Principles of Communications

Similar documents
Principles of Communications

Digital modulation techniques

Modulation and Coding Tradeoffs

DIGITAL COMMUNICATIONS SYSTEMS. MSc in Electronic Technologies and Communications

Objectives. Presentation Outline. Digital Modulation Revision

Thus there are three basic modulation techniques: 1) AMPLITUDE SHIFT KEYING 2) FREQUENCY SHIFT KEYING 3) PHASE SHIFT KEYING

Digital Modulation Schemes

QUESTION BANK SUBJECT: DIGITAL COMMUNICATION (15EC61)

Chapter 14 MODULATION INTRODUCTION

College of information Technology Department of Information Networks Telecommunication & Networking I Chapter 5. Analog Transmission

CSE4214 Digital Communications. Bandpass Modulation and Demodulation/Detection. Bandpass Modulation. Page 1

Chapter 6 Passband Data Transmission

Detection and Estimation of Signals in Noise. Dr. Robert Schober Department of Electrical and Computer Engineering University of British Columbia

Chapter 4. Part 2(a) Digital Modulation Techniques

Amplitude Frequency Phase

Lecture #11 Overview. Vector representation of signal waveforms. Two-dimensional signal waveforms. 1 ENGN3226: Digital Communications L#

Wireless Communication Fading Modulation

ECE5713 : Advanced Digital Communications

EC 6501 DIGITAL COMMUNICATION UNIT - IV PART A

Digital Modulators & Line Codes

Department of Electronics and Communication Engineering 1

EE3723 : Digital Communications

UNIVERSITY OF CALIFORNIA College of Engineering Department of Electrical Engineering and Computer Sciences EECS 121 FINAL EXAM

Data Encoding g(p (part 2)

ENSC327 Communication Systems 27: Digital Bandpass Modulation. (Ch. 7) Jie Liang School of Engineering Science Simon Fraser University

Theory of Telecommunications Networks

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

Mobile & Wireless Networking. Lecture 2: Wireless Transmission (2/2)

Content. Chapter 6 PASSBAND DATA TRANSMISSION. Dr. Samir Alghadhban 11/22/13

Chapter 6 Passband Data Transmission

Problem Sheet 1 Probability, random processes, and noise

3. 3. Noncoherent Binary Modulation Techniques


Downloaded from 1

MSK has three important properties. However, the PSD of the MSK only drops by 10log 10 9 = 9.54 db below its midband value at ft b = 0.

About Homework. The rest parts of the course: focus on popular standards like GSM, WCDMA, etc.

Analyze BER Performance of Wireless FSK System

Digital Modulation Lecture 01. Review of Analogue Modulation Introduction to Digital Modulation Techniques Richard Harris

CT-516 Advanced Digital Communications

Theory of Telecommunications Networks

Objectives. Presentation Outline. Digital Modulation Lecture 01

Digital Communication

Fundamentals of Digital Communication

TSTE17 System Design, CDIO. General project hints. Behavioral Model. General project hints, cont. Lecture 5. Required documents Modulation, cont.

QUESTION BANK EC 1351 DIGITAL COMMUNICATION YEAR / SEM : III / VI UNIT I- PULSE MODULATION PART-A (2 Marks) 1. What is the purpose of sample and hold

Spread Spectrum (SS) is a means of transmission in which the signal occupies a

CHETTINAD COLLEGE OF ENGINEERING & TECHNOLOGY NH-67, TRICHY MAIN ROAD, PULIYUR, C.F , KARUR DT.

Communication Systems

3/26/18. Lecture 3 EITN STRUCTURE OF A WIRELESS COMMUNICATION LINK

UNIT I Source Coding Systems

Communication Theory

Communication Systems

AN INTRODUCTION OF ANALOG AND DIGITAL MODULATION TECHNIQUES IN COMMUNICATION SYSTEM

University of Manchester. CS3282: Digital Communications 06. Section 9: Multi-level digital modulation & demodulation

EXPERIMENT WISE VIVA QUESTIONS

Lecture 10 Performance of Communication System: Bit Error Rate (BER) EE4900/EE6720 Digital Communications

Signal Encoding Techniques

Outline. EECS 3213 Fall Sebastian Magierowski York University. Review Passband Modulation. Constellations ASK, FSK, PSK.

Swedish College of Engineering and Technology Rahim Yar Khan

21. Orthonormal Representation of Signals

Principles of Communications

QUESTION BANK (VI SEM ECE) (DIGITAL COMMUNICATION)

CS441 Mobile & Wireless Computing Communication Basics

Lab 3.0. Pulse Shaping and Rayleigh Channel. Faculty of Information Engineering & Technology. The Communications Department

Mobile Radio Systems OPAM: Understanding OFDM and Spread Spectrum

CHAPTER 4 SIGNAL SPACE. Xijun Wang

comparasion to BPSK, to distinguish those symbols, therefore, the error performance is degraded. Fig 2 QPSK signal constellation

Columbia University. Principles of Communication Systems ELEN E3701. Spring Semester May Final Examination

TELE4652 Mobile and Satellite Communications

Outline. Communications Engineering 1

Mobile Communications

Mobile Communication An overview Lesson 03 Introduction to Modulation Methods

COMMUNICATION SYSTEMS

Index. offset-qpsk scheme, 237, 238 phase constellation, 235

CALIFORNIA STATE UNIVERSITY, NORTHRIDGE FADING CHANNEL CHARACTERIZATION AND MODELING

CHAPTER 3 ADAPTIVE MODULATION TECHNIQUE WITH CFO CORRECTION FOR OFDM SYSTEMS

Wireless Communication

ECE 4600 Communication Systems


PERFORMANCE ANALYSIS OF DIFFERENT M-ARY MODULATION TECHNIQUES IN FADING CHANNELS USING DIFFERENT DIVERSITY

Lecture 9: Spread Spectrum Modulation Techniques

PRINCIPLES OF COMMUNICATIONS

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1


Channel & Modulation: Basics

5.1 DIGITAL-TO-ANALOG CONVERSION

UNIVERSITY OF BAHRAIN COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRICAL AND ELECTRONIC ENGINEERING

Lecture 3 Digital Modulation, Detection and Performance Analysis

CHETTINAD COLLEGE OF ENGINEERING & TECHNOLOGY NH-67, TRICHY MAIN ROAD, PULIYUR, C.F , KARUR DT.

ECEn 665: Antennas and Propagation for Wireless Communications 131. s(t) = A c [1 + αm(t)] cos (ω c t) (9.27)

8.1 Geometric Representation of Signal Waveforms

SEN366 Computer Networks

Spread Spectrum Techniques

Fund. of Digital Communications Ch. 3: Digital Modulation

Modulation (7): Constellation Diagrams

Performance Evaluation Of Digital Modulation Techniques In Awgn Communication Channel

Chapter 2 Channel Equalization

Introduction to Communications Part Two: Physical Layer Ch5: Analog Transmission. Goals of This Class. Warm Up. Outline of the Class

Chapter 2 Overview - 1 -

SPREAD SPECTRUM (SS) SIGNALS FOR DIGITAL COMMUNICATIONS

Transcription:

Principles of Communications Weiyao Lin Shanghai Jiao Tong University Chapter 8: Digital Modulation Techniques Textbook: Ch 8.4.8.7 2009/2010 Meixia Tao @ SJTU 1

Topics to be Covered data baseband Digital modulator Noise Bandpass channel detector Digital demodulator BPF Binary digital modulation M-ary digital modulation Tradeoff study 2009/2010 Meixia Tao @ SJTU 2

Digital Modulation The message signal is transmitted by a sinusoidal carrier wave In digital communications, the modulation process corresponds to switching or keying the amplitude, frequency, or phase of the carrier in accordance with the incoming digital it data Three basic digital modulation techniques Amplitude-shift keying (ASK) - special case of AM Frequency-shift keying (FSK) - special case of FM Phase-shift shift keying (PSK) - special case of PM Will use signal space approach in receiver design and performance analysis 2009/2010 Meixia Tao @ SJTU 3

8.1 Binary Modulation Types In binary signaling, the modulator produces one of two distinct signals in response to 1 bit of source data at a time. Binary modulation types Binary PSK (BPSK) Binary FSK Binary ASK 2009/2010 Meixia Tao @ SJTU 4

Binary Phase-Shift Keying (BPSK) Modulation 0 1 1 0 1 0 0 1 1 0,, bit duration : carrier frequency, chosen to be for some fixed integer or fc >> 1/ Tb : transmitted signal energy per bit, i.e. The pair of signals differ only in a relative phase shift of 180 degrees 2009/2010 Meixia Tao @ SJTU 5

Signal Space Representation for BPSK Clearly, there e is one basis s function of unit energye Then A binary PSK system is therefore characterized by having a signal space that t is one-dimensional i (i.e. N=1), and with two message points (i.e. M = 2) s 2 s 2 0 s 1 2009/2010 Meixia Tao @ SJTU 6

Decision Rule of BPSK Assume that the two signals are equally likely, i.e. P(s 1 ) = P(s 2 ) = 0.5. Then the optimum decision boundary is the midpoint of the line joining these two message points Region R 2 Region R 1 s 2 0 s 1 Decision rule: Guess signal s 1 (t) (or binary 1) was transmitted if the received signal point r falls in region R 1 Guess signal s 2 (t) (or binary 0) was transmitted otherwise 2009/2010 Meixia Tao @ SJTU 7

Proof of the Decision Rule Observation scalar (output of the demodulator) r is If s 1 is transmitted If s 2 is transmitted where n represents the AWGN component, which has mean zero and variance Thus, the likelihood function of r is 2009/2010 Meixia Tao @ SJTU 8

Recall ML decision criterion: Thus Choose s 1 > < Choose s 2 s 1 > < s 2 And s 1 < > s s 2 Finally s 1 > < < s2 2009/2010 Meixia Tao @ SJTU 9

Probability of Error for BPSK The conditional probability of the receiver deciding in favor of symbol s 2 (t) given that s 1 (t) is transmitted is Due to symmetry 2009/2010 Meixia Tao @ SJTU 10

0 r Since the signals s 1 (t) and s 2 (t) are equally likely to be transmitted, the average probability of error is Note: probability bilit of error depends d on ratio E b /N 0. This ratio is normally called bit energy to noise density ratio (or SNR/bit) 2009/2010 Meixia Tao @ SJTU 11

BPSK Transmitter Input binary data Spectrum shaping filter m(t) Product Binary PSK modulator wave s(t) Carrier wave Rectangular pulse 2009/2010 Meixia Tao @ SJTU 12

BPSK Receiver T b 0 dt demodulator detector is the carrier-phase offset, due to propagation delay or oscillators at transmitter and receiver are not synchronous The detection is coherent in the sense of Phase synchronization: ensure local oscillator output at the receiver is synchronized to the carrier in modulator Timing synchronization: to ensure proper bit timing of the decision- making operation 2009/2010 Meixia Tao @ SJTU 13

Binary FSK Modulation 0 1 1 0 1 0 0 1 1 0 : transmitted signal energy per bit f i : transmitted frequency with separation Δ f = f1 f0 Δf is selected so that s 1 (t) and s 2 (t) are orthogonal i.e. (Example?) 2009/2010 Meixia Tao @ SJTU 14

Signal Space for BFSK Unlike BPSK, here two orthogonormal basis functions are required to represent s 1 (t) and s 2 (t). Signal space representation 2009/2010 Meixia Tao @ SJTU 15

Signal space diagram for binary FSK Message point Message point Observation vector 2009/2010 Meixia Tao @ SJTU 16

Decision Regions of Binary FSK Message point R 2 R 1 Decision boundary Message point The receiver decides in favor of s 1 if the received signal point represented by the observation vector r falls inside region R 1. This occurs when r 1 > r 2 When r 1 < r 2, r falls inside region R 2 and the receiver decides in favor of s 2 2009/2010 Meixia Tao @ SJTU 17

Probability of Error for Binary FSK Given that s 1 is transmitted, and Since the condition r 1 < r 2 corresponds to the receiver making a decision in favor of symbol s 2, the conditional probability of error given s 1 is transmitted is given by Define a new random variable Since n 1 and n 2 are iidwith i.i.d Thus, n is also Gaussian with 2009/2010 Meixia Tao @ SJTU 18

By symmetry Since the two signals are equally likely to be transmitted, the average probability of error for coherent binary FSK is 3 db worse than BPSK i.e. to achieve the same P e, BFSK needs 3dB more transmission power than BPSK 2009/2010 Meixia Tao @ SJTU 19

Binary FSK Transmitter On-off signalling form 1 0 2009/2010 Meixia Tao @ SJTU 20

Coherent Binary FSK Receiver T b 0 dt + - Choose 1 if l>0 Choose 0 otherwise T b 0 dt 2009/2010 Meixia Tao @ SJTU 21

Binary ASK Modulation 0 1 1 0 1 0 0 1 1 0 Average energy per bit (On-off signalling) Region R 2 s 2 Region R 1 s 1 0 2009/2010 Meixia Tao @ SJTU 22

Probability of Error for Binary ASK Average probability of error is Identical to that of coherent binary FSK Exercise: Prove P e 2009/2010 Meixia Tao @ SJTU 23

Probability of Error and the Distance Between Signals BPSK BFSK BASK These expressions illustrate the dependence of the error probability on the distance between two signal points. In general, 2009/2010 Meixia Tao @ SJTU 24

Probability of Error Curve for BPSK and FSK/ASK 10 0 Proba ability of Bit Err ror 10-1 10-2 10-3 10-4 10-5 10-6 PSK ASK/FSK 3dB e.g. 10-7 0 2 4 6 8 10 12 14 Eb/No in [db] 2009/2010 Meixia Tao @ SJTU 25

Example #1 Binary data are transmitted over a microwave link at the rate of 10 6 bits/sec and the PSD of the noise at the receiver input is 10-10 watts/hz. a) Find the average carrier power required to maintain i an average probability bilit of error for coherent binary FSK. b) Repeat the calculation in a) for noncoherent binary FSK 2009/2010 Meixia Tao @ SJTU 26

We have discussed Coherent modulation schemes,.e.g. BPSK, BFSK, BASK They needs coherent detection, assuming that the receiver is able to detect and track the carrier wave s phase Update In many practical situations, strict phase synchronization is not possible. In these situations, i non-coherent reception is required. We now consider: Non-coherent detection on binary FSK Differential phase-shift shift keying (DPSK) 2009/2010 Meixia Tao @ SJTU 27

8.2: Non-coherent scheme BFSK Consider a binary FSK system, the two signals are Where and are unknown random phases with uniform distribution 2009/2010 Meixia Tao @ SJTU 28

Signal Space Representation No matter what the two phases are, the signals can be expressed as a linear combination of the four basis functions Signal space representation 2009/2010 Meixia Tao @ SJTU 29

Correlating the received signal r(t) with the four basis functions produces the vector representation of the received signal Detector t 2009/2010 Meixia Tao @ SJTU 30

Decision Rule for Non-coherent FSK ML criterion, assume P(s 1 ) = P(s 2 ): Choose s 1 > < Conditional pdf Choose s 2 Similarly, 2009/2010 Meixia Tao @ SJTU 31

For ML decision, we need to evaluate i.e. Removing the constant terms 2009/2010 Meixia Tao @ SJTU 32

We have the inequality By definition iti where I 0 (. ) is a modified Bessel function of the zeroth order 2009/2010 Meixia Tao @ SJTU 33

Decision Rule (cont d) Thus, the decision rule becomes: choose s 1 if But note that this Bessel function is monotonically increasing. Therefore we choose s 1 if Interpretation: compare the energy in the two frequencies and pick the larger => envelop detector Carrier phase is irrelevant in decision making 2009/2010 Meixia Tao @ SJTU 34

Structure of Non-Coherent Receiver for Binary FSK Comparator (select the largest) It can be shown thatt (For detailed proof, see Section 10.4.2 in the textbook ) 2009/2010 Meixia Tao @ SJTU 35

Performance Comparison Between coherent FSK and Non-Coherent FSK 10 0 10-1 ASK/FSK Probab bility of Bit Error 10-2 -3 10 10-4 10-5 BPSK DPSK NC FSK 10-6 10-7 0 2 4 6 8 10 12 14 Eb/No in [db] 2009/2010 Meixia Tao @ SJTU 36

Differential PSK (DPSK) DPSK can be viewed as the non-coherent version of PSK. Phase synchronization is eliminated i using differential encoding Encoding the information in phase difference between successive signal transmission In effect: to send 0, we phase advance the current signal waveform by 180 0 ; to send 1, we leave the phase unchanged 2009/2010 Meixia Tao @ SJTU 37

DPSK (cont d) Provided that the unknown phase contained in the received wave varies slowly (constant over two bit intervals), the phase difference between waveforms received in two successive bit interval will be independent of 2009/2010 Meixia Tao @ SJTU 38

Generation of DPSK signal We can generate DPSK signals by combining two basic operations Differential encoding of the information binary bits Phase shift keying The differential encoding process starts with an arbitrary first bit, serving as reference Let {m i } be input information binary bit sequence, {d i } be the differentially encoded bit sequence If the incoming bit m i is 1, leave the symbol d i unchanged with respect to the previous bit d i-1 If the incoming bit m i is 0, change the symbol d i with respect to the previous bit d i-1 2009/2010 Meixia Tao @ SJTU 39

Illustration The reference bit is chosen arbitrary, here taken as 1 Binary data 1 0 0 1 0 0 1 1 m i Differentially encoded binary data 1 1 0 1 1 0 1 1 1 Initial bit d i d i = di 1 mi Transmitted Phase 0 0 π 0 0 π 0 0 0 DPSK transmitter diagram 2009/2010 Meixia Tao @ SJTU 40

Differential Detection of DPSK Signals T b 0 dt Multiply the received DPSK signal with its delayed version Output of integrator (assume noise free) The unknown phase becomes irrelevant If = 0 (bit 1), the integrator output y is positive if =π π (bit 0), the integrator output y is negative 2009/2010 Meixia Tao @ SJTU 41

Error Probability of DPSK The differential detector is suboptimal in the sense of error performance It can be shown that t 2009/2010 Meixia Tao @ SJTU 42

Summary of P e for Different Binary Modulations Coherent PSK Coherent ASK Coherent FSK Non-Coherent FSK DPSK 2009/2010 Meixia Tao @ SJTU 43

P e Plots for Different Binary Modulations e 10 0 Prob bability of Bit Erro or 10-1 10-2 10-3 10-4 10-5 BPSK(QPSK) DPSK ASK/FSK NC FSK 10-6 10-7 0 2 4 6 8 10 12 14 Eb/No in [db] 2009/2010 Meixia Tao @ SJTU 44

We have discussed binary case Coherent modulation techniques: BPSK, BFSK, BASK Noncoherent modulation techniques: Non-coherent FSK, DPSK Update We now consider: M-ary modulation techniques MPSK MQAM MFSK 2009/2010 Meixia Tao @ SJTU 45

8.3 M-ary Modulation Techniques In binary data transmission, send only one of two possible signals during each bit interval T b In M-ary data transmission, send one of M possible signals during each signaling interval T In almost all applications, M = 2 n and T = nt b, where n is an integer Each of the M signals is called a symbol These signals are generated by changing the amplitude, phase or frequency of a carrier in M discrete steps. Thus, we have M-ary ASK, M-ary PSK, and M-ary FSK digital modulation schemes 2009/2010 Meixia Tao @ SJTU 46

Binary is a special case of M-ary Another way of generating M-ary signals is to combine different methods of modulation into hybrid forms For example, we may combine discrete changes in both the amplitude and phase of a carrier to produce M-ary amplitude phase keying. A special form of this hybrid modulation is M-ary QAM (MQAM) 2009/2010 Meixia Tao @ SJTU 47

M-ary Phase-Shift Keying (MPSK) The phase of the carrier takes on M possible values: Signal set: = Energy per symbol f c 1 >> T Basis functions 2009/2010 Meixia Tao @ SJTU 48

MPSK (cont d) Signal space representation 2009/2010 Meixia Tao @ SJTU 49

MPSK Signal Constellations BPSK QPSK 8PSK 16PSK 2009/2010 Meixia Tao @ SJTU 50

The Euclidean distance between any two signal points in the constellation is 2 π ( m n) d mn = s m s n = 2E s 1 cos M The minimum Euclidean distance is 2π dmin = 2Es 1 cos = 2 Es sin M π M dmin plays an important role in determining error performance as discussed previously (union bound) In the case of PSK modulation, the error probability is dominated by the erroneous selection of either one of the two signal points adjacent to the transmitted signal point. Consequently, an approximation to the symbol error probability is d /2 min π P MPSK 2 Q = 2 2E sin /2 Q s N M 0 2009/2010 Meixia Tao @ SJTU 51

Exercise Consider the M=2 2, 4, 8 PSK signal constellations. All have the same transmitted signal energy Es. Determine the minimum i distance d min between adjacent signal points For M=8, determine by how many db the transmitted signal energy Es must be increased to achieve the same d min as M =4. 2009/2010 Meixia Tao @ SJTU 52

Error Performance of MPSK For large M, doubling the number of phases requires an additional 6dB/bit to achieve the same performance 4dB 5dB 6dB 2009/2010 Meixia Tao @ SJTU 53

M-ary Quadrature Amplitude Modulation (MQAM) In an M-ary PSK system, in-phase and quadrature components are interrelated in such a way that the envelope is constant (circular constellation). If we relax this constraint, we get M-ary QAM. Signal set: E 0 is the energy of the signal with the lowest amplitude a i, b i are a pair of independent integers 2009/2010 Meixia Tao @ SJTU 54

Basis functions: MQAM (cont d) Signal space representation 2009/2010 Meixia Tao @ SJTU 55

Square lattice MQAM Signal Constellation 1 3 5 7 Can be related with two L-ary ASK in in-phase and quadrature components, respectively, where M = L 2 2009/2010 Meixia Tao @ SJTU 56

Error Performance of MQAM It can be shown that the symbol error probability of MQAM is tightly upper bounded as P e 3kE b 4Q ( M 1) N 0 (for ) M = 2 k Exercise: From the above expression, determine the increase in the average energy per bit Eb required to maintain the same error performance if the number of bits per symbol is increased from k to k+1, where k is large. 2009/2010 Meixia Tao @ SJTU 57

M-ary Frequency-Shift Keying (MFSK) or Multitone Signaling Signal set: where As a measure of similarity il it between a pair of signal waveforms, we define the correlation coefficients 2009/2010 Meixia Tao @ SJTU 58

MFSK (cont d) 1 0.715/T For orthogonality, minimum frequency separation between successive frequencies is 1/(2T) 2009/2010 Meixia Tao @ SJTU 59

M-ary orthogonal FSK has a geometric presenation as M M-dim orthogonal vectors, given as ( E s L ) ( E s L ) s0 =,0,0,,0 s 1 = 0,,0,,,0 = M ( L E s ) 1 0,0,,0, The basis functions are s φ m 2 = cos 2 π ( fc + mδf ) t T 2009/2010 Meixia Tao @ SJTU 60

Error Performance of MFSK 2009/2010 Meixia Tao @ SJTU 61

Notes on Error Probability Calculations Pe is found by integrating conditional probability of error over the decision region Difficult for multi-dimensions Can be simplified using union bound (see ch04) Pe depends only on the distance profile of signal constellation 2009/2010 Meixia Tao @ SJTU 62

Example #2 The 16-QAM signal constellation shown below is an international standard for telephone-line modems (called V.29). a) Determine the optimum decision boundaries for the detector b) Derive the union bound of the probability of symbol error assuming that t the SNR is sufficiently high so that errors only occur between adjacent points c) Specify a Gray code for this 16- QAM V.29 signal constellation 2009/2010 Meixia Tao @ SJTU 63

Symbol Error versus Bit Error Symbol errors are different from bit errors When a symbol error occurs, all bits could be in error In general, we can find BER using is the number bits which differ between and 2009/2010 Meixia Tao @ SJTU 64

Bit Error Rate with Gray Coding Gray coding is a bit-to-symbol to mapping When going from one symbol to an adjacent symbol, only one bit out of the k bits changes An error between adjacent symbol pairs results in one and only one bit error. 2009/2010 Meixia Tao @ SJTU 65

Example: Gray Code for QPSK 11 10 01 00 2009/2010 Meixia Tao @ SJTU 66

Bit Error Rate for MPSK and MFSK For MPSK with gray coding An error between adjacent symbol will most likely occur Thus, bit error probability can be approximated by For MFSK When an error occurs anyone of the other symbols may result equally likely. On average, therefore, half of the bits will be incorrect. That is k/2 bits every k bits will on average be in error when there is a symbol error Thus, the probability of bit error is approximately half the symbol error 1 P b P e 2 2009/2010 Meixia Tao @ SJTU 67

8.4 Comparison of M-ary Modulation Techniques Channel bandwidth and transmit power are two primary communication resources and have to be used as efficient as possible Power utilization efficiency (energy efficiency): measured by the required E b/n o to achieve a certain bit error probability Spectrum utilization efficiency (bandwidth efficiency): measured by the achievable data rate per unit bandwidth R b /B It is always desired to maximize bandwidth efficiency at a minimal required Eb/No 2009/2010 Meixia Tao @ SJTU 68

Example # 3 Suppose you are a system engineer designing a part of the communication systems. You are required to design three systems as follow: I. An ultra-wideband system. This system can use a large of amount of bandwidth to communicate. But the band it uses is overlaying with the other communication system. The main purpose of deploying this system is to provide high data rates. II. A wireless remote control system designated d for controlling devices remotely under unlicensed band. III. A fixed wireless system. The transmitters and receivers are mounted in a fixed position with power supply. This system is to support voice and data connections in the rural areas or in developing countries. The main reason to deploy this in such areas is because it is either very difficult or not costeffective to cover the area through wired networks. This system works under licensed band. You are only required to design a modulation scheme for each of the above systems. You are allowed to use MFSK, MPSK and MSK only. If you choose to use MFSK or MPSK,,you also need to state the modulation level. For simplicity, the modulation level should be chosen from M=[Low, Medium, High]. Justify your answers. (Hints: Federal Communications Commission (FCC) has a power spectral density limit in unlicensed band. It is meant that if your system works under unlicensed band, the power cannot be larger than a limit.) 2009/2010 Meixia Tao @ SJTU 69

Energy Efficiency Comparison MFSK MPSK 2009/2010 Meixia Tao @ SJTU 70

Energy Efficiency Comparison (cont d) MFSK: At fixed E b /N o, increase M can provide an improvement on P b At fixed P b increase M can provide a reduction in the E b /N o requirement MPSK BPSK and QPSK have the same energy efficiency At fixed E b /N o, increase M degrades Pb At fixed Pb, increase M increases the Eb/No requirement MFSK is more energy efficient than MPSK 2009/2010 Meixia Tao @ SJTU 71

Bandwidth Efficiency Comparison To compare bandwidth efficiency, we need to know the power spectral density (power spectra) of a given modulation scheme MPSK/MQAM Bandwidth required to pass MPSK/MQAM signal is given by But = bit rate Then bandwidth efficiency i may be expressed as (bits/sec/hz) 2009/2010 Meixia Tao @ SJTU 72

Bandwidth Efficiency Comparison (cont d) MFSK: Bandwidth required to transmit MFSK signal is (Adjacent frequencies need to be separated by 1/2T to maintain orthogonality) Bandwidth efficiency of MFSK signal (bits/s/hz) As M increases, bandwidth efficiency of MPSK/MQAM increases, but bandwidth efficiency of MFSK decreases. This is a consequence of the fact that the dimension of the signal space is two for MPSK/MQAM and is M for MFSK. 2009/2010 Meixia Tao @ SJTU 73

Fundamental Tradeoff : Bandwidth Efficiency and Energy Efficiency To see the ultimate power-bandwidth tradeoff, we need to use Shannon s channel capacity theorem: Channel Capacity is the theoretical upper bound for the maximum rate at which information could be transmitted without error (Shannon 1948) For a bandlimited channel corrupted by AWGN, the maximum rate achievable is given by Ps R C = B log 2 (1 + SNR ) = B log 2 (1 + ) N0B Note that E PT P P B B b s s s = = = SNR N N RN RN B = R Thus N0 0 0 0 E b B = (2 N 0 R R / B 1) 2009/2010 Meixia Tao @ SJTU 74

Power-Bandwidth Tradeoff Capacity boundary with R = C Unachievable Region with R > C Shannon limit 2009/2010 Meixia Tao @ SJTU 75

Notes on the Fundamental Tradeoff In the limits as R/B goes to 0, we get This value is called the Shannon Limit Received Eb/N0 must be >-1.6dB for reliable communications to be possible BPSK and QPSK require the same Eb/N0 of 9.6 db to achieve P e=10-5. However, QPSK has a better bandwidth efficiency, which is why QPSK is so popular MQAM is superior to MPSK MPSK/MQAM increases bandwidth efficiency i at the cost of lower energy efficiency MFSK trades energy efficiency at reduced bandwidth efficiency. 2009/2010 Meixia Tao @ SJTU 76

System Design Tradeoff Which Modulation to Use? Bandwidth Limited Systems: Bandwidth scarce Power available Power Limited Systems: Power scarce but bandwidth available 2009/2010 Meixia Tao @ SJTU 77

Example # 3 Suppose you are a system engineer designing a part of the communication systems. You are required to design three systems as follow: I. An ultra-wideband system. This system can use a large of amount of bandwidth to communicate. But the band it uses is overlaying with the other communication system. The main purpose of deploying this system is to provide high data rates. II. A wireless remote control system designated d for controlling devices remotely under unlicensed band. III. A fixed wireless system. The transmitters and receivers are mounted in a fixed position with power supply. This system is to support voice and data connections in the rural areas or in developing countries. The main reason to deploy this in such areas is because it is either very difficult or not costeffective to cover the area through wired networks. This system works under licensed band. You are only required to design a modulation scheme for each of the above systems. You are allowed to use MFSK, MPSK and MSK only. If you choose to use MFSK or MPSK,,you also need to state the modulation level. For simplicity, the modulation level should be chosen from M=[Low, Medium, High]. Justify your answers. (Hints: Federal Communications Commission (FCC) has a power spectral density limit in unlicensed band. It is meant that if your system works under unlicensed band, the power cannot be larger than a limit.) 2009/2010 Meixia Tao @ SJTU 78

Practical Applications BPSK: WLAN IEEE802.11b (1 Mbps) QPSK: WLAN IEEE802.11b (2 Mbps, 5.5 5 Mbps, 11 Mbps) 3G WDMA DVB-T (with OFDM) QAM Telephone modem (16QAM) Downstream of Cable modem (64QAM, 256QAM) WLAN IEEE802.11a/g (16QAM for 24Mbps, 36Mbps; 64QAM for 38Mbps and 54 Mbps) LTE Cellular Systems FSK: Cordless telephone Paging system 2009/2010 Meixia Tao @ SJTU 79