The digitally implemented QPSK modulator is developed for satellite communication for future satellite missions. As we know that for space application power and bandwidth are most important parameters.The size of PCB and component count are also important parameters. To reduce these all parameters we design new approach. The new approach also minimizes the component count and hence reduces the PCB size. In this modulator summation, orthogonal sub-carrier generation and mixing of subcarrier with data are all digitally implemented inside the FPGA
The document summarizes various digital modulation and demodulation schemes used in wireless communication systems. It describes the structure of a basic wireless communication link and then provides details about modulation formats such as BPSK, DPSK, QPSK, OQPSK, and π/4 QPSK. It explains the key aspects of each scheme such as symbol mapping, transmitter and receiver operations, and their advantages over other schemes in terms of spectral efficiency and robustness to noise and fading channels.
Delta modulation is an analog-to-digital conversion technique used to transfer data. It works by comparing an input signal to a reference signal and encoding the difference into a digital bitstream. A delta modulation system consists of a modulator that converts an analog signal to digital, and a demodulator that converts the digital signal back to analog. Delta modulation is simpler than pulse code modulation but can achieve high signal-to-noise ratios and variable bandwidth. However, it is limited by slope overload when signals change rapidly.
Frequency-Shift Keying, also known as FSK is a type of digital frequency modulation. It is also often called as binary frequency shift keying or BFSK
Similar to analog FM, it is a constant-amplitude angle modulation.
This presentation will discuss the concepts behind FSK
The document discusses various digital modulation formats including BPSK, QPSK, OQPSK, and π/4 QPSK. BPSK carries only 1 bit per symbol and has low bandwidth efficiency. QPSK carries 2 bits per symbol but has issues with zero crossing during transitions of 2 bits. OQPSK addresses this with a delay between in-phase and quadrature components to avoid 180 degree phase shifts. π/4 QPSK provides further improvements with phase shifts of up to 135 degrees, allowing for non-coherent detection and better performance in noisy environments. DQPSK first performs differential encoding before QPSK modulation to minimize transitions.
In digital modulation, minimum-shift keying(MSK) is a type of continuous-phase frequency-shift keying that was developed in the late 1950s and 1960s.
Similar to OQPSK(Offset quadrature phase-shift keying),
This document provides an overview of spread spectrum technologies including frequency hopping spread spectrum (FHSS) and direct sequence spread spectrum (DSSS). It defines spread spectrum, describes how data is modulated at different rates using DSSS, explains FHSS and DSSS in detail, and lists factors that impact wireless signal performance. Key aspects covered include the FCC regulations for unlicensed use of spread spectrum in the 2.4GHz band, how DSSS spreads and encodes data across multiple frequencies, and how FHSS rapidly hops between frequencies to transmit information.
This presentation covers:
Some basic definitions & concepts of digital communication
What is Phase Shift Keying(PSK) ?
Binary Phase Shift Keying – BPSK
BPSK transmitter & receiver
Advantages & Disadvantages of BPSK
Pi/4 – QPSK
Pi/4 – QPSK transmitter & receiver
Advantages of Pi/4- QPSK
In telecommunication, an eye pattern, also known as an eye diagram, is an oscilloscope display in which a digital signal from a receiver is repetitively sampled and applied to the vertical input, while the data rate is used to trigger the horizontal sweep. It is so called because, for several types of coding, the pattern looks like a series of eyes between a pair of rails. It is a tool for the evaluation of the combined effects of channel noise and intersymbol interference on the performance of a baseband pulse-transmission system. It is the synchronised superposition of all possible realisations of the signal of interest viewed within a particular signaling interval.
The document summarizes various digital modulation and demodulation schemes used in wireless communication systems. It describes the structure of a basic wireless communication link and then provides details about modulation formats such as BPSK, DPSK, QPSK, OQPSK, and π/4 QPSK. It explains the key aspects of each scheme such as symbol mapping, transmitter and receiver operations, and their advantages over other schemes in terms of spectral efficiency and robustness to noise and fading channels.
Delta modulation is an analog-to-digital conversion technique used to transfer data. It works by comparing an input signal to a reference signal and encoding the difference into a digital bitstream. A delta modulation system consists of a modulator that converts an analog signal to digital, and a demodulator that converts the digital signal back to analog. Delta modulation is simpler than pulse code modulation but can achieve high signal-to-noise ratios and variable bandwidth. However, it is limited by slope overload when signals change rapidly.
Frequency-Shift Keying, also known as FSK is a type of digital frequency modulation. It is also often called as binary frequency shift keying or BFSK
Similar to analog FM, it is a constant-amplitude angle modulation.
This presentation will discuss the concepts behind FSK
The document discusses various digital modulation formats including BPSK, QPSK, OQPSK, and π/4 QPSK. BPSK carries only 1 bit per symbol and has low bandwidth efficiency. QPSK carries 2 bits per symbol but has issues with zero crossing during transitions of 2 bits. OQPSK addresses this with a delay between in-phase and quadrature components to avoid 180 degree phase shifts. π/4 QPSK provides further improvements with phase shifts of up to 135 degrees, allowing for non-coherent detection and better performance in noisy environments. DQPSK first performs differential encoding before QPSK modulation to minimize transitions.
In digital modulation, minimum-shift keying(MSK) is a type of continuous-phase frequency-shift keying that was developed in the late 1950s and 1960s.
Similar to OQPSK(Offset quadrature phase-shift keying),
This document provides an overview of spread spectrum technologies including frequency hopping spread spectrum (FHSS) and direct sequence spread spectrum (DSSS). It defines spread spectrum, describes how data is modulated at different rates using DSSS, explains FHSS and DSSS in detail, and lists factors that impact wireless signal performance. Key aspects covered include the FCC regulations for unlicensed use of spread spectrum in the 2.4GHz band, how DSSS spreads and encodes data across multiple frequencies, and how FHSS rapidly hops between frequencies to transmit information.
This presentation covers:
Some basic definitions & concepts of digital communication
What is Phase Shift Keying(PSK) ?
Binary Phase Shift Keying – BPSK
BPSK transmitter & receiver
Advantages & Disadvantages of BPSK
Pi/4 – QPSK
Pi/4 – QPSK transmitter & receiver
Advantages of Pi/4- QPSK
In telecommunication, an eye pattern, also known as an eye diagram, is an oscilloscope display in which a digital signal from a receiver is repetitively sampled and applied to the vertical input, while the data rate is used to trigger the horizontal sweep. It is so called because, for several types of coding, the pattern looks like a series of eyes between a pair of rails. It is a tool for the evaluation of the combined effects of channel noise and intersymbol interference on the performance of a baseband pulse-transmission system. It is the synchronised superposition of all possible realisations of the signal of interest viewed within a particular signaling interval.
This document discusses offset quadrature phase-shift keying (OQPSK) modulation. It begins by explaining the drawback of traditional quadrature phase-shift keying (QPSK), which is that both the in-phase and quadrature components change simultaneously, resulting in abrupt 180-degree phase changes and large spectral side lobes. It then introduces OQPSK modulation as a modification of QPSK where the quadrature component is offset by one bit period, preventing simultaneous changes in both components and replacing the 180-degree phase jumps with multiple 90-degree phase shifts. This results in better performance for applications using high power amplifiers or satellites. Diagrams are provided to illustrate the difference between the phase transitions of QPSK and O
M-ary encoding allows for digital signals with multiple possible conditions or voltage levels through the use of multiple binary variables. The number of conditions possible is represented by M, while the number of bits needed to produce those conditions is given by the logarithmic relationship N = log2M. M-ary PSK and M-ary QAM are two common types of M-ary encoding. M-ary PSK varies the phase of a carrier signal, while M-ary QAM varies both the amplitude and phase, allowing for greater power efficiency but identical bandwidth efficiency as M-ary PSK. Both modulation schemes use a constellation diagram to represent the multiple symbol states.
The document discusses receiver architecture and design requirements. It covers:
1. The receiver must provide high gain of 100dB while spread across RF, IF, and baseband stages to avoid instability. It must also be sensitive to weak signals down to -110dBm and reject strong adjacent channels.
2. A superheterodyne receiver is most common as it allows for sharper filters at IF to improve selectivity. Downconverting to IF also eases image filtering requirements.
3. Automatic gain control is needed to adjust the receiver gain over a wide range of input signal levels and fit them into the baseband processing range. It helps prevent compression from strong signals exceeding the 1dB compression point.
Phase-shift keying (PSK) is a digital modulation technique that conveys data by changing the phase of a carrier signal. There are three major classes of digital modulation: amplitude-shift keying, frequency-shift keying, and phase-shift keying. Quadrature phase-shift keying (QPSK) is a type of PSK that can either double the data rate compared to binary phase-shift keying (BPSK) while maintaining bandwidth, or maintain the BPSK data rate while halving the required bandwidth. QPSK works by splitting the binary data stream into in-phase and quadrature-phase components at the transmitter, and using matched filters or correlates to detect symbols at the receiver.
The document discusses phase-shift keying (PSK) modulation techniques. It begins with an introduction to PSK and how it uses phases to encode digital data. It then discusses binary phase-shift keying (BPSK) which uses two phases separated by 180 degrees to encode one bit per symbol. BPSK is robust but has a low data rate. Quadrature phase-shift keying (QPSK) is then introduced, which uses four phases separated by 90 degrees to encode two bits per symbol, doubling the data rate of BPSK. Implementations of BPSK and QPSK modulators and demodulators are provided along with diagrams of their constellation plots.
PCM is an important method of analog-to-digital conversion where an analog signal is converted into an electrical waveform of two or more levels. The essential operations in a PCM transmitter are sampling, quantizing, and coding the analog signal. In the receiver, the operations are regeneration, decoding, and demodulation of the quantized samples. Regenerative repeaters are used to reconstruct the transmitted sequence of coded pulses and perform equalization, timing, and decision making functions. While PCM systems allow for regeneration and multiplexing, they are more complex than analog methods and increase channel bandwidth requirements.
This document provides an overview of angle modulation techniques, specifically phase modulation (PM) and frequency modulation (FM). It defines angle modulation as a non-linear process where the modulated wave does not resemble the message wave but the amplitude remains constant. Basic concepts of PM and FM are explained, showing how the carrier signal's phase or frequency varies with the message signal. Equations are provided to define PM and FM. The bandwidth requirements for both techniques are also summarized, with Carson's rule stated for FM bandwidth.
1) The document discusses various digital modulation techniques including ASK, PSK, and FSK.
2) It provides details on the basic principles, modulation/demodulation methods, and spectra of these techniques.
3) Key aspects covered include the use of amplitude, phase, and frequency to encode digital signals for transmission, as well as synchronous and asynchronous detection methods.
The document compares M-ary PSK, FSK, and QAPSK modulation schemes. It finds that M-PSK has the lowest noise immunity while M-FSK has the highest. Bandwidth efficiency increases with M for M-PSK and M-QAPSK but decreases for M-FSK. Implementation complexity increases with M for M-PSK and M-FSK, but remains constant for M-QAPSK. Therefore, M-QAPSK has the best implementation properties in terms of complexity and cost for high values of M. In summary, the document analyzes and compares key characteristics of three modulation schemes.
Introduction to digital communication, base band system, formatting of textual data, MESSAGES, CHARACTERS, AND SYMBOLS, Example of Messages, Characters, and Symbols, Baseband Modulation, Intersymbol Interference
1. Digital modulation techniques are used to modulate digital information so that it can be transmitted via different mediums. Common digital modulation methods include binary amplitude shift keying (ASK), frequency shift keying (FSK), and phase shift keying (PSK).
2. FSK conveys information by changing the instantaneous frequency of a carrier wave. It is less susceptible to errors than ASK but has a larger spectrum bandwidth. PSK varies the phase of the transmitted signal. BPSK uses two phases while QPSK uses four phases.
3. The performance of digital modulation techniques can be compared using the energy per bit to noise power spectral density ratio (Eb/N0). Lower Eb/N0 values
This document discusses various digital modulation techniques. It begins by explaining binary amplitude-shift keying (ASK), where one amplitude encodes a 0 and another encodes a 1. It then discusses on-off keying (OOK) and multiple amplitude shift keying (MASK). Next, it covers frequency-shift keying (FSK), phase-shift keying (PSK), differential PSK, and quadrature PSK. It also discusses more advanced modulations like quadrature amplitude modulation (QAM), continuous phase modulation (CPM), and Gaussian minimum-shift keying. The document provides examples and discusses the pros, cons, and applications of different modulation schemes. It concludes by discussing a student project involving designing and analyzing a digital
A digital-to-analog converter (DAC) converts a digital code, usually binary, into an analog signal like voltage or current. It works opposite of an analog-to-digital converter. A DAC filters a sequence of impulses representing the digital input into a continuously varying output voltage. Key characteristics of DACs include resolution, offset and gain errors, and monotonicity. DACs are important because they allow digital devices like computers to interface with analog systems in the real world.
It is a digital representation of an analog signal that takes samples of the amplitude of the analog signal at regular intervals. The sampled analog data is changed to, and then represented by, binary data.
Wavelength-division multiplexing (WDM) is a technology that multiplexes multiple optical carrier signals onto a single optical fiber by using different wavelengths of laser light. Modern WDM systems can handle up to 160 signals and expand a basic 10 Gbit/s fiber system to a theoretical total capacity of over 1.6 Tbit/s. There are two main types: coarse WDM (CWDM) uses channel spacings of 20 nm while dense WDM (DWDM) uses narrower spacings of 0.4 nm, allowing DWDM to carry more channels. WDM reduces fiber plant requirements by allowing multiple connections over one fiber.
The document discusses the rake receiver, which is used to mitigate multipath fading effects in wireless communications. It operates by using multiple "fingers" to capture signal energy from different propagation paths. Each finger correlates the received signal with a reference signal and applies appropriate delays. The outputs of the fingers are then combined, such as by maximum ratio combining, to improve the overall signal quality by constructively adding the energy from different paths. The rake receiver allows energy from all propagation paths to be captured and combined, increasing the signal-to-noise ratio compared to a single propagation path.
This document discusses various wireless propagation channels including free space propagation, reflection, scattering, and diffraction. It covers reflection propagation mechanisms such as reflection from dielectrics and conductors. Reflection coefficients and Snell's law are explained. Models for reflection, including the two-ray ground reflection model, are provided. Diffraction models like knife-edge diffraction and multiple knife-edge diffraction using methods like Bollington's method are summarized. Scattering models including Kirchoff's theory and perturbation theory are covered. Common fading models for mobile radio like Rayleigh, Rician, and Doppler shift models are described. Finally, different types of wireless channels including time-selective, frequency-selective, general, and WSSUS channels are classified
EC 8395 - Communication Engineering - Unit 3 m - ary signalingKannanKrishnana
This document discusses M-ary digital modulation techniques. It begins by defining M-ary signaling as a technique where multiple bits are transmitted simultaneously using a single signal, instead of transmitting one bit at a time. It then provides the basic equation for calculating the number of possible conditions (M) based on the number of bits (N).
The document goes on to describe several common M-ary modulation techniques including M-ary PSK, M-ary QAM, and their basic principles and equations. It provides examples of 4-PSK, 8-PSK, 16-PSK, 8-QAM and 16-QAM, explaining their modulation/demodulation, constellations, and minimum bandwidth requirements. Finally, it compares several
This document provides an overview of information theory and coding concepts including:
1) Definitions of information, entropy, joint entropy, conditional entropy, and mutual information are introduced along with examples of calculating these quantities for discrete memoryless sources and channels.
2) Shannon's theorem for channel capacity is discussed and the channel capacity of a discrete memoryless channel is defined as the maximum mutual information over all possible input distributions.
3) Properties of entropy such as it being a measure of uncertainty, having a minimum of 0 and maximum of log2K, and being maximized when probabilities are equal are proven.
The Quadrature Phase Shift Keying QPSK is a variation of BPSK, and it is also a Double Side Band Suppressed Carrier DSBSC modulation scheme, which sends two bits of digital information at a time, called as bigits.
Instead of the conversion of digital bits into a series of digital stream, it converts them into bit pairs. This decreases the data bit rate to half, which allows space for the other users.
QPSK (Quadrature Phase Shift Keying) is type of phase shift keying. Unlike BPSK which is a DSBCS modulation scheme with digital information for the message, QPSK is also a DSBCS modulation scheme but it sends two bits of digital information a time (without the use of another carrier frequency).
The amount of radio frequency spectrum required to transmit QPSK reliably is half that required for BPSK signals, which in turn makes room for more users on the channel.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
This document discusses offset quadrature phase-shift keying (OQPSK) modulation. It begins by explaining the drawback of traditional quadrature phase-shift keying (QPSK), which is that both the in-phase and quadrature components change simultaneously, resulting in abrupt 180-degree phase changes and large spectral side lobes. It then introduces OQPSK modulation as a modification of QPSK where the quadrature component is offset by one bit period, preventing simultaneous changes in both components and replacing the 180-degree phase jumps with multiple 90-degree phase shifts. This results in better performance for applications using high power amplifiers or satellites. Diagrams are provided to illustrate the difference between the phase transitions of QPSK and O
M-ary encoding allows for digital signals with multiple possible conditions or voltage levels through the use of multiple binary variables. The number of conditions possible is represented by M, while the number of bits needed to produce those conditions is given by the logarithmic relationship N = log2M. M-ary PSK and M-ary QAM are two common types of M-ary encoding. M-ary PSK varies the phase of a carrier signal, while M-ary QAM varies both the amplitude and phase, allowing for greater power efficiency but identical bandwidth efficiency as M-ary PSK. Both modulation schemes use a constellation diagram to represent the multiple symbol states.
The document discusses receiver architecture and design requirements. It covers:
1. The receiver must provide high gain of 100dB while spread across RF, IF, and baseband stages to avoid instability. It must also be sensitive to weak signals down to -110dBm and reject strong adjacent channels.
2. A superheterodyne receiver is most common as it allows for sharper filters at IF to improve selectivity. Downconverting to IF also eases image filtering requirements.
3. Automatic gain control is needed to adjust the receiver gain over a wide range of input signal levels and fit them into the baseband processing range. It helps prevent compression from strong signals exceeding the 1dB compression point.
Phase-shift keying (PSK) is a digital modulation technique that conveys data by changing the phase of a carrier signal. There are three major classes of digital modulation: amplitude-shift keying, frequency-shift keying, and phase-shift keying. Quadrature phase-shift keying (QPSK) is a type of PSK that can either double the data rate compared to binary phase-shift keying (BPSK) while maintaining bandwidth, or maintain the BPSK data rate while halving the required bandwidth. QPSK works by splitting the binary data stream into in-phase and quadrature-phase components at the transmitter, and using matched filters or correlates to detect symbols at the receiver.
The document discusses phase-shift keying (PSK) modulation techniques. It begins with an introduction to PSK and how it uses phases to encode digital data. It then discusses binary phase-shift keying (BPSK) which uses two phases separated by 180 degrees to encode one bit per symbol. BPSK is robust but has a low data rate. Quadrature phase-shift keying (QPSK) is then introduced, which uses four phases separated by 90 degrees to encode two bits per symbol, doubling the data rate of BPSK. Implementations of BPSK and QPSK modulators and demodulators are provided along with diagrams of their constellation plots.
PCM is an important method of analog-to-digital conversion where an analog signal is converted into an electrical waveform of two or more levels. The essential operations in a PCM transmitter are sampling, quantizing, and coding the analog signal. In the receiver, the operations are regeneration, decoding, and demodulation of the quantized samples. Regenerative repeaters are used to reconstruct the transmitted sequence of coded pulses and perform equalization, timing, and decision making functions. While PCM systems allow for regeneration and multiplexing, they are more complex than analog methods and increase channel bandwidth requirements.
This document provides an overview of angle modulation techniques, specifically phase modulation (PM) and frequency modulation (FM). It defines angle modulation as a non-linear process where the modulated wave does not resemble the message wave but the amplitude remains constant. Basic concepts of PM and FM are explained, showing how the carrier signal's phase or frequency varies with the message signal. Equations are provided to define PM and FM. The bandwidth requirements for both techniques are also summarized, with Carson's rule stated for FM bandwidth.
1) The document discusses various digital modulation techniques including ASK, PSK, and FSK.
2) It provides details on the basic principles, modulation/demodulation methods, and spectra of these techniques.
3) Key aspects covered include the use of amplitude, phase, and frequency to encode digital signals for transmission, as well as synchronous and asynchronous detection methods.
The document compares M-ary PSK, FSK, and QAPSK modulation schemes. It finds that M-PSK has the lowest noise immunity while M-FSK has the highest. Bandwidth efficiency increases with M for M-PSK and M-QAPSK but decreases for M-FSK. Implementation complexity increases with M for M-PSK and M-FSK, but remains constant for M-QAPSK. Therefore, M-QAPSK has the best implementation properties in terms of complexity and cost for high values of M. In summary, the document analyzes and compares key characteristics of three modulation schemes.
Introduction to digital communication, base band system, formatting of textual data, MESSAGES, CHARACTERS, AND SYMBOLS, Example of Messages, Characters, and Symbols, Baseband Modulation, Intersymbol Interference
1. Digital modulation techniques are used to modulate digital information so that it can be transmitted via different mediums. Common digital modulation methods include binary amplitude shift keying (ASK), frequency shift keying (FSK), and phase shift keying (PSK).
2. FSK conveys information by changing the instantaneous frequency of a carrier wave. It is less susceptible to errors than ASK but has a larger spectrum bandwidth. PSK varies the phase of the transmitted signal. BPSK uses two phases while QPSK uses four phases.
3. The performance of digital modulation techniques can be compared using the energy per bit to noise power spectral density ratio (Eb/N0). Lower Eb/N0 values
This document discusses various digital modulation techniques. It begins by explaining binary amplitude-shift keying (ASK), where one amplitude encodes a 0 and another encodes a 1. It then discusses on-off keying (OOK) and multiple amplitude shift keying (MASK). Next, it covers frequency-shift keying (FSK), phase-shift keying (PSK), differential PSK, and quadrature PSK. It also discusses more advanced modulations like quadrature amplitude modulation (QAM), continuous phase modulation (CPM), and Gaussian minimum-shift keying. The document provides examples and discusses the pros, cons, and applications of different modulation schemes. It concludes by discussing a student project involving designing and analyzing a digital
A digital-to-analog converter (DAC) converts a digital code, usually binary, into an analog signal like voltage or current. It works opposite of an analog-to-digital converter. A DAC filters a sequence of impulses representing the digital input into a continuously varying output voltage. Key characteristics of DACs include resolution, offset and gain errors, and monotonicity. DACs are important because they allow digital devices like computers to interface with analog systems in the real world.
It is a digital representation of an analog signal that takes samples of the amplitude of the analog signal at regular intervals. The sampled analog data is changed to, and then represented by, binary data.
Wavelength-division multiplexing (WDM) is a technology that multiplexes multiple optical carrier signals onto a single optical fiber by using different wavelengths of laser light. Modern WDM systems can handle up to 160 signals and expand a basic 10 Gbit/s fiber system to a theoretical total capacity of over 1.6 Tbit/s. There are two main types: coarse WDM (CWDM) uses channel spacings of 20 nm while dense WDM (DWDM) uses narrower spacings of 0.4 nm, allowing DWDM to carry more channels. WDM reduces fiber plant requirements by allowing multiple connections over one fiber.
The document discusses the rake receiver, which is used to mitigate multipath fading effects in wireless communications. It operates by using multiple "fingers" to capture signal energy from different propagation paths. Each finger correlates the received signal with a reference signal and applies appropriate delays. The outputs of the fingers are then combined, such as by maximum ratio combining, to improve the overall signal quality by constructively adding the energy from different paths. The rake receiver allows energy from all propagation paths to be captured and combined, increasing the signal-to-noise ratio compared to a single propagation path.
This document discusses various wireless propagation channels including free space propagation, reflection, scattering, and diffraction. It covers reflection propagation mechanisms such as reflection from dielectrics and conductors. Reflection coefficients and Snell's law are explained. Models for reflection, including the two-ray ground reflection model, are provided. Diffraction models like knife-edge diffraction and multiple knife-edge diffraction using methods like Bollington's method are summarized. Scattering models including Kirchoff's theory and perturbation theory are covered. Common fading models for mobile radio like Rayleigh, Rician, and Doppler shift models are described. Finally, different types of wireless channels including time-selective, frequency-selective, general, and WSSUS channels are classified
EC 8395 - Communication Engineering - Unit 3 m - ary signalingKannanKrishnana
This document discusses M-ary digital modulation techniques. It begins by defining M-ary signaling as a technique where multiple bits are transmitted simultaneously using a single signal, instead of transmitting one bit at a time. It then provides the basic equation for calculating the number of possible conditions (M) based on the number of bits (N).
The document goes on to describe several common M-ary modulation techniques including M-ary PSK, M-ary QAM, and their basic principles and equations. It provides examples of 4-PSK, 8-PSK, 16-PSK, 8-QAM and 16-QAM, explaining their modulation/demodulation, constellations, and minimum bandwidth requirements. Finally, it compares several
This document provides an overview of information theory and coding concepts including:
1) Definitions of information, entropy, joint entropy, conditional entropy, and mutual information are introduced along with examples of calculating these quantities for discrete memoryless sources and channels.
2) Shannon's theorem for channel capacity is discussed and the channel capacity of a discrete memoryless channel is defined as the maximum mutual information over all possible input distributions.
3) Properties of entropy such as it being a measure of uncertainty, having a minimum of 0 and maximum of log2K, and being maximized when probabilities are equal are proven.
The Quadrature Phase Shift Keying QPSK is a variation of BPSK, and it is also a Double Side Band Suppressed Carrier DSBSC modulation scheme, which sends two bits of digital information at a time, called as bigits.
Instead of the conversion of digital bits into a series of digital stream, it converts them into bit pairs. This decreases the data bit rate to half, which allows space for the other users.
QPSK (Quadrature Phase Shift Keying) is type of phase shift keying. Unlike BPSK which is a DSBCS modulation scheme with digital information for the message, QPSK is also a DSBCS modulation scheme but it sends two bits of digital information a time (without the use of another carrier frequency).
The amount of radio frequency spectrum required to transmit QPSK reliably is half that required for BPSK signals, which in turn makes room for more users on the channel.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
This document discusses digital modulation techniques including PSK. It performed experiments in MATLAB to generate waveforms for BPSK and QPSK. For BPSK, the phase of the carrier shifts between two phases, 0 degrees and 180 degrees, representing binary 1 and 0. QPSK uses four phases, 0, 90, 180, and 270 degrees to encode pairs of bits. It was concluded that QPSK provides higher bandwidth efficiency than BPSK by transmitting twice as much data per symbol.
This document discusses the demodulation of differential binary phase shift keying (DPSK) using the VDSP++ 4.5 software and STEL-2110A chip circuitry. It describes the DPSK modulation technique and how a DPSK signal is generated. It then explains the demodulation process which involves multiplying the received signal with a delayed version, and integrating the output using a synchronous demodulator. The implementation uses the STEL-2110A chip which contains components like accumulators, timing discriminators, and numerically controlled oscillators to perform timing recovery and extract the transmitted data bits. Simulation results using the VDSP++ software and MATLAB generated test signals are also presented.
This document discusses hardware simulation of a QPSK modulator. It begins by introducing QPSK modulation and its applications in wireless communication systems due to its bandwidth efficiency and noise immunity. It then discusses a proposed hardware simulation of a QPSK modulator using Altera Quartus II software to reduce power consumption by eliminating unnecessary blocks. The proposed design stores phase-shifted carrier signals in a ROM rather than generating them, requiring fewer blocks. It is summarized that the proposed design aims to improve speed, area and power over conventional designs.
1. The document describes the hardware implementation of a QPSK modulator for satellite communication.
2. It discusses the design and simulation of the QPSK modulator in Matlab, and the implementation of the modulator on a Virtex-4 FPGA using VHDL.
3. The results show that the QPSK modulator was successfully implemented on the FPGA board and matched the simulated waveform and spectrum.
This document discusses various types of analog-to-digital converters (ADCs) and digital-to-analog converters (DACs). It describes the basic principles of operation for successive approximation (SAR) ADCs, resistor ladder DACs, and R-2R DACs. It also covers specifications for converters like resolution, speed, settling time, and linearity. Common applications that use DACs are also mentioned such as function generators, digital oscilloscopes, and video conversion.
1. This document discusses various analog modulation techniques used to transmit digital data, including ASK, FSK, PSK, and QAM.
2. It provides examples and explanations of how each technique works, such as varying the amplitude (ASK), frequency (FSK), or phase (PSK) of a carrier signal to represent the 1s and 0s of digital data.
3. QAM is described as a technique that modulates signals onto both the cosine (in-phase) and sine (quadrature-phase) components of a carrier, allowing it to encode multiple bits per symbol.
The document provides an overview of digital passband modulation techniques. It discusses binary modulation schemes including amplitude-shift keying (ASK), frequency-shift keying (FSK), and phase-shift keying (BPSK). It also covers differential phase-shift keying (DPSK), which removes phase ambiguity in BPSK using differential encoding and decoding. Key aspects like signal representation, spectrum, and detection methods are described for each technique.
FPGA implementation of universal modulator using CORDIC algorithm for commun...IJMER
This document describes an FPGA implementation of a universal modulator using a CORDIC algorithm for communication applications. It includes a block diagram and description of the key components of the CORDIC-based universal modulator, including a frequency register, phase accumulator, phase-to-amplitude converter, and modulation controllers for amplitude, frequency, and phase modulation. Simulation results from the ChipScope Pro analyzer are presented to verify the modulation effects from the controllers.
This document provides information about phase-shift keying (PSK) modulation techniques. It begins with an introduction to PSK and discusses how it conveys data by changing the phase of a carrier signal. It then describes the basic PSK techniques of binary phase-shift keying (BPSK) and quadrature phase-shift keying (QPSK). BPSK uses two phases separated by 180 degrees to encode one bit per symbol, while QPSK uses four phases separated by 90 degrees to encode two bits per symbol. The document discusses the implementation, modulation, demodulation, and advantages of these PSK techniques.
The document describes several types of analog-to-digital converters (ADCs): dual slope, flash, successive approximation, and sigma-delta. It explains the basic functioning of each type, including their key components and steps in the conversion process. For each ADC type, it provides a brief summary of their pros and cons in terms of speed, accuracy, cost, and resolution. The document serves to introduce the fundamental concepts and tradeoffs of different ADC architectures.
ASK, FSK, PSK, and QAM are common digital modulation techniques. ASK represents binary digits by transmitting different amplitude carrier waves. FSK uses different frequencies, while PSK and QAM vary the phase and amplitude of the carrier signal. PSK can be binary BPSK or quadrature QPSK using four phases. QAM combines amplitude and phase modulation for increased data capacity.
This document discusses analog to digital conversion and pulse width modulation.
It explains that analog signals from peripherals must be converted to digital signals the microcontroller can understand using an analog to digital converter (ADC). It also describes how pulse width modulation varies the duty cycle of a signal to control motor speed or other analog systems. Common applications like temperature measurement and motor control are provided as examples.
Comparative Study and Performance Analysis of different Modulation Techniques...Souvik Das
A comparative study and performance analysis of different modulation
techniques which shows graphically and comparative results Channel Noise
with Bit Error Rate of ASK, FSK, PSK and QPSK.
This presentation contain each and every single information on the topic.
If you like it do follow and like my presentation.
It would be worth my efforts.
The document summarizes key parameters of DVB-T2's OFDM transmission including:
1) It describes the number of carriers, IFFT size, symbol period, and bandwidth for each of DVB-T2's modes from 1K to 32K.
2) It explains that modulation patterns in DVB-T2 include QPSK, 16QAM, 64QAM, and 256QAM, with optional rotation of constellations.
3) It provides details on DVB-T2's frame structure, which begins with a P1 synchronization symbol followed by 1-16 P2 symbols carrying signaling data, and multiple payload symbols organized into physical layer pipes (PLPs).
A zigbee wireless sensor network and multiple way bus communication meduim ca...ranjitha mudhiraj
This document describes a system to transmit data from sensors to a receiver using both CAN and Zigbee communication protocols. It includes a temperature sensor, fire sensor, CAN controller and driver, Zigbee transmitter, and receiver connected to a PC. The system allows data from the sensors to be transmitted simultaneously over CAN and Zigbee to the receiver and PC. A block diagram shows the connections between components.
The document discusses different types of transistors including MOSFETs and BJTs. It then covers the basic construction and operation of MOSFETs and CMOS logic gates like inverters, NOR gates, and NAND gates. Decoder circuits are also summarized. The remainder discusses static hazards, output characteristics testing, and common logic interface levels.
The document provides an introduction to the AD9122 dual 16-bit 1200 MSPS transmitter DAC from Analog Devices. It has flexible LVDS interface, single-carrier W-CDMA ACLR of 82 dBc, and adjustable output current. It features a novel interpolator/complex modulator, digital gain/phase adjustment, and multiple synchronization interfaces. Key applications include wireless infrastructure equipment and wideband communications systems.
Similar to Design and implementation of qpsk modulator using digital subcarrier (20)
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
2. AGENDA
Overview of Satellite Communication
Overview of Digital Modulation
Description of QPSK Modulator
Steps of Project Implementation
Matlab Simulation of QPSK Modulator
Hardware Implementation of QPSK Modulator
Results
Conclusion
Future Scope
2
3. OVERVIEW OF SATELLITE COMMUNICATION
Digital Modulation
schemes are used in
Satellite Communication
Systems.
3
4. DIGITAL MODULATION
Digital Modulation
The aim of digital modulation is to transfer a digital bit stream over
an analog bandpass channel, for example over the public switched
telephone network (where a bandpass filter limits the frequency
range to between 300 and 3400 Hz), or over a limited radio
frequency band.
The purpose of digital modulation is to convert an information-
bearing discrete-time symbol into a continuous-time waveform.
The objective of a digital communication system is to transport
digital data between two or more nodes.
4
5. DIGITAL MODULATION
In communications, the analog signal shape, by pre-agreed convention,
stands for a certain number of bits and is called a symbol.
5
Digital information travels on analog carrier.
6. DIGITAL MODULATION
Bit Error Rate (BER): Better accuracy of the transmitted digital
signal is measured by BER. Simply put Bit Error Rate is:
The number of Error Bits
BER= ----------------------------
The total number of Bits
A lower Bit Error Rate implies that the signal has been more
accurately transmitted and demodulated.
A Bit Error Rate of one error in 10,000 Bits transmitted is quite
normal for modulated signals. After error correction is applied,
the Error further falls down to one part in 100,000 Million Bits. 6
7. DESCRIPTION OF QPSK MODULATION
Data
Phase Shift Keying :
BPSK
An M-phase PSK modulator puts
the phase of carrier into one of M -
states according to the value of a
input . QPSK
By increasing states , it can
transmit more data in same 8PSK
bandwidth
7
8. DESCRIPTION OF QPSK MODULATION
Quadrature Phase-Shift Keying (QPSK) is effectively two independent
BPSK systems (I-In phase and Q-Out of phase) and therefore exhibits
the same performance but twice the bandwidth efficiency.
Sometimes this is known as quaternary PSK, quadriphase PSK, 4-PSK,
or 4-QAM (although the root concepts of QPSK and QAM are different,
the resulting modulated radio wave are exactly the same.)
QPSK uses four points on the constellation diagram, equispaced
around a circle.
With 4 phases, QPSK can encode two bits per symbol to minimize the
BER – sometimes misperceived as twice the BER of BPSK.
8
9. DESCRIPTION OF QPSK MODULATION
More advanced modulation techniques convey multiple bits of
information simultaneously by providing multiple states in each
symbol of transmitted information. This helps transmit more digital
data.
Quadrature Phase-Shift Keying (QPSK) conveys 2 bits per symbol and
is prevalent in satellite communication.
Digital (DVB-S) satellite broadcasts universally use Phase
Modulation-actually QPSK
Satellite transmissions have a few unique characteristics
9
The signal has to travel an extremely large distance (36000 km)
from the ground to the satellite and then another similar distance
back to the earth.
10. Description of QPSK
Modulator
Block Diagram Constellation
sin ωct
Q - Signal
0 bit = 90 o
I data 01 bit =135 o 00 bit = 45 o
Modulator
Output
+
Q data
1 bit = 180 o
11 bit = 225 o 10 bit = 315 o
Cos ωct
10
1 bit = 270 o
11. Description of QPSK
Modulator
Equations Phasor Diagram
I Q I Mod Q Mod QPSK O/P QPSK
Data data O/P O/P O/P Q - Signal
Phase +cos ωct
0 0 sin ωct cos ωct sin ωct + cos ωct 45˚
= sin ( wct + 45 ) sin (ωct + 135 ) sin (ωct + 45 )
0 1 sin ωct -cos ωct sin ωct - cos ωct 135˚
= sin (ωct + 135)
I - Signal
1 0 - sin ωct cos ωct - sin ωct + cos ωct 315˚ -sin ωct +sin ωct
= sin (ω ct - 45 )
1 1 - sin ωct -cos ωct - sin ωct - cos ωct 225˚
sin (ωct - 135 )
= sin (ωct - 135 )
-cos ωct 11
14. LVDS DATA WITH LINE RECEIVER
LVDS is the abbreviation of Low Voltage Differential
Signaling.
It is an electrically digital signaling standard that
can run at very high speed over inexpensive twisted
pair copper cables.
It is a dual wire system which can running at 180°of
each other.
In our project we use DS90C032 3V LVDS Quad
CMOS Differential Line receiver.
14
15. FPGA
Here our motive is to provide complete digital
system and miniaturization of circuit so this can be
done using FPGA.
Here we provide only two Inputs, one is our
information and second is the sample clock We get
the Digital QPSK signal from the FPGA
The internal functions of FPGA is Data scrambling,
Differential coding,Convolutional encoding, Carrier
generation, mixing the data with carriers and finally
generate complete QPSK signal.
In this project we concentrate to use the
ProASIC3E FPGA devices part no:A3PE600
15
16. DAC(DIGITAL TO ANALOG
CONVERTER)
The output of FPGA is Digital QPSK signal.
To construct analog signal from this we must use
Digital to analog converter.
we use 10-bit current type DAC.
In our project we use 10-bit, 170 MSPS, AD9731
DAC.
16
17. SMOOTHING FILTER
Digitally modulated QPSK samples out from DAC is
a stair case type.
There need to be smoothened by a smoothing filter
to have a analog look of the modulated signal.
The center frequency is 1.024 MHz with symbol
rate 512 K bits/s, in order to preserve the main lobe
while smoothing.
For our application we develop fifth order
Butterworth low pass filter
17
18. BIPOLAR CONVERTER
The DAC output is current type with an offset in the
-ve direction because the DAC output is ECL type.
PSK or QPSK is suppressed carrier modulated
system.
Carrier suppression is possible only if there is no
DC in the data, this requires conversion of QPSK
samples to be converted into bipolar type so that
there is no overall DC so bipolar converter circuit
serve this purpose
18
19. SUB CARRIER GENERATION USING
FPGA
The main part is generation of carriers means sine
and cosine signals. These signals are generated at
1.024 MHz.
These signals are generated inside the FPGA using
the quantized value of samples of both signals.
There are several techniques to generate sine and
cosine wave digitally.
Its called NCO (Numerically Controlled Oscillator)
19
20. SUB CARRIER GENERATION USING
FPGA
There are several techniques to implement NCO
1. LUT Based NCO
2. CORDIC Based NCO
3. Xilinx ROM Based NCO
Among all these we implement LUT based NCO for
our application.
In this technique a NCO consists of a lookup table
made up of quantized sinusoidal sample
values(usually implemented as a read only
memory, ROM), a binary counter for addressing the
ROM, and a clock signal to drive the counter. 20
23. MATLAB SIMULATION RESULTS
As per flow diagram COSINE and SINE carriers for
I and Q data respectively are generated.
The sub carriers with frequency 1.024 MHz and 24
samples per cycle are generated.
There are 4 cycles per symbols are necessary to
modulate incoming data. These carriers are first
multiplex with the I and Q data and than added
together in single FPGA.
23
24. HARDWARE REALIZATION
In hardware realization we use Actel kit with
ProASIC3000 FPGA. In this kit we load our
program which is written in verilog. The Actel Kit is
shown below:
24
25. RESULT
The output of kit is shown in logic analyzer. Here in
Actel kit Scrambler, Differential encoder,
Convolutional coder and subcarrier generator are
implemented. The setup of this implementation with
results are shown below. And as per output which is
shown in figure there is no phase and amplitude
imbalance between sin and cosine subcarriers.
25
26. CONCLUSION
In this modulator , analog components like local
oscillator and mixer are completely eliminated
which are frequency and temperature sensitive.
Here all the functions are performed by single
FPGA. So the limitations of modulator are
completely removed for satellite communication.
For the satellite communication PCB size is also
important parameter and using this new approach
number of component count is less and ultimately
size of PCB is become small.
26