SlideShare a Scribd company logo
1 of 13
Download to read offline
MODULATION
FORMATS
- BPSK, QPSK,
OQPSK,Pi/4 QPSK
Lecture Videos are available for this slides
at
www.youtube.com/gurukula
Support by Subscribing to my
Channel
Modulation:
Modulation is the process of encoding information from a message source in a manner suitable for transmission.
Qualities of Modulation Formats:
 Spectral Efficiency:
 This must be as HIGH as possible
 This is achieved by using Higher order modulation formats.
 This allows higher data bits to be transmitted with each symbol.
 Adjacent Channel Interference:
 This must be as LOW as possible.
 This entails that the power spectrum of the signal should not roll outside the desired band.
 This is achieved by proper filtering mechanisms.
 Sensitivity with respect to noise:
 This must be as LOW as Possible.
 This is achieved by using lower order Modulation formats.
 Robustness with respect to delay and Doppler dispersion:
 This must be as LARGE as Possible.
 To achieve this Filtering must be as minimum as possible.
 Waveform must be easy to generate
 To use class C Amplifiers , then modulation formats with constant envelop must be used
 To use class A or B amplifiers, then modulation formats with envelop distortions can be used.
Choice of Digital Modulation
• Several factors that influence the choice of a digital modulation scheme. A desired
modulation scheme provides,
 Low bit error rates at low received signal to noise ratios
 Performs well in multipath and fading conditions
 Occupies a minimum of bandwidth
 Easy and cost effective to implement
• Existing modulation formats do not simultaneously satisfy all of these requirements.
Hence trade-offs were made when selecting a digital modulation schemes.
• The performance of the modulation formats are decided by
 Power efficiency:
This parameter describes the ability of modulation format to preserve the
fidelity of digital messages at low power levels.
 Bandwidth efficiency:
This parameter describes the ability of modulation format to accommodate
data within a limited bandwidth.
Binary Phase Shift Keying (BPSK)
In Binary Phase Shift Keying (BPSK), the phase of the carrier signal is varied between two possible states m1 and m2
corresponding to binary 1 and binary 0. These two waveforms will have 180o phase shift.
Considering the Energy per bit Eb,
𝐸 𝑏 =
1
2
𝐴 𝑐
2
𝑇𝑏
The Most Generalised Eqn. is Given by:
Then, Amplitude Ac is given by
𝐴 𝑐 =
2 𝐸 𝑏
𝑇𝑏
Power Spectral Density of BPSK
Power Spectral Density of BPSK:
PSD of any band pass signal is given by,
g(t) for BPSK is given by
The power spectral density of BPSK is given by
The PSD frp the BPSK signal at RF can be evaluated by translating the
baseband spectrum to the carrier frequency using the relation shown
above, Hence the PSD of a BPSK signal at RF is given by
Null to Null Bandwidth:
The simpler and most widely accepted measure
of bandwidth is equal to the width of the main
spectral lobe.
BW = (f+Rb) – (f-Rb) = 2Rb
Where Rb = Bit Rate
Quadrature Phase Shift Keying (QPSK)
 There are certain drawbacks with BPSK, it can carry only 1 bit in a symbol.
 This makes the BPSK not suitable for High data rates. Also BPSK is not spectrum Efficient.
 Quadrature Phase Shift Keying has twice the bandwidth efficiency of BPSK, since 2 bits are transmitted in a single
modulation symbol.
 The phase of the carrier takes 1 of 4 equally spaced values, such as 0,Pi/2, pi, and 3Pi/2 where each value carries
unique message bits.
 The equations for QPSK is given by
PSD of QPSK
Bandwidth:
BW = (fc + Rb /2) - (fc - Rb /2)
= Rb
Comparison of BPSK and QPSK
Constellation Diagram:
 No. of Points in constellation diagram is inversely proportional to the spectrum occupancy. i.e., More
the number of points lesser the bandwidth occupancy (Spectrum Efficient)
 Distance between the points on constellation diagram directly replicates the Error Probability of the
modulation format.
BW = (f+Rb) – (f-Rb) = 2Rb
BW = (fc + Rb /2) - (fc - Rb /2)
= Rb
OQPSK – Offset QPSK or Staggered QPSK
Drawbacks of QPSK are:
Where there is a 2 bit change in the input sequence, the transition in the state crosses
the origin of the constellation diagram for a particular period of time.
 This causes NON LINEARITY effects in the systems.
 Because of this effect the systems attracts the Side Lobes.
 Also the Linear Amplifiers that are used in the system cannot amplify the signals
to optimal levels.
These drawback of QPSK is mainly because of the 180o transition. This can be eliminated by introducing an Offset
between the in phase and quadrature components will eliminate the 180o phase shift. Instead it will be 90o phase
shift.
 Other than the offset all others things are as similar to the
QPSK
 The phase shifts are delayed to half a symbol period that
ensures 180o phase shift never occurs in the input sequence.
 This avoids the problem of zero crossing there by effective
amplification is achieved.
 However, this is not spectrum efficient as compared to the
QPSK.
 But, OQPSK is proved to perform better than QPSK in the
presence of phase jitter due to noisy reference signals at the
receiver.
π/4 QPSK
• π/4 QPSK is a compromise of QPSK and OQPSK.
• This modulation format allows a maximum phase shift to +/- 135o .
Which further improves the performance of the modulation scheme.
• The most important feature of Pi/4 QPSK is that it offers non coherent
method of detection.
• This technique performs better in the presence of Multipath spread and
Fading.
Differential QPSK
• DPSK → Differential Phase Shift Keying
• Non-coherent Rx can be used
• easy & cheap to build
• no need for coherent reference signal from Tx
• Bit information determined by transition between two phase states
• incoming bit = 1 → signal phase stays the same as previous bit
• incoming bit = 0 → phase switches state
Summary
• Binary Phase Shift Keying
Carries only 1 bit at a time
Not bandwidth efficient
• Quadrature Phase Shift Keying
Problem of zero crossing when 2 bit change is detected
Non linearity effects due to 180o phase shift
Offset QPSK
Inserting a offset reduces the phase shift to 90o there by improving the effective amplification
of signals with linear amplifiers
• Pi/4 QPSK
Compromise between the QPSK and OQPSK
More points on Constellation Diagram thereby better spectrum efficient
Since more points on constellation diagram distance between the points is also less there for
performs better in noisy environments also. Better Error probability
• DQPSK
Further improvements in modulation qualities
First Differential encoding is performed and then QPSK is performed.
Minimizes the amount of transition during modulation.
*** --- ***

More Related Content

What's hot

Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift KeyingPhase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift KeyingNaveen Jakhar, I.T.S
 
9. parameters of mobile multipath channels
9. parameters of mobile multipath channels9. parameters of mobile multipath channels
9. parameters of mobile multipath channelsJAIGANESH SEKAR
 
Ec 2401 wireless communication unit 3
Ec 2401 wireless communication   unit 3Ec 2401 wireless communication   unit 3
Ec 2401 wireless communication unit 3JAIGANESH SEKAR
 
Quadrature phase shift keying
Quadrature phase shift keyingQuadrature phase shift keying
Quadrature phase shift keyingSneheshDutta
 
Digital modulation technique
Digital modulation techniqueDigital modulation technique
Digital modulation techniqueNidhi Baranwal
 
NYQUIST CRITERION FOR ZERO ISI
NYQUIST CRITERION FOR ZERO ISINYQUIST CRITERION FOR ZERO ISI
NYQUIST CRITERION FOR ZERO ISIFAIZAN SHAFI
 
3.3 modulation formats msk and gmsk
3.3 modulation formats   msk and gmsk3.3 modulation formats   msk and gmsk
3.3 modulation formats msk and gmskJAIGANESH SEKAR
 
Frequency-Shift Keying
Frequency-Shift KeyingFrequency-Shift Keying
Frequency-Shift KeyingJessie Rama
 
Qudrature Amplitude Modulation by Krishna Teja & Sunil
Qudrature Amplitude Modulation by Krishna Teja & SunilQudrature Amplitude Modulation by Krishna Teja & Sunil
Qudrature Amplitude Modulation by Krishna Teja & Sunilkrishnateja407
 
Pulse modulation
Pulse modulationPulse modulation
Pulse modulationstk_gpg
 

What's hot (20)

Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift KeyingPhase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
 
9. parameters of mobile multipath channels
9. parameters of mobile multipath channels9. parameters of mobile multipath channels
9. parameters of mobile multipath channels
 
microwave-tubes
 microwave-tubes microwave-tubes
microwave-tubes
 
Ec 2401 wireless communication unit 3
Ec 2401 wireless communication   unit 3Ec 2401 wireless communication   unit 3
Ec 2401 wireless communication unit 3
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Multiple Access Techniques
 
Quadrature phase shift keying
Quadrature phase shift keyingQuadrature phase shift keying
Quadrature phase shift keying
 
VSB and Hilbert Transform
VSB and Hilbert TransformVSB and Hilbert Transform
VSB and Hilbert Transform
 
Digital modulation technique
Digital modulation techniqueDigital modulation technique
Digital modulation technique
 
NYQUIST CRITERION FOR ZERO ISI
NYQUIST CRITERION FOR ZERO ISINYQUIST CRITERION FOR ZERO ISI
NYQUIST CRITERION FOR ZERO ISI
 
3.3 modulation formats msk and gmsk
3.3 modulation formats   msk and gmsk3.3 modulation formats   msk and gmsk
3.3 modulation formats msk and gmsk
 
Frequency-Shift Keying
Frequency-Shift KeyingFrequency-Shift Keying
Frequency-Shift Keying
 
Synchronization
SynchronizationSynchronization
Synchronization
 
What is 16 qam modulation
What is 16 qam modulationWhat is 16 qam modulation
What is 16 qam modulation
 
Microwave linear beam 31
Microwave linear beam 31Microwave linear beam 31
Microwave linear beam 31
 
Microwave Attenuator
Microwave AttenuatorMicrowave Attenuator
Microwave Attenuator
 
Qudrature Amplitude Modulation by Krishna Teja & Sunil
Qudrature Amplitude Modulation by Krishna Teja & SunilQudrature Amplitude Modulation by Krishna Teja & Sunil
Qudrature Amplitude Modulation by Krishna Teja & Sunil
 
Equalization
EqualizationEqualization
Equalization
 
ASk,FSK,PSK
ASk,FSK,PSKASk,FSK,PSK
ASk,FSK,PSK
 
Pulse modulation
Pulse modulationPulse modulation
Pulse modulation
 
Pulse modulation
Pulse modulationPulse modulation
Pulse modulation
 

Similar to 3.2 modulation formats bpsk, qpsk, oqpsk,

PSK (PHASE SHIFT KEYING )
PSK (PHASE SHIFT KEYING )PSK (PHASE SHIFT KEYING )
PSK (PHASE SHIFT KEYING )vijidhivi
 
Digital modulation
Digital modulationDigital modulation
Digital modulationAnkur Kumar
 
Modulation
ModulationModulation
Modulationsristykp
 
Digital Communications 3rd Quarter
Digital Communications 3rd QuarterDigital Communications 3rd Quarter
Digital Communications 3rd QuarterChoi Kyung Hyo
 
Digital modulation basics(nnm)
Digital modulation basics(nnm)Digital modulation basics(nnm)
Digital modulation basics(nnm)nnmaurya
 
Communication system lec 8
Communication system lec 8Communication system lec 8
Communication system lec 8ZareenRauf1
 
Digital Communication 2
Digital Communication 2Digital Communication 2
Digital Communication 2admercano101
 
Digital modulation techniques
Digital modulation techniquesDigital modulation techniques
Digital modulation techniquesShriyaGautam3
 
Chapter7_Lathi_4thed_JAN_2021.pptx
Chapter7_Lathi_4thed_JAN_2021.pptxChapter7_Lathi_4thed_JAN_2021.pptx
Chapter7_Lathi_4thed_JAN_2021.pptxSubhanBihan1
 
561 experiment 9 ertertetert te
561 experiment 9 ertertetert te 561 experiment 9 ertertetert te
561 experiment 9 ertertetert te Ahmed Ashoor
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfabdnazar2003
 
Comparative Study and Performance Analysis of different Modulation Techniques...
Comparative Study and Performance Analysis of different Modulation Techniques...Comparative Study and Performance Analysis of different Modulation Techniques...
Comparative Study and Performance Analysis of different Modulation Techniques...Souvik Das
 

Similar to 3.2 modulation formats bpsk, qpsk, oqpsk, (20)

PSK (PHASE SHIFT KEYING )
PSK (PHASE SHIFT KEYING )PSK (PHASE SHIFT KEYING )
PSK (PHASE SHIFT KEYING )
 
Advantages of qpsk
Advantages of qpskAdvantages of qpsk
Advantages of qpsk
 
Digital modulation
Digital modulationDigital modulation
Digital modulation
 
Modulation
ModulationModulation
Modulation
 
UNIT-4 Baseband Digital Modulation.pdf
UNIT-4 Baseband Digital Modulation.pdfUNIT-4 Baseband Digital Modulation.pdf
UNIT-4 Baseband Digital Modulation.pdf
 
Digital Communications 3rd Quarter
Digital Communications 3rd QuarterDigital Communications 3rd Quarter
Digital Communications 3rd Quarter
 
Digital modulation basics(nnm)
Digital modulation basics(nnm)Digital modulation basics(nnm)
Digital modulation basics(nnm)
 
IJET-V3I2P12
IJET-V3I2P12IJET-V3I2P12
IJET-V3I2P12
 
Group no 11
Group no 11Group no 11
Group no 11
 
Project report
Project reportProject report
Project report
 
Communication system lec 8
Communication system lec 8Communication system lec 8
Communication system lec 8
 
Digital Communication 2
Digital Communication 2Digital Communication 2
Digital Communication 2
 
Digital modulation techniques
Digital modulation techniquesDigital modulation techniques
Digital modulation techniques
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Chapter7_Lathi_4thed_JAN_2021.pptx
Chapter7_Lathi_4thed_JAN_2021.pptxChapter7_Lathi_4thed_JAN_2021.pptx
Chapter7_Lathi_4thed_JAN_2021.pptx
 
PSK and It's Schemes (using MATLAB)
PSK and It's Schemes (using MATLAB)PSK and It's Schemes (using MATLAB)
PSK and It's Schemes (using MATLAB)
 
[IJET V2I5P23] Authors:Pramod Kumar
[IJET V2I5P23] Authors:Pramod Kumar[IJET V2I5P23] Authors:Pramod Kumar
[IJET V2I5P23] Authors:Pramod Kumar
 
561 experiment 9 ertertetert te
561 experiment 9 ertertetert te 561 experiment 9 ertertetert te
561 experiment 9 ertertetert te
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 
Comparative Study and Performance Analysis of different Modulation Techniques...
Comparative Study and Performance Analysis of different Modulation Techniques...Comparative Study and Performance Analysis of different Modulation Techniques...
Comparative Study and Performance Analysis of different Modulation Techniques...
 

More from JAIGANESH SEKAR

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma caJAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnettingJAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnettingJAIGANESH SEKAR
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4JAIGANESH SEKAR
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switchingJAIGANESH SEKAR
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15JAIGANESH SEKAR
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methodsJAIGANESH SEKAR
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methodsJAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cdJAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1JAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming codeJAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crcJAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksumJAIGANESH SEKAR
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressingJAIGANESH SEKAR
 

More from JAIGANESH SEKAR (20)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Recently uploaded (20)

Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 

3.2 modulation formats bpsk, qpsk, oqpsk,

  • 2. Lecture Videos are available for this slides at www.youtube.com/gurukula Support by Subscribing to my Channel
  • 3. Modulation: Modulation is the process of encoding information from a message source in a manner suitable for transmission. Qualities of Modulation Formats:  Spectral Efficiency:  This must be as HIGH as possible  This is achieved by using Higher order modulation formats.  This allows higher data bits to be transmitted with each symbol.  Adjacent Channel Interference:  This must be as LOW as possible.  This entails that the power spectrum of the signal should not roll outside the desired band.  This is achieved by proper filtering mechanisms.  Sensitivity with respect to noise:  This must be as LOW as Possible.  This is achieved by using lower order Modulation formats.  Robustness with respect to delay and Doppler dispersion:  This must be as LARGE as Possible.  To achieve this Filtering must be as minimum as possible.  Waveform must be easy to generate  To use class C Amplifiers , then modulation formats with constant envelop must be used  To use class A or B amplifiers, then modulation formats with envelop distortions can be used.
  • 4. Choice of Digital Modulation • Several factors that influence the choice of a digital modulation scheme. A desired modulation scheme provides,  Low bit error rates at low received signal to noise ratios  Performs well in multipath and fading conditions  Occupies a minimum of bandwidth  Easy and cost effective to implement • Existing modulation formats do not simultaneously satisfy all of these requirements. Hence trade-offs were made when selecting a digital modulation schemes. • The performance of the modulation formats are decided by  Power efficiency: This parameter describes the ability of modulation format to preserve the fidelity of digital messages at low power levels.  Bandwidth efficiency: This parameter describes the ability of modulation format to accommodate data within a limited bandwidth.
  • 5. Binary Phase Shift Keying (BPSK) In Binary Phase Shift Keying (BPSK), the phase of the carrier signal is varied between two possible states m1 and m2 corresponding to binary 1 and binary 0. These two waveforms will have 180o phase shift. Considering the Energy per bit Eb, 𝐸 𝑏 = 1 2 𝐴 𝑐 2 𝑇𝑏 The Most Generalised Eqn. is Given by: Then, Amplitude Ac is given by 𝐴 𝑐 = 2 𝐸 𝑏 𝑇𝑏
  • 6. Power Spectral Density of BPSK Power Spectral Density of BPSK: PSD of any band pass signal is given by, g(t) for BPSK is given by The power spectral density of BPSK is given by The PSD frp the BPSK signal at RF can be evaluated by translating the baseband spectrum to the carrier frequency using the relation shown above, Hence the PSD of a BPSK signal at RF is given by Null to Null Bandwidth: The simpler and most widely accepted measure of bandwidth is equal to the width of the main spectral lobe. BW = (f+Rb) – (f-Rb) = 2Rb Where Rb = Bit Rate
  • 7. Quadrature Phase Shift Keying (QPSK)  There are certain drawbacks with BPSK, it can carry only 1 bit in a symbol.  This makes the BPSK not suitable for High data rates. Also BPSK is not spectrum Efficient.  Quadrature Phase Shift Keying has twice the bandwidth efficiency of BPSK, since 2 bits are transmitted in a single modulation symbol.  The phase of the carrier takes 1 of 4 equally spaced values, such as 0,Pi/2, pi, and 3Pi/2 where each value carries unique message bits.  The equations for QPSK is given by
  • 8. PSD of QPSK Bandwidth: BW = (fc + Rb /2) - (fc - Rb /2) = Rb
  • 9. Comparison of BPSK and QPSK Constellation Diagram:  No. of Points in constellation diagram is inversely proportional to the spectrum occupancy. i.e., More the number of points lesser the bandwidth occupancy (Spectrum Efficient)  Distance between the points on constellation diagram directly replicates the Error Probability of the modulation format. BW = (f+Rb) – (f-Rb) = 2Rb BW = (fc + Rb /2) - (fc - Rb /2) = Rb
  • 10. OQPSK – Offset QPSK or Staggered QPSK Drawbacks of QPSK are: Where there is a 2 bit change in the input sequence, the transition in the state crosses the origin of the constellation diagram for a particular period of time.  This causes NON LINEARITY effects in the systems.  Because of this effect the systems attracts the Side Lobes.  Also the Linear Amplifiers that are used in the system cannot amplify the signals to optimal levels. These drawback of QPSK is mainly because of the 180o transition. This can be eliminated by introducing an Offset between the in phase and quadrature components will eliminate the 180o phase shift. Instead it will be 90o phase shift.  Other than the offset all others things are as similar to the QPSK  The phase shifts are delayed to half a symbol period that ensures 180o phase shift never occurs in the input sequence.  This avoids the problem of zero crossing there by effective amplification is achieved.  However, this is not spectrum efficient as compared to the QPSK.  But, OQPSK is proved to perform better than QPSK in the presence of phase jitter due to noisy reference signals at the receiver.
  • 11. π/4 QPSK • π/4 QPSK is a compromise of QPSK and OQPSK. • This modulation format allows a maximum phase shift to +/- 135o . Which further improves the performance of the modulation scheme. • The most important feature of Pi/4 QPSK is that it offers non coherent method of detection. • This technique performs better in the presence of Multipath spread and Fading.
  • 12. Differential QPSK • DPSK → Differential Phase Shift Keying • Non-coherent Rx can be used • easy & cheap to build • no need for coherent reference signal from Tx • Bit information determined by transition between two phase states • incoming bit = 1 → signal phase stays the same as previous bit • incoming bit = 0 → phase switches state
  • 13. Summary • Binary Phase Shift Keying Carries only 1 bit at a time Not bandwidth efficient • Quadrature Phase Shift Keying Problem of zero crossing when 2 bit change is detected Non linearity effects due to 180o phase shift Offset QPSK Inserting a offset reduces the phase shift to 90o there by improving the effective amplification of signals with linear amplifiers • Pi/4 QPSK Compromise between the QPSK and OQPSK More points on Constellation Diagram thereby better spectrum efficient Since more points on constellation diagram distance between the points is also less there for performs better in noisy environments also. Better Error probability • DQPSK Further improvements in modulation qualities First Differential encoding is performed and then QPSK is performed. Minimizes the amount of transition during modulation. *** --- ***