0% found this document useful (0 votes)
42 views19 pages

8 16 Qam

Uploaded by

vijayaselvam72
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views19 pages

8 16 Qam

Uploaded by

vijayaselvam72
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 19

UIT 2305

INTRODUCTION TO DIGITAL COMMUNICATION


UNIT 2

DIGITAL MODULATION AND DEMODULATION


8 & 16 - QAM
Session objectives
 To learn the concept of M-ary modulation
techniques
 Learn M-ary QAM concepts
 To discuss about 8 -QAM
 To analyse the transmitter and receiver block
diagram
 To discuss the phasor and constellation diagram of 8
& 16 QAM
Session outcomes
At the end of the session, students will be able to

 Understand the concept of M-ary modulation


techniques
 Understand 8 & 16 QAM modulation and
demodulation techniques
M-ary Modulation Techniques
• Discrete changes in both amplitude and phase of a
carrier is combined to produce M-ary amplitude-phase
keying (APK) called as M-ary QAM.
• M-ary signaling schemes are preferred over binary
signaling schemes to conserve bandwidth at the
expense of increased power.
• The use of M-ary PSK enables a reduction in
transmission bandwidth by the factor n log 2 M over
binary PSK
Quardrature Amplitude Modulation (QAM)

• Digital information is contained both in amplitude


and phase of the transmission carrier
• 8-QAM and 16 QAM are M-ary encoding techniques
• In 8-QAM, M=8 and N=3
• For 16-QAM, M=16 and N=4
M-ary QAM
• In an M-ary PSK system, in-phase and quadrature
components of the modulated signal are interrelated in
such a way that the envelope is constrained to remain
constant.
• If this constraint is removed, the in-phase and quadrature
components are thereby permitted to be independent and
it leads to a new modulation scheme called M-ary
Quadrature Amplitude Modulation (QAM).
• The carrier experiences amplitude as well as phase
modulation.
8-QAM
8-QAM Transmitter
• Same as 8-PSK except that c bit is not inverted in Q channel
8-QAM cont…
• 8-QAM modulator truth table, phasor and constellation diagram
8-QAM cont…

• For 8-QAM,
baud = (1/3)bit rate
• Fundamental frequency,
f a = fb / 6
• Bandwidth requirement
mathematically output of BM is,
= Xsin(ωat) x sin(ωct)
=X/2[cos(ωc-ωa)t-cos(ωc+ωa)t]
Minimun double side Nyquist bandwidth (F N )is,
B= fb /3
8-QAM cont…

8-QAM Receiver

• Similar to 8-PSK receiver, difference are the PAM levels at


output of product detectors and binary signal at analog-to-
digital converter

• Output of I channel 4-to-2 level converter are I and C bits

• Output of Q channel 4-to-2 level converter are Q and C bits


8-QAM cont…
16-QAM

16-QAM Transmitter
16-QAM cont…

• For 16-QAM,
baud = (1/4)bit rate
• Fundamental frequency,
f a = fb / 8
• Bandwidth requirement
mathematically output of BM is,
= Xsin(ωat) x sin(ωct)
=X/2[cos(ωc-ωa)t-cos(ωc+ωa)t]
Minimun double side Nyquist bandwidth (F N )is,
B= fb /4
16 QAM constellation
Summary
 M-ary modulation techniques
 8 QAM Transmitter and Reciever
 Mathematical representation
 Signal constellation
 Phasor diagram
Test Your Understanding

 Draw 8-QAM waveform for the bit stream


10110001.
 Draw and explain the transmitter and receiver
blocks of 8- QAM system
References
1. S. Haykin, “Digital Communications”, John Wiley,
2005.

2. Wayne Tomasi, “Electronic Communications Systems:


Fundamentals through Advanced”, 5th edition, Pearson
Prentice Hall.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy