EE516 Chapter2
EE516 Chapter2
2.1 Introduction
  1. The transmitted power can be concentrated into short bursts rather than being
     delivered continuously.
  2. The time interval between pulses can be filled with sample values from other
     messages, thereby permitting the transmission of many messages on one com-
     munication system.
   The other difference between pulse and and CW modulation is the pulse wave
may contain appreciable DC and low frequency content. Thus pulse modulation
is a message processing technique rather than modulation in the usual sense since
Communication Systems I, First Edition.                                           9
By Osama A. Alkishriwo Copyright c 2019 John Wiley & Sons, Inc.
10     REVIEW OF DIGITAL MODULATION SCHEMES
   In general pulse modulated waves have appreciable DC and low frequency con-
tent. Direct transmission may therefore be difficult. Hence ,most pulse systems have
a carrier modulation step in which the pulses are converted to radio frequency pulses.
Figure 2.2 shows a complete pulse transmission system.
                                                         DIGITAL PULSE MODULATION     11
(a)
(b)
    where fc >> fs and mp (t) is pulse modulated signal, v(t) is a DSB and therefore
envelope detection can be employed at the receiver if mp (t) ≥ 0 and no carrier phase
reversal.
    For pulse resolution, the required baseband bandwidth is at least 1/2τ , where τ
is the nominal pulse duration. The practical advantage of pulse modulation depends
on the pulse duration being small compared to the time interval between pulses, Ts ,
i.e. τ << Ts ≤ 1/2W , where W is the maximum frequency content of the message
signal. Thus the baseband transmission bandwidth B is given as
                                       1
                                B≥       >> W                                       (2.2)
                                      2τ
and the transmission bandwidth for carrier modulation is
                                           1
                            BT = 2B ≥        >> 2W                                  (2.3)
                                           τ
In digital pulse modulation, the message signal is represented using a coded group
of digital (discrete amplitude) pulses. The techniques used to generate such digital
pulses are: Pulse code modulation (PCM), delta modulation (DM), and differential
pulse code modulation (DPCM).
The most common form of PCM is binary PCM for which µ = 2, and the number
of quantizer levels is some powers of 2, that is Q = 2n . Because several digits are
required for each message sample, the PCM bandwidth will be much greater than
the message bandwidth. The PCM bandwidth can written as
                              nfs
                        B≥        = nW = W logµ (Q)                             (2.5)
                               2
This means that the baseband PCM bandwidth is at least n times the message band-
width W . PCM is not susceptible to noise as CW systems. But the quantization
noise is the basic limitation of PCM systems which can be reduced by increasing the
number of quantizer levels Q. Thus, the signal–to–quantization noise power for the
case of uniform quantization is given by
SNR = 6 n dB (2.7)
   Thus the SNR increases by increasing n, at the same time the bandwidth, will
also increase. However, the SNR increases more rapidly than the bandwidth, giving
trade–off relationship between them. Of course if the bandwidth is too large, the
error rate at the demodulator output will be increased because of channel noise for a
specified signal level.
(a)
(b)
slope of m(t) is more than the slope of m̃(t). The sufficient condition for no slope
overload is
                                                        2πW A
                      ∆fs ≥ 2πW A or fs >                                               (2.8)
                                                          ∆
where W is the message bandwidth and A is the maximum amplitude of the signal
m(t). We can find the transmission bandwidth for DM system as
                                             fs
                                    B≥                                                  (2.9)
                                             2
   The mean square value of the quantization noise in DM is ∆2 /3. It is often as-
sumed that the power spectral density of the quantization noise is that of bandlimited
white noise, i.e. it is constant up to frequency fs and zero beyond that. Then, the
signal–to–quantization noise is given by:
                                                      3
                                       3          fs
                             SNR =                                                     (2.10)
                                      8π 2        W
(a)
(b)
 2. Bandwidth requirements
    With the use of PCM, speech transmission is found to be of good quality when
    f s = 8 kHz and n = 8. The corresponding bit rate is 64 kbps. To obtain
    comparable quality using DM, the sampling rate has been shown to be about
    100 kHz. However, it has been later shown that with continuous variable slope
    DM it is possible to achieve good signal quality at about 32 kbps.
                                                            DIGITAL PULSE MODULATION      15
 3. Equipment complexity
    The hardware required to implement DM is much simpler than that required
    for implementing PCM. Single integrated circuit chips (continuously-variable
    step DM) called CODECS are rapidly becoming available. In comparison PCM
    coder/decoders require two chips for implementation: one for processing the
    analog signal and the second for encoding the sampled analog signal. Thus the
    PCM hardware is more expensive than DM hardware.
   The additive noise is white Gaussian with two sided power spectral density η/2
and polar binary signal is assumed, i.e. the transmitted 10 s and 00 s are represented by
+A and −A respectively. The error probability is given by
                                            
                                             A
                                Pe = Q                                             (2.11)
                                             σ
                   √ R∞
where Q(x) = 1/ 2π x exp(−y 2 /2) dy.
   The same expression of the error probability is obtained for the case of unipolar
binary system in which a 10 and 00 are represented by 2A and zero volt respectively.
The difference between the polar and unipolar binary systems is in the required av-
erage transmitted power.
   The above expression of the error probability can be written in terms of the signal–
to–noise ratio at the filter output or in terms of the average energy per bit.
                      S   Sav  A2
                        =     = 2 for polar signaling                                  (2.12)
                      N   ηB   σ
and
                   S   Sav  2A2
                     =     = 2 for unipolar signaling                                  (2.13)
                   N   ηB    σ
Thus,
                               r         !
                                   Sav
                    Pe = Q                   , for polar signaling                     (2.14)
                                   N
16      REVIEW OF DIGITAL MODULATION SCHEMES
and
                             r         !
                                 Sav
                  Pe = Q                   , for unipolar signaling          (2.15)
                                 2N
Now if the filter bandwidth is taken B = rb = 1/Tb , where Tb is the bit duration,
then N = ηB = ηrb . Therefore the error probability can be rewritten as
                               s        !
                                   Eb
                    Pe = Q                  , for polar signaling            (2.16)
                                   η
and
                             s         !
                                 Eb
                   Pe = Q                  , for unipolar signaling          (2.17)
                                 2η
where Eb = Sav Tb .
(a)
(b)
where Sav is the average power per symbol. The error probability can also be given
in terms of the average energy per symbol, Es = Sav Ts for B = rs as
                                      s                 !
                           M −1                3       Es
                  Pe = 2             Q                                      (2.22)
                             M             2(M 2 − 1) η
In this section, we will review the digital modulation schemes, namely amplitude
shift keying (ASK), frequency shift keying (FSK), and phase shift keying (PSK).
Figure 2.8 shows these different modulation waveforms for transmitting binary in-
formation over a bandpass channel,
                                 Z    Tb
                          E1 =             s22 (t) dt < ∞                    (2.24)
                                  0
                                             DIGITAL CARRIER MODULATION SCHEMES      19
where P (f ) = F {p(t)}, p(t) = s2 (t) − s1 (t), and Gn (f ) = η/2 is the P.S.D. of the
noise.
(a)
(b)
where mp (t) is the baseband binary signal which is equal to one or zero within a bit
duration Tb . The transmission bandwidth BT is given as
BT = 2B (2.27)
where B is the baseband bandwidth of mp (t) which depends on the binary sequence
of mp (t). In general
                                            k
                                      B=                                            (2.28)
                                            Tb
where k ≥ 1 and it depends on the pulse waveforms. k = 1 is usually used.
  The error probability for coherent reception of ASK signal is
                               s        !         s !
                                  A2 Tb             Eb
                    Pe = Q                =Q                                        (2.29)
                                   4η               η
within the bit duration Tb , representing space and mark respectively. The transmis-
sion bandwidth of the FSK signal is
                              BT = 2(∆f + B)                                     (2.32)
where ∆f = ∆ω/2π, and B = krb is the baseband bandwidth as before.
(a) Coherent FSK
    In this scheme a coherent receiver as shown in Fig. 2.10(b) is used. Local
    carrier signals s1 (t) = A cos[(ωc − ∆ω)t] and s2 (t) = A cos[(ωc + ∆ω)t] are
    generated at the receiver. The error probability is given by
                               s                             !
                                 A2 Tb
                                        
                                              sin(2∆ω Tb )
                     Pe = Q               1−                              (2.33)
                                   2η            2∆ω Tb
(a)
(b)
Minimum shift keying is a special case of continuous phase frequency shift keying
where the peak frequency deviation ∆f = rb /4 = 1/4Tb . This means the two sig-
naling frequencies are fc + 1/4Tb and fc − 1/4Tb . This corresponds to the minimum
frequency spacing that allows two FSK signals to be coherently orthogonal. The
name minimum shift keying implies the minimum frequency spacing.
   MSK is sometimes called fast FSK, as the frequency spacing used is only half of
that used in conventional noncoherent FSK. MSK is also equivalent to QPSK. It is
represented as
                                                             
                            2πt                                2πt
 sM SK (t) = A be (t) sin          cos(ωo t) + A bo (t) cos           sin(ωo t)(2.42)
                            4Tb                                4Tb
where be (t) is the even bit stream of the baseband data stream b(t). It consists of
alternate bits b2 , b4 , b6 , · · · and bo (t) is the odd bit stream of b(t) consisting of al-
ternate bits b1 , b3 , b5 , · · · where each bit in both streams is held for two bit inter-
vals Ts = 2Tb . The waveforms sin(2πt/4Tb ) and cos(2πt/4Tb ) are chosen to pass
through zero precisely at the end of the signal time in be (t) and bo (t), respectively.
24      REVIEW OF DIGITAL MODULATION SCHEMES
   The spectrum of MSK has a main lobe which is 1.5 times as wide as the main
lobe of QPSK, while the side lobes in MSK are relatively much smaller compared to
the main lobe making filtering much easier.
   A block diagram of the MSK transmitter and receiver is shown in Fig. 2.15
(a)
(b)
The GMSK filter is defined from B and the baseband symbol duration T . Thus, it
is customary to define GMSK by its BT product. As the BT product decreases the
side lobe levels of the power spectrum for GMSK signal fall of rapidly as shown in
Fig. 2.17. The BT product of infinity is equivalent to MSK spectrum.
Table 2.1 Occupied RF bandwidth as a fraction of rb for different BT product and percentage
of power included.
                               BT                 % of power included
                                                 LPF
              Modulated
              RF input                                                                 Demodulated
                                              IF local                     Decision    binary signal
              signal
                               𝜋 2            oscillator                    device
LPF
(a)
(b)
     The bit error rate for GMSK for a white Gaussian noise channel is given as
                                        s        !
                                            2δEb
                               Pe = Q                                          (2.46)
                                              η
where
                              (
                               0.68, for GMSK with BT = 0.25
                      δ=                                                                                     (2.47)
                                      0.85, for MSK (BT = ∞)
The choice of a modulation method depends on the specific application. It may de-
pend on the simplicity of equipment and compatibility with other equipment already
in use, or on the relative immunity to noise and channel impairments.
                                                       M-ARY SIGNALING SCHEMES     27
Figure 2.19 Probability of error for binary digital modulation schemes. (Note that the
average signal power for ASK schemes is A2 /4, whereas it is A2 /2 for other schemes).
M-ary signaling schemes can be used in conjuction with digital carrier modulation
techniques. That is one of M signals s1 (t), s2 (t), · · ·, sM (t) is sent during each
28      REVIEW OF DIGITAL MODULATION SCHEMES
signaling interval Ts . These signals are generated by changing the amplitude, fre-
quency, or phase of a carrier in M discrete steps. Thus resulting in M-ary ASK,
M-ary FSK, M-ary APK, and M-ary PSK digital modulation schemes. In general
M-ary signaling schemes are preferred over binary schemes for transmitting digital
information over bandpass channel, when conservation of bandwidth (at the expense
of increasing power) is required or when conservation of power (at the expense of
increasing bandwidth) is required. M-ary PSK are widely used because of its con-
servation of bandwidth.
In QPSK two binary bits are represented by one of the four signals. That is s1 (t)
represents 00, and s2 (t) represents 01, and so on.
Figure 2.20 QAM constellations: (a) 4-QAM, (b) 16-QAM, and (c) 64-QAM.
                                                                                      
                 (−L + 1, L − 1)       (−L + 3, L − 1)       ···    (L − 1, L − 1)
              (−L + 1, L − 3)         (−L + 3, L − 3)       ···    (L − 1, L − 3)
                                                                                      
                                                                                       
{ai , bi } =        ..                      ..              ..           ..           (2.53)
                                                                .
                                                                                      
                     .                       .                            .           
               (−L + 1, −L + 1)       (−L + 3, −L + 1)       ···    (L − 1, −L + 1)
          √
where L = M .
  For example, the L × L of 16-QAM is given as
30      REVIEW OF DIGITAL MODULATION SCHEMES
                                                                     
                           (−3, 3)    (−1, 3)       (1, 3)   (3, 3)
                                                             
                          (−3, 1)    (−1, 1)       (1, 1)
                                                       (3, 1) 
            {ai , bi } = 
                         (−3, −1)
                                                                            (2.54)
                                    (−1, −1) (1, −1) (3, −1) 
                                                              
                         (−3, −3)    (−1, −3) (1, −3) (3, −3)
   A generalized block diagram of the QAM modulator is shown in Fig. 2.21. The
2 − L level converter (VI,i = ai and VQ,i =√bi ) generates L level signals having a
symbol rate Rs = R/ log2 (M ), where L = M and M is the number of levels of
the QAM.
(a)
(b)
                                                  R
                            BT = 2B = 2k                                     (2.55)
                                               log2 (M )
                                                      SPREAD SPECTRUM MODULATION        31
where (Es = Sav Ts ) is the average energy per QAM symbol and N = ηBT is the
noise power in the RF bandwidth.
 1. Basic Principles
    A direct sequence spread spectrum signal is a technique in which the amplitude
    of an already modulated signal (e.g. binary PSK or QPSK) is amplitude mod-
    ulated by a very high rate NRZ binary stream of digits. Thus, if the original
    signal is a binary PSK signal s(t) given by
                                   p
                           s(t) = 2Ps d(t) cos(ωo t)                        (2.57)
      where d(t) is the data sequence bit rate rb and Ps is the average power of s(t).
      Thus, the DSSS signal is
                                       p
                     v(t) = g(t) s(t) = 2Ps g(t) d(t) cos(ωo t)                (2.58)
      where g(t) is a pseudo-random noise (PN) binary sequence having values ±1. It
      is generated in a deterministic repetitive manner. However, the sequence length
      before repetition is usually extremely long and it is assumed to be random which
      implies there is no correlation between the value of a given bit and the value of
      any other bits. Also, the bit rate rc of g(t) is much greater than the bit rate rb of
      d(t). The bit rate of g(t) is called chip rate rc to distinguish it from the data bit
      rate.
32     REVIEW OF DIGITAL MODULATION SCHEMES
     Since the bandwidth of BPSK signal s(t) is 2rb , then the bandwidth of the
     BPSK spread spectrum signal v(t) is 2rc and the spectrum has been spread by
     the ratio rc /rb .
     If the power transmitted by s(t) and v(t) is the same and equal to Ps , then the
     power spectral density Gs (f ) is reduced by the factor rb /rc . Figure 2.22 shows
     BPSK system transmitter and receiver with spread spectrum technique.
Transmitter Receiver
                          0               p                          √
                         vo (t)     =         2Ps g(t) g(t) d(t)          2 cos2 (ωo t)
                                          p
                                    =         Ps d(t) [1 + cos(2ωo t)]
     It can be shown that the statistical properties of the noise are not affected by
     the spread spectrum technique, so the overall performance of the system is not
     affected. Thus, the probability of error is the same as that of BPSK without
     spread spectrum i.e.
                                           s       !
                                              2Eb
                                Pe = Q                                          (2.60)
                                               η
     where Eb is bit energy and η/2 is the two sided power spectral density of the
     noise.
 2. Signal Tone Interference                                            p
    Assume a sinusoidal signal of power Pj and of carrier frequency fo , 2Pj cos(ωo t+
                                                    SPREAD SPECTRUM MODULATION      33
   θ) interferes with DSSS signal. It can be shown that the output of the receiver
   vo (t) for the case of no receiver noise n(t) is given by
                               p             p
                      vo (t) = Ps d(t) + Pj g(t) cos(θ)                     (2.61)
                                 Pj E{cos2 (θ)}
                     Gj (f ) =                  ,     |f | ≤ rb                  (2.63)
                                      2rc
   Now since we consider the interfering tone signal is applied to the channel
   instead of the noise n(t), the noise power spectral density η/2 at the output of
   the integrate and dump filter is to be replaced by Gj (f ) obtained in Eq. (2.63).
   Thus, the probability of error is given by
                                       s                 !
                                              2Eb rc
                        Pe = Q
                                          Pj E{cos2 (θ)}
                                       s                      !
                                          Ps rc       2
                             = Q                                               (2.64)
                                          Pj rb E{cos2 (θ)}
   The angle θ is the phase of Jamming sinusoidal waveform with respect to carrier
   information signal and it is random variable so E{cos2 (θ)} = 1/2, then
                                  q              q      
                       Pe = Q        4Ps rc
                                      Pj rb   =  Q    2Ps
                                                       Pje                 (2.65)
   where Pje = Pj /2(rc /rb ) and is called effective Jamming power. The ratio
   rc /rb measures the extent to which the effect of the mean jamming power Pj /2
   is reduced by the chipping. It is called processing gain
Gp = rc /rb (2.66)
     particular code is gi (t). Then, each receiver is presented with the same input
     waveform.
                               k p
                               X
                        v(t) =    2Ps gi (t) di (t) cos(ωo t + θi )                               (2.67)
                                  i=1
     where each signal is assumed to present the same power Ps to the receiver. This
     can be achieved using power control technique. Each pseudo random sequence
     gi (t) has the same chip rate rc , and di (t) is data transmitted by user i, and data
     rate for each user is assumed the same rb , θi is a random phase and statistically
     independent for different users. Thermal noise is omitted for simplification and
     at the end its power spectral density η/2 can be added to the interference power
     spectral density.
     Figures 2.23 (a) and (b) show the transmitter and the receiver block diagrams,
     respectively.
              𝑑1 (𝑡)          ×                           ×
                                   2𝑃𝑠 cos(𝜔𝑜 𝑡 + 𝜃1 )          𝑔1 (𝑡)
𝑑2 (𝑡) × ×
⋮ ⋮ ⋮
𝑑𝑘 (𝑡) × ×
(a)
                              ×                ×                                       𝑣𝑜1 (𝑡)
                                  𝑔1 (𝑡)           2 cos(𝜔𝑜 𝑡 + 𝜃1 )
                              ×                ×                                        𝑣𝑜2 (𝑡)
            𝑣(𝑡)
                                  𝑔2 (𝑡)           2 cos(𝜔𝑜 𝑡 + 𝜃2 )
⋮ ⋮ ⋮ ⋮ ⋮
× × 𝑣𝑜𝑘 (𝑡)
𝑔𝑘 (𝑡) 2 cos(𝜔𝑜 𝑡 + 𝜃𝑘 )
(b)
Each branch of the receiver side in Fig. 2.23 (b) represent a receiver for each
user. At√receiver 1, the signal v(t) of Eq. (2.67) is multiplied by g1 (t) and
also by 2 cos(ωo t + θ1 ) and applied to the integrate and dump filter. It is not
difficult to show that the output vo1 (t) is given by
                      k p
                      X
      vo1 (t)   =             Ps g1 (t) gi (t) di (t) cos(θi − θ1 )                (2.68)
                      i=1
                      p                 k p
                                        X
                =         Ps d1 (t) +      Ps g1 (t) gi (t) di (t) cos(θi − θ1 )
                                        i=2
Assume that all gi ’s make transition at the same time, that is the product g1 (t) gi (t)
has the same chip rate fc of each of them. For simplicity, we write g1 (t) gi (t) =
g1i (t) and cos(θi − θ1 ) = cos(θ1i ), then Eq. (2.69) becomes
                     p              k p
                                    X
       vo1 (Tb ) =    Ps d1 (Tb ) +     Ps g1i (Tb ) di (Tb ) cos(θ1i )            (2.69)
                                        i=2
Comparing Eq. (2.69) with Eq. (2.61) we see they are similar except that Eq.
(2.69) has k − 1 independent interfering signals whereas Eq. (2.61) has one
interfering signal. Thus, if we let Pj = Ps and cos2 (θ) = 1/2, then the total
power spectral density Gj (f ) of (k − 1) independent interferers is the sum of
the power spectral density.
                                              Ps
                       Gj (f ) = (k − 1)          ,    |f | ≤ rb                   (2.70)
                                              4rc
The bit error probability is found using Eq. (2.65) by letting Pj = (k − 1)Ps to
obtain
                                      q          
                                            4 rc
                             Pe = Q       k−1 rb                          (2.71)
Thus, to insure a low probability of error, the processing gain (rc /rb ) must be
adjusted so that
                                 rc     k−1
                                    >>                                     (2.72)
                                 rb       2
If the interfering signals is approximated by Gaussian distribution, the bit error
probability due to interference only is given by
                                      q          
                                            3
                             Pe = Q        k−1 Gp                          (2.73)
where Gp = rc /rb is the processing gain. If the effect of the thermal noise is
added, the bit error probability is
                                               
                          Pe = Q p k−11 η                               (2.74)
                                                3Gp   + 2E
                                                         b
where η is the noise power spectral density and Eb is the bit energy.
36      REVIEW OF DIGITAL MODULATION SCHEMES
(a)
(b)
   The FH signal is decoded as shown in Fig. 2.24(b). Here, the receiver has the
knowledge of the transmitter, c(t), so that the frequency synthesizer in the receiver
can be hopped in synchronism with that at the transmitter. This despreads the FH
                                ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM)            37
signal, and the source information is recovered from the dehopped signal with the
use of a conventional FSK or BPSK demodulator, as appropriate.
   In FHSS system, several users independently hop their carrier frequencies while
using BFSK modulators. Two cases might exist:
      Case 1:
      All users hop their carrier frequencies synchronously and this called slotted
      frequency hopping. In this case, the probability of error is given by
                                                                 
                      1           Eb          k−1         1 k−1
                 Pe = exp −              1−            +                     (2.75)
                      2           2η           M          2     M
      where Eb is the bit energy, η is the noise power spectral density, k is the number
      of users, and M is the number of possible hopping channels (slots).
      Case 2:
      All users hop their carrier frequencies asynchronously and this is called asyn-
      chronous FH. The probability of error in this case is given by
                                            k−1        "                     k−1 #
            1         Eb            1        1            1             1          1
      Pe = exp −              1−        1+             +       1− 1−         1+            (2.76)
            2          η           M        Nb            2            M          Nb
      where Eb , η, k, M are as given in Eq. (2.75) and Nb is the number of bits per
      hop.
OFDM is one of multicarrier modulation systems which based on dividing high bit
rate r data into N low bit rate r/N data and sending each of these bit streams on one
of the N subcarriers. These subcarriers are orthogonal. Their frequencies fi = i/T ,
where i = 1, 2, · · · , N . The frequency f1 = 1/T = fb is the lowest subcarrier fre-
quency and it is sometimes called base frequency fb . Thus, the subcarrier frequencies
are multiples of this frequency, i. e. fb , 2fb , 3fb , · · · , N fb . At the transmitter, these
subcarrier frequencies are transferred to the operating frequency fo .
   The modulation used in this technique for each of the subcarriers is a M-ary mod-
ulation. The most widely used are QPSK and QAM modulation. The available
bandwidth BT is divided among all N subcarriers. That is if each subcarrier requires
bandwidth equal to fb , then BT = N fb centered at fo . This means that fb = BT /N .
The subcarriers in the frequency domain are shown in Fig. 2.25.
   A typical block diagram representation of an OFDM system is shown in Fig.
2.26. The delayed version of a symbol overlaps with the adjacent symbol causes
inter symbol interference (ISI). One simple solution to avoid this is to introduce a
guard band. However, we do not know the exact delay spread. To solve the problem,
we introduce the cyclic prefix (CP) which is basically making the symbol period
longer by copying the tail and blue it in the front as shown in Fig. 2.27.
38      REVIEW OF DIGITAL MODULATION SCHEMES
     Let Z(k) be the modulated symbols, then the output of the IFFT block is given
by
                    N −1                         
                    X                     j2πkn
           z(n) =          Z(k) exp                   , n = 0, 1, · · · , N − 1   (2.77)
                                            N
                    k=0
from the sequence z(n) is called the N-point discrete Fourier transform (DFT) and
is given by
                 N −1               
                 X             j2πkn
         Z(k) =     z(n) exp −         , k = 0, 1, · · · , N − 1               (2.78)
                n=0
                                 N