Chapter 3

advertisement
Chapter 6
Digital Modulation Techniques
In the previous chapter, we introduced methods that modulate a continuous function
(message signal) onto a carrier by varying the carrier's amplitude or phase. This
chapter introduces the concepts of digital modulation techniques. The main difference
between the analog modulation and digital modulation is that the transmitted message
for a digital modulation system represents a small set of abstract symbols, e.g., 0 and
1 for a binary transmission system, while, for an analog modulation system, it
represents a continuous waveform. To transmit a digital message, a digital modulation
allocates a piece of time called signal interval and generates a continuous function
that represents the symbol.
For digital modulation techniques, the message signal is often transformed onto a
baseband signal. In a wireless communication system, a second part of the
modulator converts the baseband signal to a radio-frequency (RF) signal, modulating
the phase, frequency, or amplitude of the carrier. In a wired system, the baseband
signal may be sent directly without carrier modulation. However, sometimes,
multiple message signals are required to transmit simultaneously through the same
wire. Under this circumstance, some modulation techniques may be employed so that
different messages can be modulated into different frequency bands. This technique
is called frequency-division multiple access (FDMA). Beside the FDMA technique,
there are more multiple access techniques that may be employed for digital
communication systems, e.g., the time-division multiple access (TDMA) and the
code-division multiple access (CDMA). Those techniques will be introduced in the
next chapter.
The receiver end of a digital modulation system consists of a circuit to convert
the modulated signal to a baseband signal and circuits to decide which symbol is
transmitted during each signal interval by the transmitter. A digital demodulator
differs from an analog one in that it outputs a decided symbol, whereas an analog
demodulator produces an output that approximately equals to the message signal.
These facts are important in deciding whether to use a digital modulation scheme.
One may easily confuse digital conversions with digital modulations.
6-1
The
former which we have discussed in Chapter 2 changes the form of information from
analog to digital. The digital conversion is required when we want to transmit
analog signal via a digital communication system and is unnecessary if the
information is already in digital form.
The major purpose of this chapter is focused on the methods of various digital
modulation and demodulation schemes, not on the analysis of the performance of
those systems which in general requires more mathematical background, e.g., the
probability theory and stochastic process. The performance of those systems will be
explained intuitively if possible.
6.1
Baseband Pulse Transmission
In this section, we will introduce a transmission technique which does not require
carrier modulation, called baseband pulse transmission. The digital information for
the baseband pulse transmission is transformed to a pulse train. We will restrict the
discussion to the binary transmission case. Each pulse has duration Tb and represents a
specific digital information. In this form of signaling, symbols 1 and 0 are
represented by positive and negative rectangular pulses of equal amplitude and equal
duration. For example, if the pulse considered is a rectangular pulse, the binary
information stream of “1001101” is transformed onto a baseband signal as shown in
Fig. 6.1-1(a), where Tb is assumed to be 1 sec.
6-2
Fig. 6.1-1: Signals for Baseband Pulse Transmission. (a) Baseband Pulse Signal.
(b)The Received Signal Corrupted by Noise and the Sampled Points. (c) The Output
of the Correlator and the Corresponding Sampling Points.
In mathematical notation, letting m be the transmitted symbol, i.e., m  0,1 , we
have the transmitted signal denoted as
  A if m  1
st   
 A if m  0
(6.1-1)
for 0  t  Tb. In this case, 1/Tb is called the bit rate. Note that, for mathematical
representation, it is sufficient to consider the transmission over 0  t  Tb, since similar
cases happen if a different signaling interval is considered.
It is assumed that the receiver has acquired knowledge of the starting and ending
times of each transmitted pulse; in other words, the receiver has prior knowledge of
the pulse shape, but not its polarity. Given the received signal, the receiver is required
to make a decision in each signaling interval as to whether the transmitted symbol is a
1 or a 0.
In the receiving end, the simplest way for recovering the original digital stream is
to sample the received signal at the sampling rate 1/Tb. Then a decision device is
used to “guess” the transmitted symbol based on the sampled value at each instance.
The sampling instance is in general chosen to be in the middle of the signaling
6-3
interval.
If the sampled value is positive, then it decides that a 1 was transmitted.
If the sampled value is negative, then it decides that a 0 was transmitted. This
scheme was used as standards in short distance wired transmission, e.g., the RS232
standard. However, for long distance transmissions, noise signals will appear that
add to the transmitted signal. In addition, the desired transmitted signal will be
seriously attenuated for long distance transmissions. As a result, the received signal
will not be so “clean” as comapred with the original transmitted signal. For example,
Fig. 6.1-1(b) gives a noise version of the received signal and the corresponding
sampled points that are denoted by circles. In this case, if a sampled value is directly
used to decide which symbol was transmitted by the transmitter, it is very possible
that the sampled value goes to the opposite polarity at the sampling instance. The
decision device will make a wrong decision based on this sampled value. For
example, as shown in Fig. 6.1-1(b), the decisions made based on the sampled values
produce the output “1101001” which contains two errors as comapred with the
transmitted sequence “1001101”.
distance transmission systems.
Therefore, this scheme is not suitable for long
In the following, we will explain the meaning of Fig. 6.1-1 (c). If only one
sampled value is used by the decision device, the whole waveform over (0, Tb) is
observed at only one instance. This scheme is obviously not optimal, since we do
not take advantage of everything known about the signal. Since the starting and
ending times of the pulse are known, a better procedure is to compare the area of the
received signal-plus-noise waveform by integrating the received signal over the
Tb-second signaling interval.
A receiver for baseband pulse transmission is given in Fig. 6.1-2, where an
integrator is employed. The integrator will integrate the waveform over (0, Tb) with
the output being sampled at time Tb. Of cause, a noise component is present at the
output of the integrator, but, since the additive noise is always assumed to be of zero
mean, it takes on positive and negative values with equal probability. Thus the
output noise component has zero mean. Intuitively, the integrator can be thought as an
energy collector that collects the energy of the received signal over (0, Tb), producing
an energy value with sign at the sampling instance. In addition, the noise will be
“averaged” over (0, Tb) by the integrator, and hence the noise component will be
suppressed by the integrator. Formally, the integrate-and-dump device is called
a ”correlator”. The decision device then, based on the sampled values, makes a
decision on the transmitted symbol. If the output of the correlator at the sampling
instance is positive, it decides that a 1 was transmitted. If the output is negative, then
6-4
it decides that a 0 was transmitted.
Fig. 6.1-1 (c) gives the output waveform of the
integrator, where the sampling points are denoted by circles. The decisions based on
these sampled values are “1001101” which contains no error as comapred with the
transmitted sequence.
Fig. 6.1-2: A Receiver for Baseband Pulse Transmission.
6.2. Amplitude-Shift Keying (ASK)
From now on, we will add carrier waves into the modulation scheme. The simplest
modulation technique is the amplitude-shift keying (ASK), where the digital
information is modulated over the carrier's amplitude, similar to the amplitude
modulation for analog modulation.
In general, we require two waveforms s1 (t ) and s2 (t ) for binary transmission.
If the transmitter wants to transmit a “1”, s1 (t ) is employed over the signaling interval
(0, Tb). On the other hand, if the transmitted symbol is “0”, s2 (t) is used over (0, Tb).
Assume that the probabilities of transmitting a “1" and a “0" are equal. For ASK, the
transmitted waveforms can be expressed as
s1 t  
s 2 t   0
4 Eb
cos( 2 f c t )
Tb
(6.2-1)
for 0  t  Tb , where Eb is the averaged transmitted signal energy per bit and f c is
the carrier frequency which is equal to
nc
Tb
for some fixed integer nc .
averaged transmitted signal energy can be verified by the following equation
6-5
The
0.5 s12 t dt  0.5 s22 t dt
Tb
Tb
0
0
(6.2-2)
which is equal to Eb as defined. The transmitted signal s(t) can be expressed as
 s t  for symbol "1"
st    1
s 2 t  for symbol "0"
(6.2-3)
for 0  t  Tb. We note that the transmitter for such a system simply consists of an
oscillator that is gated on and off, and accordingly ASK is often referred to as on-off
keying. Fig. 6.2-1(a) gives a transmitted waveform resulting from the digital
transmission of “1001101”, where Eb  1 , f c  5 Hz, and Tb  1 sec.
Fig. 6.2-1: Signals for ASK.
(a) Transmitted Signal.
(b) The Signal yt   st  
2 Tb cos2f c t  . (c) The Output of the Integrator and the Corresponding Sampling
Points.
6-6
A receiver for ASK is given in Fig. 6.2-2. In the following, we will explain how
the demodulation works. The received signal is first multiplied by a unit-energy
signal 2 / Tb cos2f ct  .
Note that we use unit-energy signal for convenience of
Arbitrary signals with the form B cos2f ct  can be
mathematical representation.
used instead, where B is a positive constant. Assuming that the received signal is
noise free, we have the following expression after multiplication
yt   st  
2
cos2f ct  .
Tb
(6.2-4)
Fig. 6.2-2: A Receiver for Amplitude-Shift Keying
Fig.
s(t ) 
6.2-1(b)
shows
the
corresponding
8Eb
4 Eb
cos( 2f c t ), y (t ) 
cos 2 (2f c t ).
Tb
Tb
corresponding period.
Tb
0

nc
Tb
Thus,
y(t).
y (t )  0
If
for
the
This is quite significant as we shall see later.
x
Replacing f c 
signal
4 Eb
2
cos2f c t 
cos2f c t dt
Tb
Tb
8 Eb
Tb

Tb
0
1  cos4f c t 
dt.
2
in the above equation, we have
6-7
(6.2-5)
x

Tb 1
8 Eb  Tb 1
 nc  

 4 t dt 
dt

cos



0 2
Tb  0 2
 Tb  
8 Eb  1 Tb 1
 n  Tb 
1
 t 
sin  4 c t  
Tb  2 0 2 4 nc Tb   Tb  0 
(6.2-6)
 2 Eb .
The last equality follows since the second term in the brackets is zero. If s2 (t ) was
transmitted, the sampled signal is x = 0 since s2 (t )  0 . In summary, we have
 2 Eb
x
0
if 1 is transmitte d
(6.2-7)
if 0 is transmitte d.
Fig. 6.2-1(c) gives the resulting signal from the integrator and the corresponding
sampled points. The decision device based on the sampled values makes a decision
of “1001101” which is exactly the same as the transmitted sequence.
Although there are only two possible outcomes for the noiseless case, the actual
received signal may be corrupted by noise. For certain systems, we have infinitely
many outcomes for the output of the correlator. Therefore, a threshold value  is
required in the decision device to distinguish which symbol was transmitted.
This
value is set to the center of 0 and 2Eb , i.e.,   Eb 2 , so that minimum bit error
probability can be achieved. If x   , the decision device makes a decision of 1. If
x   , the decision device makes a decision of 0.
The detection method described previously requires a carrier with the same
frequency and phase as those of the carrier in the transmitter. Those kinds of
receivers are called coherent detector. It is also possible to detect an ASK signal
without the knowledge of the carrier frequency and phase. Those kinds of detectors
are call noncoherent detector. For binary ASK, a noncoherent detector is illustrated
in Fig. 6.2-3 which consists of a band-pass filter and an envelope detector followed by
a correlator and a decision device. The band-pass filter is used to remove the
out-of-band noise. The envelope detector is then used to recover the envelope of the
carrier wave. The resulting signal is a baseband pulse signal which can then be
detected by the baseband pulse detector, a correlator followed by a decision device as
described in the previous section. However, this receiver is not optimal since an
6-8
envelope detector will enhance the noise at the input of the correlator and hence
increase the bit error probability. In general, the transmitted energy for the
noncoherent detector must be doubled to achieve the same bit error probability as that
of the coherent detector.
Fig. 6.2-3: Noncoherent Detector for Amplitude-Shift Keying
In the following, the geometric interpretation is used to represent a signal set,
e.g., s1 t , s2 t  for the binary case, as points in the signal space. The collection of
all possible signal points is called the signal constellation.
binary ASK, let
1 t  
2
cos2f ct 
Tb
For example, for the
(6.2-8)
which is a unit energy signal over (0, Tb). Then, all the possible signal si(t) for i = 1,
2 can be represented as
si t   si11 t  .
(6.2-9)
It is easy to show that s11  2Eb and s21  0 .
The geometric interpretation of
these two signal points can be denoted as points in a real line as illustrated in Fig.
6.2-4. The decision boundary is determined by the threshold value  . If the
received signal x lies in the right side of the decision boundary, i.e., the region Z1,
then a decision of a “1” is made. If the received signal x lies in the left side of the
decision boundary, i.e., the region Z2, then a decision of a “0” is made.
6-9
Fig. 6.2-4: Geometric Representation of Binary ASK Signals.
One advantage in using the signal space representation is that it is much easier to
identify the “distance” between signal points. The distance between signal points is
closely related to the symbol error rate of a given constellation. In this ASK case,
the distance between two signal points is
2Eb .
Intuitively, to reduce the
probability of detection error due to noise, we may increase the transmitted energy of
the signals, i.e., increase Eb. As a result, the distance between two signal points will
be increased which makes the received signal point less probable be located in the
wrong region.
Sometimes, multi-dimensional geometric interpretation is required to represent
the whole signal set over the signaling interval (0, T). For the N-dimensional case, a
set of orthonormal functions 1 t ,2 t ,...,N t  is required to present all the
possible transmitted signals s1 t , s2 t ,..., sM t . Note that M = 2 for binary case.
The set of functions 1 t ,2 t ,...,N t  is called an orthonormal basis so that every
transmitted signal can be presented as a linear combination of the basis functions.
That is
N
si t    sij j t 
for i=1,…, M and 0  t  T
(6.2-10)
j 1
and
1
  t  t dt  0
T
0
i
j
i j
.
i j
(6.2-11)
We may plot the signal vector si  si1 , si 2 ,, sin  as a point in the N-dimensional
signal space to represent the time-domain signal si (t ) . These concepts will become
clear as we introduce the multi-dimensional modulations, e.g., the frequency-shift
keying (FSK) and the quadriphase-shift keying (QPSK).
6-10
6.3 Binary Phase-Shift Keying (BPSK)
In a BPSK system, the pair of signals s1 (t ) and s2 (t ) used to represent binary
symbols 1 and 0, respectively, are defined by
s1 t  
2 Eb
cos2f c t 
Tb
(6.3  1)
s 2 t  
2 Eb
2 Eb
cos2f c t     
cos2f c t 
Tb
Tb
(6.3  2)
where 0 < t < Tb, Eb is the transmitted energy per bit, and fc is the carrier frequency
which is chosen equal to nc Tb for some fixed integer nc. A pair of sinusoidal
waves that differ on in a relative phase shift of 180 degrees are referred to as antipodal
signals. Fig. 6.3-1(a) illustrates a transmitted signal when the binary stream is
“1001101” where Eb = 1, fc = 5 Hz, and Tb = 1 sec.
6-11
Fig. 6.3-1: Signals of BPSK.
r t  1 2 cos2f c t  .
(a) Transmitted Signal.
(b) The Signal
(c) The Output of the Correlator and the Corresponding
Sampling Points.
An optimal detector for BPSK system is shown in Fig. 6.3-2.
The received
signal is first multiplied by the unit energy signal 1 t   2 Tb cos2f ct  .
Assuming that the received signal is noise-free, we have the following expression
after multiplication
yt   st  
y (t ) 
2 Eb
Tb
2
cos2f ct  .
Tb
cos 2 (2f c t ) if 1 is transmitted and y(t )  
transmitted.
6-12
2 Eb
Tb
cos 2 (2f c t ) if 0 is
Fig. 6.3-2. A Coherent Detector for BPSK.
An example of the signal y(t) is plotted in Fig. 6.3-1 (b).
The two possible
outcomes from the output of the correlator for noiseless case can be shown to be
  Eb if 1 was transmitte d
x
.
 Eb if 0 was transmitte d.
(6.3-3)
The threshold value  in this case must be set to 0 which corresponds to the center
between  Eb
and
Eb .
The output signal of the integrator and the
corresponding sampling points are plotted in Fig. 6.3-1 (c).
If the sampled value is
greater then zero, then a decision of 1 is made. If the sampled value is less than zero,
then a decision of 0 is made. The decision device based on the sampled values
makes a decision of “1001101” which is exactly the same as the transmitted sequence.
For geometric representation, the transmitted signals s1(t) and s2(t) can be
expressed in terms of 1 t  as follows:
s1 t   Eb 1 t ,
s 2 t    Eb 1 t ,
0  t  T0
0  t  T0.
(6.3-4)
A coherent BPSK system is therefore characterized by having a signal space that is
one-dimensional, with a signal constellation consisting of two message points as
shown in Fig. 6.3-3.
6-13
Fig. 6.3-3: Signal-Space Diagram for Coherent BPSK.
The decision boundary shown in Fig. 6.3-3 is determined by the threshold value
 which in this case is equal to 0. If the received signal x lies in the right side of
the decision boundary, i.e., the region Z1, then a decision of 1 is made. On the other
hand, if the received signal lies in the left side of the decision boundary, i.e., the
region Z2, then a decision of 0 is made.
6.4 Binary Frequency-Shift Keying (FSK)
In a binary FSK system, symbols 1 and 0 are distinguished from each other by
transmitting one of two sinusoidal waves that differ in frequency by a fixed amount.
A typical pair of sinusoidal waves is
s1 t  
2 Eb
cos2f1t 
Tb
s2 t  
2 Eb
cos2f 2t 
Tb
(6.4-1)
for 0  t  Tb , where Eb is the transmitted signal energy per bit. The transmitted
frequency is
fi 
nc  i
for some fixed integer nc and i=1,2.
Tb
6-14
(6.4-2)
Note that f 2  f1  1 Tb .
by s2(t).
Thus symbol 1 is represented by s1(t) and symbol 0
It is easy to show that s1(t) and s2(t) are orthogonal. Therefore define
i t  
2
cos2fit 
Tb
for i=1,2 and 0  t  Tb .
(6.4-3)
In fact, we can show that 1 t  and 2 t  are orthonormal basis functions.
First, we want to show that 1 t  and 2 t  have unit energy. The energy of the
signal i t  over (0, Tb) is given by

Tb
0
 i2 t dt 


2
Tb

Tb
0
cos 2 2f i t dt
Tb 1
2  Tb 1

 0 dt  0 cos4f i t dt 
Tb  2
2

2
Tb
t

2
Tb
0

(6.4-4)
Tb 
1
sin 4f i t  .
8f i
0
Letting f i  nc  i  Tb in the above equation, we have

Tb
0
  Tb
  nc  i 

1
   0  
 sin  4


T

0
b

 

 2


8

n

i
T
T

c
b 
b





2 T
1
  b 
sin 4nc  i  
Tb  2 8 nc  i  Tb

 i2 t dt 
2
Tb
(6.4-5)
 1.
The last equality follows since nc +i is a positive integer and hence the second in
the brackets is zero. In addition,

Tb
0
1 t  2 t dt 
2
Tb
1

Tb

Tb

Tb
0
0
cos2f1t  cos2f 2 t dt
cos2  f 1  f 2 t   cos2  f1  f 2 t dt.
Letting f i  nc  i  Tb in the above equation, we have
6-15
(6.4-6)

Tb
0
1 t  2 t dt 
1
Tb
 Tb
Tb
 2nc  3t  

1
 cos 2
dt   cos 2

 0
0
Tb


 Tb

 
t dt .
 
(6.4-7)
Since 2nc+1 is a positive integer, the first integration integrates the cosine term
over exactly 2nc + 1 periods. Therefore the first term is zero. Similarly, the second
term is integrated over one period of a cosine signal and hence the result is also zero.
As a result we have
Tb

0
1 t  2 t dt  0.
(6.4-8)
Therefore, 1 t  and 2 t  form an orthonormal basis.
There is a simpler way to prove that 1 t  and 2 t  are orthonormal. Note
that f1 and f 2 are two unequal integers. Therefore, according to the discussion in
Chapter 3, we can easily conclude that 1 t  and 2 t  are orthonormal
To generate a binary FSK signal, we may use the scheme shown in Fig. 6.4-1.
The binary data sequence is first applied to an on-off level encoder. At the output of
the encoder, symbol 1 is represented by a constant amplitude of
Eb and symbol 0
is represented by zero.
If the input of the
An inverter is used in the lower channel.
inverter is 0, the output is
output will be 0.
carrier on and off.
Eb . On the other hand, if the input is
Eb , the
The multipliers act as switches which turn the corresponding
If the input of the multiplier is
Eb (0), the corresponding
carrier will be turned on (off). Now, if the transmitted symbol is 1, the carrier of the
upper channel will be turned on, and that of the lower channel will be turned off.
Similarly, if the transmitted symbol is 0, the carrier of the upper channel will be
turned off, and that of the lower channel will be turned on. Therefore, the resulting
output signal is altered between two carriers of different frequencies controlled by the
input symbol. Fig. 6.4-2 (a) gives an example of resulting waveform when the input
binary stream is “1001101”, where Eb  1 , Tb  1 sec, f1  3 Hz, and f 2  4 Hz.
6-16
Fig. 6.4-1: Modulator for an FSK System.
Fig. 6.4-2: Signals for an FSK System.
Multiplication Output
(a) The Transmitted Signal.
z1 t   st  2 Tb cos2f1t  .
Output z 2 t   st  2 Tb cos2f 2 t  .
(b) The
(c) The Multiplication
(d) The Difference between Two Outputs of
the Integrators and the Corresponding Sampling Points.
6-17
The demodulation of the received signals utilizes the fact that the two signals
1 t  and 2 t  are orthonormal. That is, if we want to detect 1 t  , we multiply
the received signal by 1 t  and integrate. Because 1 t  and 2 t  are
orthonormal, the 2 t  part will disappear totally and only the coefficient of 1 t 
remains. We may also multiply the received signal by 2 t  and integrate. This
time, only the coefficient related to 2 t  remains. Since only one of the
coefficients is 1, we can easily see whether 1 or 0 is transmitted.
The above discussion leads to the receiver shown in Fig. 6.4-3. It consists of
two correlators with a common input, which are supplied with two locally generated
coherent signals 1 t  and 2 t  . The correlator outputs are then subtracted, one
from the other, and the resulting difference, y, is compared with a threshold of zero.
If y > 0, the receiver decides in favor of 1. On the other hand, if y < 0, it decides in
favor of 0.
Fig. 6.4-3: Coherent Detector for an FSK System.
For noiseless case, the received signal is exactly the transmitted signal. If the
signal s1(t) (representing 1) was transmitted, the outputs x1 and x2 of the correlators
can be expressed as
x1  
T
0
x2  
T
0
2 Eb
2
cos2f1t 
cos2f1t dt  Eb
Tb
Tb
(6.4-9)
2 Eb
2
cos2f1t 
cos2f 2 t dt  0.
Tb
Tb
On the other hand, if the signal s2(t) (representing 0) was transmitted, the outputs of
the correlators can be expressed as
6-18
x1  
T
0
x2  
T
0
2 Eb
2
cos2f 2 t 
cos2f1t dt  0
Tb
Tb
(6.4-10)
2 Eb
2
cos2f 2 t 
cos2f 2 t dt  Eb .
Tb
Tb
Therefore, y  x1  x2 is greater than zero if s1(t) was transmitted and is less than
zero if s2(t) was transmitted.
Fig. 6.4-2 illustrates signals at the receiver. The transmitted signal is given in
Fig. 6.4-2(a), where f1 = 3 Hz and f2 = 4 Hz. The received signal is first multiplied
by two carriers with frequencies 3 and 4 Hz, respectively.
The results are denoted
by z1 t   st   2 Tb cos2f1t  and z2 t   st   2 Tb cos2f 2t  and are
shown in Fig. 6.4-2(b) and (c), respectively. Finally, the resulting difference
y  x1  x2 is given in Fig. 6.4-2(d). The decision device based on the sampled
values makes a decision of “1001101” which is exactly the same as the transmitted
sequence.
Perhaps it is appropriate to think along the following line. This FSK system is
based upon the basic concept that we are transmitting two signals which are
orthonormal to each other and form a basis. Let us imagine a simpler case where we
are transmitting two signals; (1,0) and (0,1). First of all, we note that these two
vectors form a basis. That is, the inner product of (1,0) and (0,1) is 0 and
(1,0)  (0,1) At the receiving end, how do we determine whether (1,0) or (0,1) is
transmitted? What we can do is to perform an inner product of the received signal
and (1,0). If the transmitted signal is (1,0), the resulting inner product is 1. If the
transmitted signal is (0,1), the resulting inner product is 0. Thus, we have a way to
detect the signals. In the FSK case, the basic idea is quite similar. We are sending
two orthonormal signals. The demodulation is essentially a performance of the inner
product. This concept will be used in many places, as we shall see.
We have shown that there are two orthonormal basis functions 1 t  and 2 t 
defined in Equation (6.3).
The signal points s1(t) and s2(t) can be expressed as
si t   si11 t   si 22 t 
for i=1,2 and 0  t  T .
6-19
(6.4-11)
Therefore a coherent binary FSK system is characterized by having a signal space
which is two-dimensional with two message points, as shown in Fig. 6.4-4.
message points are defined by s1  ( Eb ,0 ) and s2  (0, Eb ) .
The two
As shown in
Fig. 6.4-4, the decision boundary is characterized by the line with x1  x2  0 .
Therefore, if x1  x2  0 , the received signal point lies in region Z1 and the decision
device makes a decision of 1. On the other hand, if x1  x2  0 , the received signal
point lies in region Z2 and the decision device makes a decision of 0.
Fig. 6.4-4: Signal space diagram for binary FSK.
The distances between two signal points for the binary ASK, BPSK, and FSK
systems are 2 Eb , 2 Eb and
2 Eb , respectively, as shown in Figures 6.2-4,
6.3-3, and 6.4-4. Therefore, under the same transmitted bit energy and the same
level of noise corruption, the BPSK system gives the lowest bit error rate since BPSK
system has the largest distance between two signal points. The performances of
ASK and FSK are exactly the same since they have the same distance between two
signal points.
6-20
6.5
Quadriphase-Shift Keying (QPSK)
One important goal in the design of a digital communication system is to provide a
reliable communication, i.e., achieve a very low probability of error. Another
important goal is the efficient utilization of channel bandwidth. In this section, we
study a bandwidth-conservation modulation scheme known as coherent
quadriphase-shift keying. Unlike binary ASK, BPSK, and FSK systems, in the
QPSK scheme, two bits are transmitted simultaneously during one signaling
interval T. Therefore, without increasing the transmitted bandwidth, we can double
the transmitted bit rate.
The QPSK system is best illustrated in Fig. 6.5-1. Let us assume that there are
two bits which are going to be transmitted during one signaling interval T. They are
denoted as m1 and m2 . As shown in Fig. 6.5-1, m1 will go up and m2 will go
down. Then the following rules will follow:
1. m1 will trigger signal s i1 and m2 will trigger signal s i 2 .




2. If m1 is equal to 1(0), s i1 is set to be  E 2  E 2 .
3. If m2 is equal to 1(0), s i 2 is set to be  E 2  E 2 .
4. si1 ( si 2 ) will be multiplied by


2 T cos2fct  2 T sin 2fct  .
5. The signal transmitted is
si t   si1
2
2
cos2f ct   si 2
sin 2f ct  .
T
T
6-21
(6.5-1)
Fig. 6.5-1: A schematic Diagram of QPSK.
Before introducing the demodulation process of QPSK, we shall first introduce
an interesting property of the system. Let us take a look at si (t ) in Equation
(6.5-1). We can easily show that
si (t ) 
2
r cos( 2f c t   )
T
where r  si1  si 2
2
2
and   tan 1
(6.5-2)
si 2
.
si1
E
, r  E . As for  , note that it is related to the values
2
and s i 2 . Since each of them assumes two values, there are four possible
Since si1  si 2 
of s i1
combinations. Therefore there are four possible values of  , corresponding to four
distinct combinations of s i1 and s i 2 . Every  assumes an integer multiplication
of

.
4
Interestingly, from Equation (6.5-2), we can express si (t ) as follows:
si t  
2E


cos 2f ct  2i  1 
T
4

6-22
for 0  t  T .
(6.5-3)
Consider the case where m1  1 and m2  0 .
si 2  
In this case, si1 
E
and
2
E
. Thus, we have
2
si (t ) 
E
(cos( 2f c t )  sin( 2f c t ))
T

E
2
2
( 2(
cos( 2f c t ) 
sin( 2f c t ))
T
2
2

2E


(cos( ) cos( 2f c t )  sin( ) sin( 2f c t ))
T
4
4

2E

cos( 2f c t  ).
T
4
(6.5-4)
Let us expand the above equation as follows:
si t  
2E


cos 2i  1  cos2f ct  
T
4

2E


sin  2i  1  sin 2f ct  . (6.5-5)
T
4

We can now see that
si1  
It
can
2E

2E



cos 2i  1  and si 2  
sin  2i  1  .
T
4
T
4


be
easily seen that
si (t ) , for
i  1,2,3,4,
(6.5-6)
corresponds
to
m1m2  10,00,01,11, respectively. This is summarized in Table 6.5-1. An example
of the four signals is given in Fig. 6.5-2.
The block diagram describing a realization of a QPSK transmitter in Fig. 6.5-1
shows that a serial-to-parallel converter is used to convert a single bit stream into two
bit streams, producing two parallel signals si1 (t ) and si 2 (t ) as the baseband signals
that modulate cos( 2f ct ) and sin( 2f ct ) , respectively. These two waves are then
added up and transmitted as si (t ) . In the following, we shall explain the
demodulation process which correctly identifies m1 and m2 .
6-23
Table 6.5-1: Signal-space characterization of QPSK.
Input Digit (m1m2)
Phase
10
 4
3 4
5 4
7 4
00
01
11
si1
si2

E 2

E 2

E 2

E 2

E 2

E 2

E 2

E 2
Fig. 6.5-2: The Four QPSK Signals si (t ) .for i  1,2,3,4. (a) Signal of s1 (t )
(b) Signal of s2 (t ) (c) Signal of s3 (t ) (d) Signal of s4 (t ) .
We now discuss how to demodulate the received signal. Note that the signal
si (t ) is determined by m1 and m2 . We shall show later that after this signal is
received, it will be demodulated to such an extent that m1 and m2 will be correctly
identified.
follows:
Let us consider Equation (6.5-1).
We may rewrite Equation (6.5-1) as
si (t )  A cos(2f c t )  B sin( 2f c t ) .
The job of demodulation is to detect A and B. Since cos(2f c t ) and
sin( 2f c t ) are orthogonal, to detect A, we multiply si (t ) by cos(2f c t ) and
6-24
integrate. Through this way, we eliminate B and only A remains. Similarly, to
detect B, we multiply si (t ) by sin( 2f c t ) and integrate. Now, A disappears and
only B remains. This is the basic principle of QPSK demodulation.
Based upon the principle presented in the above paragraph, demodulation at the
receiver can be accomplished by coherent demodulation with two reference sinusoids
that are ideally phase and frequency coherent with the carriers in the transmitter. A
QPSK detector is given in Fig. 6.5-3.
Fig. 6.5-3: Demodulator for QPSK.
The received signal is first multiplied by two sinusoids
2 T cos2fct  and
2 T sin 2f ct  . The results are then integrated respectively by two integrators.
The outputs of the integrators are sampled at t = T.
sampled output x1 can be expressed as
For noiseless case, the resulting

T
2
2
2
x1    si1
cos2f c t   si 2
sin 2f c t  
cos2f c t dt
0
T
T
T


2 T
2 T
 si1   cos 2 2f c t dt   si 2   sin 2f c t  cos2f c t dt 


T 0
T 0
2 T1 1
2 T1


 si1    cos4f c t dt   si 2   sin 4f c t dt .
0
0
T 2 2
T 2


6-25
(6.5-7)
Replacing f c  nc T in the above equation where nc is a positive integer, we
have
x1  si1
2t
1
2
1
 n  T
 n  T
 
sin  4 c t    si 2  
cos 4 c t  
T  2 8 nc  T
T  0
T  8 nc  T
T  0




2  T
2
1
1

.
 si1    0   0  0   si 2  

T  2
T  8 nc T  8 nc T  


(6.5-8)
The last equality follows since sin( 4nc )  0 and cos( 4nc )  1 for any
positive integer nc . Therefore, from the above equation, we have
x1  si1 .
Similarly, we can show

T
2
2
x 2    si1
cos2f c t   si 2
sin 2f c t   2 T sin 2f c t dt  si 2 .
0
T
T


(6.5-9)
Therefore, the original messages s i1 and s i 2 can be separated at the receiver and
hence can be detected independently.
The sampled outputs x1 and x 2 are each
compared with a threshold of zero by the decision devices located at the upper and
lower channels, respectively. If x1  0 , a decision is made in favor of m1  1 for the
upper channel, but if x1  0 , a decision is made in favor of m1  0 . Similarly, for
the lower channel, if x2  0 , a decision is made in favor of m2  1 , but if x2  0 , a
decision is made in favor of m2  0 . Finally, these two binary sequences are
combined in a parallel-to-serial converter to reproduce the original binary sequence at
the transmitter input.
An example of QPSK signals is given in Fig. 6.5-4.
6-26
Fig. 6.5-4: Signals of QPSK.
(a) The Transmitted Signal.
(b) The Signal
y1 t   st   2 T cos2f c t  . (c) The Signal of y2 t   st   2 T sin 2f c t . (d)
The Output of the Upper Integrator and the Corresponding Sampling Points.
Output of the Lower Integrator and the Corresponding Sampling Points.
(e) The
The transmitted signal s (t ) is given in Fig. 6.5-4 (a) which is a modulated
signal with the input bit stream “10011011”, where E  1 , fc = 1 Hz and T = 2 sec.
At the receiver, the signals after the multiplication of carriers denoted by
y1 t   st   2 T cos2fct  and y2 t   st   2 T cos2fct  are given in Fig.
6.5-4(b) and Fig. 6.5-4(c) respectively. The outputs from the integrators and the
corresponding sampling points x1 and x 2 are given in Fig. 6.5-4(d) and Fig.
6.5-4(e), respectively. Based on the sampled values, the decision output after the
parallel-to-serial converter is “1001101” which is exactly the same as the transmitted
sequence.
Let us here emphasize the basic principle of the QPSK system. The QPSK
system mixes two bits together and transmits them at the same time. Why can they
be detected correctly? This is due to the fact there are two orthonormal functions
6-27
1 t  and 2 t  contained in the expansion of si (t ) .
2 t  are given by
1 t  
2
cos2f ct 
T
2
2 t  
sin 2f ct 
T
Specifically, 1 t  and
0t T
(6.5-10)
0  t  T.
It is easy to verify that 1 t  and 2 t  are orthonormal basis functions, i.e.,
  t  t dt  0
(6.5-11)
  t dt  1
(6.5-12)
T
0
1
2
and
T
0
2
i
for i=1,2.
The transmitted signal therefore can be expressed as
si t   si11 t   si 22 t  .
(6.5-13)
A look at Equation (6.5-13) will tell us that the demodulation of the QPSK
system can be done by multiplying si (t ) by 1 (t ) and  2 (t ) . Multiplying si (t )
by 1 (t ) will give us the value of s i1 and multiplying si (t ) by  2 (t ) will give us
the value of s i 2 . Once si1 (t ) and s i 2 are known, m1 and m2 can be
determined accordingly.
There are four vectors si  ( si1 , si 2 ) for i  1,2,3,4 which can be represented
as signal pointsin the signal space diagram as shown in Fig. 6.5-5.
6-28
Fig. 6.5-5: Signal-Space Diagram of a Coherent QPSK System.
It is possible to increase the transmitted bit rate by increasing the number of
signals in the signal constellation. For example, we may double the number of
QPSK signals, resulting in 8 signal points as shown in Fig. 6.5-6. This signal
constellation is called 8PSK which can transmit three bits at each signaling interval
without increasing the transmitted bandwidth. However, under the same transmitted
signal energy per symbol, the distance between two nearest points in the 8PSK is less
than that of the QPSK, and hence it is more likely that an 8PSK detector will make
more errors than those of the QPSK systems. Therefore, we pay this by sacrificing
the bit error rate or increasing the transmitted signal energy to achieve the same bit
error rate as that of a QPSK system.
6-29
Fig. 6.5-6: Signal-space diagram of coherent 8PSK system.
6.6
Orthogonal Frequency Division Multiplexing (OFDM)
The modulation schemes introduced in previous sections require only one carrier with
a fixed carrier frequency. In this section, we introduce a modulation scheme using
many carriers with different frequencies. In general, such systems are called
multi-carrier systems. The orthogonal frequency division multiplexing (OFDM)
scheme is a special case of multicarrier systems, where a single data stream is
transmitted over a number of lower rate subcarriers, where every pair of subcarriers is
orthogonal.
In OFDM systems, the total signal frequency band is divided into N
non-overlapping frequency subchannels. Each subchannel is modulated with a
separate symbol and the N signals of all the subchannels are superimposed and
transmitted over the channel. Since all signals from all subchannels are mixed in the
transmitter, it is important to separate the information symbols from individual
subchannels at the receiver. The orthogonal property between subcarriers gives the
answer of this problem. The word orthogonal indicates that there is a precise
mathematical relationship between the frequencies of the carriers in the system. For
OFDM systems, the frequencies of all carriers are separated apart in such a way that
every pair of the carrier signals is orthogonal.
6-30
An OFDM signal consists of a sum of subcarriers that are modulated by using
phase shift keying (PSK) or quadrature amplitude modulation(QAM). For simplicity,
consider a binary PSK modulated OFDM system where N carriers are employed in
the system. In this case, N information bits are transmitted per OFDM symbol. That
is, in OFDM systems, N bits are transmitted in the same time unit. For the i-th bit,
if this bit is 1(0), mi is set to be +1(-1). Let T be the duration of the OFDM symbol;
then the transmission rate is N
T
bits/sec. Let ( m0 , m2 ,..., m N 1 ), where mk  {1}
for 0  k  N  1 , be the transmitted information bits. The OFDM signal can be
expressed as
s (t ) 
N / 2 1
m
k  N / 2
kN / 2
c o s2( ( f c  kf )t )
for 0  t  T
(6.6-1)
where f c is the carrier frequency and  f is the bandwidth of each subchannel. The
carrier frequency is set to be c
T
with c being a positive integer greater than N.
From Section 6.3, the OFDM system can be thought as a system that combines N
binary PSK's with different frequencies.
 k (t )  2 / T cos(2 ( f c  kf )t )
Let
,
for
0t T
and
k   N ,, ( N )  1 . We can show that f  1 is the smallest channel spacing
2
2
T
so that  i (t ) and  j (t ) , for i  j , are orthogonal. To verify the orthogonality
between  i (t ) and  j (t ) , we have
 i (t ),  j (t )
2 T
cos( 2 ( f c  if )t ) * cos( 2 ( f c  jf )t )dt
T o
2 T1
  (cos( 2 (i  j )ft )  cos( 2 (2 f c  (i  j )f )t )) dt
T o 2
1 for i  j

0 for i  j.

6-31
(6.6-2)
Therefore,  i (t ) and  j (t ) are orthonormal for i  j . Now, for simplicity, assuming
that the received signal is received without distortion, we have the received signal
r (t )  s(t ) 
T N / 21
 mk  N / 2 (t ) for
2 k  N / 2
0t T .
(6.6-3)
The problem now is how to demodulate the binary message m j  N / 2 carried by
the jth subcarrier. The solution is to pass the received signal through a correlator that
correlates the signal  j (t ) . The output of the jth correlator can then be expressed as
T
x j  N / 2 =  r (t ) j (t )dt
0
T
=
0
T N / 21
 mk  N / 2 k (t ) j (t )dt
2 k  N / 2
(6.6-4)
T
T N / 21
=
mk  N / 2   k (t ) j (t )dt

0
2 k  N / 2
=
T
m jN / 2 .
2
The last equality follows since  k (t ) and  j (t ) are orthogonal for k  j . Therefore, all
information bits contained in all subcarriers can be separated at the receiver and hence
can be detected independently. Fig. 6.6-1 illustrates a simple OFDM system with four
carriers. The carrier frequency f c is set to be 3 Hz and  f is set to be 1Hz. The
information bits ( m0 , m1 , m2 , m3 ) are BPSK modulated to the carriers with 1,2,3, and 4
Hz, respectively. The resulting signals from each subcarrier are combined and
transmitted over the channel. At the receiver, a bank of correlators are employed to
separate the information bit carried by each subcarrier. The output signal from each
correlator is compared with a threshold. The threshold is set to be zero in this case. If
the output signal is greater than zero then a decision of 1 is made; otherwise a
decision of 0 is made.
6-32
Fig. 6.6-1: OFDM Transmitter and Receiver with 4 Subcarriers.
Fig. 6.6-2 shows all the four carriers for 0  t  1 .
In this example, all
subcarriers have the same phase and amplitude, but in practice the amplitude and
phase may be modulated differently for each subcarrier. Fig. 6.6-3 shows all the
possible waveforms as ( m1 , m2 , m2 , m3 ) ranges over all the 16 possible values.
6-33
Fig. 6.6-2: OFDM Carrier Signals.
Fig. 6.6-3: All 16 Possible Combinations of OFDM Signals.
6-34
One advantage of the OFDM technique is that the modulator and the
demodulator can be easily implemented by discrete-time Fourier transform (DFT),
and hence the fast Fourier transform (FFT) introduced previously can be employed in
OFDM systems. Essentially, we shall point out that one of the steps in modulating
the input signal can be implemented by using the inverse discrete Fourier transform
technique.
From Equation (6.6-1), we have
N 1
2

s (t ) 
2
N 1
2


k  N
mk  N cos( 2 ( f c  kf )t )
2
k  N
mk  N cos( 2
2
2
k
t  2f c t )
T
for 0<t<T
(6.6-5)
2kt
 N2

j

 Re  mk  N e T e j 2f ct .
 k - N

2
2


Let
s' (t ) 
N 1
2

k  N
mk  N e
j
2kt
T
.
(6.6-6)
2
2
The term s ' (t ) is called the equivalent baseband signal of s (t ) .
Then
s(t )  Re( s' (t )e j 2f ct ) .
(6.6-7)
Let
s' (t )  s1 ' (t )  js2 ' (t ) .
(6.6-8)
We can now see that
s(t )  Re( s' (t )e j 2f ct )
 Re (( s1 ' (t )  js2 ' (t ))(cos( 2f c t )  j sin( 2f c t )))
 Re (( s1 ' (t ) cos( 2f c t )  s 2 ' (t ) sin( 2f c t ))
(6.6-9)
 j ( s 2 ' (t ) cos( 2f c t )  s1 ' (t ) sin( 2f c t )))
 s1 ' (t ) cos( 2f c t )  s 2 ' (t ) sin( 2f c t ).
Equation (6.6-9) shows that s (t ) can be obtained after s ' (t ) is obtained.
6-35
The term
s ' (t ) can be obtained by a straightforward implementation.
But this requires the
multiplication of cosine and sines by hardware, which is by no means easy.
following, we shall introduce a method to obtain s ' (t ) efficiently.
Note that s ' (t ) is defined in Equation (6.6-6).
In the
In Equation (6.6-6), the mi ' s
have already been given and our job is to compute s ' (t ) for all t.
A look at Equation
(6.6-6) will remind us that we are dealing with a case which is quite similar to the
inverse Fourier transform introduced in Sections (4.6) and (4.7). Thus, our method
to find s ' (t ) will consist of the following two stages:
(1) Instead of computing s ' (t ) for all t, we only compute s ' (t ) for N sampling
points. The bandwidth of s ' (t ) is approximately equal to fN / 2  N /( 2T ) ,
since there are approximately N carriers each with channel bandwidth  f
distributed over the frequency band from  f (N / 2) to f ( N / 2  1) . Therefore,
the minimum sampling rate is N/T. That is, for n  0,1, 2, , N  1, we compute
the following points:
si '  s' (
iT
)
N
for i  0,1, 2,, N  1 .
Later, we shall prove that the computation of s i ' s is equivalent to computing an
inverse discrete Fourier transform.
(2) After we have obtained s0 ' , s1 ' ,, s N 1 ' , we can perform an extrapolation to
obtain s ' (t ) for all t.
Let us go back to the problem of computing s0 ' , s1 ' ,, s N 1 ' . From Equation
(6.6-6),
si '  s ' (iT

N 1
2

k  N


)
mk  N e j 2k (iT / N ) / T )
2
2
N 1
2

k  N
N
2
2
N 1
2
 mk  N e j 2ki / N 
k 0
(6.6-10)
mk  N e j 2ki / N
2
1

k  N
mk  N e j 2ki / N .
2
2
6-36
Let k '  k  N ; the second term of the Equation (6.6-10) can be expressed as
1

k  N

m
e j 2 ( k ' N )i / N
2
2
m
k ' N
e j 2k 'i / N e j 2 (  N )i / N
2
m
k ' N
e j 2k 'i / N e  j 2i
2
2
N 1
m
k ' N
(6.6-11)
2
N 1
k ' N

k ' N
N 1
k ' N

2
2
N 1
k ' N

mk  N e j 2ki / N
k ' N
e j 2k 'i / N .
2
2
The last equality follows since e  j 2i  1 . Now, we may rewrite (6.6-10) as
si ' 
N / 2 1

k 0
mk  N / 2 e
j
2ki
N
N 1
+
m
kN / 2
k N / 2
e
j
2ki
N
.
(6.6-12)
Now define
 mk  N / 2 for 0  k  N / 2  1
Ak '  
mk  N / 2 for N / 2  k  N  1.
(6.6-13)
We have
N 1
si '   Ak ' e
j
2ki
N
.
(6.6-14)
k 0
From Equation (6.6-14), we can see that the finding of si ' s is equivalent to
computing the inverse discrete Fourier transform of Ai ' s as discussed in Section 4.7,
where Ai ' is defined in Equation (6.6-13) and is known because mi 's are known to
us. Therefore, the discrete-time equivalent of the modulated signal s ' (t ) can be
obtained by performing an inverse discrete-time Fourier transform of. Ai ' . In
practice, this transform can be implemented very efficiently by the inverse fast
Fourier transform (IFFT). The IFFT drastically reduces the number of calculations by
exploiting the regularity of the exponential functions.
6-37
Let us summarize the above discussion as follows:
(1) Our major job is to find s (t ) as defined in Equation(6.6-5).
(2) We define s ' (t ) according to Equation (6.6-6) and let
s' (t )  s1 (t )  js2 (t ) .
as in Equation (6.6-8).
Then, according to Equation (6.6-9),
s(t )  s1 (t ) c o s2( f c t )  s2 ' (t ) s i n2( f c t ) .
'
(3) To find s ' (t ) , we first obtain A0 ' , A1 ' ,, AN 1 ' from m0 , m1 ,, m N 1 according
to Equation (6.6-13).
(4) We compute the inverse discrete Fourier transform of A0 ' , A1 ' ,, AN 1 ' and
iT
).
N
(5) Having obtained s0 ' , s1 ' ,, s N 1 ' , we perform an extrapolation on them to obtain
obtain s0 ' , s1 ' ,, s N 1 ' where s i '  s ' (
s ' (t ) .
(6) Having obtained s ' (t ) , we can use Equation (6.6-9) to obtain s (t ) .
If we do not use the above procedure to obtain s (t ) , we have to use Equation
(6.6-5). Note that Equation (6.6-5) involves a large number of multiplications and it is
complicated to design a hardware to implement it. The fast inverse discrete
Fourier transform used in the above procedure, on the other hand, is much easier to be
implemented, as discussed in Chapter 4.
Similarly, the fast Fourier transform (FFT) can also be used in the receiver for
demodulating the received signal. Fig. 6.6-4 illustrates a simple OFDM system
that employs the IFFT as the modulator and FFT as the demodulator. Since the
output of the IFFT is a discrete time signal, it has to be converted to continuoustime signal by a parallel-to-serial converter followed by a digital-to-analog (A/D)
coverter. The resulting signal is then up converted to the desired frequency band
by multiplying the carrier with frequency f c . In the receiver, the received signal is
6-38
first down converted to the basedband equivalent signal by multiplying the carrier
with frequency f c , resulting the signal s ' (t ) for distortion-less case. The resulting
signal is then sampled by an analog-to-digital (A/D) converter to perform the
extrapolation as mentioned above, with sampling rate N/T. A serial-to-parallel
converter is then employed to store the samples, resulting in the samples si 'i 0 .
N 1
Finally, an FFT is employed to recover
Ak 'kN01
from si 'i 0 by taking the FFT of
N 1
si 'iN01 .
A0'
s0'
A1'
s1'
IFFT
sN' 1
AN' 1
Parallel s
i
to Serial
converter
Band-Pass
Filter
D/A
e j 2f ct
CHANNEL
A0'
s0'
A1'
s1'
FFT
AN' 1
sN' 1
Serial to
Parallel
converter
si
Band-Pass
Filter
A/D
e j 2f ct
Fig. 6.6-4: A Simple OFDM System with the IFFT and FFT.
6.7 The Role of Inner Product in Digital Modulation
In the above sections, although different modulation techniques have been
introduced, there is actually a common basic principle: to use the inner product
concept. Consider the binary frequency shift keying (FSK) system, for instance. In
this case, we have two signals: cos 2 f1t and cos 2 f 2 t . At any moment, either
we receive cos 2 f1t or cos 2 f 2 t . Let the received signal be denoted as y (t ).
6-39
To detect which signal we have received, we may use the inner product concept.
Suppose we multiply y (t ) by cos 2 f1t and integrate. If the result is 1, we know
that we must have received cos 2 f1t . If the result is 0, we must have received
cos 2 f 2 t . This is the basis of our demodulation mechanism. That our mechanism
works is due to the fact that the two signals, namely cos 2 f1t and cos 2 f 2 t , are
othogonal.
Let us now consider the quadriphase-shift keying system (QPSK).
we have a mixed signal as follows:
si t   si1
In this case,
2
2
cos2f ct   si 2
sin 2f ct  .
T
T
Our job is to detect s i1 and s i 2 . This can be easily done because cos(2f c t ) and
sin( 2f c t ) are orthogonal. To detect s i1 , we multiply si (t ) by cos(2f c t ) and
integrate and to detect s i 2 , we multiply si (t ) by sin( 2f c t ) and integrate. That
this will work is due to the fact that cos(2f c t ) and sin( 2f c t ) are orthogonal as
pointed out in Chapter 3.
Finally, the reader can now easily see why the orthogonal frequency division
multiplexing scheme works. Although we have mixed a set of signals with different
frequencies, we have made sure that they are orthogonal to one another.. To detect the
signal with a certain frequency, say f c  if , we only have to multiply the received
signal with cos(2 ( f c  if )t ) and integrate. Only the associated coefficient,
namely mi  N / 2 , survives and all of the other coefficients vanish.
6-40
Download