Chapter 5
Chapter 5
Chapter 5
The modulation index k of an AM signal is defined as the ratio of the peak message signal
amplitude to the peak carrier amplitude. For a sinusoidal modulating signal m (t) = (Am/Ac) cos
(2πfmt) , the modulation index is given by
The modulation index is often expressed as a percentage, and is called percentage modulation.
Figure 6.1 shows a sinusoidal modulating signal and the corresponding AM signal. For the case
shown in Figure 6.1, Am = 0.5 Ac and the signal is said to be 50% modulated. A percentage of
modulation greater than 100% will distort the message signal if detected by an envelope
detector.
where δ(•) is the unit impulse function, and M(f) is the message signal
spectrum. Figure 6.2 shows an AM spectrum for a message signal whose
magnitude spectrum is a triangular function. The AM spectrum consists of an
impulse at the carrier frequency, and two sidebands which replicate the
message spectrum. The sidebands above and below the carrier frequency are
called the upper and lower sidebands, respectively. The bandwidth of an AM
signal is equal to
Since the low pass filter following the product detector removes the double carrier frequency
term, the output is
where the first term represents the carrier and the second term represents the
sideband.
A simple block diagram of the indirect FM transmitter is shown in Figure 6.7
A narrow band FM signal is generated using a balanced modulator which modulates
a crystal controlled oscillator.
where p(t) is the pulse shape of a symbol, hc(t) is the channel impulse response, and hr(t) is the receiver
impulse response. Nyquist derived transfer functions Heff(f) which satisfy the conditions of (5.42)
As α increases, the spectral occupancy of the Gaussian filter decreases and time
dispersion of the applied signal increases. The impulse response of the Gaussian filter
is given by
The basis signals can be thought of as forming a coordinate system for the vector
space. The Gram-Schmidt procedure provides a systematic way of obtaining the
basis signals for a given set of signals.
11-11-2022 Poonam Singh EC Dept, NIT Rourkela 40
consider the set of BPSK signals s1(t) and s2(t) given by
where dij is the Euclidean distance between the i-th and j-th signal point in the
constellation, and Q(x) is the Q-function defined as
If all of the M modulation waveforms are equally likely to be transmitted, then the
average probability of error for a modulation can be estimated by
Hence, equation (5.62) gives the average probability of symbol error for a particular
constellation set.
11-11-2022 Poonam Singh EC Dept, NIT Rourkela 44
Linear Modulation Techniques
• Digital modulation techniques may be broadly classified as linear and nonlinear.
• In linear modulation techniques, the amplitude of the transmitted signal, s(t), varies
linearly with the modulating digital signal, m(t).
• Linear modulation techniques are bandwidth efficient and hence are very attractive
for use in wireless communication systems where there is an increasing demand to
accommodate more and more users within a limited spectrum.
• In a linear modulation scheme, the transmitted signal s(t) can be expressed as
The PSD of the BPSK signal for both rectangular and raised cosine rolloff pulse shapes is
plotted in Figure 6.22. The null-to-null bandwidth is found to be equal to twice the bit
rate (BW =2fb = 2/Tb).
From the plot, it can also be shown that 90% of the BPSK signal energy is contained
within a bandwidth approximately equal to l.6Rb for rectangular pulses, and all of the
energy is within 1.5Rb for pulses with α = 0.5 raised cosine filtering.
where θch is the phase shift corresponding to the time delay in the channel.
BPSK uses coherent or synchronous demodulation, which requires that
information about the phase and frequency of the carrier be available at the
receiver.
If a low level pilot carrier signal is transmitted along with the BPSK signal, then
the carrier phase and frequency may be recovered at the receiver using a phase
locked loop (PLL).
where Ts is the symbol duration and is equal to twice the bit period.
• The bit error probability of QPSK is identical to BPSK, but twice as much data can be
sent in the same bandwidth.
• Thus when compared to BPSK, QPSK provides twice the spectral efficiency with
exactly the same energy efficiency.
• Similar to BPSK, QPSK can also be differentially encoded to allow noncoherent
detection.
• The PSD of a QPSK signal for rectangular and raised cosine filtered pulses is
plotted in Figure 6.27.
• The null-to-null RE' bandwidth is equal to the bit rate Rb, which is half of
that of a BPSK signal.
11-11-2022 Poonam Singh EC Dept, NIT Rourkela 60
Virtues of Pulse Shaping
QPSK modulation
QPSK receiver
Offset QPSK
• The amplitude of a QPSK signal is ideally constant.
• However, when QPSK signals are pulse shaped, they lose the constant envelope
property.
• The occasional phase shift of π radians can cause the signal envelope to pass
through zero for just an instant.
• Any kind of hardlimiting or nonlinear amplification of the zero-crossings brings
back the filtered sidelobes since the fidelity of the signal at small voltage levels is
lost in transmission.
• To prevent the regeneration of sidelobes and spectral widening, it is imperative
that QPSK signals be amplified only using linear amplifiers, which are less
efficient.
• A modified form of QPSK, called offset QPSK (OQPSK) or staggered QPSK is less
susceptible to these deleterious effects and supports more efficient
amplification.
where Emin is the energy of the signal with the lowest amplitude, and ai and bi, are
integers chosen according to the location of the particular signal point.
11-11-2022 Poonam Singh EC Dept, NIT Rourkela 81
16-QAM Signal Constellation
• M-ary QAM does not have constant energy per symbol, nor does it have constant
distance between possible symbol states.
• If rectangular pulse shapes are assumed, the signal Si(t) may be expanded in terms
of a pair of basis functions defined as
• For a 16-QAM with signal constellation as shown in Figure 6.47, the ai and bi values
are
• Using only the leading terms of the binomial expansion, the probability of error can
be bounded as
• where m(t) is the data sequence, p(t) is the PN spreading sequence, fc is the carrier
frequency, and θ is the carrier phase angle at t = 0.
• where pk(t) is the PN code sequence of the k th user, and mk(t) is the data sequence of the
k th user.
• The received signal will consist of the sum of K different transmitted signals (one desired
user and K — 1 undesired users).
• Reception is accomplished by correlating the received signal with the appropriate signature
sequence to produce a decision variable.
• The decision variable for the i th transmitted bit of user 1 is
• However, if two users transmit simultaneously in the same frequency band, a collision, or
"hit", occurs. In this case it is reasonable to assume that the probability of error is 0.5.
• Thus the overall probability of bit error can be modeled as
• Where ph is the probability of a hit, which must be determined. If there are M possible
hopping channels (called slots), there is a 1/M probability that a given interferer will be
present in the desired user's slot.
which illustrates the irreducible error rate due to multiple access interference.
where α(t) is the gain of the channel,θ(t) is the phase shift of the channel. and n(t)
is additive Gaussian noise.
• Depending on whether it is possible to make an accurate estimate of the phase
θ(t) , coherent or noncoherent matched filter detection may be employed at the
receiver.