E.E., HKU
1
2
2
MAP: max P ( si (t ) | r (t ) )
= max
P ( r (t ) | si (t ) ) P ( si (t ) )
P ( r (t ) )
2( M 1) ( 6log 2 M ) b,av
PM =
Q
( M 2 1) N 0
M
p. 33
N
0
p. 34
3 s ,av
PM 4Q
,
( M 1) N 0
p. 35
s
PM ( M 1)Q
,
N0
s = ( log 2 M ) b
p. 36
p. 37
Conventional coding
Separate from modulation, performed at the digital
level before modulation
The insertion of redundant bits
Given the same information transmission rate, the symbol
rate must be (n/k) times that of the uncoded system.
The redundancy provides coding gain, however, requires
extra bandwidth.
p. 38
p. 39
Pe e
d2
min
n2
p. 40
History of TCM
p. 41
p. 42
p. 43
The coder need not code all the incoming bits. When
k2=0, all m information bits are encoded.
There are many ways to map the coded bits into
symbols. The choice of mapping will drastically affect
the performance of the code.
p. 44
Convolutional
encoder
p. 45
p. 46
p. 47
convoluntional
encoder with 4 states
Parallel transition
p. 48
Uncoded
QPSK
Trellis coded
8PSK
modulation
= (2 2) + 4 = 4.585
Parallel transition:
Distance : (0, 0, 0) (4, 0, 0)
2
2
d 000
400 = d 2 = 4
p. 49
p. 50
= (2 2) + 4 = 4.585
p. 51
2
d min,uncoded D fed ,coded
where E is the normalized average received engergy
when Euncoded = Ecoded , =
D 2fed ,coded
2
d min,
uncoded
p. 53
p. 54
Two steps:
Step 1: At each branch in the trellis,
Compare the received signal to each of the siganls allowed for
that branch.
Save the signal closest to the received signal
Label the branch with a metric proportional to the Euclidean
distance between the two signals.
Branch metric calculation
Two steps:
Step 2:
Apply the Viterbi algorithm to the trellis, with surviving partial
paths corresponding to partial signal sequences that are closest
to the received sequences.
Select the ML path (the complete signal sequence closest in
Euclidean distance to the received sequence) at the end of the
trellis.
Path metric calculation
Trellis update
p. 56
D2
fed
Pe N fed Q
2N0
N fed the number of signal sequences with distance Dfed that diverge at
any state and remerge at that state after one or more transitions
p. 57
Announcement
Dr. Yuk's lecture notes could be downloaded from
the department course material web page under
"ELEC7073(tiyuk)".
https://www.eee.hku.hk/courses.msc/elec7073a/
p. 58