Notes on Modulation techniques

advertisement
Notes on Modulation techniques
by
Davide Micheli
1
Table of Contents
NOTES ON MODULATION TECHNIQUES.......................................................................................................... 1
TABLE OF CONTENTS ................................................................................................................................................2
1
CANNEL CAPACITY AND IDEAL COMMUNICATION SYSTEMS ...................................................... 6
1.1
2
CODING ........................................................................................................................................................... 14
2.1
2.2
3
CODE PERFORMANCE ................................................................................................................................14
SPECTRAL EFFICIENCY ..............................................................................................................................12
INTERSYMBOL INTERFERENCE ............................................................................................................. 19
3.1
3.2
3.3
3.4
4
CHANNEL CAPACITY DEFINITION .................................................................................................................6
SPECTRAL PROPERTY REMINDER (SQUARE WAVE SPECTRUM) ...................................................................22
EQUALIZING FILTER ..................................................................................................................................23
NYQUIST’S FIRST METHOD (ZERO ISI) .....................................................................................................25
RAISED COSINE-ROLLOFF NYQUIST FILTERING ........................................................................................28
BANDPASS SIGNALING............................................................................................................................... 32
4.1
COMPLEX ENVELOPE RAPPRESTNATION OF BANDPASS WAVEFORMS ................................32
4.1.1
Definitions: Baseband, Bandpass, and modulation ............................................................................. 32
4.1.2
Complex Envelope Representation ...................................................................................................... 33
4.1.3
Theorem............................................................................................................................................... 33
4.2
REPRESENTATION OF MODULATED SIGNALS..............................................................................35
4.3
SPECTRUM OF BANDPASS SIGNALS................................................................................................36
Theorem ............................................................................................................................................................. 36
5
AM, FM, PM MODULATED SYSETMS.................................................................................................... 37
5.1
DEFINITIONS .............................................................................................................................................37
5.2
AMPLITUDE MODULATION ...............................................................................................................37
5.2.1
Normalized AM average power ........................................................................................................... 39
5.2.2
Definition: The modulation efficiency ................................................................................................. 40
6
PHASE MODULATION AND FREQUENCY MODULATION................................................................ 41
6.1
6.1.1
6.2
6.2.1
6.3
6.3.1
6.4
6.4.1
6.4.2
6.5
7
REPRESENTATION OF PM AND FM SIGNALS .............................................................................................41
Definition for peak phase deviation and peak frequency deviaton. ..................................................... 45
SPECTRA OF ANGLE-MODULATED SIGNALS ..............................................................................................46
Spectrum of a PM or FM signal with Sinusoidal Modulation ............................................................. 47
NOISE AND FREQUENCY MODULATION ......................................................................................................51
Noise triangle ...................................................................................................................................... 51
PREEMPHASIS AND DEEMPHASIS IN ANGLE MODULATED SYSTEMS ...........................................................52
De-Emphasis response table................................................................................................................ 54
Why use “Roofed” Pre-Enhasis .......................................................................................................... 55
FREQUENCY DIVISION MULTIPLEXING .......................................................................................................55
OUTPUT SIGNAL-TO NOISE RATIOS FOR ANALOG SYSTEMS....................................................... 57
7.1
7.2
7.3
7.4
7.5
COMPARISON WITH BASEBAND SYSTEMS .................................................................................................58
AM SYSTEMS WITH PRODUCT DETECTION................................................................................................59
SSB SYSTEMS ............................................................................................................................................60
PM SYSTEMS .............................................................................................................................................60
FM SYSTEMS ............................................................................................................................................62
2
7.6
7.7
8
COMPARISON OF ANALOG SIGNALING SYSTEMS............................................................................ 67
8.1
9
FM SYSTEMS WITH THRESHOLD EXTENSION ............................................................................................63
FM SYSTEM WITH DE-EMPHASIS...............................................................................................................66
IDEAL SYSTEMS PERFORMANCE .................................................................................................................68
BINARY MODULATED BANDPASS SIGNALING................................................................................... 70
9.1
BINARY PHASE-SHIFT KEYING (BPSK) ....................................................................................................71
9.1.1
BPSK Generation ................................................................................................................................ 71
9.1.2
BPSK Detection by a Correlation Receiver......................................................................................... 78
9.1.3
With Noise ........................................................................................................................................... 80
9.2
MAXIMUM LIKELIHOOD DETECTION .........................................................................................................83
9.3
BIT ERRORS ..............................................................................................................................................83
9.3.1
Q-Function reminder ........................................................................................................................... 85
9.3.2
Bit Error Probability in terms of Eb and N0 ......................................................................................... 87
10
DIFFERENTIAL PHASE-SHIFT KEYING (DPSK)................................................................................... 89
10.1
11
FREQUENCY SHIFT KEYING (FSK)......................................................................................................... 91
11.1
11.2
11.3
12
QUADRATURE PHASE-SHIFT KEYNG (QPSK) AND M-ARY PHASE-SHIFT KEYNG (MPSK) .......................95
OQPSK AND π/4 QPSK ..........................................................................................................................102
QUADRATURE AMPLITUDE MODULATION (QAM)..................................................................................106
PSD FOR MPSK, QAM, OQPSK, AND π/4 QPSK WITHOUT PRE-MODULATION FILTERING ....................107
SPECTRAL EFFICIENCY FOR MPSK, QAM,OQPSK, AND π/4 QPSK WITH RAISED COSINE FILTERING ...109
RECEIVER QPSK, MSK AND PERFORMANCE ..........................................................................................117
FEHER-PATENTED QUADRATURE PHASE-SHIFT KEING.............................................................. 121
13.1
13.2
13.3
13.4
14
DISCONTINUOUS FSK ...............................................................................................................................91
CONTINUOUS FSK.....................................................................................................................................92
FSK DETECTION ........................................................................................................................................93
MULTILEVEL MODULATED BANDPASS SIGNALING ....................................................................... 95
12.1
12.2
12.3
12.4
12.5
12.6
13
DIFFERENTIAL CODING ..............................................................................................................................90
INTRODUCTION........................................................................................................................................121
SIGNAL MODEL FOR FQPSK ...................................................................................................................121
SIGNAL MODEL FOR FQPSK-B................................................................................................................131
SPECTRAL EFFICIENCY COMPARISON .......................................................................................................133
EFFICIENT MODULATION METHODS STUDY AT NASA/JPL ........................................................ 135
14.1
FQPSK-B MODULATION BIT-ERROR-RATE (BER) ................................................................................135
14.2
FQPSK-B MODULATION SPECTRA .........................................................................................................136
14.2.1
Hardware Spectrum Measurements.............................................................................................. 136
14.3
FQPSK-B MODULATION POWER CONTAINMENT ...................................................................................138
14.4
FQPSK-B MODULATION STUDY CONCLUSIONS .....................................................................................138
15
SUMMARY, CONCLUSIONS, AND RECOMMENDATIONS ............................................................... 140
15.1.1
SUMMARY.................................................................................................................................... 140
15.2
CONCLUSIONS ....................................................................................................................................144
15.2.1
Filtering Conclusions.................................................................................................................... 144
15.2.2
Loss Conclusions .......................................................................................................................... 145
15.2.3
Modulation Methods Conclusions ................................................................................................ 146
15.2.4
Spectrum Improvement Conclusions............................................................................................. 147
15.3
RECOMMENDATIONS .......................................................................................................................147
15.3.1
Mission Classification................................................................................................................... 147
16
8PSK MODULATION (EXAMPLE IMPLEMENTED IN MOBILE TELEPHONE NETWORK) ..... 151
16.1
16.2
INTRODUCTION........................................................................................................................................151
EDGE SIGNAL DESCRIPTION: MODULATING SYMBOL RATE AND SYMBOL MAPPING .............................153
3
16.3
SYMBOL ROTATION.................................................................................................................................158
16.4
(8PSK EDGE) MODULATION AM DISTORTION .......................................................................................165
16.4.1
First problem (ISI):....................................................................................................................... 165
16.4.2
Second problem (AM):.................................................................................................................. 166
16.5
USED GAUSSIAN EDGE FILTER ..............................................................................................................167
16.6
EFFECT DUE TO GAUSSIAN EDGE FILTERING IN 3Π/8 SHIFTED 8PSK .....................................................170
16.7
MODULATION..........................................................................................................................................173
16.8
CONCLUSION ...........................................................................................................................................173
17
EFFICIENT MODULATION METHODS STUDY AT NASA/JPL ........................................................ 174
17.1
17.2
17.3
17.4
17.5
18
PHASE SHIFT KEYED (8-PSK) MODULATION ...............................................................................174
PSK MODULATION BIT-ERROR-RATE (BER) .........................................................................................174
8-PSK MODULATION SPECTRA ...............................................................................................................175
PSK MODULATION POWER CONTAINMENT.............................................................................................177
PSK MODULATION STUDY CONCLUSIONS ..............................................................................................177
MINIMUM-SHIFT KEYNG (MSK) AND GMSK ..................................................................................... 178
18.1
GMSK ....................................................................................................................................................185
18.1.1
How to implement GMSK modulator............................................................................................ 190
18.1.2
How to implement GMSK demodulator ........................................................................................ 192
19
EFFICIENT MODULATION METHODS STUDY AT NASA/JPL ........................................................ 194
19.1
19.2
19.3
19.4
MSK AND GMSK MODULATION BIT-ERROR-RATE (BER) ....................................................................194
MSK AND GMSK MODULATION SPECTRA .............................................................................................194
MSK / GMSK MODULATION POWER CONTAINMENT .............................................................................196
MSK / GMSK MODULATION STUDY CONCLUSIONS ...............................................................................197
20
HISTORY OF SPECTRUM EFFICIENT MODULATION IN TELEMETRY APPLICATIONS....... 198
21
CORRELATED DETECTION .................................................................................................................... 201
22
INTRODUCTION TO CDMA ..................................................................................................................... 206
22.1
MULTIPLE ACCESS ..................................................................................................................................206
22.2
SPREAD SPECTRUM MODULATION ...........................................................................................................207
22.3
TOLERANCE TO NARROWBAND INTERFERENCE ......................................................................................210
22.4
DIRECT SEQUENCE SPREAD SPECTRUM SYSTEM .....................................................................................211
22.4.1
Channelization operation.............................................................................................................. 212
22.4.2
Scrambling operation.................................................................................................................... 214
22.5
ORTHOGONAL SEQUENCES REMINDER.....................................................................................................214
22.6
MODULATION AND TOLERANCE TO WIDEBAND INTERFERENCE .............................................................216
22.7
UPLINK MODULATION.............................................................................................................................219
22.7.1
One UL parallel channel .............................................................................................................. 223
22.7.2
Two UL parallel channel .............................................................................................................. 225
22.7.3
Three UL parallel channel............................................................................................................ 230
22.7.4
Filtering ........................................................................................................................................ 236
22.8
DOWNLINK SPREADING AND MODULATION ............................................................................................238
22.8.1
Downlink Spreading Codes........................................................................................................... 238
23
ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM) .............................................. 241
23.1
INTRODUCTION........................................................................................................................................241
23.2
DIGITAL AUDIO BROADCASTING.............................................................................................................242
23.3
DIGITAL VIDEO BROADCASTING .............................................................................................................243
23.4
BASIC PRINCIPLE OF OFDM ....................................................................................................................244
23.5
ORTHOGONALITY ....................................................................................................................................246
23.5.1
FREQUENCY DOMAIN ORTHOGONALITY.............................................................................. 249
23.6
OFDM GENERATION AND RECEPTION .....................................................................................................250
23.6.1
Serial To Parallel Conversion ...................................................................................................... 251
23.6.2
Subcarrier modulation and mapping ............................................................................................ 252
23.6.3
Frequency to time domain conversion .......................................................................................... 253
4
23.7
OFDM TRANSMITTER .............................................................................................................................254
23.8
FFT(LINE SPECRA FOR PERIODIC WAVEFORMS).....................................................................................256
23.8.1
Theorem ........................................................................................................................................ 256
23.8.2
Theorem ........................................................................................................................................ 258
24
APPENDIX..................................................................................................................................................... 267
24.1
24.2
25
CONVOLUTION PROCESS..........................................................................................................................267
DIRAC DELTA FUNCTION AND CONVOLUTION PROCESS ...........................................................................270
REFERENCE................................................................................................................................................. 271
5
1 CANNEL CAPACITY AND IDEAL COMMUNICATION
SYSTEMS
1.1 Channel capacity definition
Suppose the following transmission systems
Source
information
Transduction
Receiver
skay
NOISE
added
Transmitter
Transduction
Modulated
signal
Destination
Antenna and Receiver
NOISE added
figure 1
Let us define the channel capacity:
•
For digital systems, the optimum system might be defined as the system that
minimizes the probability of bit error at the system output. The variables are bit
error, signal bandwidth, transmitted energy and channel bandwidth.
The question is: is it possible to invent a system with non bit error at the output
even when we have noise introduced into the channel ? The answer is yes, under
certain assumption Shannon showed that (for the case of signal plus white
Gaussian noise) a channel capacity C(bits/s) could be calculated such that if the
rate information R(bits/s) was less then C, the probability of error would
approach to zero.
6
S⎞
⎛
C = B log 2 ⎜1 + ⎟
⎝ N⎠
eq 1
where B is the channel bandwidth in (Hz) and S/N is the signal-to-noise power
ratio(watts/watts, no dB) at the input to the digital receiver.
Shannon gives us a theoretical performance bound that we can strive to achieve
with practical communication systems. Systems that approach this bound usually
incorporate error correction coding.
•
In analog systems, in place of error probability, the optimum system might be
defined as the one that achieves the largest signal-to-noise ratio at the receiver
output, subject to design constraints such as channel bandwidth and transmitted
power.
In this case the question is: is it possible to design a system with infinite signal to
noise ratio at the output when noise is introduced to the channel ? The answerer
is no.
The law above, in the first equation, it was found considering that: if S is a continuous
signal between that varies s1 and s2 values and, if p(s) is the density of probability for S,
than p(s)⋅ds gives the probability for S of felling inside ds interval.
Therefore the information bits quantity related to S signal is
s2
q = ∫ p ( s ) log 2
s1
1
ds
p(s)
eq 2
1
is the number of bits needed to represent all values of signal S, each of
p(s)
which is multiplied by the density probability p(s) of the signal S
In a discrete case we easily have:
where log 2
N
q = ∑ Pn log 2
n=1
1
Pn
eq 3
where in case of equal probability Pn=1/N of the N symbols we had
N
q = ∑ Pn log 2
n=1
N
1
1
1
= ∑ log 2 N =
Pn n=1 N
N
N
∑ log
n =1
2
N = log 2 N
eq 4
7
As an example the representation of 8 states discrete signal, where all states are
supposed with the same probability, require 3 bits (each bit can assume 2 values high,
low so we using log2x) because
3 = log 2 8
eq 5
In the continuous scenario, if S is the average signal and σ2 is the variance, then it can
be shown that q (the number of bits needed to represent S) became maximum when
p(s) has a Gaussian distribution probability:
p( s) =
e
−
S2
2σ 2
eq 6
2πσ 2
In this case the bound of S are: s1=-∞ , s2=∞.
The corresponding quantity of information q (number of bits needed to represent S ) can
be obtained substituting this equation in the integral, above:
∞
q=
∫
−∞
1
p ( s ) log 2
e
−
S2
2σ 2
1
1
ds = log 2 (2π eS 2 ) 2 = log 2 (2π eS 2 )
2
bits/sample
eq 7
2πσ 2
here S2 is the average signal power.
Considering now the Shannon theorem which says that a signal of bandwidth B
requires at least 2B sample rate (samples/second). Therefore in a time interval t are
necessary 2B⋅t samples of the signal S, here each sample are univocally determined by
q bits. So the information quantity bit related to the sampled signal S with q bits
quantizing, on the time interval t is:
1
Q = 2 B ⋅ t ⋅ q = 2 Bt log 2 (2π eS 2 ) 2 = Bt log 2 (2π eS 2 )
bits
eq 8
The presence of noise corrupts the receiving information at the receiver input. The
relative information associated is:
1
QN = 2 B ⋅ t ⋅ q = 2 Bt log 2 (2π eS 2 ) 2 = Bt log 2 (2π eS 2 ) = 2 Bt log 2 (2π ePN ) bits
eq 9
where PN= S 2 is the average noise power .
Then at the input of the receiver we have the noise power PN along with the information
power signal PS:
8
QS + N = 2 B ⋅ t ⋅ qS + N = Bt{log 2 [2π e(PS + PN )]} bits
eq 10
where PS+PN =S2 is the total power of signal plus noise with Gaussian probability
density function
The uncorrupted quantity of information will be
Q = QS + N − QN = 2 B ⋅ t ⋅ qS + N = B ⋅ t{log 2 [2π e(PS + PN )] − log 2 [2π e(PN )]} =
= B ⋅ t log 2
⎛
2π e(PS + PN )
P ⎞
= B ⋅ t log 2 ⎜⎜1 + S ⎟⎟ bits
2π e(PN )
⎝ PN ⎠
eq 11
The bitrate Rb will be
⎛
P ⎞
Q
= B log 2 ⎜⎜1 + S ⎟⎟ = Rb bits/s
t
⎝ PN ⎠
eq 12
we can invert the equation to find PS/PN
Q
PS ⎛ B⋅t ⎞
= ⎜⎜ 2 − 1⎟⎟
PN ⎝
⎠
eq 13
where
PN = KTB
⇒
⎛ BQ⋅t ⎞
⎛ BQ⋅t ⎞
PS
⎜
⎟
= 2 − 1⎟ ⇒ PS = KTB⎜⎜ 2 − 1⎟⎟
KTB ⎜⎝
⎠
⎝
⎠
eq 14
This is the Hartely-Shannon law which contains the essential components of
transmission systems:
1.
2.
3.
4.
5.
bandwidth B
power of signal PS
power pf noise PN
duration of message t
temperature of reference T
PS and PN power are reported in figure below as a function of the bandwidth, we have
fixed T=300 (K), Q=270833 (bit), K=1.38*10-23 (J/K) , t= 1 (s)
9
K
T
1.38E-23
tempo t (s)
300
Q (bit)
B (Hz)
Pn (w)
Ps (w)
1
270833
10000.0
4.1E-17
12500.0
5.2E-17
15625.0
6.5E-17
19531.3
8.1E-17
24414.1
1.0E-16
30517.6
1.3E-16
38147.0
1.6E-16
47683.7
2.0E-16
59604.6
2.5E-16
74505.8
3.1E-16
93132.3
3.9E-16
116415.3
4.8E-16
145519.2
6.0E-16
181898.9
7.5E-16
227373.7
9.4E-16
284217.1
1.2E-15
355271.4
1.5E-15
444089.2
1.8E-15
555111.5
2.3E-15
693889.4
2.9E-15
867361.7
3.6E-15
1084202.2
4.5E-15
1355252.7
5.6E-15
1694065.9
7.0E-15
2117582.4
8.8E-15
2646978.0
1.1E-14
3308722.5
1.4E-14
4135903.1
1.7E-14
5169878.8
2.1E-14
6462348.5
2.7E-14
5.9E-09
1.7E-10
1.1E-11
1.2E-12
2.2E-13
5.9E-14
2.2E-14
9.9E-15
5.5E-15
3.5E-15
2.5E-15
1.9E-15
1.6E-15
1.4E-15
1.2E-15
1.1E-15
1.0E-15
9.7E-16
9.2E-16
8.9E-16
8.7E-16
8.5E-16
8.3E-16
8.2E-16
8.1E-16
8.1E-16
8.0E-16
8.0E-16
7.9E-16
7.9E-16
bit rate Q/t
Pn (dBm)
Ps (dBm)
Ps/Pn (dB) (Kbit/sec)
-133.83
-52.30
82
270.833
-132.86
-67.64
65
270.833
-131.89
-79.71
52
270.833
-130.92
-89.18
42
270.833
-129.95
-96.56
33
270.833
-128.98
-102.28
27
270.833
-128.02
-106.67
21
270.833
-127.05
-110.03
17
270.833
-126.08
-112.59
13
270.833
-125.11
-114.53
11
270.833
-124.14
-116.01
8
270.833
-123.17
-117.13
6
270.833
-122.20
-118.00
4
270.833
-121.23
-118.66
3
270.833
-120.26
-119.18
1
270.833
-119.29
-119.58
0
270.833
-118.32
-119.90
-2
270.833
-117.36
-120.14
-3
270.833
-116.39
-120.34
-4
270.833
-115.42
-120.49
-5
270.833
-114.45
-120.62
-6
270.833
-113.48
-120.71
-7
270.833
-112.51
-120.79
-8
270.833
-111.54
-120.85
-9
270.833
-110.57
-120.90
-10
270.833
-109.60
-120.94
-11
270.833
-108.63
-120.97
-12
270.833
-107.66
-121.00
-13
270.833
-106.70
-121.02
-14
270.833
-105.73
-121.03
-15
270.833
-40.0
80
-45.0
75
-50.0
70
-55.0
65
-60.0
60
-65.0
55
-70.0
50
40
-80.0
35
-85.0
30
-90.0
25
-95.0
20
PS/PN=0 dB
and Q=B
-100.0
-105.0
-110.0
10
5
6462348.5
5169878.8
4135903.1
3308722.5
2646978.0
2117582.4
1694065.9
1355252.7
867361.7
1084202.2
693889.4
555111.5
444089.2
355271.4
284217.1
227373.7
181898.9
145519.2
93132.3
116415.3
74505.8
59604.6
47683.7
-20
38147.0
-15
-135.0
30517.6
-10
-130.0
24414.1
-5
-125.0
19531.3
0
-120.0
15625.0
Pn (dBm)
Ps (dBm)
Ps/Pn (dB)
15
-115.0
12500.0
Ps/Pn (dB)
45
-75.0
10000.0
Ps (dBm), Pn (dBm)
Singal power Ps (dBm), Noise Power Pn (dBm), Ps/Pn ratio (dB)
bandwidth (Hz)
figure 2
E:\documenti per
corsi\ELETTRONICA T
10
we can get some note:
•
•
By equation 11 we can observe that the information Q(n°bit) remains constant if
the product B⋅t is constant, the exchange between B and t is used in satellite
application. In fact the data can be collected, along the orbit, with low B and high
period of time t, the data are stored by using a memory device. After, the
transmission of data stored before, is possible only in a short period when the
satellite is flying above the Earth Station, by using a great bandwidth B.
The bit-rate Q/t (bit/s)
remain constant increasing the bandwidth and
simultaneously reducing the PS/PN ratio, this represent a possible application in
spread spectrum communication system, the greater the bandwidth the lower
PS/PN ratio. Anyway if we are increasing the bandwidth, then the power of the
signal PS will reduce to tend asymptotically to a constant while PN will increases
more. When
Q
PS ⎛⎜ B⋅t ⎞⎟
= ⎜ 2 − 1⎟ = 1
PN ⎝
⎠
eq 15
i.e. where
⎛
P ⎞
Q
= B log 2 ⎜⎜1 + S ⎟⎟ = B log 2 (1 + 1) = B = Rb
t
⎝ PN ⎠
bits/s
eq 16
Therefore when PS=PN, then the maximum transmission bandwidth (Hz) needed
for a correct received signal, is the same order of the channel capacity (bit/s).
Onboard of a satellite, one of the main problems concerns the heavy of the transmitter
systems, and the power required to transmission signaling. Therefore we are looking
for a system which can beneficial of exchanging between (PS/PN) and bandwidth
between input and output of the receiver.
In frequency modulation systems the bandwidth of the carrier channels are greater
than RX_output bandwidth channel, so at the input of the receiver can be used a
lower PS/PN. Anyway FM must work above FM C/N threshold and since the greater the
bandwidth, the greater the noise, then C/N threshold will increase with bandwidth. As a
consequence the Carrier power C will be affected by the same amount of growth too,
resulting in a bigger amplifier rather then a little amplifier as required.
As a conclusion, once we have been fixed PS/PN and the bit_rate Q/t, then we can
observe that the lower the PN, the lower PS. So the very important component of a
transmission design is trying to reducing the noise power PN.
11
1.2 Spectral Efficiency
The spectral efficiency η of a digital signal is given by the number of bits per second
of data that can be supported by each hertz of bandwidth, in other words is the bit rate
supported by the unit of bandwidth.
η=
R
(bits/s)/Hz
B
eq 17
In application in which the bandwidth is limited by physical constraints, the goal is to
choose a signaling technique that gives the highest spectral efficiency while achieving a
low probability of bit error at the system output. Moreover, the maximum possible
spectral efficiency is limited by the channel noise if the error is to be small, this
maximum spectral efficiency is given by Shannon’s capacity formula
η=
⎡ P ⎤
Rb
= log 2 ⎢1 + S ⎥
B
⎣ PN ⎦
(bits/s)/Hz
eq 18
All the binary codes have η ≤ 1. Multilevel signaling can be used to achieve much
greeter spectral efficiency.
12
The greater Ps/PN, the more is the spectral efficiency. Plotting this function we have the
following graph:
Spectral Efficiency as a function of SNR
9.00
300.00
8.00
250.00
7.00
200.00
5.00
150.00
4.00
3.00
SNR (Lineare)
Spectral efficiency
6.00
100.00
2.00
Spectral efficiency
50.00
SNR (lineare)
1.00
24.33
24.23
24.13
24.03
23.93
23.82
23.71
23.60
23.48
23.36
23.24
23.12
22.99
22.86
22.72
22.58
22.43
22.28
22.12
21.96
21.79
21.61
21.43
21.24
21.04
20.83
20.61
20.37
20.13
19.87
19.59
19.29
18.98
18.63
18.26
17.85
17.40
16.90
16.33
15.68
14.91
13.98
12.79
8.45
11.14
0.00
0.00
0.00
SNR (dB)
figure 3
E:\documenti per
corsi\ELETTRONICA T
13
2 CODING
If the data at the output of a digital communication system have errors that are too
frequent for the desired use, the errors can be often reduced by use either of two main
techniques:
•
•
Automatic repeat request (ARQ)
Forward error correction (FEC)
In an ARQ system, when a receiver circuit detects parity errors in a block of data, it
requests that the data block be retransmitted. In FEC system, the transmitted data are
encoded so that the receiver can correct, as well as detect errors. These procedures are
also classified as channel coding because they are used to correct errors caused by
channel noise. This is different from source coding, where the purpose of coding is to
extract the essential information from the source and encode it into digital form so that it
can be efficiently stored or transmitted using a digital techniques (example PCM)
The choice between using the ARQ or the FEC technique depends on the particular
application.
• ARQ is often used in computer communication systems because is relatively
inexpensive to implement and there is usually a duplex (two-way) channel so that
the receiving and can transmit back an acknowledgement (ACK) for correctly
received data or a requests for retransmission (NAC) when the data are received
in error.
• FEC is preferred on systems with large retransmission delays because if the
ARQ technique were used, the effective data rate would be small; the transmitter
would have long periods while waiting for the ACK/NAC indicator, which is
retarded by the long transmission delay.
2.1 Code performance
The improvement in the performance of a digital communication system can be
achieved by the use of coding as illustrated below:
14
figure 4
It is assumed that a digital signal plus channel noise is present at the receiver input. The
performance of a system that uses binary-phase-shift-keyed (BPSK) signaling is
shown both for the case when coding is used and for the case when there is no coding.
For the no coding case, the optimum (matched filter detector ) circuits is used at the
receiver. For the coded case a Golay code is used.
•
Pe is the probability of error-also called the Bit Error Rate (BER)- that is
measured at the receiver output.
•
Eb/N0 is the energy per-bit / noise-density ratio at the receiver input
•
The coding gain is defined as the reduction in Eb/N0 (in dB) that is achieved
when coding is used, when compared with required for the uncoded case at
some specific level of Pe. This improvement is significant in space
communication applications, where every decibel of improvement is valuable
since its possible to get the same Pe by using a lower Bit energy ( lower Power)
in transmission .
The figure also show noted that there is a coding threshold in the sense that the coded
system actually provides poorer performance than the uncoded system when Eb/N0 is
less than the threshold value.
15
For optimum coding, Shannon’s channel capacity theorem already seen, gives the
Eb/N0 required.
Channel
capacity
⎛
Q
P ⎞
= B log 2 ⎜⎜1 + S ⎟⎟ = Rb bits/s
eq 19
t
⎝ PN ⎠
That is, if the source rate is below the channel capacity Rb, the optimum code will
allow the source information to be decoded at the receiver with Pe→0. (i.e.10-∞) , even
though there is some noise in the channel.
We will now find the required Eb/N0 so that Pe→0 with the optimum (unknown) code.
Assume that the optimum encoded signal is not restricted in bandwidth, i.e. assuming
an optimum encoder formed by a sequence of infinite redundant bit such that in order
to transmit signal plus redundant coding bit, the required bandwidth became infinite.
Then from equation above where it has been posed C( as channel capacity), PS=S ( as
power signal) and PN=N (as Noise power):
S⎞
⎛
C = B log 2 ⎜1 + ⎟
N⎠
⎝
bit/s
⎧
⎧
⎛ E / T ⎞⎫
⎛
S [Watt ] ⎞⎫
C = lim ⎨ B log 2 ⎜⎜1 +
⎟⎟⎬ = lim ⎨ B log 2 ⎜⎜1 + b b ⎟⎟⎬ =
B →∞
N 0 B ⎠⎭
⎝ N [Watt ] ⎠⎭ B→∞ ⎩
⎝
⎩
1
if B = : ⇒
x
⎧
⎛
Eb ⎞ ⎫
x⎟⎪
⎪ log 2 ⎜⎜1 +
⎧1
N 0Tb ⎟⎠ ⎪
⎛ Eb / Tb ⎞⎫
⎪
⎝
C = lim⎨ log 2 ⎜⎜1 +
x ⎟⎟⎬ = lim⎨
⎬
x→0 x
N0
x
⎝
⎠⎭ x→0 ⎪
⎩
⎪
⎪
⎪
⎩
⎭
eq 20
eq 21
where :
Tb is the time needed to send one bit and N is the noise power that occurs within the
bandwidth of the signal:
N0
df = N 0 B
−B 2
N =∫
B
eq 22
where B is the signal bandwidth and N0/2 is the noise power spectral density (W/Hz).
16
L’ Hospital’s rule is used to evaluate this limit:
⎧∂ ⎡
⎛
⎞⎤ ⎫
E
⎪ ⎢log 2 ⎜⎜1 + b x ⎟⎟⎥ ⎪
N 0Tb ⎠⎦ ⎪
⎪ ∂x
⎝
C = lim⎨ ⎣
⎬=
x →0
∂
⎪
⎪
x
∂x
⎪
⎪
⎭
⎩
1
Eb
⎧
⎫
log 2 e ⎪
⎪⎛
⎞NT
E
⎪ ⎜⎜1 + b x ⎟⎟ 0 b
⎪
N 0Tb ⎠
E
E ⎛ ln e ⎞
E
1
⎪⎝
⎪
= lim⎨
= b (log 2 e ) = b ⎜
= b
⎟
⎬
x →0
1
N 0Tb ⎝ ln 2 ⎠ N 0Tb ln 2
⎪
⎪ N 0Tb
⎪
⎪
⎪
⎪
⎩
⎭
eq 23
where we have used the logarithm property of base changes
log a ( x ) =
log b ( x )
log b (a )
⇒
log 2 (e ) =
log e (e ) ln (e )
1
=
=
log b (2) ln (2 ) ln(2)
eq 24
and the derivative property of logarithm
d
du
1
log a (u ) =
dx
u ⋅ ln (a ) dx
⇒
⎧
⎪
⎛
E
⎪d ⎡
lim ⎨ ⎢log 2 ⎜⎜1 + b
x →0
N 0Tb
⎝
⎪ dx ⎣
⎪⎩
⇒
⎫
⎪
⎞⎤
Eb ⎪
Eb 1
1
⎟
x ⎟⎥ =
⎬=
⎠⎦ ⎛⎜1 + Eb x ⎞⎟ ln 2 N 0Tb ⎪ N 0Tb ln 2
⎜
⎪⎭
N 0Tb ⎟⎠
⎝
eq 25
If we signal at a rate, approaching the channel capacity, then Pe→0, and we have the
maximum information rate allowed for the Pe→0 (i.e. the optimum system). Thus
C=
1
Tb
where Tb = bit rate source
eq 26
E
1
1
= b
Tb N 0Tb ln 2
⇒
17
Eb
= ln 2 = −1,59 dB
N0
eq 27
This minimum value for Eb/N0 is -1.59 dB and is called Shannon limit.
That is, if the optimum coding/decoding is used at the transmitter and receiver, error
free data will be recovered at the receiver output, provided that the Eb/N0 at the receiver
input is larger than -1.59 dB, assuming that the ideal (unknown )code is used.
Any practical systems will perform worse than this ideal system described by Shannon’s
limit, thus the goal of digital system designer is to find practical codes that approach the
performance of Shannon’s limit.
The better code reported in figure above, achieves their coding gains at the expense of
bandwidth expansion. That is when redundant bits are added to provide coding gain, the
overall data rate and, consequently, the bandwidth of the signal are increased by a
multiplicative factor that is the reciprocal of the code rate. Thus, if the uncoded signal
takes up all the available bandwidth, coding cannot be added to reduce receivers errors,
because the coded signal would take up too much bandwidth.
18
3 INTERSYMBOL INTERFERENCE
The absolute bandwidth of rectangular multilevel pulses tend to infinity; on the contrary
the bandwidth available in communication system is always limited. Therefore in order
to limit the bandwidth and reducing the PSD (Power Spectral Density) of signaling we
needed some kind of filtering system for the binary pulses.
When these pulses are filtered improperly as they pass through a communication
system, they will spread in time, and the pulse for each symbol may be smeared into
adjacent time slot and cause intersymbol interference (ISI).
Input weaveform, win(t)
Individual pulse response
Received waveform, wout(t)
(sum of pulse responses)
T
0
1
0
0
0
s
t
t0
t0
t
t0
t
t
t0
t
Intersymbol interference
0
1
0
1
1
t0
Sampling points
(trasmitter clock)
t
t0
Sampling points
(receiver clock)
Sampling points
(receiver clock)
figure 5
Now, how do we can restrict the bandwidth and still not introduce ISI ? This problem
was first studied by Nyquist who discovered three different methods for pulse shaping
that could be used to eliminate/reducing ISI.
Let us consider a digital signaling system as shown below, in which the flat-topped
multilevel signal at the input is:
19
Trasmitting filter
HT(f)
Win(t)
Channel (filter)
charateristics
HC(f)
Wc(t)
Receiver filter
HR(f)
Flat top
pulses
Wout(t)
Recovered rounded
Pulse (to sampling
and decoding cicuits)
figure 6
Where at the input we have a series of flat-top impulse of a symbol rate D=1/Ts
(pulses/s):
win (t ) = ∑ an h(t − nTs )
eq 28
n
where an is the amplitude of multilevel signal (for a binary signal there are only two
levels permitted) and, where the shaping of a single flat top-impulse is
⎛ t
h(t) = ∏ ⎜⎜
⎝ TS
Ts ⎫
⎧
⎞ ⎪1, se t ≤ 2 ⎪
⎟⎟ ≡ ⎨
⎬
⎠ ⎪0, se t > Ts ⎪
2⎭
⎩
is a flat top inpulse (rectangular inpulse shaping) eq 29
1
0.8
0.6
1
2π/Ts
0.4
0.2
-Ts/2
Ts/2
t
0
-20
-15
-10
-5
0
5
10
15
-0.2
20
freq
-0.4
figure 7 : time domain
figure 8: frequency domain
20
The frequency domain of a single flat-top impulse is obtained by Fourier transform
H( f ) =
Ts / 2
∫1⋅ e
−Ts / 2
+ Ts / 2
T /2
− j ωt
⎡ e − jωt ⎤
1 s
e − jωTs / 2 − e + jωTs / 2
− j ωt
− jω ⋅e dt = ⎢
=
=
dt =
⎥
− jω −T∫s / 2
− jω
⎣ − jω ⎦ −T / 2
s
⎛ T ⎞
Ts
sen⎜ ω s ⎟
− jωTs / 2
+ jωTs / 2
+ jωTs / 2
− jωTs / 2
−e
−e
e
2Ts e
⎝ 2⎠
= 2
=
= Ts
Ts
T
− jω
Tsωs
2j
ω s
2
2
eq 30
The PSD of single flat top impulse is then obtained by :
Ts / 2
2
2
T /2
1 s
H ( f ) = ∫ 1 ⋅ e − jωt dt =
− jω ⋅ e − jωt dt =
∫
ω
j
−
−Ts / 2
−Ts / 2
2
2
⎡ 1 − j ωt ⎤
e jωTs / 2 − e − jωTs / 2 (Ts / 2)
e ⎥
=2
=
=⎢
(Ts / 2)
− 2 jω
⎣ − jω
⎦ −Ts / 2
Ts / 2
⎛ T ⎞
sen⎜ ω s ⎟
2
⎝ 2⎠
= Ts
T
ω s
2
2
eq 31
2
1
which is plotted in figure below
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
-20
-15
-10
-5
0
5
10
15
20
figure 9
21
3.1 Spectral property reminder (square wave spectrum)
Let us consider a square wave signal s (t ) as shown below
s(t)
-T/2
-∆t/2
t
∆t/2
T/2
figure 10
The relative s0 (t ) is shown in figure below where it is represented by a unitary
impulse s I (t )
s0(t) = sI(t)
-T/2
-∆t/2
∆t/2
t
T/2
figure 11
Then S 0 (ω ) has the shape reported below
S0(ω) = SI(ω)
ω
-4π/∆t
-2π/∆t
2π/∆t
4π/∆t
figure 12
22
As a consequence S (ω ) has the following shape
S(ω)
ω0=2π/T0
ω
-4π/∆t
-2π/∆t
2π/∆t
4π/∆t
Figura 1
3.2 Equalizing filter
Using the Dirac delta function and the convolved product we can also rewrite the
flat-top impulse series as:
⎡
⎤
win (t ) = ∑ an h(t − nTs ) = ∑ an h(t ) ∗ δ (t − nTs ) = ⎢∑ anδ (t − nTs )⎥ ∗ h(t )
n
n
⎣n
⎦
eq 32
The output of the linear system would be just the input impulse train convolved with the
equivalent impulse response of the overall system; that is
⎧⎡
⎫
⎤
wout (t ) = ⎨⎢∑ anδ (t − nTs )⎥ ∗ h(t )⎬ ∗ hT (t ) ∗ hC (t ) ∗ hR (t )
⎦
⎩⎣ n
⎭
eq 33
Calling the equivalent impulse response of the overall system as:
he (t ) = h(t ) ∗ hT (t ) ∗ hC (t ) ∗ hR (t )
eq 34
23
then
⎡
⎤
wout (t ) = ⎢∑ anδ (t − nTs )⎥ ∗ he (t ) = ∑ an he (t − nTs )
n
⎣n
⎦
eq 35
Note that he(t) is also the pulse shape that will appear at the output of the receiver filter
when a single Dirac pulse is fed into the transmitting filter.
The equivalent system transfer function is in frequency domain and it is represented by
the product of the corresponding Fourier transform of each single element:
H e ( f ) = H ( f )HT ( f )HC ( f )H R ( f )
eq 36
H(f) is the Fourier transform already seen that define the pulse shape
⎡ ⎛ Ts ⎞ ⎤
⎢ sen⎜ ωs 2 ⎟ ⎥
⎠⎥
H ( f ) = Ts ⎢ ⎝
T
⎢ ω s ⎥
s
⎢⎣
2 ⎥⎦
eq 37
Then the receiving filter is given by
HR( f ) =
He ( f )
H ( f )HT ( f )HC ( f )
eq 38
When He(f) is chosen to minimize the ISI, HR(f) is called an equalizing filter. The
equalizing filter characteristic depends on Hc(f), the channel frequency response, as
well as on the required He(f).
When the channel consists of dial-up telephone lines, the channel transfer function
changes from call to call and the equalizing filter may need to be an adaptive filter. In
this case, the equalizing filter adjusts itself to minimize the ISI. In some adaptive
schemes, each communication session is preceded by a test pattern that is used to
adapt the filter electronically for the maximum eye opening (minimum ISI). Such
sequence are called learning or training sequence and preambles.
As an example of training sequence we report those used in GSM mobile network
Um-Interface for a burst of 148 bits:
24
Normal burst (NB): TCH end other control channel, except. RACH, SCH e FACH
TB
3
Encrpted bits
57
1
Training sequence
26
0.577 ms
1
Encrpted bits
57
TB
3
GP
8.25
156.25 bit
Freq. correction burst (FB): Is equivalent to unmodulated carrier . I used to synchronize the
mobile in frequency
TB
3
Fixed bits
142
0.577 ms
TB
3
GP
8.25
156.25 bit
Synchronization burst (SB): Is used to temporally synchronize the mobile, it contains TDMA
frame number and and BSIC
TB
3
Encrpted bits
39
Synchronization sequence
64
0.577 ms
Encrpted bits
39
TB
3
GP
8.25
156.25 bit
figure 13
The pulse train at the output of the receiver filter is
wout (t ) = ∑ an he (t − nTs )
eq 39
n
The output pulse shape is affected by the input pulse shape (flat-topped in this
case), the transmitter filter, the channel filter, and the receiving filter. Because, in
practice, the channel filter is already specified, the problem is to determine the
transmitting filter and the receiving filter that will minimize the ISI on the rounded pulse
at the output of the receiving filter.
3.3 Nyquist’s First Method (Zero ISI)
Nyquist’s first method for eliminating ISI is to use an equivalent transfer function He(f),
such that the impulse response satisfies the condition
⎧C for k = 0 ⎫
he (kTs + τ ) = ⎨
⎬
⎩0 for k ≠ 0⎭
eq 40
where k is an integer, Ts is the symbol (sample) clocking period, τ is the offset in the
receiver sampling clock times due to propagation delay that should be compared with
the times of the input symbols, and C is a nonzero constant.
25
That is, for a single flat-top pulse of level a at the input to the transmitting filter at t=0,
the received pulse would be a⋅he(t) and it would have a value of a⋅C at t=τ (i.e. for
K=0) but it would not cause interference at any other sampling time because
he(kTs+τ)=0 when k≠0.
Input weaveform, win(t)
0
1
0
0
Individual Nyquist filter
pulse response is 0 in KTs
0
Ts
Received waveform, wout(t)
(sum of filter pulse responses)
Improper filtering with ISI
s
t
t0
t
t0
t0
t
t0
t
Ts
No Intersymbol interference
0
1
0
1
1
t
t0
Sampling points
(trasmitter clock)
t
t0
Sampling points
(receiver clock)
Sampling points
(receiver clock)
figure 14
Individual Nyquist filter pulse
response is 0 in KTs
NO ISI
Input weaveform, win(t)
0
1
0
1
Improper filtering with ISI
Tss
t
Ts
2Ts
3Ts
figure 15
26
A rectangular filter function can be used for this purpose, therefore suppose that we
chose a (sinx)/x function for he(t), in particular, let τ =0, and chose
he (t ) =
sin π f s t
π f st
KTs=0 KTs≠0
eq 41
f s = 1 / Ts
Then this impulse response satisfies zero ISI Nyquist’s first criterion because in t=KTs=0
we have max amplitude of the output function he(t) whereas in t=KTs≠0 we have zero
amplitude of function.
lim he (t ) = lim
t →0
t →0
sin π f s t 0
=
π f st
0
⇒
lim
t →0
− π f cos π f s t
d ⎡ sin π f s t ⎤
= −1 = 1
⎢
⎥ = lim
t
→
0
dt ⎣ π f s t ⎦
π fs
eq 42
Consequently, if the transmit and receive filters are designed so that the overall transfer
function is
He ( f ) =
1 ⎛ f ⎞
∏⎜ ⎟
f s ⎜⎝ f s ⎟⎠
−B=−
D
2
+B=
D
2
freq
eq 43
i.e. like a rectangular frequency response, there will be no ISI.
Furthermore, the absolute bandwidth of this transfer function is 2B=fs=D . This is the
optimum filtering method to produce a minimum bandwidth system. It will allow signaling
at a baud rate of D=1/Ts=2B (pulses/s), where B=D/2 is the absolute bandwidth of the
system. As an example, if D=271 ks/s then the bandwidth of filter is B=D/2=135.5 KHz.
However, the (sinx/x) type of overall pulse shape has two practical difficulties:
•
•
The overall amplitude transfer characteristic He(f) has to be flat over a bandwidth
–B<f<B and zero elsewhere. This is physically unrealizable (i.e. the impulse
response would be non casual and of infinite duration)
The synchronization of the clock in the decoding sampling circuit has to be
almost perfect, since the (sinx/x) pulse decays only as 1/x and is zero in
adjacent time slot only when is at the exactly correct sampling time. Thus,
inaccurate sync will cause ISI.
Because of these difficulties, we are forced to consider other pulse shapes that have a
slightly wider bandwidth then a rectangular –B<f<B.
27
The idea is to find pulse shapes that go through zero at adjacent sampling points and
yet have an envelope that decays much faster than 1/x so that clock jitter in the
sampling times KTs≠0 does not cause appreciable ISI. One solution for the equivalent
transfer function, which has many desirable future, is the raised cosine-rolloff Nyquist
filter.
3.4 Raised Cosine-Rolloff Nyquist Filtering
DEFINITION: the raised cosine-rolloff Nyquist filter has the transfer function:
⎧ 1,
⎪ ⎧
⎡ π ( f − f1 )⎤ ⎫⎪
⎪1⎪
H e ( f ) = ⎨ ⎨1 + cos ⎢
⎥ ⎬,
⎣ 2 f ∆ ⎦ ⎭⎪
⎪ 2 ⎪⎩
⎪0,
⎩
f < f1 ⎫
⎪
⎪
f1 < f < B ⎬
⎪
f > B ⎪⎭
eq 44
Where B is the absolute bandwidth and the parameters f∆ and f1 are
f∆ = B − f0
eq 45
f1 = f 0 − f ∆
f0 is the 6-dB Raised Cosine filter bandwidth
r=
f∆
f0
⇒
f ∆ = rf 0
eq 46
Where r is the rolloff factor of the filter.
Consequently
B = f 0 + f ∆ = f 0 + rf 0 = f 0 (1 + r )
eq 47
f1 = f 0 − f ∆ = f 0 − rf 0 = f 0 (1 − r )
The filter characteristics are illustrated in figure below:
28
He(f)
f∆
f∆
1.0
0.5
-B
-f0
-f1
f1
f0
B
Freq.
6-db bandwidth
figure 16
For several value of the rolloff factor r the corresponding required signaling transmission
bandwidth B are:
He(f)
1.0
r0=0, min bandwidth
0.5
f0=fB
r1=0.5
r2=1
Freq.
figure 17
For rolloff factors r=0 we have f∆=0 and we obtain the minimum-bandwidth required
case, where f0=B.
The corresponding impulse shape response is
29
⎛ sin (2πf 0t ) ⎞ ⎡ cos(2πf ∆ t ) ⎤
⎟⎟ ⎢
he (t ) = F −1 [H e ( f )] = 2 f 0 ⎜⎜
2⎥
f
t
2
π
0
⎠ ⎣1 − (4 f ∆ t ) ⎦
⎝
eq 48
when r = 0, the corresponding impulse pulse shape response became like (sinx/x):
⎛ sin (2πf 0t ) ⎞
⎛ sin (2πf 0t ) ⎞ ⎡ cos(0) ⎤
⎟⎟
⎟⎟ ⎢
he (t ) = F −1 [H e ( f )] = 2 f 0 ⎜⎜
= 2 f 0 ⎜⎜
2⎥
⎝ 2πf 0t ⎠
⎝ 2πf 0t ⎠ ⎣1 − (0 ) ⎦
Time Response for different rolloff factor: r=0
eq 49
r= 0.5 r=1
20
impulse responce
15
10
he_(r=0)
he_(r=0.5)
he_(r=1)
5
0.400
0.350
0.300
0.250
0.200
0.150
0.100
0.050
0.000
-0.050
-0.100
-0.150
-0.200
-0.250
-0.300
-0.350
-0.400
0
-5
Ts (symbol time)
figure 18
E:\documenti per
corsi\ELETTRONICA T
As the absolute bandwidth is increased (e.g. r=0, r=0.5 or r = 1.0) the filtering
requirements are relaxed, the clock timing requirements are relaxed too, since the
envelope of the impulse response decays faster than 1/t (on the order of 1/t3 for large
value of t).
30
Let us now develop a formula which gives the baud rate that the raised cosine-rolloff
system can support without ISI. From figure above, the zeros in the system impulse
response occur at t =n/2f0 where n≠0. Therefore, data pulses may be inserted at each
of these zero points without causing ISI. That is, referring to
⎧C for k = 0 ⎫
he (kTs + τ ) = ⎨
⎬
⎩0 for k ≠ 0⎭
eq 50
with τ =0, we see that the raised cosine-rolloff filter, satisfies Nyquist’s first criterion (for
the absence of ISI) if the symbol clock period is equal to Ts=1/(2f0). The
corresponding baud rate is
D=
1
= 2 f0
Ts
(Symbol / s )
⇒
f0 =
D
2
That is, the 6-dB bandwidth of the raised cosine-rolloff filter, f0, is designed to be half
the symbol (baud) rate.
D 2B − D
B − f0
2B − D
f
2 =
2
=
=
r= ∆ =
D
D
D
f0
f0
2
2
2B
⇒ D ⋅ r = 2B − D
⇒ D=
1+ r
B−
⇒
eq 51
where B is the absolute bandwidth of the system and r is the system rolloff factor.
B=
D
(1 + r )
2
eq 52
The greater r the grater B, and as a function of B and r we can aspect a maximum
value of symbol rate D.
Comparing to first criteria where B=D/2 now the bandwidth is increased when r≠0
31
4 BANDPASS SIGNALING
4.1 COMPLEX ENVELOPE RAPPRESTNATION OF BANDPASS
WAVEFORMS
4.1.1 Definitions: Baseband, Bandpass, and modulation
Definition. A baseband waveform has a spectral magnitude that is nonzero for
frequencies in the vicinity of the origin (i.e. f=0) and negligible elsewhere.
f0
f
figure 19
Definition. A bandpass waveform has a spectral magnitude that is non zero for
frequencies in some band concentrated about a frequency f =±fc, where fc>>0. the
spectral magnitude is negligible elsewhere. fc is called the carrier frequency.
f
-fC
+fC
figure 20
Definition. Modulation is the process of imparting the source information on to a
bandpass signal with a carrier frequency fc by the introduction of amplitude or phase
perturbations or both. This bandpass signal is called the modulated signal s(t), and the
baseband source signal is called the modulating signal m(t).
As the modulated signal passes through the channel, noise corrupts it. The result is a
bandpass signal-plus noise waveform that is available at the receiver input, r(t). (see
figure below) the receiver has the job of trying to recover the information that was sent
from the source; m* denote the corrupted version of m.
32
4.1.2 Complex Envelope Representation
All bandpass waveform, whether they arise from a modulated signal, interfering
signals, or noise, may be represented in a convenient form by the theorem that follows.
v(t) will be used to denote the bandpass waveform canonically; it can represent the
signal when s(t)=v(t), the noise when n(t)=v(t), the signal plus noise at the channel end
when r(t)=v(t).
m
Signal
processing
g(t)
Carrier
circuits
s(t)
Trasmission
medium
(channel)
r(t)
Carrier
circuits
g*(t)
Signal
processing
m*
Receiver
Trasmitter
Figure 21: communication system
4.1.3 Theorem
Any physical bandpass waveform can be represented by
{
}
v(t ) = Re g (t )e jωct = Re { g (t ) [ cos ωc t + j sin ωc t ]}
eq 53
here, Re(⋅) denotes the real part of (⋅), g(t) is called the complex envelope of v(t), and
fc is the associated carrier frequency (in Hertz) where ωc=2πfc is the radian frequency.
Furthermore, two other equivalent representations are
v(t ) = R (t ) cos [ωc t + θ (t )]
eq 54
and
v(t ) = x(t ) cos ωc t − y (t ) sin ωc t
eq 55
where
g (t ) = x(t ) + jy (t ) = g (t ) e j∠g (t ) = R(t )e jθ (t )
eq 56
33
x(t ) = Re { g (t )} = R (t ) cos θ (t )
eq 57
y (t ) = Im { g (t )} = R (t ) sin θ (t )
eq 58
R(t )
g (t ) = x 2 (t ) + y 2 (t )
eq 59
and
⎛ y (t ) ⎞
⎟
⎝ x(t ) ⎠
θ (t ) ∠g (t ) = tan −1 ⎜
eq 60
Consequently we obtain:
{
}
v(t ) = Re g (t )e jωct = Re { g (t ) [ cos ωc t + j sin ωc t ]} = Re {[ x(t ) + jy (t ) ][ cos ωc t + j sin ωc t ]} =
= Re { x(t ) cos ωct + jx(t ) sin ωc t + jy (t ) cos ωc t − y (t ) sin ωc t} =
= x(t ) cos ωc t − y (t ) sin ωc t
eq 61
In communication systems, the frequencies in the baseband signal g(t) are said to be
heterodyned up to fc.
The complex envelope, g(t), is usually a complex function of time, it is the baseband
equivalent of the bandpass signal v(t), and it is a generalization of the phasor concept.
In this case x(t) is said to be the in-phase modulation component also colled I(t), and
y(t) is said to be quadrature modulation component Q(t) associated with v(t).
Alternatively, the polar form of g(t) is represented by R(t) and θ(t); here R(t) is always
non negative and is said to be amplitude modulation (AM) on v(t), while θ(t) is said to
be the phase modulation (PM) on v(t).
34
4.2 REPRESENTATION OF MODULATED SIGNALS
Modulation is the process of encoding the source information m(t) (modulating signal)
into a bandpass signal s(t) (modulated signal). Consequently, the modulated signal is
just a special application of the bandpass representation. The modulated signal is
given by
{
s (t ) = Re g (t )e jωct
}
eq 62
where ωc=2πfc is the carrier frequency. The complex envelope g(t) is a function of
modulating signal m(t). That is,
g (t ) = g [m(t )]
eq 63
35
4.3 SPECTRUM OF BANDPASS SIGNALS
The spectrum of a bandpass signal is directly related to the spectrum of its complex
envelope.
Theorem.
If a bandpass waveform is represented by
{
v(t ) = Re g (t )e jωct
}
eq 64
than the Spectrum of the bandpass waveform is
V( f ) =
[
]
1
G ( f − f c ) + G * (− f − f c )
2
eq 65
where
G ( f ) = F [g (t )]
eq 66
is the Fourier transform of g(t)
the Power Spectral Density (PSD) of the waveform is
Pv ( f ) =
[
1
Pg ( f − f c ) + Pg (− f − f c )
4
]
eq 67
where
Pg ( f )
is the PSD of g(t)
G(f)
G(f)
G(-f-fc)
G(f-fc)
figure 22
36
5 AM, FM, PM MODULATED SYSETMS
5.1 Definitions
Amplitude Modulation (AM) is a system where the frequency of a carrier wave is held
constant while the amplitude is varied in sympathy with the voltage of the modulating
signal.
Frequency Modulation (FM) is a system where the amplitude of a carrier wave is held
constant while the frequency is varied in sympathy with the voltage of the modulating
signal.
Phase Modulation (PM) is a similar system where the phase of the carrier wave is
varied in sympathy with the voltage of the modulating signal, and as in frequency
modulation, the amplitude of a carrier is held constant.
Phase is the position of a rotating vector or phasor.
Angular Velocity is the rate of change of phase (usually expressed in radians per
second).
The Radian is a unit of angular displacement (as is degrees), there are 2*π radians in a
full circle (or 360°), so a radian is approximately 57°.
Frequency is a measure of the number of repetitions of a periodic waveform in unit time
(1 second). Frequency of a carrier wave is related to Angular Velocity, there are 2*π
radians in each cycle of a carrier wave, so the Angular Velocity is 2*π * frequency.
Pi is a numeric constant, it's value is approximately 3.1411592654. (You can
approximate it by using 22/7 - the error is less than 0.05%).
5.2 AMPLITUDE MODULATION
The complex envelope of an AM signal is given by
g (t ) = Ac [1 + m(t ) ]
eq 68
Where the constant Ac, has been included to specify the power level and m(t) is the
modulating signal (which may be analog or digital).
These equations reduce to the following representation for AM signal:
37
[
]
[
]
s (t ) = Re g (T )e jωct = Re Ac (1 + m(t ))e jωct =
eq 69
= Re[Ac (1 + m(t )) cos ωc t + jAc (1 + m(t )) sin ωc t ]
s (t ) = Ac [1 + m(t ) ] cos ωc t
eq 70
For convenience, it is assumed that the modulating signal m(t) is a sinusoid. The
modulating signal corresponds to the in-phase component x(t) of the complex envelope;
it also correspond to the real envelope g (t ) when m(t)≥-1 (the usual case).
If m(t ) = m cos(ωmt )
Then recalling that
eq 71
cos α cos β =
1
[cos(α + β ) + cos(α − β )]
2
we have
s (t ) = Ac [1 + m(t ) ] cos ωct = Ac [1 + m cos ωmt ] cos ωc t = Ac cos ωc t + Ac m cos ωmt cos ωc t =
= Ac cos ωc t +
1
1
Ac m cos (ωc + ωm ) t + Ac m cos (ωc − ωm ) t
2
2
eq 72
in figure below is shown a sinusoidal modulating wave and the resulting modulated AM
signal.
m(t)
envelope = information associated with modulating signal
g (t ) = Ac [1 + m(t ) ]
s(t )
Amin Ac
Amax
t
Tc
1/Tc=fc
figure 23
38
The overall modulation percentage is:
%modulation=
max [ m(t ) ] -min [ m(t ) ]
A max -A min
100 =
100
2Ac
2Ac
eq 73
5.2.1 Normalized AM average power
The normalized average power of an AM signal is:
1
2
g (t ) =
2
1
1
1
1
2
= Ac2 [1 + m(t )] = Ac2 1 + m 2 (t ) + 2m(t ) = Ac2 + Ac2 m(t ) + Ac2 m 2 (t )
2
2
2
2
s 2 (t ) =
eq 74
If modulation m(t) contains no dc level, then m(t ) = 0 and the normalized power of an
AM signal is
s 2 (t ) =
1 2 1 2 2
Ac + Ac m (t )
2
2
discrete
carrier
power
eq
sideband
power
The voltage magnitude spectrum of the AM signal is given by:
S( f ) =
Ac
[δ ( f − f c ) + M ( f − f c ) + δ ( f + f c ) + M ( f + f c )]
2
eq 76
39
M(f )
-B
f
B
a) Magnitude spectrum of modulation signal
S( f ) A
δ(f-fc)
Ac
2
-fc-B
-fc
Discrete carrier
term with
weight=1/2Ac
δ(f+fc)
Lower
sideband
-fc+B
fc-B
Upper
sideband
fc
fc+B
f
b) Magnitude spectrum of AM signal
figure 24
5.2.2 Definition: The modulation efficiency
The modulation efficiency is the percentage of the total power of the modulated signal
that conveys information.
In AM signal, only the sideband components conveys information, so the modulation
efficiency is
1 2 2
Ac m (t )
m 2 (t )
2
100 =
E=
100
2
1 2 1 2 2
1
(
)
+
m
t
Ac + Ac m (t )
2
2
eq 77
The highest efficiency that can be attained for a 100% AM signal would be 50%, (for
the case when square-wave modulation is used m=1).
40
6 PHASE MODULATION AND FREQUENCY MODULATION
6.1 Representation of PM and FM Signals
Phase Modulation (PM) and Frequency modulation (FM) are special cases of anglemodulated signaling. In this kind of signaling the complex envelope is
g (t ) = Ac e jθ (t )
eq 78
here θ(t) is a linear function of the modulating signal m(t), while g(t) is a non linear
function of the modulation.
The resulting angle-modulated signal is:
{
}
{
}
{
}
s (t ) = Re g (t )e jωct = Re Ac e jθ (t ) e jωct = Re Ac e j [θ (t )+ωct ] = Ac cos[ω c t + θ (t )]
eq 79
The relation between phase θ(t) and the instantaneous frequency fi is:
fi =
1 dθ (t )
2π dt
⇒
θ (t ) = 2π
t
∫ f dt
i
eq 80
−∞
1. for PM, the phase is directly proportional to the modulating signal m(t);
θ (t ) = D p m(t )
eq 81
Where the proportionally constant Dp is the phase sensitivity(phase deviation
constant) of the phase modulator, having units of radians per volt [assuming that
m(t) is a voltage waveform].
2. For FM, the phase is proportional to the integral of m(t), so that
t
θ (t ) = D f ∫ m(σ )dσ
eq 82
−∞
where the frequency deviation constant Df, has units of radians/volt-second.
41
We can develop an example for a PM first and FM later.
suppose
m(t ) = Am cos ωm t
•
eq 83
in the PM case we have
θ (t ) = D p m(t ) = D p Am cos ωmt = β p cos ωmt
eq 84
Where
β p = D p Am
•
is the phase modulation index
in the FM case we have
t
θ (t ) = D f ∫ m(σ )dσ = D f
−∞
t
∫A
m
1
cos ω mσ dσ = Am D f
ω
−∞
sin ω m t = β f sin ω m t
eq 85
Where
β f = Am D f
1
ωm
is the frequency modulation index
The complex envelope is:
g (t ) = Ac e jθ ( t ) = Ac e
jβ f sin ωmt
eq 86
Therefore the modulated bandpass signal is:
{
}
s (t ) = Re g (t )e jωct =
{
= Re Ac e
jβ f sin ωmt
}
{
e jωct = Re Ac e
[
j β f sin ω mt +ωc t
]
}= A cos[β
c
f
]
sin ω m t + ω c t =
eq 87
t
t
D f Am
⎤
⎡
⎤
⎡
cos ω m t ⎥
= Ac cos ⎢ω c t + ∫ β f cos ω m t ⎥ = Ac cos ⎢ω c t + ∫
ωm
−∞
−∞
⎦
⎣
⎦
⎣
42
[
the last term: cos ω c t + β f sin ω m t
]
can be studied by Bessels function
figure 25
Definition. If a bandpass signal is represented by
s (t ) = R (t ) cosψ (t ) = R (t ) cos[ωc t + θ (t )]
eq 88
then the instantaneous frequency (Hertz) of s(t) is [Boashash, 1992]
f i (t ) =
1
1 ⎡ dψ (t ) ⎤ 1 ⎡ d [ωc t + θ (t )]⎤
ωi (t ) =
=
⎥⎦ =
dt
2π
2π ⎢⎣ dt ⎥⎦ 2π ⎢⎣
1
1 dθ (t )
1 dθ (t )
=
ωc +
= fc +
2π
2π dt
2π dt
Therefore using θ (t ) = D f
eq 89
t
∫ m(σ )dσ
−∞
t
⎡
⎤
d ⎢ D f ∫ m(σ )dσ ⎥
1 dθ (t )
1 ⎣ −∞
⎦ = f + 1 D m(t )
f i (t ) = f c +
= fc +
c
f
2π dt
2π
dt
2π
eq 90
43
Of course, this is the reason for calling this type of signaling frequency modulation—
the instantaneous frequency varies about the assigned carrier frequency fc, in a manner
that is directly proportional to the modulating signal m(t).
vp
m(t)---sinusoidal modulating signal
fc+∆f
fi(t)---istantaneous frequency of the corresponding FM signal
fc
fc-∆f
s(t)---correspondign FM signal
s(t)---has constant amplitude
Ac
figure 26
figure above show how the instantaneous frequency varies when a sinusoidal
modulation (for illustrative purposes ) is used.
The frequency deviation from the carrier frequency is
f d (t ) = f i (t ) − f c =
1 d θ (t )
2π dt
eq 91
and the peak frequency deviation is
⎡ 1 d θ (t ) ⎤
∆ f = max [ f d (t ) ] = max ⎢
⎣ 2π dt ⎥⎦
eq 92
44
note that ∆f is a non negative number. In some applications, such as unipolar digital
modulation, the peak to peak deviation is used:
⎡ 1 dθ (t ) ⎤
⎡ 1 dθ (t ) ⎤
∆f pp = max ⎢
− min ⎢
⎥
⎣ 2π dt ⎥⎦
⎣ 2π dt ⎦
eq 93
For FM signaling, the peak frequency deviation is related to the peak modulating
voltage by:
1
⎡ 1 dθ (t ) ⎤
⎡ 1
⎤ 1
D f m(t )⎥ =
D f max[m(t )] =
D f Vp
∆f = max[ f d (t )] = max ⎢
= max ⎢
⎥
2π
⎣ 2π dt ⎦
⎣ 2π
⎦ 2π
eq 94
An increase in the amplitude of the modulation signal Vp will increase ∆f.
This in turn will increase the bandwidth of the FM signal, but will not affect the average
power level of the FM signal, which is AC2/2. As Vp is increased, spectral components
will appear farther and farther away from the carrier frequency, and the spectral
components near the carrier frequency will decrease in magnitude, since the total power
in the signal remains constant. This situation is distinctly different from AM signaling,
where the level of the modulation affects the power in the AM signal, but does not affect
its bandwidth.
In a similar way, the peak phase deviation may be defined by:
∆θ = max[θ (t )]
eq 95
which for PM, is related to the peak modulation voltage by
∆θ = D pV p = D p max[m(t )]
eq 96
6.1.1 Definition for peak phase deviation and peak frequency deviaton.
•
The phase modulation index is given by
β p = ∆θ
eq 97
where ∆θ is the peak phase deviation.
•
The frequency modulation index is given by:
45
βf =
∆F
B
eq 98
where ∆F is the peak frequency deviation and B is the bandwith of the modulating
signal, which, for the case of sinusoidal modulation, is fm, i.e the sinusoid sinusoid.
Using the deviation frequency expression found above we can rewrite:
1
D m(t ) D m(t ) D m(t )
∆F 2π f
f
f
=
=
=
βf =
ωm
fm
fm
2πf m
eq 99
Therefore the more greater m(t) the more greater βf, and the more greater ωm, the lower
βf. These facts have fundamental implication when we will speak about noise effect in
FM / PM modulation.
For digital signals, an alternative definition of modulation index is sometimes used and
is denoted by h in the literature. This digital index is:
h=
2∆θ
eq 100
π
where 2∆θ is the maximum peak to peak phase deviation change during the time that it
takes to send one symbol, Ts.
Strictly speaking, the FM index is different only for the case of single-tone (i.e.
sinusoidal) modulation.
However, it is often used for other waveshapes, where B is chosen to be the highest
frequency or the dominant frequency in the modulating waveform.
6.2 Spectra of Angle-Modulated signals
We found that the spectrum of an angle modulated signal is given by
S( f ) =
1
[G( f − f c ) + G * (− f − f c )]
2
eq 101
where
[
]
[
G ( f ) = F [g (t )] = F Ac e jθ (t ) = F Ac e j [ f ( m (t ) ]
]
eq 102
46
Since g(t) is a non linear function of m(t) a general formula relating G(f) cannot be
obtained, that is G(f) must be evaluated case by case basis for the particular
modulating waveshape of interest, furthermore superposition does not hold, and the FM
spectrum for the sum of two modulating waveshapes is not the same as summing the
FM spectra that were obtained when the individual waveshapes were used.
The evaluation into a closed form is not easy, one often has to use a numerical
techniques to approximate the Fourier transform integral. An example for the case of
sinusoidal waveshape will now be worked out.
6.2.1 Spectrum of a PM or FM signal with Sinusoidal Modulation
Let us assume as an example
t
θ (t ) = D f ∫ m(σ )dσ = D f
−∞
t
∫A
m
cos ω mσ dσ = Am D f
−∞
1
ω
sin ω m t = β f sin ω m t
eq 103
then the complex envelope is
g (t ) = Ac e jθ ( t ) = Ac e jβ sin ωmt
eq 104
which is periodic with period
Tm =
1 2π
=
f m ωm
eq 105
consequently g(t) could be represented by a Fourier series that is valid over all time
(-∞<t<∞);
∞
g (t ) =
∑c e
n= −∞
n
jnωmt
eq 106
where:
1
cn =
Tm
+
Tm
2
1
− jnω t
∫T g (t )e m dt = Tm
m
−
2
+
Tm
2
∫ [A e
c
T
− m
2
jβ sin ωmt
]
A
e − jnωmt dt = c
Tm
+
Tm
2
∫ [e
j ( β sin ωmt −nωmt )
]dt
eq 107
T
− m
2
Calling:
47
ϑ = ωmt
eq 108
⎛ Tm ⎞ 2π ⎛ Tm ⎞
⎜ − ⎟ = −π
⎟=
⎝ 2 ⎠ Tm ⎝ 2 ⎠
⎛ T ⎞ 2π ⎛ Tm ⎞
ϑ2 = ω m ⎜ + m ⎟ =
⎜ − ⎟ = +π
⎝ 2 ⎠ Tm ⎝ 2 ⎠
eq 109
ϑ1 = ωm ⎜ −
2π
dt
Tm
dϑ = ωm dt =
⇒
dt =
Tm
dϑ
2π
eq 110
Substituting we obtain
cn =
Ac
Tm
+
Tm
2
(
∫ [e
j β sin ωmt − nωmt )
T
− m
2
⎧1
cn = Ac ⎨
⎩ 2π
]dt = TA
c
m
ϑ =π
[e
∫
ϑ π
j ( β sin ϑ − nϑ )
2π ⎛ Tm ⎞
⎜
⎟
Tm ⎝ 2 ⎠
j ( β sin ϑ − nϑ )
∫ [e
2π ⎛ T ⎞
ϑ= ⎜ − m ⎟
Tm ⎝ 2 ⎠
] 2Tπ dϑ = TA
m
c
m
]dϑ ⎫⎬ = A J (β )
⎭
=−
ϑ=
c
Tm
2π
ϑ =π
∫ [e
ϑ π
j ( β sin ϑ − nϑ )
]dϑ
eq 111
=−
eq 112
n
This integral [ known as the Bessel function of the first kind of the nth order, Jn(β) ]
cannot be evaluated in closed form, but it has been evaluated numerically.
Taking the Fourier transform of g(t) we obtain:
G ( f ) = F [g (t )] =
n= +∞
n = +∞
n= −∞
n = −∞
∑ cnδ ( f − nf m ) = Ac
∑ J (β )δ ( f − nf )
n
m
eq 113
The spectrum is a series of Dirac-impulse spaced by nfm and multiplied by the
amplitude of Bessel function.
Therefore the discrete carrier term (at f=fc) is proportional to J 0 ( β ) ; consequently, the
level (magnitude) of the discrete carrier depends on the modulation index, it will be zero
if J 0 ( β ) = 0 .
The bandwidth of the bandpass angle-modulated signal depend on β and fm. In fact it
can be shown that 98% of the power is approximately contained in the bandwidth
48
BT = 2( β + 1) B
eq 114
where β is either the phase modulation index or the frequency modulation index
and B is the bandwidth of the modulating signal (which is fm for sinusoidal
modulation).
This formula is called Carson’s rule.
Using this result, we get the spectrum of FM or PM with sinusoidal modulation for
various modulation indexes as reported in figure below.
Fig below shows the spectral distribution of an FM wave, The column labelled fc is the
carrier and the other columns are the nth sidebands. Note the increasing in large
number of sidebands and the simultaneously carrier amplitude decreasing (in the centre
of the diagram) close to zero, when β change up to β =2, we can see how most of the
FM wave energy is in the sidebands.
The values of Bessel functions are commonly published in tables as in Table below. In
the table, mf is the modulation index and J0..Jn are the amplitude coefficients for the
carrier and sidebands
mf
J0
J1
J2
J3
0.00
1.000
0.000
0.000
0.000
0.05
0.999
0.025
0.000
0.000
0.50
0.938
0.242
0.031
0.003
1.00
0.765
0.440
0.115
0.020
1.50
0.512
0.558
0.232
0.061
2.00
0.224
0.577
0.353
0.129
2.50
-0.048
0.497
0.446
0.217
3.00
-0.260
0.339
0.486
0.309
4.00
-0.397
-0.066
0.364
0.430
Table 1
The greater mf the lower j0.
49
⎛
⎞
⎜ S( f ) ⎟
⎜
⎟
⎜ 1A ⎟
⎜
c ⎟
⎝ 2
⎠
J0(0,2)
1.0
J1(0,2)
f
fc
β=0,2
BT
⎛
⎞
⎜ S( f ) ⎟
⎜
⎟
⎜ 1A ⎟
⎜
c ⎟
⎝ 2
⎠
J0(1)
J1(1)
1.0
J2(1)
f
fc
β=1
fc+fm
fc+2fm
BT
⎛
⎞
⎜ S( f ) ⎟
⎜
⎟
⎜ 1A ⎟
⎜
c ⎟
⎝ 2
⎠
J0(2)
J1(2)
1.0
J2(2)
J2(2)
f
fc
β=2
fc+fm
fc+3fm
BT
⎛
⎞
⎜ S( f ) ⎟
⎜
⎟
⎜ 1A ⎟
⎜
c ⎟
⎝ 2
⎠
β=5
1.0
J0(5)
J1(5)
J2(5)
J3(5)
J4(5)
J5(5) J (5)
6
f
fc
fc+fm
fc+6fm
BT
figure 27
50
6.3 Noise and frequency modulation
6.3.1 Noise triangle
To understand the effect of noise on an FM signal, it helps to consider a single noise
frequency vector added to the FM signal vector Ec (see figure below). Since it is at a
different frequency, the noise vector will rotate about it with an angular velocity equal to
the difference between the noise frequency and the carrier frequency. This will produce
a variation in amplitude and phase of the resultant vector. The amplitude variation can
be largely eliminated in a limiter stage, but the phase variation (shown as Ø) remains
Resulting Vector
figure 28 : Effect of a noise phasor on an FM carrier phasor
The modulation index due to the noise voltage is constant, whereas the modulation
index for the desired modulation signal decreases with the increasing of the modulating
frequency fm or with the band B of the modulating signal (for FM).
β f = D f Am
1
ωm
=
∆f ∆f
≅
B
fm
eq 115
Or the similar expression already found
1
D m(t ) D m(t ) D m(t )
∆f 2π f
f
f
=
=
=
βf =
2πf m
ωm
fm
fm
eq 116
Consequently the lower the βf, the lower the phase variation θ(t) and the lower the
deviation frequency ∆f:
t
θ (t ) = D f ∫ m(σ )dσ = D f
−∞
t
∫A
m
−∞
cos ω mσ dσ = Am D f
1
ω
sin ω m t = β f sin ω m t
eq 117
This means that the noise degrades the Signal-to-Noise Ratio for an FM / PM
modulation more at higher modulating frequencies than at lower modulating frequency.
51
A plot of the noise vs frequency has a triangular shape, hence the term noise triangle
noise
AM noise rectangular
FM noise triangle
fc
f
figure 29: FM noise sideband distribution (mf=1).
Figure above shows the distribution of noise sidebands compared with the AM case.
6.4 Preemphasis and Deemphasis in angle modulated Systems
As described, with FM reception, noise contributes more to the high frequency portions
of the spectrum than to the lower frequency portions. The higher frequency portions
therefore tend to have a lower Signal-to-Noise Ratio than the lower frequency portions.
The noise contribution of the high frequency region can be reduced by transmitting the
highs at increased relative levels and then reducing the level by the same amount at the
receiver. This boosting of the highs at the transmitter is known as Pre-emphasis and
the reduction of the highs at the receiver is called De-emphasis.
For realistic reproduction, the amount of de-emphasis at the receiver must equal the
pre-emphasis at the transmitter. Simple networks are utilized to achieve this. The
networks are typically a single RC filter stage, and are characterised by the time
constant of the filter section
In a modulator the audio modulating signal is boosted with Pre-emphasis prior to
modulation. In the receiver, De-emphasis is used after demodulation to recover a flat
audio frequency response. This results in a much improved Signal-to-Noise Ratio for
any given FM transmission system. This gives an overall baseband frequency response
that is flat, while improving the signal to noise ratio at the receiver output.
52
Modulating
Input signal
vin
Pre-emphasis
filter
mf
FM
trasmitter
s(t)
Trasmission
medium
(channel)
r(t)
FM
receiver
Trasmitter
g*(t)
De-emphasis
filter
m*
Receiver
figure 30
The standard in the USA for FM Radio is
τ
=75 microseconds. Be aware that some
countries have standardized on τ =25 or τ =50 microseconds and International
Satellites use what is called the J-17 standard as well as others.
C
Bode plot Pre-enphasis
Log H p ( f )
R1
R2
Pre-enphasis filter
Hp( f ) = K
1 + j ( f / f1 )
1 + j( f / f 2 )
f1 =
1
2πτ 1
Log H p ( f )
=
1
2τR1C
Log(f)
R + R2
1
f2 =
= 1
2πτ 2 2τR1 R2C
Bode plot De-enphasis
R1
C
De-enphasis filter
Log(f)
f1
Hp( f ) =
1
1 + j ( f / f1 )
f1 =
1
2πτ 1
=
f2
1
2τR1C
figure 31
53
6.4.1 De-Emphasis response table
--
75 MICROSECOND RESPONSE TABLE for broadcasting FM
FREQUENCY
UNLIMITED
75uS
26 dB
75uS (roofed)
26 dB
25uS (roofed)
50 Hz
100 Hz
500 Hz
1 KHz
2 KHz
3 KHz
4 KHz
5 KHz
6 KHz
7 KHz
8 KHz
9 KHz
10 KHz
11 KHz
12 KHz
13 KHz
14 KHz
15 KHz
16 KHz
17 KHz
18 KHz
19 KHz
20 KHz
100 KHz
1 MHz
-0.00 dB
-0.01 dB
-0.23 dB
-0.87 dB
-2.76 dB
-4.77 dB
-6.58 dB
-8.16 dB
-9.54 dB
-10.75 dB
-11.82 dB
-12.78 dB
-13.66 dB
-14.45 dB
-15.18 dB
-15.86 dB
-16.49 dB
-17.07 dB
-17.62 dB
-18.14 dB
-18.63 dB
-19.09 dB
-19.53 dB
-33.47 dB
-53.47 dB
-0.00 dB
-0.01 dB
-0.23 dB
-0.87 dB
-2.75 dB
-4.75 dB
-6.55 dB
-8.11 dB
-9.46 dB
-10.64 dB
-11.68 dB
-12.60 dB
-13.43 dB
-14.17 dB
-14.85 dB
-15.47 dB
-16.04 dB
-16.56 dB
-17.05 dB
-17.50 dB
-17.91 dB
-18.30 dB
-18.66 dB
-25.27 dB
-25.97 dB
-0.00 dB
-0.00 dB
-0.03 dB
-0.11 dB
-0.41 dB
-0.87 dB
-1.44 dB
-2.08 dB
-2.75 dB
-3.43 dB
-4.10 dB
-4.75 dB
-5.37 dB
-5.97 dB
-6.54 dB
-7.09 dB
-7.61 dB
-8.10 dB
-8.58 dB
-8.95 dB
-9.45 dB
-9.86 dB
-10.26 dB
-21.85 dB
-25.95 dB
table 2
--
J-17 RESPONSE TABLE for Satellite
FREQUENCY
J-17
1.00
50.00
200.00
400.00
800.00
1.42
2.00
4.00
6.40
8.00
10.00
100.00
+9.38
+9.32
+8.68
+7.10
+3.72
+0.00
-2.40
-6.28
-7.89
-8.37
-8.70
-9.38
Hz
Hz
Hz
Hz
Hz
KHz
KHz
KHz
KHz
KHz
KHz
KHz
table 3
Note that all the losses shown on the De-emphasis tables would become gains for the
Pre-emphasis network within any FM modulator
54
6.4.2 Why use “Roofed” Pre-Enhasis
The higher audio frequencies are boosted in the pre-emphasis network. Out-of-band RF
signals entering with the audio program would also be boosted if they were not limited.
Observe that an unlimited 75 microsecond pre-emphasis network would boost a 1 MHz
spurious signal by 53.47 dB while the 26 dB "Roofed" 75 microsecond pre-emphasis
network would only boost the spurious signal by 25.97 dB. Higher spurious signals
would be boosted without limit in an unlimited pre-emphasis network while the "roofed"
pre-emphasis network would limit at 26 dB.
6.5 Frequency division multiplexing
Frequency-Division multiplexing (FDM) is a technique for transmitting multiple
messages simultaneously over a wideband channel by first modulating the message
signals on to several subcarriers and forming a composite baseband signal that consists
of the sum of these modulated subcarriers.
This composite signal may then be modulated onto the main carrier as shown in figure
below
m1(t)
Subcarrier modulator
fSC1
Ssc1(t)
m2(t)
Subcarrier modulator
fSC2
Ssc1(t)
Σ
m3(t)
Subcarrier modulator
fSCN
SscN(t)
mb(t)
Transmitter
s(t)=FDM
fC
Composite baseband modulating
signal
Transmitter
figure 32
55
Any type of modulation, such as AM, DSB, SSB, PM, FM, and so on, can be used. The
types of modulation used on the subcarriers, as well as the type of modulation used on
the main carrier, may be different.
However, as shown in figure below the composite signal spectrum must consists of
modulated signal that do not have overlapping spectra; otherwise, crosstalk will occur
between the message signals at the receiver output.
The composite baseband signal then modulates a main transmitter to produce the FDM
signal that is transmitted over the wideband channel.
Mb( f )
0
fSC1
fSC2
fSC3
fSCN
BSC1
BSC2
BSC3
BSC
f (Hz)
B
figure 33
The received FDM signal, is first demodulated to reproduce the composite baseband
signal that is passed through filters to separate the individual modulated subcarriers.
Then the subcarriers are demodulated to reproduce the message signals m1(t), m2(t),
and so on.
56
Composite
baseband signal
Badnpass filter
fSC1
Badnpass filter
fSC2
s(t)=FDM Main
receiver
Badnpass filter
fSCN
Ssc1(t)
Demodulator
fSC1
Ssc2(t)
Demodulator
fSC2
Ssc3(t)
Demodulator
fSCN
m1(t)
m2(t)
mN(t)
Receiver
figure 34
7 OUTPUT SIGNAL-TO NOISE RATIOS FOR ANALOG
SYSTEMS
For systems with additive noise channels the input to the receiver is
r (t ) = s (t ) + n(t )
eq 118
for bandpass communication systems having a transmission bandwidth of BT
{
}
{
}
{
}
{
r (t ) = Re g s (t )e j (ωct +θc ) + Re g n (t )e j (ωct +θc ) = Re [g s (t ) + g n (t )]e j (ωct +θc )
}
eq 119
or
r (t ) = Re gT (t )e j (ωct +θc )
eq 120
where
57
g T (t ) = g s (t ) + g n (t ) =
= [xs (t ) + xn (t )] + j[ y s (t ) + y n (t )] =
eq 121
= xT (t ) + jyT (t ) =
= RT (t )e jθT
RT (t ) = g s (t ) + g n (t )
eq 122
gT(t) denotes the total (i.e. composite) complex envelope at the receiver input; it
consists of the complex envelope of the signal plus complex envelope of the noise.
7.1 Comparison with Baseband Systems
The noise performance of various types of bandpass systems is examined by evaluating
the signal-to-noise power ratio at the receiver output, (S/N)out, when a modulated signal
plus noise is present at the receiver input. We would like to see if (S/N)out is larger for an
AM system or an FM system. To compare these SNRs, the power of the modulated
signals at the inputs of the receivers is set to the same value and the PSD of the input
noise is N0/2. (that is , the input noise is white with a spectral level set to N0/2).
To compare the output signal to noise ratio (S/N)out for various bandpass
systems we need a common measurement criterion for the receiver input. For analog
systems, the criterion is the received signal power Ps, divided by the amount of the
power in the white noise that is contained in a bandwidth equal to the message
(modulating) bandwidth B of the baseband signal. This is equivalent to the (S/N)out of a
baseband transmission system, as illustrated in figure below.
n(t)
PN=N0/2
s(t)
PN=2BxN0/2= N0B
Σ
(S/N)in
Lowpass filter
Bandwidth =B
2B= bandwidth of modulated
s(t) signal
r(t)=s(t)+n(t)
(S / N )in = (S / N )baseband
{
r (t ) = Re g T (t )e j (ωct +θc )
Receiver
=
Ps
N0 B
}
figure 35 : Baseband system
where:
58
P
⎛S⎞
= s
⎜ ⎟
⎝ N ⎠baseband N 0 B
eq 123
We can compare the performance of different modulated systems by evaluating (S/N)out
P
for each system as a function of (S / N )baseband = s , where Ps, is the power of AM or FM
N0 B
signal at the receiver input, B is chosen to be the bandwidth of the baseband
(modulating) signal where the same baseband modulating signal is used for all cases
so that the same basis of comparison will be realized.
7.2 AM Systems with Product Detection
Figure Below illustrates the receiver for an AM system with coherent detection
(correlator receiver).
{
r (t ) = s (t ) + n(t ) = Re gT (t )e j (ω c t +θ c )
}
Product detector
(S / N )in = (S / N )baseband
Lowpass filter
Bandwidth =B
IF filter
r(t) = Modulated signal
plus noise in
m * (t ) = Re{gT (t )}
(S / N )out
2 cos(ωct + θ c )
figure 36 : Coherent receiver
it can be shown that
(S / N )out
(S / N )baseband
=
m *2
1 + m *2
eq 124
for 100% sine-wave modulation, m *2 = 1 / 2 therefore
59
(S / N )out
(S / N )baseband
1
1
= 2 =
1 3
1+
2
eq 125
This illustrates that AM system is worse than a baseband system that uses the same
amount of signal power, because of the additional power in the discrete AM carrier that
does not contribute to the information ability of the signal but permits AM receivers to
use economical envelope detectors
7.3 SSB systems
it can be shown that
(S / N )out
(S / N )baseband
=1
eq 126
7.4 PM systems
The modulation on a PM signal is recovered by a receiver that uses a (coherent) phase
detector.
{
r (t ) = s (t ) + n(t ) = Re gT (t )e j (ω c t +θ c )
IF filter
}
Detector
(PM or FM)
⎫
⎧
⎪r0 (t ) = ∠g T (t ) for PM ⎪
⎪
⎪
⎬
⎨
⎪
⎪
d
⎪r0 (t ) = [∠g T (t )] for FM ⎪
dt
⎭
⎩
m * (t ) = Re{gT (t )}
Lowpass filter
Bandwidth =B
(S / N )out
Modulated signal
plus noise in
figure 37 : Receiver for angle-modulated-signal
The PM signal has a complex envelope of
60
g s (t ) = Ac e jθ s ( t )
eq 127
where
θ s (t ) = D p m(t )
eq 128
the complex envelope of the complex signal plus noise at the detector inputs is
gT (t ) = gT (t ) e jθ ( t ) = [g s (t ) + g n (t )] = Ac e jθ s (t ) + Rn (t )e jθ n (t )
eq 129
Imaginary
g n (t ) = Rn (t )e jθ n (t )
g s (t ) = Ac e jθ s (t )
θT
θs
Rn sin(θ n − θ s )
Rn
θn
AC
Real
figure 38 : vector diagram for angle modulation (S/N)in>1
it can be shown that
(S / N )out
(S / N )baseband
⎛m⎞
=β ⎜ ⎟
⎜V ⎟
⎝ p⎠
2
2
p
eq 130
where:
βp is the PM modulation index and Vp is the peak value of m(t).
61
This equation shows that the improvement of a PM system over a baseband signalling
system depends on amount of phase deviation that is used; the larger the phase
deviation, the better the signal-to-noise-ratio.
It seems to indicate that we can make the improvement as large as we wish simply by
increasing βp. This depends on the types of circuits used. If the peak phase deviation
exceed π radians, special “phase unwrapping” techniques have to be used in some
circuits to obtain the true value (as compared to the relative value) of the phase output.
Thus the maximum value of
β p m(t )
Vp
= D p m(t ) might be taken to be π. For sinusoidal
2
⎡ β pm ⎤
π2
2
≅ 6.9 dB over
modulation, this would provide an improvement of ⎢
⎥ = Dp m =
2
⎣⎢ V p ⎦⎥
baseband signaling.
[
]
It is emphasized that the results obtained previously for (S/N)out are valid only when the
input signal is above the threshold [i.e. when (S/N)in>1]
7.5 FM Systems
The procedure that we will use to evaluate the output SNR for FM systems is essentially
the same as that used for PM systems, except that the output for the FM detector is
proportional to dθ(t)/dt, whereas the output of the PM detector is proportional to θ(t).
assuming that (S/N)in>1 then we can find
(S / N )out
(S / N )baseband
⎛m⎞
= 3β ⎜ ⎟
⎜V ⎟
⎝ p⎠
2
2
f
eq 131
2
⎛m⎞
1
for the case of sinusoidal modulation ⎜ ⎟ = we have
⎜V ⎟
2
⎝ p⎠
(S / N )out = 3 β 2
(S / N )baseband 2 f
At first glance, these results seem to indicate that the performance of FM systems can
be increased without limit simply by increasing the FM index βf. However, as βf is
increased, the transmission bandwidth increases, and consequently, (S/N)in decreases.
These equations for (S/N)out are valid only when (S/N)in >>1 (i.e. when the input signal
power is above the threshold), so (S/N)out does not increase to an excessively large
value simply by increasing the FM index βf. Figure below, by dashed line, show a plot of
the preceding equation.
62
figure 39 : noise performance of an FM discriminator for a sinusoidal modulated FM signal plus Gaussian noise (no
deemphasis)
A generalized expression to describe S/N near the threshold, for the case of sinusoidal
modulation is plotted by the solid line.
Figure illustrates that the FM noise performance can be substantially better than
baseband performance, particularly when βf increases.
7.6 FM Systems with Threshold Extension
A PLL FM detector could be used to extend the threshold below that provided by an
FM discriminator. However, when the input SNR is Large, all the FM receiving
techniques provide the same performance.
An FM receiver with feedback (FMFB) is shown below.
e * (t )
e(t )
vin (t )
IF Filter
FM
Discriminator
( S / N ) in
FM Signal in
Demodulated
output
m * (t ) = Re{gT (t )}
( S / N ) out
v0 (t )
VCO
figure 40
63
the FMFB receiver provides threshold extension by lowering the modulation index
for the FM signal that is applied to the discriminator input. That is, the modulation
index of e*(t) is smaller than that for vin(t) (that in a normal case would have been
applied to the discriminator input).
the FM signal at the receiver input is
vin (t ) = Ac cos[ωc t + θ i (t )]
eq 132
where
t
θ i (t ) = ∫ D f m(σ )dσ
eq 133
−∞
the output of the VCO is
v0 (t ) = A0 cos[ω0t + θ 0 (t )]
eq 134
where
t
θ 0 (t ) = ∫ Dv m * (σ )dσ
eq 135
−∞
With these representations for vin(t) e v0(t), the output of multiplier (mixer) is:
e(t ) = A0 Ac cos[ωc t + θ i (t )]cos[ω0 t + θ 0 (t )] =
=
1
1
A0 Ac cos[(ωc − ω 0 )t + (θ i (t ) − θ 0 (t ) )] + A0 Ac cos[(ωc + ω0 )t + (θ i (t ) + θ 0 (t ) )]
2
2
eq 136
If the IF filter is tuned to pass the band of frequencies centered about f IF ≡ f c − f 0 , the
IF filter output is
e * (t ) =
1
1
A0 Ac cos[(ωc − ω 0 )t + (θ i (t ) − θ 0 (t ) )] = A0 Ac cos[ω IF t + (θ i (t ) − θ 0 (t ) )]
2
2
eq 137
or
64
e * (t ) =
t
⎡
⎤
1
A0 Ac cos ⎢ωif t + ∫ D f m(σ ) − Dv m * (σ ) dσ ⎥
2
−∞
⎣
⎦
[
]
eq 138
the FM discriminator output is proportional to the derivative of the phase deviation
⎧t
⎫
d ⎨ ∫ D f m(σ ) − Dv m * (σ ) dσ ⎬
K ⎩−∞
⎭
m * (t ) =
dt
2π
[
]
eq 139
Evaluating the derivative and solving the resulting equation for m*(t), we obtain
[
]
K
K
K
D f m(t ) − Dv m * (t ) =
D f m(t ) −
Dv m * (t )
2π
2π
2π
K
K
m * (t ) +
Dv m * (t ) =
D f m(t )
2π
2π
K
D f m(t )
KD f m(t )
K
K
⎡
⎤
m * (t ) ⎢1 +
Dv ⎥ =
D f m(t ) ⇒ m * (t ) = 2π
=
K
⎡
⎤ [2π + KDv ]
⎣ 2π ⎦ 2π
⎢⎣1 + 2π Dv ⎥⎦
m * (t ) =
⎛ KD f ⎞
⎟⎟m(t )
m * (t ) = ⎜⎜
⎝ 2π + KDv ⎠
eq 140
eq 141
Substituting this expression for m*(t) we get
e * (t ) =
=
t
⎡
⎡
⎛ KD f
1
A0 Ac cos ⎢ω IF t + ∫ ⎢ D f m(σ ) − Dv ⎜⎜
2
⎝ 2π + KDv
−∞⎣
⎣⎢
⎤ ⎤
⎞
⎟⎟m(σ )⎥ dσ ⎥
⎠
⎦ ⎦⎥
t
⎡
⎡ 2πD f m(σ ) + KDv m(σ ) − Dv KD f m(σ ) ⎤ ⎤
1
A0 Ac cos ⎢ω IF t + ∫ ⎢
⎥ dσ ⎥
2
2π + KDv
⎦ ⎦
−∞⎣
⎣
eq 142
⎡
⎤
⎛
⎞
⎜
⎟t
⎢
⎥
1
1
⎟ D m(σ )dσ ⎥
= A0 Ac cos ⎢ω IF t + ⎜
⎜ ⎛ k ⎞ ⎟∫ f
2
⎢
⎥
⎟ Dv ⎟ −∞
⎜1+ ⎜
⎢
⎥
⎝ ⎝ 2π ⎠ ⎠
⎣
⎦
65
This demonstrates that the modulation index of e*(t) (i.e of the signal in input to the
⎛
⎞
1
⎟⎟ of the modulation index of vin(t).
discriminator), is exactly ⎜⎜
⎝ 1 + (k / 2π )Dv ⎠
Since β f = D f Am
1
ωm
, the lower the modulation index Df the lower the β, then once,
the lower will be the needed
(S / N )out
(S / N )baseband
=
3 2
βf .
2
The threshold extension provided by the FMFB receiver is on the order of 5 dB,
whereas that of PLL receiver is on the order of 3 dB (when both are compared with the
threshold of an FM discriminator). Although this is not a fantastic improvement, it can
be quite significant for systems that operate near the threshold, such as satellite
communication systems. A System that uses a threshold extension receiver instead of a
conventional receiver may be much less expensive than the system that requires a
double-sized antenna to provide the 3-dB signal gain.
7.7 FM System with De-emphasis
The noise performance of the FM system can be improved by preemphasizing the
higher frequencies of the modulation signal at the transmitter input and deemphasizing
the output of the receiver. This improvement occurs because the PSD of the noise at
the output of the FM detector has a parabolic shape as a function of the frequency.
The improvement when a sinusoidal test tone is transmitted over this FM system is
(S / N )out
(S / N )baseband
=
1 2⎛ B ⎞
βf ⎜ ⎟
2 ⎜⎝ f1 ⎟⎠
eq 143
of course, each of these results is valid only when the FM signal at the receiver input is
above the threshold.
66
figure 41
8 COMPARISON OF ANALOG SIGNALING SYSTEMS
Table below compares the analog systems that were analyzed in the previous sections.
It has been seen that the non linear modulation systems (FM and PM) provide
significant improvement in the noise performance, provided that the input signal is
above the threshold. Of course, the improvement in the noise performance is obtained
at the expense of having to use a wider transmission bandwidth.
If the input SNR is very low, the linear systems outperform (AM)are better than non
linear systems.
SSB is best in terms of a small bandwidth, and it has one of the best noise
characteristics at low input SNR.
The selection of a particular system depends on the transmission bandwidth that is
allowed and the available receiver input SNR. For the non linear systems a bandwidth
spreading ratio of BT/B=12 is chosen for systems comparisons. This corresponds to a
βf=5 for FM systems cited in the figure below and corresponds to commercial FM
broadcasting.
67
Of course, when operating above the threshold, all the non linear modulation systems
have better SNR performance than the linear modulation systems, because the non
linear systems have larger transmission bandwidths.
8.1 Ideal systems performance
What is the best noise performance that is theoretically possible? How can wide
transmission bandwidth be used to gain improved noise performance? The answer is
given by Shannon’s channel capacity theorem.
The ideal system is defined as one that does not lose channel capacity in the detection
process.
Cin = Cout
eq 144
where Cin is the bandpass channel capacity and Cout is the channel capacity after
detection.
The equation for channel capacity is
S⎞
⎛
C = B log 2 ⎜1 + ⎟
⎝ N⎠
eq 145
using this equation in the preceding equation we get:
⎡ ⎛S⎞ ⎤
⎡ ⎛S⎞ ⎤
BT log 2 ⎢1 + ⎜ ⎟ ⎥ = B log 2 ⎢1 + ⎜ ⎟ ⎥
⎣ ⎝ N ⎠ out ⎦
⎣ ⎝ N ⎠in ⎦
eq 146
where BT is the transmission bandwidth of the bandpass signal at the receiver input
and B is the bandwidth of the baseband signal at the receiver output. Solving for
(S/N)out , we get
⎡ ⎛S⎞ ⎤
⎢1 + ⎜ ⎟ ⎥
⎣ ⎝ N ⎠ in ⎦
⎛S⎞
⎜ ⎟
⎝ N ⎠ out
BT
⎡ ⎛S⎞ ⎤
= ⎢1 + ⎜ ⎟ ⎥
⎣ ⎝ N ⎠ out ⎦
B
⇒
⎡ ⎛S⎞ ⎤
⎢1 + ⎜ ⎟ ⎥
⎣ ⎝ N ⎠ in ⎦
BT
B
⎛S⎞
= 1+ ⎜ ⎟
⎝ N ⎠ out
eq 147
BT
⎡ ⎛S ⎞ ⎤B
= ⎢1 + ⎜ ⎟ ⎥ − 1
⎣ ⎝ N ⎠in ⎦
eq 148
but
68
⎛ P
P
⎛S⎞
⎜ ⎟ = s = ⎜⎜ s
⎝ N ⎠in N 0 BT ⎝ N 0 B
⎞⎛ B
⎟⎜
⎟⎜ BT
⎠⎝
⎞ ⎛ B
⎟⎟ = ⎜⎜
⎠ ⎝ BT
⎞⎛ S ⎞
⎟⎟⎜ ⎟
⎠⎝ N ⎠baseband
eq 149
thus equation (S/N)out becomes
⎡ ⎛ B
⎛S⎞
⎜ ⎟ = ⎢1 + ⎜⎜
⎝ N ⎠ out ⎣ ⎝ BT
BT
⎤B
⎞⎛ S ⎞
⎟⎟⎜ ⎟
⎥ −1
⎠⎝ N ⎠baseband ⎦
eq 150
equation above, which describes the ideal system performance, is plotted in figure
below for the case of BT/B=12. As expected, none of the practical signalling systems
equals the performance of the ideal system. However, some of the non linear systems
(near the threshold) approach the performance of the ideal systems.
figure 42
69
9 BINARY MODULATED BANDPASS SIGNALING
For digital modulated signals, the modulating signal m(t) is a digital signal given by the
binary or multilevel line codes. The most common binary bandpass signalling
techniques are illustrated as follows:
•
On-off keing (OOK) also called Amplitude Shift Keying (ASK), which consists
of keying (switching) a carrier sinusoid on and off with a unipolar binary signal.
Morse code radio transmission is an example of this technique.
figure 43
•
Binary phase-shift keying (BPSK), which consists of shifting the phase of
sinusoidal carrier 0° or 180° with a unipolar binary signal. BPSK is equivalent to
PM signalling with a digital waveform.
figure 44
70
•
Frequency shift keying (FSK) which consists of shifting the frequency of
sinusoidal carrier from a mark frequency (corresponding, for example, to sending
a binary 1) to a space frequency (corresponding to sending a binary 0) according
to the baseband digital signal. FSK is identical to modulating an FM carrier with a
binary digital signal
figure 45
9.1 Binary Phase-Shift Keying (BPSK)
9.1.1 BPSK Generation
A PSK bandpass modulated signal is generally represented by
{
}
{
}
{
}
s (t ) = Re g (t )e jωct = Re Ac e jθ (t ) e jωct = Re Ac e j [θ (t )+ωct ] = Ac cos[ωc t + θ (t )] =
[
= Ac cos ωc t + D p m(t )
]
eq 151
Where
θ (t ) = D p m(t )
eq 152
In BPSK m(t) is a polar baseband data signal. For convenience, let m(t) have a peak
values of ±1 and a rectangular pulse shape.
We now show that BPSK is also a form of AM-type signalling, in fact expanding the
preceding equation we get
cos(a + b) = cos a cos b − sin a sin b
eq 153
71
s (t ) = Ac cos(ωc t ) cos(D p m(t ) ) − Ac sin (ωc t )sin (D p m(t ) )
[
]
[
eq 154
]
s (t ) = {Ac cos D p m(t ) }cos(ωc t ) − {Ac sin D p m(t ) }sin (ωc t )
eq 155
From equation above we can see that it corresponds to a quadrature modulation
scheme.
Accos[Dpm(t)]
cosωct
+
s(t)
sinωct
Acsin[Dpm(t)]
-
figure 46
Now recalling that m(t)= ±1 and that cos(x) and sin(x) are even and odd functions of
x we get:
cos[Dp ⋅ (+ 1)] = cos[Dp ⋅ (− 1)] = cos[Dp ]
sin[Dp ⋅ (+ 1)] = − sin[Dp ⋅ (− 1)]
eq 156
we see that the representation of BPSK signal reduces to:
s (t ) = Ac cos(ω c t )cos(D p ) − Ac sin (ω c t )sin (D p )⋅ m(t ) =
[
]
[
]
= Ac cos(D p ) cos(ω c t ) − Ac sin (D p ) m(t ) sin (ω c t )
Pilot Carrier Term,
m(t) is not present
eq 157
Data Term: m(t) is
present
72
The level of the pilot carrier term is set by the value of the peak phase deviation
constant, ∆θ=Dp.
For digital angle-modulated signals, the digital modulation index h is defined by
h=
2 ∆ϑ
π
=
2D p
eq 158
π
where 2∆θ =2Dp is the maximum peak-to-peak phase deviation (radians) during the
time required to send one symbol, Ts.
h
2∆θ=2Dp
2
1
2π
π
For binary signaling, the symbol time is equal to the bit time (Ts=Tb).
The level of the pilot carrier term is set by the value of the peak deviation, which is
∆θ=Dp for m(t)=±1. The value of m is determined by the input data bit stream converted
in NRZ for example.
If Dp is small, the pilot carrier term has a relatively large amplitude compared to the
data term; consequently, there is a very little power in the data term (which contains
the source information). To maximize the signaling efficiency (so that there is a low
probability of error), the power in the data term needs to be maximized. This is
accomplished by letting ∆θ=Dp=π/2 radians, which corresponds to a digital modulation
index of h=1.
For this optimum case of h=1, the BPSK signal becomes
s (t ) = − Ac m(t ) sin ωc t
eq 159
73
The baseband complex envelope for this BPSK signalling is:
g (t ) = jAc m(t )
Imaginary
eq 160
g1(t)
Real
g2(t)
Therefore the modulated signal is
[
]
[
]
s (t ) = Re g (t )e jωct = Re jAc m(t )e jωct = Re[ jAc m(t ) cos ω c t − Ac m(t ) sin ω c t ]
eq 161
= − Ac m(t ) sin ω c t
s1 (t ) = − Ac sin ωc t
m(t ) = +1
s 2 (t ) = + Ac sin ω c t
m(t ) = −1
To simplify the explanation, suppose now to 90° rotate all constellation then we can
obtain the simulation like as obtained by using WINIQ software as shown below.
This means that
g (t ) = Ac m(t )
eq 162
Consequently
[
]
[
]
s (t ) = Re g (t )e jωct = Re Ac m(t )e jωct = Re[Ac m(t ) cos ωc t + jAc m(t ) sin ω c t ]
= + Ac m(t ) cos ω c t
eq 163
In figure below are reported the phase i(t)=±1 and quadrature q(t)=0 components of the
baseband modulating signal g(t) plus the constellation diagram.
g1(t)
g2(t)
74
g1(t)
figure 47:
left i(t)=±1 and q(t)=0,
g2(t)
right constellation diagram of baseband i(t) ,q(t) signal
When the modulating wave shape is rectangular and the symbol 0,1 are equally
probable, the Power Spectral Density (PSD) for the baseband complex envelope is
⎛ sin π f Tb ⎞
⎟⎟
Pg ( f ) = A T ⎜⎜
⎝ π f Tb ⎠
2
2
c b
eq 164
The resulting FFT of the bandpass digital signals s(t) can be obtained by WienerKhintchine theorem:
[
]
A 2Tb
1
PSD[ s (t )] = Pg ( f − f c ) + Pg ( f + f c ) =
4
4
=
{
⎧⎪⎡ sin (π ( f − f )T ) ⎤ 2 ⎡ sin (π ( f + f )T ) ⎤ 2 ⎫⎪
c
b
c
b
⎨⎢
⎥ +⎢
⎥ ⎬=
⎪⎩⎣ π ( f − f c )Tb ⎦ ⎣ π ( f + f c )Tb ⎦ ⎪⎭
A 2Tb
[sin c(π ( f − f c )Tb )]2 + [sin c(π ( f + f c )Tb )] 2
4
A2T b
Pg ( f − f c )
4
}
A 2T b
Pg ( f + f c )
4
figure 48
75
Considering the positive frequency only, we can have the FFT reported on figure below:
figure 49
To have an easier BPSK model, we can eliminate the minus sign by a 90° rotation of all
signals s(t):
s (t ) = − Ac m(t ) sin(ω c t −
π
2
) = − Ac m(t )[− cos ω c t ] = Ac m(t ) cos ω c t
eq 165
The symbols, s1(t) and s2(t) representing the ones and zeros respectively, are then,
s1 (t ) = + Ac cos ω c t
when m = +1
s 2 (t ) = − Ac cos ω c t
when m = −1
Using the duplication formula
1 + cos 2 x
2
1
cos
2x
−
sin 2 x =
2
cos 2 x =
the energy transmitted during one bit period Tb =
eq 166
2π
ωb
is :
76
2π
⎡
⎤
ωb
⎥
1 − cos(2 ωc t )
1
2
2
2
2
2 ⎢ Tb
Eb =ˆ ∫ s(t ) dt = ∫ Ac sen (ωc t ) dt =Ac ∫
dt =Ac ⎢ − ∫ cos(2 ωc t ) dt ⎥ =
2
0
0
0
⎢2 2 0
⎥
⎣
⎦
⎡ ⎛
⎤
2π ⎞
2π
⎟⎟
sen⎜⎜ 2 ωc
⎢
⎥
ωb
ωb ⎠ ⎥ Ac2
⎝
2 Tb
2 1 ⎡ sen(2 ωc t ) ⎤
2 Tb
2 1 ⎢
−0 =
− Ac ⎢
− Ac
Ac
T
⎥ = Ac
⎥ 2 b
2
2 ⎣ 2ωc ⎦ 0
2
2⎢
2ωc
⎢
⎥
⎣⎢
⎦⎥
Tb
Tb
where s(t ) = Ac sen(ωc t ) ,
Tb
Tb =
2π
ωb
,
ωc = nωb with n = 1,2,3,4.......
eq 167
Therefore the carrier power, C, during a bit period Tb is:
C=
Eb Ac2
=
2
Tb
[W ]
eq 168
The value AC of the carrier is given by:
Ac =
2 Eb
Tb
[V]
eq 169
Substituting this value of Ac into equation of s(t) we get:
s1 (t ) = Ac m(t ) cos ω c t = + Eb
2
cos ωc t
Tb
when m = +1
s 2 (t ) = Ac m(t ) cos ω c t = − Eb
2
cos ω c t
Tb
when m = −1
eq 170
This form of BPSK is referred to as phase-reversal keying since the two carrier signals
representing the logic ones and zeros are exactly 180° out of the phase i.e. the phase
modulation index h=1. A more general form of BPSK occurs when the phase difference
between the two signals is other than 180°. This creates a residual carrier term that
allows carrier tracking by a phase-lock loop (PLL). Unless stated otherwise, BPSK will
refer to 180° mode.
77
A method of generating BPSK is shown in figure below. A bit sequence represented by
±Ac is applied to a balanced modulator, resulting in an output of ±Accos(ωct) which is a
BPSK.
±Accos (ωct)
BPSK signal s(t)
±A c
cos ωct
figure 50: BPSK modulator
9.1.2 BPSK Detection by a Correlation Receiver
When binary PSK modulation is used at the transmission end, then a receiver
employing coherent demodulation must be employed since the information is
contained in the carrier phase.
A correlation receiver performs coherent demodulation. Correlation, C(t), of two
signals, r(t) and s(t), over a period, T, is defined mathematically as:
t
C (t ) = ∫ r (t ) s (t )dt
0<t <T
eq 171
0
Correlation is implemented in hardware by a multiplier and an integrator, as shown in
figure below:
Low-pass Filter
t
∫ s(t )r (t )dt
0
s(t)
r(t)
figure 51:hardware implementation of correlation
78
A BPSK correlation receiver is shown in figure below, with each block of hardware
labeled with its functional purpose.
Receiver
Bit synchronizer
em(t)
Low-pass Filter
Or Matched
Filter
a(t )
t
∫ r (t )s(t )dt
Sam
ple &
Hold
Z
Threshold
device
S/H
0
si(t)=
BPSK
Output of the
receiver and
input to the bit
synchronizer
2
cos ωc t
Tb
Output of the bit
synchronizer
figure 52
The correlation receiver is so called because it correlates the received signal, composed
of signal plus noise, with a replica of the signal. For the correlation to be achieved, it is
necessary for the receiver to be phase locked to the carrier as discussed earlier.
The purpose of the correlation receiver is to reduce the received symbol to a single
point or statistic that will be used by the decision device to determine which symbol has
been transmitted. In practice, the single point is a fixed voltage obtained by a S/H
device. The decision device is a voltage comparator that is set such that if the voltage
point is above a certain level, the comparator indicates a one is received; if the voltage
is below this level, a received zero is indicated, the case for no noise will be treated first.
Functionally and conceptually, the correlation receiver is composed of the receiver and
bit synchronizer.
The correlation receiver and the matched filter are equivalent. Specifically, the integrator
and the S/H, at t=Tb, are equivalent to a matched filter, sampled at the output.
Since there is no discrete carrier term in the ideal BPSK signal, a PLL may be used to
extract the carrier reference only if a low level pilot carrier is transmitted together with
the BPSK signal otherwise is needed a coherent detection.
However, the 180° phase ambiguity must be resolved, this can be accomplished by
using differential coding at the transmitter input and differential decoding at the
receiver output.
79
9.1.2.1 No Noise
An exact replica of the carrier multiplies the received symbol, and the output of the
multiplier is applied to an integrator. The output of the multiplier is given by:
em (t ) = ± Eb
2
2
cos ω c t ×
cos ωc t =
Tb
Tb
2 ⎡1 1
2
2 ⎡1 + cos 2ω c t ⎤
⎤
= ± Eb cos 2 ω c t = ± Eb
= ± Eb
+ cos 2ωc t ⎥
⎢
⎥
⎢
2
Tb
Tb ⎣
Tb ⎣ 2 2
⎦
⎦
eq 172
The output of the multiplier, em(t), is applied to integrator. The integrator will integrate
the double frequency term over an integer number of cycles therefore deleting this term.
In practice, a low pass filter follows the integrator to ensure that this term is deleted from
the output. The output a(t), is:
a(t = Tb ) = Eb
t
a (t ) = ± Eb
2 ⎡1 1
1
⎤
+ cos 2ω c t ⎥ dt = ± Eb t
∫
⎢
Tb 0 ⎣ 2 2
Tb
⎦
eq 173
t=Tb
This is the output of the correlator is either a positive- or negative-going ramp function
(triangular function).
The S/H device is usually set to sample the ramp whenever it reaches a maximum
value, which ideally occurs whenever t=Tb. the upper limit of the integrator is also set to
Tb. For the no noise case, the output of the integrator a t=Tb is:
T
2 b ⎡1 1
1
⎤
a (t = Tb ) = ± Eb
+ cos 2ω c t ⎥ dt = ± Eb Tb = ± Eb
∫
⎢
Tb 0 ⎣ 2 2
Tb
⎦
eq 174
The S/H device is clocked to sample the output of the integrator whenever the maximum
voltage is expected. For this case, the S/H samples at t=Tb and the output voltage
± Eb is applied to the threshold device, which normally triggers out a crisp waveform
representing a one if the voltage is greater than zero or a zero if the voltage is less than
zero.
9.1.3 With Noise
The case when the received signal is contaminated with additive white Gaussian
Noise (AWGN) is now considered. Let the white noise have a power spectral density
(PSD) given by N0/2. The received modulated baseband signal in input to the
correlator receiver is now given by
80
s (t ) = ± Eb
2
cos ωc t + n(t )
Tb
eq 175
Where n(t) is white Gaussian noise.
The output of the integrator at t=Tb due to the signal part of s(t) will be the same as
before, ±a. For the low-noise case, the output of the integrator might look similar to the
ramp shown in figure below on the left; and for the high-noise case, the ramp on the
right figure is indicative about what the output might look like.
t
T
t
T
figure 53: Integrator output of a correlation receiver: (left) low noise, and (right) high noise.
Let the baseband sampled voltage outgoing by the integrator at t=T, can be
represented by z, then
z = ± Eb + N
eq 176
It can be shown that N is a Gaussian random variable with zero mean µ and variance
σ2 given by:
σ 2 = N0 / 2
eq 177
Therefore, the output random variable voltage, z, outgoing from the integrator is also
a Gaussian random variable. Then z will have a variance of N0/2 and a mean of
a = ± Eb , depending upon which symbol has been received.
Letting
a = Eb
eq 178
81
The conditional probability density function for z, gives an information about the
correspondence of symbol with ±a. Precisely it gives an indication if a one or a zero
has been transmitted:
p( z | + a) =
p( z | −a) =
1
2πσ 2
1
2πσ 2
e
e
1 ⎛ z − Eb
− ⎜
2 ⎜⎝ σ
⎞
⎟
⎟
⎠
2
1 ⎛ z + Eb
− ⎜
2 ⎜⎝ σ
⎞
⎟
⎟
⎠
2
eq 179
eq 180
Maximum value for p(z|a) function, is reached when z=a.
The plot for these two functions is shown in figure below, this figure shows that the
sampled output voltage z will fall somewhere along the x axis. Points ±a represents the
more density probability places for z
max p(z | -a)
max p(z | +a)
-a
+a
Figure 54: Conditional probability density functions, gives if a “one” or a “zero” has been transmitted
The baseband signal constellation for a BPSK is shown below, we can observe the
jitter around ±a points due to the noise presence.
φ(t)
-a
+a
figure 55: BPSK signal constellation
82
9.2 Maximum Likelihood Detection
At the end of each symbol period when the integrator output voltage is sampled, the
receiver must decide which symbol was sent based on the sampled voltage z. For
maximum likelihood detection, conceptually, the statistic z is substituted into
conditional probability density function already seen, and the function with the largest
value indicates which symbol have the maximum possibility to have been transmitted.
The test is implemented by forming a ratio between two densities, such as:
1
p ( z | + a ) p ( z | + Eb )
=
=
λ=
p ( z | − a ) p ( z | − Eb )
2πσ
2
1
2πσ 2
e
e
1 ⎛ z − Eb
− ⎜
2 ⎜⎝ σ
1 ⎛ z + Eb
− ⎜
2 ⎜⎝ σ
⎞
⎟
⎟
⎠
⎞
⎟
⎟
⎠
2
=
2
1
2πσ 2
e
⎡ ⎛ z+ E
b
⎢ 1⎜
⎢ 2⎜ σ
⎣⎢ ⎝
2
⎞ 1 ⎛ z − Eb
⎟ − ⎜
⎟ 2⎜ σ
⎠
⎝
⎞
⎟
⎟
⎠
2⎤
⎥
⎥
⎦⎥
eq 181
Assuming each symbol is equally likely and the cost of all errors is the same, the
received point z is substituted as Gaussian random variable. Therefore a value for
λ>1, choose the symbol corresponding to +a;
λ<1, choose the symbol corresponding to -a.
Fundamentally, this test computes the value for each conditional probability density
function at instant and selects the density with the largest value in that time instant.
9.3 Bit Errors
A bit error is made if a zero is transmitted and the sampled voltage, z, falls above zero.
The probability which this error can happen is the area (i.e. the integral) beneath the
Gaussian density function curve, with mean –a. The integral of the probability density
function is made starting the integration, from zero toward infinity and is given by
p(z | -a)
p(z | +a)
-a
0
+a
figure 56
83
∞
∞
P (a | − a) = ∫ P ( z | − a )dz = ∫
0
0
1
2πσ 2
e
1 ⎡ z −( − a ) ⎤
− ⎢
2 ⎣ σ ⎥⎦
2
dz =
∞
1
∫e
2πσ 2
1 ⎡ z −( − a ) ⎤
− ⎢
2 ⎣ σ ⎥⎦
2
eq 182
0
calling
x=
z+a
dz = σ dx
then
σ
eq 183
Therefore when z=0 then x=a/σ and when z=∞
P(a | −a) =
1
2πσ 2
∞
∫e
−
1 2
(x)
2
∞
1
dz =
2πσ 2
0
∫e
−
1 2
(x)
2
σ dx =
a /σ
then x=∞
1
2π
∞
∫e
−
1 2
(x)
2
dx = Q(a / σ )
eq 184
a /σ
By the symmetry, a bit error is made if a one is transmitted and the sampled voltage, Z,
falls under zero. The probability of this occurrences is the area beneath the Gaussian
curve, with mean +a, from zero to -infinity, the probability of mistaking –a for +a is
P(−a | a) =
x=
z−a
1
2πσ 2
then
σ
P(−a | a) =
1
2πσ 2
−∞ − 1 ⎡ z −(+ a ) ⎤
2 ⎢⎣ σ ⎥⎦
∫e
2
dz
eq 185
0
dz = σ dx
0
∫e
−
1 2
(x)
2
−∞
dz =
eq 186
1
2πσ 2
−a /σ
∫
−∞
e
−
1 2
(x)
2
σ dx =
1
2π
−a /σ
∫
e
−
1 2
(x)
2
dx = Q(a / σ ) eq 187
−∞
Considering that P(a)=P(-a)=1/2 then the total error probability is, for the Bayes
theorem:
1
1
Pe = P(a | − a) P(− a) + P(− a | a) P(a) = P (a | −a) + P(− a | a)
2
2
eq 188
1
1
Pe = Q(a / σ ) + Q(a / σ ) = Q(a / σ )
2
2
eq 189
Since
a = Eb
⎛
⎜
⎛ Eb ⎞
⎜
⎟
Pe = Q
= Q⎜
⎜
⎜ σ ⎟
⎝
⎠
⎜
⎝
then
⎞
⎟
⎛
Eb ⎟
E ⎞
= Q⎜⎜ 2 b ⎟⎟
⎟
N0 ⎠
N0
⎝
⎟
2 ⎠
eq 190
84
9.3.1 Q-Function reminder
We say that X is a normal or gaussian variable with mean µ =X and variance σ 2 if its
conditional probability density function is:
− ( x − µ )2
1
f x (x | µ ) =
2πσ
2σ 2
e
2
eq 191
One example for Gaussian probability Density function is plotted below:
Probability Density
f(X)
0.004
0.0035
0.003
f(x)
0.0025
0.002
0.0015
0.001
0.0005
0
-250
-200
-150
-100
-50
0
50
100
150
200
250
x
figure 57: Probability density for a Gaussian random variable
The curve is symmetric around the parameter µ and the relative probability
distribution function referred to an interval within -∞ to x is given by
Fx ( x ) =
x
x
∫ f ( y )dy = ∫
x
−∞
−∞
1
2πσ 2
Using the substitution: z =
x
F ( x) =
∫
−∞
1
2πσ 2
e
dy =
2σ
e
2
x
dy =
∫
−∞
y−µ
σ
z=
− ( y − µ )2
2σ 2
− ( y − µ )2
∫
−∞
2πσ 2
e
1 ⎡ y−µ ⎤
− ⎢
2 ⎣ σ ⎥⎦
2
dy
eq 192
then y = σ z + µ ⇒ dy = σ dz consequently
x−µ
σ
1
1
2πσ 2
e
−z2
2
σ dz =
z
∫
−∞
1
e
2π
−z2
2
⎛x−µ⎞
dz = Q( z ) = Q⎜
⎟ eq 193
⎝ σ ⎠
85
The resulting function is that more often tabulated
Q(z ) =
z
∫
−∞
1
e
2π
− z2
2
dz
eq 194
One example of cumulative distribution function F(X) relative to a Gaussian density
function f(x), is plotted below
Distribution F(X)
F(X)
1.2
1
F(X)
0.8
0.6
0.4
0.2
0
-250
-200
-150
-100
-50
0
50
100
150
200
250
X
figure 58: cumulative distribution of a Gaussian density
The constant 2πσ 2 is a normalization factor which maintain the area under the F(x)
unitary within the interval -∞, +∞
When µ=0 then the Q function is defined as:
Q( Z ) = Q(a / σ ) =
1
2π
∞
∫σe
−
y2
2
dy
where σ 2 = variance of density function
eq 195
a/
i.e. the probability value F(x) computed within an interval starting from a/σ to +∞
That is, for a Gaussian distribution with mean equal to zero and variance σ2=1, Q(a/σ)
i.e. Q(a), is the area beneath the tail of the curve from a to +∞.
86
9.3.2 Bit Error Probability in terms of Eb and N0
Because white noise (AWGN) is presented, it can be shown that the variance of the
noise is given by
σ2 =
•
N0
2
eq 196
N0 = one-sided power spectral density (PSD) of the white noise going into the
IF bandwidth measured in [W/Hz].
Calling:
•
Eb= bit energy [J]
Eb is a variable that occurs in the theoretical analysis of digital systems, but it is
equivalent to the carrier power, C, at the receiver that is measured or determined by
link analysis ad is a function of antenna gain, path loss distance. transmitted power, and
losses.
Eb = CTb =
C
Rb
eq 197
Where:
•
•
•
Tb = bit period = 1/Rb where Rb = bit rate [bit/s]
C = carrier power at the receiver [W]
BIF= bandwidth of the IF [Hz]
The noise power within the IF bandwidth is
N p = N 0 BIF
eq 198
These parameters can be related as follows:
E R
E R
C
= b b = b b
N p N 0 BIF N 0 BIF
eq 199
The greater the Rb, the greater the C/Np needed at the receiver side, whereas the
greater the bandwidth B, the lower will be the S/N ratio required.
87
C/Np is the carrier-to-noise ratio in the IF, which is determined by link analysis, the
BER may be predicted based on this engineering parameter.
Consequently :
Eb
C BIF
=
N 0 N p Rb
eq 200
Under the ideal condition and NRZ data format, the assumption is that BIF ≅ Rb ( this is
usually not the case unless raised cosine filtering is used);
In fact using a RRC filter the since for a BPSK the Symbol rate D is equal to the bit
rate Rb, then we can write:
B=
D
Rb
(r + 1) =
(r + 1) ≈ Rb
2
2
when
r →1
eq 201
then the remaining relationship is
Eb
C
≅
N0 N p
eq 202
Then using the above relationship, the error probability Pe (BER) may be written as
⎛
⎜
⎛ Eb ⎞
⎜
⎟
= Q⎜
Pe = Q
⎜ σ ⎟
⎜
⎝
⎠
⎜
⎝
Eb
N0
2
⎞
⎟
⎛
⎞
⎛
⎞
⎟ = Q⎜ 2 Eb ⎟ ≅ Q⎜ 2 C ⎟
⎜
⎜
⎟
N 0 ⎟⎠
N p ⎟⎠
⎝
⎝
⎟
⎠
eq 203
This is an important equation that relates the BER to the carrier-to-noise ratio, (C/Np)
in the IF bandwidth, which is determined by link analysis.
88
10 Differential Phase-Shift Keying (DPSK)
Phase-shift-keyed signals cannot be detected incoherently. However, a partially
coherent detection technique can be used to extract the phase reference for the
present signalling interval. This is provided by a delayed version of the signal occurred
during the previous signalling interval. This is illustrated below where differential
coding is provided by (one-bit) delay and the multiplier. If a BPSK signal (no noise)
were applied to the receiver input, the output of the Sample-and-Hold circuit, says, r0(t0),
would be positive (binary 1) if the present data bit and the previous data bit were of the
same sense; while r0(t0) would be negative (binary 0) if the two data bits were different.
Consequently, if the data on the BPSK signal are differentially encoded, the decoded
data sequence will be recovered at the output of the receiver. This technique consisting
of transmitting a differentially encoded BPSK signal is known as DPSK.
In practise, DPSK is often used instead of BPSK, because the DPSK receiver does not
require a carrier synchronizer circuit. An example is the Bell212 A modem (1200 bits/s)
DPSK
in
Bandpass filter
Low-pass Filter
integrator
H(f) BT
-fc
S&H
Threshold
r0(t0) device
t0
Binary
output
∫ (..)dt
+fc
t 0 −T
f
One-bit
Delay, Tb
r0(t0),Bit
sync
From bit sync
i it
figure 59 : (partially Coherent detection of DPSK)
The BER of an optimum DPSK receiver is:
⎛ Eb ⎞
1 −⎜⎜ N ⎟⎟
Pe = e ⎝ 0 ⎠
2
eq 204
89
10.1 Differential coding
When serial data are passed through many circuits along a communication channel, the
waveform is often unintentionally inverted (i.e. data complemented). This result can
occur in a twisted-pair transmission line channel just by switching the two leads at a
connection point where a polar line code is used. (note that such switching would non
affect the data on a bipolar signal). To ameliorate the problem, Differential Coding is
often employed. The encoded differential data are generated by
en = d n ⊕ en −1
eq 205
Modulo 2 adder
(EX-OR)
dn
en
Data
in
en-1
Line
Encoder
circuit
Channel
Line
Decoder
circuit
One-bit
Delay, Tb
Modulo 2 adder
(EX-OR)
dn
en
Data
out
One-bit
Delay, Tb
Differential Encoder
en-1
Differential Decoder
figure 60 : differential coding system
The received encoded data are decoded by:
d n = en ⊕ en−1
eq 206
where ⊕ is a modulo 2 adder or an exclusive-OR gate (XOR) operation.
Each digit in the encoded sequence is obtained by comparing the present input bit with
the past encoded bit. A binary 1 is encoded if the present input bit and the past encoded
bit are of opposite state, and a binary 0 is encoded if the state are the same (XOR
operation)
Differential encoding present a great advantage when the waveform is passed through
thousand of circuits in a communication system and the positive sense of the output is
lost or changes occasionally as the network changes.
90
11 FREQUENCY SHIFT KEYING (FSK)
The FSK signal can be characterized as one of two different types, depending on the
used to generate it.
11.1 Discontinuous FSK
One type is generated by switching the transmitter output line between two deferent
oscillators.
This type generates an output waveform that is discontinuous at the switching times, it
is called discontinuous phase FSK, because θ(t) is discontinuous at the switching
times. It can be represented by:
⎧ A cos[ω1t + θ1 ] when binary 1 is sent ⎫
s (t ) = Ac cos[ω c t + θ (t )] = ⎨ c
⎬
⎩ Ac cos[ω 2 t + θ 2 ] when binary 0 is sent ⎭
eq 207
And where θ1 and θ1 are the start-up phases of the two oscillators.
Oscillator
Freq=f1
Electronic
switch
Discontinuous
FSK output
Oscillator
Freq=f2
Control line
Bynary data input
m(t)
figure 61
91
11.2 Continuous FSK
The continuous FSK signal is generated by feeding the data signal into a frequency
modulator.
Frequency
modulator
(carrier freq.=fc)
Bynary data input
m(t)
Continuous
FSK output
figure 62
The FSK signal is represented by:
t
⎡
⎤
s (t ) = Ac cos[ω c t + θ (t )] = Ac cos ⎢ω c t + D f ∫ m(λ )dλ ⎥ = Re g (t )e jωct
−∞
⎣
⎦
[
]
eq 208
Where m(t) is a baseband digital modulating signal.
Although m(t) is discontinuous at the switching time, the phase function θ(t) is
proportional to the integral of m(t).
Using the digital modulation index h=2*∆f/ fb then we can rewrite the equation above:
t
⎡
⎤
s (t ) = Ac cos[ω c t + θ (t )] = Ac cos ⎢2πf c t + 2π h ∫ m(λ )dλ ⎥ = Re g (t )e jωct
−∞
⎣
⎦
[
]
If the serial data input waveform is binary, such as polar baseband signal, m(t)=±1, the
resulting FSK signal is called a binary FSK (BFSK) signal.
t
In this case the overall phase 2πf c t + 2π h ∫ m(λ )dλ will be like as
−∞
t
t
−∞
−∞
y = 2πf c t + 2π h ∫ m(λ )dλ = 2πf c t + 2π h ∫ 1dλ = 2πf c t + 2π ht = 2π ( f c + h)t
eq 209
Which is the equation of rect line where the angular coefficient is 2π ( f c + h)
Of course, a multilevel input signal would produce a multilevel FSK signal.
In general, the spectra of FSK signals are difficult to evaluate since the complex
envelope g(t), is a non linear function of m(t).
The approximate transmission bandwidth BT for FSK signal is given by Carson’s rule:
92
⎡ ∆f
⎤
BT = 2( β + 1) B = 2 ⎢ + 1⎥ B = 2∆f + 2 B
B
⎣
⎦
eq 210
Where B is the bandwidth of the signal (e.g. square wave) modulation waveform.
If the Bandwidth B is equal to the Bit Rate R i.e. B=R, then BT became:
⎡ ∆f
⎤
BT = 2( β + 1) B = 2⎢ + 1⎥ B = 2∆f + 2 B = 2∆f + 2 R = 2(∆f + R )
⎣B
⎦
eq 211
Using a raised-cosine-rolloff premodulation filter and since in a binary signaling D=R
then the transmission bandwidth of the FSK signal became:
BT = 2∆f + 2 B = 2∆f + 2
D(1 + r )
R (1 + r )
= 2∆f + 2
= 2∆f + R (1 + r )
2
2
eq 212
11.3 FSK detection
FSk can be detected by using either a frequency (noncoherent) detector or two product
detectors (coherent detection). In order to obtain the lowest BER when the FSK signal is
corrupted by AWGN, coherent detection with matched filter processing and threshold
device (comparator) is required.
Low-pass
filter
cos(ω1t)
Binary out
FSK in
∑
cos(ω2t)
Low-pass
filter
figure 63: coherent (synchronous) detection
93
FSK in
Frequency
detector
Binary out
figure 64: Noncoherent detection
94
12 MULTILEVEL MODULATED BANDPASS SIGNALING
With multilevel signalling, digital inputs with more than two levels are allowed on the
transmitter input. This technique is illustrated in figure below, which show how multilevel
signals can be generated from a serial binary input stream by using a digital-to-analog
converter(DAC). For example, suppose that an L=2-bit/symbol DAC is used. Then the
number of levels in the multilevel signal is M=2L.
The symbol rate (baud) of the multilevel signal is D=R/L where R=1/Tb
is the bit rate bits/s.
Binary input
R bits / sec
Digital-to-Analog
converter L bits
M=2L -level
digital signal
Transmitter
Modulated output
D(symbol/sec)=R/L
figure 65: multilevel digital transmission system
12.1 Quadrature Phase-shift Keyng (QPSK) and M-ary Phase-Shift
Keyng (MPSK)
If the transmitter is a PM transmitter with a M=4-level digital modulation signal, M-ary
phase-shift keing (MPSK) is generated at the transmitter output. Assuming
rectangular-shaped data pulses, a plot of the permitted values of the complex envelope,
g(t)=Acejθ(t), would contain four points, one value of g(t) (a complex number in general)
for each of the four multilevel values, which correspond to the four phase θ permitted. A
plot of two possible sets of g(t) is shown in figure below (constellation point).
g(t)
g(t)
Imaginary
(Quadrature)
Imaginary
(Quadrature)
θi
θi
Real
(in Phase)
QPSK
Real
(in Phase)
QPSK
figure 66
95
The signal constellation are essentially the same, except for a shift in the carrier-shiftkeyed (QPSK) signalling. A constellation is an N-dimensional plot for the possible
signal vectors corresponding to the possible diagram signals as reported in figure
below.
figure 67
For instance, suppose that the permitted multilevel values at the DAC are -3,-1,+1,+3 V;
then these multilevel values might correspond to PSK phase of 0°,90°,180°,270°,
respectively.
This example of M-ary PSK where M=4 is called quadrature phase-shift-keyed
(QPSK) signalling.
MPSK can also be generated by using two quadrature carriers modulated by the x and
y components of the complex envelope (instead of using a phase modulator); in that
case,
g (t ) = Ac e jθ (t ) = x(t ) + jy (t )
eq 213
Where the permitted values x and y are
x(t ) = Ac cos θ i
y (t ) = Ac sin θ i
eq 214
and where the permitted phase angles are θI , i=1,2,….,M of the MPSK signal.
96
The output modulated signal v(t)=s(t) is:
{
}
v(t ) = Re g (t )e jωct = Re { g (t ) [ cos ωc t + j sin ωc t ]} = Re {[ x(t ) + jy (t ) ][ cos ωc t + j sin ωc t ]} =
= Re { x(t ) cos ωct + jx(t ) sin ωc t + jy (t ) cos ωc t − y (t ) sin ωc t} =
eq215
= x(t ) cos ωc t − y (t ) sin ωc t
This situation is illustrated in figure below
Baseband processing
Binary
input
R
bits/s
Digital-toanalog
converter
L-bits
Multilevel
digital signal
Signal
processing
L
x(t)
cos(ωct)
QAM
signal out
s(t)
Σ
y(t)
M=2 level
D=R/L
symbols / sec
sin(ωct)
Oscillator
f=fc
-90° phase
shift
figure 68: modulator for generalized signal constellation
g(t)=x(t)+jy(t)
L
M=2 point constellation
D=R/L symbol/sec
Baseband processing
Binary
input
R
bits/s
2-bit
serial-toparallel
converter
d1(t)
R/2 bits/sec
L/2 bit
DAC
x(t)
cos(ωct)
d2(t)
R/2 bits/sec
L/2 bit
DAC
y(t)
Σ
QAM
signal out
s(t)=Re[g(t)ejωt]
sin(ωct)
Multilevel
digital signal
Oscillator
f=fc
-90° phase
shift
figure 69: Modulator for Rectangular Signal Constellation
97
For rectangular-shaped data pulses, the envelope of the QPSK signal is constant.
That is, there is no AM (Amplitude Modulation) on the signal, even during the
transmission times when there is a 180° phase shift, since the data switches value
(say, from +1 to -1) instantaneously.
Phase shift:
180°
0°
-90°
180°
QPSK
figure 70
As an instance by winiq software simulator, generating a random binary input we can
observe the (I,Q) baseband signal diagram and (s(t),ϕ(t)) output modulated signal
diagram.
From (s(t),ϕ(t)) diagram its possible to see that the module of s(t) is constant.
This case is reported as an example in figure below
s(t) with constant amplitude
s(t) phase shift
figure 71
98
The rectangular-shaped data pulse produce a (sinx/x) -type power spectrum for the
QPSK signal that has large undesirable spectral sidelobes.
figure 72
These undesirable sidelobes can be eliminated if the data pulses are filtered by a
pulse shaping filter corresponding for example to a raised cosine rolloff filter.
Unfortunately this produces AM on the resulting QPSK signal, because the filtered data
waveform cannot change instantaneously from one peak to another when 180° phase
transition occur.
On figure below it possible to observe how the spectrum changes, when a raised
cosine rolloff filter is used
figure 73
99
Although filtering solves the problem of poor spectral sidelobes, it creates another one:
AM on the QPSK signal, see figure below:
s(t) with no constant amplitude
s(t) phase shift
figure 74
On figure below are reported the constellation diagram and the vector diagram at the
output of the transmitter. We can observe how shape filtering causes a constellation
point position dispersion around the expected position symbol.
Constellation point
position dispersion
figure 75
Due to this AM, low-efficiency linear (Class A or B) amplifiers, instead of high-efficiency
nonlinear (Class C) amplifiers, are required for amplifying the QPSK signal without
distortion. In portable communication application, these amplifiers increase the battery
capacity requirements by as much as 50%. A possible solution to the dilemma is to use
Offset QPSK (OQPSK) or π/4 QPSK, each of which has a lower amount of AM.
For a QPSK in order to represent the modulated bandpass signal we can use also the
following equation where the square of 2 is used as a normalization factor, and π/4 is an
initial phase shift on both axes:
100
s (t ) = cos[2πf c t + θ (t )] =
π
π
1
1
d I (t ) cos(2πf c t + ) +
d Q (t ) sin( 2πf c t + )
4
4
2
2
Where
d I = d 0 , d 2 , d 4 ......(bit
even)
d Q = d1 , d 3 , d 5 ......(bit
odd )
figure 76
In other word, as we have already seen a QPSK signal can be represented as the
superposition of two BPSK signal with carrier in quadrature. Each signal is
characterized by a 2Tb symbol time, i.e. double time length with respect to original
modulating signal.
101
12.2 OQPSK and π/4 QPSK
Offset Quadrature Phase-Shift keying (OQPSK) is M=4 PSK in which the allowed
data transition times for I and Q components are offset by ½ symbol (i.e. by 1 bit)
interval.
This offset provides an advantage when nonrectangular (i.e. filtered) data pulses are
used, because the offset greatly reduces the AM on the OQPSK signal compared to the
AM on the corresponding QPSK signal. The AM is reduced because a maximum phase
transition of only 90° occurs for OQPSK signalling (as opposed to 180° for QPSK),
since the I and Q data cannot change simultaneously, because the data are offset.
g(t)=x(t)+jy(t)
M=2l point constellation
D=R/l symbol/sec
x(t)
Ts/2
delay
cos(ωct)
Σ
y(t)
QAM
signal out
s(t)=Re[g(t)ejωt]
sin(ωct)
Oscillator
f=fc
-90° phase
shift
figure 77
In mathematical form we have:
M = 2l = 2 2 = 4
eq 216
D = symbol _ rate =
Symbol _ delay =
•
1
BitRate
R
=
=
Ts number _ of _ bit _ per _ symbol l
Ts
2
eq 217
eq 218
in a usual QAM the I and Q component are:
102
n⎞
⎛
x(t ) = ∑ xn hl ⎜ t − ⎟
⎝ D⎠
n
eq 219
n⎞
⎛
y (t ) = ∑ yn hl ⎜ t − ⎟
⎝ D⎠
n
eq 220
where: (xn,yn) denotes one of the permitted (xi,yi) value during the symbol time that is
centred on t=nTs=n/D (s) (it takes Ts (s) to send each symbol), hl(t) is the pulse shape
that is used for each symbol. If the bandwidth of the QAM signal doesn’t need to be
restricted, the pulse shape will be rectangular and of Ts (s) duration.
•
In OQPSK the timing between the x(t) and y(t) components is offset by
Ts/2=(1/2D) (s). that is
n⎞
⎛
x(t ) = ∑ xn hl ⎜ t − ⎟
⎝ D⎠
n
eq 221
n T ⎞
n
1 ⎞
⎛
⎛
y (t ) = ∑ yn hl ⎜ t − − s ⎟ = ∑ yn hl ⎜ t − −
⎟
⎝ D 2⎠ n
⎝ D 2D ⎠
n
eq 222
In Figure Below is reported a comparison between the QPSK and OQPSK (I,Q) signal
QPSK
Shift=0
Tsymbol
O-QPSK
Shift=1/2
Tsymbol
I
Ts
Q
figure 78
103
In the other figure is shown a comparison between QPSK and OQPSK vector
constellation, note that in OQPSK case there is no zero crossing by the modulating
vector.
180°
90°
O-QPSK
QPSK
figure 79
At the output of the QPSK and OQPSK transmitter the modulated signal s(t) could be
as shown in example below:
S(t)
QPSK
Max phase
shift
180°
OQPSK
Max phase
shift
90°
figure 80
104
From mathematical point of view the only difference between QPSK and OQPSK is a
shift/delay of Ts/2 on Q branches, so for OQPSK we can use the representation
reported below:
s (t ) = cos[2πf c t + θ (t )] =
π
π T
1
1
d I (t ) cos(2πf c t + ) +
d Q (t ) sin( 2πf c t + − s ) eq 223
4
4 2
2
2
Where
d I = d 0 , d 2 , d 4 ......(bit
even)
d Q = d1 , d 3 , d 5 ......(bit
odd )
This equation is very similar to that used for QPSK which is reported as a reminder:
s (t ) = cos[2πf c t + θ (t )] =
π
π
1
1
d I (t ) cos(2πf c t + ) +
d Q (t ) sin( 2πf c t + )
4
4
2
2
eq 224
Using rectangular modulating signal, we must observe that there are no difference
between QPSK and OQPSK signal spectrum. This can be explained observing that
while the OQPSK amplitude phase shift is only half with respect to QPSK, the
transitions can occur more frequently (in each period of 2Tb for aQPSK and in each
period of Tb of OQPSK)
Anyway thanks to a lower phase transition OQPSK induces lower AM modulation
amount when the signal is filtered prior to modulation.
Both modulation techniques QPSK and OQPSK, are used in order to reduce BPSK
bandwidth to 1/2, and the staggering doesn’t modify the properties.
figure 81
105
12.3 Quadrature Amplitude Modulation (QAM)
In general, QAM signal constellation is not restricted to having permitted signalling point
only on a unique circle (of radius Ac, as was for the case of MPSK). The general QAM
signal is
s (t ) = x(t ) cos ωc t − y (t ) sin ωc t
eq 225
g (t ) = x(t ) + jy (t ) = R (t )e jϑ ( t )
For example, a popular 16-symbol (M= 16 levels) QAM constellation is shown in figure
below, where the relationship between (Ri,θi) and (xi,yi) can readily be evaluated for
each of the 16 signal values permitted. This type of signaling is used by 2400-bit/s V.22
modem.
figure 82
The spectrum of the output transmitted signal s(t) and the I,Q modulating signal can be
evaluated for a random rectangular binary input signal:
figure 83
106
12.4 PSD for MPSK, QAM, OQPSK, and π/4 QPSK without premodulation filtering
The PSD for MPSK and QAM signals for the case of rectangular bit-shape signaling is
the same of the BPSK, provided that proper frequency scaling is used.
13,5 dB
f(Hz)=R/l=1/Ts
figure 84
The PSD for the complex envelope of MPSK and QAM signals with data modulation of
rectangular bit shape is:
⎛ sin πf lTb ⎞
⎟⎟
Pg ( f ) = K ⎜⎜
⎝ πf lTb ⎠
2
K = ClTb
eq 226
R = 1 / Tb
M = 2l
C=power (watts)
For L=1 we have the BPSK PSD,
QPSK PSD.
L=2 (M=4 symbols) describe QPSK, OQPSK, π/4
107
It is also realized that the PSD for the complex envelope of bandpass signals (i.e.
envelope of the modulated signal), is essentially the same as the PSD for baseband
multilevel signals (i.e. envelope of the modulated signal) when any filtering method is
used.
From figure above, we can see that the null-to-null transmission bandwidth of MPSK
or QAM when rectangular data pulses are used is
BT = 2 R / l = 2(1 / Ts ) = 2 DS
eq 227
Therefore ones BT it is fixed we can observe that an increasing of L has as a
consequence an increasing of bit rate R. In the same way once R is fixed the an
increasing of L produce a decreasing of BT.
The spectral efficiency of MPSK or QAM signaling with rectangular pulses is
η=
⎡ bit/s ⎤
⎢⎣ Hz ⎥⎦
R
R
l
=
=
R
BT 2
2
l
eq 228
As a consequence if:
•
•
•
L=2
L=4
L=8
then
then
then
R=B
R=2B
R=4B
One way to define the transmission bandwidth efficiency for a waveform encoding is the
Out-Of-Band-Power (POB), which is defined as:
−f
POB( f ) =
∫ S( f )
2
−∞
+∞
∞
df + ∫ S ( f ) df
∫ S( f )
−∞
f
2
∞
2
df
=
∫ S( f )
2
∫ S( f )
2
f
∞
df
eq 229
df
0
Where S(f)=PSD (Power Spectral Density).
This method gives the contribution of the PSD, S(f), above a certain frequency, f, when
compared with the total PSD for the signal on entire bandwidth.
If one wanted a 99% power for the signal, which is a common requirement for regulatory
measures, one would find the frequency that gives a POB of 1%.
108
12.5 Spectral efficiency for MPSK, QAM,OQPSK, and π/4 QPSK with
Raised Cosine Filtering
The spectrum shown above was obtained for the case of rectangular symbol pulses
shaping, and the spectral side lobes was terrible. The first side lobe is attenuated only
by ≅ 13.5 dB.
13,5 dB
figure 85
The high side lobes can be eliminated if raised cosine filtering is used (since the
raised cosine filter has an absolutely band limited frequency response).
We should select the 6-dB bandwidth f0 of the raised cosine filter, for the baseband
signal, equal to half of the symbol (baud) rate in order for o avoid ISI. That is
f0 =
1
1R 1 1
=
D=
2
2 l 2 Ts
eq 230
In practise, a square root raised cosine SRRC frequency response characteristic is
often used at the transmitter, along with another SRRC filter at the receiver, in order to
simultaneously prevent ISI on the received filtered pulses and minimize the bit errors
due to channel noise.
However the SRRC filter also introduces AM on the transmitted signal.
If the overall pulse shape satisfies the raised cosine-rolloff filter characteristic, then, the
absolute bandwidth of the M-level modulating baseband signal signal is
109
B=
1
[(1 + r )D] Hz
2
or
eq 231
⎛ 2B ⎞ R
symbol/s
D=⎜
⎟=
⎝1+ r ⎠ l
r is the characteristic of the filter called rolloff factor.
From AM study modulation we know that the transmission bandwidth BT is related to
the modulation bandwidth B by
BT = 2 B
eq 232
so the overall absolute transmission bandwidth of the QAM signal with raised
cosine filtered pulses is:
BT = 2 B = 2
1
[(1 + r )D] = [(1 + r )D] = ⎡⎢(1 + r ) R ⎤⎥ Hz
2
l⎦
⎣
eq 233
R
of rectangular pulse
l
shaping i.e. without SRRC filter). We can see that the greeter the r , the greeter the BT,
when r=1 then we have again the maximum bandwidth such as we used the rectangular
filter shape.
This bandwidth can be compared to a null bandwidth BT = 2
On table below are reported some values of the parameter related to the above
equations supposing a fixed bit-rate R=812 Kbit/s.
Note that when the rolloff factor of the SRRC filter tend to 1 then the bandwidth BT
become the same as found for rectangular filter data pulse shape.
110
figure 86
Transmission Bandwidth Bt as a function of rolloff factor r for SRRC and Rectangular pulse shape
filter
1800.0
l=1-bit
1600.0
1400.0
Bt KHz
1200.0
1000.0
l=2-bit
800.0
l=3-bit
600.0
BT (KHz) SRRC
BT (KHz) rectang
BT (KHz) SRRC
BT (KHz) rectang
BT (KHz) SRRC
BT (KHz) rectang
400.0
200.0
R=812,499 Kbit/s
0.0
0
0.1
0.2
0.4
0.6
0.8
1
Rolloff factor r
figure 87
E:\documenti per
corsi\ELETTRONICA T
111
Transmission Bandwidth Bt as a function of rolloff factor r for SRRC and Rectangular pulse shape
filter
0
0.1
0.2
0.4
0.6
0.8
1
1800.0
1600.0
1400.0
l=1-bit
Bt KHz
1200.0
l=2-bit
1000.0
800.0
l=3-bit
600.0
400.0
200.0
0.0
BT (KHz) SRRC
BT (KHz) rectang
BT (KHz) SRRC
BT (KHz) rectang
BT (KHz) SRRC
BT (KHz) rectang
Bandwidth with SRRC and rectangular pulse filter shape
figure 88
Because
M = 2l
eq 234
which implies
l = Log 2 M =
ln M
ln 2
eq 235
Then the spectral efficiency of QAM-type signaling with raised cosine filtering is
ln M
l
ln M
R
R
η=
=
= ln 2 =
=
1 + r 1 + r (1 + r ) ln 2
BT ⎛ 1 + r ⎞
⎜
⎟R
⎝ l ⎠
bit/s
Hz
eq 236
112
The above equation can be compared with the rectangular data pulse shape filter
efficiency already seen
η=
l
R
R
=
=
BT 2 R 2
l
⎡ bit/s ⎤
⎢⎣ Hz ⎥⎦
eq 237
we can see that ηSRRC is greater than ηrectang if r < 1.
This result is important because tell us how fast we can signaling for a prescribed
bandwidth. The result also holds for MPSK, since it is a special case of QAM.
For example, suppose that we want to signal over a communications satellite that has
an available bandwidth of BT=2.4 MHz.
•
If we used BPSK (M=2) with a r=50% rolloff factor, we could signal at rate of
R = BT ×η = 2.4 × 0.677 = 1.60 Mbit / s
•
eq 238
If we used QPSK (M=4) with a r=25% rolloff factor, we could signal at a rate of
R = BT ×η = 2.4 × 1.6 = 3.84
Mbit / s
eq 239
Table below illustrates the allowable bit rate per hertz of transmission bandwidth for
a QAM signalling
Size of DAC
E:\documenti per
corsi\ELETTRONICA T
Rolloff factor r
Number ofLevels
l bit per symbol
M symbols
1
2
3
4
5
2
4
8
16
32
0
1.00
2.00
3.00
4.00
5.00
0.1
0.91
1.82
2.73
3.64
4.55
0.25
0.80
1.60
2.40
3.20
4.00
0.5
0.67
1.33
2.00
2.67
3.33
0.75
0.57
1.14
1.71
2.29
2.86
1
0.50
1.00
1.50
2.00
2.50
figure 89
113
Spectral efficiency for QAM signaling with Raised Cosine-Rolloff Pulse Shaping filtering
6
efficiency=R/Bt ((bit/s)/Hz))
5
ln M
l
ln M
R
R
=
=
= ln 2 =
η=
1 + r 1 + r (1 + r ) ln 2
BT ⎛ 1 + r ⎞
⎜
⎟R
l
⎝
⎠
bit/s
Hz
4
0
0.1
0.25
0.5
0.75
1
3
2
1
0
1
2
3
4
5
l - bit per symbol
figure 90
In order to conserve more bandwidth, the number of levels M cannot be increased too
much, since for a given peak envelope power (PEP) the spacing between the signal
points on the signal constellation will decrease and noise on the received signal will
cause errors (Noise moves the received signal vector to a new location that might
correspond to a different signal level.) However, we know that R certainly has to be less
than C, the channel capacity, if the errors are to be kept small.
η < η max
eq 240
⎛
⎝
η max = Log 2 ⎜1 +
S⎞
⎟
N⎠
114
24.33
24.23
24.13
24.03
23.93
23.82
23.71
23.60
2.00
23.48
23.36
23.24
23.12
22.99
22.86
22.72
22.58
22.43
22.28
22.12
21.96
21.79
21.61
21.43
21.24
21.04
20.83
20.61
20.37
20.13
19.87
19.59
19.29
18.98
18.63
18.26
17.85
17.40
16.90
16.33
15.68
14.91
13.98
12.79
11.14
8.45
0.00
Spectral efficiency
9.00
6.00
5.00
4.00
150.00
3.00
Spectral efficiency
SNR (lineare)
0.00
SNR (Lineare)
Spectral Efficiency as a function of SNR
300.00
8.00
7.00
250.00
200.00
100.00
1.00
50.00
0.00
SNR (dB)
figure 91
115
As an example related to the effect of rolloff factor value on the constellation dispersion
and on the PSD, we can consider a QPSK modulation at the transmitter output side. Let
us consider two cases: Rectangular filter pulse shaping and SRRC filter pulse
shaping. In this last case are being considered the value of rolloff factor: r = 0.5
QPSK constellation
With rectangular pulse shaping
figure 92
QPSK constellation
With SRRC pulse shaping and
rolloff factor r = 0.5
figure 93
The difference on side lobe decaying its clear !!
116
12.6 Receiver QPSK, MSK and performance
QPSK is a multilevel signalling technique that uses L=4 levels per symbol. Thus, 2 bits
are transmitted during each signalling interval (T seconds). The QPSK signal may be
represented by
s (t ) = (± A)cos(ω c t + θ c ) − (± A)sin(ω c t + θ c )
0<t ≤T
eq 241
Where the (±A) on the cosine carrier is one bit of data and the (±A) factor on the sine
carrier is another bit of data.
The relevant input noise is represented by
n(t ) = x(t ) cos(ω c t + θ n ) − y (t ) sin(ω c t + θ n )
eq 242
Total input power it will be given by adding signal and noise: after the demodulation we
have ±A+x(t) and ±A+y(t) as input to the integrator.
The QPSK signal is equivalent to two BPSK signals-one using a cosine carrier and the
other using a sine carrier. The QPSK signal is detected by using a coherent receiver
shown in figure below:
± A+x(t)
Matched Filter:
integrator
t0
QPSK
signal +
noise
∫ (..)dt
2cos(ωct+θc)
S
&
H
Threshold
device
t0 −T
+90°
phase
shift
Carrier sync f=fc
(form carrier sync
circuits)
Bit sync (from
bit sync circuitry)
Matched Filter:
integrator
-2sin(ωct+θc)
± A+y(t)
Carrier recovery
t0
∫ (..)dt
S
&
H
R/2 bits/sec
Parallel
To serial
converter
Threshold
device
R/2 bits/sec
t0 −T
figure 94 : Coherent/Matched filter detection of QPSK
Because both the upper and lower channels of the receiver are BPSK receivers, the
BER is the same as that for BPSK system. Thus the BER for the QPSK receiver is:
117
Digital
output
⎛
E ⎞
Pe = Q⎜⎜ 2 b ⎟⎟
N0 ⎠
⎝
eq 243
figure 95 : Comparison of the probability of bit error for several digital signaling schemes
Except for the curves describing the non coherent detection cases, all of these results
assume that the optimum filter-the matched filter- is used in the receiver.
Comparing the various bandpass signaling techniques, we see that QPSK and MSK
give the best overall performance in terms of the minimum bandwidth required for a
given signaling rate and one of the smallest Pe for a given Eb/N0. However QPSK is
relatively expensive to implement, since it requires coherent detection.
Channel coding can be used to reduce the Pe below values given above.
The BERs for BPSK and QPSK signaling are identical. But for the same bit rate R, the
bandwidth of the QPSK is exactly one-half the bandwidth of the BPSK, i.e. the same
information but in half bandwidth.
118
When rectangular data pulses is used, the null-to-null transmission bandwidth is:
BT =
2R
l
⇒
BT ( BPSK ) = R
BT (QPSK ) =
1
R
2
eq 244
The spectral efficiency is
l ⋅ BT
R
l
η=
= 2 =
BT
BT
2
⇒
η ( BPSK ) = 1
η (QPSK ) = 2
eq 245
The bandwidth of π/4 QPSK is identical to that for QPSK.
For the same BER, the differentially detected π/4 QPSK requires about 3 dB more
Eb/N0 than that for QPSK, but coherently detected π/4 QPSK has the same BER
performance as QPSK.
The MSK is essentially equivalent to QPSK, except that the data on the x(t) and y(t)
quadrature modulation components are normally offset and their equivalent data pulse
shape is a positive part of a cosine function instead of rectangular pulse (this gives a
PSD for MSK that rolls off faster than that for QPSK). Consequently, because the
MSK and QPSK signal representations and the optimum receiver structures are
identical except for the pulse shape, the probability of bit error for MSK and QPSK is
identical.
119
TYPE OF DIGITAL
SIGNALING
MINIMUM
TRANSMISSION
BANDWIDTH
REQUIRED
ERROR PERFORMANCE
(R is the bit rate)
Baseband Signalling
Unipolar
1
R
2
⎡ Eb ⎤
Q⎢
⎥
⎢⎣ N 0 ⎥⎦
Polar
1
R
2
⎡ E ⎤
Q⎢ 2 b ⎥
⎣⎢ N 0 ⎥⎦
Bipolar
1
R
2
3 ⎡ Eb ⎤
Q⎢ 2
⎥
2 ⎣⎢ N 0 ⎥⎦
Bandpass Signalling
Coherent detection
Non coherent detection
1 −⎜⎜⎝ 2 N 0 ⎟⎟⎠
e
2
OOK (On Off Keing)
R
⎡ Eb ⎤
Q⎢
⎥
⎢⎣ N 0 ⎥⎦
BPSK
R
⎡ E ⎤
Q⎢ 2 b ⎥
⎢⎣ N 0 ⎥⎦
PCM/FM
R
1 −⎜⎜⎝ 2 N0 ⎟⎟⎠
e
2
FSK
2∆f + R
⎛ 1 Eb ⎞
Eb 1
>
N0 4
Requires coherent
detection
⎛ 1 Eb ⎞
where
∆f = f 2 − f1 =frequency
shift
⎡ Eb ⎤
Q⎢
⎥
⎢⎣ N 0 ⎥⎦
⎛ 1 Eb ⎞
1 −⎜⎜⎝ 2 N 0 ⎟⎟⎠
e
2
DPSK
R
Not used in practise
1 −⎜⎜⎝ N 0 ⎟⎟⎠
e
2
QPSK
1
R
2
⎡ E ⎤
Q⎢ 2 b ⎥
⎣⎢ N 0 ⎥⎦
Requires coherent
detection
MSK
1,5 R (null bandwidth )
⎡ E ⎤
Q⎢ 2 b ⎥
⎣⎢ N 0 ⎥⎦
⎛ Eb ⎞
⎛ 1 Eb ⎞
1 −⎜⎜⎝ 2 N 0 ⎟⎟⎠
e
2
120
13 Feher-Patented Quadrature Phase-Shift Keing
13.1 Introduction
The Feher-patented Quadrature-phase-shift Keying, type B (FQPSK-B) modulation
scheme is a proprietary bandwidth-efficient modulation technique invented by Dr.Kamilo
Feher. FQPSK-B is a variant of the cross-correlated FQPSK scheme (originally
referred to as XPSK) which in turn was derived from a previous modulation scheme also
invented by Dr. Feher known as Inter-symbol-interference and Jitter-Free (IJF)
QPSK, which has a 3-dB envelope fluctuation. With FQPSK as well as FQPSK-B,
there is an intentional controlled amount of cross-correlation between the In-phase (Ik)
and Quadrature-phase (Qk) channels which allows for a quasi-constant envelope,
reducing the envelope fluctuation to 0 dB. This cross-correlation was applied to the
IJF-QPSK baseband signals prior to modulation onto In-phase (Ik)
and
Quadrature-phase (Qk) carriers. This transformation was initially implemented by
mapping, in each half symbol, the 16 possible combinations of the (Ik) and (Qk)
baseband waveforms present in the IJF-QPSK onto a new set of 16 waveform
combinations.
Here SI(t) and SQ(t) are the I- and Q-channel baseband signals.
These new waveforms were chosen in such a way that the baseband signals are time
continuous and the envelope is constant.
FQPSK-B improves spectral efficiency over FQPSK because low-pass filtering is
applied to the baseband I- and Q-channel waveforms.
When properly designed and specified, a system using FQPSK-B is interoperable with
other modulation schemes such as OQPSK, GMSK, and MSK.
13.2 Signal model for FQPSK
The FQPSK signal (or XPSK signal) can be realized using either a
half-symbol cross-correlation mapping or a full-symbol mapping. In this section, the
full-symbol cross-correlation mapping is described instead of the half-symbol mapping
because the full-symbol mapping facilitates the interpretation of the FQPSK as a TCM
(Trellis Code Modulation).
The waveform of each baseband signal in a TS symbol interval is chosen from a set of
16 waveforms {si(t) | 0 ≤ i ≤ 15} defined as follows:
Typically
A= 2
Eb
≅ 1/ 2
Tb
eq 246
And:
121
eq 247
122
123
Example of quasi constant envelope modulation si(t) and sQ(t)
124
Note that for any value of A other then unity, s5(t) and s6(t) as well as their negatives,
s13(t) and s14(t), will have a discontinuous slope at their midpoints (i.e., at t = 0),
whereas the remaining 12 waveforms all have a continuous slope throughout their
defining intervals. Also note that all 16 waveforms have zero slope at their end points
and, thus, concatenation of any pair of these will not result in a slope discontinuity.
The wavelets are numbered according to a Trellis mapping rule that determines which
wavelet is transmitted. Specifically, the mapping rule specifies that during the n-th
channel symbol interval, [(n - [1/2])Ts] ≤ t ≤ [(n + [1/2])Ts], the baseband I- and Qchannel waveforms Ik and QK are assigned wavelets sI(t)=si and sQ(t)=sj respectively,
where the indices i and j are given by:
i = I 3 × 2 3 + I 2 × 2 2 + I1 × 21 + I 0 × 2 0
j = Q3 × 2 3 + Q2 × 2 2 + Q1 × 21 + Q0 × 2 0
eq 248
with
I 0 = d Q ,n ⊕ d Q ,n−1
Q0 = d I ,n+1 ⊕ d I ,n1
I1 = d Q ,n−1 ⊕ d Q ,n−2
Q1 = d I ,n ⊕ d I ,n−1 = I 2
I 2 = d I ,n ⊕ d I ,n−1
Q2 = d Q ,n ⊕ d Q ,n−1 = I 0
I 3 = d I ,n
Q3 = d Q ,n
Where d I ,n and d Q ,n ∈ {0,1}
eq 249
are the n-th I- and Q- channel inputs to the modulator
respectively
The particular sI(t) and sQ(t) waveforms chosen for any particular Ts signalling interval
on each channel depend on the most recent data transition on that channel, as well as
the two most recent successive transition on the other channel.
Next, define the following mapping function for the baseband I-channel transmitted
waveform [yI (t)=sI (t) ] in the n-th signalling interval [(n - [1/2])Ts] ≤ t ≤[(n + [1/2])Ts]
in terms of the transition properties of the I and Q data symbol sequences dIn and dQn,
respectively.
125
Making use of the signal properties of eq above, the mapping conditions in (1) through
(4) for the I-channel baseband output can be summarized in a concise form described
by Table 1. A similar construction for the baseband Q-channel transmitted waveform
[yQ(t)=sQ(t-Ts/2) ] in the n-th signalling interval nTs ≤ t ≤ (n + 1)Ts in terms of the
transition properties of the I and Q data symbol sequences, dIn and dQn, respectively,
126
can be obtained analogously to (1) through (4) above. The results can once again be
summarized in the form of a table, as in Table 2.
Tables below specify the details where dIK is the data sequence on the I channel, and
dQK the data sequence for the Q channel.
127
A block diagram of a FQPSK transmitter based on the reformulation by Simon and Yan
is shown in figure below:
figure 96 : The conceptual block diagram of FQPSK(SPSK)
FQPSK-B Transmitter and Receiver schemes are reported below:
I seq. Logic
And switch
si(t)
Ik
cos(ωct+θc)
Digital
source
Encoder
Qin=2
Bin=1/Tb
Qout=4
Bout= Bin /2
Ts=2Tb
+
cos = [π t / 2Ts ]
I and Q
Comb
logic
sin = [π t / 2Ts ]
+
sin (ωct+θc)
Qk
Delay
=Tb
=Ts/2
SFQPSK(t)
Modulated
signal
Q seq. Logic
And switch
sQ(t-T/2)
QPSK Modulator
figure 97 : FQPSK transmitter
128
Ik
Delay
=Tb
=Ts/2
Decision r1
unit
Tb
∫ (.)dt
0
cos(ωct+θc)
Digital
sink
ei
Decoder
mk
I and Q
Decision
logic
r(t)=
SFQPSK(t)
Decision mapping
+ 1 ← r1 > 0
− 1 ← r1 < 0
Received
Modulated
signal
sin (ωct+θc)
Qk
Decision r
2
unit
Tb
∫ (.)dt
0
Correlator
Decision mapping
+ 1 ← r2 > 0
− 1 ← r2 < 0
figure 98: coherent FQPSK receiver
The FQPSK signal obtained by transmitter can be represented by:
S XPSK (t ) = S FQPSK (t ) = sI (t ) sin(2πf c t + θ c ) + sQ (t −
Ts
) cos(2πf c t + θ c )
2
eq 250
Where sI(t) and sQ(t) are the combined cross-correlator output.
These are obtained, as we have seen so far, by cross-correlating (i.e. mapping) the
sequence dI and dQ baseband-data represented by IK and QK
The value of IK and QK depend on the encoder output state k as given by equation
below, and is a function of two consecutive encoder inputs bits as specified in table
below.
Ik = +
Qk = −
2 Es
π⎤
⎡
cos ⎢(2k − 1) ⎥
Ts
4⎦
⎣
2Es
π⎤
⎡
sin ⎢(2k − 1) ⎥
Ts
4⎦
⎣
Encoder
Input
Encoder
Input
Encoder
Output
I logic
Q logic
Ej-1
0
0
1
1
Ej
0
1
0
1
k
0
1
2
3
IK
+1
+1
-1
-1
QK
+1
-1
-1
+1
figure 99
129
As an example for Ik and Qk which in turn are the dI e dQ data flow on I and Q channels,
we have:
I0 =
2 Es
2Es
π⎤
⎡
⎡ π⎤
cos ⎢(0 − 1) ⎥ =
cos ⎢− ⎥ =
4⎦
Ts
Ts
⎣
⎣ 4⎦
2 Es 2
=
Ts 2
Es
= +1
Ts
I1 =
2 Es
2Es
π⎤
⎡ π⎤
⎡
cos ⎢(2 − 1) ⎥ =
cos ⎢
=
4⎦
Ts
Ts
⎣ 4 ⎥⎦
⎣
2Es 2
=
Ts 2
Es
= +1
Ts
I2 =
2 Es
2Es
2Es 2
E
π⎤
⎡ π⎤
⎡
cos ⎢(4 − 1) ⎥ =
cos ⎢3 ⎥ = −
= − s = −1
4⎦
Ts
Ts
Ts 2
Ts
⎣ 4⎦
⎣
I3 =
E
2 Es
2Es
2 Es 2
π⎤
⎡ π⎤
⎡
cos ⎢(6 − 1) ⎥ =
cos ⎢5 ⎥ = −
= − s = −1
Ts
Ts
Ts 2
Ts
4⎦
⎣ 4⎦
⎣
eq 251
Q0 = −
2 Es
2Es
π⎤
⎡
⎡ π⎤
sin ⎢(0 − 1) ⎥ = −
sin ⎢− ⎥ =
4⎦
Ts
Ts
⎣
⎣ 4⎦
2Es 2
=
Ts 2
Q1 = −
2 Es
2Es
π⎤
⎡ π⎤
⎡
sin ⎢(2 − 1) ⎥ = −
sin ⎢
=
4⎦
Ts
Ts
⎣ 4 ⎥⎦
⎣
2 Es 2
E
= − s = −1
Ts 2
Ts
Q2 = −
2 Es
2Es
2Es 2
E
π⎤
⎡ π⎤
⎡
sin ⎢(4 − 1) ⎥ = −
sin ⎢3 ⎥ = −
= − s = −1
4⎦
Ts
Ts
Ts 2
Ts
⎣ 4⎦
⎣
Q3 = −
2 Es
2Es
π⎤
⎡ π⎤
⎡
sin ⎢(6 − 1) ⎥ = −
sin ⎢5 ⎥ =
Ts
Ts
4⎦
⎣ 4⎦
⎣
2 Es 2
=
Ts 2
Es
= +1
Ts
Es
= +1
Ts
eq 252
Consecutive values of Ik and Qk assume A=±1 values, and are then nonlinearity filtered
by the I sequential logic and switch, and by the Q sequential logic and switch
respectively. The switch outputs are defined in table 1 and table 2. Note that the
switch output is determined by three consecutive inputs, and thus has memory.
This is in contrast to OQPSK, which is memory less.
130
13.3 Signal model for FQPSK-B
The FQPSK-B signal obtained by transmitter can be represented by:
T
S XPSK (t ) = S FQPSK − B (t ) = ~
sI (t ) sin(2πf c t + θ c ) + ~
sQ (t − s ) cos(2πf c t + θ c )
2
eq 253
where the filtered signals
t
~
sI (t ) = ∫ s I (t )h(t − τ )dτ
−∞
~
sQ (t ) =
eq 254
t
∫s
Q
(t )h(t − τ )dτ
−∞
are the low pass filtered version of the sI(t) and sQ(t) seen so far in FQPSK form, and
h(t) is the impulse response of the low-pass filter.
The functional block diagram below depicts full-symbol cross-correlation mapping
followed by the transmission filter and an Offset-QPSK (OQPSK) modulator.
sI(t)
SQ(t)
figure 100 : FQPSK-B modulator
Figure below shows the phasor diagrams and the eye diagrams of both FQPSK and
FQPSK-B baseband signals.
131
figure 101: phasor diagrams FQPSK (left) FQPSK-B (right)
figure 102: transmitter eye figure for FQPSK (top) and FQPSK-B (bottom)
132
13.4 Spectral efficiency comparison
Required bit rates in range telemetry are increasing dramatically, resulting in research to
develop modulation techniques that have greater spectral efficiency than 35-year-old
workhorse fo the telemetry industry, NRZ, PCM/FM.
In figure below is presented a comparison between several type of modulation
techniques.
figure 103
133
figure 104
•
•
The 99.99% bandwidths of filtered FQPSK-B are approximately one-half of the
corresponding bandwidth of optimized PCM/FM, even when the signal is non
linearly amplified.
The EB/N0 required for a BER of 1x10-5 for non optimized FQPSK-S is
approximately 12 dB, which is approximately the same as the limiter discriminator
detected PCM/FM
134
14 EFFICIENT MODULATION METHODS STUDY AT NASA/JPL
CCSDS (RF and Modulation) became aware of a new modulation type at its Spring
1997 meeting. Named FQPSK for its inventor, Dr. Kamilo Feher, it was reported to have
a very narrow RF spectrum and only minimal end-to-end system losses. Test data
provided by Dr. Feher showed a spectrum narrower than that of GMSK using a
BTS = 0.50 filter. Sideband attenuations were tabulated for the several modulation types
studied and it was concluded that FQPSK-B could be a very attractive modulation
method.
FQPSK-B, a specific version of FQPSK, was simulated using SPW. Additionally, Mr.
Eugene Law of the Naval Air Warfare Center Weapons Division at Point Mugu obtained
an FQPSK-B modulator-demodulator (modem) for hardware tests. NASA witnessed
these spectrum tests and obtained copies of the spectra. Note: This is the only modulation
type covered in this report for which there are actual hardware verification tests. These tests
confirm the simulation results reported here.
•
•
FQPSK-B modulation is a form of OQPSK modulation in which one of 16
wavelets [waveforms] is selected for transmission on the I-channel and another is
chosen for transmission on the Q-channel.
Wavelet determination depends on the present and previous data bit pair values
for the I and Q channels. There is a ½-symbol-time offset between I and Q
transmissions.
FQPSK-B modulates and filters at baseband. There after, the signal is translated
to an i.f. frequency and then translated again to the transmitted RF frequency.
14.1 FQPSK-B Modulation Bit-Error-Rate (BER)
Simulations of FQPSK-B were conducted at JPL with the assistance of Dr. Feher.
Figure below shows the Bit-Error-Rate (BER) performance. Like MSK and GMSK
modulation, existing transmitting and receiving equipment simulation models were
unsuitable for FQPSK-B. However, BER performance was measured using ESA’s
power amplifier operating in full saturation.
Comparing FQPSK-B to ideal BPSK/NRZ shows that an additional EB / N0 of 1.7 dB is
required to achieve a 1 x 10-3 BER. This is 0.3 dB greater than GMSK with a BTS = 0.5.
Dr. Feher commented that additional system optimization might reduce these losses.
His suggestions included adding hard limiters to the transmitting system and improving
the receiver filter’s phase performance.
Supporting his position, Dr. Feher points to BER measurements made at Point Mugu
using actual hardware. Dr. Feher’s modem, operating with a 1 Watt SSPA in full
saturation, produced a 1 x 10-3 BER at an EB / N0 of 8 dB, about 1.3 dB more than ideal
BPSK/NRZ and 0.1 dB less than GMSK with a BTS = 0.5. Further BER tests will be
required to verify the better EB / N0 performance using a modulator capable of a 60 dB
sideband attenuation.
135
figure 105: FQPSK-B mosulation Bit Error Rate
14.2 FQPSK-B Modulation Spectra
Figure below FQPSK-B spectra obtained by simulations. Spectra are obtained using
ESA’s 10 Watt SSPA operating in full saturation. However, as with the MSK and GMSK
simulations, an ideal modulator and receiver were simulated.
FQPSK-B spectra do not have discrete components, giving it a distinct advantage over
filtered phase modulation schemes. Sideband attenuation does tend to reach a floor at
approximately 75 dB below the peak amplitude where spectral broadening is clearly
evident in Figure below. Unlike most of the phase modulation schemes, spectral
broadening in the vicinity of fC does not occur. Rather, Figure shows the spectrum width
around fC to be significantly narrower than BPSK/NRZ.
FQPSK-B has a very compact, bandwidth-efficient spectrum. Simulations show it to be
slightly better than GMSK reaching a level 50 dB below the peak sideband amplitude at
a bandwidth of 1.7 RB rather than at 1.9 RB for GMSK with a BTS = 0.5. At a sideband
attenuation of 60 dB, FQPSK-B and GMSK are within 0.1 RB of one another.
14.2.1
Hardware Spectrum Measurements
FQPSK-B is the only modulation type in the Phase 3 Efficient Modulation Methods Study
for which there are actual hardware measurements. On 1 July 1997 FQPSK-B hardware
tests were conducted at the Naval Air Warfare Center at Point Mugu. Dr. Feher
contributed a laboratory model of his FQPSK-B modulator. The test configuration
included: a random data generator producing 1 Mb/s, Dr. Feher’s FQPSK-B modulator,
a Hewlett Packard (HP) Model 8780A Vector Signal Generator for QPSK modulation, a
frequency translator, a 1-Watt SSPA, and an HP spectrum analyzer.
136
Tests were run with the SSPA in full saturation at 2.44 GHz and frequency spectra were
plotted by the HP spectrum analyzer. Figure reproduces the HP analyzer’s plot on the
same scale as that used for the Fine Detail spectra shown in Figure. Separate figures
are provided because the spectrum plotted in Figure is virtually indistinguishable from
the FQPSK-B curve in Figure, down to a level 55 dB below the peak sideband
amplitude. Below the -55 dB point, the hardware generated spectrum in Figure
becomes wider than the SPW computed spectrum in Figure. Readers should
understand that no attempt was made to optimize the hardware test configuration at Point
Mugu. The test bed was constructed using hardware elements designed for a variety of
other uses.
These measurements confirm the bandwidth efficiency of FQPSK-B modulation, as
predicted by SPW. Neither a 2 GHz receiver nor an FQPSK-B demodulator-symbol
synchronizer were available to measure Bit-Error-Rate. Therefore, system losses
calculated by SPW could not be confirmed using this test configuration.
Additional hardware tests were conducted using an FQPSK-B modem provided by Dr.
Feher. The test configuration operated at 70 MHZ. This inexpensive commercially
available modem was designed to operate over a more restrictive set of signal levels
than the laboratory modulator described above. It did not provide sideband attenuations
much below 40 dB.
figure 106: fc=±10 Rb
137
figure 107: Broadband spectra (fc=±250 Rb)
14.3 FQPSK-B Modulation Power Containment
FQPSK-B frequency spectrum efficiency is so high that two power containment plots are
required.
First figure is plotted using a 0 - 20 RB scale for consistency with the other modulation
methods.
However, virtually all of the transmitted power is contained in such a small bandwidth
that a second figure is added. Its scale of 0 - 2 RB clearly shows the occupied bandwidth
to be only 0.8 RB. This is significantly better than the 1.0 RB found with GMSK using a
filter bandwidth of BTS = 0.5.
14.4 FQPSK-B Modulation Study Conclusions
Although FQPSK-B modulation was only recently added to the Efficient Modulation
Methods Study, it appears to be one of the most bandwidth-efficient modulation method
considered. Because of its proprietary nature, some of its parameters are not apparent
from published documents. Whether this proprietary nature would serve as an
impediment to universal application by space agencies is also not clear.
What is clear is that FQPSK-B modulation must be seriously considered for high and
very high data rate missions. With RF spectra valued in the Unites States at several
hundred dollars per Hertz, NASA, and probably all space agencies, have a duty to
investigate this modulation type further.
138
figure 108: FQPSK-B Power containment (0-20 Rb)
139
figure 109: FQPSK-B Power containment (0-2 Rb)
15 SUMMARY, CONCLUSIONS, AND RECOMMENDATIONS
The CCSDS - SFCG Efficient Modulation Methods Study measured the RF spectrum’s width
and end-to-end system performance using computer simulations. In compliance with the
SFCG’s request, the conclusions identify those modulation schemes that are the most
bandwidth-efficient and suggest that CCSDS and SFCG Space Agencies adopt
recommendations specifying their use.
15.1.1
SUMMARY
For each modulation method, it reviews end-to-end system losses, examines RF
spectrum bandwidth, and discusses the spectrum improvement factor resulting
from baseband filtering.
15.1.1.1
Summary of Losses
Table below shows system and filtering losses occurring in the end-to-end system for
each modulation type. Column 2 contains losses relative to ideal BPSK/NRZ
modulation. Recall that ideal BPSK/NRZ assumes: perfect data (Pm = Ps = 0.5), an ideal
system (perfect carrier tracking and symbol synchronization), and no filtering
(BT = 4).
140
Filtering losses, inherent in GMSK and FQPSK-B, are included in leftmost column of
Table containing losses relative to ideal BPSK/NRZ.
NOTE: All modulation types exhibit a loss with respect to ideal BPSK/NRZ. To find the
true cost of a modulation method, one should subtract 0.56 dB which is the loss for filtered
BPSK.
Thus, the true loss for GMSK (BTS = 0.5) is about 0.8 dB and FQPSK-B is about 1.1 dB.
Phase 3 studies employed baseband filtering exclusively. A principal objective was the
selection of the proper filter bandwidth. Recall that filter selection criteria required
using a filter producing the narrowest RF spectrum while introducing only
moderate losses.
From Table it is clear that filters having a BTS = 1 often exceeded the allowable loss of
approximately 1 dB. However, filters having a BTS = 2 generally met the 1 dB loss
criterion.
8-PSK was the exception requiring a BTS = 3 filter bandwidth to be acceptable. For the
other modulation types, BER curves showed that there was no significant benefit in
using a BTS = 3 filter bandwidth. Thus, Butterworth and Bessel baseband filters, with a
BTS = 2, were used.
figure 110: System Losses
NOTES:
1. Losses determined at a Bit-Error-Rate of 1 x 10-3 with 0 = 0, Pm = 0.55 (negative numbers indicate a loss).
2. System losses were measured relative to ideal BPSK/NRZ (perfect data, lossless equipment).
3. Filtering Losses include: ISI + Mismatch + Imperfect Carrier Tracking & Symbol Synchronization.
4. BER reached a minimum of 1 x 10-2.
5. Filtering Losses Not Available (N/A) because BER measured with ideal system components.
6. Filter bandwidth BTS = 1 (BTB = 0.5).
7. Filter bandwidth BTS = 0.5 (BTB = 0.25).
141
15.1.1.2
RF Spectrum Efficiency
Another Phase 3 study objective was to determine the RF spectral bandwidth of each
modulation type. This was necessary to rank the several modulation methods with
respect to one-another.
Many Spectrum Managers are concerned principally with occupied bandwidth (i.e., 99%
power containment).
The Efficient Modulation Methods Study was motivated by a desire to pack a substantially
greater number of spacecraft into a given frequency allocation, particularly in the 2 and
8 GHz Category A mission bands. Maximum packing density occurs when spectra from
two spacecraft, operating on adjacent frequencies, just begin to overlap at n dB below
the peak of the data sideband’s spectrum.
This follows from a worst-case assumption that the Earth station’s antenna is bore
sighted on both spacecraft simultaneously. Where spacecraft are not coincidently within
the Earth station antenna’s beamwidth, the interferer’s and victim’s relative signal
strengths will determine the special separation necessary to avoid interference.
Obviously, even as frequency band usage increases, some spatial separation is
expected. This study attempted to determine the value of n.
Views differ regarding the optimal value of n. Some believe that spectra from spacecraft
on adjacent frequencies could be permitted to intersect at a level of 20 dB below the
peak sideband amplitude.
Others believe that the number should be greater or less than 20 dB.
In any event, Category A missions in highly elliptical orbits can undergo signal level
changes of 30 dB or more at the Earth’s surface. Thus, it would seem prudent to prohibit
RF spectra, from spacecraft operating on adjacent frequencies, from intersecting at
levels higher than 50 dB below the peak of the data sideband generated by the
spacecraft having the stronger signal.
To provide maximum flexibility, RF spectrum bandwidths have been tabulated at values
of n from 20 to 60 (dB) below the data sideband’s peak. RF spectrum width increases
as a function of n and each user must select the proper value. A value of n = 50 is
recommended for most applications.
For a specific value of n, one can calculate the improvement in spectral efficiency.
CCSDS concluded that BPSK/NRZ was to be the reference modulation type. A
Spectrum Improvement Factor (SIF) can be calculated by comparing the bandwidth of
unfiltered BPSK/NRZ to the bandwidth of the modulation method under discussion
according to the relationship:
eq 255
Since the bandwidth is a function of n, the SIF will also vary with n. Table below
contains the bandwidths and SIFs at several values of n for all modulation types
covered in this Phase 3 study.
142
Bandwidths for all phase modulation types were evaluated using a Butterworth, BTS = 2
filter.
For symmetrical data, no spikes are present in the spectra of unfiltered BPSK/NRZ. All
measurements in Table were made with respect to a continuous unfiltered BPSK/NRZ
reference spectrum. Conversely, all phase modulation schemes, which employ
baseband filtering, have both continuous and discrete parts to their spectrum.
SIF measurements in Table below were made with respect to the discrete part of the
baseband filtered modulation spectrum. This represents a worst case bandwidth
comparison. Readers should understand that no discrete spectral components exceed
the value of n in any of the SIFs shown in Table. Since SPW’s resolution bandwidth
was set to 1.33 Hz, one can conclude that the SIFs should be close to those obtained
using real hardware viewed on a spectrum analyzer with a 1 Hz resolution.
Preferred modulation types become immediately apparent when SIFs are plotted as a
function of n as in Figure below. Modulation types fall into two distinct groups FQPSK-B
/ GMSK and everything else. Even 8-PSK is not a competitor for those two types. The
message is clear:
If RF bandwidth is important, then the results of this study show that FQPSK-B and GMSK
(BTS = 0.5) are the modulation methods of choice.
figure 111: Bandwidth Efficiencies
143
figure 112 : Spectral efficiency relative to unfiltered BPSK/NRZ
Figure above relates the spectral efficiencies of the several modulation methods investigated in
the Phase 3 Efficient Modulation Methods Study. SIF, as defined in equation above is plotted as
a function of n (number of dB below the peak sideband amplitude). Three classes of bandwidth
efficiency are evident: High (FQPSK-B and GMSK); Medium (8-PSK, QPSK/OQPSK, MSK,
PCM/PM/NRZ, and BPSK/NRZ); and Low (PCM/PM/Bi-φ, BPSK/Bi-φ).
All Phase 3 modulation bandwidth measurements are made using a Butterworth 3RD order
BTS= 2 filter. MSK has no filtering and GMSK curves are labeled with the Gaussian filter’s BTs
factor. FQPSK-B measurements are based on a proprietary filter in FQPSK-B modulation.
15.2 CONCLUSIONS
Conclusions fall into distinct categories relating to filtering methods, losses, modulation
types, and Spectrum Improvement Factors (SIFs). Each conclusion is summarized in the
subsections below.
15.2.1
Filtering Conclusions
Baseband filtering significantly reduces the transmitted RF spectrum’s width. Study
conclusions are:
144
•
•
•
•
•
Filtering of transmitted signals will be required to obtain an acceptably narrow RF
spectrum.
Hardware limitations make post PA filtering impractical at data rates below
about 8 Ms/s.
o Realizable Qs limit the filter’s bandwidth to about 1-2% of the transmitted
frequency.
o Filtering power losses may be unacceptable, even at a 1-2% bandwidth.
o For low data symbol rates, post PA filtering may make turnaround
ranging difficult.
Depending upon its architecture, transponder i.f. filtering may not be practical.
o Q limitations stated above apply if modulation occurs at the transmitting
frequency.
o Filtering at i.f. requires transponders be modified for each mission.
o Filtering at i.f. makes data rate changes difficult.
o For low data symbol rates, i.f. filtering may make turnaround ranging
difficult.
o Filtering within the transponder risks introducing spurious emissions
causing lock-up.
Baseband filtering is the only practical alternative to unacceptable post PA and
i.f. filtering.
o Baseband filtering can be accomplished with a simple, passive low-pass
filter design.
ƒ A 3RD order Butterworth filter (BTS = 2) provides the best
performance-simplicity ratio.
o Filtering prior to phase modulation produces undesirable spikes in the RF
spectrum.
ƒ Spikes can only be avoided by using a different modulation method
(GMSK, FQPSK).
Both GMSK and FQPSK-B utilize baseband filtering and do not require i.f. nor
post PA filters.
15.2.2
Loss Conclusions
Table above partitions losses into two categories: System (losses relative to ideal
BPSK) and Filtering (ISI and Mismatch). One criterion for the Phase 3 study was that
end-to-end losses should be reasonable. CCSDS determined that approximately 1 dB
was reasonable. The following conclusions regarding losses were reached:
• High system loss (1.5 dB) found for PCM/PM/NRZ, resulted from a 10% data
imbalance.
o When a BTS = 2 Butterworth filter is used, data imbalance should not
exceed 5%.
• 8-PSK modulation exhibits an excessive system loss (3.4 dB).
o Filtering losses decreased for non-constant envelope modulation.
ƒ However, spectrum width increased.
ƒ Losses were not reduced to an acceptable level.
o High losses make 8-PSK modulation unsuitable for power-limited
Category A missions.
• GMSK (BTS =0.5) also exhibited high (1.4 dB) system losses.
145
•
o Increasing filter bandwidth to BTS = 1 reduced system losses to an
acceptable level.
o Losses were measured with an ideal (lossless) receiver.
FQPSK-B losses were found to be a high 1.7 dB.
o Losses were also measured with an ideal (lossless) receiver.
15.2.3
Modulation Methods Conclusions
Figures above , graphically identify the preferred modulation methods. For the several
modulation methods considered, the following conclusions were reached.
• FQPSK-B provides the narrowest RF spectrum of all modulation methods
studied.
o FQPSK-B should be considered for all high and very high data rate
missions.
ƒ Provided that losses are acceptable.
• GMSK, with a filter bandwidth BTS = 0.5, produces virtually equivalent results to
FQPSK-B.
o Further work is required to validate system losses using real hardware.
• 8-PSK, with its high losses, does not appear useful for most Category A
missions.
o Excessive losses and modest performance gains do not provide sufficient
advantages.
• QPSK has comparatively poorer bandwidth efficiency than does FQPSK-B and
GMSK.
o Its common usage may dictate its consideration in some applications.
o Absent spread spectrum, QPSK cannot provide simultaneous telemetry
and ranging.
• OQPSK could not be evaluated properly with the UPM.
o OQPSK should be reserved for applications requiring separate,
independent data channels.
o Orthogonally phased BPSK/NRZ modulators, with a ½ symbol offset
should be used.
• BPSK/NRZ has poor bandwidth efficiency and should not be used if bandwidth is
important.
o Bandwidth efficiency is slightly lower than PCM/PM/NRZ modulation.
o BPSK/NRZ may be an alternative to PCM/PM/NRZ when:
ƒ A residual carrier is not required.
ƒ The data imbalance is so great that PCM/PM/NRZ would suffer
excessive losses.
• PCM/PM/NRZ has poor bandwidth efficiency, but has best efficiency of residual
carrier types.
o Applications requiring a residual carrier should consider this modulation
method.
o When using PCM/PM/NRZ, care must be taken to ensure proper data
balance.
• MSK modulation is not highly spectrum efficient.
146
•
•
o No specific advantages were found to MSK, save the lack of spectral
spikes.
Bi-φ modulation has very poor RF spectrum efficiency.
o Bi-φ modulation should not be used unless the symbol transition density is
too low.
o This conclusion applies to both PCM/PM/Bi-φ and BPSK/Bi-φ modulations.
Subcarrier modulation tends to waste spectrum and should be avoided
whenever possible.
o When used, the subcarrier frequency-to-data symbol rate ratio should be
low
o CCSDS virtual channels should be used to separate data types.
15.2.4
Spectrum Improvement Conclusions
The following conclusions were reached regarding RF spectrum efficiency improvement:
• Baseband filtering greatly increases the number of spacecraft operating in a
frequency band.
o Spectrum utilization efficiency can increase by a factor from 2 to more
than 100 times.
o The amount of improvement depends upon modulation method and
sideband attenuation.
o This result attains despite non-linear system elements, non-ideal data, and
spectral spikes.
• Modulation method should be selected to maximize the Spectrum Improvement
Factor.
o Modulation schemes with low Spectrum Improvement Factors should be
avoided.
• Modulation method selection should be based on system capabilities, data
rates, and SIFs.
15.3 RECOMMENDATIONS
Based upon the results of the Phase 3 Efficient Modulation Methods Study, the CCSDS
and SFCG are encouraged to create and adopt Recommendations specifying the
preferred modulation methods.
Because space missions have a broad range of objectives, communication
requirements will vary. Some grouping of applications is necessary before assigning a
modulation type.
15.3.1
Mission Classification
One method for grouping applications is by specific attributes. Missions sharing those
attributes are assigned a classification and a modulation method(s) most appropriate to
that group are selected.
Where RF spectrum and modulation types are of paramount concern, the
telemetry data symbol rate appears to be the best discriminator. The following
classifications are recommended:
147
15.3.1.1
Low Data Rate (10 s/s - 20 ks/s)
This class includes low rate scientific missions as well as the Telemetry, Tracking, and
Command (TT&C) services for most missions. Turnaround ranging may be required. If it
is, subcarrier modulation may be appropriate (see CCSDS Recommendation 401
(3.3.4) B-1). If ranging is not required, then any appropriate modulation type should be
acceptable. All mission types operating in the space services can be found in this class.
15.3.1.2
Modest Data Rate (20 ks/s - 200 ks/s)
Most Category A missions fall in this and the following classification. If space agencies
are serious about reducing RF spectrum requirements, they must use appropriate
filtering and modulation techniques for spacecraft in these classes. Typical missions
operate in the SpaceResearch service and include NASA’s ISTP Wind and ESA’s Integral
missions.
The recommended modulation method depends upon whether or not simultaneous
telemetry and turnaround ranging signals are required (see CCSDS Recommendation
401 (3.4.1) B-1). If they are, a residual carrier modulation method is suggested
because users can independently control the division of power between the carrier,
telemetry, and ranging channels.
PCM/PM/NRZ is the most bandwidth-efficient residual carrier modulation method
and is recommended provided that the telemetry data imbalance is less than 5%
during a time interval equal to one time-constant of the Earth station receiver’s
phase-locked-loop.
At low data symbol rates, care must be taken with PCM/PM/NRZ modulation to ensure
that the Earth station’s receiver can distinguish between the RF carrier and the spectral
components of the data sidebands. The spacecraft’s modulation index and the Earth
station receiver’s phaselocked-loop bandwidth should be adjusted to ensure proper
operation.
If simultaneous telemetry and turnaround ranging is required and the data imbalance is
greater than 5%, then Unbalanced QPSK (UQPSK) is the recommended modulation
type. Within limits, telemetry and ranging powers can be set independently. If
simultaneous telemetry and turnaround ranging is not required or where data imbalance
exceeds 5%, BPSK/NRZ is recommended.
15.3.1.3
Medium Data Rate (200 ks/s - 2 Ms/s)
As noted, most Category A scientific missions fall into this and the prior classification.
Generally, such spacecraft operate in the Space Research service allocation. Examples
include NASA’s Polar and ESA’s SOHO missions.
Because many of these missions are collecting scientific data, simultaneous turnaround
ranging is frequently required. In these cases, PCM/PM/NRZ modulation is
recommended, providing the telemetry data symbol imbalance does not exceed 5% in
one time-constant of the Earth station receiver’s phase-locked-loop. If data imbalance
exceeds 5%, then UQPSK can be used.
In this classification, data symbol rates can be as high as 2 Ms/s, so bandwidth
conservation is important. If simultaneous turnaround ranging is not required, then
QPSK modulation is recommended.
148
15.3.1.4
High Data Rate (2 Ms/s - 20 Ms/s)
Typically, missions with data symbol rates in this range operate in the Earth Exploration
Satellite service. Examples include NASA’s Lewis and the Canadian Space Agency’s
(CSA’s) Radarsat projects. In this and the following classification, RF spectrum
limiting becomes imperative.
Decreasing bandwidth utilization by a factor of 10 saves considerably more RF
spectrum when the data symbol rate is 20 Ms/s than in the case when it is 200 ks/s.
Both the CCSDS and SFCG should immediately adopt filtering and modulation
Recommendations for these last two classes.
From Figures above, and Table above, FQPSK-B or GMSK (BTS = 0.5) modulation are
the clear choices if RF spectrum conservation is important. Modulator modifications may
be required to provide turnaround ranging with either of these modulation types and the
ranging signal will have to be sequential, not simultaneous, with the telemetry data.
15.3.1.5
Very High Data Rate (20 Mb/s - and Above)
Missions with data symbol rates in this range operate almost exclusively in the Earth
Exploration Satellite service. Examples include NASA’s Earth Observation Satellite
(EOS) and ESA’s Earth Resources Satellite (ERS-1). Previous comments regarding
bandwidth conservation and modulation methods apply emphatically to this class.
FQPSK-B or GMSK (BTS = 0.5) are the recommended modulation methods.
The CCSDS and SFCG are urged to move with all dispatch to obtain the additional
system performance information for both FQPSK-B and GMSK modulation types. The
authors recommend that tests, using real hardware, be conducted in a carefully
controlled environment to validate these simulations and to measure actual system
performance. Recommendations, consistent with Table below, should be adopted at the
earliest possible opportunity.
figure 113: Recommended Modulation Methods for Category A Missions
149
GLOSSARY
ARX II A Research and Development Earth Station Receiver, (Prototype for DSN Block
V)
BER Bit-Error-Rate
Bi-φ Binary-Phase [Manchester] modulation
BL Receiver phase-locked-loop’s bandwidth, expressed in Hz
BPSK Bi-Phase Shift Keying [modulation method]
BTB Bandwidth • Time Product Based on Bit-Period
BTS Bandwidth • Time Product Based on Symbol-Period
Category A Space Mission whose distance from Earth is less than 2 • 106 km
CCSDS Consultative Committee for Space Data Systems
DSN Deep Space Network
DTTL Digital Transition Tracking Loop
ESA European Space Agency
ESOC ESA Operation Center (Darmstadt, Germany)
ESTEC ESA Technical Center (Noordwijk, The Netherlands)
FQPSK Feher QPSK [modulation method]
GMSK Gaussian Minimum Shift Keying
HP Hewlett Packard
Hz Hertz
k Kilo (1,000)
kb/s Kilo Bits per Second
kHz Kilo Hertz
ks/s Kilo Symbols Per Second
M Mega (1,000,000)
MHZ Mega Hertz
MAP Maximum A Posteriori
MODEM Modulation-Demodulation
MSK Minimum Shift Keying
NRZ Non Return to Zero [format]
OQPSK Offset QPSK [modulation method]
PA Power Amplifier
PCS Personal Communications System
PM Phase Modulation
PSK Phase Shift Keying
PT Total Power [transmitted]
QPSK Quadrature Phase Shift Keying [modulation method]
SAW Surface Acoustic Wave [Filter]
SER Symbol-Error-Rate
SFCG Space Frequency Coordination Group
SPW Cadence Design Systems Inc. Signal Processing Worksystem
SRRC Square Root Raised Cosine [Filter]
SSPA Solid State Power Amplifier
Subpanel 1E CCSDS group concerned with RF and Modulation standards
150
16 8PSK MODULATION (Example implemented in mobile
telephone network)
16.1 Introduction
After GPRS, the next step in improving the GSM system data rate is to change the
signal to a type that has greater bandwidth efficiency, i.e. more bits per second can be
supported per unit bandwidth. This is most economically implemented throughout the
existing GSM infrastructure when the new signal type has identical bandwidth
occupancy characteristics to the original 0.3-GMSK signal.
EDGE is a modulation scheme that is more bandwidth efficient than the Gaussian prefiltered minimum shift keying (GMSK) modulation scheme used in the GSM standard.
The technology defines a new physical layer of an 8-Phase-Shift-Keying modulation
(8PSK), instead of Gaussian-Minimum-Shift Keying (GMSK). 8PSK enables each
pulse to carry 3 bits of information per symbol versus GPRS/GMSK’s 1 bit per symbol
per pulse rate. Thus, it has the potential to increase the data rate of existing GSM
system by a factor of three. For this reason, it requires a hardware upgrade of the RF
part in the base stations and new mobile stations that support EDGE modulation.
A traditional 8PSK system uses raised-cosine filtering to remove Inter-symbol
Interference (ISI). Although ISI is eliminated by using raised-cosine filtering, (270
Ksymbol/s results in a channl bandwidth greater than 200 KHz) the 8PSK signal with
rised-cosine filtering does not fit within 200 KHz of bandwidth.
D( symbols / s ) =
2B
1+ r
for a raised cosine filtering
⇓
2 B = D( symbols / s ) ⋅ (1 + r ) = 270000 *1.22 ≅ 330 KHz
eq 256
where instead
2 B = 200 Khz for GSM e EGPRS
r = rolloff _ factor ≅ 0.22
In order to achieve the desired symbol rate using 200 KHz of bandwidth, a more
severe filtering approach is required.
8PSK-EDGE makes this trade-off, resulting in a conservation of bandwidth versus the
increase of ISI. This also necessitates a more complex design for the receiver.
151
In the EDGE modulation system the serial bit stream is converted into 3 bit words and
mapped to the 8PSK modulation using Gray encoding. The symbol are than rotated by
3π/8 radians to ensure that the envelope of the signals does not go to zero. Next, the
symbols are up-sampled and filtered using Linearized Gussian Filter (similar to, but
different than the method used for GSM). In this manner, the spectrum of 8PSK signal
can be restricted to 200 KHz. Linearized Gussian Filtering allows the 8PSK signal
spectrum to occupy the same bandwidth as a GPRS/GSM signals. It also introduces a
considerable ISI component.
EDGE provides nine different coding schemes and is possible to switch a connection
between different schemes. The choice of the coding scheme is dynamic and depends
on the Carrier to Interference ratio (C/I).
As the signal quality deteriorates, switches to a more robust coding scheme with lower
throughput are done.
User
data MCS1 MCS2 MCS3 MCS4 MCS5 MCS6 MCS7 MCS8 MCS9
Rate
( in Kbps)
1 Timeslot
8.4
11.2
14.8
16.8
22.4
29.6
44.8
54.4
59.2
table 4
In this chapter the focus is on generating the EDGE signal, which unlike GMSK, has a
time-varying envelope which exposes in turns the signal to AM-PM distortion.
For simulations of EDGE I,Q signals we have been using a software program (winiq
downloadable by Internet on www.rohde-schwarz.com )
152
16.2 EDGE signal description: Modulating Symbol Rate and Symbol
Mapping
Coding, modulation, and filtering of EDGE signal, which is 3π/8-shifted 8-PSK, is
shown in figure below.
We assume rectangular-shaped input data pulses.
S
Bit
Input
source
dk=[0,1]
Group
into
3-bit
triplets
GRAY
Code
encoding
Cn
n
= e
j
2πC
IQ
generator
8
n
R
n
Rn
Sn
Cn =[0.1,2,3,4,5,6,7]
e
j
= S
n
j 3π n
8
e
Modulator IQ
i(t)
Complex
QAM
modulator
Filter
quadrature q(t)
S(t)
y(t)
3π ⋅n
8
Carrier fc
modulator
i(t)
y(t)
+
-90°
S(t)
Σ
-
q(t)
sin(ωct)
carrier
Figure 114
The bit source generates bits dk at a rate of fb=812.5 Kbps. Each group of 3 bits is
Gray-coded into an octal-valued symbol cn=[0,1,2,3,4,5,6,7] (see table below). This
symbols are produced at rate fs= fb/3=270.833 Ksps, which is identical to the GSM
symbol rate.
Table 1. Gray-coding of binary bit triplets into ocatal symbols
d1, d2, d3
0,0,0 0,0,1 0,1,0 0,1,1 1,0,0 1,0,1 1,1,0 1,1,1
cn
3
4
2
1
6
5
7
0
table 5
153
Index n in cn, is the n-th step used to send a symbol, for example we can decide to
send the same symbol for n-consecutive times.
The octal-valued symbols cn are used to phase modulate a carrier, yielding an
8-PSK-EDGE waveform sequence Sn :
S
= A e
n
c
j
2π C
8
n
= A cos
c
2π C n
2π C n
+ j A sin
= I + jQ
c
8
8
eq 257
where Ac is the amplitude, here set to one as an example.
The above formulation of Sn is also called I,Q, form of the base-band binary
signal. Values and vector module of Sn for n=0..7 are listed below. Note that each
constellation point is on unitary circle (i.e. the Sn vector module is always unitary).
= e
j 2 π ⋅0
8
= cos 0
+ j sin 0 = 1 + j 0
= e
j 2 π ⋅1
8
= cos
+ j sin
= e
j 2 π ⋅2
8
= cos
= e
j 2 π ⋅3
8
= cos
= e
j 2 π ⋅4
8
= cos
= e
j 2 π ⋅5
8
= cos
= e
j 2 π ⋅6
8
= cos
S7 = e
j 2 π ⋅7
8
= cos
S
S
S
S
S
S
S
0
1
2
3
4
5
6
π
4
π
2
+ j sin
π
4
≅ 0.7 + j 0.7
π
2
≅ 0 + j1
⇒ S
⇒ S
0
1
⇒ S
2
=1
=1
=1
3π
3π
+ j sin
≅ -0.7 + j 0.7 ⇒ S = 1
3
4
4
π + j sin π ≅ − 1 + j 0
⇒ S
5π
5π
+ j sin
≅ -0.7 - j 0.7
4
4
⇒ S
3π
3π
+ j sin
≅ 0 - j1
2
2
⇒ S
5π
5π
+ j sin
≅ 0.7 − j 0.7
4
4
⇒ S
4
5
6
7
=1
=1
=1
=1
eq 258
154
The baseband unfiltered 8PSK vector constellation implementation on the imaginary
unitary plane is shown in figure below:
Imaginary Part (Q)
S2= (010)
ϕ (S 2 ) = π 2
S3= (000)
S1= (011)
Q=0.7
ϕ (S1 ) = π 4
S0= (111)
S4= (001)
I=0.7
ϕ (S 0 ) = 0
Real Part (I)
S7= (110)
S5= (101)
S6= (100)
Figure 115
Figure below shows the i(t),q(t) signal time variation for an unfiltered 8PSK
modulation, when a sequence of 8 symbols, see table 1, is used as a single ordinate,
binary input data stream. To each single couple i(t),q(t), corresponds one and only one
point on the unitary imaginary plane, as showed above.
155
Figure 116
Figure below shows corresponding vector amplitude and phase time variation.
Note that in case of unfiltered constellation, the vector amplitude is constant. This is not
true when a complex filter is used, since amplitude modulation AM is introduced .
Figure 117
156
Figure below shows the corresponding vector constellation for unfiltered implementation.
S2(010)
S3(000)
S1(011)
S0(111)
S4(001)
S5(101)
S6(100)
Figure 118
To study either the spectrum or the vector constellation of an unfiltered 8PSK
configuration, we can use a pseudorandom PRBS9 as a binary input sequence data. If
the length of the symbols sequence chosen for winiq software program is for example
greeter than 1000, than the screen output will be as reported below:
Figure 119
157
In so doing we should keep in mind that in ideal case of unfiltered signals there is
no phase jitters, Hence each single constellation point remains easily selectable by the
receiver.
Another observation is that vectors constellation does go through origin. This is
the main problem since signal filtering introduces an Amplitude Modulation, and
hence, also a greeter sensitivity at low C/I with respect to GMSK modulation.
Figure below reports the relative FFT magnitude for unfiltered case we have
showed so far, note the great sidelobes that are a consequence of rectangular data
pulses.
≅13dB
Figure 120
What analyzed so far is an 8 PSK standard unfiltered constellation, in which each
of 8 constellation points is uniquely identified with a particular symbol value.
16.3 Symbol Rotation
In 8PSK-EDGE modulation, in order to ensure that the envelope of the signal
does not go instantaneously close to zero and hence to reduce AM phenomena due to
filtering action, the 8PSK symbols are continuously rotated with 3π/8 radians per
symbol before pulse shaping (i.e. each phase modulated symbol is additionally phase
shifted by 3π/8 radians per symbol).
The cumulatively phase shift (CPS) sample sequence Rn is:
Rn = S n ⋅ e
j
3π n
8
=e
j
2π C n
8
e
j
3π n
8
=e
j
π
8
( 2C n +3n )
= an + jbn
eq 259
If symbol Sn varies from 0 to 7 than the corresponding Rn shifted symbols are:
158
R
R
R
R
R
R
R
R
0
1
2
3
4
5
6
7
( ) = cos 0 +
jπ 0
= e 8
(
j sin 0 = 1 + j 0
⇒ R
)
jπ 2 + 3
= e 8
= cos
=
=
=
=
=
=
5π
5π
+ j sin
≅ - 0 . 38 + j 0.92
8
8
j π (4 + 6 )
10 π
10 π
+ j sin
≅ − 0.71 - j 0 . 71
= cos
e 8
8
8
j π (6 + 9 )
15 π
15 π
+ j sin
≅ 0.92 − j 0 . 38
= cos
e 8
8
8
j π (8 + 12 )
20 π
20 π
+ j sin
≅ 0 + j1
= cos
e 8
8
8
j π (10 + 15 )
25 π
25 π
+ j sin
≅ − 0 . 92 − j 0.38
= cos
e 8
8
8
j π (12 + 18 )
30 π
30 π
+ j sin
≅ 0.71 − j 0.71
= cos
e 8
8
8
j π (14 + 21 )
35 π
35 π
= cos
+ j sin
≅ 0.38 + j 0 . 92
e 8
8
8
⇒ R
0
=1
1
⇒ R
⇒ R
⇒ R
⇒ R
⇒ R
⇒ R
=1
2
3
4
5
6
7
=1
=1
=1
=1
=1
=1
eq 260
Table below reports Rn and the corresponding angle α. Note that the difference:
Rn- Rn-1 between two consecutive vector constellation point is always 112.5°
Rn
Rn- Rn-1
angle
R0
0
R1
112.5
112.5
R2
225
112.5
R3
337.5
112.5
R4
450
112.5
R5
562.5
112.5
R6
R7
675
112.5
787.5
112.5
0
table 6
The corresponding unfiltered vector implementation on the imaginary unitary plane is
shown below
159
Imaginary Part (Q)
R1=011
R4=001
R7=110
112.5°
112.5°
112.5° 112.5°
R0=111
112.5°
Real Part (I)
112.5°
R5=101
R3=000
112.5°
R6=100
R2=010
Figure 121
Imaginary Part (Q)
Rn=4--001
Rn=1--011
Rn=7--110
Rn=0--111
Real Part (I)
Rn=5--101
Rn=3--000
Rn=2-010
Rn=6--100
Figure 122
160
Transmitting at each time step n the same symbol we note that the relative position on
the constellation plane is continually rotated by 67.5°
67.5°
figure 123
Note that with symbol rotation we have no longer 8 constellation point but 16.
8PSK + shift (CPS)
8PSK
Fixed position
Shift
position
figure 124
161
Figure below shows i(t), q(t) signals time variation for an 3π/8 shifted 8PSKEDGE unfiltered modulating input signals when a single ordinate sequence of 8 symbols
(0,1,2,3,4,5,6,7), is used as a binary input data stream.
Figure 125
Figure below shows the corresponding vector amplitude and phase time variation. Note
that in case of unfiltered constellation, the vector amplitude is constant. This is not
true when a complex filter is used.
Figure 126
162
To study either the spectrum or the vector constellation of an unfiltered π/8 shifted
8PSK-EDGE configuration, we can use a pseudorandom PRBS9 as a binary input
sequence data.
If the length of the symbols sequence chosen for winiq software program is for
example greeter than 1000, than the screen output will be as reported below:
π/8 shifted 8PSK-EDGE
8PSK
Zero
Figure 127
As shown in figure above, the EDGE signal has a non-zero minimum magnitude when
3π/8 radiant rotation is used, therefore this phase rotation assures that the signal
envelope never goes to zero.
Without the CPS operation, the vectors constellation goes through origin.
Figure below reports the relative FFT magnitude, note that in case of unfiltered
signals there is no spectrum difference with a standard 8PSK. This is because the
points of constellation in 8PSK EDGE are only shifted by 3π/8 radiants.
163
≅13dB
Figure 128
For a non shifted standard 8PSK, we can try to explain passages of the vector through
the origin on the constellation imaginary plane.
For example, if we consider a pseudorandom PRBS9 as a binary input data sequence
and if we focusing our attention around a few random points transition, it is possible to
observe that some times, vectors i(t),q(t) have a contemporary passage through origin.
Figure 129
In order to switch from one constellation point to another opposite constellation point,
the corresponding i(t),q(t) resulting vector, has to pass through the origin. By doing
so, the amplitude of i(t),q(t) resulting vector goes to zero. Defining the envelope
dynamic range as the ratio between maximum and minimum envelope values, we note
that without CPS, the signal envelope goes to zero and the envelope dynamic range
becomes infinite.
164
16.4 (8PSK EDGE) modulation AM distortion
For unfiltered rectangular-shaped data pulses, as we have seen, the amplitude of
envelope of the 8PSK and 8PSK_EDGE signal is constant. That is, there is no AM on
the signal even for a 180° phase shift (for a non shifted 3π/8 radiant vector constellation,
since the data switches value say, from +1 to -1,instantaneously). We might wonder why
baseband filtering signal is then necessary?
The rectangular-shaped data produces a (sin(x) / x)^2 type power spectrum for a
signal that has large undesirable spectral sidelobes. The absolute bandwidth of
rectangular multilevel pulses is therefore infinity !
Because we never have an infinite bandwidth, we must use a filtering system in order to
reduce the bandwidth, but when this pulses are filtered improperly they will spread in
time, the pulse for each symbol may be smeared into adjacent time slot causing
intersymbol interference (ISI). One way to obtain an ISI reduction is by using a raised
cosine rolloff filter.
At the same time, when a phase transition occurs, the filtering operation causes an
amplitude modulation (AM), the larger the phase transition, the greater the amplitude
modulation.
These AM effects can be reduced with 3π/8 offset 8PSK in which we never have the
deep π phase shift transition.
Summarizing, we encounter two types of problems:
16.4.1
First problem (ISI):
Although ISI is eliminated using raised-cosine filter, a 200 KHz channel spacing
results in a symbol rate less than 200 KSymbol/s. The 8PSK EDGE signal with
rised-cosine filtering does not fit within 200 KHz of bandwidth, for example using
a raised cosine rolloff filter we could have:
D( symbols / s ) =
2B
for a raised cosine rolloff filter.
1+ r
eq 261
2 B = 200 Khz for GSM and EGPRS
r = rolloff _ factor
If r=0.22, the symbols would be only D=200000/1.22= 163.934,4 (Simbols/s)
which is less than 270.833 Ksymbol/s required for EDGE
In order to achieve the desired symbol rate, 270.833 Ks/s and constrain the
bandwidth of the output signal so that it remains below (or nearly below) the
transmit mask defined for EDGE (200 KHz GSM channel bandwidth) a more
severe filtering approach is required
165
The transmit filter used is a Linearized Gussian Filter (similar to, but different
than the method used for GSM).
In this manner, the spectrum of 8PSK signal can be restricted to 200 KHz and
the symbols filtering allow the 8PSK signal spectrum to occupy the same
bandwidth as a GPRS/GSM signals. In the same time it also introduces a
considerable ISI component.
Because of the severe ISI introduced by the linearized Gussian Filters, the
receiver includes an equalizer, and the Signal-to-Noise Ratio on Co-channel
interference of about C/N ≥ 18 dB is quite high if compared to a GMSK
modulation where C/N ≥ 9 dB
Since the EDGE transmit mask is nearly identical to the GSM transmit mask,
the EDGE signal succeeds in tripling the data throughput within the standard
GSM channel.
16.4.2
Second problem (AM):
Filtering produces Amplitude Modulation AM on the resulting EDGE signal
because the filtered data waveform cannot change instantaneously from one
peak to another, especially if 180° phase transitions occur as in a simple
8PSK modulation.
Although filtering solves the problem of poor spectral sidelobes, it creates
another: AM on the EDGE signal.
AM has several consequences:
•
•
•
8PSK EDGE constellations points are no longer on the unitary circle so
amplitude jitter experienced by resulting vector occur in a more C/I
sensitivity at receiver user side;
Because (for the reason above), when EDGE modulation is used, the
mean output transmitted power is lower compared to GSM modulation
(about 2 dB). Than if BCCH (broadcast control channel) carrier is used for
EDGE the cell-reselection-algorithm could experiences a fault.
Due to AM, low-efficiency, linear (class A or class B) amplifiers, instead
of high-efficiency non linear (class C) amplifiers, are required for the
8PSK signal without distortion. In portable communication applications,
these amplifiers increase the battery capacity requirements.
These AM effects can be reduced with 3π/8 offset 8PSK in which we never have
the π phase shift transition.
166
16.5 Used Gaussian EDGE Filter
The complex sequence Rn is next passed through a low-pass filter to produce the
filtered complex signal.
x(t ) = ∑ Rn ⋅ p(t − nT )
eq 262
n
where T=1/fs is the symbol interval, and p(t) is the filter pulse shape. We can rewrite in
the alternative form:
x(t ) = I (t ) + jQ (t ) = ∑ an ⋅ p(t − nT ) + j ∑ bn ⋅ p(t − nT )
n
eq 263
n
with real symbol an, bn and real pulse p(t), for two real filtered signals I(t) and O(t). Each
real filtered signals can be visualized as the output of a linear time-invariant (LTI) filter
driven by a stream of impulse scaled by an, (or bn), yielding a linear superposition of
scaled time-shifted pulses p(t).
The exact filter pulses shape p(t) defined for EDGE signal is non-zero over the interval
-5(T/2) ≤ t ≤ 5(T/2),
⎛ 5 ⎞
p ( t ) = c0 ⎜ t + T ⎟
⎝ 2 ⎠
eq 264
where c0 is the principal pulse in the Laurent decomposition of the 0.3-GMSK
modulation,
⎧ 3
f (t + iT )
⎪
c0 (t ) = ⎨∏
i =0
⎪⎩
0
⎫
0 ≤ t ≤ 5T ⎪
⎬
elsewhere ⎪⎭
eq 265
167
⎧ ⎛ t
⎞
⎪sin⎜⎜ π ∫ g (u )du ⎟⎟
⎠
⎪ ⎝ 0
⎪⎪ ⎛ t −4T
⎞
f (t ) = ⎨cos⎜⎜ π ∫ g (u )du ⎟⎟
⎠
⎪ ⎝ 0
⎪
0
⎪
⎪⎩
⎫
0 ≤ t ≤ 4T ⎪
⎪
⎪⎪
4T ≤ t ≤ 8T ⎬
⎪
elsewhere ⎪
⎪
⎪⎭
eq 266
The integrand g(t) is defined in terms of the frequency pulse in gGMSK(t) by
g (t ) =
1
g GMSK (t − 2T )
2
g GMSK (t ) =
Q (t ) =
eq 267
⎞ ⎞⎤
⎛
⎛ t − 5T / 2 ⎞ ⎞ ⎛
1 ⎡ ⎛⎜
⎟ ⎟ − q⎜ 2π ⋅ 0.3⎜ t − 3T / 2 ⎟ ⎟⎥
⎢Q 2π ⋅ 0.3⎜⎜
⎜ T ln( 2) ⎟ ⎟
⎟⎟ ⎜
2T ⎢ ⎜⎝
⎠ ⎠⎥⎦
⎝
⎝ T ln( 2) ⎠ ⎠ ⎝
⎣
1
2π
∞
∫e
r2
−
2
eq 268
dτ
t
The combination of expressions above is defined as the filter pulse shape.
Following, the base band signal is:
y (t ' ) = ∑ Rn ⋅ c0 (t '−nT + 2T )
eq 269
n
The time reference t’=0 is the starting of the active part of burst as shown figure this is
also the start of the symbol period of symbol 0 (containing the first tail bit)
168
9 tail bits
9 tail bits
111 111 111.......
.......111 111 111
Output phase
The useful part
1/2 symbol
1/2 symbol
The active part
figure above show Relation between active part of burst and tail bits. For the normal
burst the useful part lasts for 147 modulating symbols. Before the first bit of the bursts
as defined in GSM 05.02 [3] enters the modulator, the state of the modulator is
undefined. Also, after the last bit of the burst, the state of the modulator is undefined.
The tail bits (see GSM 05.02) define the start and the stop of the active and the useful
part of the burst as illustrated in figure above. Nothing is specified about the actual
phase of the modulator output signal outside the useful part of the burst.
169
16.6 Effect due to Gaussian EDGE filtering in 3π/8 shifted 8PSK
Figure below shows i(t),q(t) baseband time variation and the output modulated r(t)
signal, when a single ordinate sequence of 8 symbols, is used as a binary input data
stream.
No Gaussian edge filter
Gaussian EDGE filter
I
I
Q
Q
r
r
Ф
Amplitude
modulation
Ф
(AM)
Figure 130
Figure above shows the corresponding amplitude vector and phase time variation
for Gaussian EDGE filtered signals. Note that in case of an unfiltered constellation,
the vector’s amplitude is constant, this is not true when a complex filter is used having
Amplitude Modulation AM.
Using a PBR9 input data stream, we can evaluate The spectrum:
170
Gaussian EDGE filter
No Gaussian EDGE filter
Amplitude
of modulated
signal
Phase
of modulated
signal
Bandwidth
of modulated
signal
figure 131
Focusing out attention at the transmitter output, we can se haw the baseband signal
filtering produces ISI.
Obviously the same filter applied at the receiver side reduces these phenomena.
171
Gaussian EDGE filter
No Gaussian EDGE filter
Gaussian EDGE filter cause:
Amplitude and phase Jitter
Increasing ISI
figure 132
172
16.7 Modulation
Let us indicate the frequency carrier fc. Follows that the QAM modulation is:
(
)
s (t ) = Re y (t ) ⋅ e jωct = Re( y (t ) ⋅ (cos ωc t + j sin ωc t ))
eq 270
because y(t)=i(t)+jq(t) than the real part of output modulated signal becomes:
(
)
s (t ) = Re y (t ) ⋅ e jωct = Re((i (t ) + jq (t ) ) ⋅ (cos ωc t + j sin ωct )) =
= Re(i (t ) cos ωc t + ji (t ) sin ωct + jq (t ) cos ωct − q (t ) sin ωc t ) =
eq 271
s (t ) = i (t ) cos ωct − q (t ) sin ωct
using the filtering equation already seen before for a single burst:
y (t ' ) = ∑ Rn ⋅ c0 (t '−nT + 2T )
eq 272
n
the modulated RF carrier during the useful part of the burst became:
s (t ' ) =
[
2 Es
Re y (t ' ) ⋅ e j (2πf ct ' +ϕ0 )
T
]
eq 273
where Es is the energy per modulating symbol, fc is the center frequency and φ0 is a
random phase and is constant during one burst (see TS 05.04).
16.8 Conclusion
The 3π/8 shifted 8PSK-EDGE signals succeeds in it’s primary goals of tripling the onair data rate while maintaining nearly the same spectral occupancy as the original GSM
signal. The 3π/8 shift assures that the signal envelope never falls below a certain level.
Nonetheless, this signal has a significant envelope variation, which exposes the signal
to AM-PM distortion impairments that don’t degrade the signal quality of GMSK.
173
17 EFFICIENT MODULATION METHODS STUDY AT NASA/JPL
17.1 PHASE SHIFT KEYED (8-PSK) MODULATION
8-PSK modulation is not currently used by CCSDS Space Agencies.
Inserting a filter in the modulator further degrades system performance because nonorthogonality increases crosstalk between phase states.
17.2 PSK Modulation Bit-Error-Rate (BER)
Losses are evident in Figure below showing the Bit-Error-Rate performance for 8-PSK
modulation. Relative to ideal BPSK/NRZ modulation, even an ideal (lossless) 8-PSK
system imposes heavy performance penalties. Ideal 8-PSK requires an EB / N0 of 9.5 10 dB to attain a BER = 1 x 10-3
When a Butterworth BTS = 3 filter is added, the required EB / N0 rises to 11.5 dB.
Compared to the EB / N0 of about 8 dB, needed for a filtered non-ideal QPSK system at
the same BER, it is clear that 8-PSK is not a useful modulation method in power limited
applications. Losses using a Square Root Raised Cosine (r = 1) filter were so great that
the plot is not even included in this report.
Excessive losses result from the non-orthogonal relationship between phase states.
This simulation shows that inherent 8-PSK modulation losses are unlikely to be
acceptable in most applications, even without filtering.
174
figure 133: 8-PSK modulation Bit Error Rate
17.3 8-PSK Modulation Spectra
Not with
standing the system losses, spectrum advantages of simultaneously
transmitting three data bits is clearly evident in Figure below 8-PSK modulation with a
Butterworth filter having a BTS = 2. A BTS =2 was used for consistency with studies of
the other modulation types. Figure below also demonstrates that filtering will be needed.
The unfiltered spectrum (top) is very similar to that for unfiltered QPSK. 8-PSK provides
a 1.8 dB improvement in data rate over QPSK and the spectral improvement appears to
be on the same order.
175
figure 134
176
17.4 PSK Modulation Power Containment
Power Containment curves, Figure below show the occupied bandwidth to be about 2.4
RB when using a Butterworth BTS = 2 filter. This bandwidth will increase with a BTS = 3
filter which is required to avoid the additional 1 dB loss.
figure 135
17.5 PSK Modulation Study Conclusions
Results of this study show 8-PSK modulation to be of little value for most space
telemetry data transmissions. While 8-PSK does provide a marginally narrower
spectrum, system losses make the modulation type unsuitable for most Category A
missions. 8-PSK modulation may be attractive in strong signal applications where
system losses are of little importance.
177
18 MINIMUM-SHIFT KEYNG (MSK) AND GMSK
MSK has the advantages of producing a constant-amplitude signal and, consequently,
can be amplified with Class C amplifiers without distortion. As we will see, MSK is
equivalent to OQPSK with sinusoidal pulse shaping [for hi(t)].
Definition: Minimum-shift keying (MSK) is a continuous-phase FSK with a minimum
modulation index (h=0.5) that will produce orthogonal signalling.
First, let us shown that h=0.5 is the minimum index allowed for orthogonal
continuous-phase FSK.
For the binary 1 to be transmitted over the bit interval 0<t<Tb, the FSK signal would be :
s1 (t ) = Ac cos(ω1t + θ1 )
eq 274
and for 0 to be transmitted the FSK signal would be
s2 (t ) = Ac cos(ω2t + θ 2 )
eq 275
where θ1=θ2 for the continuous phase condition at the switching time t=0.
For orthogonal signaling, we require the integral of the product of the two signals over
the bit period 2Tb to be zero. Thus, we require:
2Tb
∫ s (t )s
1
2Tb
2
(t )dt =
0
2Tb
=
∫
0
∫A
2
c
cos(ω1t + θ1 ) cos(ω 2 t + θ 2 )dt =0
i.e.
0
1
⎤
⎡1
Ac2 ⎢ cos[(ω1 + ω 2 )t + (θ1 + θ 2 )] + cos[(ω1 − ω 2 )t + (θ1 − θ 2 )]⎥ dt =
2
⎦
⎣2
⎡ 1 (ω1 + ω 2 )
⎤
1 (ω1 − ω 2 )
cos[(ω1 + ω 2 )t + (θ1 + θ 2 )] +
cos[(ω1 − ω 2 )t + (θ1 − θ 2 )]⎥ dt =
Ac2 ⎢
2 (ω1 − ω 2 )
⎣ 2 (ω1 + ω 2 )
⎦
0
2Tb
2Tb
⎡ 1 (ω1 + ω 2 )
⎤
⎡ 1 (ω1 − ω 2 )
⎤
cos[(ω1 + ω 2 )t + (θ1 + θ 2 )]⎥ dt + ∫ Ac2 ⎢
cos[(ω1 − ω 2 )t + (θ1 − θ 2 )]⎥ dt =
= ∫ Ac2 ⎢
⎣ 2 (ω1 + ω 2 )
⎦
⎣ 2 (ω1 − ω 2 )
⎦
0
0
2Tb
=
∫
= Ac2
+ Ac2
1
(ω1 + ω 2 )
1
(ω1 − ω 2 )
2Tb
⎡
∫ ⎢⎣(ω
1
0
2Tb
∫
0
1
⎤
+ ω 2 ) cos[(ω1 + ω 2 )t + (θ1 + θ 2 )]⎥ dt +
2
⎦
1
⎤
⎡
Ac2 ⎢(ω1 − ω 2 ) cos[(ω1 − ω 2 )t + (θ1 − θ 2 )]⎥ dt =
2
⎦
⎣
2Tb
2Tb
1
1
⎡1
⎤
⎡1
⎤
sin[(ω1 + ω 2 )t + (θ1 + θ 2 )]⎥ + Ac2
sin[(ω1 − ω 2 )t + (θ1 − θ 2 )]⎥ = 0
=A
⎢
⎢
(ω1 + ω 2 ) ⎣ 2
(ω1 − ω 2 ) ⎣ 2
⎦0
⎦0
2
c
178
2Tb
∫ s (t )s
1
2
(t )dt = Ac2
0
1
1
⎡1
⎤
sin[(ω1 + ω 2 )2Tb + (θ1 + θ 2 )] − sin[(θ1 + θ 2 )]⎥ +
⎢
(ω1 + ω 2 ) ⎣ 2
2
⎦
1
1
⎤
⎡1
sin[(ω1 − ω 2 )2Tb + (θ1 − θ 2 )] − sin[(θ1 − θ 2 )]⎥ = 0
+A
⎢
(ω1 − ω 2 ) ⎣ 2
2
⎦
eq 276
2
c
The first term is negligible, because (ω1+ω2) is large, so the requirements reduces to
2Tb
∫ s1 (t )s2 (t )dt =
0
Ac2 ⎡ sin[2(ω1 − ω 2 )Tb + (θ1 − θ 2 )] − sin[(θ1 − θ 2 )]⎤
⎢
⎥=0
ω1 − ω 2
2 ⎣
⎦
eq 277
for the continuous phase case the phase must be θ1=θ2; and the equation above is
satisfied (i.e. equal to zero) for a minimum value h=0.5 .
in fact sin[2(ω1 − ω 2 )Tb + (θ1 − θ 2 )] − sin[(θ1 − θ 2 )] = 0 is verified when
⇒ sin[π + (θ1 − θ 2 )] − sin[(θ1 − θ 2 )] = 0 when
2(ω1 − ω 2 )Tb = π
but
2(ω1 − ω 2 )Tb = π
⇒ 2 ⋅ 2π ( f1 − f 2 )Tb = π ⇒ 2 ( f1 − f 2 )Tb =
θ1 = θ 2
1
1
⇒ h=
2
2
Therefore calling the modulation index h as:
h = 2( f1 − f 2 )Tb = 2(∆f )Tb =
h = 1/ 2
2( f1 − f 2 )Tb =
2∆ϑ
π
2(ω1 − ω 2 )Tb ∆ω ⋅ Tb 2∆θ
=
=
π
π
2π
1
2
1
=
2
⇒
⇒
∆f = ( f1 − f 2 ) =
2∆ϑ =
1
4Tb
π
then when
eq 278
2
i.e. the peak to peak phase variation is 90° while the peak to peak frequency shift is ¼
Tb.
Now we will demonstrate that MSK signal is also a form OQPSK with sinusoidal pulse
shaping. First, consider the FSK signal over the signalling interval (0,Tb). Then using
equation:
s (t ) = Re[ g (t )e jωct ]
eq 279
the complex envelope is:
179
t
g (t ) = Ac e jθ ( t ) = Ac e
∫
j 2π ∆f m ( λ ) dλ
0
eq 280
where m(t)=±1, and
envelope became:
g (t ) = Ac e
jθ ( t )
= Ac e
0<t<Tb , therefore using h=0.5 and ∆f=1/4Tb the complex
± j 2π ∆f ⋅t
= Ac e
± j 2π
1
t
4Tb
= Ac e
±j
π t
2 Tb
eq 281
where the ± signs denote the possible data during the (0,Tb) interval. Thus,
g (t ) = Ac e jθ (t ) = Ac e
±j
πt
2Tb
⎡ ⎛ πt ⎞
⎛ π t ⎞⎤
⎟⎟ ± j sin ⎜⎜
⎟⎟⎥ = x(t ) ± jy (t ),
= Ac ⎢cos⎜⎜
⎝ 2Tb ⎠⎦
⎣ ⎝ 2Tb ⎠
0 < t < Tb
eq 282
and the MSK signal is therefore
⎡ ⎛ πt
s (t ) = Re[ g (t )e jωct ] = x(t ) cos ω c t − y (t ) sin ω c t = ⎢cos⎜⎜
⎣ ⎝ 2Tb
⎡ ⎛ πt
⎞⎤
⎟⎟⎥ cos ω c t m ⎢sin⎜⎜
⎠⎦
⎣ ⎝ 2Tb
⎞⎤
⎟⎟⎥ sin ω c t eq 283
⎠⎦
This type of FSK modulation with modulation index h=0.5 is a form of orthogonal FSK
with minimum bandwidth required, called MSK (Minimum Shift Keying). This type of
modulation is also a particular case of CPM (Continuous Phase Modulation).
In CPM techniques the phase is slowly varied in each symbol interval starting from the
phase value assumed in the preceding symbol interval. Consequently are also called
modulation technique with memory.
Since a frequency shift produces an advancing or a retarding in phase, frequency shifts
can be detected by sampling phase at each symbol period. Phase shifts of (2N + 1)π/2
radians are easily detected with an I/Q demodulator.
At even numbered symbols, the polarity of the I channel conveys the transmitted data,
while at odd numbered symbols the polarity of the Q channel conveys the data. This
orthogonally between I and Q simplifies detection algorithms and hence reduces power
consumption in a mobile receiver. The minimum frequency shift which yields
orthogonality of I and Q is that which results in a phase shift of ± π/2 radians per symbol
(90 degrees per symbol). FSK
The binary data of m(t) alternatively modulate the x(t) and y(t) components, and the
pulse shape for the x(t) and y(t) symbols( which are 2Tb wide instead of Tb) is a
sinusoid. Thus MSK is equivalent to OQPSK with sinusoidal pulse shaping.
180
FSK and MSK produce constant envelope carrier signals, which have no amplitude
variations. This is a desirable characteristic for improving the power efficiency of
transmitters. Amplitude variations can exercise nonlinearities in an amplifier’s amplitudetransfer function, generating spectral regrowth, a component of adjacent channel power.
Therefore, more efficient amplifiers (which tend to be less linear) can be used with
constant-envelope signals, reducing power consumption.
MSK has a narrower spectrum than wider deviation forms of FSK. The width of the spectrum is
also influenced by the waveforms causing the frequency shift. If those waveforms have fast
transitions or a high slew rate, then the spectrum of the transmitter will be broad. In practice,
these Waveforms are filtered with a Gaussian filter, resulting in a narrow spectrum. In addition,
the Gaussian filter has no time-domain overshoot, which would broaden the spectrum by
increasing the peak deviation.
MSK with a Gaussian filter is termed GMSK (Gaussian MSK).
An MSK modulator scheme is reported in figure below:
dI
Sinusoid
filter
I
Baseband
processing
modulator f=fc
X
cos(fc)
Delay
dQ
Cosinusoid Q
filter
+
MSK
X
sen(fc)
In OQPSK the rectangular pulse modulates the carrier directly:
modulator f=fc
dI
I
Baseband
processing
X
cos(fc)
Delay
dQ
Q
+
OQPSK
X
sen(fc)
figure 136
A block scheme of MSK modulator is reported below
181
Baseband
x data
Oscillator
f0=∆f=1/4R
m(t)
input
x(t)
X
X
Carrier
oscillator
fc
cos(πt/2Tb)
Serial-toparallel
converter
(2bit)
Accos(ωct)
+
-90°
phase
shift
-90°
phase
shift
Sync
input
sin(πt/2Tb)
y data
X
s(t)
MSK
signal
Acsin(ωct)
y(t)
X
figure 137: parallel generation of MSK
In order to make the difference between FSK and MSK we are going to show an
example for CPM using a Trellis phase transitions representation where phase
transitions permitted are only of 90°.
Particularly a phase shift of +90 degrees represents a data bit equal to “1”, while –90
degrees represents a “-1(or 0 in a binary form)”.
Because CPM can be represented also as an OQPSK modulation and, an MSK as a
pre-filtered OQPSK, by now on will call the two modulation types using the quadrature
meaning title.
Supposing an input NRZ data format, then one possible Trellis phase representation
could be the following:
182
+1
NRZ
data
2π
t
-1
3/2π
π
Sharp slope
variation
(discontinuity)
π/2
0
-π/2
-π
-3/2π
-2π
2Tb
4Tb
6Tb
8Tb
10Tb 12Tb
t
MSK
phase
+1 Tx
t
2Tb
4Tb
6Tb
8Tb 10Tb 12Tb
-1 Tx
figure 138: Trellis tree phase representation for a CPM
Although there are only π/2 phase shift, these discontinuity on the phase transitions
requiring a large bandwidth. In order to limit this bandwidth a filtering method is needed.
Anyway this filtering method introduce ISI.
OQPSK no filtered
OQPSK filtered
Phase
transition
rounded
It does not a shift phase
figure 139
183
The main difference between MSK and OQPSK is the sinusoidal pre-filtering method
used into MSK:
OQPSK
MSK
s (t ) = d I (t ) cos(2πfct ) + d Q (t ) sin( 2πfct )
eq 284
⎡π t ⎤
⎡π t ⎤
s (t ) = d I (t ) cos ⎢
⎥ sin( 2πfct )
⎥ cos(2πfct ) + d Q (t ) sin ⎢
⎣ 2 Tb ⎦
⎣ 2 Tb ⎦
eq 285
As an example we report a plot of the MSK signalling and that for the corresponding RF
output:
I baseband
MSK output
modulated signal
I(t)
I modulated
signal
I MSK
Modulated
signal
Q baseband
Σ
Q(t)
Q modulated
signal
Q MSK
Modulated
signal
figure 140
184
The peculiarity of MSK is not in the main lobe which is 50% more greater than a
OQPSK. Instead what is worth of consideration is that MSK has a fast side lobes
decaying. Spectrum of MSK decays with the four power of the frequency, while in the
case of QPSK and OQPSK the law is modestly of quadratic type.
Therefore we can say that MSK is characterized by a better interference control on
adjacent channels.
figure 141
18.1 GMSK
Another form of MSK is Gaussian-filtered MSK (GMSK). For GMSK, the data
(rectangular-shaped pulses) are filtered by a filter having a Gaussian-shaped frequency
response characteristic before the data are frequency modulated onto the carrier. The
transfer function of the Gaussian low pass filter is
⎡ ⎛ f ⎞ ⎛ ln 2 ⎞ ⎤
−⎢⎜ ⎟ ⎜
⎟⎥
⎣⎢ ⎝ B ⎠ ⎝ 2 ⎠ ⎦⎥
2
H( f ) = e
eq 286
Where B is the 3-dB bandwidth of the filter. This filter reduces the spectral sidelobes on
the transmitted MSK signal.
The product of B with bit period Tb:
185
α = B ⋅ Tb
eq 287
is called normalized bandwidth; BTb=0.3 used in GSM services, gives a good
compromise between relatively low sidelobes and tolerable acceptable ISI.
For example in GSM mobile we have
the figure on the right which represent
the time filter response, the smaller
time response, the greater frequency
bandwidth is required. Ideally MSK needed
for a great bandwidth, since a time
rectangular pulse shaping is equivalent
to an infinite frequency bandwidth.
For BTb=0.3 GMSK has lower spectral sidelobes than those for MSK, QPSK, or
OQPSK (with rectangular-shaped data pulses). In addition GMSK has a constant
envelope, since it is a form of FM. Consequently GMSK can be amplified without
distortion by high efficiency Class C amplifiers.
In figure below is reported an example of power efficiency
figure 142
186
In figure below are reported an example for amplitude and phase vector representation
and the vector and constellation diagrams.
We can see how the amplitude remains constant while the phase change continuously.
In this way the vector representation is a circle which has been made of all possible
phase point transitions, for the modulated signal s(t), from a symbol to another symbol.
In the other figures are reported the spectrum and bandwidth and the ISI representation
of modulated signal as a function of normalized bandwidth α = B ⋅ Tb . Its possible to
observe that the lower α = B ⋅ Tb the greater the ISI.
Constant
amplitude
Non ci sono salti di
fase pertanto i
punti infiniti della
simulazione
giacciono sulla
circonferenza
unitaria (cioè
ampiezza
costante )
No phase
discontinuity
Non sono salti di fase ma è la modalità
di rappresentazione tra -180° e 180°del programma
figure 143
187
BTb=0.5
BTb=0.5
BTb=0.2
BTb=0.2
figure 144
188
BTb=0.1
figure 145
189
18.1.1
How to implement GMSK modulator
An algorithm for a GMSK modulator is described below
1.
2.
3.
4.
5.
Create NRZ (-1,1) from the binary (0,1) input sequence
Create N samples per symbols
Integrate the NRZ sequence, in such a way to have an FSK (CPM)
Convolute with Gaussian function filter
Compute the corresponding I and Q component. At this stage we have the
quadrature components of the baseband GMSK equivalent signal
6. multiplying the I and Q component by the corresponding cos(ωct), -sin(ωct)
carriers
7. add the two resulting flow
Baseband process
Quadrature modulation
cos θ ( t )
0,1..
NRZ
-1,+1
code
NRZ code
∫
Integrator
b(t)
I(t)
L
θ (t )
Gaussia
LP
∑
900
BTb is
s(t)
RF
modulated
output
transformer
Q(t)
sin θ ( t )
figure 146
190
Mathematically:
∞
⎛ t − τ − iTb
m(t ) = ∑ mi Π ⎜⎜
Tb
−∞
⎝
NRZ Data:
Gaussian Filter:
π − ( απ t )
hG (t ) =
e
α
After Filter:
b(t ) = hG (t ) ∗ m(t ) =
∞
= ∑ mi
−∞
After integrator: θ (t ) = 1
4Tb
1
=
4Tb
∞
∫
−∞
, mi = ±1
2
∫h
G
(τ )m(t − τ )dτ
π − ( απ τ )
e
dτ
α
Tb
2
T
t −iTb − b
2
2
t −iTb +
b( z ) dz
⎧⎪ ∞
mi
∫-∞ ⎨⎪∑
⎩ −∞
= ∑ mi
−∞
t
∫
⎞
⎟⎟
⎠
t
1
4Tb
t
∫ ∫
−∞
∫
Tb
2
T
z −iTb − b
2
z −iTb +
Tb
2
T
z −iTb − b
2
z −iTb +
π − ( απ τ ) ⎫⎪
e
dτ ⎬ dz
α
⎪⎭
2
hG (τ )dτ dz
∞
= ∑ miθ i (t )
−∞
= LL +
m-2θ −2 (t ) + m-1θ −1 (t ) + m0θ 0 (t ) + m1θ1 (t ) + m 2θ 2 (t )
+ LL
191
18.1.2
How to implement GMSK demodulator
A coherent detector can be used to demodulate a GMSK signal:
figure 147 : MODULATOR
figure 148 : DEMODULATOR
However to avoid the receiver to have its own reference (i.e. the necessity of coherent
demodulation), a differential encoding can be used to create NRZ signal at the input of
demodulator.
Table below show as an example how to convert binary signal (0,1) to differential NRZ
symbol. It can be easily computed using the following operations:
192
table 7
Modulating binary signal at instant x[n-1], x[n]
X
Y NRZ
figure 149
193
19 EFFICIENT MODULATION METHODS STUDY AT NASA/JPL
19.1 MSK and GMSK Modulation Bit-Error-Rate (BER)
Figure below contains Bit-Error-Rate curves for MSK and GMSK. GMSK studies
included two separate filters with BTS = 0.5 (equivalent to BTB = 0.25) and BTS = 1
(equivalent to BTB = 0.5).
MSK is unfiltered and GMSK includes a Gaussian filter with two bandwidths (BTS = 0.5).
For simplicity, these, along with an ideal BPSK/NRZ reference curve, are placed on a
single BER graph.
Note that the EB / N0 required for a 1 x 10-3 BER is 7.3 - 8.2 dB which compares
favourably with BPSK/NRZ, even with a Gaussian filter bandwidth BTS = 0.5. Losses can
be expected to increase when a non-ideal modulator and receiver are employed;
however, Figure was generated using the ESA power amplifier operating in full
saturation.
figure 150
19.2 MSK and GMSK Modulation Spectra
Most MSK and GMSK applications have been applied in Personal Communication
Systems (PCSs). Spacecraft telemetry transmission systems have avoided GMSK
because of demodulation and synchronization difficulties. Often termed frequency
modulation, MSK and GMSK were included because of their inherently narrow spectral
bandwidths. Unlike the other modulation types, MSK is unfiltered and sidelobes are
reduced by avoiding phase change discontinuities. Figure below shows spectra for
unfiltered, ideal BPSK/NRZ (reference), MSK, and GMSK using the two filter
bandwidths. No discrete components are present in MSK or GMSK spectra despite
baseband filtering.
194
figure 151
figure 152
195
Figure above shows MSK modulation to be significantly more bandwidth-efficient than
the unfiltered BPSK/NRZ reference, reaching a level 60 dB below the peak sideband
amplitude at ± 8 RB. Its lack of discrete spectral components makes it attractive for
space telemetry applications.
However, from Figure it is apparent that MSK modulation is of little interest when
compared to GMSK. GMSK modulation is significantly more bandwidth-efficient than
any other method considered previously except of FQPSK. For example, it is 2 to 6
times more bandwidth-efficient than filtered QPSK modulation, depending upon the
specific filter bandwidths selected. When coupled with its BER performance, GMSK
should be seriously considered for high and very high data rate missions.
19.3 MSK / GMSK Modulation Power Containment
Figure below, concern Power Containment, show that GMSK has a high bandwidth
efficiency.
Occupied bandwidth is difficult to read, because of its small value, but it appears to be
less than 1.2 RB for both filter bandwidths. This represents a 16-times improvement over
the unfiltered [reference] BPSK/NRZ modulation and a 5-fold efficiency increase over
filtered BPSK/NRZ.
figure 153
196
19.4 MSK / GMSK Modulation Study Conclusions
Clearly, space agencies interested in RF spectrum efficiency should seriously consider
GMSK modulation. This is particularly true for high and very high data rate missions.
Unlike the phase modulation types described above, GMSK requires new modulator,
demodulator, and symbol synchronizer designs. In that respect, this recommendation
departs from one of the Efficient Modulation Methods Study guidelines: that only simple
modifications to existing Earth station equipment are permitted for any recommended
modulation method. However, GMSK’s bandwidth efficiency is too great to be ignored and
a departure from the guideline is warranted.
197
20 HISTORY OF SPECTRUM EFFICIENT MODULATION IN
TELEMETRY APPLICATIONS
Since 1992 the amount of available aeronautical telemetry spectrum has been
decreasing. Efforts by the national and international communities have reallocated 25
MHz of telemetry spectrum and efforts are under way to reallocate even more. This is
completely opposite of the requirements of the telemetry community as can be seen
from figure below. The chart clearly shows the data requirements of the test community
are increasing at an almost exponential rate. This increase in requirements is being
driven by the increasing complexity of the test articles coupled with compressed test
schedules. The increasing requirements for data coupled with the reduction in the
amount of available spectrum is causing the major test centers to have serious
concerns if there will be sufficient spectrum available to support all their programs.
Bit Rate (Kbps)
100,000
10,000
1,000
100
10
1970
1975
1980
1985
1990
1995
2000
2005
2010
Year
These trends of increasing data requirements and decreasing availability of
spectrum have focused attention on the efficient use of the remaining spectrum. It is the
responsibility of all programs to insure that their use of spectrum is as efficient as
possible and that spectrum is not needlessly being wasted. Some of the major test
ranges have already been forced to schedule use of the telemetry spectrum by the hour
to accommodate all of the required users. Under these conditions, it has become
imperative that all programs be as efficient and flexible as possible to ensure that they
are able to secure the use of a sufficiently large portion of the spectrum to complete
their required testing.
198
To be spectrally efficient means that data rates must be kept at the absolute
minimum bandwidth, so proper transmitter pre-modulation filtering techniques must be
used, and efficient modulation schemes must be employed. Currently the most
common modulation scheme is PCM/FM; this is a very robust modulation technique that
is fairly efficient. To be efficient these systems must have proper pre-modulation
filtering and be properly aligned. As can be seen from figure below, improper selection
of pre-modulation filtering, and over deviation of the transmitter can increase the
required channel bandwidth by over 50%. Figure shows ideal spectrum with proper
modulation filtering of .7 x Fb (Bit frequency), improper pre-modulation filtering at 1.4 x
Fb & 2 x Fb, and excessive transmitter deviation of 1.2 x Fb (.35 x Fb is ideal).
0
-10
-20
Improper
Pre-modulation Filter
2 x Fb
Over deviation
1.2 x Fb
-30
-40
-50
-60
-70
Ideal
PCM/FM
-80
-90
-100
1450.5
1452.5
1454.5
1456.5
1458.5
1460.5
figure 154
•
Ideal spectrum with proper modulation filtering of 0.7 x Fb (Bit frequency),
•
improper pre-modulation filtering at 2 x Fb,
•
excessive transmitter deviation of 1.2 x Fb (0.35 x Fb is ideal).
Improvement in pre-modulation filter selection and tighter controls on alignment
of systems will provide a great improvement in spectrum efficiency. New modulation
techniques such as GMSK and FQPSK have the potential to double spectrum
utilization. As can be seen from figure below, these new modulation techniques are
much more efficient than PCM/FM. Once the equipment can be developed, we can
199
expect to see vast improvements in spectrum efficiency. In the meantime efforts should
be concentrated on insuring that currently deployed telemetry systems have been
properly constructed and aligned.
figure 155. New Modulation Techniques vs PCM/FM.
200
21 CORRELATED DETECTION
Let us consider a linear system (filter) through which passes a signal when a white
noise is present. The aim of filter is to extract the signal with the maximum S/N ratio at
the output. We want to find the linear filter transfer function H(ω) that maximize the S/N
ratio at the output. Calling f(t) the signal applied to filter and ε, the noise spectral power
density which is present within the filter bandwidth.
Linear filter
H(ω)
f(t)
g(t)
ε
figure 156
• Considering first the signal f(t):
The Fourier transform of the input signal f(t) is
F (ω ) =
+∞
∫ f (t )e
− j ωt
dt
eq 288
−∞
The filter output signal voltage is therefore:
G (ω ) = F (ω ) H (ω )
eq 289
and
g (t ) = F −1 [F (ω )G (ω )] =
1
2π
+∞
∫ F (ω ) H (ω )e
j ωt
dω
eq 290
−∞
Its absolute value at time τ is
1
g (τ ) = F [F (ω )G (ω )] =
2π
−1
+∞
∫ F (ω ) H (ω )e
jωt
dω
eq 291
−∞
201
let us consider now the noise
The filter input noise power spectral density is
NoisePSD =
ε
(W/Hz)
2
eq 292
Where the spectrum is extended from positive to negative frequencies, then the
filter output noise power spectral density will be
G N (ω ) =
ε
H (ω )
2
2
eq 293
Where the filter Power spectrum is:
H (ω )
2
The filter output noise power is therefore
1
PN =
2π
+∞
ε
∫ 2 H (ω )
2
dω
eq 294
−∞
We want find H(ω) in order to maximize the output signal-to-noise ratio S/N:
⎛ g 2 (τ ) ⎞
⎟⎟
max⎜⎜
P
⎝ N ⎠
g 2 (τ ) = signal power
where
Ones the input signal is defined, it’s also defined its energy which is a constant given by
+∞
E=
∫
−∞
f 2 (t )dt =
1
2π
+∞
∫ F (ω )
2
dω
eq 295
−∞
The signal to noise ratio, we want to maximize, can be divided by the energy E without
altering the maximum S/N ratio determination. Therefore
⎧
⎪
⎛ g 2 (τ ) ⎞
⎪
⎟⎟ = max ⎨
max⎜⎜
⎝ E ⋅ PN ⎠
⎪ 1
⎪ 2π
⎩
⎫
⎧
⎪
⎪
∫−∞F (ω ) H (ω )e dω
⎪
⎪
⎬ = max ⎨
+∞
+∞
1 ε
2
2
⎪ 1
∫−∞ F (ω ) dω ⋅ 2π −∫∞ 2 H (ω ) ω ⎪⎪
⎪ 2π
⎭
⎩
1
2π
+∞
2
j ωt
⎫
⎪
∫−∞F (ω ) H (ω )e dω
⎪
⎬
+∞
+∞
ε
2
2
⎪
⋅
(
ω
)
ω
(
ω
)
ω
F
d
H
∫−∞
∫−∞ 2
⎪
⎭
+∞
2
j ωt
eq 296
202
In order to maximize the preceding ratio we can use the Schwarz theorem for complex
function integral:
2
+∞
∫ X (ω )Y (ω )dω
+∞
≤
−∞
∫ X (ω )
−∞
2
+∞
dω ⋅ ∫ Y (ω ) dω
2
eq 297
−∞
The “=” sign is applied only when
X (ω ) = kY ∗ (ω )
eq 298
so we have
2
+∞
∫ kY (ω )Y (ω )dω =
*
−∞
+∞
2
+∞
*
∫ kY (ω ) dω ⋅ ∫ Y (ω ) dω
−∞
2
eq 299
−∞
Where Y*(.) is the conjugate complex value of Y(.)
Therefore calling:
X (ω ) = H (ω )
eq 300
Y (ω ) = F (ω )e jω t
We can write
X (ω ) = H (ω ) = kY * (ω ) = kF * (ω )e − jω t
i.e. H (ω ) = kF * (ω )e − jω t
eq 301
Then substituting on the S/N ratio we can obtain the maximum value given by:
2
+∞
+∞
⎧
⎫
⎧ 1 +∞
⎫
1
2
2
j ωt
⎪
⎪
ω
ω
ω
F
H
e
d
(
)
(
)
ω
ω
ω
ω
⋅
F
d
H
d
(
)
(
)
⎪
⎪
∫
∫
∫
2π −∞
⎛ g 2 (τ ) ⎞
⎪
⎪
⎪ 2π −∞
⎪
−∞
⎟⎟ = max ⎨
max⎜⎜
⎬ = max ⎨
⎬=
+∞
+∞
+∞
+∞
⎝ E ⋅ PN ⎠
⎪ 1 F (ω ) 2 dω ⋅ 1 ε H (ω ) 2 ω ⎪
⎪ 1 F (ω ) 2 dω ⋅ 1 ε H (ω ) 2 ω ⎪
⎪ 2π −∫∞
⎪
⎪⎩ 2π −∫∞
⎪⎭
2π −∫∞ 2
2π −∫∞ 2
⎩
⎭
2
+∞
⎧
⎫
1
2
⎪
⎪
k ∫ F (ω ) dω
⎪ 2π −∞
⎪ 1
=
max ⎨
2⎬
+∞
⎪ 1 1 ε
⎪ ε
2
⎪ 2π 2π 2 k ∫ F (ω ) dω ⎪ 4π
−∞
⎩
⎭
203
Therefore this maximum S/N output correspond to a filter response given by
g max
k
=
2π
+∞
∫ F (ω )
2
dω = kE
eq 302
−∞
This is the optimum filter function to reveal the signal when white noise is present. If
we get k=1 then by Parseval theorem we can rewrite:
g max =
1
2π
+∞
∫ F (ω )
2
−∞
dω = ∫ f 2 (t )dt = E
eq 303
T
Where the second integral it has been extended to the duration T of the input signal.
Therefore, the optimum correlator receiver must to perform an integration, over the
signal period T, of the product between the input signal and the replica of the input
signal locally available. The term correlator follows by the correlation existing between
input signal and the locally available reference signal.
The reference signal (replica of input signal) can be obtained by PLL circuits. These
circuits have a bandwidth which can be reduced to a small bandwidth around the
carrier, thus the carrier can be extracted and can be used as a reference signal. Also
PLL circuits use the correlation.
From a general point of view we can say that the correlation detection is a way to use as
better as possible the known characteristics of the input signal (frequency. Shape, ..).
The equation for the correlation detection is:
g (t ) = ∫ v(t ) s R (t )dt
eq 304
T
Where
v(t)=s(t)+n(t) is the signal corrupted by noise
sR(t) is the reference replica signal obtained by use of PLL circuits
T= signal period
A blocks scheme of the correlator receiver is shown in figure below
204
v(t)=s(t)+n(t)
PLL
sR(t)
x
∫ (..)dt
g(t)
T
correlator
figure 157
The Modulation process must be conserve some power on the carrier (other to that on
the side band) in order to allow carrier extraction by the PLL circuits.
205
22 INTRODUCTION TO CDMA
22.1 Multiple Access
A cell in a cellular radio network could be seen as a multi-user communication system,
in which a large amount of users share a common physical resource to transmit and
receive information. The resource is the frequency band in the radio spectrum. There
are several different radio access techniques in which multiple users could send the
information through the common channel to the receiver:
FDMA
F
TDMA
FDMA
T
P
P - Power
T – Time
F - Frequency
F
T
CDMA
FDD
P
T
figure 158
In FDMA and TDMA the common channel is partitioned into orthogonal single user
subchannls. A problem arises if the data from the users accesing the network is bursty
in nature. A single user who has reserved a channel may transmit data irregularly so
that silent periods are even longer than transmission periods. For example, a speech
signal may contain long pauses. In such cases TDMA or FDMA tends to be inefficient
because a certain percentage of frequency or of the time slots allocated to the user
caries no information. An inefficiently designed multiple access system limits the
number of simultaneous users of the common communication channel.
206
One way of overcoming this problem is to allow more than one users to share the
channel or sub-channel by the use of spread spectrum signals. In this method each user
is assigned a unique code sequence or signature sequence that allow the user’s signal
to be spread on the common channel.
By designing these code sequence with relatively little cross correlation, the crosstalk
inherent in the demodulation signals received from multiple transmitters is minimized.
This multiple access method is called CODE DIVISION MULTIPLE ACCESS (CDMA)
22.2 Spread spectrum modulation
The general concept of spread spectrum modulation is presented in figure below:
Trasmitter
Receiver
Channel
Sn
Sn
ε()
n(t)
ε()=ε-1()
Sn
i(t)
figure 159: spread spectrum system concept
Formally the operation of both transmitter and receiver can be partitioned into two steps.
At the transmitter site:
• the first step is modulation in which the narrowband signal Sn, which occupies
frequency band Wi, is formed. In the modulation process, bit sequences of
length n are mapped to 2n different narrowband symbols constituting the
narrowband signal Sn.
• in the second step the spreading is carried out, in which the narrowband signal
Sn is spread in a large frequency band Wc. The spread signal is denoted by Sw,
and the spreading functions expressed as ε(). An example for spreading is
reported in figure below:
207
Bit period Tb
1
Data
-1
1
Spreading/expansion
code
-1
Expanded signal
= Data * Expansion code
1
-1
Chip period Tc
figure 160: spreading process
where:
Rb =
1
Tb
1
Rc =
Tc
BIT RATE;
Tc<<Tb and
Tb=N⋅Tc,
eq 305
CHIP RATE.
N i.e. the Rc/Rb, is defined as spreading factor, in the example above the spreading
factor is SF=8.
SF =
Rc Tb
=
Rb Tc
eq 306
208
A general CDMA modulating process can be represented as shown in figure below:
Antenna
Source of
information
B
Coding
Spreading
sequence
Modulator
O.L.
RF
signal
figure 161
At the receiver side the first step is dispreading, which can be formally represented by
the inversion function ε-1()=ε(). In dispreading, the wideband signal Sw, is converted
back to a narrowband signal Sn which can then be demodulated using digital
demodulation schemes.
The primary reason for going to the process of spreading and dispreading is to enable
the CDMA multiple access method, but due to the signal spreading and resulting
enlarged bandwidth, spread spectrum signals have many other interesting properties
that differ from those of narrowband signals. The most important are discussed in the
following section.
209
22.3 Tolerance to Narrowband Interference
A spread spectrum system is tolerant to narrowband interference, as shown in figure
below:
P[W/Hz]
P[W/Hz]
Sn
in
Despreading
iwr
Sw
iW
f0
fi
f [Hz]
f0
f [Hz]
fi
Wi
Wc
Wc
figure 162: dispreading process in the presence of interference
Assume that a signal Sw is received in the presence of a narrowband interference signal
in.
The despreading process can be presented as follows:
ε −1 (S w + in ) = ε −1 [ε (S n )] + ε −1 [in ] = S n + iw
eq 307
The dispreading operation converts the input signal into a sum of the useful narrowband
signal Sn and an interfering wideband signal iw.
210
After the dispreading operation a narrowband filtering (operation F()) is applied, with the
bandpass filter of bandwidth Bn equal to the bandwidth Wi of Sn , this result in:
F ( S n + iw ) = S n + F (iw ) = S n + iwr
eq 308
Only a small proportion of the interfering signal energy passes the filter and remains as
residual interference, because the bandwidth Wc of iw is much larger than Wi. The ratio
between the transmitted modulation bandwidth and the information signal bandwidth is
called processing gain, Gp:
Gp =
Wc
Wi
eq 309
To prevent any filter-or modulation-specific properties, from this point:
Wc=chip rate
Wì=bit rate
In WCDMA system the value of Wc is 3.84 Mcps which, owing to spectral sidel lobes,
results in 5 MHz carrier raster.
Its important to note that processing gain process is composed of the spreading part
and coding part.
22.4 Direct Sequence Spread Spectrum System
There are a number of techniques for spreading the information-bearing signal by use of
the code signals:
• Direct Sequence
• Frequency Hopping
• Time Hopping
The most common technique used in cellular radio networks is DS (Direct Sequence
Spread Spectrum).
In this system the signal spreading is achieved by modulating
data-modulated signal a second time by a wideband spreading signal.
the
The wideband spreading signal has to be approximated closely to a random signal with
uniform distribution of the symbols. Typical representatives of such signal in digital form
are pseudonoise (PN) sequence over a finite alphabet.
211
Since the WCDMA system has to maximize system capacity during the spreading, the
operation is done in two phases:
•
•
In the first the user signal is spread by the channelisation code. This is called
the Orthogonal Variable Spreading Factor (OVSF) Code, its construction is
based on the Hadmard Matrix. The code has the property that two different codes
from the family are perfectly orthogonal if in phase. Thus, its use guarantees
maximum capacity, measured by the number of active users. The channelization
operation, transforms every data symbol into a number of chips, thus increasing
the bandwidth of the signal. The number of chips per data symbol is called the
Spreading Factor (SF).
In the second, all the spread users’signals are scrambled by the cell specific
scrambling sequence, which has the statistical properties of random sequence.
The second operation is the scrambling operation, where a scrambling code is
applied to the spread signal.
Channelisation
code
Scrambling
code
Data
Bit rate
Chip rate
Chip rate
figure 163
22.4.1
Channelization operation
In 3GPP the OVSF codes used for different symbol rates are uniquely described as
Cch,SF,k, where SF is the Spreading Factor of the code and k is the code number
(0 ≤ k ≤ SF - 1). Each level of the code tree defines the channelization codes of length
SF, where SF is the spreading factor of the codes.
The channelization codes have orthogonal properties and are used for separating the
information transmitted from a single source, i.e.
• different connections within one cell in the downlink (thus reducing the own
interference),
• dedicated physical data channels from one UE in the uplink.
In the downlink the OVSF codes are a limited resources and need to be managed by
the radio network controller, whereas in the uplink such a problem does not exist.
The OVSF codes are effective only when the channels are perfectly synchronized at
chip level (the loss in crosscorrelation, e.g. due to multipath, is compensated for by the
additional scrambling operation).
212
22.4.1.1
Channelization codes (OVSF codes) generation
The channelization codes are OVSF (Orthogonal Variable Spreading Factor) codes
that preserve the orthogonality between a user’s different physical channels. The OVSF
codes can be defined using the code tree of figure below:
( Cch, 2, 0 , Cch, 2, 0 )
Cch, 8, 0 = (1, 1, 1, 1, 1, 1, 1, 1)
( Cch, 2, 0 , - Cch, 2, 0 )
Cch, 4, 0 = (1, 1, 1, 1)
Cch, 8, 1 = (1, 1, 1, 1, -1, -1, -1, -1)
Cch, 2, 0 = (1, 1)
Cch, 8, 2 = (1, 1, -1, -1, 1, 1, -1, -1)
Cch, 4, 1 = (1, 1, -1, -1)
Cch, 8, 3 = (1, 1, -1, -1, -1, -1, 1, 1)
Cch, 1, 0 = (1)
( Cch, 2, 1 , Cch, 2, 1 )
Cch, 8, 4 = (1, -1, 1, -1, 1, -1, 1, -1)
Cch, 4, 2 = (1, -1, 1, -1)
Cch, 2, 1 = (1, -1)
Cch, 8, 6 = (1, -1, -1, 1, 1, -1, -1, 1)
Cch, 4, 3 = (1, -1, -1, 1)
( Cch, 2, 1 , - Cch, 2, 1 )
SF = 1
Cch, 8, 5 = (1, -1, 1, -1, -1, 1, -1, 1)
Cch, 8, 7 = (1, -1, -1, 1, -1, 1, 1, -1)
SF = 2
SF = 8
SF = 4
figure 164
Each level in the code tree defines channelization codes of length SF, corresponding to
a spreading factor SF. The channelization codes are Welsh codes. Their generation
method, which is based on the Hadamard matrix is shown in figure below:
⎧
⎪
⎪
⎪
⎪
⎪
⎨
⎪
⎪
⎪
⎪
⎪⎩
C ch,1,0 = 1
⎡Cch , 2, 0 ⎤ ⎡Cch ,1, 0 Cch ,1,0 ⎤ ⎡1
⎢
⎥=⎢
⎥=⎢
⎣Cch , 2,1 ⎦ ⎣Cch ,1, 0 − Cch ,1, 0 ⎦ ⎣1
⎡Cch ,3, 0 ⎤ ⎡ Cch , 2, 0 Cch , 2, 0 ⎤ ⎡ 1 1
⎢C
⎥ ⎢
⎥ ⎢
⎢ ch ,3,1 ⎥ = ⎢Cch , 2,0 − Cch , 2, 0 ⎥ = ⎢ 1 1
⎢Cch ,3, 2 ⎥ ⎢ Cch , 2,1 Cch , 2,1 ⎥ ⎢ 1 − 1
⎢
⎥ ⎢
⎥ ⎢
⎣Cch ,3,3 ⎦ ⎣ Cch , 2,1 − Cch , 2,1 ⎦ ⎣ 1 − 1
...
1⎤
− 1⎥⎦
1 1 ⎤
− 1 − 1⎥⎥
1 − 1⎥
⎥
− 1 1⎦
figure 165
It is easy to verify that all the codes with the same SF are orthogonal, i.e. they fulfil the
orthogonality condition specified by equation:
213
SF −1
∑S
k =0
1, k
⋅ S 2, k = 0
eq 310
This orthogonality, however, is not guaranteed between a generic code and the codes
belonging to its subtree. As a consequence, the selection of one code, blocks the
corresponding subtree.
22.4.2
Scrambling operation
The second operation is the scrambling operation, where a scrambling code is
applied on top of the spread signal, so it does not change the signal bandwidth but only
makes the signals from different sources separable from each other. With the
scrambling, it would not matter if the actual spreading were performed with identical
codes for several transmitters.
With the scrambling operation the real (I) part imaginary (Q) parts of the spread signal
are further multiplied by a complex-valued scrambling code.
The scrambling codes are used to
• separate different cells in the downlink,
• separate different terminals in the uplink.
The scrambling codes have good correlation properties (interference averaging) and
are always used on top of spreading codes, thus not affecting the transmission
bandwidth.
22.5 Orthogonal sequences reminder
Let us consider two finit energy signals s1 (t ) and s2 (t ) defined in the interval [a, b].
The AUTOCORRELATION Ri i (τ ) of the finite energy signal si (t ) (i = 1, 2) is defined
as
b
Ri i (τ ) =ˆ ∫ si (t + τ ) si∗ (t ) dt
eq 311
a
The CROSS CORRELATIONS R1 2 (τ ) and R2 1 (τ ) between the finite energy signals
s1 (t ) and s2 (t ) are defined as
b
R1 2 (τ ) =ˆ ∫ s1 (t + τ ) s2∗ (t ) dt
eq 312
a
and
b
R2 1 (τ ) =ˆ ∫ s2 (t + τ ) s1∗ (t ) dt
eq 313
a
214
Definition:
The finite energy signals s1 (t ) and s2 (t ) are ORTHOGONAL ⇔ R1 2 (0) = 0 ⇔
R2 1 (0) = 0 .
In other words, the finite energy signals s1 (t ) and s2 (t ) are ORTHOGONAL ⇔
b
b
∫ s (t ) s (t ) dt = 0 ⇔ ∫ s (t ) s (t ) dt = 0
1
∗
2
2
a
∗
1
eq 314
a
Let us now suppose that s1 (t ) and s2 (t ) are two channelisation sequences with the
same SF, as shown in figure below. We will show that
SF −1
the sequences s1 (t ) and s2 (t ) are ORTHOGONAL ⇔ ∑ S1, k ⋅ S 2, k = 0
k =0
Note:
SF −1
The term
∑S
k =0
1, k
⋅ S 2, k is also called the cross-product between the two
sequences. If we indicate
[
=ˆ [S
S1 =ˆ S1, 1 , S1, 2 , LS1, SF −1
S2
2, 1
, S 2, 2 , LS 2, SF −1
]
]
eq 315
the cross-product between the two sequences can also be indicated as
S1 ⋅ S 2T
eq 316
Proof:
The sequences s1 (t ) and s2 (t ) are ORTHOGONAL ⇔
∫ s (t ) s (t ) dt = 0 ⇔
1
∗
2
Tb
⇔
SF −1
∑S
k =0
1, k
SF −1
⋅ S 2, k ⋅ Tc = 0 ⇔ ∑ S1, k ⋅ S 2, k = 0
eq 317
k =0
215
Tb (One data symbol, SF chips)
Tc
0
S1, 0
S1, 1
S1, 2
S1, SF-1
s1 (t )
S2, 0
S2, 1
S2, 2
S2, SF-1
s2 (t )
Tc
2Tc
(SF-1)Tc
figure 166
22.6 Modulation and Tolerance to Wideband Interference
Figure below depict the basic operations of spreading and dispreading for DS-CDMA
system.
User data is here assumed to be a BPSK-modulated bit sequence of rate R, the user
data bit assuming the value of ±1. The spreading operation, in this example, is the
multiplication of each user data bit with a sequence of 8 code bits, called chips. The
resulting spread is at rate of 8xR, and has the same random (pseudo-noise like)
appearance as the spreading code.
During despreading we multiply the spread user data/chip sequence, bit by bit duration,
with the very same 8 code chips as we used during the spreading of this bits. As shown
the original user bit sequence has been recovered perfectly, provided we have also
perfect synchronization between the spread user signal and the despreading code.
The correlation receiver integrates the resulting products (data x code) for each user bit.
216
No interference scenario
Data
11
-11
Spreading
Spreding code
11
-11
Spreding signal=Data x code
11
-11
DeSpreading
Spreding code
11
-11
Data=spreading code x spreading signal
11
-11
88
Correlation result
-8
figure 167
Figure below show the effect of despreading operation when applied to the CDMA
signal of another user whose signal is assumed to have been spread with a different
spreading code. The result of multiplying the interfering signal with the own code and
integrating the resulting products leads to interfering signal values lingering around 0.
The basic idea is that the receiver works as a correlation receiver, which means that it
correlates a known (reference) code with an incoming signal that is composed of
several different CDMA signal (from different users or channels), with general
interference (from other RF systems), and with a noise (of thermal nature).
The output from the receiver is in the form of the autocorrelation function of the wanted
signal.
217
Interference example
Other interfering signal
11
-11
Spreding code
11
-11
Data after multiplication
11
-11
88
Correlation result
-88
figure 168
As can be seen, the amplitude of the own signal (correlation result in graphics)
increases on average by a factor of 8 relative to that of the user of the other interfering
system, i.e. the correlation detection has raised the desired user signal by the spreading
factor, here 8, from the interference presenting the CDMA system. This effect is termed
“processing gain” and is a fundamental aspect of all CDMA systems, and in general of
all spread spectrum system.
Processing gain is what gives CDMA systems the robustness against-interference that
is necessary in order to reuse the available 5 MHz carrier frequencies over
geographically close distances.
Let’s take an example with real WCDMA parameters. Speech service with a bit rate of
12.2 kbps has a processing gain of:
⎡ Rc ⎤
⎡ 3.84 ⋅10 6 ⎤
⎡ Chip _ rate ⎤
=
=
Pg = 10 Log ⎢
10
Log
10
Log
= 25dB
⎢ ⎥
⎢
⎥
3 ⎥
⎣ Bit _ rate ⎦
⎣ 12.2 ⋅10 ⎦
⎣ Rb ⎦
eq 318
After despreading, the signal power needs to be typically a few decibel above the
interference and noise power. The required power density over the interference power
density after despreading is designated as Eb/N0, where Eb is the energy, or power
density, per user bit and N0 is the interference and noise power density.
For speech service the ratio Eb/N0 is typically in the order of 5.0 dB, and the required
wideband signal to interference ratio C/I is therefore 5.0 dB minus the processing gain
i.e.
C
(dB) wdeband = 5dB − 25dB = −20dB
I
eq 319
218
In other words, the signal power can be 20 dB under the interference or thermal noise
power, and the WCDMA receiver can still detect the signal.
Due to spreading and despreading, C/I can be lower in WCDMA than, for example, in
GSM. A good quality speech connection in GSM requires C/I=9-10 dB.
Since the wideband signal can be around the thermal noise level, its detection is difficult
without knowledge of the spreading sequence. For this reason spread spectrum
systems were originated in military applications where the wideband nature of the signal
allowed have to be hidden below omnipresent thermal noise.
It should be observed that the more is the bit rate Rb, the lower is Pg(dB), therefore
higher bit-rate service require an increasing C/I.
Rb
(Kbit/sec)
12.2
64
384
2000
Pg
314.7541
60
10
1.92
Pg(dB)
25.0
17.8
10.0
2.8
table 8
It should be also observed that the processing gain comes at the price of an increased
transmission bandwidth (by the amount of the processing gain).
22.7 Uplink Modulation
In the uplink direction there are basically two additional terminal-oriented criteria that
need to be taken into account in the definition of the modulation and spreading
methods.
The uplink modulation should be designed so that the terminal amplifier efficiency is
maximized and/or the audible interference from the terminal is minimized.
Discontinuosus uplink transmission can cause audible interference to audio equipment
that is very close to the terminal; this is a completely separate issue from the
interference in the air interface. With GSM operation we are familiar with the occasional
audible interference with audio equipment that is not properly protected. The
interference from GSM has a frequency of 217 Hz, which is determined, by the GSM
frame frequency. With WCDMA system, the same issues arise when discontinuous
uplink transmission is used, for example with a speech service. During the silent period
no information bits need to be transmitted, only the information for link maintenance
purposes, such as power control with a 1.5 KHz command rate. With such a rate the
transmission of the pilot and the power control symbols with time multiplexing in the
uplink direction would cause audible interference in the middle of the telephony voice
219
frequency band. Therefore in WCDMA uplink the two dedicated physical channel are
not time multiplexed but I-Q/code multiplexing is used.
The continuous transmission achieved with an I-Q/code multiplexed control channel is
shown in figure below.
Data
(DPDCH)
DTX Period
Dedicate Phisical Data
Channel
User Data
(DPDCH)
Dedicate Phisical Data
Channel
Phisical Layer Control Information
(DPCCH)
Dedicate Phisical Control Channel
figure 169 : parallel transmission of DPDCH and DPCCH when data is present/absent (DTX)
Now, as the pilot and the power control signaling are maintained on a separate
continuous channel, non pulsed transmission occurs. The only pulse occurs when the
data channel DPDCH is switched on and off, but such switching has happens quite
seldom. For the best possible power amplifier efficiency, the terminal transmission
should have as low-peak-to-average ratio (PAR) as possible to allow terminal to operate
with a minimal amplifier back-off requirement.
With the I-Q/code multiplexing, also called dual-channel QPSK modulation, the
power level of the DPDCH and DPCCH are typically different, especially as data
rates increase, and would lead in extreme case to a BPSK-type transmission
when transmitting the branches independently. This has been avoided by using a
complex-valued scrambling operation after the spreading with channelisation
codes.
The signal constellation of the I-Q/code multiplexing before complex scrambling is
shown in figure below, the same constellation is obtained after descrambling in the
receiver for data detection.
Q
Q
G=0.5
I
G=1
I
figure 170: Constellation of I-Q/code multiplexing before complex scrambling, G denotes the relative gain
factor between DPCCH and DPDCH
220
Figure below illustrates the principle of the uplink spreading of DPCCH and DPDCHs.
The binary DPCCH and DPDCHs to be spread are represented by real-valued
sequences, i.e. the binary value "0" is mapped to the real value +1, while the binary
value "1" is mapped to the real value –1. The DPCCH is spread to the chip rate by the
channelization code cc, while the n-th DPDCH called DPDCHn is spread to the chip rate
by the channelization code cd,n. One DPCCH and up to six parallel DPDCHs can be
transmitted simultaneously, i.e. 1 ≤ n ≤ 6.
cd,1
βd
cd,3
βd
DPDCH1
Σ
DPDCH3
cd,5
I
βd
DPDCH5
Sdpch,n
I+jQ
cd,2
βd
cd,4
βd
cd,6
βd
cc
βc
S
DPDCH2
DPDCH4
DPDCH6
Σ
Q
j
DPCCH
figure 171: Spreading for uplink DPCCH and DPDCHs
After channelization, the real-valued spread signals are weighted by gain factors, βc for
DPCCH and βd for all DPDCHs.
At every instant in time, at least one of the values βc and βd has the amplitude 1.0. The
β-values are quantized into 4 bit words. The quantization steps are given in table below.
221
Signalling values for
βc and βd
15
14
13
12
11
10
9
8
7
6
5
4
3
2
1
0
Quantized amplitude ratios
βc and βd
1.0
14/15
13/15
12/15
11/15
10/15
9/15
8/15
7/15
6/15
5/15
4/15
3/15
2/15
1/15
Switch off
table 9: The quantization of the gain parameters
After the weighting, the stream of real-valued chips on the I- and Q-branches are then
summed and treated as a complex-valued stream of chips. This complex-valued signal
is then scrambled by the complex-valued scrambling code Sdpch,n. The scrambling code
is applied aligned with the radio frames, i.e. the first scrambling chip corresponds to the
beginning of a radio frame.
In the uplink, the complex-valued chip sequence generated by the spreading process (
spreding phase + scrambling phase) is QPSK modulated as shown in Figure below:
cos(ωt)
Complexvalued chip
sequence from
spreading
operations
S
Split
real
&
imag
Re{S}
Pulseshaping
Im{S}
Pulseshaping
-sin(ωt)
figure 172: Uplink Modulation
222
22.7.1
One UL parallel channel
Let us start by considering only one of two parallel channels,
SC=Scrambing Code
I
DPDCH OFF
I+jQ
S
Q
DPCCH
Cc
βc
Chanelisation
Code
j
figure 173: Only the DPCCH channel is active
Supposing the gain factor parameter equal to one: βc=1; then the signal can assume
only the values ±1 along the Q axes i.e. ±1j, in other word we are obtaining a BPSK
constellation.
Q
I
figure 174: BPSK modulation constellation
223
In order to minimize the zero crossing by the vector constellation, we are using the
scrambling codes which are formed in such a way that the rotations between
consecutive chips within one symbol period are limited to ±90°. The full 180° rotation
can happen only between consecutive symbols. This method further reduces the peakto-peak-average ratio of the transmitted signal from the normal QPSK transmission.
The scrambling codes, during the chip time, can assume only the values:
(1+j); (1-j); (-1+j); (-1-j);
which once multiplicand by the expanded code signal yield:
j ⋅ (1 + j ) = −1 + j
j ⋅ (1 − j ) = 1 + j
j ⋅ (− 1 + j ) = −1 − j
j ⋅ (− 1 − j ) = 1 − j
−
−
−
−
j ⋅ (1 + j ) = 1 − j
j ⋅ (1 − j ) = −1 − j
j ⋅ (− 1 + j ) = 1 + j
j ⋅ (− 1 − j ) = 1 − j
eq 320
As a consequence the vector constellation is no longer a BPSK constellation but a
balanced QPSK constellation.
Q
-1+j
1-j
1+j
1+j
I
-1-j
1-j
-1-j
1-j
figure 175: balanced QPSK constellation
224
22.7.2
Two UL parallel channel
As a second analysis case let us consider the transmission of two parallel channels,
DPDCH (dedicated physical data channel) and DPCCH (dedicated physical control
channel):
cd
βd
Sc
I
DPDCH
I+jQ
S
Q
DPCCH
cc
βc
j
figure 176
Consider the peak-to-average power ratio (PAR=crest factor) defined as the ratio
between the peak and average power.
The amplifier efficiency is maximized when the peak-to-average power ratio
(PAR=crest factor) is minimized. This mean that the mobile phone amplifier can
operate with a minimum back-off, in other word with a minimum output power reduction
with respect to the maximum output power allowed.
The peak-to-average power ratio (PAR=crest factor) is affected and degraded by
power unbalance of I and Q channels, notably in phase and quadrature component of
the signal. To minimize peak-to-average power ratio (PAR=crest factor) is required a
balanced QPSK constellation.
The power ratio between Q and I component is called G=βc/βd
The multicode transmission of more channels increases the peak-to-average power
ratio (PAR=crest factor) and, as in the case of one channel, the Scrambling code
application at the end, transform the Unbalanceed-QPSK into a Balanced-QPSK.
In such a way the efficiency of the power amplifier remains constant irrespective of the
power difference G=βc/βd between DPCCH and DPDCH.
This can be explained by figure below, which show the signal constellation for
I-Q/code multiplexed control channel with complex spreading.
There are three case study in which we use/not use scrambling operation:
•
•
•
one with G=βc/βd=0 dB i.e. βd=βc=1
one with G=βc/βd=-6 dB i.e. βd=1 βc=1/2
one with G=βc/βd=-10 dB
225
22.7.2.1
No scrambling code operation
When no scrambling code are used, we obtain an unbalance QPSK which is poorly
efficient from the amplifier point of view; this is shown in simulation below :
Q
Q
1
2
I
I
No scrambling code are used
Unbalance QPSK
G=βc/βd=-6 dB
No scrambling code are used
G=βc/βd=0 dB
In this condition especially for G= -6 dB the peak-to-average power ratio (PAR=crest
factor) is very poor
22.7.2.2
Scrambling code operation
When scrambling code are used, then even when G=βc/βd≠0 dB we obtain always a
balance rotated QPSK.
Thus, the signal envelope variations with complex spreading, are very similar to a
balanced QPSK transmission for all value of G=βc/βd:
•
G=βc/βd=0 dB i.e. βd=βc=1
Multiplication of signal and scrambling code yield:
226
(1 +
(1 +
(1 +
(1 +
j ) ⋅ (1 + j ) = 2 j
j ) ⋅ (1 − j ) = 2
j ) ⋅ (− 1 + j ) = −2
j ) ⋅ (− 1 − j ) = −2 j
(− 1 +
(− 1 +
(− 1 +
(− 1 +
j ) ⋅ (1 + j ) = −2 j
j ) ⋅ (1 − j ) = −2
j ) ⋅ (− 1 + j ) = 2
j ) ⋅ (− 1 − j ) = 2 j
(1 − j ) ⋅ (1 + j ) = 2
(1 − j ) ⋅ (1 − j ) = −2 j
(1 − j ) ⋅ (− 1 + j ) = 2 j
(1 − j ) ⋅ (− 1 − j ) = −2
Q
1
2
I
(− 1 − j ) ⋅ (1 + j ) = −2 j
(− 1 − j ) ⋅ (1 − j ) = −2
(− 1 − j ) ⋅ (− 1 + j ) = 2
(− 1 − j ) ⋅ (− 1 − j ) = 2 j
figure 177
In this example from constellation point of view, it doesn’t appear clearly the difference
between no scrambling and scrambling application.
The difference appears more clearly by considering G≠0 dB as in the following
examples:
•
G=βc/βd=-6 dB i.e. βd=1 βc=1/2
In this case the Q component is half of I component and the scrambling code operation
give the following:
1 3
⎛ 1 ⎞
1 ⎞
1 3
⎛
⎜1 + j ⎟ ⋅ (1 + j ) = + j
− 1 − j ⎟ ⋅ (1 + j ) = − − j
⎜
2
2
2
⎝
⎠
2 ⎠
2 2
⎝
Q
3 1
⎛ 1 ⎞
1
3
1
⎛
⎞
(
)
+
1
j
1
j
j
⋅
−
=
−
⎜
⎟
⎜ − 1 − j ⎟ ⋅ (1 − j ) = − + j
2 2
⎝ 2 ⎠
2 ⎠
2 2
⎝
3 1
⎛ 1 ⎞
1
3 1
⎜1 + j ⎟ ⋅ (− 1 + j ) = − + j ⎛⎜ − 1 − j ⎞⎟ ⋅ (− 1 + j ) = − j
2 2
2 ⎠
2 2
⎝ 2 ⎠
⎝
1 3
1 ⎞
1 3
⎛ 1 ⎞
⎛
⎜1 + j ⎟ ⋅ (− 1 − j ) = − − j ⎜ − 1 − j ⎟ ⋅ (− 1 − j ) = + j
2 2
2 ⎠
2 2
⎝ 2 ⎠
⎝
I
⎛ 1
⎜1 −
⎝ 2
⎛ 1
⎜1 −
⎝ 2
⎛ 1
⎜1 −
⎝ 2
⎛ 1
⎜1 −
⎝ 2
3 1
⎞
j ⎟ ⋅ (1 + j ) = − − j
2 2
⎠
1 3
⎞
j ⎟ ⋅ (1 − j ) = − j
2 2
⎠
1 3
⎞
j ⎟ ⋅ (− 1 + j ) = − + j
2 2
⎠
3 1
⎞
j ⎟ ⋅ (− 1 − j ) = + j
2 2
⎠
1
⎛
⎜ −1 +
2
⎝
1
⎛
⎜ −1 +
2
⎝
1
⎛
⎜ −1 +
2
⎝
3 1
⎞
j ⎟ ⋅ (1 + j ) = + j
2 2
⎠
1 3
⎞
j ⎟ ⋅ (1 − j ) = − + j
2 2
⎠
1 3
⎞
j ⎟ ⋅ (− 1 + j ) = − j
2 2
⎠
1 ⎞
3 1
⎛
⎜ − 1 + j ⎟ ⋅ (− 1 − j ) = − − j
2 ⎠
2 2
⎝
figure 178
227
scrambling code are used;
Unbalance QPSK;
G=βd/βc=0 dB
scrambling code are used;
Unbalance QPSK;
G=βd/βc=6 dB
figure 179
•
G=βc/βd=-10 dB and G=βc/βd=-20 dB
scrambling code are used;
Unbalance QPSK;
G=βd/βc=10 dB
scrambling code are used;
Unbalance QPSK;
G=βd/βc=20 dB
figure 180
228
The I-Q/code multiplexing solution with complex scrambling result in a power amplifier
output back-off requirements that remain constant as a function of the power difference
between DPDCH and DPCCH.
The power difference between DPDCH and DPCCH has been quantified in UTRA
physical layer specifications to 4-bit words, i.e. 16 different values. At a given point in
time the gain value for either DPDCH or DPCCH is set to 1 and then for the other
channels a value between 0 and 1 is applied to reflect the desired power difference
between channels.
Limiting the number of possible values to 4-bit representation is necessary to make the
terminal transmitter implementation simple. The power difference can have 15 different
values between -23.5 dB and 0 dB and one bit combination for non DPDCH when there
is non data to be transmitted.
UTRA will face challenges in amplifier efficiency when compared to GSM. The GSM
modulation is GMSK (Gaussian Minimum Khift Leyng) which has a constant envelope
and is thus optimized for amplifier peak-to-average ratio. As a narrowband system, the
GSM signal can be spread relatively more widely in the frequency domain.
This allows the use of a less linear amplifier with better power conversion efficiency.
Narrowband amplifiers are also easier to linearize if necessary. In practice, the
efficiency of the WCDMA power amplifier is slightly lower than that of the GSM
power amplifier. On the other hand, WCDMA uses fast power control in the uplink,
which reduces the average required transmission power.
229
22.7.3
Three UL parallel channel
Using three parallel channel one DPCCH and two DPDCH, we have the following
scheme:
cd,1
βd
DPDCH1
SC
I
cd,6
βd
cc
βc
I+jQ
S
DPDCH2
DPCCH
Σ
Q
j
figure 181
22.7.3.1
No Scrambling Code Operation
Supposing βc=βd=1; than on the I branch the normalized signal value are the same i.e.
±1.
Diversely on the Q branch the amplitude of two channel DPDCH and DPCCH channels
is added, therefore the chip to chip sum give four possible values: (1+1)=2; (1-1)=0; (1+1)=0; (-1-1)=-2.
Obviously the complex value on the Q branch is obtained multiplying by j, therefore the
possible values for the branch are (2J, 0 ,-2J).
The corresponding constellation and spectrum FFT of the output modulated RF signal
are:
230
Q
+2
j
I
-1
1
2j
figure 182: FFT and constellation obtained with 1 DPCCH + 2 DPDCH, βc=βd=1 e without SC
The constellation points coordinates are: (1+0j) (-1+0j) (1+2j) (-1+2j) (1-2j) (-1-2j).
The WINIQ configuration is shown below:
figure 183: configuration without scrambling code
231
22.7.3.2
Scrambling Code Operation
Multiplying I+jQ signal by scrambling code, we get the following result:
(1 + 0 j ) ⋅ (1 + j ) = +1 + j
(1 + 0 j ) ⋅ (1 − j ) = +1 − j
(1 + 0 j ) ⋅ (− 1 + j ) = −1 + j
(1 + 0 j ) ⋅ (− 1 − j ) = −1 − j
(− 1 + 0 j ) ⋅ (1 + j ) = −1 − j
(− 1 + 0 j ) ⋅ (1 − j ) = −1 + j
(− 1 + 0 j ) ⋅ (− 1 + j ) = +1 −
(− 1 + 0 j ) ⋅ (− 1 − j ) = +1 +
(1 + 2 j ) ⋅ (1 + j ) = +1 + j + 2 j − 2 = −1 + 3 j
(1 + 2 j ) ⋅ (1 − j ) = +1 − j + 2 j + 2 = 3 + j
(1 + 2 j ) ⋅ (− 1 + j ) = −1 + j − 2 j − 2 = −3 − j
(1 + 2 j ) ⋅ (− 1 − j ) = −1 − j − 2 j + 2 = 1 − 3 j
(− 1 + 2 j ) ⋅ (1 + j ) = −1 − j + 2 j − 2 = −3 + j
(− 1 + 2 j ) ⋅ (1 − j ) = −1 + j + 2 j + 2 = 1 + 3 j
(− 1 + 2 j ) ⋅ (− 1 + j ) = +1 − j − 2 j − 2 = −1 − 3 j
(− 1 + 2 j ) ⋅ (− 1 − j ) = +1 + j − 2 j + 2 = 3 − j
(1 − 2 j ) ⋅ (1 + j ) = +1 + j − 2 j + 2 = +3 − j
(1 − 2 j ) ⋅ (1 − j ) = +1 − j − 2 j − 2 = −1 − 3 j
(1 − 2 j ) ⋅ (− 1 + j ) = −1 + j + 2 j + 2 = +1 + 3 j
(1 − 2 j ) ⋅ (− 1 − j ) = −1 − j + 2 j − 2 = −3 + j
(− 1 − 2 j ) ⋅ (1 + j ) = −1 − j − 2 j + 2 = +1 − 3 j
(− 1 − 2 j ) ⋅ (1 − j ) = −1 + j − 2 j − 2 = −3 − j
(− 1 − 2 j ) ⋅ (− 1 + j ) = +1 − j + 2 j + 2 = +3 + j
(− 1 − 2 j ) ⋅ (− 1 − j ) = +1 + j + 2 j − 2 = −1 + 3 j
j
j
Q
1
2
3
I
figure 184: constellation obtained with 1 DPCCH + 2 DPDCH, ( βc=βd=1 e with SC
232
Simulations by WINIQ software are shown below:
figure 185: configuration of channels with scrambling code
figure 186: constellation obtained with 1 DPCCH + 2 DPDCH, βc=βd=1 e with SC
The output amplitude as well as the constellation configuration is changed; this
constellation permits a more efficient use of final amplifier.
233
figure 187: FFT magnitude and Eye Diagram of constellation obtained with 1 DPCCH + 2 DPDCH, βc=βd=1
e with SC.
22.7.3.2.1
Changing of the βc and βd
The changes of βc=βd bring to a different constellation, for instance if we get
DPCCH+DPDCH1+DPDCH2 and βc=1/2, βd=1 e SC long, then the constellation is:
figure 188: configuration panel
234
S
figure 189: constellation and vector constellation with: DPCCH+DPDCH1+DPDCH2 and βc=1/2, βd=1 e SC
long
figure 190: FFT Magnitude and Eye I(channel) figure with :DPCCH+DPDCH1+DPDCH2 and βc=1/2, βd=1
and SC long
235
From figure above we note that the FFT magnitude remains the same for both
configurations i.e. βc=1, βd=1 and βc=1/2, βd=1.
22.7.4
Filtering
Until now we have been considered transmission without any kind of filtering action.
Because we have no-unlimited bandwidth we must consider a filtering system, thus
reducing the bandwidth and simultaneously without introducing to much inter-symbol
interference.
Choosing a Rised Cosine Filter with r=0.22 in Tx end Rx we obtain the following:
figure 191: panel configuration
figure 192: FFT Magnitude and Eye I(channel) figure with :DPCCH+DPDCH1+DPDCH2 and βc=1/2, βd=1
and SC long and Tx/Rx Rised Cosine Filter with Rolloff Factor r=0.22
236
figure 193: constellation and vector constellation with: DPCCH+DPDCH1+DPDCH2 and βc=1/2, βd=1 and SC
long and Tx/Rx Rised Cosine Filter with Rolloff Factor r=0.22.
After filtering operation we can observe haw the bandwidth has been limited to
approximately 5(Mhz) ≅3.84*(1+0.22) but at the same time the Intersymbol interference
has been increased. Choosing a rolloff factor r=0.62 the situation became the following:
237
22.8 Downlink Spreading and Modulation
The spreading and scrambling concept for all downlink physical channels is illustrated in
figure below.
P-SCH
Gp
S-SCH
Any d-link
phisical
channel
except SCH
Seri
al to
Para
llel
con
Cos(ωt)
Sdl,n
I
I+jQ
cch,SF,m
GS
I
S
Q
G1
DL modulated
signal
Q
-sin(ωt)
J
G2
figure 194 : spreading and scrambling scheme for all downlink physical channel
Apart from SCHs, each pair of to consecutive symbols is first serial-to-parallel converted
and mapped onto I and Q branches. The I and Q branches are then spread to the chip
rate by the same channelisation code Cch,SF,m. The sequence of real-valued chips on
the I and Q branches are then scrambled using a complex-valued scrambling code,
denoted Sdl,n . The scrambling code is applied aligned with the scrambling code applied
to the P-CCPCH, where the first complex chip of the spread P-CCPCH frame is
multiplied by chip number zero of the scrambling code.
After spreading, each physical downlink channel (except SCHs) is separately weighted
by a weigh factor, denoted Gi. The comlex-valued P-SCH and S-SCH are separately
weighted by weight factor GP and GS.
All downlink physical channel are combined using a complex addition and the resulting
sequence generated by spreading and scrambling process is then QPSK modulated.
22.8.1
Downlink Spreading Codes
In the downlink the same channelisation codes as in the uplink (OVSF codes) are used.
Typically only one code tree per cell is used and the code tree under a single
scrambling code is then shared between several users.
By definition, the channelisation codes used for P-CPICH and P-CCPCH are Cch,256,0
and Cch,256,1 respectively.
In compressed mode there are three methods for generating gaps:
238
•
•
•
Rate matching
Reduction of the spreading factor by a factor of 2
higher-layer scheduling.
When the mechanism for opening the gap is to reduce the SF by factor of 2, the OVSF
code used for compressed frames is Cch,SF/2,[n/2] if and ordinary scrambling code is used,
and Cch,SF/2,n mod SF/2 if an alternative scrambling code is used where, Cch,SF,n is the
channelisation code used for non compressed frames.
In the downlink the SF of the dedicated physical channel does not vary on
frame-by-frame basis.
The dedicated physical channel (DPCH) structure is shown in figure below. In this
model each two-bit pair represents an I/Q pair of QPSK modulation (symbol).
As shown in the figure, the frame structure consists of a sequence of radio frames.
One radio frame (10 ms, 38400 chips) corresponds to 15 slots and one slot
corresponds to 2560 chips 1 (2/3 ms, i.e. 0.667 ms 2), which equals one power control
period (PC period).
N.B.: 38400 chips in 10 ms ⇒ 3840000
chips/second, i.e. 3.84 Mchips/second
Radio frame
(10 ms, 38400 chips)
#0
#1
# 71
#1
# 14
Slot (i.e. one PC period)
(0.667 ms, 2560 chips)
#0
Data
DPDCH
Uplink
structure
DPCCH
Pilot
TFCI
FBI
TPC
I/Q code
multiplexed
with complex
scrambling
Time multiplexed with complex scrambling
Downlink
structure
Data
DPDCH
TPC
TFCI
DPCCH
Data
Pilot
DPDCH
DPCCH
The data rate variation on the DPCH is managed by a rate-matching operation or by L1
discontinuous transmission (DTX), where the transmission is interrupted during a part of
the DPDCH slot.
In the case of multicode transmission, the parallel code channels have different
channelisation codes but the same spreading factor under the same scrambling code.
1
2
38400 chips / 15 slots = 2560 chips/slot.
10 ms / 15 slots = 2/3 ms/slot, i.e. 0.667 ms/slot
239
Different spreading factors may employed in the case of several CCTrCHs received by
the same UE.
The OVSF code my vary from frame to frame on the PDSCH. The rule is that the OVSF
code(s) below the smallest spreading factor is from the branch of the code tree pointed
by the code with smallest spreading factor used for that connection.
240
23 ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING
(OFDM)
23.1 Introduction
Research has just recently begun on the development of 4th generation (4G) mobile
communication systems. The commercial rollout of these systems is likely to begin
around 2008 - 2012, and will replace 3rd generation technology. Few of the aims of 4G
networks have yet been published, however it is likely that they will be to extend the
capabilities of 3G networks, allowing a greater range of applications, and improved
universal access. Ultimately 4G networks should encompass broadband wireless
services, such as High Definition Television (HDTV) (4 - 20 Mbps) and computer
network applications (1 - 100 Mbps). This will allow 4G networks to replace many of the
functions of WLAN systems. However, to cover this application, cost of service must be
reduced significantly from 3G networks. The spectral efficiency of 3G networks is too
low to support high data rate services at low cost.
As a consequence one of the main focuses of 4G systems will be to significantly
improve the spectral efficiency.
figure 195: Current and future mobile systems. The general trend will be to
provide higher data rates and greater mobility.
Orthogonal Frequency Division Multiplexing (OFDM) is an alternative wireless
modulation technology to CDMA. OFDM has the potential to surpass the capacity of
CDMA systems and provide the wireless access method for 4G systems.
OFDM is a modulation scheme that allows digital data to be efficiently and reliably
transmitted over a radio channel, even in multipath environments. OFDM transmits data
by using a large number of narrow bandwidth carriers. These carriers are regularly
spaced in frequency, forming a block of spectrum. The frequency spacing and time
synchronisation of the carriers is chosen in such a way that the carriers are orthogonal,
241
meaning that they do not cause interference to each other. This is despite the carriers
overlapping each other in the frequency domain. The name ‘OFDM’ is derived from the
fact that the digital data is sent using many carriers, each of a different frequency
(Frequency Division Multiplexing) and these carriers are orthogonal to each other,
hence Orthogonal Frequency Division Multiplexing. The origins of OFDM development
started in the late 1950’s with the introduction of Frequency Division Multiplexing (FDM)
for data communications. In 1966 Chang patented the structure of OFDM and
published the concept of using orthogonal overlapping multi-tone signals for data
communications. In 1971 Weinstein introduced the idea of using a Discrete Fourier
Transform (DFT) for implementation of the generation and reception of OFDM signals,
eliminating the requirement for banks of analog subcarrier oscillators. This presented an
opportunity for an easy implementation of OFDM, especially with the use of Fast Fourier
Transforms (FFT), which are an efficient implementation of the DFT. This suggested
that the easiest implementation of OFDM is with the use of Digital Signal Processing
(DSP), which can implement FFT algorithms. It is only recently that the advances in
integrated circuit technology have made the implementation of OFDM cost effective.
The reliance on DSP prevented the wide spread use of OFDM during the early
development of FDM. It wasn’t until the late 1980’s that work began on the
development of OFDM for ommercial use, with the introduction of the Digital Audio
Broadcasting (DAB) system.
23.2 Digital Audio Broadcasting
DAB was the first commercial use of OFDM technology. Development of DAB started in
1987 and services began in U.K and Sweden in 1995. DAB is a replacement for FM
audio broadcasting, by providing high quality digital audio and information services.
OFDM was used for DAB due to its multipath tolerance.
Broadcast systems operate with potentially very long transmission distances (20 -100
km). As a result, multipath is a major problem as it causes extensive ghosting of the
transmission. This ghosting causes Inter-Symbol Interference (ISI), blurring the time
domain signal. For single carrier transmissions the effects of ISI are normally mitigated
using adaptive equalisation. This process uses adaptive filtering to approximate the
impulse response of the radio channel. An inverse channel response filter is then used
to recombine the blurred copies of the symbol bits. This process is however complex
and slow due to the locking time of the adaptive equaliser. Additionally it becomes
increasing difficult to equalise signals that suffer ISI of more than a couple of symbol
periods.
OFDM overcomes the effects of multipath by breaking the signal into many narrow
bandwidth carriers. This results in a low symbol rate reducing the amount of ISI. In
addition to this, a guard period is added to the start of each symbol, removing the
effects of ISI for multipath signals delayed less than the guard period. The high
tolerance to multipath makes OFDM more suited to high data transmissions in terrestrial
environments than single carrier transmissions.
242
table 10: DAB Transmission parameters for each transmission mode
Table above, shows the system parameters for DAB. DAB has four transmission
modes. The transmission frequency, receiver velocity and required multipath tolerance
all determine the most suitable transmission mode to use.
Doppler spread is caused by rapid changes in the channel response due to movement
of the receiver through a multipath environment. It results in random frequency
modulation of the OFDM subcarriers, leading to signal degradation. The amount of
Doppler spread is proportional to the transmission frequency and the velocity of
movement. The closer the subcarriers are spaced together, the more susceptible the
OFDM signal is to Doppler spread, and so the different transmission modes in DAB
allow trade off between the amount of multipath protection (length of the guard period)
and the Doppler spread tolerance.
23.3 Digital Video Broadcasting
The development of the Digital Video Broadcasting (DVB) standards was started in
1993. DVB is a transmission scheme based on the MPEG-2 standard, as a method for
point to multipoint delivery of high quality compressed digital audio and video. It is an
enhanced replacement of the analogue television broadcast standard, as DVB provides
a flexible transmission medium for delivery of video, audio and data services. The DVB
standards specify the delivery mechanism for a wide range of applications, including
satellite TV (DVB-S), cable systems (DVB-C) and terrestrial transmissions (DVB-T). The
physical layer of each of these standards is optimised for the transmission channel
being used. Satellite broadcasts use a single carrier transmission, with QPSK modulation,
which is optimised for this application as a single carrier allows for large Doppler shifts, and
QPSK allows for maximum energy efficiency. This transmission method is however unsuitable
for terrestrial transmissions as multipath severely degrades the performance of high-speed single
carrier transmissions. For this reason, OFDM was used for the terrestrial transmission standard
for DVB. The physical layer of the DVB-T transmission is similar to DAB, in that the
OFDM transmission uses a large number of subcarriers to mitigate the effects of
243
multipath. DVB-T allows for two transmission modes depending on the number of
subcarriers used. Table below shows the basic transmission parameters for these two
modes. The major difference between DAB and DVB-T is the larger bandwidth used
and the use of higher modulation schemes to achieve a higher data throughput. The
DVB-T allows for three subcarrier
modulation schemes: QPSK, 16-QAM (Quadrature Amplitude Modulation) and 64-QAM;
and a range of guard period lengths and coding rates. This allows the robustness of the
transmission link to be traded at the expense of link capacity. Table below shows the
data throughput and required SNR for some of the transmission combinations.
DVB-T is a uni-directional link due to its broadcast nature. Thus any choice in data rate
verses robustness affects all receivers. If the system goal is to achieve high reliability,
the data rate must be lowered to meet the conditions of the worst receiver.
table 11: DVB transmission parameters
table 12: SNR required and net bit rate for a selection of the coding and modulation combinations for
DVB. Note: Code rate can be any of the following values: 1/2, 2/3, 3/4, 5/6, 7/8. The Guard Period
duration can be any following values: 1/4, 1/8, 1/16, 1/32.
23.4 Basic principle of OFDM
Orthogonal Frequency Division Multiplexing (OFDM) is very similar to the well known
and used technique of Frequency Division Multiplexing (FDM). OFDM uses the
principles of FDM to allow multiple messages to be sent over a single radio channel. It is
however in a much more controlled manner, allowing an improved spectral efficiency.
A simple example of FDM is the use of different frequencies for each FM (Frequency
Modulation) radio stations. All stations transmit at the same time but do not interfere
with each other because they transmit using different carrier frequencies. Additionally
244
they are bandwidth limited and are spaced sufficiently far apart in frequency so that their
transmitted signals do not overlap in the frequency domain. At the receiver, each signal
is individually received by using a frequency tuneable band pass filter to selectively
remove all the signals except for the station of
interest. This filtered signal can then be demodulated to recover the original transmitted
information.
OFDM is different from FDM in several ways. In conventional broadcasting each radio
station transmits on a different frequency, effectively using FDM to maintain a
separation between the stations. There is however no coordination or synchronisation
between each of these stations. With an OFDM transmission such as DAB, the
information signals from multiple stations is combined into a single multiplexed stream
of data. This data is then transmitted using an OFDM ensemble that is made up from a
dense packing of many subcarriers. All the subcarriers within the OFDM signal are time
and frequency synchronised to each other, allowing the interference between
subcarriers to be carefully controlled. These multiple subcarriers overlap in the
frequency domain, but do not cause Inter-Carrier Interference (ICI) due to the
orthogonal nature of the modulation. Typically with FDM the transmission signals need
to have a large frequency guard-band between channels to prevent interference. This
lowers the overall spectral efficiency. However with OFDM the orthogonal packing of the
subcarriers greatly reduces this guard band, improving the spectral efficiency.
Each of the carriers in a FDM transmission can use an analogue or digital modulation
scheme. There is no synchronisation between the transmission and so one station could
transmit using FM and another in digital using FSK. In a single OFDM transmission all
the subcarriers are synchronised to each other, restricting the transmission to digital
modulation schemes. OFDM is symbol based, and can be thought of as a large number
of low bit rate carriers transmitting in parallel. All these carriers transmit in unison using
synchronised time and frequency, forming a single block of spectrum. This is to ensure
that the orthogonal nature of the structure is maintained. Since these multiple carriers
form a single OFDM transmission, they are commonly referred to as ‘subcarriers’, with
the term of ‘carrier’ reserved for describing the RF carrier mixing the signal from base
band. There are several ways of looking at what make the subcarriers in an OFDM
signal orthogonal and why this prevents interference between them.
OFDM is a multi carrier modulation scheme that transmits data over a number of subcarriers. A conventional transmission uses only a single carrier, which is modulated with
all the data to be sent. OFDM breaks the data to be sent in to small chunks, allocating
each sub data stream to a sub-carrier. The data is sent in parallel, so that instead of
sending just a single bit of information per symbol, many bits are sent per symbol. The
symbol rate for OFDM is N times lower than single carrier modulation, where N is the
number of subcarriers in the OFDM transmission.
245
power
Conventional
sigle carrier
frequency
OFDM
frequency
figure 196: in EFDM data is transmitted over many narrow bandwidth carriers
23.5 Orthogonality
Signals are orthogonal if they are mutually independent of each other. Orthogonality is a
property that allows multiple information signals to be transmitted perfectly over a
common channel and detected, without interference. Loss of orthogonality results in
blurring between these information signals and degradation in communications.
Many common multiplexing schemes are inherently orthogonal. Time Division
Multiplexing (TDM) allows transmission of multiple information signals over a single
channel by assigning unique time slots to each separate information signal. During each
time slot only the signal from a single source is transmitted preventing any interference
between the multiple information sources. Because of this TDM is orthogonal in nature.
In the frequency domain most FDM systems are orthogonal as each of the separate
transmission signals are well spaced out in frequency preventing interference. Although
these methods are orthogonal the term OFDM has been reserved for a special form of
FDM.
The subcarriers in an OFDM signal are spaced as close as is theoretically possible
while maintain orthogonality between them.
OFDM achieves orthogonality in the frequency domain by allocating each of the
separate information signals onto different subcarriers. OFDM signals are made up from
a sum of sinusoids, with each corresponding to a subcarrier. The baseband frequency
of each subcarrier is chosen to be an integer multiple of the inverse of the symbol time,
resulting in all subcarriers having an integer number of cycles per symbol. As a
consequence the subcarriers are orthogonal to each other. Figure below shows the
construction of an OFDM signal with four subcarriers
246
figure 197: Time domain construction of an OFDM signal:
(1a), (2a), (3a) and (4a) show individual subcarriers, with 1, 2, 3, and 4 cycles per symbol
respectively. The phase on all these subcarriers is zero. Note, that each subcarrier has an integer
number of cycles per symbol, making them cyclic. Adding a copy of the symbol to the end would
result in a smooth join between symbols. Plot (1b), (2b), (3b) and (4b) show the FFT of the time
waveforms in (1a), (2a), (3a) and (4a) respectively. (4a) and (4b) shows the result for the summation
of the 4 subcarriers
Orthogonal Frequency Division Multiplexing (OFDM), is a technique for transmitting data
in parallel by using a large number of modulated carriers with sufficient frequency
spacing so that the carriers are orthogonal. OFDM provides resistance to data errors
caused by multipath channels.
Over a T-sec interval, the complex envelope for the OFDM signal is:
N −1
g (t ) = Ac ∑ ω nϕ n (t ),
where 0 < t < T
eq 321
n =0
where:
Ac is the carrier amplitude
ωn is the element of the N-element parallel data vector w =[ω0, ω1,…….., ωN-1]
The orthogonal carriers are
ϕ n (t ) = e j 2π f t
n
eq 322
where
247
fn =
N −1 ⎞
1⎛
⎜n −
⎟
T⎝
2 ⎠
⎧
1 ⎛ N −1 ⎞ ⎫
⎪⎪ for n = 0 ⇒ f n = T ⎜ − 2 ⎟ ⎪⎪
⎝
⎠
⇒⎨
⎬
−
1
1 ⎞⎪
N
⎪ for n = N − 1 ⇒ f n = ⎛⎜ +
⎟
⎪⎩
2 ⎠⎪⎭
T⎝
eq 323
The duration of the data symbol on each carrier is T seconds, and carriers are spaced
1/T Hz apart in fact:
f n+1 − f n =
1⎛
N −1⎞ 1 ⎛
N −1⎞ 1
⎜n +1−
⎟ − ⎜n −
⎟ =
2 ⎠ T⎝
2 ⎠ T
T⎝
eq 324
This assures that the carriers are orthogonal, since ϕn(t) satisfy the orthogonality
condition over the T-sec interval:
b
∫ϕ
n
(t )ϕ m* (t )dt = 0
eq 325
a
in fact recalling that:
b
∫ϕ
n
fn =
1⎛
N −1 ⎞
1⎛
N −1 ⎞
⎜n −
⎟ and f m = ⎜ m −
⎟ with n≠m consequently:
T⎝
2 ⎠
T⎝
2 ⎠
(t )ϕ m* (t )dt = 0
a
T
⇒ ∫e
j 2πf nt
0
e
− j 2πf mt
T
dt = ∫ e
j 2π ( f n − f m ) t
0
T
1
dt =
j 2π ( f n − f m )e j 2π ( f n − f m ) t =
∫
j 2π ( f n − f m ) 0
T
⎡ j 2π ⎡⎢ 1 ⎛⎜ n− N −1 ⎞⎟− 1 ⎛⎜ m− N −1 ⎞⎟ ⎤⎥ t ⎤
1
⎢e ⎣ T ⎝ 2 ⎠ T ⎝ 2 ⎠ ⎦ ⎥ =
⎡1 ⎛
N −1 ⎞ 1 ⎛
N − 1 ⎞⎤ ⎢
⎥⎦
j 2π ⎢ ⎜ n −
0
⎟ − ⎜m −
⎟⎥ ⎣
2 ⎠ T⎝
2 ⎠⎦
⎣T ⎝
T
⎡ j 2π ⎡⎢ T1 ( n−m )⎤⎥ t ⎤
⎡ j 2π ⎡⎢ T1 (n−m )⎤⎥T ⎤
1
⎦
⎦
− 1⎥ =
⎢e ⎣
⎢e ⎣
⎥ =
1
⎡1
⎤ ⎢⎣
⎡
⎤
⎥⎦
⎥
⎢
⎦ 0 j 2π (n − m ) ⎣
j 2π ⎢ (n − m )⎥
⎢
⎥
⎣T
⎦
⎣T
⎦
1
1
[cos[2π (n − m )] + j sin[2π (n − m )] − 1]
=
e j 2π ( n − m ) − 1 =
⎡1
⎤
⎡1
⎤
j 2π ⎢ (n − m )⎥
j 2π ⎢ (n − m )⎥
⎣T
⎦
⎣T
⎦
1
[1 − 1] = 0
=
⎡1
⎤
j 2π ⎢ (n − m )⎥
eq 326
⎣T
⎦
1
[
]
248
Because the carriers are orthogonal, data can be detected on each of these closely
spaced carriers without interference from the other carriers.
Another way of thinking to orthogonality concept is that if we look at a matched receiver
for one of the orthogonal functions, a subcarrier in the case of OFDM, then the receiver
will only see the result for that function. The results from all other functions in the set
integrate to zero, and thus have no effect.
Equation below shows a set of orthogonal sinusoids, which represent the subcarriers
for an unmodulated real OFDM signal.
k = 1,2,......M ⎫
0<t <T
⎧sin( 2πkf 0t )
sk (t ) = ⎨
⎬
otherwise
0
⎩
⎭
eq 327
Where f0 is the carrier spacing, M is the number of carriers, T is the symbol period.
Since the highest frequency component is Mf0 the transmission bandwidth is also Mf0.
These subcarriers are orthogonal to each other because when we multiply the
waveforms of any two subcarriers and integrate over the symbol period the result is
zero. Multiplying the two sine waves together is the same as mixing these subcarriers.
This results in sum and difference frequency components, which will always be integer
subcarrier frequencies, as the frequency of the two mixing subcarriers has integer
number of cycles. Since the system is linear we can integrate the result by taking the
integral of each frequency component separately then combining the results by adding
the two sub-integrals. The two frequency components after the mixing have an integer
number of cycles over the period and so the sub-integral of each component will be
zero, as the integral of a sinusoid over an entire period is zero. Both the sub-integrals
are zeros and so the resulting addition of the two will also be zero, thus we have
established that the frequency components are orthogonal to each other.
23.5.1
FREQUENCY DOMAIN ORTHOGONALITY
Another way to view the orthogonality property of OFDM signals is to look at its
spectrum. In the frequency domain each OFDM subcarrier has a sinc, sin(x)/x,
frequency response, as shown in Figure below. This is a result of the symbol time
corresponding to the inverse of the carrier spacing. As far as the receiver is concerned
each OFDM symbol transmitted for a fixed time (TFFT) with no tapering at the ends of the
symbol. This symbol time corresponds to the inverse of the subcarrier spacing of 1/TFFT
Hz 1. This rectangular, boxcar, waveform in the time domain results in a sinc frequency
response in the frequency domain. The sinc shape has a narrow main lobe, with many
side-lobes that decay slowly with the magnitude of the frequency difference away from
the centre. Each carrier has a peak at the centre frequency and nulls evenly spaced
with a frequency gap equal to the carrier spacing.
The orthogonal nature of the transmission is a result of the peak of each subcarrier
corresponding to the nulls of all other subcarriers. When this signal is detected using
249
a Discrete Fourier Transform (DFT) the spectrum is not continuous as shown in Figure
below, but has discrete samples. The sampled spectrum are shown as ‘o’s in the figure.
If the DFT is time synchronised, the frequency samples of the DFT correspond to just
the peaks of the subcarriers, thus the overlapping frequency region between subcarriers
does not affect the receiver. The measured peaks correspond to the nulls for all other
subcarriers, resulting in orthogonality between the subcarriers.
figure 198: Frequency response of the subcarriers in a 5 tone OFDM signal.
(a) shows the spectrum of each carrier, and the discrete frequency samples seen
by an OFDM receiver. Note, each carrier is sinc, sin(x)/x, in shape.
(b) Shows the overall combined response of the 5 subcarriers (thick black line).
23.6 OFDM generation and reception
OFDM signals are typically generated digitally due to the difficulty in creating large
banks of phase lock oscillators and receivers in the analog domain. Figure below shows
the block diagram of a typical OFDM transceiver. The transmitter section converts digital
data to be transmitted, into a mapping of subcarrier amplitude and phase. It then
transforms this spectral representation of the data into the time domain using an
Inverse Discrete Fourier Transform (IDFT). The Inverse Fast Fourier Transform
(IFFT) performs the same operations as an IDFT, except that it is much more
computationally efficiency, and so is used in all practical systems. In order to transmit
the OFDM signal the calculated time domain signal is then mixed up to the required
frequency.
The receiver performs the reverse operation of the transmitter, mixing the RF signal to
base band for processing, then using a Fast Fourier Transform (FFT) to analyse the
signal in the frequency domain. The amplitude and phase of the subcarriers is then
picked out and converted back to digital data.
250
Carrier
Phase
Serial
TX
data
Serial
to
para.
TRANSMITTER
Subcarrier
Modulation
&
Mapping
IFFT
I
Q
Carrier
Amplitude
I
Guard
Period
Insertion
Frame
Sync
Insertion
Q
Para
To
Serial
RF
Modulation
Amplifier
Q
Time Waveform
Frequency Correction
Serial
RX
data
I
Carrier
Modulation Phase FFT
Slicer
I
Guard
Period
Removal
I
RF
Demod
Amplifier
Q
Q
Carrier
Amplitude
OL
Time Sync
Frame
Detection
RECEIVER
figure 199
23.6.1
Serial To Parallel Conversion
Data to be transmitted is typically in the form of a serial data stream. In OFDM, each
symbol typically transmits 40 - 4000 bits, and so a serial to parallel conversion stage
is needed to convert the input serial bit stream to the data to be transmitted in each
OFDM symbol. The data allocated to each symbol depends on the modulation scheme
used and by the number of subcarriers. For example, for a subcarrier modulation of
16-QAM each subcarrier carries 4 bits of data, and so for a transmission using 100
subcarriers the number of bits per symbol would be 400.
For adaptive modulation schemes, the modulation scheme used on each subcarrier can
vary and so the number of bits per subcarrier also varies. As a result the serial to
parallel conversion stage involves filling the data payload for each subcarrier. At the
receiver the reverse process takes place, with the data from the subcarriers being
converted back to the original serial data stream.
When an OFDM transmission occurs in a multipath radio environment, frequency
selective fading can result in groups of subcarriers being heavily attenuated, which in
turn can result in bit errors. These nulls in the frequency response of the channel can
cause the information sent in neighbouring carriers to be destroyed, resulting in a
clustering of the bit errors in each symbol. Most Forward Error Correction (FEC)
schemes tend to work more effectively if the errors are spread evenly, rather than in
251
large clusters, and so to improve the performance most systems employ data
scrambling as part of the serial to parallel conversion stage. This is implemented by
randomising the subcarrier allocation of each sequential data bit. At the receiver the
reverse scrambling is used to decode the signal. This restores the original sequencing
of the data bits, but spreads clusters of bit errors so that they are approximately
uniformly distributed in time. This randomisation of the location of the bit errors improves
the performance of the FEC and the system as a whole.
23.6.2
Subcarrier modulation and mapping
Once each subcarrier has been allocated bits for transmission, they are mapped using a
modulation scheme to a subcarrier amplitude and phase, which is represented by a
complex In-phase and Quadrature-phase (IQ) vector. Figure below shows an example
of subcarrier modulation mapping. This example shows 16-QAM, which maps 4 bits for
each symbol. Each combination of the 4 bits of data corresponds to a unique IQ vector,
shown as a dot on the figure. A large number of modulation schemes are available
allowing the number of bits transmitted per carrier per symbol to be varied.
figure 200:
Example IQ modulation constellation. 16-QAM, with gray coding
of the data to each location
Subcarrier modulation can be implemented using a lookup table, making it very efficient
to implement.
In the receiver, mapping the received IQ vector back to the data word performs
subcarrier demodulation. During transmission, noise and distortion becomes added to
the signal due to thermal noise, signal power reduction and imperfect channel
equalisation. Figure below shows an example of a received 16-QAM signal with a SNR
of 18 dB. Each of the IQ points is blurred in location due to the channel noise. For each
received IQ vector the receiver has to estimate the most likely original transmission
vector. This is achieved by finding the transmission vector that is closest to the received
vector. Errors occur when the noise exceeds half the spacing between the transmission
IQ points, making it cross over a decision boundary.
252
figure 201: IQ plot for 16-QAM data with added noise.
23.6.3
Frequency to time domain conversion
After the subcarrier modulation stage each of the data subcarriers is set to an
amplitude and phase based on the data being sent and the modulation scheme; all
unused subcarriers are set to zero. This sets up the OFDM signal in the frequency
domain. An IFFT is then used to convert this signal to the time domain, allowing it to
be transmitted. Figure below shows the IFFT section of the OFDM transmitter. In the
frequency domain, before applying the IFFT, each of the discrete samples of the IFFT
corresponds to an individual subcarrier. Most of the subcarriers are modulated with
data. The outer subcarriers are unmodulated and set to zero amplitude. These zero
subcarriers provide a frequency guard band before the Nyquist frequency and
effectively act as an interpolation of the signal and allows for a realistic roll off in the
analog anti-aliasing reconstruction filters.
Time
End
Frequency
I
Input
data
SubcarrierM
odulation &
Mapping.
Parallel
to Serial
IFFT
IQ vector
Amplitue and
phase
zeros
Output baseband
OFDM signal
Q
Guard
Period
Symbol
start
253
23.7 OFDM Transmitter
A key advantage of OFDM is that it can be generated by using FFT digital signal
processing techniques. For example, if we suppress the frequency offset (N-1)/2T of
equation:
ϕ n (t ) = e j 2π f t
where
n
i.e.
fn =
n
T
N −1⎞
1⎛
⎜n −
⎟
T⎝
2 ⎠
fn =
then ϕ n (t ) = e
N −1
N −1
n =0
n =0
n
j 2π t
T
eq 328
= e j 2 kπ where t = k
g (t ) = Ac ∑ wnϕ n = Ac ∑ wn e j 2 kπ where
T
, and substitute into equation;
n
w = [w0 , w1 , w2 ,......wn−1 ]
eq 329
then the elements of the IFFT vector, as defined by the equation already seen, are
obtained.
n = +∞
n = +∞
n = −∞
n = −∞
W ( f ) = H ( f ) ∑ f 0δ ( f − nf 0 ) =
∑ f H (nf
0
0
)δ ( f − nf 0 )
Thus, the OFDM signal may be generated by using the IFFT algorithms as shown in
figure below.
In that figure, the complex envelope, g(t), is described by the I and Q components x(t)
and y(t), where g(t)=x(t) and jy(t).
Baseband signal processing
w
RF circuits
g
x(t)
m(t)
Serial
data
Serial to
Parallel
converter
IFFT
Parallel
to Serial
converter
+
cos(ωct)
y(t)
-90°
phase
shift
OFDM
signal
sin(ωct)
Carrier
oscillator, fc
v(t)=x(t)cos(ωct)-y(t)sin(ωct)
figure 202: OFDM Transmitter
254
Let the input serial data symbol have a duration of Ts second each. These data can be
binary (±1) to produce BPSK modulated carriers or can be multilevel complex-valued
serial data to produce (as appropriate) QPSK, MPSK, or QAM carriers.
Ds=1/Ts, is the input symbol (baud) rate. The serial-to-parallel converter reads in N input
serial symbol at a time and hold their values (element of w) on the parallel output line
for T=NTs seconds, where T is the time span of the IFFT. The IFFT uses w to evaluate
output IFFT vector g, which contains elements representing samples of the complex
envelope.
The parallel-to-serial converter shifts out the element values of g. These are the sample
of the complex envelope for the OFDM signal described by the equation
N −1
N −1
n =0
n =0
g (t ) = Ac ∑ wnϕ n = Ac ∑ wn e j 2 kπ
where x(t) and y(t) are the I and Q components of the complex envelope.
The OFDM signal is at the end produced by the classic IQ modulators.
1. At the receiver, the serial data are recovered from the received OFDM signal by
demodulating the signal to produce serial I and Q data,
2. converting the serial data to parallel data,
3. evaluating the FFT, and
4. converting the FFT vector (parallel data) to serial output data.
The length-of-the-FFT vector determines the resistance of OFDM to errors caused by
multipath channels. N is chosen so that T=NTs is much larger than the maximum delay
time of echo components in the received multipath signal.
The PSD (power spectral density) of the OFDM signal can be obtained recalling that
OFDM signal consists of orthogonal carriers modulated by data with rectangular pulse
shapes that have a duration of T sec. consequently, the overall PSD of the complex
envelope of the OFDM signal is of the form
N −1
Pg ( f ) = C ∑
n =0
sin[π ( f − f n )T ]
π ( f − f n )T
2
where C = Ac2 ωn T
2
eq 330
and ϖ n = 0
Since the spacing between carriers is 1/T [Hz] and there are N carriers, the null
bandwidth of the OFDM signal is
BT =
N +1 N +1 1
=
≈ = Ds
T
NTs Ts
[Hz ]
eq 331
where the approximation is reasonable for N>10.
255
A key advantage of OFDM is that it can be generated by using FFT digital signal
processing techniques. An Example of FFT theory is reported in the following
paragraph.
23.8 FFT(Line Specra for Periodic Waveforms)
For periodic waveforms, the Fourier series representations are valid over all time
(i.e.-∞<t<+∞). Consequently, the (two sided) spectrum, which depends on the
waveshape from t=-∞ to t=∞, my be evaluated in terms of Fourier coefficients.
23.8.1
Theorem
If a waveform is periodic with period T0, the spectrum of the waveform w(t) is:
W( f ) =
n = +∞
∑ c δ ( f − nf ) = F [w(t )]
n = −∞
eq 332
0
n
Where:
f0=1/T0, ω0=2π f0=2π /T0,
1
cn =
T0
a +T0
∫ w(t )e
− jnw0t
dt
are the complex (phasor) Fourier coefficients of the complex
a
exponential Fourier series, and w(t ) =
+∞
∑c e
n = −∞
n
jnω0t
is used to represent a physical
waveform (i.e. finite energy) over the interval a<t<a+T0. When w(t) is periodic with
period T0, this Fourier series representation is valid over all time (i.e. over the interval ∞<t<∞).
Proof.
w (t ) =
+∞
∑c
n = −∞
n
e
jn ω 0 t
eq 333
Taking the Fourier transform of both sides, we obtain
256
+∞
⎛ +∞
⎞
W ( f ) = ∫ ⎜ ∑ cn e jnω0t ⎟e − jωt dt =
⎠
− ∞⎝ n = −∞
=
+∞
+∞
∑ c ∫e
n = −∞
=
e
− jωt
+∞
∑ c ∫e
n
+∞
+∞
∑ c ∫e
n
n = −∞
− j ( −2πf 0 + 2πf ) t
dt =
∑ c δ ( f − nf
n
0
j ( nω0 −ω ) t
dt =
+∞
+∞
∑ c ∫e
n
+∞
+∞
∑ c ∫e
n = −∞
−∞
n = −∞
−∞
+∞
n = −∞
dt =
−∞
+∞
n = −∞
=
n
jnω0t
− j 2π ( − nf 0 + f ) t
dt =
n
dt =
−∞
+∞
+∞
∑ c ∫e
n = −∞
−∞
− j ( − nω0 +ω ) t
n
eq 334
− j 2π ( f − nf 0 ) t
dt =
−∞
)
where the integral representation for a delta function, was used.
This theorem indicates that a periodic function always has a line (delta function)
spectrum, with the lines being at f=nf0 and having weight given by the cn values.
An illustration of the property is the spectrum of a sinusoid:
v(t ) = A sin ω0 t
where ω0 = 2πf 0
then the spectrum will be:
+∞
V( f ) =
⎛ e jω0t − e − jω0t
A
∫ ⎜⎜ 2 j
−∞ ⎝
+∞
=
+∞
+∞
⎞ − jωt
A
A
jω0t − jωt
⎟⎟e dt =
−
e − jω0t e − jωt dt =
e
e
dt
∫
∫
2
2
j
j
⎠
−∞
−∞
+∞
+∞
+∞
A
A
A
A
e − j 2π ( f + f0 )t dt ) =
e − j 2π ( f − f0 ) t dt −
e − j 2πf0t e − j 2πft dt =
e j 2πf0t e − j 2πft dt −
∫
∫
∫
∫
2 j −∞
2 j −∞
2 j −∞
2 j −∞
+∞
= j
eq 335
+∞
A
A
A
A
− e − j 2π ( f − f0 )t dt + j ∫ e − j 2π ( f + f0 ) t dt ) = j δ ( f + f 0 ) − j δ ( f − f 0 ) =
∫
2 −∞
2 −∞
2
2
c−1δ ( f + f 0 ) + c1δ ( f − f 0 )
V( f ) =
A
A
δ ( f + f0 ) − δ ( f − f0 )
2
2
Magnitude Spectrum
Phase Spectrum
θ(f)
V(f)
A/2
-f0
+90°
f0
f
f
-90°
257
figure 203
In this case c1=-jA/2 and c-1=jA/2 and the other cn’s were zero.
It is also obvious that there is no dc component, since there is no line at f=0 (i.e. c0=0).
Conversely, if a function does not contain any periodic component, the spectrum will be
continuous (no lines), except for a line at f=0 when the function has a dc component.
It is also possible to evaluate the Fourier coefficients by sampling the Fourier transform
of a pulse corresponding to w(t) over a period. This is shown by the following theorem:
23.8.2
Theorem
If w(t) is a periodic function with period T0 and is represented by
w(t ) =
n =∞
∑ h(t − nT0 ) =
n= −∞
n =∞
∑c e
n =−∞
n
jnω0t
eq 336
where
T
⎧
⎫
⎪w(t ), t < 0
⎪
h(t ) = ⎨
2
⎬
⎪⎩0,
t elsewhere⎪⎭
eq 337
then the Fourier coefficients are given by
cn = f 0 H (nf 0 )
eq 338
where
H(f)=F[h(t)] and f0=1/T0
Proof.
w(t ) =
n= +∞
∑ h(t − nT0 ) =
n= −∞
n= +∞
∑ h(t ) ∗ δ (t − nT0 ) =
n= −∞
⎡
⎤
n = +∞ +∞
∑ ⎢ ∫ h(τ ) ⋅ δ [(t − τ ) − nT ]dτ ⎥ =
⎣
n = −∞ −∞
⎧
⎫
= ∑ ⎨ ∫ h(τ ) ⋅ δ [− [τ − (t − nT0 )]]dτ ⎬
n =−∞⎩ −∞
⎭
n =+∞ +∞
0
⎦
eq 339
where * denotes the convolution operation.
258
Thus,
w(t ) =
n= +∞
n = +∞
∑ h(t − nT ) = h(t ) ∗ ∑ δ (t − nT )
0
n= −∞
eq 340
0
n = −∞
But the impulse train may itself be represented by its Fourier series; that is,
n = +∞
∑ δ (t − nT0 ) =
n = −∞
n =+∞
∑c e
n =−∞
n
jnω0t
eq 341
Where all the Fourier coefficients are just cn=f0. Substituting the last in the preceding
equation we have:
w(t ) =
n= +∞
n =+∞
n =+∞
∑ h(t − nT ) = h(t ) ∗ ∑ δ (t − nT ) = h(t ) ∗ ∑ c e
0
n= −∞
0
n =−∞
n =−∞
n
jnω0t
= h(t ) ∗
n= +∞
∑fe
n= −∞
0
jnω0t
eq 342
Taking the Fourier transform of both sides we have
n = +∞
W ( f ) = H ( f ) ∑ f 0δ ( f − nf 0 )
eq 343
n = −∞
Using the preceding theorem W ( f ) =
n = +∞
∑ c δ ( f − nf ) = F [w(t )]
n = −∞
n
0
to compare the last
equation with we obtain
n = +∞
n = +∞
n = −∞
n = −∞
W ( f ) = H ( f ) ∑ f 0δ ( f − nf 0 ) =
∑ f H (nf
0
0
)δ ( f − nf 0 )
eq 344
As an example we find the Fourier coefficients for the periodic rectangular wave shown
below:
259
w(t)
T
A
1
T0
2
1
− T0
2
Waveform
3
T0
2
T0
t
2T0
T0
Envelope =
A/2
W( f ) =
A/4
Magnitude Spectrum
-3f0
-2f0
-f0
f0 2f0
A sin (πfT )
2 πfT
A sin (nπ / 2 )
δ ( f − nf 0 )
nπ / 2
n = −∞
n = +∞
∑2
3f0
f
4f0
figure 204
The complex Fourier coefficients for the periodic rectangular wave shown above is:
1
cn =
T0
T0 / 2
∫ Ae
0
− jnω0t
A 1
dt = −
T0 jnω0
T0 / 2
∫ jnω e
0
0
− jnω0t
dt = −
[
A 1
e − jnω0t
T0 jnω0
]
T0 / 2
0
=−
[
]
A 1
e − jnω0T0 / 2 − 1
T0 jnω0
which reduces, (using l’Hospital’s rule, for evaluating the indeterminant form for n=0), to
260
c0 =
A
= dc term
2
[
]
A 1
A 1 − jω0T0 / 2
c1 = −
e
−1 = −
T0 j 2π
T0 jω0
T0
⎡ − j 2Tπ T0 / 2 ⎤
A 1
A 1
A
e − jπ − 1 = −
[
− 1⎥ = −
− 1 − 1] = − j
⎢e 0
T0 j 2π
T0 j 2π
π
⎢⎣
⎥⎦
T0
T0
[
]
2π
A 1
A 1 ⎡ − j T0 T0 ⎤
A 1 − j 2π
A 1
− 2 jω0T0 / 2
c2 = −
e
−1 = −
− 1⎥ = −
e
−1 = −
[1 − 1] = 0
⎢e
T0 j 2ω0
T0 jω0 ⎣⎢
T0 jω0
T0 jω0
⎥⎦
A
c3 = − j
3π
c4 = 0
[
c5 = − j
]
[
]
A
5π
⇓
W( f ) =
n =−∞
∑ c δ ( f − nf ) = .......... − c δ ( f − 5 f ) − c δ ( f − 4 f ) − c δ ( f − 3 f ) − c δ ( f − 2 f ) − c δ ( f − f )
n =−∞
n
0
5
0
4
0
3
0
2
0
1
0
A
δ ( f ) + c1δ ( f − f 0 ) + c3δ ( f − 3 f 0 ) + c4δ ( f − 4 f 0 ) + c5δ ( f − 5 f 0 ) + ...........
2
A
A
A
= .......... + j
δ ( f − 5 f0 ) + j δ ( f − 3 f0 ) + j δ ( f − f0 )
5π
3π
π
A
A
A
A
− δ ( f ) − j δ ( f − f0 ) − j δ ( f − 3 f0 ) − j
δ ( f − 5 f 0 ) + ...........
2
π
3π
5π
− c0δ ( f ) +
eq 345
These coefficients may be verified by using the last Theorem and the spectrum of the
single flat-top impulse:
⎛ t
h(t) = ∏ ⎜⎜
⎝ TS
Ts ⎫
⎧
⎞ ⎪1, se t ≤ 2 ⎪
⎟⎟ ≡ ⎨
⎬
⎠ ⎪0, se t > Ts ⎪
2⎭
⎩
is a flat top inpulse (rectangular inpulse shaping)
261
1
0.8
0.6
1
2/Ts
0.4
0.2
-Ts/2
Ts/2
t
0
-20
-15
-10
-5
0
5
10
15
20
freq
-0.2
-0.4
time domain
frequency domain
figure 205
The frequency domain of a single flat-top impulse is obtained by Fourier transform
H( f ) =
Ts / 2
∫1⋅ e
−Ts / 2
− jωt
T /2
+ Ts / 2
⎡ e − jωt ⎤
e − jωTs / 2 − e + jωTs / 2
1 s
− jωt
=
=
dt =
j
e
dt
ω
−
⋅
=
⎢ − jω ⎥
− jω
− jω −T∫s / 2
⎦ −T / 2
⎣
s
⎛ T ⎞
Ts
sen⎜ ω s s ⎟
− jωTs / 2
+ jωTs / 2
+ jωTs / 2
− jωTs / 2
2Ts e
−e
−e
e
2⎠
⎝
= 2
=
= Ts
Ts
T
− jω
2j
Tsω s
ωs s
2
2
eq 346
Then the coefficients cn for the periodic repetition of the flat top pulse, which period is
T0=2Ts, are:
262
T0
⎛
⎜
sen⎜ nω0 2
⎛ Ts ⎞
2
⎜
sen⎜ ω0 ⎟
⎜
1
1
1
2 ⎠ 1 T0
⎝
⎝
cn = f 0 H (nf 0 ) = H (n ) = Ts
=
T
T0
T0
T0
T0
T0 2
ω0 s
2
nω0 2
2
⎛ 2π T0 ⎞
⎛ π⎞
⎟⎟
sen⎜⎜ n
sen⎜ n ⎟
T
4
1 T0
⎝ 2⎠
⎝ 0
⎠=1
=
T
2
π
T0 2
2 nπ
0
n
T0 4
2
⎞
⎟
⎟
T0 ⎞
⎛
⎟
⎟ 1 T sen⎜ nω0 ⎟
4⎠
⎝
⎠=
0
=
T
T0 2
nω0 0
4
eq 347
since the pulse serie is offset in time, we lost the symmetry with respect to zero
⎧1, 0 < t < Ts
⎫
⎛ t −T / 2 ⎞
h(t ) = ⎨
⎟
⎬ = ∏⎜
t elsewere⎭
⎝ 2 ⎠
⎩0,
1
0
Ts
t
T0
figure 206
Then using the time delay theorem we get the spectrum
⎛ T ⎞
sen⎜ ω s ⎟
⎝ 2⎠
H ( f ) = e − jπ f Ts Ts
T
ω s
2
eq 348
263
1
cn = e − jnπ f Ts
2
⎛ π⎞
⎛ π⎞
⎛ π⎞
sen⎜ n ⎟
1 T0 sen⎜ n
⎟
⎟
π sen⎜ n
− jnπ
−
jn
1
1
⎝ 2⎠
⎝ 2⎠ = e 2
⎝ 2 ⎠ = e T0 2
π
π
π
2
2
n
n
n
2
2
2
eq 349
which is identical to the preceding form of cn.
The magnitude spectrum is illustrated by the solid lines on figure above. Since delta
functions have infinite value, they can not be plotted; but the weights of the delta
functions can be plotted as shown by the dashed line on figure.
Now compare the spectrum for this periodic rectangular wave with the spectrum for the
rectangular pulse alone. Note that the spectrum for the periodic wave contains spectral
lines, whereas the spectrum for the non periodic pulse is continuous.
Note that the envelope of the spectrum for both cases is the same [sin(x)/x] shape.
Consequently, the null bandwidth (for the envelope) is 1/T for both cases, where T=Ts
is the pulse with. This is a basic property of the digital signalling with rectangular pulse
shapes: the null bandwidth is the reciprocal of the pulse with.
23.9 Guard Period
For a given system bandwidth, the symbol rate for an OFDM signal is much lower than
a single carrier transmission scheme. For example for a single carrier BPSK modulation,
the symbol rate corresponds to the bit rate of the transmission. However for OFDM the
system bandwidth is broken up into Nc subcarriers, resulting in a symbol rate that is Nc
times lower than the single carrier transmission. This low symbol rate makes OFDM
naturally resistant to effects of Inter-Symbol Interference (ISI) caused by multipath
propagation.
Multipath propagation is caused by the radio transmission signal reflecting off objects in the propagation environment,
such as walls, buildings, mountains, etc. These multiple signals arrive at the receiver at different times due to the
transmission distances being different. This spreads the symbol boundaries causing energy leakage between them.
The effect of ISI on an OFDM signal can be further improved by the addition of a guard
period to the start of each symbol. This guard period is a cyclic copy that extends the
length of the symbol waveform. Each subcarrier, in the data section of the symbol, (i.e.
the OFDM symbol with no guard period added, which is equal to the length of the IFFT
size used to generate the signal) has an integer number of cycles. Because of this,
placing copies of the symbol end-to-end results in a continuous signal, with no
discontinuities at the joins. Thus by copying the end of a symbol and appending this to
the start results in a longer symbol time. Figure below shows the insertion of a guard
period.
264
IFFT
IFFT
Output
Guard
Period
TG
Symbol N+1
TFFT
TS
IFFT
Guard
Period
Time
Symbol N+1
figure 207: Addition of a guard period to an OFDM signal
The total length of the symbol is TS=TG + TFFT, where Ts is the total length of the symbol in
samples, TG is the length of the guard period in samples, and TFFT is the size of the IFFT
used to generate the OFDM signal.
In addition to protecting the OFDM from ISI, the guard period also provides protection
against time-offset errors in the receiver.
In multipath environments ISI reduces the effective length of the guard period leading to
a corresponding reduction in the allowable time offset error.
24 DVBT and DVBH
24.1 Signal Constellation and mapping
The system uses Orthogonal Frequency Division Multiplex (OFDM) transmission. All
data carriers in one OFDM frame are modulated using either
• QPSK, 16-QAM, 64-QAM,
• non-uniform 16-QAM or non-uniform 64-QAM constellations.
The constellations, and the details of the Gray mapping applied to them, are illustrated
in figure.
The exact proportions of the constellations depend on a parameter α, which can take
the three values 1, 2 or 4, thereby giving rise to the three diagrams figures 9a to 9c. α is
the minimum distance separating two constellation points carrying different HP-bit
values divided by the minimum distance separating any two constellation points.
Non-hierarchical transmission uses the same uniform constellation as the case with
α = 1, i.e. figure 9a.
265
Im(z) y1,q’
QPSK
Bit ordering:
y0,q’ y1,q’
10 1
-1
11 -1
00
1
Re(z) y0,q’
01
QPSK
Bit ordering:
y0,q’ y1,q’
266
25 Appendix
25.1 Convolution process
The product convolution between two time functions is defined as:
f1 (t ) ∗ f 2 (t ) =
+∞
Inversion process
+∞
∫ f (τ ) ∗ f (t − τ )dτ = ∫ f (τ ) ∗ f [− (τ − t )]dτ
1
−∞
2
1
2
−∞
As an example taking f1 and f2 as shown below and considering a shift τ=0 we have:
267
Step 1: definizione delle funzioni
f1(t)
o
f2(t)
o
t
t
Step 2: inversione della f2 e shift temporale di τ=0
f1(τ)
o
f2(t-τ)= f2[-(τ-t)]→ τ=0→ f2(t)= f2[-(-t)]
o
τ
τ
Step 3: prodotto integrale da - ∞ a +∞ delle funzioni dello step 2
Convoluzione di f1 con f2
f1(τ)
f2(t-τ)
o
τ
o
τ
In the following example taking f1 and f2 as shown below and considering a shift τ=a we
have:
268
Step 1: definizione delle funzioni
f1(t)
o
f2(t)
o
t
t
Step 2: inversione della f2 e shift temporale di τ=a
f1(τ)
o
f2(t-τ)= f2[-(τ-t)]→ τ=a→ f2(t)= f2[-(a-t)]
o
τ
a
τ
Step 3: prodotto integrale da - ∞ a +∞ delle funzioni dello step 2
Convoluzione di f1 con f2
f1(τ)
f2(t-τ)
o
τ
o
τ
269
25.2 Dirac delta function and convolution process
One property of Dirac delta function is that:
f1 (t ) ∗ δ (0) =
+∞
∫ f (0) ∗ δ (t − 0)dτ = f (0)
1
1
−∞
i.e.
f1 (t ) ∗ δ (t ) =
+∞
∫ f (τ ) ∗ δ (t − τ )dτ = f (t )
1
1
−∞
If there is a shift T0 then:
f1 (t ) ∗ δ (t − T0 ) =
+∞
∫ f (τ ) ∗ δ [(t − τ ) − T ]dτ = f (t − T )
1
0
1
0
−∞
in this example τ=t-T0
270
26 Reference
[1]
[2]
[3]
3GPP TS 05.04 V8.4.0 (2001) [ www.3gpp.org ]
Digital and Analog Communication System [Leon W.Couch 2001]
Implementation Effects on GSM,s EDGE Modulation [ Steven V.Schell, www.tropian.com]
E:\documenti per
corsi\ELETTRONICA T
[4]
[5]
WINIQ software for simulating EDGE signal [ www.rhode-swartz.com ]
Introduzione alla modulazioni numeriche [www.univpm Proff. Chiaraluce]
E:\documenti per
corsi\ELETTRONICA T
[6]
Digital modulation in a communications system [Hewlet Packard application note]
E:\documenti per
corsi\EDGE_modulatio
[7]
GMSK in nutshell [Thyerry Turletty 1996 Massachusetts Institute of Technology]
E:\documenti per
corsi\EDGE_modulatio
[8]
[9]
[10]
Digital modulation and GMSK [University of Hull]
Trasmissione delle informazioni [Proff. Diruscio]
Bandwidth efficient modulation [CCSDS 413.0-G-1 april 2003]
E:\documenti per
corsi\telemeteryng en
[11]
PROCEEDINGS OF THE CCSDS RF AND MODULATION SUBPANEL 1E
MEETING OF MAY 2001 CONCERNING BANDWIDTH-EFFICIENT MODULATION [CCSDS
1999]
E:\documenti per
corsi\telemeteryng en
[12]
Theory of frequency and phase modulation [http://www.vk1od.net/FM/FM.htm#Frequency]
[13]
http://telemetry.nmsu.edu/Conference_Pub.html
C:\documenti davide\
documenti per corsi\E
[14]
http://www.ee.byu.edu/faculty/mdr/publications.phtml
[15]
SFCG Meeting SF17 - 28/D Galveston, Texas 16-25 September 1997: CCSDS - SFCG
EFFICIENT MODULATION METHODS STUDY AT NASA/JPL PHASE 3: END-TO-END SYSTEM PERFORMANCE
C:\documenti davide\
documenti per corsi\E
[16]
[17]
OFDM_thesys_lawray
UMTS Architecture model vers 33 [Massaccesi Andrea]
271
Download