0% found this document useful (0 votes)
8 views29 pages

WirelessComm2

Wireless communication course

Uploaded by

abobakertigani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views29 pages

WirelessComm2

Wireless communication course

Uploaded by

abobakertigani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

‫بسم هللا الرحمن الرحيم‬

University of Khartoum
Faculty of Engineering
Department of Electrical and Electronic Engineering
B.Sc. of Communication Engineering
5th Year

Wireless Communications
EEE 52219
Dr. Tahani Abdalla Attia, Associate Professor

LECTURE 2
Binary Modulation Methods
▪ Binary (2-ary) digital modulation methods
include BASK (OOK), BFSK (AFSK, MSK,
GMSK) and BPSK (DPSK).

▪ Binary modulation methods have baudrate (or


transmission rate) that is equal to the bitrate (or
data rate ).

▪ Data rate is in bits/s , where the baudrate is in


symbols/s (or bauds).
2
M-ary Modulation Methods
➢In Multi-level digital modulation methods,
the bitrate can be twice or more than the
baudrate .
➢This will lead to a better use of the available
channel bandwidth.
➢On the other hand, the application of more
than two values to represent a digital signal
will lead to reduction in Noise Immunity.
3
M-ary Modulation Methods
▪ Thus, digital signals can be Binary (of two
values), Ternary (of three digital values) or
Quaternary (of four values), or more.
▪ In general, multi-level methods can apply M
digital values.
▪ Those digital values are either amplitudes,
frequencies, phase angles or a combination of
them.
4
▪ The Shannon–Hartley Theorem states that the limit
of a reliable data rate of a channel depends on its
bandwidth and the signal-to -noise ratio of the signal,
according to
▪ C = B logb ( 1 + SNR )
▪ b is the base of the logarithm used, which commonly
has the values:
2, e, and 10 .

▪ The units of C is bit for b = 2, nat for b = e, and dit (or


digit) for b = 10.
5
M-ary Modulation Methods
▪ As symbols come closer to each other, the
increase of levels M requires increase in the
SNR in order to achieve higher bitrate with
lower baudrate.

▪ Therefore, we would require more signal


power and/or need to reduce noise using
efficient signal processing .
6
Pulse Amplitude Modulation (PAM)
▪ PAM can be modulation in time domain, i.e. not
sinusoidal modulation, where the time- modulated
signal is still a baseband signal.
▪ It will look similar to the output signal of the
DAC, which is a staircase signal of finite number
of steps.
▪ It is a decoded signal, of 2n voltage levels, where n
is number of input bits. However, it is still a digital
signal of finite levels.
7
8
◼ Ternary Coding can be applied to binary data to
reduce the baudrate, i.e. to send less symbols.
◼ The following truth table, or codebook, can be used
for encoding binary data into ternary
000 −−
001 −0
010 −+
011 0−
100 00
101 0+
110 +−
111 +0

9
▪ Instead of the transmission of unmodulated M-ary signal,
a sinusoidal carrier of multi level is generated.

▪ Such an M-ary digital signal is known as PAM, or rarely


as MASK signal.

▪ Though ternary coding is possible, it is not commonly


used.

▪ Practically, M is an even positive integer, which is


particularly a power of 2

M = 2n

10
Constellation Diagrams
▪ A constellation diagram is used to represent the
modulation scheme used.

▪ It is a phase state diagram, which is used to show


amplitudes and phase relationships.
▪ When we speak about phasors, we involve only signals of
the same frequency.
▪ Hence, FSK (and MFSK, OFDM, FH) won’t be
represented in constellation diagrams.

11
Constellation Diagrams

12
Quadrature Phase Shift Keying
In quadrature (or quaternary) phase shift keying (QPSK or
4PSK), four phase angles are used to represent a binary signal
that is divided into dibits.

13
▪ Hence, each of the transmitted symbols is going to represent
two bits of the data, not just one bit as in binary methods.
▪ Therefore, the data rate will be double the transmission rate.

Bitrate is 10 bit/s for only Baudrate of 5 bauds14


Quadrature Phase Shift Keying

QPSK QPSK
Modulator Demodulator
15
M - Phase Shift Keying
▪ In 8PSK, eight phase angles are used to represent a binary
signal that is divided into tribits.

16
Quadrature Amplitude Modulation
▪ In QAM, PSK is combined with ASK to obtain higher data
rates. Using m amplitudes and n phase angles offers M-
QAM, where

M≤mxn

17
▪ It is obvious that, MPSK is a special case of QAM, but with
one amplitude.
▪ There may exist different amplitude and phase variations of
M-QAM for the same value M, i.e. different constellations.

Three Possible Variations of 16-QAM 18


Please visit the site: https://www.gaussianwaves.com/2010/04/performance-
19
comparison-of-digital-modulation-techniques-2/
▪ Since ASK is much affected in noisy channels as
compared to PSK, number of phases used is always
larger than number of amplitudes.

8-QAM Transmitted Signal 20


Draw and Simulate the PSK and QAM Using the Simulink Model Shown

21
Gray Code
▪ The number sequence we used to order the
encoded levels or phase angles is the binary
sequence, such as 00, 01, 10, 11.
▪ However, the Gray code or sequence gives better
results regarding errors that occur due to noise.
▪ Each two successive values differ in only one bit.
It is a non-weighted code and is known as the
reflected binary code.

22
2-bit Gray Code 3-bit Gray Code

00 000
01 001
11 011
10
010
110
111
101
Exercise:
100
Write the 4-bit Code. 23
Baseband Modulation Simulation
▪ Generally, there are two ways to simulate modulation
techniques, which are called baseband and passband.
▪ The Communications Toolbox Blockset in Matlab supports
passband for analog modulation, while it supports baseband
simulation for digital modulation.
▪ The baseband simulation, which is also known as the
lowpass equivalent method, requires less computation
compared to passband simulation.
▪ That is because modelling a high-frequency carrier signal is
computationally intensive because the carrier signal
typically needs to be sampled at a high rate. 24
▪ In baseband modulation, the complex envelope of the
modulation of a message signal will be produced.
▪ We wont be looking anymore at the waveform of the
sinusoidal carrier.
▪ The output is a complex-valued signal that is related to the
output of a passband modulator as
▪ Or,
A(t) < ɸ(t)

▪ You can see the constellation diagram for those


modulation blocks. Moreover, the Discrete-Time Scatter
Plot scope is used to observe noise effect. 25
26
Matlab Code Example
% Create a random digital message
M = 16; % Alphabet size
x = randint(5000,1,M);

% Use 16-QAM modulation to produce y.


y=modulate(modem.qammod(M),x);

% Transmit signal through an AWGN channel.


ynoisy = awgn(y,10,'measured’);
% Create scatter plot from noisy data.
scatterplot(ynoisy);

% Demodulate ynoisy to recover the message.


z=demodulate(modem.qamdemod(M),ynoisy);

% Check symbol error rate.


[num,rt]= symerr(x,z)
27
t = 0:.01:1;
fc = 5; %carrier
frequency
Vi = 1;
Vq = 0;
s = exp(j*2*pi*fc*t); %complex
carrier
x = (Vi+j*Vq)*s; %passband
modulation
subplot(2,1,1);
plot(t,real(x)) %inphase
component
title('Inphase Component');
subplot(2,1,2);
plot(t,imag(x))
%quadrature component
title('Quadrature Component');

28
For more understanding about:

➢ Bit rate Vs Baud rate


➢ Constellation Diagrams
Please visit the following sites:

https://www.youtube.com/watch?v=pxiqsmY9b4Y

https://www.youtube.com/watch?v=J5U2EfSLBo8

https://www.youtube.com/watch?v=kfJeL4LQ43s

29

You might also like