Page 1
2/22/2016
Where
t : time in seconds.
Q:
phase in radians.
Equation one suggests that there are only 3 ways, the sine wave can be changed:
a. The amplitude E C .
b. The frequency f C .
c. The phase Q .
This gives use to the concept of bandwidth. The signal now occupies a BW and the
channel must have sufficient BW.
2. INFORMATION CAPACITY
I k BW
Note that Hartleys law is an extremely important law and applies to the operation of
all communication systems.
Hyder Khoja
Page 2
2/22/2016
3. ANALOG MODULATION
-
Modulating
signal
Carrier
Modulated
signal
time
Hyder Khoja
Page 3
2/22/2016
is possible to carry several bits per signal change, giving a higher data rate than the
baud rate.
There is a theoretical limit to the maximum data rate that can be transmitted with a
given BW.
Shannon-Hartleys Law states that:
C 2 B log 2 ( m)
Equation 2.
C
Where
is the information capacity of the channel in bits/sec
B : Bandwidth.
m : number of possible states per symbol.
Noise also puts limits to the information capacity.
Shannons Law states that:
S
C B log 2 1
N
Equation 3.
C S log 2 ( m)
m : number of symbols.
Figure page 324 H shows various digital modulation schemes used in various
communication systems.
Amplitude Shift Keying (ASK): As seen in the figure, in ASK the f C is turned on
and off in response to the digital data. A binary 1 is represented by the presence of
the carrier and a 0 by the absence. Bell 202 modem uses ASK for error control.
Frequency Shift Keying (FSK): In this case the frequency of the carrier is shifted in
response to a binary 1 or 0. For example Bell 103/113 modems use FSK to transmit
digital data.
Originate Mode: f C = 1170 Hz, 1 = 1270 Hz, 0 = 1070 Hz.
Answer Mode: f C = 2125 Hz, 1 = 2225, 0 = 2025 Hz.
One method to generate FSK is to frequency modulate a single carrier oscillator using
the message signal.
Gaussian Minimum Shift Keying (GMSK): In GMSK, the 1 and 0 frequencies
are separated by half the bit rate.
f M f S 0.5 bit rate, where f M is the mask frequency and f S is the space
frequency. Thus, the deviation from the center frequency of the carrier will be
0.25 bitrate .
0.25 bitrate
0.25 .
Thus the modulate index will be: mf
fM
bitrate
Hyder Khoja
Page 4
2/22/2016
Phase Shift Keying (PSK): In this case the phase of the carrier is charged in
accordance with the data while keeping the frequency constant and when only two
phases are used, it is called BPSK.
PSK requires changing the phase of the carrier with respect to a reference phase.
A 0 represent a 0 degree reference phase and 1 represents a carrier shift of 180
as shown below on the constellation diagram.
Data Bit
0
1
0
180
or
00 = 45
01 = 135
10 = -45
11 = -135
010
01
10
01
00
00
11
011
001
100
10
11
000
101
111
110
Hyder Khoja
Page 5
2/22/2016
GPRS uses 8-PSK as shown above, effectively tripling the data rate as we are now
transmitting 3 bits per signal change. Since it is difficult to maintain a zero degree
reference, phase changes are measured with respect to previous phase.
The figure below shows how way to generate a di-bit PSK output.
Function
Generator
Oscilloscope
I = 0
I+Q=
45
Quadrature Amplitude Modulation (QAM): The only way to obtain higher data
rates with a narrow band channel is to increase the number of bits per signal change.
QAM uses a combination of amplitude and phase modulation, for example, the table
below shows two messages of amplitude and 4 possible phase shifts to transmit 3 bits
per signal change.
000
001
010
011
100
101
110
111
Amp
Phase
1V
2V
1V
2V
1V
2V
1V
2V
0
0
90
90
180
180
270
270
2V, 90
011
1V, 90
010
101
000
000
001
2V
180
1V
180
1V
0
2V
0
110
111
Mathematically there is no limit to the data rate that may be supported by a given
baud rate, however, practically it is limited by the presence of noise, when the
adjacent states become too small to be detected reliably.
Hyder Khoja
Page 6
2/22/2016
On the scope, QAM signal has noise appearance as blurred data Page 124 B, Page
332, 333, 335, 337 H, Page 164, 165 Agenxx.
16 QAM involves applying the signal with 12 different pahses and 3 different
amplitudes for a total of 16 different possible values each encoding 4 bits.
16 QAM is used in microwave digital radio, digital video broadcasting - cable, and
high speed modes.
TYPICAL QPSK TRANSMITTER
Binary
bits
Sin(wct)
~
- 90 phase Shift
BPF
QPSK
output
Hyder Khoja
-
Page 7
2/22/2016
This is very similar to having a 12-lane highway. If an accident occurs in one lane, the
traffic can still move along the other 11 lanes.
BW spreading is accomplished before the transmission through the use of a code that
is independent of the transmitted data.
The same code is used to demodulate the data at the receiving end.
The figure below shows spreading of the data signal s (t ) by the code signal c (t ) ,
creating a modulated message m(t ) :
m(t ) s (t ) c(t )
Power
Transmitter
Digital
signal
s(t)
Power
Spread
signal
m(t)
c(t)
f
FHSS uses a range of frequencies to send a signal rather than just one frequency.
A pseudorandom sequence is used to change the radio signal frequency across a
broad frequency band in a fashion that appears to be random to an unintended
receiver.
However, the intended receiver is preprogrammed to de-hop the received band of
frequencies to recover the original signal.
The technique consists of transmitting a short burst of the signal at one frequency,
then another short burst at another frequency and so on, until the entire signal has
been sent, as shown in the figure below:
Transmitter
Digital
signal
Receiver
Spread
signal
Digital
signal
Hopping
Paddles
De-Hopping
Power
Power
Hyder Khoja
-
Page 8
2/22/2016
Digital
signal
Transmitter
Receiver
Spreading
Dispreading
Spread signal
Hopping
Paddles
De-Hopping
Power
Power
Digital
signal
Hyder Khoja
Page 9
2/22/2016
b. For a data bit of 0, it adds 0 to each bit of the chipping code, as shown
below:
1
1
0
1
0
1
1
1
0
0
1
0
1
0
0
0
For DSSS, each bit in the original signal is represented by multiple bits in the
transitted signal, using a spreading code called pseudorandom sequence code
(PNC) or orthogonal code such as Walsh code.
A 10 bit spreading code spreads the signal across a frequency band that is 10
times greater than a 1 bit spreading code.
The technique used is to combine the digital data stream with the PNC using an
X-OR function as shown in the figure (figure 76 page 167 W.S.). Notice that in
this figure, the spreading code bit is clocked at 4 times the data bit rate.
A
0
0
1
1
A B
0
1
1
0
At the receiver, the same PNC is used with a X-OR function to recover the
original data bits.
6.3.
B
0
1
0
1
Recall that in BPSK data bits are represented by a +1 and -1 instead of binary
1 or 0.
These data bits produce a phase shift in the carrier frequency.
Hyder Khoja
-
Page 10
2/22/2016
In CDMA all users use the same carrier frequency but each user is assigned a separate
code.
Thus there is no limit to the number of users as long as they use different noninterfering codes to transmit and receive.
(3 dimensional picture illustrating CDMA)
B 1,1,1,1,1,1
C 1,1,1,1,1,1
7.1.
-
Hyder Khoja
Page 11
2/22/2016
d1 c1 d 2 c 2 d 3 c3 d 4 c 4 d 5 c5 d 6 c 6
Where d represents the received data bits and c represents the chipping code for
the user. The receiver is trying to decode as shown.
For user A:
For data bits 1:
(1) (1) ( 1) ( 1) (1) (1) (1) (1) ( 1) (1) (1) (1) 6 6 "1" data bit
( 1) (1) (1) ( 1) (1) (1) (1) (1) (1) ( 1) ( 1) (1) 6 6 "0" data bit
It is instructive to note that if the chipping code is selected properly, the receiver
will always decode +6 for 1 and 6 for 0 regardless of the actual sequence of
data bits. Any other value represents error or noise or someone elses information.
You can verify, that for B and C data bits , if we try to decode with As code, the
result will be 0.
Table 7.1 (W.S.) shows the result of the calculation.
It is interesting to observe the results of case (d) and (e).
Note that in case (d) B and C are transmitting simultaneously and the receiver is
attempting to decode Bs transmission. The result of multiplication and addition is
not zero. What does it mean? It means that there is a small contribution from C to
Bs transmission.
In practice, CDMA receiver can filter out the contributions from unwanted users
as they appear as low-level noise.
Two codes that produce 0 after multiplication and addition are called
orthogonal codes or non-overlapping codes.
WALSH codes are the most common orthogonal codes used in CDMA
applications.
7.2. Generation of Orthogonal WALSH Code.
0
0
0
0
0
1
0
0
0
1
0
1
0
0
1
1
0
0
0
0
1
0
1
0
0
0
0
0
0
1
0
1
0
1
0
1
0
0
1
1
0
0
1
1
0
1
1
0
0
1
1
0
0
0
0
0
1
1
1
1
0
1
0
1
1
0
1
0
0
0
1
1
1
1
1
1
0
1
1
0
1
0
1
0
Hyder Khoja
-
Page 12
2/22/2016
EX-OR
TX
c(t)
EX-OR
d1(t)
RX
c(t)
Cos(2fct)
Demodulated with fc
Hyder Khoja
Page 13
2/22/2016
For simplicity, this circuit is drawn as shown below in many technical literatures.
A
0
0
1
1
B
0
1
0
1
A B
0
1
1
0
Hyder Khoja
Page 14
Clock Pulse
2/22/2016
D1
D2
D3
output