SlideShare a Scribd company logo
5.1
Chapter 5
Analog Transmission
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
5.2
5-1 DIGITAL-TO-ANALOG CONVERSION5-1 DIGITAL-TO-ANALOG CONVERSION
Digital-to-analogDigital-to-analog conversion is the process ofconversion is the process of
changing one of the characteristics of an analogchanging one of the characteristics of an analog
signal based on the information in digital data.signal based on the information in digital data.
 Aspects of Digital-to-Analog Conversion
 Amplitude Shift Keying
 Frequency Shift Keying
 Phase Shift Keying
 Quadrature Amplitude Modulation
Topics discussed in this section:Topics discussed in this section:
5.3
Digital to Analog Conversion
 Digital data needs to be carried on an
analog signal.
 A carrier signal (frequency fc) performs
the function of transporting the digital
data in an analog waveform.
 The analog carrier signal is manipulated
to uniquely identify the digital data being
carried.
5.4
Figure 5.1 Digital-to-analog conversion
5.5
Figure 5.2 Types of digital-to-analog conversion
5.6
Bit rate, N, is the number of bits per
second (bps). Baud rate is the number
of signal
elements per second (bauds).
In the analog transmission of digital
data, the signal or baud rate is less than
or equal to the bit rate.
S=Nx1/r bauds
Where r is the number of data bits per
signal element.
Note
5.7
An analog signal carries 4 bits per signal element. If
1000 signal elements are sent per second, find the bit
rate.
Solution
In this case, r = 4, S = 1000, and N is unknown. We can
find the value of N from
Example 5.1
5.8
Example 5.2
An analog signal has a bit rate of 8000 bps and a baud
rate of 1000 baud. How many data elements are
carried by each signal element? How many signal
elements do we need?
Solution
In this example, S = 1000, N = 8000, and r and L are
unknown. We find first the value of r and then the value
of L.
5.9
Amplitude Shift Keying (ASK)
 ASK is implemented by changing the
amplitude of a carrier signal to reflect
amplitude levels in the digital signal.
 For example: a digital “1” could not affect the
signal, whereas a digital “0” would, by making
it zero.
 The line encoding will determine the values of
the analog waveform to reflect the digital data
being carried.
5.10
Bandwidth of ASK
 The bandwidth B of ASK is proportional
to the signal rate S.
B = (1+d)S
 “d” is due to modulation and filtering,
lies between 0 and 1.
5.11
Figure 5.3 Binary amplitude shift keying
5.12
Figure 5.4 Implementation of binary ASK
5.13
Example 5.3
We have an available bandwidth of 100 kHz which
spans from 200 to 300 kHz. What are the carrier
frequency and the bit rate if we modulated our data by
using ASK with d = 1?
Solution
The middle of the bandwidth is located at 250 kHz. This
means that our carrier frequency can be at fc = 250 kHz.
We can use the formula for bandwidth to find the bit rate
(with d = 1 and r = 1).
5.14
Example 5.4
In data communications, we normally use full-duplex
links with communication in both directions. We need
to divide the bandwidth into two with two carrier
frequencies, as shown in Figure 5.5. The figure shows
the positions of two carrier frequencies and the
bandwidths. The available bandwidth for each
direction is now 50 kHz, which leaves us with a data
rate of 25 kbps in each direction.
5.15
Figure 5.5 Bandwidth of full-duplex ASK used in Example 5.4
5.16
Frequency Shift Keying
 The digital data stream changes the
frequency of the carrier signal, fc.
 For example, a “1” could be
represented by f1=fc +∆f, and a “0” could
be represented by f2=fc-∆f.
5.17
Figure 5.6 Binary frequency shift keying
5.18
Bandwidth of FSK
 If the difference between the two
frequencies (f1 and f2) is 2∆f, then the
required BW B will be:
B = (1+d)xS +2∆f
5.19
Example 5.5
We have an available bandwidth of 100 kHz which
spans from 200 to 300 kHz. What should be the carrier
frequency and the bit rate if we modulated our data by
using FSK with d = 1?
Solution
This problem is similar to Example 5.3, but we are
modulating by using FSK. The midpoint of the band is at
250 kHz. We choose 2 f to be 50 kHz; this meansΔ
5.20
Coherent and Non Coherent
 In a non-coherent FSK scheme, when
we change from one frequency to the
other, we do not adhere to the current
phase of the signal.
 In coherent FSK, the switch from one
frequency signal to the other only
occurs at the same phase in the signal.
5.21
Multi level FSK
 Similarly to ASK, FSK can use multiple
bits per signal element.
 That means we need to provision for
multiple frequencies, each one to
represent a group of data bits.
 The bandwidth for FSK can be higher
B = (1+d)xS + (L-1)/2∆f = LxS
5.22
Figure 5.7 Bandwidth of MFSK used in Example 5.6
5.23
Example 5.6
We need to send data 3 bits at a time at a bit rate of 3
Mbps. The carrier frequency is 10 MHz. Calculate the
number of levels (different frequencies), the baud rate,
and the bandwidth.
Solution
We can have L = 23
= 8. The baud rate is S = 3 Mbps/3 =
1 Mbaud. This means that the carrier frequencies must be
1 MHz apart (2 f = 1 MHz). The bandwidth is B = 8 ×Δ
1M = 8M. Figure 5.8 shows the allocation of frequencies
and bandwidth.
5.24
Figure 5.8 Bandwidth of MFSK used in Example 5.6
5.25
Phase Shift Keyeing
 We vary the phase shift of the carrier
signal to represent digital data.
 The bandwidth requirement, B is:
B = (1+d)xS
 PSK is much more robust than ASK as
it is not that vulnerable to noise, which
changes amplitude of the signal.
5.26
Figure 5.9 Binary phase shift keying
5.27
Figure 5.10 Implementation of BASK
5.28
Quadrature PSK
 To increase the bit rate, we can code 2 or
more bits onto one signal element.
 In QPSK, we parallelize the bit stream so that
every two incoming bits are split up and PSK
a carrier frequency. One carrier frequency is
phase shifted 90o
from the other - in
quadrature.
 The two PSKed signals are then added to
produce one of 4 signal elements. L = 4 here.
5.29
Figure 5.11 QPSK and its implementation
5.30
Example 5.7
Find the bandwidth for a signal transmitting at 12
Mbps for QPSK. The value of d = 0.
Solution
For QPSK, 2 bits is carried by one signal element. This
means that r = 2. So the signal rate (baud rate) is S = N ×
(1/r) = 6 Mbaud. With a value of d = 0, we have B = S = 6
MHz.
5.31
Constellation Diagrams
 A constellation diagram helps us to
define the amplitude and phase of a
signal when we are using two carriers,
one in quadrature of the other.
 The X-axis represents the in-phase
carrier and the Y-axis represents
quadrature carrier.
5.32
Figure 5.12 Concept of a constellation diagram
5.33
Example 5.8
Show the constellation diagrams for an ASK (OOK),
BPSK, and QPSK signals.
Solution
Figure 5.13 shows the three constellation diagrams.
5.34
Figure 5.13 Three constellation diagrams
5.35
Quadrature amplitude modulation is a
combination of ASK and PSK.
Note
5.36
Figure 5.14 Constellation diagrams for some QAMs

More Related Content

What's hot

Digital to Analog Conversion
Digital to Analog ConversionDigital to Analog Conversion
Digital to Analog Conversion
Soumen Santra
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Analog and Digital Transmission
Analog and Digital TransmissionAnalog and Digital Transmission
Analog and Digital Transmission
Anushiya Ram
 
Data transmission
Data transmissionData transmission
Multiplexing
MultiplexingMultiplexing
Multiplexing
Aman Jaiswal
 
Chapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionChapter 4 - Digital Transmission
Chapter 4 - Digital Transmission
Wayne Jones Jnr
 
Task communication
Task communicationTask communication
Task communication
1jayanti
 
Digital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling TechniquesDigital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling Techniques
Biplap Bhattarai
 
Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
Synchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionSynchronous and Asynchronous Transmission
Synchronous and Asynchronous Transmission
Adeel Rasheed
 
Source coding
Source coding Source coding
Source coding
Shankar Gangaju
 
Addressing modes of 8086
Addressing modes of 8086Addressing modes of 8086
Addressing modes of 8086
saurav kumar
 
UNIT-3 : CHANNEL CODING
UNIT-3 : CHANNEL CODINGUNIT-3 : CHANNEL CODING
UNIT-3 : CHANNEL CODING
abhishek reddy
 
DATA RATE LIMITS
DATA RATE LIMITSDATA RATE LIMITS
DATA RATE LIMITS
ChAwais15
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
VijayaLakshmi514
 
Comparsion of M-Ary psk,fsk,qapsk.pptx
Comparsion of M-Ary psk,fsk,qapsk.pptxComparsion of M-Ary psk,fsk,qapsk.pptx
Comparsion of M-Ary psk,fsk,qapsk.pptx
keshav11845
 
Modulation techniques
Modulation techniquesModulation techniques
Modulation techniques
Sathish Kumar
 
Amplitude shift keying
Amplitude shift keyingAmplitude shift keying
Amplitude shift keying
Sunny Kumar
 

What's hot (20)

Digital to Analog Conversion
Digital to Analog ConversionDigital to Analog Conversion
Digital to Analog Conversion
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Analog and Digital Transmission
Analog and Digital TransmissionAnalog and Digital Transmission
Analog and Digital Transmission
 
Data transmission
Data transmissionData transmission
Data transmission
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Chapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionChapter 4 - Digital Transmission
Chapter 4 - Digital Transmission
 
Task communication
Task communicationTask communication
Task communication
 
Digital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling TechniquesDigital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling Techniques
 
Ch 06
Ch 06Ch 06
Ch 06
 
Data link layer
Data link layer Data link layer
Data link layer
 
Synchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionSynchronous and Asynchronous Transmission
Synchronous and Asynchronous Transmission
 
Source coding
Source coding Source coding
Source coding
 
Addressing modes of 8086
Addressing modes of 8086Addressing modes of 8086
Addressing modes of 8086
 
UNIT-3 : CHANNEL CODING
UNIT-3 : CHANNEL CODINGUNIT-3 : CHANNEL CODING
UNIT-3 : CHANNEL CODING
 
DATA RATE LIMITS
DATA RATE LIMITSDATA RATE LIMITS
DATA RATE LIMITS
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Comparsion of M-Ary psk,fsk,qapsk.pptx
Comparsion of M-Ary psk,fsk,qapsk.pptxComparsion of M-Ary psk,fsk,qapsk.pptx
Comparsion of M-Ary psk,fsk,qapsk.pptx
 
Modulation techniques
Modulation techniquesModulation techniques
Modulation techniques
 
Amplitude shift keying
Amplitude shift keyingAmplitude shift keying
Amplitude shift keying
 

Viewers also liked

DAC , Digital to analog Converter
DAC , Digital to analog ConverterDAC , Digital to analog Converter
DAC , Digital to analog Converter
Hossam Zein
 
DAC-digital to analog converter
DAC-digital to analog converterDAC-digital to analog converter
DAC-digital to analog converter
Shazid Reaj
 
Analog to digital conversion
Analog to digital conversionAnalog to digital conversion
Analog to digital conversionEngr Ahmad Khan
 
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTERANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
Sripati Mahapatra
 
Analog to Digital Converter
Analog to Digital ConverterAnalog to Digital Converter
Analog to Digital ConverterRonak Machhi
 
ADC and DAC Best Ever Pers
ADC and DAC Best Ever PersADC and DAC Best Ever Pers
ADC and DAC Best Ever Pers
Eng Ahmed Salad Osman
 
Analog to digital converter
Analog to digital converterAnalog to digital converter
Analog to digital converter
Ashutosh Jaiswal
 
adc converter basics
adc converter basicsadc converter basics
adc converter basicshacker1500
 
Chap 5 analog transmission
Chap 5 analog transmissionChap 5 analog transmission
Chap 5 analog transmission
Mukesh Tekwani
 
Analog to Digital , Digital to Analog Conversion
Analog to Digital , Digital to Analog ConversionAnalog to Digital , Digital to Analog Conversion
Analog to Digital , Digital to Analog Conversion
Kunj Patel
 
Analog to analog conversion - Amplitude modulation
Analog to analog conversion - Amplitude modulationAnalog to analog conversion - Amplitude modulation
Analog to analog conversion - Amplitude modulation
Subashini Pandiarajan
 
Dcn a03-analog transmission
Dcn a03-analog transmissionDcn a03-analog transmission
Dcn a03-analog transmissionSaurabh Daga
 
Data Encoding
Data EncodingData Encoding
Data EncodingLuka M G
 
Line coding
Line coding Line coding
Line coding
Ravindra Rathore
 
Analog to Digital Conversion
Analog to Digital ConversionAnalog to Digital Conversion
Analog to Digital Conversion
Syed Umair
 
Analog and digital signals
Analog and digital signalsAnalog and digital signals
Analog and digital signals
teja reddy
 
Chapter 3 - Data and Signals
Chapter 3 - Data and SignalsChapter 3 - Data and Signals
Chapter 3 - Data and Signals
Wayne Jones Jnr
 
Analog-to-Digital Conversion Process
Analog-to-Digital Conversion Process Analog-to-Digital Conversion Process
Analog-to-Digital Conversion Process riley Mcclaflin
 

Viewers also liked (20)

DAC , Digital to analog Converter
DAC , Digital to analog ConverterDAC , Digital to analog Converter
DAC , Digital to analog Converter
 
DAC-digital to analog converter
DAC-digital to analog converterDAC-digital to analog converter
DAC-digital to analog converter
 
Analog to digital conversion
Analog to digital conversionAnalog to digital conversion
Analog to digital conversion
 
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTERANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
 
Analog to Digital Converter
Analog to Digital ConverterAnalog to Digital Converter
Analog to Digital Converter
 
ADC and DAC Best Ever Pers
ADC and DAC Best Ever PersADC and DAC Best Ever Pers
ADC and DAC Best Ever Pers
 
Analog to digital converter
Analog to digital converterAnalog to digital converter
Analog to digital converter
 
adc converter basics
adc converter basicsadc converter basics
adc converter basics
 
Chap 5 analog transmission
Chap 5 analog transmissionChap 5 analog transmission
Chap 5 analog transmission
 
Analog to Digital , Digital to Analog Conversion
Analog to Digital , Digital to Analog ConversionAnalog to Digital , Digital to Analog Conversion
Analog to Digital , Digital to Analog Conversion
 
Analog to analog conversion - Amplitude modulation
Analog to analog conversion - Amplitude modulationAnalog to analog conversion - Amplitude modulation
Analog to analog conversion - Amplitude modulation
 
Adc dac converter
Adc dac converterAdc dac converter
Adc dac converter
 
Dcn a03-analog transmission
Dcn a03-analog transmissionDcn a03-analog transmission
Dcn a03-analog transmission
 
Data Encoding
Data EncodingData Encoding
Data Encoding
 
Line coding
Line coding Line coding
Line coding
 
Analog to Digital Conversion
Analog to Digital ConversionAnalog to Digital Conversion
Analog to Digital Conversion
 
Analog and digital signals
Analog and digital signalsAnalog and digital signals
Analog and digital signals
 
Chapter 3 - Data and Signals
Chapter 3 - Data and SignalsChapter 3 - Data and Signals
Chapter 3 - Data and Signals
 
Analog-to-Digital Conversion Process
Analog-to-Digital Conversion Process Analog-to-Digital Conversion Process
Analog-to-Digital Conversion Process
 
Analog to-digital conversion
Analog to-digital conversionAnalog to-digital conversion
Analog to-digital conversion
 

Similar to Digital to analog conversion

Analog transmission
Analog transmissionAnalog transmission
Analog transmission
Engr Ginna
 
ch5_1_v1.ppt
ch5_1_v1.pptch5_1_v1.ppt
ch5_1_v1.ppt
AryanBansal33
 
Chapter 5 of Data communications and.ppt
Chapter 5 of Data communications and.pptChapter 5 of Data communications and.ppt
Chapter 5 of Data communications and.ppt
chinnuaditya121
 
Ch5 Data communication and networking by neha g. kurale
Ch5 Data communication and networking by neha g. kuraleCh5 Data communication and networking by neha g. kurale
Ch5 Data communication and networking by neha g. kurale
Neha Kurale
 
Chapter_5.pptx
Chapter_5.pptxChapter_5.pptx
Chapter_5.pptx
braaabgg
 
LECTURE-5 (Data Communication) ~www.fida.com.bd
LECTURE-5 (Data Communication) ~www.fida.com.bdLECTURE-5 (Data Communication) ~www.fida.com.bd
LECTURE-5 (Data Communication) ~www.fida.com.bd
QUT (Queensland University of Technology)
 
Operating System Concepts - Ch05
Operating System Concepts - Ch05Operating System Concepts - Ch05
Operating System Concepts - Ch05Wayne Jones Jnr
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
Faisal Mehmood
 
Analog Transmissions
Analog TransmissionsAnalog Transmissions
Analog TransmissionsTechiNerd
 
Chapter 5 analog transmission computer_network
Chapter 5 analog transmission  computer_networkChapter 5 analog transmission  computer_network
Chapter 5 analog transmission computer_network
Dhairya Joshi
 
05 Analog Transmission
05 Analog Transmission05 Analog Transmission
05 Analog Transmission
Ahmar Hashmi
 
Analog Transmission.ppt
Analog Transmission.pptAnalog Transmission.ppt
Analog Transmission.ppt
TamiratDejene1
 
ch05.ppt
ch05.pptch05.ppt
cn ch05.ppt
cn ch05.pptcn ch05.ppt
cn ch05.ppt
SajjaSriLavanya
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
abdnazar2003
 
Digital Modulation
Digital ModulationDigital Modulation
Digital Modulation
ApoorvaPardhi
 
Lecture 9 5th_ed data com
Lecture  9 5th_ed data comLecture  9 5th_ed data com
Lecture 9 5th_ed data com
Anar Gul
 
Analog Transmition
Analog TransmitionAnalog Transmition
Analog Transmition
Ali Raxa
 
Analog signals
Analog signalsAnalog signals
Analog signals
Ntuthuzelo Mbili
 

Similar to Digital to analog conversion (20)

Analog transmission
Analog transmissionAnalog transmission
Analog transmission
 
ch5_1_v1.ppt
ch5_1_v1.pptch5_1_v1.ppt
ch5_1_v1.ppt
 
Chapter 5 of Data communications and.ppt
Chapter 5 of Data communications and.pptChapter 5 of Data communications and.ppt
Chapter 5 of Data communications and.ppt
 
Ch5 Data communication and networking by neha g. kurale
Ch5 Data communication and networking by neha g. kuraleCh5 Data communication and networking by neha g. kurale
Ch5 Data communication and networking by neha g. kurale
 
Chapter_5.pptx
Chapter_5.pptxChapter_5.pptx
Chapter_5.pptx
 
LECTURE-5 (Data Communication) ~www.fida.com.bd
LECTURE-5 (Data Communication) ~www.fida.com.bdLECTURE-5 (Data Communication) ~www.fida.com.bd
LECTURE-5 (Data Communication) ~www.fida.com.bd
 
Operating System Concepts - Ch05
Operating System Concepts - Ch05Operating System Concepts - Ch05
Operating System Concepts - Ch05
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Analog Transmissions
Analog TransmissionsAnalog Transmissions
Analog Transmissions
 
Ch05
Ch05Ch05
Ch05
 
Chapter 5 analog transmission computer_network
Chapter 5 analog transmission  computer_networkChapter 5 analog transmission  computer_network
Chapter 5 analog transmission computer_network
 
05 Analog Transmission
05 Analog Transmission05 Analog Transmission
05 Analog Transmission
 
Analog Transmission.ppt
Analog Transmission.pptAnalog Transmission.ppt
Analog Transmission.ppt
 
ch05.ppt
ch05.pptch05.ppt
ch05.ppt
 
cn ch05.ppt
cn ch05.pptcn ch05.ppt
cn ch05.ppt
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 
Digital Modulation
Digital ModulationDigital Modulation
Digital Modulation
 
Lecture 9 5th_ed data com
Lecture  9 5th_ed data comLecture  9 5th_ed data com
Lecture 9 5th_ed data com
 
Analog Transmition
Analog TransmitionAnalog Transmition
Analog Transmition
 
Analog signals
Analog signalsAnalog signals
Analog signals
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Digital to analog conversion

  • 1. 5.1 Chapter 5 Analog Transmission Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 5.2 5-1 DIGITAL-TO-ANALOG CONVERSION5-1 DIGITAL-TO-ANALOG CONVERSION Digital-to-analogDigital-to-analog conversion is the process ofconversion is the process of changing one of the characteristics of an analogchanging one of the characteristics of an analog signal based on the information in digital data.signal based on the information in digital data.  Aspects of Digital-to-Analog Conversion  Amplitude Shift Keying  Frequency Shift Keying  Phase Shift Keying  Quadrature Amplitude Modulation Topics discussed in this section:Topics discussed in this section:
  • 3. 5.3 Digital to Analog Conversion  Digital data needs to be carried on an analog signal.  A carrier signal (frequency fc) performs the function of transporting the digital data in an analog waveform.  The analog carrier signal is manipulated to uniquely identify the digital data being carried.
  • 5. 5.5 Figure 5.2 Types of digital-to-analog conversion
  • 6. 5.6 Bit rate, N, is the number of bits per second (bps). Baud rate is the number of signal elements per second (bauds). In the analog transmission of digital data, the signal or baud rate is less than or equal to the bit rate. S=Nx1/r bauds Where r is the number of data bits per signal element. Note
  • 7. 5.7 An analog signal carries 4 bits per signal element. If 1000 signal elements are sent per second, find the bit rate. Solution In this case, r = 4, S = 1000, and N is unknown. We can find the value of N from Example 5.1
  • 8. 5.8 Example 5.2 An analog signal has a bit rate of 8000 bps and a baud rate of 1000 baud. How many data elements are carried by each signal element? How many signal elements do we need? Solution In this example, S = 1000, N = 8000, and r and L are unknown. We find first the value of r and then the value of L.
  • 9. 5.9 Amplitude Shift Keying (ASK)  ASK is implemented by changing the amplitude of a carrier signal to reflect amplitude levels in the digital signal.  For example: a digital “1” could not affect the signal, whereas a digital “0” would, by making it zero.  The line encoding will determine the values of the analog waveform to reflect the digital data being carried.
  • 10. 5.10 Bandwidth of ASK  The bandwidth B of ASK is proportional to the signal rate S. B = (1+d)S  “d” is due to modulation and filtering, lies between 0 and 1.
  • 11. 5.11 Figure 5.3 Binary amplitude shift keying
  • 13. 5.13 Example 5.3 We have an available bandwidth of 100 kHz which spans from 200 to 300 kHz. What are the carrier frequency and the bit rate if we modulated our data by using ASK with d = 1? Solution The middle of the bandwidth is located at 250 kHz. This means that our carrier frequency can be at fc = 250 kHz. We can use the formula for bandwidth to find the bit rate (with d = 1 and r = 1).
  • 14. 5.14 Example 5.4 In data communications, we normally use full-duplex links with communication in both directions. We need to divide the bandwidth into two with two carrier frequencies, as shown in Figure 5.5. The figure shows the positions of two carrier frequencies and the bandwidths. The available bandwidth for each direction is now 50 kHz, which leaves us with a data rate of 25 kbps in each direction.
  • 15. 5.15 Figure 5.5 Bandwidth of full-duplex ASK used in Example 5.4
  • 16. 5.16 Frequency Shift Keying  The digital data stream changes the frequency of the carrier signal, fc.  For example, a “1” could be represented by f1=fc +∆f, and a “0” could be represented by f2=fc-∆f.
  • 17. 5.17 Figure 5.6 Binary frequency shift keying
  • 18. 5.18 Bandwidth of FSK  If the difference between the two frequencies (f1 and f2) is 2∆f, then the required BW B will be: B = (1+d)xS +2∆f
  • 19. 5.19 Example 5.5 We have an available bandwidth of 100 kHz which spans from 200 to 300 kHz. What should be the carrier frequency and the bit rate if we modulated our data by using FSK with d = 1? Solution This problem is similar to Example 5.3, but we are modulating by using FSK. The midpoint of the band is at 250 kHz. We choose 2 f to be 50 kHz; this meansΔ
  • 20. 5.20 Coherent and Non Coherent  In a non-coherent FSK scheme, when we change from one frequency to the other, we do not adhere to the current phase of the signal.  In coherent FSK, the switch from one frequency signal to the other only occurs at the same phase in the signal.
  • 21. 5.21 Multi level FSK  Similarly to ASK, FSK can use multiple bits per signal element.  That means we need to provision for multiple frequencies, each one to represent a group of data bits.  The bandwidth for FSK can be higher B = (1+d)xS + (L-1)/2∆f = LxS
  • 22. 5.22 Figure 5.7 Bandwidth of MFSK used in Example 5.6
  • 23. 5.23 Example 5.6 We need to send data 3 bits at a time at a bit rate of 3 Mbps. The carrier frequency is 10 MHz. Calculate the number of levels (different frequencies), the baud rate, and the bandwidth. Solution We can have L = 23 = 8. The baud rate is S = 3 Mbps/3 = 1 Mbaud. This means that the carrier frequencies must be 1 MHz apart (2 f = 1 MHz). The bandwidth is B = 8 ×Δ 1M = 8M. Figure 5.8 shows the allocation of frequencies and bandwidth.
  • 24. 5.24 Figure 5.8 Bandwidth of MFSK used in Example 5.6
  • 25. 5.25 Phase Shift Keyeing  We vary the phase shift of the carrier signal to represent digital data.  The bandwidth requirement, B is: B = (1+d)xS  PSK is much more robust than ASK as it is not that vulnerable to noise, which changes amplitude of the signal.
  • 26. 5.26 Figure 5.9 Binary phase shift keying
  • 28. 5.28 Quadrature PSK  To increase the bit rate, we can code 2 or more bits onto one signal element.  In QPSK, we parallelize the bit stream so that every two incoming bits are split up and PSK a carrier frequency. One carrier frequency is phase shifted 90o from the other - in quadrature.  The two PSKed signals are then added to produce one of 4 signal elements. L = 4 here.
  • 29. 5.29 Figure 5.11 QPSK and its implementation
  • 30. 5.30 Example 5.7 Find the bandwidth for a signal transmitting at 12 Mbps for QPSK. The value of d = 0. Solution For QPSK, 2 bits is carried by one signal element. This means that r = 2. So the signal rate (baud rate) is S = N × (1/r) = 6 Mbaud. With a value of d = 0, we have B = S = 6 MHz.
  • 31. 5.31 Constellation Diagrams  A constellation diagram helps us to define the amplitude and phase of a signal when we are using two carriers, one in quadrature of the other.  The X-axis represents the in-phase carrier and the Y-axis represents quadrature carrier.
  • 32. 5.32 Figure 5.12 Concept of a constellation diagram
  • 33. 5.33 Example 5.8 Show the constellation diagrams for an ASK (OOK), BPSK, and QPSK signals. Solution Figure 5.13 shows the three constellation diagrams.
  • 34. 5.34 Figure 5.13 Three constellation diagrams
  • 35. 5.35 Quadrature amplitude modulation is a combination of ASK and PSK. Note
  • 36. 5.36 Figure 5.14 Constellation diagrams for some QAMs