The Presentation includes Basics of Non - Uniform Quantization, Companding and different Pulse Code Modulation Techniques. Comparison of Various PCM techniques is done considering various Parameters in Communication Systems.
Base band transmission
*Wave form representation of binary digits
*PCM, DPCM, DM, ADM systems
*Detection of signals in Gaussian noise
*Matched filter - Application of matched filter
*Error probability performance of binary signaling
*Multilevel base band transmission
*Inter symbol interference
*Eye pattern
*Companding
*A law and μ law
*Correlation receiver
The Presentation includes Basics of Non - Uniform Quantization, Companding and different Pulse Code Modulation Techniques. Comparison of Various PCM techniques is done considering various Parameters in Communication Systems.
Base band transmission
*Wave form representation of binary digits
*PCM, DPCM, DM, ADM systems
*Detection of signals in Gaussian noise
*Matched filter - Application of matched filter
*Error probability performance of binary signaling
*Multilevel base band transmission
*Inter symbol interference
*Eye pattern
*Companding
*A law and μ law
*Correlation receiver
Using Chebyshev filter design, there are two sub groups,
Type-I Chebyshev Filter
Type-II Chebyshev Filter
The major difference between butterworth and chebyshev filter is that the poles of butterworth filter lie on the circle while the poles of chebyshev filter lie on ellipse.
A Brief Knowledge about Differential Pulse Code Modulation.
It contains the basics of Pulse Code modulation and why we all switching to Differential Pulse Code Modulation.
All the things about the Differential Pulse Code Modulation is given in a good understandable way
In this video, I will explain what is QAM modulation and what is 16QAM.
QAM Stands for Quadrature Amplitude Modulation. QAM is both an analog and a digital modulation method. But here, we are only talking about QAM as a digital modulation.
Quadrature means that two carrier waves are being used, one sine wave and one cosine wave. These two waves are out of phase with each other by 90°, this is called quadrature.
At the receiving end, the sine and cosine wave can be decoded independently, this means that by using both a sine wave and a cosine wave, the communication channel's capacity is doubled comparing to using only one sine or one cosine wave. That is why quadrature is such a popular technique for digital modulation.
QAM modulation is a combination of Amplitude Shift Keying and Phase Shift Keying, both carrier wave is modulated by changing both its amplitude and phase. As shown in this 8QAM waveform, the top is the sine wave carrier, for bit 000, the sin wave has a phase shift of 0°, and an amplitude of 2. While for bit 110, the phase shift is 180°, and the amplitude now is 1. So both phase and amplitude are changed.
In 16QAM, the input binary data is combined into groups of 4 bits called QUADBITS.
As shown in this picture, the I and I' bits are sent to the sine wave modulation path, and the Q and Q' bits are sent to the cosine wave path. Since the bits are split and sent in parallel, so the symbol rate has been reduced to a quarter of the input binary bit rate. If the input binary data rate is 100 Gbps, then the symbol rate is reduced to only 25 Gbaud/second. This is the reason why 16QAM is under hot research for 100Gbps fiber optic communication.
The I and Q bits control the carrier wave's phase shift, if the bit is 0, then the phase shift is 180°, if the bit is 1, then the phase shift is 0°.
The I' and Q' bits control the carrier wave's amplitude, if bit is 0, then the amplitude is 0.22 volt, if the bit is 1, then the amplitude is 0.821 volt.
So each pair of bits has 4 different outputs. Then they are added up at the linear summer. 4X4 is 16, so there is a total of 16 different combinations at the output, that is why this is called 16QAM.
This illustration shows an example of how the QUADBIT 0000 is modulated onto the carrier waves.
Here I and I' is 00, so the output is -0.22 Volt at the 2-to-4-level converter, when timed with the sine wave carrier, we get -0.22sin(2πfct), here fc is the carrier wave's frequency. QQ' is also 00, so the other carrier wave output is -0.22cos(2πfct).
Here is the proof that quadbit 0000 is modulated as a sine wave with an amplitude of 0.311volt and a phase shift of -135°. You can now pause for a moment to study the proof.
This list shows the 16QAM modulation output with different amplitude and phase change for all 16 quadbits. On the right side is the constellation diagram which shows the positions of these quadbits on a I-Q diagram.
You can visit FO4SALE.com f
All about the differential pulse code modulation and adaptive pulse code modulation which is one the classification of pulse code modulation(digital communications).
Objective of Pulse Code Modulation
Block Diagram of PCM
Process of PCM
Sampling
Quantization
Encoding
PCM Standards
Bit Rate and Bandwidth in PCM
Advantages and Disadvantages of PCM
Applications of PCM
Frequency-Shift Keying, also known as FSK is a type of digital frequency modulation. It is also often called as binary frequency shift keying or BFSK
Similar to analog FM, it is a constant-amplitude angle modulation.
This presentation will discuss the concepts behind FSK
Details: https://electronicsembeddedworld.blogspot.com/2018/06/performance-management-mcq.html
FM demodulation involves changing the frequency variations in a signal into amplitude variations at baseband, e.g. audio. There are several techniques and circuits that can be used each with its own advantages and disadvantages.
In any radio that is designed to receive frequency modulated signals there is some form of FM demodulator or detector. This circuit takes in frequency modulated RF signals and takes the modulation from the signal to output only the modulation that had been applied at the transmitter.
There are several types of FM detector / demodulator that can be used. Some types were more popular in the days when radios were made from discrete devices, but nowadays the PLL based detector and quadrature / coincidence detectors are the most widely used as they lend themselves to being incorporated into integrated circuits very easily...
Using Chebyshev filter design, there are two sub groups,
Type-I Chebyshev Filter
Type-II Chebyshev Filter
The major difference between butterworth and chebyshev filter is that the poles of butterworth filter lie on the circle while the poles of chebyshev filter lie on ellipse.
A Brief Knowledge about Differential Pulse Code Modulation.
It contains the basics of Pulse Code modulation and why we all switching to Differential Pulse Code Modulation.
All the things about the Differential Pulse Code Modulation is given in a good understandable way
In this video, I will explain what is QAM modulation and what is 16QAM.
QAM Stands for Quadrature Amplitude Modulation. QAM is both an analog and a digital modulation method. But here, we are only talking about QAM as a digital modulation.
Quadrature means that two carrier waves are being used, one sine wave and one cosine wave. These two waves are out of phase with each other by 90°, this is called quadrature.
At the receiving end, the sine and cosine wave can be decoded independently, this means that by using both a sine wave and a cosine wave, the communication channel's capacity is doubled comparing to using only one sine or one cosine wave. That is why quadrature is such a popular technique for digital modulation.
QAM modulation is a combination of Amplitude Shift Keying and Phase Shift Keying, both carrier wave is modulated by changing both its amplitude and phase. As shown in this 8QAM waveform, the top is the sine wave carrier, for bit 000, the sin wave has a phase shift of 0°, and an amplitude of 2. While for bit 110, the phase shift is 180°, and the amplitude now is 1. So both phase and amplitude are changed.
In 16QAM, the input binary data is combined into groups of 4 bits called QUADBITS.
As shown in this picture, the I and I' bits are sent to the sine wave modulation path, and the Q and Q' bits are sent to the cosine wave path. Since the bits are split and sent in parallel, so the symbol rate has been reduced to a quarter of the input binary bit rate. If the input binary data rate is 100 Gbps, then the symbol rate is reduced to only 25 Gbaud/second. This is the reason why 16QAM is under hot research for 100Gbps fiber optic communication.
The I and Q bits control the carrier wave's phase shift, if the bit is 0, then the phase shift is 180°, if the bit is 1, then the phase shift is 0°.
The I' and Q' bits control the carrier wave's amplitude, if bit is 0, then the amplitude is 0.22 volt, if the bit is 1, then the amplitude is 0.821 volt.
So each pair of bits has 4 different outputs. Then they are added up at the linear summer. 4X4 is 16, so there is a total of 16 different combinations at the output, that is why this is called 16QAM.
This illustration shows an example of how the QUADBIT 0000 is modulated onto the carrier waves.
Here I and I' is 00, so the output is -0.22 Volt at the 2-to-4-level converter, when timed with the sine wave carrier, we get -0.22sin(2πfct), here fc is the carrier wave's frequency. QQ' is also 00, so the other carrier wave output is -0.22cos(2πfct).
Here is the proof that quadbit 0000 is modulated as a sine wave with an amplitude of 0.311volt and a phase shift of -135°. You can now pause for a moment to study the proof.
This list shows the 16QAM modulation output with different amplitude and phase change for all 16 quadbits. On the right side is the constellation diagram which shows the positions of these quadbits on a I-Q diagram.
You can visit FO4SALE.com f
All about the differential pulse code modulation and adaptive pulse code modulation which is one the classification of pulse code modulation(digital communications).
Objective of Pulse Code Modulation
Block Diagram of PCM
Process of PCM
Sampling
Quantization
Encoding
PCM Standards
Bit Rate and Bandwidth in PCM
Advantages and Disadvantages of PCM
Applications of PCM
Frequency-Shift Keying, also known as FSK is a type of digital frequency modulation. It is also often called as binary frequency shift keying or BFSK
Similar to analog FM, it is a constant-amplitude angle modulation.
This presentation will discuss the concepts behind FSK
Details: https://electronicsembeddedworld.blogspot.com/2018/06/performance-management-mcq.html
FM demodulation involves changing the frequency variations in a signal into amplitude variations at baseband, e.g. audio. There are several techniques and circuits that can be used each with its own advantages and disadvantages.
In any radio that is designed to receive frequency modulated signals there is some form of FM demodulator or detector. This circuit takes in frequency modulated RF signals and takes the modulation from the signal to output only the modulation that had been applied at the transmitter.
There are several types of FM detector / demodulator that can be used. Some types were more popular in the days when radios were made from discrete devices, but nowadays the PLL based detector and quadrature / coincidence detectors are the most widely used as they lend themselves to being incorporated into integrated circuits very easily...
This presentation covers:
Some basic definitions & concepts of digital communication
What is Phase Shift Keying(PSK) ?
Binary Phase Shift Keying – BPSK
BPSK transmitter & receiver
Advantages & Disadvantages of BPSK
Pi/4 – QPSK
Pi/4 – QPSK transmitter & receiver
Advantages of Pi/4- QPSK
Power point presentation of Amplitude modulation from DSBSC.pptxvairaprakash3
The equation of AM wave in simple form is given by,
eAM(t) = Ec sin 2πfct+(mE_c)/2 cos2π(fc + fm)t - (mE_c)/2 cos2π(fc - fm)t
Here, power of the carrier does not convey any information. Most of the power is transmitted in the carrier is not used for carrying information. Hence the carrier is suppressed and only sidebands are transmitted.Therefore, if the carrier is suppressed, only sidebands remain in the spectrum requiring less power.
DSB-SC Contains two side bands i.e USB & LSB
Power efficiency is 100%
% Power saving in DSB-SC w.r.t AM is 66.67%.
Comparative Study and Performance Analysis of different Modulation Techniques...Souvik Das
A comparative study and performance analysis of different modulation
techniques which shows graphically and comparative results Channel Noise
with Bit Error Rate of ASK, FSK, PSK and QPSK.
The following resources come from the 2009/10 BEng (Hons) in Digital Communications & Electronics (course number 2ELE0064) from the University of Hertfordshire. All the mini projects are designed as level two modules of the undergraduate programmes.
The objective of this module is to have built communication links using existing AM modulation, PSK modulation and demodulation blocks, constructed AM modulators and constructed PSK modulators using operational function blocks based on their mathematical expressions, and conducted simulations of the links and modulators, all in Simulink®.
This presentation contain each and every single information on the topic.
If you like it do follow and like my presentation.
It would be worth my efforts.
This slide describe the techniques of digital modulation and Bandwidth Efficiency:
The first null bandwidth of M-ary PSK signals decrease as M increases while Rb is held constant.
Therefore, as the value of M increases, the bandwidth efficiency also increases.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Dc unit 2
1. DIGITAL COMMUNICTIONS
UNIT-2
DIGITAL MODULATION TECHNIQUES
ASK,FSK,PSK
Presented By:
M.KAIVALYA
Assistant Professor
Department of E.C.E.
GIET Engineering CollegeLecture Details:
DIGITAL COMMUNICATIONS
ECE, III B.Tech I sem
2. INTRODUCTION
•Digital band-pass modulation techniques
–Amplitude-shift keying
–Phase-shift keying
–Frequency-shift keying
•Receivers
–Coherent detection
•The receiver is synchronized to the transmitter with respect to carrier
phases
–Non-coherent detection
•The practical advantage of reduced complexity but at the cost of -degraded
performance
3. Amplitude Shift Keying (ASK)
Amplitude Shift Keying (ASK) is a type of Amplitude Modulation which represents the binary
data in the form of variations in the amplitude of a signal.
The amplitude of the resultant output depends upon the input data whether it should be a
zero level or a variation of positive and negative, depending upon the carrier frequency.
One binary digit is represented by the presence of a carrier, the other binary digit is
represented by the absence of carrier, frequency is remains fixed.
Following is the diagram for ASK modulated waveform along with its input.
5. Amplitude Shift Keying (ASK)
Let the carrier be
Where A represents peak value of sinusoidal carrier. In the standard 1Ω resistance, the power
dissipated will be
S(t)= 2𝑝 cos(2π𝑓0t)
Similarly for ASK let the carrier be S(t)= 2𝑝 cos(2π𝑓0t) (to transmit ‘1’)
similarly S(t)=0 (to transmit ‘0’)
That means no signal is transmitted. S(t) contains some complete cycles of carrier frequency f.
thus , symbol 1----> pulse is transmitted
symbol o----> no pulse is transmitted
Thus ASK waveform look like an ON-OFF of the signal. Hence it is also called ON-OFF Keying(OOK)
6. Generation of ASK
Any modulated signal has a high frequency carrier. The binary signal when ASK is modulated,
gives a zero value for LOW input and gives the carrier output for HIGH input.
ASK modulator:
The ASK modulator block diagram comprises of the carrier signal generator, the binary
sequence from the message signal and the band-limited filter.
Following is the block diagram of the ASK Modulator.
7. Generation of ASK
From the above fig.
S(t)= 2𝑝 cos(2π𝑓0t)
Let re-arrange the above equation as
S(t)=b(t) 𝑃𝑇b
2
𝑇𝑏
cos(2π𝑓0t)
Where Tb is the bit time (or) bit duration
Let us assume
2
𝑇𝑏
cos(2π𝑓0t) =φ1(t)
s(t)=b(t) 𝑃𝑇b φ1(t)
The bit energy Eb is defined in terms of power ‘p’ and bit duration Tb as
Eb=pTb
8. Generation of ASK
Then the equation s(t) becomes
S(t)=± 𝐸b φ1(t)
Now in binary ASK system follows symbol 1 & 0 are represented as follows
S(t) = 𝐸b φ1(t), 0≤t≤Tb for symbol ‘1’
= 0 , 0≤t≤Tb for symbol ‘0’
9. Detection of ASK
ASK Demodulator:
There are two types of ASK Demodulation techniques. They are −
Asynchronous ASK Demodulation/detection
Synchronous ASK Demodulation/detection
• The clock frequency at the transmitter when matches with the clock frequency at the
receiver, it is known as a Synchronous method, as the frequency gets synchronized.
Otherwise, it is known as Asynchronous.
10. Detection of ASK
Asynchronous ASK Demodulator
The Asynchronous ASK detector consists of a half-wave rectifier, a low pass filter, and a
comparator. Following is the block diagram for the same.
11. Detection of ASK
The modulated ASK signal is given to the half-wave rectifier, which delivers a positive half
output. The low pass filter suppresses the higher frequencies and gives an envelope detected
output from which the comparator delivers a digital output.
Synchronous ASK Demodulator:
Synchronous ASK detector consists of a Square law detector, low pass filter, a comparator,
and a voltage limiter. Following is the block diagram for the same.
12. Detection of ASK
The ASK modulated input signal is given to the Square law detector. A square law detector is
one whose output voltage is proportional to the square of the amplitude modulated input
voltage. The low pass filter minimizes the higher frequencies. The comparator and the
voltage limiter help to get a clean digital output.
The simplest way is to use an envelope detector, exploiting the non constant-envelope
property of the BASK signal
13. Encoding Techniques
There are some different types of encoding techniques to
encode the input binary sequence. They are
Unipolar NRZ
Polar NRZ
Unipolar RZ
Bipolar RZ
Split Phase Manchester
14.
15. Phase shift keying(PSK)
The phase of the output signal gets shifted depending upon the input. These are mainly of
two types, namely BPSK and QPSK, according to the number of phase shifts.
The other one is DPSK which changes the phase according to the previous value.
Phase Shift Keying (PSK) is the digital modulation technique in which the phase of the carrier
signal is changed by varying the sine and cosine inputs at a particular time.
PSK technique is widely used for wireless LANs, bio-metric, contactless operations, along with
RFID and Bluetooth communications.
16. Phase shift keying(PSK)
Principle of BPSK:
In BPSK binary symbol ‘1’ and ‘0’ modulate the phase of the carrier, Let the
carrier be
Consider for example
17. Phase shift keying(PSK)
Then we can write the above equation as
With the above equation we can define BPSK signal combinely as
Here b(t)=+1, when binary ‘1’ is to be transmitted
b(t)=‘-1’ when binary ‘0’ is to be transmitted
18. Generation of BPSK
BPSK Modulator:
The block diagram of Binary Phase Shift Keying consists of the balance modulator which has
the carrier sine wave as one input and the binary sequence as the other input.
Following is the diagrammatic representation.
19. Generation of BPSK
The modulation of BPSK is done using a balance modulator, which multiplies the two signals
applied at the input. For a zero binary input, the phase will be 0° and for a high input, the
phase reversal is of 180°.
Following is the diagrammatic representation of BPSK Modulated output wave along with its
given input.
21. Detection of BPSK
Square Law Device:
At the output of the square law device, the signal will be
We know that
22. Detection of BPSK
Band pass filter:
The signal is then passed through a bandpass filter whose pass band is centered around 2f0
band pass filter removes the DC level of ½ and at its output we get
Frequency Divider:
The output of a frequency divider we get a carrier signal whose frequency is f0 i.e
Synchronous demodulator:
It multiplies the input signal and the recovered carrier, therefore the output of the multiplier
we get
23. Detection of BPSK
Bit synchronizer and Integrator:
The integrator integrates the signal over one bit period
The bit synchronizer take care of starting and ending times of a bit
At the end of bit duration Tb, the bit synchronizer closes switch s2 temporarily.
This connects the output of an integrator to decision device.
It is equivalent to sampling the output of integrator
32. Frequency Shift Keying(FSK)
In BFSK, the frequency of a sinusoidal carrier is shifted according to the binary
symbol. i.e the frequency of a sinusoidal is shifted between two discrete values.
This means that we have two different frequency signals according to the binary
symbols
Hence there is increase or decrease in frequency by ‘w’
The above equations can be combinely written as
33. Frequency Shift Keying(FSK)
Thus when signal ‘1’ is to be transmitted, the carrier frequency will be
If symbol ‘0’ is to be transmitted, the carrier frequency will be
Then they are represented as fH and fL
34. Generation of FSKFSK Modulator:
The FSK modulator block diagram comprises of two oscillators with a clock and the input
binary sequence. Following is its block diagram.
36. Coherent Detection of FSK
The block diagram of Synchronous FSK detector consists of two mixers with local oscillator
circuits, two band pass filters and a decision circuit. Following is the diagrammatic
representation.
37. Spectrum of BFSK
The BFSK signal s(t) may be written as
s(t)= 2𝑝. pH(t). Cos(2πfH(t))+ 2𝑝. pL(t). Cos(2πfL(t)) ----------(1)
Let us compare this equation with BPSK equation which is written as
sBPSK(t)=b(t). 2𝑝. cos (2πf0t) -----------(2)
It may be noted that this equation is identical to BFSK equation. In BPSK equation b(t) is polar
signal where as in BFSK, the similar coefficients pH(t) or pL(t) are unipolar.
Hence let us convert these coefficients in polar form.
pH(t)=
1
2
+
1
2
pH’(t) ------(3)
pL(t)=
1
2
+
1
2
pL’(t) ------(4)
38. Spectrum of BFSKSubstitute the values in the 1st equation
S(t)= 2𝑝.[
1
2
+
1
2
pH’(t)] cos (2πfH(t)+ 2𝑝. [
1
2
+
1
2
pL’(t)] cos (2πfL(t)]
=
𝑝
2
cos (2πfH(t) +
𝑝
2
cos (2πfL(t) +
𝑝
2
pH’(t) cos (2πfH(t) +
𝑝
2
pL’(t) cos (2πfL(t)
The first term represents the single frequency impulse at fH, the second term represents the
pulse at fL ,those are constant amplitudes.
The last two terms are similar to BPSK equation, here pH’(t) & pL’(t) are equivalent to b(t).
Those last two terms in eq. 5 produce the spectrum which are similar to that of BPSK, one
spectrum is located at fH and other at fL. . Therefore we can write the power spectral density
of BFSK as
----(5)
40. Non Coherent Detection of FSK
The block diagram of Asynchronous FSK detector consists of two band pass filters, two
envelope detectors, and a decision circuit. Following is the diagrammatic representation.
41. Non Coherent detection of FSK
The FSK signal is passed through the two Band Pass Filters BPFs tuned to Space and Mark
frequencies.
The output from these two BPFs look like ASK signal, which is given to the envelope detector.
The signal in each envelope detector is modulated asynchronously.
The decision circuit chooses which output is more likely and selects it from any one of the
envelope detectors. It also re-shapes the waveform to a rectangular one.
42. Differential Phase Shift Keying(DPSK)
DPSK is the non coherent version of PSK
DPSK does not need a synchronous carrier at the demodulator.
The input sequence of binary bits is modified such that the next bit depends upon
the previous bit.
Therefore in receiver the previous received bits are used to detect the present bit.
43. Generation of DPSK
The input sequence is d(t), output sequence is b(t) and b(t-Tb) is the previous output
delayed by one bit period.
Depending up on the values of d(t) & b(t-Tb) exclusive OR gate generates the output
sequence b(t)
46. DPSK receiver
The received DPSK signal is applied to one of the input of multiplier.
The delayed version of received DPSK signal by the time interval Tb is applied as
second input to the multiplier.
By comparing the integrator output with a decision level, the decision device can
reconstruct the binary sequence by assigning a symbol 0 for –ve output and a
symbol 1 for +ve output.
50. DEPSK
If b(t)= b(t-Tb) then output of the EX-OR gate will be 0 i.e., d(t) =0
If b(t)= b(t-Tb) then output of the EX-OR gate will be 1 i.e., d(t) =1
Errors in DEPSK system:
In DEPSK the error will always occur in pairs i.e., single error
b(t)= 0 1 1 0 1 1 0 0 b’(t)= 0 1 1 1 1 1 0 0
b(t-Tb)= 0 1 1 0 1 1 0 0 b’(t-Tb)= 0 1 1 1 1 1 0 0
---------------------- ----------------------
d(t)= 1 0 1 1 0 1 0 d(t)= 1 0 0 0 0 1 0
Two errors
51. Advantages and Disadvantages
Advantage:
The probability of error is lessthan the probability of error for DPSK because DPSK
uses the non coherent type demodulator technique
Disadvantges:
Demodulator is very complex
The errors are occur in pairs, one error in b(t) will give rise to two errors in d(t)
52. Quadrature Phase Shift Keying(QPSK)
The Quadrature Phase Shift Keying QPSK is a variation of BPSK, and it is also
a Double Side Band Suppressed Carrier DSBSC modulation scheme, which sends
two bits of digital information at a time, called as bigits.
Instead of the conversion of digital bits into a series of digital stream, it
Converts them into bit pairs. This decreases the data bit rate to half, which allows
space for the other users.
S1 S2 S3 S4
2Tb 2Tb 2Tb2Tb
01 1000 11
53. QPSK
Four different phase states in one symbol period
Two bits of information are transmitted in each symbol
Twice the bandwidth efficiency of the BPSK
Phase: 0, π/2, π, 3π/2 → possible phase values
Symbol: 00 01 11 10
55. QPSK
Mathematical representation of QPSK:
VQPSK(t)= 2𝑝. cos[wct+(2m+1)π/4], m=0,1,2,3,…
The QPSK system of modulation is called as four state PSK
or 4-psk.
s1(t)= 2𝑝. cos[wct+π/4]
s2(t)= 2𝑝. cos[wct+3π/4]
s3(t)= 2𝑝. cos[wct+5π/4]
s4(t)= 2𝑝. cos[wct+7π/4]
59. QPSK
Hence VQPSK= 2𝑝. bo(t) sin wct+ 2𝑝. be(t) cos wct.
Symbol bo(t) be(t) VQPSK Quadrant
00 -1 -1 − 2𝑝. sin wct - 2𝑝. cos wct II
01 -1 +1 - 2𝑝. sin wct + 2𝑝. cos wct I
11 +1 +1 + 2𝑝. sin wct + 2𝑝. cos wct IV
10 +1 -1 - 2𝑝. sin wct + 2𝑝. cos wct III
63. Quadrature Amplitude Shift Keying(QASK)
We have seen in the preceeding sections that the correct detection of the signal
depends up on the separation between the signal points in the space
In case of PSK system all points lie on the circumference of the circle, this is
because PSK signal has constant amplitude throughput.
If the amplitude of the signal is also varied then the points will lie inside the circle
also on the signal space diagram, this further increases the noise immunity of the
system.
Such systems involves phase as well as amplitude shift keying, it is called
quadrature amplitude shift keying or simply QASK, it is also called quadrature
amplitude modulation (QAM) .
64. QASK/QAM
Geometrical representation of QASK:
Assuming that we are transmitting a symbol consisting of 4 bits.
i.e., N=4 => M=24
=16 different possible symbols.
In the geometric representation of fig. each signal point is equally distant from its nearest
neighbours, this distance is d=2a.
65. QASK/QAM
From the above fig. we can determine the energy associated with a signal by
considering 4 signals in the 1st quadrant.
From fig.S1=(a,3a)
S2=(3a,3a)
S3=(3a,a)
S4=(a,a)
(from the formula average power(x,y)=𝑥2 + 𝑦2)
66. QASK/QAM
Types of QAM:
Depending on the number of bits per message, the QAM signals ,may be
classified as
Name of scheme Bits per symbol No. of symbols
4 QAM 2 22 = 4
8 QAM 3 23=8
16 QAM 4 24=16
32 QAM 5 25=32
64 QAM 6 26=64
70. QASK/QAM
The bit stream b(t) is applied to serial to a parallel converter operating on a clock
which has a period of TS seconds.
The bits b(t) are stored by the converter and presented in the parallel form,
the four bit symbol is
Out of these four bits , the first two bits are applied to a D/A converter and the
other two bits are applied to the second D/A converter.
The output of the first D/A converter is Ae(t) which is used to modulate the carrier
Where as the output of second D/A converter is Ao(t) is used to
modulate the carrier in the balanced modulator
then balanced modulator outputs are added together to get QASK output signal
89. Assaignment quetions
1. Explain with neat block diagram the generation and receiver of
BPSK and also explain about PSD of BPSK
2. Explain BFSK modulation in detail, and draw signal space
representation and PSD of BFSK
3. Explain the generation and detection of QPSK signals with the
help of block diagram and also draw output waveforms of QPSK.
4. The binary sequence 1100100010 is applied to DPSK transmitter,
(i) Sketch the resulting waveform at the transmitter output
(ii) Applying this waveform to the DPSK receiver, show that
original data is reconstructed in the received output.