0% found this document useful (0 votes)
13 views2 pages

QPSK

The document outlines the objectives and procedures for a communications lab focused on QPSK modulation and demodulation. It explains the generation of M-PSK and M-QAM signals using I-Q look-up tables and describes the receiver's operation with correlators. The experiment includes creating a bitstream, generating carrier signals, implementing a receiver, and analyzing the effects of noise on the constellation diagram.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views2 pages

QPSK

The document outlines the objectives and procedures for a communications lab focused on QPSK modulation and demodulation. It explains the generation of M-PSK and M-QAM signals using I-Q look-up tables and describes the receiver's operation with correlators. The experiment includes creating a bitstream, generating carrier signals, implementing a receiver, and analyzing the effects of noise on the constellation diagram.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

COMMUNICATIONS LAB.

: QPSK Modulation/Demodulation
OBJECTIVES
Understand the mechanism behind the detection of PSK/QAM signals.

INFORMATION
M-PSK and M-QAM are forms of representing symbols with carriers with different phases and
carriers with different phases & amplitudes respectively. Although it is possible to generate
these signals differently, it is more intuitive and trackable to generate them using I-Q look-up
table followed by quadrature carrier modulation block, as shown in Fig. 1. Example table is for
QPSK.

Look-up table cos(2𝜋𝑓𝑐 𝑡)


Sym i q i
00 1 0
symbol 01 0 1 QPSK
stream 10 0 1
q
11 1 0
M=4,
each symbol is
Q
𝑙𝑜𝑔2 (𝑀) = 2 bits 01 sin(2𝜋𝑓𝑐 𝑡)

1
11 00
I

constellation diagram
10

Figure 1 : Implementation of QPSK. All PSK and QAM signals can be generated with this
approach.
The receiver/detector, for all M, consists of two correlators with quadrature carriers (cos and
sin), so that correlator outputs at the decision instants are i and q coefficients (projections on I
and Q). Decisions are made by finding the closest point from the same table and outputting the
corresponding symbol (reverse look-up).
cos(2𝜋𝑓𝑐 𝑡)
i
QPSK න.
𝑇𝑠 reverse
look-up symbols
q
න.
𝑇𝑠

sin(2𝜋𝑓𝑐 𝑡)

Figure 2 : General quadrature correlator receiver.

Note that, one still needs sin and cos carriers be synchronously generated at the receiver.
Experiment:
a) Create the bitstream array b(𝑛) = [0 1 1 0 0 0 1 1 b3 b2 b1 b0 c3 c2 c1 c0] where b and c
are bcd representations of last two digits in your student id. Expand the bit-stream by
100 by repeating each bit 100 times, so that when drawn it will look like a continuous
graph of the bit stream.
b) Generate arrays of cos(… ) and sin(… ) carriers with 16 periods within 1600 samples.
(1 symbol ≡ 2 bits ≡ 200 samples ≡ 2 carrier periods).
Keep in mind that, in practice, we usually have thousands of periods per symbol. Since it would be difficult to view
such a high number of periods, we will only have 2 carrier periods per symbol here.
c) Generate QPSK signal as described in Fig. 1. Draw the result.
d) Implement the quadrature-correlator receiver. Draw the signals just after the multipliers
and before the integrators and comment on them.
e) Generate i and q components. Draw the constellation diagram for the received i and q.
f) Add zero mean Gaussian noise to the signal generated in step (c). Draw the constellation
diagram for noisy i and q again.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy