Wireless Comm 1
Wireless Comm 1
University of Khartoum
Faculty of Engineering
Department of Electrical and Electronic Engineering
B.Sc. of Communication Engineering
5th Year
Wireless Communications
EEE 52219
Dr. Tahani Abdalla Attia, Associate Professor
LECTURE 1
Course Objective
2
Intended Learning Outcomes ILOs
1.Understand the challenges facing wireless
networks,
2.Become able to analyze and model the wireless
channel,
3.Understand the techniques used in wireless
communications,
4.Become familiar with the design issues of
wireless networks,
5.Learn the different mechanisms used to share the
bandwidth.
3
Contents
1.Signal attenuation and propagation
2.Fading characteristics
3.Diversity techniques
4.Error correcting codes
5.Wireless multiple access techniques
6.Coverage and cellular system
7.Evolution of Mobile Radio Communications
8.Handoff and mobility 4
References
1.Theodore S. Rappaport, “Wireless Communications
Principles and Practice”, Prentice Hall, 2nd Edition.
2.Simon Haykin and Michael Moher, “Modern Wireless
Communications”, Pearson Prentice Hall.
3.William C. Y. Lee, “Mobile Cellular
Telecommunications: Analog and Digital Systems”,
Second Edition, McGraw-Hill International Editions,
1995.
4.Internet. 5
Coursework Components
➢Tutorials
➢Tests
➢Assignments
➢Seminars
➢Attendance
6
Overview
▪ Today, wireless or radio communication via electromagnetic
radiation is the most used means of communication.
Information Information
Source Interference Destination
9
and Noise
▪ In addition to the noise and interference, radio signals
are affected by the attenuation due to absorption of
energy by the atmosphere.
▪ Attenuation of signals is a function of the frequency, as
well as the material of the medium or channel.
▪ RF signal travelling between the source and the
destination are affected by obstructions due to buildings
and natural objects such as the mountains and trees.
▪ Signals reaching the destination suffer from multipath
due to reflection from the ground and other objects,
which affect the strength of the received RF signal.
10
▪ In order to send wireless signals, an antenna or an aerial is
required. (synonyms used interchangeably, but there is a
slight difference between them)
▪ Normally, the size of that transmitting antenna is
proportional to the wavelength of the RF signal.
▪ The basic antennas are the λ/2 dipole and the λ/4 monopole.
However, other types are used, such as loop antenna, Yagi,
helix, horn, dish and patch antenna.
▪ Since f = c / λ, hence the frequency should be higher in
order to apply a small antenna. However, attenuation
typically increases with the frequency.
11
Modulation of Signals
▪ A signal (carrier) could be modulated by another
signal (modulating or message) in order to
generate a 3rd signal (modulated) that contains
attributes of both signals.
▪ RF signals that sent to the transmitting antenna
are produced by modulators.
▪ Sinusoidal signal is of the most smaller spectrum,
and hence it requires a smaller channel
bandwidth.
▪ There are various modulation schemes or methods
for analog or digital signals. 12
▪ Information signals modulate sinusoidal carriers in several
methods, such as signal Amplitude, Frequency, Phase or
diverse modulation.
13
▪ Analogue RF modulation methods are Envelope
and Angle modulation.
14
➢ Modulation of digital signals is similar to that of analog signals with
slight differences.
➢ Rectangular signals require large bandwidths in order to be transmitted.
➢ What is the spectrum of a rectangular pulse?
➢ The well-known classical modulation systems are: Binary Amplitude
Shift Keying (BASK), Binary Frequency Shift Keying (BFSK) and
Binary Phase Shift Keying (BPSK).
Sinc Spectrum 15
Amplitude Shift Keying (ASK)
▪ In Binary Amplitude Shift Keying (BASK), the
amplitude of the carrier is keyed or switched
between two voltage levels.
▪ In On-Off Keying (OOK), such as in optical links,
the lower level is zero volts.
16
▪ ASK is a sort of AM, and thus its signal can be
demodulated using an envelope detector.
▪ However, you may use a coherent detector, which
resembles a correlator, to demodulate ASK with
better Bit Error Rate (BER).
Scope
Bernoulli
Binary
Bernoulli Binary
Generator
Tx
butter Error Rate
Calculation
|u| Rx
Sine Wave
-0.3
Constant
17
18
▪ BFSK signal can be converted into two OOK signals using
two narrow BPFs, each of them has a center frequency
equal to one of those of the FSK signal.
19
▪ Using passive or active BPFs as above to detect FSK signal
is used in non-coherent demodulation.
▪ FSK signal could be demodulated coherently using two
local sinusoidal carriers and LPFs.
20
▪ FSK is a sort of FM , and thus its signal can be
demodulated using a phase-locked loop (PLL).
butter
LPF1
Subtract Sign Scope
.5
Constant
21
Phase Shift Keying (PSK)
▪ In BPSK, the phase angle of the carrier is
switched between two angles (usually zero and
180˚).
▪ PSK has a better performance compared to ASK
and FSK, regarding errors occur.
22
22
▪ A PSK signal should be demodulated coherently,
using a synchronized local carrier.
Bernoulli
Binary
Bernoulli Binary
Generator
-0.5
butter
butter
Constant
Product
BPF Product2 Scope
LPF
23
Differential PSK
▪ For a DPSK signal, coherent detection could be
possible, without using a coherent local oscillator.
▪ The LO is replaced by the signal delayed an amount
equal to the bit spacing.
▪ A binary '1' may be transmitted by adding 180° to the
current phase and a binary '0' by adding 0° to the
current phase, i.e. leaving the phase unchanged.
24
DPSK Detector
25
▪ Differential encoding starts arbitrary with the first
bit and then indicates message bits by phase
transition or no phase transition.
▪ e.g.
▪ Message 1 1 0 1 0 1 1 0 0 1
▪ Encoded message 1 1 1 0 0 1 1 1 0 1 1
▪ Phase 0 0 0 π π 0 0 0 π 0 0
Re
Im
Complex to
Real-Imag
27
Comparison of Digital Modulation Methods
28
Complexity of System
▪ ASK systems are the simplest, as they can apply
envelope detection. Still synchronous
demodulation could be used, achieving better bit
error rate.
▪ FSK systems are more flexible regarding the
generation and demodulation.
▪ Of course, the coherent detection will achieve a
better BER compared to PLL or non-coherent
detection using BPFs.
29
▪ PSK signals should be coherently demodulated as
non-coherent detection is unattainable.
▪ A Carrier Recovery Circuit (CRC) should be used
in the receiver side.
▪ One CRC used, is to square the received signal,
divide the frequency by two and filter it to get
sinusoidal carrier.
▪ More proper CRC uses techniques such as Costas
Loop, Gardner, Early-Late Gate and the Muller &
Muller Clock recovery.
30
Noise Effect
▪ ASK is the worst in noisy environment, since the
amplitude of signal is more sensitive to noise
compared to angle.
▪ FSK is less affected by the amplitude spikes
compared to ASK and PSK.
▪ Smaller variations of received signal can be
detected in PSK signals, due to use of Phase
Sensitive Detector (PSD).
31
Bandwidth Requirement
▪ ASK requires twice the highest frequency in the
data signal, which is taken as baud rate.
▪ FSK requires the baud rate of the data signal plus
the frequency shift (difference between the two
carriers).
▪ PSK requires the same bandwidth required by the
ASK signal. The transmitted power is less than that
of ASK (why?).
32
Exercise (1)
1. Using Simulink, simulate the FSK non-coherent
demodulator by converting the signal into two
OOK signals using two narrow BPFs.
2. Using simulation, compare the BER of ASK,
FSK and PSK modulation schemes through a
noisy channel.
3. Using simulation, compare the BER of the ASK,
FSK and PSK modulation schemes through a
band-limited channel.
4. Compare results obtained in 2 & 3 above with
those of un-modulated digital signal. 33
Seminars’ Topics
1. Advanced Modulation Techniques for Wireless
Communication