0% found this document useful (0 votes)
84 views27 pages

Digital Communications I: Modulation and Coding Course: Term 3 - 2008 Catharina Logothetis

The document discusses digital communication systems and modulation techniques. It covers topics like inter-symbol interference, pulse shaping, equalization, bandpass modulation schemes including M-PAM, M-PSK, M-FSK and M-QAM. It also discusses coherent and non-coherent detection methods at the receiver and provides examples of modulation techniques like BPSK, QPSK, 8PSK.

Uploaded by

erichaas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views27 pages

Digital Communications I: Modulation and Coding Course: Term 3 - 2008 Catharina Logothetis

The document discusses digital communication systems and modulation techniques. It covers topics like inter-symbol interference, pulse shaping, equalization, bandpass modulation schemes including M-PAM, M-PSK, M-FSK and M-QAM. It also discusses coherent and non-coherent detection methods at the receiver and provides examples of modulation techniques like BPSK, QPSK, 8PSK.

Uploaded by

erichaas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Digital Communications I:

Modulation and Coding Course

Term 3 - 2008
Catharina Logothetis
Lecture 7
Last time we talked about:
 Another source of error due to filtering
effect of the system:
 Inter-symbol interference (ISI)
 The techniques to reduce ISI
 Pulse shaping to achieve zero ISI at the
sampling time
 Equalization to combat the filtering effect of
the channel

Lecture 7 2
Today, we are going to talk about:
 Some bandpass modulation schemes used
in DCS for transmitting information over
channel
 M-PAM, M-PSK, M-FSK, M-QAM
 How to detect the transmitted information
at the receiver
 Coherent detection
 Non-coherent detection

Lecture 7 3
Block diagram of a DCS

Source Channel Pulse Bandpass


Format encode encode modulate modulate

Digital modulation

Channel
Digital demodulation

Source Channel Demod.


Format Detect
decode decode Sample

Lecture 7 4
Bandpass modulation
 Bandpass modulation: The process of converting
a data signal to a sinusoidal waveform where its
amplitude, phase or frequency, or a combination of
them, are varied in accordance with the transmitting
data.
 Bandpass signal:
2 Ei
si (t ) = gT (t ) cos( ω c t + (i − 1)∆ ω t + φ i (t ) ) 0 ≤ t ≤ T
T

where gT (t ) is the baseband pulse shape with energy E g .


 We assume here (otherwise will be stated):
 g (t ) is a rectangular pulse shape with unit energy.
T
 Gray coding is used for mapping bits to symbols. 1

M
 Es denotes average symbol energy given by E s = E
i = 1 5i
Lecture 7 M
Demodulation and detection
 Demodulation: The receiver signal is converted to
baseband, filtered and sampled.
 Detection: Sampled values are used for detection
using a decision rule such as the ML detection rule.

ψ 1 (t )
T z1
∫ 0
 z1 
r (t )   = z
z Decision
circuits m̂
ψ N (t )   (ML detector)
T  z N 
∫ 0 zN

Lecture 7 6
Coherent detection
 Coherent detection
 requires carrier phase recovery at the
receiver and hence, circuits to perform
phase estimation.
 Sources of carrier-phase mismatch at the
receiver:
 Propagation delay causes carrier-phase offset in
the received signal.
 The oscillators at the receiver which generate

the carrier signal, are not usually phased locked


to the transmitted carrier.

Lecture 7 7
Coherent detection ..
 Circuits such as Phase-Locked-Loop (PLL) are
implemented at the receiver for carrier phase
estimation ( α ≈ αˆ ).
I branch
2 Ei 2
r (t ) = gT (t ) cos( ω i t + φ i (t ) + α ) + n(t ) cos( ω ct + αˆ )
T T
PLL
Used by
Oscillator 90 deg. correlators
2
sin ( ω c t + αˆ )
T
Q branch

Lecture 7 8
Bandpass Modulation Schemes

 One dimensional waveforms


 Amplitude Shift Keying (ASK)
 M-ary Pulse Amplitude Modulation (M-PAM)
 Two dimensional waveforms
 M-ary Phase Shift Keying (M-PSK)
 M-ary Quadrature Amplitude Modulation
(M-QAM)
 Multidimensional waveforms
 M-ary Frequency Shift Keying (M-FSK)

Lecture 7 9
One dimensional modulation,
demodulation and detection
 Amplitude Shift Keying (ASK) modulation:

2 Ei
si (t ) = cos( ω c t + φ )
T
On-off keying (M=2):
si (t ) = aiψ 1 (t ) i = 1,  , M “0” “1”
s2 s1
2
cos( ω c t + φ ) ψ 1 (t )
ψ 1 (t ) = 0 E1
T
ai = Ei

Lecture 7 10
One dimensional mod.,…
 M-ary Pulse Amplitude modulation (M-PAM)

2
si (t ) = ai cos( ω c t )
T
4-PAM:
si (t ) = aiψ 1 (t ) i = 1,  , M “00” “01” “11” “10”
2 s1 s2 s3 s4
ψ 1 (t ) = cos( ω c t ) − 3 Eg − Eg 3 Eg
ψ 1 (t )
T 0 Eg

ai = (2i − 1 − M ) E g

= E g ( 2i − 1 − M )
2 2
Ei = s i
( M 2 − 1)
Es = Eg
3
Lecture 7 11
Example of bandpass modulation:
Binary PAM

Lecture 7 12
One dimensional mod.,...–cont’d
 Coherent detection of M-PAM

ψ 1 (t )
T z1

ML detector
r (t ) (Compare with M-1 thresholds) m̂
0

Lecture 7 13
Two dimensional modulation,
demodulation and detection (M-PSK)
 M-ary Phase Shift Keying (M-PSK)

2 Es  2π i 
si (t ) = cos ω c t + 
T  M 

si (t ) = ai1ψ 1 (t ) + ai 2ψ 2 (t ) i = 1,, M
2 2
ψ 1 (t ) = cos( ω ct ) ψ 2 (t ) = − sin ( ω ct )
T T
 2π i   2π i 
ai1 = Es cos  ai 2 = Es sin  
 M   M 
2
Es = Ei = s i

Lecture 7 14
Two dimensional mod.,… (MPSK)
BPSK (M=2)
ψ 2 (t )
“0” “1”
8PSK (M=8)
s1 s2
ψ 2 (t )
− Eb Eb ψ 1 (t ) s3 “011”
“010” “001”
s4 s2
QPSK (M=4) Es

ψ 2 (t ) “110” s“000”
1

s 2“01” “00”
s1 s5 ψ 1 (t )

“111” “100”
Es
s6 s8
ψ 1 (t )
“101” s7

s3 “11” “10”
s4
Lecture 7 15
Two dimensional mod.,…(MPSK)
 Coherent detection of MPSK

ψ 1 (t )
T z1
∫ 0
r (t ) z1 φˆ Compute Choose m̂
arctan
ψ 2 (t ) z2 | φ i − φˆ | smallest
T
∫ 0
z2

Lecture 7 16
Two dimensional mod.,… (M-QAM)
 M-ary Quadrature Amplitude Mod. (M-QAM)
2 Ei
si (t ) = cos( ω c t + ϕ i )
T
si (t ) = ai1ψ 1 (t ) + ai 2ψ 2 (t ) i = 1,  , M
2 2
ψ 1 (t ) = cos( ω c t ) ψ 2 (t ) = sin ( ω c t )
T T
2( M − 1)
where ai1 and ai 2 are PAM symbols and Es =
3
 (− M + 1, M − 1) (− M + 3, M − 1)  ( M − 1, M − 1) 
 
( − M + 1, M − 3) ( − M + 3, M − 3)  ( M − 1, M − 3)
( ai1 , ai 2 ) =  

   
 
 (− M + 1,− M + 1) (− M + 3,− M + 1)  ( M − 1,− M + 1)

Lecture 7 17
Two dimensional mod.,… (M-QAM)

16-QAM
ψ 2 (t )
“0000” “0001” “0011” “0010”
s1 s2 3
s3 s4

“1000” “1001” “1011” “1010”


s5 s6 s7 s8
1
-3 -1 1 3
ψ 1 (t )
s9 s10 -1
s
11 s
12
“1100” “1101” “1111” “1110”

s13 s14 -3
s
15 s
16
“0100” “0101” “0111” “0110”

Lecture 7 18
Two dimensional mod.,… (M-QAM)

 Coherent detection of M-QAM

ψ 1 (t )
T z1
ML detector
∫ 0
(Compare with M − 1 thresholds)

r (t ) Parallel-to-serial

converter
ψ 2 (t )
T z2
ML detector
∫ 0
(Compare with M − 1 thresholds)

Lecture 7 19
Multi-dimensional modulation, demodulation &
detection
 M-ary Frequency Shift keying (M-FSK)

2 Es 2 Es
si (t ) = cos( ω i t ) = cos( ω c t + (i − 1) ∆ ω t )
T T
∆ω 1
∆f = =
2π 2T
ψ 3 (t )
M
si (t ) = ∑
j= 1
aijψ j (t ) i = 1,  , M s3
Es

2  Es i = j
ψ i (t ) = cos( ω i t ) aij =  s2
T 0 i≠ j ψ 2 (t )
Es
2
E s = Ei = s i s1
Es

ψ 1 (t )
Lecture 7 20
Multi-dimensional mod.,…(M-FSK)

ψ 1 (t )
T z1
∫ 0
 z1  ML detector:
r (t )   = z
z Choose
the largest element m̂
ψ M (t )   in the observed vector
T  z M 
∫ 0 zM

Lecture 7 21
Non-coherent detection
 Non-coherent detection:
 No need for a reference in phase with the
received carrier
 Less complexity compared to coherent

detection at the price of higher error rate.

Lecture 7 22
Non-coherent detection …
 Differential coherent detection
 Differential encoding of the message
 The symbol phase changes if the current bit is
different from the previous bit.
2E
si (t ) = cos( ω 0t + θ i (t ) ) , 0 ≤ t ≤ T , i = 1,...,M
T
θ k (nT ) = θ k ((n − 1)T ) + φ i (nT )

φi
Symbol index: k 0 1 2 3 4 5 6 7
Data bits: mk 1 1 0 1 0 1 1
Diff. encoded bits 1 1 1 0 0 1 1 1 s2 0 s1 ψ 1 (t )
Symbol phase: θ k π π π 0 0 π π π

Lecture 7 23
Non-coherent detection …
 Coherent detection for diff encoded mod.
 assumes slow variation in carrier-phase mismatch during
two symbol intervals.
 correlates the received signal with basis functions

 uses the phase difference between the current received

vector and previously estimated symbol


2E
r (t ) = cos( ω 0t + θ i (t ) + α ) + n(t ), 0 ≤ t ≤ T
T
(θ i (nT ) + α ) − (θ j ((n − 1)T ) + α ) = θ i (nT ) − θ j ((n − 1)T ) = φ i (nT )
ψ 2 (t )
(a2 , b2 )
φi (a1 , b1 )

Lecture 7
ψ 124
(t )
Non-coherent detection …
 Optimum differentially coherent detector
ψ 1 (t )
T
r (t )
∫ 0
Decision m̂
Delay
T
 Sub-optimum differentially coherent detector
T
r (t )
∫ 0
Decision m̂
Delay
T

 Performance degradation about 3 dB by using sub-


optimal detector

Lecture 7 25
Non-coherent detection …
 Energy detection
 Non-coherent detection for orthogonal signals
(e.g. M-FSK)

 Carrier-phase offset causes partial correlation


between I and Q branches for each candidate signal.

 The received energy corresponding to each candidate


signal is used for detection.

Lecture 7 26
Non-coherent detection …
 Non-coherent detection of BFSK
2 / T cos(ω 1t )

T z11
( )2

0 2 2
z11 + z12
2 / T sin(ω 1t )
T z12
r (t )

0
( )2 + z (T )
Decision stage:

2 / T cos(ω 2 t ) if z (T ) > 0, mˆ = 1
z 21 if z (T ) < 0, mˆ = 0
T
( )2 -

0

2 2
2 / T sin(ω 2t ) z 21 + z 22
T z 22

0
( )2

Lecture 7 27

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy