Professional Documents
Culture Documents
Low level of security. (Disadvantage) High level of security as you can use
Encryption (Ciphering) and
Authentication. (Advantage)
The modulation schemes listed in the fig.(1.2) and the tree are classified into two
large categories: constant envelope and nonconstant envelope. Under constant
envelope class, there are three subclasses: FSK and PSK. Under nonconstant envelope
class, there are three subclasses: ASK and QAM.
Digital
Modulation
schemes
constant nonconstant
Envelope envelope
-BFSK -BPSK
-DPSK -On-Off keying. -Rectangular
-M'ary FSK
-M'ary ASK QAM.
-MSK -M'ary PSK.
-circular QAM
-GMSK -QPSK.
-OQPSK.
π / 4–QPSK
Note that:
no. of basis signals is less than or equal the signal set
No of basis signals is called dimension
𝑑 𝑖𝑗
𝑃𝑠 (𝜀|𝑠𝑖 ) ≤ 𝑗 =1,𝑗 ≠𝑖 𝑄 eqn (1.6)
2𝑁𝑜
Where the Q-function is
∞ 1
𝑄 𝑥 = 𝑥
(−𝑥 2 2) 𝑑𝑥
exp eqn (1.7)
2𝜋
And dij is Euclidean distance between ith and the jth points.
____________________________________________________________________
Figure (1.4) Line codes for the electrical representation of binary data: (a) Unipolar
NRZ signaling. (b) Polar NRZ signaling. (c) Unipolar RZ signaling. (d) Bipolar RZ
signaling. (e) Split-phase or Manchester code.
_____________________________________________________________________
Figure(1.5) Power spectra of line codes: (a) Unipolar NRZ signal. (b) Polar NRZ signal.
(c) Unipolar RZ signal. (d) Bipolar RZ signal. (e) Manchester-encoded signal. The
frequency is normalized with respect to the bit rate 1/Tb and the average power is
normalized to unity.
1.2.4 Bipolar return-to-zero (BRZ) signaling
This line code uses three amplitude level as indicated in Figure (1.4) (d). Specifically,
positive and negative pulses of equal amplitude (i.e., +A and –A) are used alternately
for symbol 1, with each pulse having a half-symbol width; no pulse is always used for
symbol 0. A useful property of the BRZ signaling is that the power spectrum of the
transmitted signal has no DC component and relatively insignificant low-frequency
components for the case when symbols 1 and 0 occur with equal probability. This line
code is also called alternate mark inversion (AMI) signaling
.
1.2.5 Split-phase (Manchester code)
In this method of signaling, illustrated in Figure (1.4) (e). symbol 1 is represented by
a positive pulse of amplitude A followed by a negative pulse of amplitude –A, with
both pulses being half-symbol wide. For symbol 0, the polarities of these two pulses
are reversed. The Manchester code suppresses the DC component and has relatively
insignificant low-frequency components, regardless of the signal statistics. This
property is essential in some applications.
_____________________________________________________________________
Figure (1.6)(a) Original binary data. (b) Differentially encoded data, assuming
reference bit 1. (c) Waveform of differentially encoded data using unipolar NRZ
signaling.
Distorted Amplifier- Decision- Regenerated
PCM wave equalizer making PCM wave
device
Timing
circuit
_____________________________________________________________________
Figure (1.7). Block diagram of regenerative repeater.
____________________________________________________________________
+1 if symbol bk is 1
ak = eqn (1.9)
−1 if symbol bk is 0
s t = k ak g t − kTb eqn(1.10)
y t = μ ak p t − kTb + n(t)
where is a scaling factor and p(t) is to be defined and normalized i.e p(0) = 1
P(t) = g(t) * h(t) * c(t) eqn (1.11)
* denotes convolution
Convolution in time domain multiplication in (f) domain
P(f) = G(f) H(f) C(f) ) eqn (1.12)
Receive filter output y(t) is sampled at time t i = iTb.
∞
𝑦 𝑡𝑖 = 𝜇 𝑘 =−∞ 𝑎𝑘 𝑝 𝑖 − 𝑘 𝑇𝑏 + 𝑛 𝑡𝑖
= 𝜇 𝑎𝑖 + 𝜇 ∞𝑘=−∞ 𝑎𝑘 𝑖 − 𝑘 𝑇𝑏 + 𝑛 𝑡𝑖 eqn(1.13)
𝑘 ≠𝑖
1.3.2 Nyquist’s criterion for Distortion less Base Band Binary Transmission
Typically The frequency response of the channel and the transmission pulse shape are
specified, the problem is to determine the frequency responses of the transmit and receive
filters to reconstruct the original binary data sequence (b k). Extraction involves sampling the
o/p y(t) at time t=iTb.
The decoding requires that the weighted pulse contribution a kP(iTb – kTb) for k=i be free from
ISI due to overlapping tails of all other weighted pulse contributions represented by ki
1 𝑖=𝑘
We control pulse p(t) such that 𝑝 𝑖𝑇𝑏 − 𝑘𝑇𝑏 =
0 𝑖 ≠𝑘
If p(t) satisfies this ISI will vanish.
How to design this?
Converting to frequency domain considering sampling process in time and frequency domain
and periodicity in (f) domain.
F.T of infinite periodic sequence of delta function of period T b whose individual areas
are weighted by the respective sample value of p(t) that is given P (f) is given by
∞
𝑃𝛿 𝑓 = 𝑅𝑏 𝑛 =−∞ 𝑃(𝑓 − 𝑛𝑅𝑏 )
∞
= −∞
∞
𝑚 =−∞ 𝑝 𝑚𝑇𝑏 𝛿 𝑡 − 𝑚𝑇𝑏 𝑒 −𝑗2𝜋𝑓𝑡 𝑑𝑡 eqn(1.14)
Let m = i – k i = k corresponds to m = 0
i k corresponds to m 0
∞
𝑝𝛿 𝑓 = −∞
𝑝 0 𝛿(𝑡) 𝑒 −𝑗2𝜋𝑓𝑡 𝑑𝑡 = 𝑝 0 = 1 eqn(1.15)
Condition of zero ISI is
∞
𝑛 =−∞ 𝑃 𝑓 − 𝑛𝑅𝑏 = 𝑇𝑏 eqn(1.16)
Nyquist criterion for distortion less baseband transmission in the absence of noise
1 𝑓
Ideal Nyquist channel 𝑃 𝑓 = 𝑟𝑒𝑐𝑡
2𝑤 2𝑤
𝑅𝑏 1
𝑤= =
2 2𝑇𝑏
𝑝 𝑡 = 𝑠𝑖𝑛𝑐(2𝑤𝑡) eqn(1.17)
Note:
Rb = 2w is called Nyquist rate.
W is called Nyquist bandwidth
_____________________________________________________________________
Figure (1.9) Nyquist criterion for ISI cancellation (ideal Nyquist channel)
(a) Ideal magnitude. (b) Ideal basic pulse shape
This transfer function corresponds to a rectangular "brick-wall" filter with
absolute bandwidth=Rb/2 where Rb is the bit rate. While this transfer function
satisfies the zero ISI criterion with a minimum of bandwidth, there are practical
difficulties in implementing it, since it corresponds to a noncausal system (h(t) exists
for t< 0) and is thus difficult to approximate.
Also, the (sin t) /t pulse has a waveform slope that is 1/t at each zero crossing,
and is zero only at exact multiples of 7's, thus any error in the sampling time of zero-
crossings will cause significant ISI due to overlapping from adjacent symbols (A
slope of 1/t2 or 1/t3 is more desirable to minimize the ISI due to timing jitter in
adjacent samples).
is called roll off factor which indicates the excess bandwidth over the ideal
solution w.
Transmission B.W BT = 2w – f1 = (1+) W.
This transfer function is plotted in Figure 1.10 for various values of a. When = 0.
the raised cosine rolloff filter corresponds to a rectangular filter of minimum
bandwidth. The corresponding impulse response of the filter can be obtained by
taking the inverse Fourier transform of the transfer function, and is given by
cos 2πα wt
p t = sinc 2wt eqn (1.20)
1−16α 2 w 2 t 2
Notice that the impulse response decays much faster at the zero-crossings
(approximately as 1/t3 for t>> when compared to the 'brick-wall" filter (=0). The
rapid time rolloff allows it to be truncated in time with little deviation in performance
from theory. As seen from Figure 1.10, as the rolloff factor a increases, the bandwidth
of the filter also increases, and the time side lobe levels decrease in adjacent symbol
slots. This implies that increasing a decreases the sensitivity to timing jitter, but
increases the occupied bandwidth.
The spectral efficiency offered by a raised cosine filter only occurs if the exact
pulse shape is preserved at the carrier. This becomes difficult if nonlinear RF
amplifiers are used. Small distortions in the baseband pulse shape can dramatically
change the spectral occupancy of the transmitted signal. If not properly controlled,
this can cause serious adjacent channel interference in mobile communication
systems. A dilemma for mobile, communication designers is that the reduced
bandwidth offered by Nyquist pulse shaping requires linear amplifiers which are not
power efficient. An obvious solution to this problem would be to develop linear
amplifiers which use real time feedback to offer more power efficiency, and this is
currently an active research thrust for mobile communications.
_______________________________________________________________
Figure (1.10) Responses for different rolloff factors of raised cosine filter.
(a) Frequency response. (b) Time response.
1.3.4 Gaussian Filter
It is also possible to use non-Nyquist techniques for pulse shaping. Prominent among
such techniques is the use of a Gaussian pulse-shaping filter which is particularly
effective when used in conjunction with Minimum Shift Keying (MSK) modulation,
or other modulations which are well suited for power efficient nonlinear amplifiers.
Unlike Nyquist filters which have zero-crossings at adjacent symbol peaks and a
truncated transfer function, the Gaussian filter has a smooth transfer function with no
zero-crossings.
The impulse response of the Gaussian filter gives rise to a transfer function that is
highly dependent upon the 3-dB bandwidth. The Gaussian Iowpass filter has a
transfer function given By
𝐻𝐺 𝑓 = exp (−𝛼 2 𝑓 2 ) eqn(1.21)
The parameter α is related to bandwidth , the 3-dB bandwidth of the baseband
Gaussian shaping filter is given by,
0.5887
𝛼= eqn(1.22)
𝐵
As a increases, the spectral occupancy of the Gaussian filter decreases and time
dispersion of the applied signal increases. The impulse response of the Gaussian filter
is given by
𝜋 𝜋2
𝐺 𝑡 = exp − 𝛼 2 𝑡 2 eqn(1.23)
𝛼
Figure 1.11 shows the impulse response of the baseband Gaussian filter for various
values of 3-dB bandwidth-symbol time product (BTS). The Gaussian filter has a
narrow absolute bandwidth (although not as narrow as a raised cosine rolloff filter),
and has sharp cut-off, low overshoot, and pulse area preservation properties which
make it very attractive for use in modulation techniques that use nonlinear RF
amplifiers and do not accurately preserve the transmitted pulse shape .
It should be noted that since the Gaussian pulse-shaping filter does not satisfy the
Nyquist criterion for ISI cancellation, reducing the spectral occupancy creates
degradation in performance due to increased ISI. Thus, a trade-off is made between
the desired RF bandwidth and the irreducible error due to ISI of adjacent symbols
when Gaussian pulse shaping is used. Gaussian pulses are used when cost is a major
factor and the bit error rates due to ISI are deemed to be lower than what is nominally
required.
𝑠 𝑡 = 2𝑃 cos 2𝜋𝑓𝑐 𝑡 , 0 ≤𝑡 ≤𝑇
2
= 𝑃𝑇 cos 2𝜋𝑓𝑐 𝑡 , 0 ≤𝑡 ≤𝑇
𝑇
2
= 𝐸 cos 2𝜋𝑓𝑐 𝑡 , 0 ≤𝑡 ≤𝑇 eqn (1.24)
𝑇
where E = P T is the energy contained in a bit duration.
2
If we take ∅1 t = cos2πfc t as the orthonormal basis function, the applicable
T
signal space or constellation diagram of the BASK signals is shown in Figure (1.11).
_____________________________________________________________________
Figure (1.12) (a) Binary modulating signal and (b) BASK signal
The Fourier transform of the BASK signal s(t) is
𝐴 ∞
𝑆 𝑓 = −∞
𝑚 𝑡 𝑒 𝑗 2𝜋 𝑓𝑐 𝑡 𝑒 −𝑗 2𝜋𝑓𝑡 𝑑𝑡 +
2
𝐴 ∞
−∞
𝑚 𝑡 𝑒 −𝑗 2𝜋𝑓𝑐 𝑡 𝑒 −𝑗2𝜋𝑓𝑡 𝑑𝑡
2
𝐴 𝐴
𝑆 𝑓 = 𝑀 𝑓 − 𝑓𝑐 + 𝑀 𝑓 + 𝑓𝑐 eqn (1.25)
2 2
The effect of multiplication by the carrier signal Acos 2πfct is simply to shift
the spectrum of the modulating signal m (t) to fc. Figure 1.13 shows the amplitude
spectrum of the BASK signals when m(t) is a periodic pulse train. Since we define the
bandwidth as the range occupied by the baseband signal m(t) from 0 Hz to the first
zero-crossing point, we have B Hz of bandwidth for the baseband signal and 2B Hz
for the BASK signal.
_____________________________________________________________________
Figure (1.13) (a) Modulating signal, (b) spectrum of (a), and (c) spectrum of BASK
signals.
Figure (1.14) shows the modulator and a possible implementation of the coherent
demodulator for BASK signals.
_____________________________________________________________________
Figure (1.14) (a) BASK modulator and (b) coherent demodulator.
1.4.3 M-ary Amplitude-Shift Keying (M-ASK)
An M-ary amplitude-shift keying (M-ASK) signal can be defined by
𝐴𝑖 𝑐𝑜𝑠2𝜋𝑓𝑐 𝑡 0 ≤𝑡 ≤𝑇
𝑠 𝑡 =
0, 𝑒𝑙𝑠𝑒𝑤𝑒𝑟𝑒
eqn (1.26)
where
Ai = A[2i - (M - 1)] eqn (1.27)
for i = 0, 1, ..., M - 1 and M > 4. Here, A is a constant, fc is the carrier frequency, and T
𝐴2
is the symbol duration. The signal has a power Pi = 2 ,, so that Ai = 2𝑃𝑖 .
Thus equation (4) can be written as
𝑠 𝑡 = 2𝑃𝑖 cos 2𝜋𝑓𝑐 𝑡 , 0 ≤𝑡 ≤𝑇
2
= 𝑃𝑖 𝑇 cos 2𝜋𝑓𝑐 𝑡 , 0 ≤𝑡 ≤𝑇
𝑇
2
= 𝐸𝑖 cos 2𝜋𝑓𝑐 𝑡 , 0 ≤𝑡 ≤𝑇 eqn(1.28)
𝑇
where Ei = PiT is the energy of s(t) contained in a symbol duration for i = 0, 1, ..., M -1.
Figure (1.15) shows the signal constellation diagrams of M-ASK and 4-ASK signals.
_____________________________________________________________________
Figure (1.15) (a) M-ASK and (b) 4-ASK signal constellation diagrams.
Figure (1.16) shows the 4-ASK signal sequence generated by the binary sequence 00
01 10 11.
____________________________________________________________________
Figure (1.16) 4-ASK modulation: (a) binary sequence, (b) 4-ary signal, and (b) 4-ASK
signal.
Figure (1.17) shows the modulator and a possible implementation of the coherent
demodulator for M-ASK signals.
_____________________________________________________________________
Figure 1.17 (a) M-ASK modulator and (b) coherent demodulator.
𝐸𝑏
𝑃𝑒 = 𝑄 eqn(1.29)
2𝑁0
And For M-ary ASK (MAM) the probability of error would be
OR: The signal is shifted by 𝜋 when transmitting binary zero which means
2𝐸𝑏
𝑆𝐵𝑃𝑆𝐾 = − cos 2𝜋𝑓𝑐 𝑡 + 𝜃𝑐 0 ≤ 𝑡 ≤ 𝑇𝑏 (for binary 0) eqn(1.32)
𝑇𝑏
These signals are referred to as antipodal signals and is normalized to unit energy
The reason that they are chosen is that they have a correlation coefficient of -1, which
leads to the minimum error probability for the same Eb/No, as we will see shortly.
If m(t) represents binary data which takes on one of two possible pulse shapes(1,-1) as
general case
2𝐸𝑏
𝑆𝐵𝑃𝑆𝐾 = 𝑚(𝑡) cos 2𝜋𝑓𝑐 𝑡 + 𝜃𝑐 0 ≤ 𝑡 ≤ 𝑇𝑏 eqn(1.33)
𝑇𝑏
Figure (1.19) BPSK spectrum with rectangular and raised cosine filter
with roll of factor=0.5
1.5.1.5 Modulator
Using a balanced modulator after putting the binary data on the form of polar NRZ
(non return to zero) (-1,+1) we can generate the BPSK signal note that the carrier
frequency 𝑓𝑐 must satisfy that 𝑓𝑐 = 𝑚𝑅𝑏 for satisfying synchronization i.e ensure that
each transmitted bit contains an integral number of cycles of the carrier wave.
1.5.1.6 Demodulator:-
As we pointed out before the PSK modulation must be coherently demodulated so a
carrier recovery circuit (Costas loop-phase locked loop) must be employed to obtain
the carrier.
To detect the original binary sequence of 1’s and zero’s we apply the noisy PSK
signal to a correlator which is supplied with the locally generated carrier the correlator
output is compared with a threshold of zero volts if the output exceeds zero the
receiver decides in favor of symbol 1 otherwise the receiver decides in favor of zero.
Figure (1.22) BPSK demodulator
2𝐸𝑏 2𝐸𝑏 1 1
𝑥0 𝑡 = 𝑚 𝑡 𝑇𝑏
𝑐𝑜𝑠 2 2𝜋𝑓𝑐 𝑡 + 𝜃 = 𝑚 𝑡 𝑇𝑏 2
+ 2 cos
(2(2𝜋𝑓𝑐 𝑡 + 𝜃) eqn(1.37)
When no pilot signal is transmitted a Costas loop or squaring loop may be used to
synthesize the carrier phase and frequency from the received BPSK signal. Figure
(1.23) shows the block diagram of a BPSK receiver along with the carrier recovery
circuits.
Figure (1.23) shows the block diagram of a BPSK receiver along with the carrier
recovery circuits.
Decoding:
𝑎𝑘 = 𝑑𝑘 ⨁𝑑𝑘−1 eqn(1.42)
The effect:to leave symbol dk unchanged from the previous symbol if ak=1 & toggle if
else.
Example of differential encoding:
mk 1 0 0 1 0 1 1 0
dk-1 1 1 0 1 1 0 0 0
dk 1 1 0 1 1 0 0 0 1
Table (1.3) Example of differential encoding
1.5.2.2 Modulator:
1.5.2.3 Demodulator:-
(1) Suboptimum receiver:
At the receiver, the original sequence is recovered from the demodulated differentially
encoded signal through a complementary process,
1.5.2.4 Example:
A complete example of differential PSK (DPSK) is shown in Table (1.4)
Modulation ref
Message ak 1 0 1 1 0 0 0 1 1
Encoding 𝑑𝑘 = 𝑎𝑘 ⨁𝑑𝑘−1 1 1 0 0 0 1 0 1 1 1
Signal phase 𝜃 0 0 𝜋 𝜋 𝜋 0 𝜋 0 0 0
Demodulation
Output of correlator 1 -1 1 1 -1 -1 -1 1 1
Demodulator output 1 0 1 1 0 0 0 1 1
Table(1.4) DPSK example
i=1,2,…..,M &
Ts: is symbol time=(log2M)Tb . And
Es=symbol energy=(log2M)Eb
2 2
Let 𝜙1 (𝑡) = cos 2𝜋𝑓𝑐 𝑡 , 𝜙2 (𝑡) = sin 2𝜋𝑓𝑐 𝑡 are the basis signals
𝑇𝑠 𝑇𝑠
2𝜋 2𝜋
𝑆𝑖 𝑡 = 𝐸𝑠 [cos((𝑖 − 1) 𝑀 )𝜙1 (𝑡) − sin((𝑖 − 1) 𝑀 )𝜙2 (𝑡)] eqn(1.47)
And hence using eqn(1.39) we will find that average symbol error probability equal
2𝐸𝑏 𝑙𝑜𝑔 2 𝑀 𝜋
𝑃𝑒 ≤ 2𝑄 𝑠𝑖𝑛 eqn(1.48)
𝑁𝑜 𝑀
𝑆𝐵 𝑓 = 2𝐸 𝑠𝑖𝑛𝑐2 𝑇𝑓
2 2𝑅𝑏
𝐵𝑊𝑚𝑎𝑖𝑛 𝑐𝑒𝑛𝑡𝑟𝑎𝑙 𝑙𝑜𝑏𝑒 = = eqn(1.51)
𝑇𝑠 log 2 𝑀
Therefore,
log 2 𝑀
𝜂 𝐵𝑊 𝑒𝑓𝑓𝑖𝑐𝑖𝑒𝑛𝑐𝑦 =
2
And To ensure that there is no degradation in error performance (BER) the ratio Eb/No
must increase.
Table (1.5) gives a values of both the bandwidth and power efficiencies of M-ary PSK
signals
M 2 4 8 16 32 64
𝜼𝑩 = 𝑹𝒃 /𝑩 0.5 1 1.5 2 2.5 3
-6
Eb/No for BER =10 10.5 10.5 14 18.5 23.4 28.5
Table (1.5) bandwidth and power efficiencies of M-ary PSK signals
The relation between symbol error & Eb/No is as following:
Figure(1.31) symbol error rate versus signal to noise ratio for various
modulation PSK schemes
1.5.3.6 Modulator:-
For M≥ 4we can use a quadrature modulator.
The only difference for different values of M is the level generator
The level generator gives two signals corresponding to each n bits of the input
sequence(symbol) by changing the levels of these signals we can vary the
phase.
Note that the M-ary can be directly modulated or differentially encoded to
provide noncoherent detection
Figure (1.32) MPSK modulator
1.5.3.7 Demodulator:-
For example:
Message Phase
00 0
01 π/2
11 π
10 3π/2
Table (1.6) QPSK output phases
Note that : it is better to arrange the states with Gray Coding , this makes each
adjacent symbol only differs by one bit to minimize the bit error rate (BER).
Where TS is the symbol duration and is equal to twice the bit period T b.
eqn (1.53)
If the basis functions are:
2 2
𝜙1 𝑡 = cos(2𝜋𝑓𝑐 𝑡) , 𝜙2 𝑡 = sin(2𝜋𝑓𝑐 𝑡)
𝑇𝑠 𝑇𝑠
Then the 4 signals in the set can be expressed in the terms of the basis functions as:
𝜋 𝜋
𝑆𝑄𝑃𝑆𝐾 𝑡 = 𝐸𝑠 cos 𝑖 − 1 𝜙1 𝑡 – 𝐸𝑠 sin 𝑖 − 1 𝜙2 𝑡 eqn (1.54)
2 2
𝑖 = 1,2,3,4
Figure (1.34) (a) QPSK constellation where the carrier phases are 0, π/2 , π,3π/2
(b) QPSK constellation where the carrier phases are π/4, 3π/4 ,5π/4,7π/4
From the constellation diagram, it can be seen that the distance between two adjacent
points in the constellation is 2𝐸𝑆 .
Since each symbol corresponds to two bits, then ES=2Eb, then the distance between
two adjacent points in the constellation is 2 𝐸𝑏 .
Then the average probability of bit error in AWGN channel:
2𝐸𝑏 1 𝐸𝑏
𝑃𝑒 = 𝑄 = 2 𝑒𝑟𝑓𝑐 eqn (1.55)
𝑁𝑜 𝑁𝑜
Note that
QPSK has the same probability of bit error as BPSK, but twice as much data
can be sent in the same bandwidth.
Thus compared to BPSK, QPSK provides twice the spectral efficiency with
exactly the same power efficiency.
Similar to BPSK, QPSK can also be differentially encoded to allow non-
coherent detection.
Due to the time alignment of mI (t) and mQ (t) in standard QPSK, phase transitions
occur only once every Ts = 2Tb s, and will be a maximum of 180 degree if there
is a change in the value of both mI (t) and mQ (t) However, in OQPSK signaling,
bit transitions (and hence phase transitions) occur every Tb s.
Since the transitions instants of mI (t) and mQ (t) are offset, at any given time only
one of the two bit streams can change values. This implies that the maximum
phase shift of the transmitted signal at any given time is limited to ±90°.
Hence by switching phases more frequently (i.e., every Tb s instead of 2Tbs)
OQPSK signaling eliminates 180° phase transitions.
Since 180° phase transitions have been eliminated, bandlimiting of (i.e., pulse
shaping) OQPSK signals does not cause the signal envelope to go to zero.
Obviously, there will be some amount of ISI caused by the bandlimiting process,
especially at the 90 degree phase transition points. But the envelope variations are
considerably less, and hence hard limiting or nonlinear amplification of OQPSK
signals does not regenerate the high frequency side lobes as much as in QPSK.
Thus, spectral occupancy is significantly reduced, while permitting more efficient
RF amplification.
The modulated signal is shown in the figure below for a short segment of a
random binary data-stream:
Note that half symbol-period offset between the two component waves.
The spectrum of an OQPSK signal is identical to that of a QPSK signal,
hence both signals occupy the same bandwidth. The staggered alignment of the
even and odd bit streams does not change the nature of the spectrum. OQPSK
retains its band limited nature even after nonlinear amplification, and therefore is
very attractive for mobile communication systems where bandwidth efficiency
and efficient nonlinear amplifiers are critical for low power drain. Further,
OQPSK signals also appear to perform better than QPSK in the presence of phase
jitter due to noisy reference signals at the receiver
1.5.6 π / 4–QPSK
The π/4 shifted QPSK modulation is a quadrature phase shift keying technique
which offers a compromise between OQPSK and QPSK in terms of the allowed
maximum phase transitions. It may be demodulated in a coherent or noncoherent
fashion. In π/4 QPSK, the maximum phase change is limited to ± 135° as
compared to 180° for QPSK and 90o for OQPSK. Hence, the bandlimited π/4
QPSK signal preserves the constant envelope property better than bandlimited
QPSK, but is more susceptible to envelope variations than OQPSK.
An extremely attractive feature of π/4 QPSK is that it can be noncoherently
detected, which greatly simplifies receiver design. Further, it has been found that
in the presence of in multipath spread and fading, π/4 QPSK performs better than
OQPSK . Very often, π/4 QPSK signals are differentially encoded to facilitate
easier implementation of differential detection or coherent demodulation with
phase ambiguity in the recovered carrier. When differentially encoded π/4 QPSK
is called π/4 DQPSK.
π / 4–QPSK uses two identical constellations which are rotated by 45° ( π / 4
radians, hence the name) with respect to one another. Usually, either the even or
odd data bits are used to select points from one of the constellations or the other
bits select points from the other constellation. This also reduces the phase-shifts
from a maximum of 180°, but only to a maximum of 135° and so the amplitude
fluctuations of π / 4–QPSK are between OQPSK and non-offset QPSK.One
property this modulation scheme possesses is that if the modulated signal is
represented in the complex domain, it does not have any paths through the origin.
In other words, the signal does not pass through the origin. This lowers the
dynamical range of fluctuations in the signal which is desirable in
communications.
π/4 QPSK modulator, signaling points of the modulated signal are selected from
two QPSK constellations which are shifted by π/4 with respect to each other. The
figure shows the two constellations along with the combined constellation where
the links between two signal points indicate the possible phase transitions.
Switching between two constellations, every successive bit ensures that there is at
least a phase shift which is an integer multiple of π/4 radians between successive
symbols. This ensures that there is a phase transition for every symbol, which
enables a receiver to perform timing recovery and synchronization.
Information bits mI,mQ Phase
11 π/4
01 3π/4
00 -3π/4
10 -π/4
Table (1.7): Carrier phase shifts corresponding to various input bit pairs.
_____________________________________________________________________
Figure (1.41) Constellation diagram of π/4 QPSK signal (a) possible states of 𝜃𝑘 wken
𝜃𝑘 −1 = 𝑛𝜋/4 (b) possible states when 𝜃𝑘 −1 = 𝑛𝜋/2 (c) all possible states
1.5.6.1 Example
Sketch the modulated symbols for the input bit stream: 11000110
_____________________________________________________________________
Figure (1.42) constellation diagram of π/4 QPSK
The modulated signal is shown below for a short segment of a random binary data-
stream:
Note that: Successive symbols are taken from the two constellations shown in the
diagram. Thus, the first symbol (1 1) is taken from the 'blue' constellation and the
second symbol (0 0) is taken from the 'green' constellation.
Where 𝜃𝑘 = 𝜃𝑘 −1 + 𝜙𝑘 eqn(1.58)
Just as in a QPSK modulator, the in-phase and quadrature bit streams Ik and Qk are
then separately modulated by two carriers which are in quadrature with one
another, to produce the π/4 QPSK waveform given by:
Both Ik and Qk are usually passed through raised cosine roll off pulse shaping
filters before modulation, in order to reduce the bandwidth occupancy. The
function P(t) in equations (1.59),(1.60) corresponds to the pulse shape, and Ts is
the symbol period. Pulse shaping also reduces the spectral restoration problem
which may be significant in fully saturated, nonlinear amplified systems.
It should be noted that the values of Ik and Qk and the peak amplitude of
the waveforms I(t) and Q(t) can take one of the five possible values 0, +1, -1,
+1/ 2 , -1/ 2 .
From the above discussion it is clear that the information in a π/4 QPSK signal is
completely contained in the phase difference φk of the carrier between two
adjacent symbols. Since the information is completely contained in the phase
difference, it is possible to use noncoherent differential detection even in the
absence of differential encoding.
1.5.6.3 π/4 QPSK Detection Techniques
Due to ease of hardware implementation, differential detection is often employed
to demodulate π/4 QPSK signals. In an AWGN channel, the BER performance of
a differentially detected π/4 QPSK is about 3 dB inferior to QPSK, while
coherently detected π/4 QPSK has the same error performance as QPSK.
In low bit rate, fast Rayleigh fading channels, differential detection offers a
lower error floor since it does not rely on phase synchronization.
There are various types of detection techniques that are used for the detection of
π/4QPSK signals. They include baseband differential detection, IF differential
detection, and FM discriminator detection. While both the baseband and IF
differential detector determines the cosine and sine functions of the phase
difference, and then decides on the phase difference accordingly, the FM
discriminator detects the phase difference directly in a noncoherent manner.
Interestingly, simulations have shown that all 3 receiver structures offer very
similar bit error rate performances, although there are implementation issues
which are specific to each technique.
𝑧𝑘 = sin 𝜙𝑘 − 𝛾 eqn(1.62)
The output of the differential decoder is applied to the decision circuit, which uses Table
(1.7) to determine:
𝑆𝐼 = 1, 𝑖𝑓 𝑥𝑘 > 0 𝑜𝑟 𝑆𝐼 = 0, 𝑖𝑓 𝑥𝑘 < 0
𝑆𝑄 = 1, 𝑖𝑓 𝑦𝑘 > 0 𝑜𝑟 𝑆𝑄 = 0, 𝑖𝑓 𝑦𝑘 < 0
Where SI and SQ are the detected bits in the in-phase and quadrature arms,
respectively.
2𝐸𝑏 𝛥ω
𝑠0 𝑡 = cos ωc + 𝑡 0 ≤ 𝑡 ≤ 𝑇𝑏 (𝑏𝑖𝑛𝑎𝑟𝑦 0) eqn(1.66)
𝑇𝑏 2
2𝐸𝑏 𝛥ω
𝑠1 𝑡 = cos
(ωc − )𝑡 0 ≤ 𝑡 ≤ 𝑇𝑏 (𝑏𝑖𝑛𝑎𝑟𝑦 1) eqn(1.67)
𝑇𝑏 2
The most important factor to keep in mind when designing FSK is to keep the
frequency of the different symbols orthogonal to minimize the correlation between
the two symbols to the zero assuming perfect synchronization of receiver oscillators.
To achieve this we must do the correlation function between to transmitted symbols
and get the conditions to achieve the orthogonality
𝑇𝑏
𝐸= 𝑠0 𝑡 𝑠1 𝑡 𝑑𝑡
0
2𝐸𝑏 𝑇𝑏 𝛥ω 𝛥ω
= cos ωc + 𝑡 cos ωc − 𝑡 𝑑𝑡
𝑇𝑏 0 2 2
𝑇𝑏
𝐸𝑏 𝑇𝑏
= cos 𝛥ωt 𝑑𝑡 + cos 2ωc t 𝑑𝑡
𝑇𝑏 0 0
𝑠𝑖𝑛 𝛥𝜔 𝑇𝑏 𝑠𝑖𝑛 2𝜔𝑐 𝑇𝑏
= 𝐸𝑏 +
𝛥𝜔 𝑇𝑏 2𝜔𝑐 𝑇𝑏
eqn (1.68)
In practice 𝜔𝑐 𝑇𝑏 ≪ 1, and the second term on the right hand side can be ignored
therefore
𝐸 = 𝐸𝑏 𝑠𝑖𝑛𝑐 𝛥𝜔 𝑇𝑏 eqn(1.69)
𝛷2 Decision
boundary
Forward hint Region
We can think in the different orthogonal 𝑧1
𝐸𝑏
carriers of the FSK signal as a
multidimensional system with each carrier 𝛷1
𝐸𝑏
Region
represents an axis in this system.
In binary FSK we only have two 𝑧2
dimensions.
The M-ary FSK is built on this idea
Figure 1.48 signal space diagram for binary FSK system
2
cos
(2 𝜋 𝑓1 𝑡)
Binary wave 𝑇𝑏
+
(on-off Binary
signaling FSK
form) + wave
𝑚 (𝑡)
Inverter
2
cos
(2 𝜋 𝑓1 𝑡)
𝑇𝑏
_____________________________________________________________________
Fig 1.49 Block diagram for binary FSK transmitter
Figure (1.50) shows generating a FSK signal, there are four signals first the binary
one second the 1 signal with lower frequency third the 0 signal with the higher
frequency and last the final FSK signal.
_______________________________________________________
Now we proceed to find the power spectrum of the FSK signal. We expand the FSK
signal as following:
1
𝑠 𝑡 = 𝐴 cos 2𝜋 𝑓𝑐 + 𝑎𝑘 𝑡
2𝑇
𝜋𝑡 𝜋𝑡
= 𝐴 cos 𝑎𝑘 cos 2𝜋𝑓𝑐 𝑡 − 𝐴 sin 𝑎𝑘 sin 2𝜋𝑓𝑐 𝑡
𝑇 𝑇
𝜋𝑡 𝜋𝑡
= 𝐴 cos( 𝑇 ) cos 2𝜋𝑓𝑐 𝑡 − 𝐴 𝑎𝑘 sin( 𝑇 ) sin 2𝜋𝑓𝑐 𝑡
eqn(1.71)
Where the last expression is derived using the fact that ak = ±1. The in phase
component
πt πt
A cos( ) is independent of the data. The quadrature component A ak sin ( ) is
T T
directly related to data. The in phase and quadrature components are independent of
each other.
𝑆 𝑓 = 𝐼 𝑓 + 𝑄(𝑓) eqn(1.72)
𝜋𝑡 2 1 1
𝐼 𝑓 = ℱ 𝐴 𝑐𝑜𝑠( ) = 𝐴2 𝛿 𝑓 − + 𝛿(𝑓 + ) eqn(1.73)
𝑇 2𝑇 2𝑇
Where stands for Fourier transform. It is seen that the spectrum of the in phase part
of the FSK signal are two delta functions.
2
1 𝜋𝑡
𝑄 𝑓 = ℱ 𝐴 𝑠𝑖𝑛( ) 0≤𝑡≤𝑇
2 𝑇
The complete baseband PSD of the binary FSK signal is the sum of I(f) & Q(f) :
𝑇𝑏
𝑑𝑡
0
+ 𝑐𝑜𝑜𝑠𝑒
Decision
device 𝑐𝑜𝑜𝑠𝑒
−
𝑇𝑏
𝑑𝑡
0
To study the coherent demodulator error performance of the transmitted FSK signal
we need to look at fig 1.51 where the distance between the two message points is
equal to 2Eb and the error probelity is driven from the relation
We can drive that Pe 0 & Pe (1) have the same value and it is equal to :
1 𝐸𝑏
𝑃𝑒 (0 1 = 𝑒𝑟𝑓𝑐( ) eqn(1.76)
2 2 𝑁0
Averaging Pe 0 & Pe (1), we find that the average probability of symbol error for
coherent binary FSK is:
1 𝐸𝑏
𝑃𝑒 = 𝑒𝑟𝑓𝑐 eqn (1.77)
2 2 𝑁0
2 Envelope
cos(2𝜋𝑓1 𝑡)
𝑇𝑏 detector
0 ≤ 𝑡 ≤ 𝑇𝑏
Comparison if 𝑙1
device if 𝑙1
Filter matched to
2 Envelope
cos(2𝜋𝑓2 𝑡)
𝑇𝑏 detector Fig 1.52 Noncoherant
receiver for detection
0 ≤ 𝑡 ≤ 𝑇𝑏
of binary FDK signals
𝑇 = 𝑇𝑏
And
𝐸 = 𝐸𝑏
Where 𝑇𝑏 is the bit duration and 𝐸𝑏 is the signal energy per bit. Hence, the 𝑃𝑒 can be
proven to be
1 𝐸
𝑃𝑒 = (− 2𝑁𝑏 )
exp eqn(1.78)
2 0
eqn(1.81)
Average bit error probability:
eqn(1.82)
Asymptotic power efficiency:
eqn(1.83)
Shannon bandwidth:
eqn(1.84)
Bandwidth efficiency:
eqn(1.86)
Fig 1.53
The bit error rate of different M’s for the M-ary FSK is shown in Fig 1.53, it can be
shown from the Fig that the more M the lower level of probability of error for the
same SNR
Coherent detection of M-ary FSK requires the use of exact phase references, the
provision for which at the receiver can be costly and difficult to maintain. We may
avoid the need for such a provision by using noncoherant detection, which result in a
slightly inferior performance. In a noncoherant receiver, the individual matched filters
are followed by envelope detectors that destroy the phase information.
The probability of symbol error of the noncoherant detection of M-ary FSK:
𝑀−1 𝐸
𝑃𝑒 = exp
(− 2𝑁 ) eqn(1.86)
2 0
2𝐸𝑏
cos 2𝜋𝑓1 𝑡 + 𝜃 0 𝑓𝑜𝑟 𝑠𝑦𝑚𝑜𝑙 1
𝑇𝑏
𝑠 𝑡 = eqn(1.87)
2𝐸𝑏
cos 2𝜋𝑓2 𝑡 + 𝜃 0 𝑓𝑜𝑟 𝑠𝑦𝑚𝑜𝑙 0
𝑇𝑏
Where 𝐸𝑏 is the transmitted signal energy per bit, and 𝑇𝑏 is the bit duration. The
phase𝜃(0), denoting the value of phase at time𝑡 = 0, depends on the past history of
the modulation process. The frequency 𝑓1 & 𝑓2 are sent in response to binary symbol
1 and 0 appearing at the modulation input, respectively.
Another useful way of representing the CPFSK signal s(t) is to express it in the
conventional form of an angle-modulation waves follows
2𝐸𝑏
𝑠 𝑡 = cos 2𝜋𝑓𝑐 𝑡 + 𝜃 𝑡 eqn(1.88)
𝑇𝑏
The phase 𝜃 𝑡 is a continues function of time, this leads to the modulated wave s(t)
itself to be continues all the time including the inter-bit switching times.
1
𝑓𝑐 = 2 (𝑓1 + 𝑓2 ) eqn(1.89)
The phase 𝜃 𝑡 of CPFSK signal increases or decreases linearly with time during each
bit period of 𝑇𝑏 seconds, as shown by:
𝜋
𝜃 𝑡 =𝜃 0 ± 𝑇𝑏
𝑡 0 ≤ 𝑡 ≤ 𝑇𝑏 eqn(1.90)
Where the plus sign corresponds to sending symbol 1, and mines sign corresponds to
sending symbol 0. The parameter h is defined by:
= 𝑇𝑏 (𝑓1 − 𝑓2 ) eqn(1.91)
We refer to h as the deviation ratio, measured with respect to the bit rate 1/𝑇𝑏 . At time
t = 𝑇𝑏
𝜋 𝑓𝑜𝑟 𝑠𝑦𝑚𝑏𝑜𝑙 1
𝜃 𝑇𝑏 − 𝜃 0 = eqn(1.92)
−𝜋 𝑓𝑜𝑟 𝑠𝑦𝑚𝑏𝑜𝑙 0
That is to say, the sending of symbol 1 increases the phase of CPFSK s(t) by πh ,
whereas the sending of symbol 0 reduces it by an equal amount
This can be cleared using the phase trellis method
Fig 1.54
Using some mathematical operations we can express the CPFSK s(t) in terms of its in-
phase and quadrature components as follows:
eqn(1.93)
So we have the following four cases:
2 𝜋
∅2 𝑡 = sin 𝑡 sin 2𝜋𝑓𝑐 𝑡 0 ≤ 𝑡 ≤ 2𝑇𝑏
𝑇𝑏 2𝑇𝑏
𝑠 𝑡 = 𝑠1 ∅1 𝑡 + 𝑠2 ∅2 𝑡 0 ≤ 𝑡 ≤ 𝑇𝑏
Accordingly, the signal constellation for an MSK signal is two-dimensional, with four
message points, as shown in Fig 1.5.9
Figure (1.55) Constellation diagram for MSK signalIf we made a comparison between
the constellation of MSK and the QPSK signals we would notice that they have
identical format. Note, however, that the coordinates of the message points for the
QPSK signal are expressed in terms of signal energy per symbol, E, whereas for the
MSK signal they are expressed in terms of the signal energy per bit.
The basic difference between QPSK & MSK signals is in the choice of orthogonal
signals ∅1 (𝑡) and ∅2 (𝑡). For QPSK ∅1 (𝑡) and ∅2 (𝑡) are represented by a pair of
quadrature carriers, whereas for an MSK signal, they are represented by a pair of
sinusoidally modulated quadrature carriers.
To generate the signal described before of MSK we can use the following MSK
transmitter shown in Fig 1.57, the advantage of this modulator is that the signal
coherence and deviation ratio are largely unaffected by variation in the input data rate.
Earlier we remarked that the MSK and QPSK signals have similar signal space
diagram. It follows, therefore, that for the case of AWGN channel, they have the same
forela for their average probability of error:
𝐸𝑏
𝑃𝑒 = 𝑒𝑟𝑓𝑐( ) eqn(1.94)
𝑁0
T T
1 t− t+
g t = 2T Q 2πBb 2
− Q 2πBb 2
eqn(1.95)
ln 2 ln 2
For
0 ≤ Bb 𝑇 ≤ ∞
Fig 1.61 The truncated and scaled impulse response of the Gaussian low-pass
filter.method.modulation with FM-VCO.
Recall the probability of error for plain MSK is given by
2𝐸𝑏
𝑃𝑒 = 𝑄( ) eqn(1.96)
𝑁0
By comparing we can conclude that Pe GMSK > Pe FSK this arises from the trade off
between power and bandwidth efficient: GMSK achieves better bandwidth efficiency
than MSK at the expense of power efficiency.
1.7 QUADRATURE AMPLITUDE MODULATION (QAM)
M-Ary PSK systems are consisted of fixed step phase shifts with constant
envelope. In a try to increase such system capacity, the constellation points will get
closer to each other increasing the bit error rate. A simple solution is to increase the
radius of the constellation points, but of course it’ll also increase the power used.
A new technique was developed to overcome that problem by making use of
available space inside the constellation circle.
(b)
(a)
Figure (1.62) showing 16-Ary PSK (a) crowded on the constellation circle and equivalent average power
16-Ary QAM (b) with constellation points distributed to make use of the same space
_____________________________________________________________________
Figure (1.63) circular QAM
1.7.1.2 Rectangular QAM:
The general form of M-Ary QAM is defined by the transmitted signal:
2𝐸0 2𝐸0
𝑠𝑖 𝑡 = 𝑎𝑖 cos 2𝜋𝑓𝑐 𝑡 + 𝑏𝑖 sin 2𝜋𝑓𝑐 𝑡 , 0 ≤ t ≤ Tb eqn(1.98)
𝑇 𝑇
E0 is the energy of the signal with the lowest amplitude, ai and bi are a pair of
independent integers chosen to specify a certain constellation point, i є [-L+1 L-1],
where 𝐿 = 𝑀
(−𝐿 + 1, 𝐿 − 1) (−𝐿 + 3, 𝐿 − 1) (𝐿 − 1, 𝐿 − 1)
⋯
(−𝐿 + 1, 𝐿 − 3) (−𝐿 + 3, 𝐿 − 3) (𝐿 − 1, 𝐿 − 3)
𝑎𝑖 , 𝑏𝑖 = eqn (1.99)
⋮ ⋱ ⋮
(−𝐿 + 1, −𝐿 + 1) (−𝐿 + 3, −𝐿 + 1) ⋯ (𝐿 − 1, −𝐿 + 1)
The rectangular QAM signal could be represented in terms of 2 independent
basis functions:
2
𝜑1 𝑡 = cos 2𝜋𝑓𝑐 𝑡 0≤𝑡≤𝑇 eqn(1.100)
𝑇
2
, 𝜑2 𝑡 = 𝑇
sin 2𝜋𝑓𝑐 𝑡 0≤𝑡≤ 𝑇 eqn(1.101)
So finally
1 3𝐸𝑎𝑣
𝑃𝑒 = 2 1 − 𝑒𝑟𝑓𝑐 eqn(1.105)
𝑀 2(𝑀−1)𝑁0
___________________________________________________________
Figure (1.66) M-Ary QAM Modulator
Binary data are split into 2 parallel paths, in each path a number of bits 𝐿 = 𝑀 is
amplitude shift keyed to L levels then phase shift keyed using the 2 independent
carriers. Then the paths are combined again to form the M-Ary QAM signal.
0 0 0 0
-5 -5 -5 -5
0 50 100 0 50 100 0 50 100 0 50 100
amp=3.1623, ph=-108.4349 amp=1.4142, ph=-135 amp=1.4142, ph=135 amp=3.1623, ph=108.4349
5 5 5 5
0 0 0 0
-5 -5 -5 -5
0 50 100 0 50 100 0 50 100 0 50 100
amp=3.1623, ph=-71.5651 amp=1.4142, ph=-45 amp=1.4142, ph=45 amp=3.1623, ph=71.5651
5 5 5 5
0 0 0 0
-5 -5 -5 -5
0 50 100 0 50 100 0 50 100 0 50 100
amp=4.2426, ph=-45 amp=3.1623, ph=-18.4349 amp=3.1623, ph=18.4349 amp=4.2426, ph=45
5 5 5 5
0 0 0 0
-5 -5 -5 -5
0 50 100 0 50 100 0 50 100 0 50 100
_____________________________________________________________________
Figure (1.68) All possible QAM signals
1.7.5 BW efficiency:
It’s identical to M-Ary PSK where
𝑅 𝑙𝑜𝑔 2 𝑀
𝜌 = 𝐵𝑊𝑏 = eqn (1.107)
2
1.8 SYNCHRONIZATION
The coherent detection of a digitally modulated signal , irrespective of its form,
requires that the receiver be synchronous to the transmitter. We say that two
sequences of events (representing a transmitter and a receiver) are synchronous
relative to each other when the events in one sequence and the corresponding in the
other occur simultaneously. The process of making situation synchronous, and
maintaining in this situation is called synchronization.
When coherent detection is used , knowledge of both the frequency and the phase of
the carrier is necessary. The estimation of the carrier phase and frequency is called
carrier recovery or carrier synchronization.
To perform demodulation , the receiver has to know the instants of time at which the
modulation can change its state. That is, it has to know the starting and finishing times
of individual symbols , so that it may determine when to sample and when to quench
the product-integrators. The estimation of these times is called clock recovery or
symbol synchronization.
The propagation delay in the transmitted signal also results in a carrier offset, which
must be estimated at the receiver if the detector is phase coherent.
A difficulty in circuit implementation of the Mth power loop is the Mth power
device, especially at high frequencies. Costas loop design avoids this device.
Figure (1.72) is the Costas loop for carrier recovery for BPSK. Initially the VCO
generates a sinusoid with a frequency close to the carrier frequency fc and some initial
phase. The frequency difference and the initial phase are accounted for by the phase
θ. The multipliers in the I and Q-channels produce 2 fc terms and zero frequency
terms. The LPFs attenuate the 2fc terms and their outputs are proportional to
a t cos θ − θ or a t sin θ − θ . Then these two terms multiply again to give the
1
term 2 a2 t sin 2 θ − θ which is low-pass filtered one more time to get rid of any
amplitude fluctuation in a2 t , thus the control signal to the VCO is proportional to
sin 2 θ − θ which drives the VCO such that the difference θ − θ becomes smaller
and smaller. For sufficiently small θ − θ, the I-channel output is the demodulated
signal.
The Costas loop for QPSK is shown in Figure (1.73). The figure is self-
explanatory and its working principle is similar to that of BPSK. The limiters are
bipolar, which are used to control the amplitude of the two channels' signal to
maintain balance.
When the phase difference ϕ = θ − θ is sufficiently small, the I- and Q-channel
outputs are the demodulated signals.
A difficulty in Costas loop implementation is to maintain the balance between
the I- and Q-channel. The two multipliers and low-pass filters in these two channels
must be perfectly matched in order to achieve the theoretical performance.
Although the appearance of the Mth power loop and the Costas loop are quite
different, their performance can be shown to be the same.
M ary ASK
2(𝑀 − 1)
𝑃𝑠 = 𝑄
𝑀
BFSK
1
𝑃𝑒 = 𝑒
2
M-ary FSK
BPSK
𝑃𝑒 =
DPSK 1
𝑃𝑒 = 𝑒 −𝐸𝑏 /𝑁𝑜
2
M-ary PSK
2𝐸𝑏 𝑙𝑜𝑔2 𝑀 𝜋
𝑃𝑒 ≤ 2𝑄 𝑠𝑖𝑛
𝑁𝑜 𝑀
QPSK
𝑃𝑒 = 𝑄
MSK
𝐸𝑏
𝑃𝑒 = 𝑒𝑟𝑓𝑐( )
𝑁0
GMSK
2𝛾𝐸𝑏
𝑃𝑒 = 𝑒𝑟𝑓𝑐( )
𝑁0
QAM
1 3𝐸𝑎𝑣
𝑃𝑒 = 2 1 − 𝑒𝑟𝑓𝑐
𝑀 2(𝑀 − 1)𝑁0
The generic nonconstant envelope schemes, such as ASK and QAM, are
generally not suitable for systems with nonlinear power amplifiers. However
QAM, with a large signal constellation, can achieve extremely high bandwidth
efficiency. QAM has been widely used in modems used in telephone
networks, such as computer modems. QAM can even be considered for
satellite systems. In this case, however, back-off in TWWs input and output
power must be provided to ensure the linearity of the power amplifier.
High level M-ary schemes (such as 64-QAM) are very bandwidth efficient,
but more susceptible to noise and require linear amplification.
By simulating PSK modulation schemes from BPSK to 64 PSK in the signal to noise
ratio range of 0-20 dB(for 32PSK and 64PSK we extend the range to 30 dB) we will
find that:
BPSK and QPSK have the same probability of error but QPSK has higher
spectral efficiency.
As M increases the probability of error increases which represents a power
/bandwidth efficiency trade off.
From the figure we deduct that the QPSK is robust modulation scheme that
we can employ in noisy channels in WiMAX
From the figure we conclude the power efficiency and spectral efficiency
BPSK QPSK 8PSK 16PSK 64PSK
Spectral efficiency (log2 M/2) 0.5 1 1.5 2 3
-6
Power efficiency (for BER=10 ) 10.5dB 10.5dB 18.5dB 23.2dB 28.5dB
Figure (1.79) shows a simulation for QPSK,OQPSK and DQPSK simulation from
0:20 dB
We found that
OQPSK and QPSK has the same BER but with less phase abrupt changes
DQPSK is inferior to both by 3dB.
Figure (1.80) shows a simulation for BPSK versus DPSK simulation in the range of 0-
15 dB
We found that DPSK is slightly inferior to BPSK but in the expense on increasing the
complexity of the coherent demodulator employed to demodulate PSK signal
Figure (1.80) BPSK and DPSK simulation
Figure (1.82) shows a simulation of BFSK and MSK and we can here assess that the
MSK has a better BER performance than BFSK and hence better more power
efficient.
Figure (1.83) coherent and noncoherent FSK
16 FSK is the best modulation scheme which is pointed out before (since it
trades the better performance by the excessive transmission bandwidth).
16 QAM is better than 16PSK (since the symbols in 16QAM cover all the
spaces in the constellation diagram and not confined to a densely packed
circle).
Hence when it is required to achieve same spectral efficiency square QAM is
used instead PSK. However PSK is used when the linear amplification is
considered.
Figure (1.87) shows a comparative simulation between all introduced modulation schemes
Figure (1.87) Comparative simulation between all modulation schemes
As we found from figure we can arrange the modulation schemes descendingly from
the most power efficient scheme to the least as following:
32FSK16FSK8FSKBPSK/QPSK4FSKBFSK8PSK16QAM
32 QAM16PSK64QAM256QAM.
1.10.2 SIMULINK simulation & constellation diagram
The simulink library has several of uesful blocks that can be in the
performance analysis of modulation schemes such that:
Binary generators for creating a random sequence of bits.
Channels (AWGN-Rayleigh fading).
Scatter plot scope and eye diagram scope.
Dynamic error rate calculation.
Various modulation schemes.
_____________________________________________________________________
Figure (1.90) shows a simulation results when the signal to noise ratio is very low (5
dB) we can see that:
The constellation points moves away from its designated points due to large
noise power.
The receiver cannot differentiate between symbols correctly and hence that
will lead to 0.004 bit error rate.
_____________________________________________________________________
In figure (1.92) we can see that when no noise is added (approximately) the
constellation points will lay in its correct places.
The program asks the user for the message bits and the frequency of the carrier and
the user can choose the appropriate modulation scheme from the set
{ASK,BFSK,BPSK,QPSK} and the program will draw tha modulated signal in time
and frequency domain.
Sample Run:
QPSK of {1 0 0 1 1 1 0 1 1 0 1 0 0 0 0 1 1 0 1 1 1 0 1 0 1 0}
And in the frequency domain: