Академический Документы
Профессиональный Документы
Культура Документы
1
Chapter 10: Bandpass Modulation and Demodulation
2
4.1 Why Modulate?
4
Phase Shift Keying (PSK) or PM
Consider a message signal m(t), we can write the phase modulated
signal as
(t ) ct K p m(t )
d
i (t ) c K p m(t )
dt
5
Frequency Shift Keying (FSK) or FM
In case of Frequency Modulation
i (t ) 0 K f m(t )
t
(t ) [0 K f m(t )]d
t
0t K f m( )d
t
sFM (t ) A cos[0t K f
m( )d ]
A cos[0t K f a(t )]
where:
t
a(t ) m( )d
6
Example The message signal
1
0.5
-0.5
-1
0 0.05 0.1 0.15
0.5
-0.5
-1
0 0.05 0.1 0.15
Time
7
Digital Modulation Schemes
15
Figure4.5: digital modulations, (a) PSK (b) FSK (c) ASK (d) ASK/PSK (APK)
Amplitude Shift Keying
Modulation Process
In Amplitude Shift Keying
(ASK), the amplitude of the
carrier is switched between
two (or more) levels
according to the digital data
For BASK (also called ON-
OFF Keying (OOK)), one
and zero are represented by
two amplitude levels A1 and
A0
16
Analytical Expression:
Ai cos(ct ), 0 t T binary 1
s(t )
0, 0 t T binary 0
where Ai = peak amplitude
Hence,
2 Ei (t )
cos(i t ), 0 t T binary 1 , i 0,2,......M 1
si (t ) T
0, 0 t T binary 0
where
T
E s i2 (t )dt , i 0,2,......M 1
0
17
Where for binary ASK (also known as ON OFF Keying (OOK))
g (t ) Ac m(t )
The magnitude and phase of an ASK signal are:
A(t ) Ac m(t ), (t ) 0
The in-phase and quadrature components are:
x(t ) Ac m(t )
y(t ) 0, the quadrature component is wasted.
18
• It can be seen that the
bandwidth of ASK
modulated is twice that
occupied by the source
baseband stream
Bandwidth of ASK
Bandwidth of ASK can be found from its power spectral density
19
If raised cosine rolloff pulse shaping is used, then the
bandwidth is:
1
B (1 r ) Rb W (1 r ) Rb
2
B: bandpass BW
W: baseband BW
Spectral efficiency of ASK is half that of a baseband
unipolar NRZ line code
This is because the quadrature component is
wasted
95% energy bandwidth
3
B 3Rb
Tb
20
21
22
Detectors for ASK
Coherent Receiver
24
Noncoherent Receiver
Does not require a phase reference at the receiver
If we do not know the phase and frequency of the carrier, we can
use a noncoherent receiver to recover ASK signal
Envelope Detector:
25
Frequency Shift Keying (FSK)
In FSK, the instantaneous carrier frequency is switched
between 2 or more levels according to the baseband digital
data
data bits select a carrier at one of two frequencies
Until recently, FSK has been the most widely used form of
digital modulation; Why?
Simple both to generate and detect
26
Analytical Expression
2 Es
si (t ) cos( i t ), i 0,1,....M 1
Ts
General expression is
2 Es
si (t ) cos(2f 0t 2ift ), i 0,1,....M 1
Ts
f f i f i 1
f i f 0 if and Es kEb , Ts kTb
K: # of bits per symbol M = 2^k
Eb: bit energy Tb: bit duration
Es: symbol energy Ts: symbol duration
27
Binary FSK
In BFSK, 2 different frequencies, f1 and f2 = f1 + ∆ f are used to
transmit binary information
2 Es
s1 (t ) cos 2 ( f 2 2 ), 0 t Tb
Tb
28
Ac cos(1t 1 ), when m(t ) 1 or X n 1
s(t )
Ac cos(2t 2 ), when m(t ) 1 or X n 0
When w0 an w1 are chosen so that f1(t) and f2(t) are orthogonal, i.e.,
1 (t )2 (t ) 0
form a set of K = 2 basis orthonormal basis
functions
29
3. Coherent Detection of Binary FSK
30
Non-coherent Detection
One of the simplest ways of detecting binary FSK is to pass the
signal through 2 BPF tuned to the 2 signaling freqs and detect
which has the larger output averaged over a symbol period
31
Phase Shift Keying (PSK)
32
Phase Shift Keying (PSK)
General expression is
2 Es
si (t ) cos[2f 0t i (t )], i 0,1,....M 1
Ts
Where
2i
i (t ) i 0,1,....M 1
M
33
We can now write the analytical expression (e.g. 4-PSK case) as
2 Eb 2 (i 1)
si (t ) cos ct , 0 t Tb , and i 1,2,....M
Tb M
carrier phase changes
Constant envelope abruptly at the beginning of
each signal interval
34
M-ary PSK
Each si(t) may be expanded in terms of two basis function Ψ1(t) and
Ψ2(t) defined as
2
1 (t )
2
cos c t , 2 (t ) sin c t ,
Ts Ts
35
Quadrature PSK (QPSK)
10 π
11 3π/2
General expression:
2 Es 2 (i 1)
sQPSK (t ) cos 2f ct , i 1,2,3,4 0 t Ts
Ts M
36
The signals are:
2 Es 2 Es
s0
2 Es
cos( ct ) s1 cos( ct ) sin( ct )
Ts Ts 2 Ts
2 Es 2 Es
s2 cos( ct ) cos( ct )
Ts Ts
2 Es 3 2 Es
s3 cos( ct ) sin( ct )
Ts 2 Ts
2 Es
s0, 2 (t ) cos ct , shift o f 00 and 1800
Ts
2 Es
s1,3 (t ) sin ct , shift o f 900 and 2700
Ts
37
We can also have:
2 Es 2 (i 1)
sQPSK (t ) cos ct , i 1,2,3,4 0 t Ts
Ts M 4
38
One of 4 possible waveforms is transmitted during each signaling
interval Ts
i.e., 2 bits are transmitted per modulation symbol → Ts=2Tb)
2 Es 2 (i 1) 2 Es 2 (i 1)
sQPSK (t ) cos cos( c t ) sin sin( ct )
Ts M Ts M
2 (i 1) 2 (i 1)
sQPSK (t ) Es cos 1 (t ) Es sin
2
(t )
M M
With this expression, the “phase” constellation diagram can
easily be drawn
For example:
40
Coherent Detection
1. Coherent Detection of PSK
Coherent detection requires the phase information
1 (t ) A cos 0t
2 (t ) A sin 0t
Ts Ts A2Ts
z0 (t ) s0 (t ) 1 (t )dt ( A cos 0t ) ( A cos 0t )dt L0
0 0 2
Ts Ts
z1 (t ) s0 (t ) 2 (t )dt ( A cos 0t ) ( A sin 0t )dt 0
0 0
BUILD OUTPUT MAP AND CONSTELLATION AT THE INITIAL STATE TO COMPARE AND DECIDE LATER
Decision:
1. Calculate zi(t) as
T
zi (t ) r (t ) i (t )dt
0
44
4.3.2 Correlation Receiver
45
Performance in AWGN Channel
46
47
48
49
References and Exercises
[1] Simon Haykin, Communication Systems, 4th ed., John Wiley
& Sons Inc., 2000.
PROBLEMS, Chapter 6, Passband Digital Transmission
50