0% found this document useful (0 votes)
9 views15 pages

Comms 2 Exp 1 GRP1

The document outlines Experiment No. 1 on Amplitude Shift Keying (ASK) conducted by a group of students, detailing attendance, objectives, and principles of ASK. It describes the generation, bandwidth estimation, and demodulation methods of ASK signals, along with the necessary materials and procedures for the experiment. The conclusion emphasizes the effectiveness of ASK in transmitting digital information while acknowledging its challenges related to noise and bandwidth management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views15 pages

Comms 2 Exp 1 GRP1

The document outlines Experiment No. 1 on Amplitude Shift Keying (ASK) conducted by a group of students, detailing attendance, objectives, and principles of ASK. It describes the generation, bandwidth estimation, and demodulation methods of ASK signals, along with the necessary materials and procedures for the experiment. The conclusion emphasizes the effectiveness of ASK in transmitting digital information while acknowledging its challenges related to noise and bandwidth management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

COMMUNICATIONS 2

LABORATORY

WEDNESDAY, 5:00 PM-8:50 PM


EXPERIMENT NO.: 1
EXPERIMENT TITLE: Amplitude Shift Keying

GROUP NO.: 1

ATTENDANCE MEMBERS SIGNATURE PARTICIPATION GRADE


Experiment
Executioner /
Present Barbacina, Lyndone
Documentation /
Leader
Drawing of
Present de Vera, Airell Francis Graphs / Word
Documentation
Experiment
Present Mariano, Bryle Miguel Executioner /
Documentation
Drawing of
Present Morden, Lian Shane Graphs /
Documentation
Drawing of
Present H-Zainal, Alraji Graphs /
Documentation

DOP: September 16, 2024 Remarks:

DOS: September 23, 2024

BERNADETH B. ZARI, PECE


INSTRUCTOR
ACTIVITY 1: Amplitude Shift Keying

1.1 Program Outcomes (POs) Addressed by the Activity:


a. ability to apply knowledge of mathematics and science to solve engineering problems
b. ability to design and conduct fieldworks, as well as to analyse and interpret data
c. ability to function on multidisciplinary teams

1.2 1.2 Activity’s Intended Learning Outcomes (AILOs)


At the end of this activity, the student shall be able to:
a. identify instruments and accessories that are essential in amplitude shift keying
b. calculate the bandwidth of ASK signal
c. evaluate the precision of the experiment conducted

1.3 Objectives of the Activity


The objectives of this activity are to:
a. Generate and sketch ASK signal in the time domain using
• Dual analog switch
• Multiplier
b. Describe the characteristics of an ASK signal.

1.4 Principle of the Activity


ASK GENERATION
Amplitude shift keying - ASK - in the context of digital communications is a modulation
process which imparts to a sinusoid two or more discrete amplitude levels 1. These are related
to the number of levels adopted by digital message. For a binary message sequence there are
two levels, one of which is typically zero. Thus, the modulated waveform consists of bursts of
a sinusoid. Figure 1 illustrates a binary ASK signal (lower), together with the binary sequence
which initiated it (upper). Neither signal has been bandlimited.

There are sharp discontinuities shown at the transition points. These result in the signal having
an unnecessarily wide bandwidth. Bandlimiting is generally introduced before transmission,
in which case these discontinuities would be ‘rounded off’. The bandlimiting may be applied
to the digital message, or the modulated signal itself. The data rate is often made a sub-multiple
of the carrier frequency. This has been done in the waveform of Figure 1. One of the
disadvantages of ASK, compared with FSK and PSK, for example, is that it has not got a
constant envelope. This makes its processing (eg, power amplification) more difficult, since
linearity becomes an important factor. However, it does make for ease of demodulation with
an envelope detector. A block diagram of a basic ASK generator is shown in Figure 2. This
shows the band limiting following modulation.

The switch is opened and closed by the unipolar binary sequence.

BANDWIDTH MODIFICATION
As already indicated, the sharp discontinuities in the ASK waveform of Figure 1 imply a wide
bandwidth. A significant reduction can be accepted before errors at the receiver increase
unacceptably. This can be brought about by band limiting (pulse shaping) the message before
modulation, or band limiting the ASK signal itself after generation.
Both these options are illustrated in Figure 3, which shows one of the generators you will be
modeling in this experiment.
Figure 4 shows the signals present in a model of Figure 3, where the message has been
bandlimited. The shape, after bandlimiting, depends naturally enough upon the amplitude and
phase characteristics of the bandlimiting filter.

NOTE:
You can approximate these waveforms with a SEQUENCE GENERATOR clocked at about 2
kHz, filter #3 of the BASEBAND CHANNEL FILTERS, and a 10 kHz carrier from a VCO.

DEMODULATION METHODS
It is apparent from Figures 1 and 4 that the ASK signal has a well defined envelope. Thus it
is amenable to demodulation by an envelope detector. A synchronous demodulator would
also be appropriate.
Note that:
• envelope detection circuitry is simple.
• synchronous demodulation requires a phase-locked local carrier and therefore carrier
acquisition circuitry.

With bandlimiting of the transmitted ASK neither of these demodulation methods would
recover the original binary sequence; instead, their outputs would be a bandlimited version.
Thus, further processing - by some sort of decision-making circuitry for example - would be
necessary.

Thus, demodulation is a two-stage process:


1. recovery of the bandlimited bit stream
2. regeneration of the binary bit stream
BANDWIDTH ESTIMATION
It is easy to estimate the bandwidth of an ASK signal. Refer to the block diagram of Figure 3.
This is a DSB transmitter. It is an example of linear modulation. If we know the message
bandwidth, then the ASK bandwidth is twice this, centred on the ‘carrier’ frequency. Using the
analogy of the DSB generator, the binary sequence is the message (bit rate ‘μ’), and the
sinewave being switched is the carrier (‘ω’).
Even though you may not have an analytical expression for the bandwidth of a pseudo
random binary sequence, you can estimate that it will be of the same order as that of a square,
or perhaps a rectangular, wave. For the special case of a binary sequence of alternate ones and
zeros the spectrum will:
• be symmetrical about the frequency of the carrier ‘ω’
• have a component at ‘ω’, because there will be a DC term in the message
• have sidebands spaced at odd multiples of ‘μ’ either side of the carrier
• have sideband amplitudes which will decrease either side of the carrier (proportional
to 1/n, where ‘n’ is the order of the term).

1.5 Materials/Equipment/Modules
• 1 unit Digital Oscilloscope
• 1 unit BNC
• 1 set Connecting wires
• Adder, Audio Oscillator, Dual Analog Switch,
• Sequence Generator, Multiplier,
• Tunable LPF, Phase Shifter
1.6 Circuit Diagrams / Figures / Source Codes (if Applicable)
1.7 Procedure/s
ASK GENERATION USING DUAL ANALOG SWITCH:
1. Connect figure A shown above.
2. Sketch the ASK output waveform by connecting the Dual Analog Switch output to an
oscilloscope.
ASK GENERATION USING MULTIPLIER:
3. Connect figure B shown above.
4. Sketch the ASK output waveform by connecting the Multiplier output to an oscilloscope.
DEMODULATION OF BASEBAND ASK:
5. Connect the figure shown below.
6. Sketch the demodulated envelope by connecting the Tunable LPF to an oscilloscope.
SYNCHRONOUS DEMODULATION OF ASK:
7. Connect the figure shown below.
8. Sketch the demodulated envelope by connecting the Tunable LPF to an oscilloscope.
1.8.0 Experiment Set-up

ASK OUTPUT WAVEFORM USING DUAL ANALOG SWITCH:

ASK OUTPUT WAVEFORM USING MULTIPLIER:


A TO C ASK OUTPUT WAVEFORM USING DUAL ANALOG SWITCH:

B TO D ASK OUTPUT WAVEFORM USING MULTIPLIER:


B TO C ASK OUTPUT WAVEFORM USING MULTIPLIER:

A TO D ASK OUTPUT WAVEFORM USING DUAL ANALOG SWITCH:


1.8.1 Data and Results:
ASK OUTPUT WAVEFORM USING DUAL ANALOG SWITCH:

ASK OUTPUT WAVEFORM USING MULTIPLIER:


A TO C ASK OUTPUT WAVEFORM USING DUAL ANALOG SWITCH:

B TO D ASK OUTPUT WAVEFORM USING MULTIPLIER:


B TO C ASK OUTPUT WAVEFORM USING MULTIPLIER:

A TO D ASK OUTPUT WAVEFORM USING DUAL ANALOG SWITCH:


1.8.2 Analysis

Following the procedures, as the experiment progresses, tweaking and exploring the equipment
have and with the procedure the group confirmed it’s theoretical or supposed output of wave form
further to the experiment, trying other inputs to the demodulator have showed different kinds of
results that is provided in figure B to C and A to D.

1.8.3 Conclusion

Amplitude Shift Keying (Ask) presents straightforward transmitting, however compelling means
of transmitting digital information through modulation of a carrier wave's sufficiency. While it
offers ease of demodulation by means of envelope detection, its susceptibility to noise and
bandwidth inefficiencies pose challenges compared to other modulation Effective bandwidth
management through pre- or post-modulation procedures is fundamental for optimizing execution.
Future work may investigate advanced filtering methods to improve ASK's robustness against
noise whereas maintaining its effortlessness in execution.
NOTE: DATA SHEET – TIME OF COMPLETION
DOCUMENTATION/ LAB REPORT – REPLACE TIME OF COMPLETION ---
-PARTICIPATION

DOCUMENTATION/ LAB REPORT

1. FRONT PAGE - Done


2. OBJECTIVES - Done
3. DISCUSSION ( FOR RESEARCH) - Done
4. MATERIALS - Done
5. SCHEMATIC DIAGRAM/ BLOCK DIAGRAM - Done
6. EXPERIMENT SET UP - Done
7. DATA AND RESULTS
- TABULATED DATA - Done
- WAVEFORMS - Done
- GRAPHS - Done
8. QUESTIONS AND ANSWERS (IF ANY)
9. ANALYSIS - Done
10. CONCLUSION - Done

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy