SlideShare a Scribd company logo
1 of 30
Download to read offline
Analog Modulation
Digital Modulation
Error Probabilities for Binary Modulation
M-ary Digital Modulation
Modulation Techniques
286
Modulation in Communication System
By modulating a higher frequency carrier wave, it is usually much more effective to transmit
data (although conceptually possible to transmit baseband signals directly).
Allows precise control of the radiated frequency spectrum, more efficient use of the allocated
RF bandwidth, and flexibility in accommodating different baseband signal formats.
In older analog modulation carrier, amplitude, frequency, and phase may vary continuously.
In modern digital-modulation wireless systems make more efficient use of the radio spectrum,
and usually requires less prime power.
performs better over a fading communications channel.
more compatible with the use of error-correcting codes.
287
Analog Modulation
Transmitter is to modulate an RF carrier signal with the baseband data.
Receiver is to recover the baseband data from the received modulated carrier wave.
Modulator/demodulator provides the interface between the baseband information and the
IF signals.
IF signal in a receiver contains noise from the antenna and receiver circuitry with the
desired signal.
Demodulator play a critical role in the overall communication performance.
288
SSB modulator and demodulator
SSB (single-side band)
SSB input signal to demodulator: ( )( ) cos ( )i IF mv t A t n tω ω= + +
ωIF - ωm ωIF + ωm ωIF + ωm
m(t): baseband signal, n(t): Gaussian white noise signal
1
( ) cos ( )
2 2
o m
A
v t t x tω= +SSB output signal:
Synchronous (Coherent) demodulator:
Modulator and demodulator LO are identical in freq. and phase.
LO LO
( ) cos mm t tω=
289
DSB-SC modulator and demodulator
DSB-SC (double side-band suppressed carrier)
ωIF - ωm ωIF + ωm
DSB-SC input signal to demodulator:
DSB-SC output signal:
If mixer were ideal, the carrier freq. (fIF) would not be present in the output
so call suppressed carrier.
( ) ( )( ) cos cos ( )
2 2
i IF m IF m
A A
v t t t n tω ω ω ω= − + + +
1
( ) cos ( )
22
o m
A
v t t x tω= +
( ) cos mm t tω=
290
DSB-LC modulator and demodulator
DSB-LC (double side-band large carrier)
ωIF - ωm ωIF + ωm
DSB-LC input signal to demodulator:
DSB-LC output signal:
The carrier freq. (fIF) would be present in the output.
DSB-LC: advantage Even if fIF much lower in amplitude than the sidebands, can
be used as a reference signal to phase-lock the local oscillator to synchronization
with the incoming signal.
( ) ( )( ) [1 ( )]cos ( ) cos cos cos ( )
2
i IF IF IF m IF m
mA
v t A m t t n t A t t t n tω ω ω ω ω ω= + + = + − + + +  
1
( ) cos ( )
2 2
o m
mA
v t t x tω= +
( ) cos mm t m tω=
291
DSB-LC for Envelop Detection
Fig. Envelope detection of an AM signal
An advantage DSB-LC is that detection can be done without a
local oscillator and mixer, by using an envelope detector (non-
coherent demodulator).
The RC time constant should
be large enough so that the
capacitor voltage does not
decay too quickly before the
next carrier peak arrives.
But small enough so the
output can track the envelope
when it is decreasing.
DSB-LC detection can be done by using an envelope detector (without a LO & mixer)
It does not require the phase information of the incoming signal.
Much simpler receiver & inexpensive circuit for broadcast AM radio.
( ) cos mm t m tω=
292
Block Diagram of Digital Modulation
293
Binary Digital Modulation
Digital mod. v.s. Analog mod.
Improved performance in the presence of noise and fading
lower transmit power requirements
better suitability for transmission of digital data with error
correction and encryption.
Amplitude Shift Keying (ASK)
Frequency Shift Keying (FSK)
Phase Shift Keying (PSK)
294
Binary Signals: RZ, NRZ
Binary signaling methods
(a) On-off return-to-zero (RZ) coding.
(b) Non-return-to-zero (NRZ) coding.
(c) Polar NRZ coding.
Binary modulation methods:
a sinusoida1 carrier wave is switched
between the binary symbols "0" and "1."
A carrier A cos(ωt + φ) with three degrees of freedom
corresponds to three fundamental binary modulation methods:
(a)
(b)
(c)
295
ASK
ASK modulator Synchronous demodulation of ASK Envelope detection of ASK
m(t) = 0 or 1 ( )v t
1( )v t
( )ov t
This requires the LO to have precisely the same phase and
frequency as the incoming signal.
ASK can be demodulated coherently using a synchronous LO
and mixer, but it is also possible to demodulate ASK with an
envelope detector.
Although envelope detection cannot be used to demodulate a
DSB-SC signal, it can be used with an ASK DSB-SC waveform
because the modulating signal m(t) is never negative.
Another non-coherent demodulator is the rectifier,
or square-law, detector
296
FSK
FSK modulator Synchronous demodulation of FSK
1
2
for ( ) 1
for ( ) 0
m t
m t
ω
ω
ω
=
= 
=
( ) 0 or 1m t =
After LPF only the DC term remains, resulting in a positive pulse at the output of the summer,
indicating that a "1" has been received.
FSK can also be demodulated using an envelope detector, thereby avoiding the requirement for
two coherent LO.
The outputs of the envelope detectors are combined with a summer to form a polar NRZ output.
LO
LO
1( )v t
2 ( )v t
Mixer
"1"
"0"
FSK
Env. det. FSK polar NRZ
( )v t =
297
PSK
PSK modulator Synchronous demodulation of PSK
( ) 1 or -1m t =
1( )v t 0 ( )v t
( )v t
( )v t =
The spectrum of the PSK waveform is relatively wide in BW due to the sharp
transitions caused by phase reversal.
These are usually smoothed by filtering, but the resulting BW is usually still wide
enough that PSK is impractical for multichannel wireless systems.
Since the PSK waveform has a constant envelope, it cannot be demodulated with
an envelope detector.
298
Carrier Synchronization
Synchronism implies that both frequency and phase are identical difficult to achieve.
A phase error ∆φ causes the output signal reduced in amplitude by cos ∆φ, a frequency error ∆ω
while an error introduces a factor of cos∆ω.
Ex: if set a criteria of requiring less than 45o phase error at a 1 GHz carrier frequency,
synchronization of the LO to the carrier must be better than T/8.
T/8 = f -1/8 = 109 Hz-1/8=1 ns/8 = 0.125 ns.
A free-running local oscillator will virtually never exhibit such synchronism due to frequency drift,
Doppler effects, and the arbitrary distance between Tx and Rx.
ASK and FSK Advantage: Demodulate without a synchronous LO by using envelope detection.
Disadvantage: bit error rates (BER) are bad.
LO be synchronized by two ways with an incoming carrier wave:
(1) transmit a pilot carrier (2) use a carrier-recovery circuit.
Transmitting a low-level carrier is probably the easiest way, as this signal can be used to phase-
lock the LO.
299
Carrier recovery circuits use phase or frequency information from the received signal
to synchronize the local oscillator. (a phase-locked loop).
Carrier Recovery Circuits for Sync. PSK Demodulation
300
Error Probability for Binary Modulation
PCM (pulse code modulation) signals and detections
PCM codes a binary "1" as a signal voltage s1(t), and a binary "0" as a signal voltage s2(t), each of bit duration T.
In Tx, PCM signals are used to modulate a carrier by amplitude, frequency, or phase modulation.
In Rx, synchronous demodulation or envelope detection (for ASK or FSK) can be used to recover s(t) = s1(t) or
s2(t).
The demodulated signal is then used to make the decision as to whether a binary "1" or "0" has been received. In
the absence of noise this can simply be done by setting a detection threshold, where "1" or "0" is decided using a
comparator circuit.
optimum correlation receiver for PCM detection
a single bit is received incorrectly is called the
probability of error, or the bit error rate (BER).
301
BER (I)
Bit energy as the energy of the (non-zero) signal voltage over one bit period:
The noise power output from an integrator with a bandlimited white noise input:
302
BER (II)
Synchronous ASK
Synchronous PSK
ASK v.s. PSK
Energy-to-noise ratio in PSK case differs by a factor of four (6 dB) compared to ASK.
This implies for the same BER, PSK requires only one-fourth the power of an ASK system.
Since an ASK signal is off half the time, so the average transmit power of an ASK is half that of
a PSK, for the same peak power (same signal voltage, V).
Thus, in terms of average transmit power, the PSK result is better by a factor of two (3 dB),
compared with ASK.
1
2
( ) "1"
( ) "0" 0
s t V
s t
= ⇒

= ⇒
303
BER (III)
Synchronous FSK
In the synchronous FSK demodulator output noise consists of the difference between noise
that has passed through both the ω1, ω2 channels.
The variance of n(t) can be computed as (n1 and n2 are uncorrelated)
Above shows that the total noise power of the FSK demodulator is doubled relative to the
synchronous ASK or PSK demodulator.
Synchronous FSK requires 3 dB more signal power than PSK for the same BER, and 3 dB
less power than ASK on a peak power basis.
FSK and ASK, however, have equal BER when compared in terms of average transmit
power, since an ASK system transmits power only half the time.
304
Bit rate and bandwidth efficiency (I)
305
Bit rate and bandwidth efficiency (II)
spectrum density
306
M-ary Digital Modulation
Binary mod. transmit one bit per signal interval with BW efficiency = 1 bps/Hz.
M-ray mod. more than one bit be transmitted per signaling interval.
Allows greater bit rates for the same bandwidth (but need more complex system).
Transmit M = 2n symbols for each signaling interval BW efficiency = n bps/Hz.
M-ray mod. can be done by using multiple discrete amplitude levels, or multiple phase states,
or with a combination of these.
Ex: Symbol rate: Rs, Effective bit rate: Rb = nRs.
Ex:
M-ary modulation methods
307
QPSK (I)
QPSK
If we use four states, where n = 2 and M = 4, then we can transmit two bits, or four symbols, for
each signaling interval. This is called quadrature phase shift keying (QPSK).
The horizontal axis represents the in-phase (I) component, while the vertical axis represents the
quadrature (Q) component that is shifted 90o in phase.
Constellation diagramPhase representation
308
The In-phase and Quadrature components of the QPSK signal
I and Q components of a QPSK signals
QPSK (II)
309
QPSK Modulator
310
QPSK Demodulator
Demodulation of QPSK requires coherent detection.
The demodulator uses two mixers with quadrature LO components to recover the I and Q signals.
PCM detectors, each consisting of an integrator and a sampler, are used to detect the I and Q NRZ data,
which is then decoded with a parallel-to-serial converter to provide serial binary output.
Since QPSK is a constant envelope modulation, the detectors can use a zero threshold.
Coherent QPSK demodulator
2
The const. C is defined as / 2 2A T
0( ) cos( ),
(2 1)
4
for 0, 1, 2, 3.
i i
i
s t A t
i
i
ω φ
π
φ
= +
= +
=
311
Since the overall probability that a symbol is received
correctly is the product of the probabilities that each
correlator operates correctly, the overall probability of
error for a symbol is:
Twice data rate at same bandwidth and error rate as BPSK.
Probability of error of QPSK
Use QPSK with Gray coding, then we can assume that a symbol error is most likely to cause
only a single bit error. Then since each symbol contains two bits, the bit error rate for QPSK
will be one-half the symbol error rate:
Symbol period T is twice the bit period, Es = 2Eb, where Eb is the bit energy.
2
symbol period , bit period / .
n
b s
M
R nR
T T n
=
⇒ =
⇒ = =
312
M-ary Phase Shift Keying
2
symbol period , bit period / ,
each of M-PSK symbols corresponds to bits of binary data.
efficiency of M-PSK is bps/Hz.
n
b s
M
R nR
T T n
M n
BW n
=
⇒ =
⇒ = =
⇒
⇒
The probability of a symbol error for M-PSK is
approximately given by:
If Gray coding is used:
313
Quadrature Amplitude Modulation (QAM)
We can further generalize M-ary modulation by allowing the amplitudes of the I and Q
components of the carrier to vary arbitrarily.
4-QAM is identical to QPSK, if the signal amplitudes are constant.
An approximate expression for the symbol error rate of 16-QAM is given by
Because of the high BW efficiency that can be obtained with QAM, it is increasingly
being used in modem wireless systems, including point-to-point microwave radios,
LMDS systems, and the DVB-C digital video cable broadcasting system.
P.S.
M = 2n symbols BW efficiency = n bps/Hz.
314
Channel capacity
It is possible to achieve as low error rate as is desired once Eb/no is above a critical value.
Since Eb = S/Rb, this also implies that, for a fixed signal power S, there is a critical value of the data
rate Rb for which the error rate can be made as small as desired.
This particular value is called the channel capacity, and is given by a formula derived by Shannon:
C : maximum data rate in bps
B : bandwidth in Hz
S : signal power in W
n0/2 : two-sided noise power spectral density.
Shannon channel capacity formula gives the upper bound on the maximum data rate that can be
achieved for a given channel in the presence of additive Gaussian noise.
Error correcting codes can provide performance close to the Shannon limit.
315

More Related Content

What's hot

Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift KeyingPhase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift KeyingNaveen Jakhar, I.T.S
 
Wireless Channels Capacity
Wireless Channels CapacityWireless Channels Capacity
Wireless Channels CapacityOka Danil
 
Frequency shift keying report
Frequency shift keying reportFrequency shift keying report
Frequency shift keying reportestherleah21
 
Filtering Requirements for FDD + TDD CA Scenarios
Filtering Requirements for FDD + TDD CA ScenariosFiltering Requirements for FDD + TDD CA Scenarios
Filtering Requirements for FDD + TDD CA ScenariosPei-Che Chang
 
Fundamentals of RF Systems
Fundamentals of RF SystemsFundamentals of RF Systems
Fundamentals of RF SystemsYong Heui Cho
 
Modulation
ModulationModulation
Modulationsristykp
 
Angle modulation
Angle modulationAngle modulation
Angle modulationUmang Gupta
 
Digital modulation techniques
Digital modulation techniquesDigital modulation techniques
Digital modulation techniquessrkrishna341
 
Digital communication
Digital communicationDigital communication
Digital communicationmeashi
 
Chapter 2 amplitude_modulation
Chapter 2 amplitude_modulationChapter 2 amplitude_modulation
Chapter 2 amplitude_modulationHattori Sidek
 
Amplitude modulation sanjay
Amplitude modulation sanjayAmplitude modulation sanjay
Amplitude modulation sanjaySanjay Jangra
 
Coherent systems
Coherent systemsCoherent systems
Coherent systemsCKSunith1
 
Diversity techniques presentation material
Diversity techniques presentation materialDiversity techniques presentation material
Diversity techniques presentation materialNini Lashari
 

What's hot (20)

Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift KeyingPhase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
 
Digital communications
Digital communications  Digital communications
Digital communications
 
Wireless Channels Capacity
Wireless Channels CapacityWireless Channels Capacity
Wireless Channels Capacity
 
Frequency shift keying report
Frequency shift keying reportFrequency shift keying report
Frequency shift keying report
 
Filtering Requirements for FDD + TDD CA Scenarios
Filtering Requirements for FDD + TDD CA ScenariosFiltering Requirements for FDD + TDD CA Scenarios
Filtering Requirements for FDD + TDD CA Scenarios
 
Fundamentals of RF Systems
Fundamentals of RF SystemsFundamentals of RF Systems
Fundamentals of RF Systems
 
Double sideband suppressed carrier (dsb sc) modulation
Double sideband suppressed carrier (dsb sc) modulationDouble sideband suppressed carrier (dsb sc) modulation
Double sideband suppressed carrier (dsb sc) modulation
 
Nonlinearity
NonlinearityNonlinearity
Nonlinearity
 
Modulation
ModulationModulation
Modulation
 
Matched filter
Matched filterMatched filter
Matched filter
 
Angle modulation
Angle modulationAngle modulation
Angle modulation
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Digital modulation techniques
Digital modulation techniquesDigital modulation techniques
Digital modulation techniques
 
Digital communication
Digital communicationDigital communication
Digital communication
 
Chapter 2 amplitude_modulation
Chapter 2 amplitude_modulationChapter 2 amplitude_modulation
Chapter 2 amplitude_modulation
 
Amplitude modulation sanjay
Amplitude modulation sanjayAmplitude modulation sanjay
Amplitude modulation sanjay
 
Basics of RF
Basics of RFBasics of RF
Basics of RF
 
Coherent systems
Coherent systemsCoherent systems
Coherent systems
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Diversity techniques presentation material
Diversity techniques presentation materialDiversity techniques presentation material
Diversity techniques presentation material
 

Similar to Modulation technology

Digital modulation
Digital modulationDigital modulation
Digital modulationAnkur Kumar
 
analog communication and introduction of AM
analog communication and introduction of  AManalog communication and introduction of  AM
analog communication and introduction of AMscholarnawalkishore2
 
_Digital-Modulation.pdf
_Digital-Modulation.pdf_Digital-Modulation.pdf
_Digital-Modulation.pdfSoyallRobi
 
Spread-Spectrum Techniques
Spread-Spectrum TechniquesSpread-Spectrum Techniques
Spread-Spectrum Techniquesmohammedalimahdi
 
Tele3113 wk10tue
Tele3113 wk10tueTele3113 wk10tue
Tele3113 wk10tueVin Voro
 
Chapter7_Lathi_4thed_JAN_2021.pptx
Chapter7_Lathi_4thed_JAN_2021.pptxChapter7_Lathi_4thed_JAN_2021.pptx
Chapter7_Lathi_4thed_JAN_2021.pptxSubhanBihan1
 
射頻期中整理.pptx
射頻期中整理.pptx射頻期中整理.pptx
射頻期中整理.pptxssuserb4d806
 
Comparative Study and Performance Analysis of different Modulation Techniques...
Comparative Study and Performance Analysis of different Modulation Techniques...Comparative Study and Performance Analysis of different Modulation Techniques...
Comparative Study and Performance Analysis of different Modulation Techniques...Souvik Das
 
Digital modulation techniques updated
Digital modulation techniques updatedDigital modulation techniques updated
Digital modulation techniques updatedMuhammad Mohsin Raza
 
Introduction to communication system lecture5
Introduction to communication system lecture5Introduction to communication system lecture5
Introduction to communication system lecture5Jumaan Ally Mohamed
 
Lecture Notes: EEEC6440315 Communication Systems - Digital Modulation
Lecture Notes:  EEEC6440315 Communication Systems - Digital ModulationLecture Notes:  EEEC6440315 Communication Systems - Digital Modulation
Lecture Notes: EEEC6440315 Communication Systems - Digital ModulationAIMST University
 
Amplitude modulation
Amplitude modulationAmplitude modulation
Amplitude modulationavocado1111
 
Communication system lec 8
Communication system lec 8Communication system lec 8
Communication system lec 8ZareenRauf1
 

Similar to Modulation technology (20)

Digital modulation
Digital modulationDigital modulation
Digital modulation
 
analog communication and introduction of AM
analog communication and introduction of  AManalog communication and introduction of  AM
analog communication and introduction of AM
 
_Digital-Modulation.pdf
_Digital-Modulation.pdf_Digital-Modulation.pdf
_Digital-Modulation.pdf
 
ASK,FSK and M-PSK using Matlab
ASK,FSK and M-PSK using MatlabASK,FSK and M-PSK using Matlab
ASK,FSK and M-PSK using Matlab
 
Spread-Spectrum Techniques
Spread-Spectrum TechniquesSpread-Spectrum Techniques
Spread-Spectrum Techniques
 
Tele3113 wk10tue
Tele3113 wk10tueTele3113 wk10tue
Tele3113 wk10tue
 
mod.pptx
mod.pptxmod.pptx
mod.pptx
 
Chapter7_Lathi_4thed_JAN_2021.pptx
Chapter7_Lathi_4thed_JAN_2021.pptxChapter7_Lathi_4thed_JAN_2021.pptx
Chapter7_Lathi_4thed_JAN_2021.pptx
 
EEE323_7.pptx
EEE323_7.pptxEEE323_7.pptx
EEE323_7.pptx
 
射頻期中整理.pptx
射頻期中整理.pptx射頻期中整理.pptx
射頻期中整理.pptx
 
Comparative Study and Performance Analysis of different Modulation Techniques...
Comparative Study and Performance Analysis of different Modulation Techniques...Comparative Study and Performance Analysis of different Modulation Techniques...
Comparative Study and Performance Analysis of different Modulation Techniques...
 
Digital modulation techniques updated
Digital modulation techniques updatedDigital modulation techniques updated
Digital modulation techniques updated
 
UNIT5_1.pdf
UNIT5_1.pdfUNIT5_1.pdf
UNIT5_1.pdf
 
Introduction to communication system lecture5
Introduction to communication system lecture5Introduction to communication system lecture5
Introduction to communication system lecture5
 
Lecture Notes: EEEC6440315 Communication Systems - Digital Modulation
Lecture Notes:  EEEC6440315 Communication Systems - Digital ModulationLecture Notes:  EEEC6440315 Communication Systems - Digital Modulation
Lecture Notes: EEEC6440315 Communication Systems - Digital Modulation
 
Sistec ppt
Sistec pptSistec ppt
Sistec ppt
 
Amplitude modulation
Amplitude modulationAmplitude modulation
Amplitude modulation
 
Digital Modulation.pptx
Digital Modulation.pptxDigital Modulation.pptx
Digital Modulation.pptx
 
Amplitude modulated-systmes
Amplitude modulated-systmesAmplitude modulated-systmes
Amplitude modulated-systmes
 
Communication system lec 8
Communication system lec 8Communication system lec 8
Communication system lec 8
 

More from Pei-Che Chang

Phase Locked Loops (PLL) 1
Phase Locked Loops (PLL) 1Phase Locked Loops (PLL) 1
Phase Locked Loops (PLL) 1Pei-Che Chang
 
NTHU Comm Presentation
NTHU Comm PresentationNTHU Comm Presentation
NTHU Comm PresentationPei-Che Chang
 
Introduction to Compressive Sensing in Wireless Communication
Introduction to Compressive Sensing in Wireless CommunicationIntroduction to Compressive Sensing in Wireless Communication
Introduction to Compressive Sensing in Wireless CommunicationPei-Che Chang
 
Distributed Architecture of Subspace Clustering and Related
Distributed Architecture of Subspace Clustering and RelatedDistributed Architecture of Subspace Clustering and Related
Distributed Architecture of Subspace Clustering and RelatedPei-Che Chang
 
Brief Introduction About Topological Interference Management (TIM)
Brief Introduction About Topological Interference Management (TIM)Brief Introduction About Topological Interference Management (TIM)
Brief Introduction About Topological Interference Management (TIM)Pei-Che Chang
 
The Wireless Channel Propagation
The Wireless Channel PropagationThe Wireless Channel Propagation
The Wireless Channel PropagationPei-Che Chang
 
Digital Passband Communication
Digital Passband CommunicationDigital Passband Communication
Digital Passband CommunicationPei-Che Chang
 
Digital Baseband Communication
Digital Baseband CommunicationDigital Baseband Communication
Digital Baseband CommunicationPei-Che Chang
 
The relationship between bandwidth and rise time
The relationship between bandwidth and rise timeThe relationship between bandwidth and rise time
The relationship between bandwidth and rise timePei-Che Chang
 
Millimeter wave 5G antennas for smartphones
Millimeter wave 5G antennas for smartphonesMillimeter wave 5G antennas for smartphones
Millimeter wave 5G antennas for smartphonesPei-Che Chang
 
Introduction of GPS BPSK-R and BOC
Introduction of GPS BPSK-R and BOCIntroduction of GPS BPSK-R and BOC
Introduction of GPS BPSK-R and BOCPei-Che Chang
 
Intermodulation distortion derivation
Intermodulation distortion derivationIntermodulation distortion derivation
Intermodulation distortion derivationPei-Che Chang
 
Throughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systemsThroughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systemsPei-Che Chang
 

More from Pei-Che Chang (20)

PLL Note
PLL NotePLL Note
PLL Note
 
Phase Locked Loops (PLL) 1
Phase Locked Loops (PLL) 1Phase Locked Loops (PLL) 1
Phase Locked Loops (PLL) 1
 
NTHU Comm Presentation
NTHU Comm PresentationNTHU Comm Presentation
NTHU Comm Presentation
 
Introduction to Compressive Sensing in Wireless Communication
Introduction to Compressive Sensing in Wireless CommunicationIntroduction to Compressive Sensing in Wireless Communication
Introduction to Compressive Sensing in Wireless Communication
 
Distributed Architecture of Subspace Clustering and Related
Distributed Architecture of Subspace Clustering and RelatedDistributed Architecture of Subspace Clustering and Related
Distributed Architecture of Subspace Clustering and Related
 
PMF BPMF and BPTF
PMF BPMF and BPTFPMF BPMF and BPTF
PMF BPMF and BPTF
 
Distributed ADMM
Distributed ADMMDistributed ADMM
Distributed ADMM
 
Brief Introduction About Topological Interference Management (TIM)
Brief Introduction About Topological Interference Management (TIM)Brief Introduction About Topological Interference Management (TIM)
Brief Introduction About Topological Interference Management (TIM)
 
Patch antenna
Patch antennaPatch antenna
Patch antenna
 
Antenna basic
Antenna basicAntenna basic
Antenna basic
 
PAPR Reduction
PAPR ReductionPAPR Reduction
PAPR Reduction
 
Channel Estimation
Channel EstimationChannel Estimation
Channel Estimation
 
The Wireless Channel Propagation
The Wireless Channel PropagationThe Wireless Channel Propagation
The Wireless Channel Propagation
 
Digital Passband Communication
Digital Passband CommunicationDigital Passband Communication
Digital Passband Communication
 
Digital Baseband Communication
Digital Baseband CommunicationDigital Baseband Communication
Digital Baseband Communication
 
The relationship between bandwidth and rise time
The relationship between bandwidth and rise timeThe relationship between bandwidth and rise time
The relationship between bandwidth and rise time
 
Millimeter wave 5G antennas for smartphones
Millimeter wave 5G antennas for smartphonesMillimeter wave 5G antennas for smartphones
Millimeter wave 5G antennas for smartphones
 
Introduction of GPS BPSK-R and BOC
Introduction of GPS BPSK-R and BOCIntroduction of GPS BPSK-R and BOC
Introduction of GPS BPSK-R and BOC
 
Intermodulation distortion derivation
Intermodulation distortion derivationIntermodulation distortion derivation
Intermodulation distortion derivation
 
Throughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systemsThroughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systems
 

Recently uploaded

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

Modulation technology

  • 1. Analog Modulation Digital Modulation Error Probabilities for Binary Modulation M-ary Digital Modulation Modulation Techniques 286
  • 2. Modulation in Communication System By modulating a higher frequency carrier wave, it is usually much more effective to transmit data (although conceptually possible to transmit baseband signals directly). Allows precise control of the radiated frequency spectrum, more efficient use of the allocated RF bandwidth, and flexibility in accommodating different baseband signal formats. In older analog modulation carrier, amplitude, frequency, and phase may vary continuously. In modern digital-modulation wireless systems make more efficient use of the radio spectrum, and usually requires less prime power. performs better over a fading communications channel. more compatible with the use of error-correcting codes. 287
  • 3. Analog Modulation Transmitter is to modulate an RF carrier signal with the baseband data. Receiver is to recover the baseband data from the received modulated carrier wave. Modulator/demodulator provides the interface between the baseband information and the IF signals. IF signal in a receiver contains noise from the antenna and receiver circuitry with the desired signal. Demodulator play a critical role in the overall communication performance. 288
  • 4. SSB modulator and demodulator SSB (single-side band) SSB input signal to demodulator: ( )( ) cos ( )i IF mv t A t n tω ω= + + ωIF - ωm ωIF + ωm ωIF + ωm m(t): baseband signal, n(t): Gaussian white noise signal 1 ( ) cos ( ) 2 2 o m A v t t x tω= +SSB output signal: Synchronous (Coherent) demodulator: Modulator and demodulator LO are identical in freq. and phase. LO LO ( ) cos mm t tω= 289
  • 5. DSB-SC modulator and demodulator DSB-SC (double side-band suppressed carrier) ωIF - ωm ωIF + ωm DSB-SC input signal to demodulator: DSB-SC output signal: If mixer were ideal, the carrier freq. (fIF) would not be present in the output so call suppressed carrier. ( ) ( )( ) cos cos ( ) 2 2 i IF m IF m A A v t t t n tω ω ω ω= − + + + 1 ( ) cos ( ) 22 o m A v t t x tω= + ( ) cos mm t tω= 290
  • 6. DSB-LC modulator and demodulator DSB-LC (double side-band large carrier) ωIF - ωm ωIF + ωm DSB-LC input signal to demodulator: DSB-LC output signal: The carrier freq. (fIF) would be present in the output. DSB-LC: advantage Even if fIF much lower in amplitude than the sidebands, can be used as a reference signal to phase-lock the local oscillator to synchronization with the incoming signal. ( ) ( )( ) [1 ( )]cos ( ) cos cos cos ( ) 2 i IF IF IF m IF m mA v t A m t t n t A t t t n tω ω ω ω ω ω= + + = + − + + +   1 ( ) cos ( ) 2 2 o m mA v t t x tω= + ( ) cos mm t m tω= 291
  • 7. DSB-LC for Envelop Detection Fig. Envelope detection of an AM signal An advantage DSB-LC is that detection can be done without a local oscillator and mixer, by using an envelope detector (non- coherent demodulator). The RC time constant should be large enough so that the capacitor voltage does not decay too quickly before the next carrier peak arrives. But small enough so the output can track the envelope when it is decreasing. DSB-LC detection can be done by using an envelope detector (without a LO & mixer) It does not require the phase information of the incoming signal. Much simpler receiver & inexpensive circuit for broadcast AM radio. ( ) cos mm t m tω= 292
  • 8. Block Diagram of Digital Modulation 293
  • 9. Binary Digital Modulation Digital mod. v.s. Analog mod. Improved performance in the presence of noise and fading lower transmit power requirements better suitability for transmission of digital data with error correction and encryption. Amplitude Shift Keying (ASK) Frequency Shift Keying (FSK) Phase Shift Keying (PSK) 294
  • 10. Binary Signals: RZ, NRZ Binary signaling methods (a) On-off return-to-zero (RZ) coding. (b) Non-return-to-zero (NRZ) coding. (c) Polar NRZ coding. Binary modulation methods: a sinusoida1 carrier wave is switched between the binary symbols "0" and "1." A carrier A cos(ωt + φ) with three degrees of freedom corresponds to three fundamental binary modulation methods: (a) (b) (c) 295
  • 11. ASK ASK modulator Synchronous demodulation of ASK Envelope detection of ASK m(t) = 0 or 1 ( )v t 1( )v t ( )ov t This requires the LO to have precisely the same phase and frequency as the incoming signal. ASK can be demodulated coherently using a synchronous LO and mixer, but it is also possible to demodulate ASK with an envelope detector. Although envelope detection cannot be used to demodulate a DSB-SC signal, it can be used with an ASK DSB-SC waveform because the modulating signal m(t) is never negative. Another non-coherent demodulator is the rectifier, or square-law, detector 296
  • 12. FSK FSK modulator Synchronous demodulation of FSK 1 2 for ( ) 1 for ( ) 0 m t m t ω ω ω = =  = ( ) 0 or 1m t = After LPF only the DC term remains, resulting in a positive pulse at the output of the summer, indicating that a "1" has been received. FSK can also be demodulated using an envelope detector, thereby avoiding the requirement for two coherent LO. The outputs of the envelope detectors are combined with a summer to form a polar NRZ output. LO LO 1( )v t 2 ( )v t Mixer "1" "0" FSK Env. det. FSK polar NRZ ( )v t = 297
  • 13. PSK PSK modulator Synchronous demodulation of PSK ( ) 1 or -1m t = 1( )v t 0 ( )v t ( )v t ( )v t = The spectrum of the PSK waveform is relatively wide in BW due to the sharp transitions caused by phase reversal. These are usually smoothed by filtering, but the resulting BW is usually still wide enough that PSK is impractical for multichannel wireless systems. Since the PSK waveform has a constant envelope, it cannot be demodulated with an envelope detector. 298
  • 14. Carrier Synchronization Synchronism implies that both frequency and phase are identical difficult to achieve. A phase error ∆φ causes the output signal reduced in amplitude by cos ∆φ, a frequency error ∆ω while an error introduces a factor of cos∆ω. Ex: if set a criteria of requiring less than 45o phase error at a 1 GHz carrier frequency, synchronization of the LO to the carrier must be better than T/8. T/8 = f -1/8 = 109 Hz-1/8=1 ns/8 = 0.125 ns. A free-running local oscillator will virtually never exhibit such synchronism due to frequency drift, Doppler effects, and the arbitrary distance between Tx and Rx. ASK and FSK Advantage: Demodulate without a synchronous LO by using envelope detection. Disadvantage: bit error rates (BER) are bad. LO be synchronized by two ways with an incoming carrier wave: (1) transmit a pilot carrier (2) use a carrier-recovery circuit. Transmitting a low-level carrier is probably the easiest way, as this signal can be used to phase- lock the LO. 299
  • 15. Carrier recovery circuits use phase or frequency information from the received signal to synchronize the local oscillator. (a phase-locked loop). Carrier Recovery Circuits for Sync. PSK Demodulation 300
  • 16. Error Probability for Binary Modulation PCM (pulse code modulation) signals and detections PCM codes a binary "1" as a signal voltage s1(t), and a binary "0" as a signal voltage s2(t), each of bit duration T. In Tx, PCM signals are used to modulate a carrier by amplitude, frequency, or phase modulation. In Rx, synchronous demodulation or envelope detection (for ASK or FSK) can be used to recover s(t) = s1(t) or s2(t). The demodulated signal is then used to make the decision as to whether a binary "1" or "0" has been received. In the absence of noise this can simply be done by setting a detection threshold, where "1" or "0" is decided using a comparator circuit. optimum correlation receiver for PCM detection a single bit is received incorrectly is called the probability of error, or the bit error rate (BER). 301
  • 17. BER (I) Bit energy as the energy of the (non-zero) signal voltage over one bit period: The noise power output from an integrator with a bandlimited white noise input: 302
  • 18. BER (II) Synchronous ASK Synchronous PSK ASK v.s. PSK Energy-to-noise ratio in PSK case differs by a factor of four (6 dB) compared to ASK. This implies for the same BER, PSK requires only one-fourth the power of an ASK system. Since an ASK signal is off half the time, so the average transmit power of an ASK is half that of a PSK, for the same peak power (same signal voltage, V). Thus, in terms of average transmit power, the PSK result is better by a factor of two (3 dB), compared with ASK. 1 2 ( ) "1" ( ) "0" 0 s t V s t = ⇒  = ⇒ 303
  • 19. BER (III) Synchronous FSK In the synchronous FSK demodulator output noise consists of the difference between noise that has passed through both the ω1, ω2 channels. The variance of n(t) can be computed as (n1 and n2 are uncorrelated) Above shows that the total noise power of the FSK demodulator is doubled relative to the synchronous ASK or PSK demodulator. Synchronous FSK requires 3 dB more signal power than PSK for the same BER, and 3 dB less power than ASK on a peak power basis. FSK and ASK, however, have equal BER when compared in terms of average transmit power, since an ASK system transmits power only half the time. 304
  • 20. Bit rate and bandwidth efficiency (I) 305
  • 21. Bit rate and bandwidth efficiency (II) spectrum density 306
  • 22. M-ary Digital Modulation Binary mod. transmit one bit per signal interval with BW efficiency = 1 bps/Hz. M-ray mod. more than one bit be transmitted per signaling interval. Allows greater bit rates for the same bandwidth (but need more complex system). Transmit M = 2n symbols for each signaling interval BW efficiency = n bps/Hz. M-ray mod. can be done by using multiple discrete amplitude levels, or multiple phase states, or with a combination of these. Ex: Symbol rate: Rs, Effective bit rate: Rb = nRs. Ex: M-ary modulation methods 307
  • 23. QPSK (I) QPSK If we use four states, where n = 2 and M = 4, then we can transmit two bits, or four symbols, for each signaling interval. This is called quadrature phase shift keying (QPSK). The horizontal axis represents the in-phase (I) component, while the vertical axis represents the quadrature (Q) component that is shifted 90o in phase. Constellation diagramPhase representation 308
  • 24. The In-phase and Quadrature components of the QPSK signal I and Q components of a QPSK signals QPSK (II) 309
  • 26. QPSK Demodulator Demodulation of QPSK requires coherent detection. The demodulator uses two mixers with quadrature LO components to recover the I and Q signals. PCM detectors, each consisting of an integrator and a sampler, are used to detect the I and Q NRZ data, which is then decoded with a parallel-to-serial converter to provide serial binary output. Since QPSK is a constant envelope modulation, the detectors can use a zero threshold. Coherent QPSK demodulator 2 The const. C is defined as / 2 2A T 0( ) cos( ), (2 1) 4 for 0, 1, 2, 3. i i i s t A t i i ω φ π φ = + = + = 311
  • 27. Since the overall probability that a symbol is received correctly is the product of the probabilities that each correlator operates correctly, the overall probability of error for a symbol is: Twice data rate at same bandwidth and error rate as BPSK. Probability of error of QPSK Use QPSK with Gray coding, then we can assume that a symbol error is most likely to cause only a single bit error. Then since each symbol contains two bits, the bit error rate for QPSK will be one-half the symbol error rate: Symbol period T is twice the bit period, Es = 2Eb, where Eb is the bit energy. 2 symbol period , bit period / . n b s M R nR T T n = ⇒ = ⇒ = = 312
  • 28. M-ary Phase Shift Keying 2 symbol period , bit period / , each of M-PSK symbols corresponds to bits of binary data. efficiency of M-PSK is bps/Hz. n b s M R nR T T n M n BW n = ⇒ = ⇒ = = ⇒ ⇒ The probability of a symbol error for M-PSK is approximately given by: If Gray coding is used: 313
  • 29. Quadrature Amplitude Modulation (QAM) We can further generalize M-ary modulation by allowing the amplitudes of the I and Q components of the carrier to vary arbitrarily. 4-QAM is identical to QPSK, if the signal amplitudes are constant. An approximate expression for the symbol error rate of 16-QAM is given by Because of the high BW efficiency that can be obtained with QAM, it is increasingly being used in modem wireless systems, including point-to-point microwave radios, LMDS systems, and the DVB-C digital video cable broadcasting system. P.S. M = 2n symbols BW efficiency = n bps/Hz. 314
  • 30. Channel capacity It is possible to achieve as low error rate as is desired once Eb/no is above a critical value. Since Eb = S/Rb, this also implies that, for a fixed signal power S, there is a critical value of the data rate Rb for which the error rate can be made as small as desired. This particular value is called the channel capacity, and is given by a formula derived by Shannon: C : maximum data rate in bps B : bandwidth in Hz S : signal power in W n0/2 : two-sided noise power spectral density. Shannon channel capacity formula gives the upper bound on the maximum data rate that can be achieved for a given channel in the presence of additive Gaussian noise. Error correcting codes can provide performance close to the Shannon limit. 315