m5zn_d53e5eb5b45c5a9

advertisement
T325: Technologies for digital media
Block III – Part 3: Access and modulation
Arab Open University- Spring 2012
1
• Time division multiple access (TDMA)
• Code Division Multiple Access (CDMA)
• Channelization codes
• Scrambling codes
• OFDMA
• Modulation and symbols
• Quadrature methods and quadrature
amplitude modulation
Outline
Arab Open University- Spring 2012
2
2
• The key Access technology in GSM system is the Time
division multiple access (TDMA)
• Operator’s band of frequencies for uplink and downlink is
divided into a set of channels for use within a cell
• Each channel is shared by a few users simultaneously using
time-division multiplexing
• The sharing of frequency channels by several users in GSM
means that TDMA is combined with frequency division
multiple access (FDMA)
Time division multiple access
Arab Open University- Spring 2012
3
• In the uplink and downlink
directions, communication on
each of the frequency channels
is divided (in GSM) into
‘frames’ of 4.615 ms duration.
• Frames are further subdivided
into slots, with eight time slots
per frame.
• A slot lasts about half a
millisecond (546.5 µs), and
accommodates 114 bits of data.
• Slots are allocated to
individual users.
Time division multiple access
Arab Open University- Spring 2012
4
• In TDMA, users DO NOT literally have simultaneous
access.
• Users rapidly take turns to have exclusive use of the
particular frequency channel they have been allocated to in
a cell.
• These turns come round every 4.615ms (the duration of the
frame), and the turn lasts for approximately half a
millisecond (the duration of the slot).
• The user’s communication channel (the channel which
carries the user’s data) in this case consists of their recurring
slot, which is in the same relative position in succeeding
frames.
• However, 1 in 13 frames is reserved entirely for control
data.
Time division multiple access
Arab Open University- Spring 2012
5
• Note: Time slot & GSM channel , Should not to be
confused with a frequency channel
• Each frequency channel carries eight GSM channels.
• In GSM, the user has exclusive access to their GSM
channel even if a call consists of silence.
• As mentioned above, a frame lasts 4.615ms. How many
frames are there per second?
Time division multiple access
Arab Open University- Spring 2012
6
• A slot in a frame carries 114bits. For a single user, what is
the data rate in bits per second of their GSM channel if no
frames are ‘robbed’ for control data?
• There are 114bits associated with each time slot. Hence,
per GSM channel the rate is
• 216.7 x 114bit/s= 24 700 bit/s in one direction. (The same
rate is also available in the other direction.)
• 1 in 13 frames is reserved for control data. Hence, what is
the actual data rate for a GSM channel?
• One frame in 13 is reserved for control data; the previous
answer needs to be reduced by a factor of 12/13 to arrive at
the actual data rate per GSM channel:
Time division multiple access - Activity
Arab Open University- Spring 2012
7
• In GPRS, higher data rates are achieved by allocating a
user more than one GSM channel.
• A single GSM channel has a capacity of 22.8 kbit/s
• In practice, there are often constraints that limit the
number of GSM channels that can be allocated to one
user.
• EDGE (2.75 G technology) increases the data rate further
by using multilevel signaling.
• Multilevel signaling in EDGE enables 3 bits of data to be
transmitted in the time it takes to transmit 1 bit in GSM
and GPRS.
Time division multiple access - GPRS and EDGE
Arab Open University- Spring 2012
8
• If the signaling medium could adopt four different states,
each state could represent a combination of 2 bits of data.
If the medium could adopt 16 states, then each one could
represent a combination of 4 bits of data (24 = 16)
• Each state in a signaling medium is referred to as a
symbol, and the duration of a symbol is the symbol
period.
Time division multiple access
Arab Open University- Spring 2012
9
• The number of symbols per second is the symbol rate.
• Symbol rate = 1/ symbol period.
• Generally, using multilevel signalling does not increase the
bandwidth requirement of the channel carrying the signal.
• However, using many levels generally increases vulnerability
to noise compared with fewer states.
Time division multiple access
Arab Open University- Spring 2012
10
• Additional refinement of EDGE: availability of extra
coding schemes compared with GSM and GPRS, with
different coding rates  Coding rate can be more carefully
matched to the radio-channel conditions
• In favorable circumstances EDGE can attain around 300 kbit/s!
• GSM (and GPRS and EDGE) works within a finite resource,
in the sense that, per cell, there are only so many GSM
channels available.
• What if demands exceed the capacity in a particular
location?
 Replace the cell with several smaller ones.
Time division multiple access
Arab Open University- Spring 2012
11
• CDMA was an alternative air interface to TDMA in 2G
(mainly in the USA).
• In 3G, CDMA is used exclusively.
• One of the major advantages it offers is a less definite
limit on capacity.
• As more and more users operate in a cell, the
quality that each user experiences deteriorates
somewhat, but there is not the same absolute limit
on the number of channels that TDMA imposes.
Code Division Multiple Access (CDMA)
Arab Open University- Spring 2012
12
• CDMA enables adjacent cells to operate on the same
frequency band, which offers many advantages,
including ‘soft’ handover from cell to cell, whereby an
existing connection does not need to be broken before a
new one is established with another cell.
• On the other hand, CDMA is complex and requires an
amount of processing power
• Could not easily be incorporated into handheld devices
when the GSM system was being developed.
• This is one reason why TDMA was adopted for GSM
• There are two main sorts of code in CDMA, namely
channelisation codes and scrambling codes.
Code Division Multiple Access (CDMA)
Arab Open University- Spring 2012
13
• Suppose the base station
transmits simultaneously to two
users, A and B.
• If the data is sent unmodified
and simultaneously, then the
result is the bottom part of the
figure
• This is ordinary addition, not
binary addition
A and B send data simultaneously
CDMA: channelisation codes
Arab Open University- Spring 2012
14
• Decoding the superposed signal (provided there are two sets
of data):
• If result = 2  A = 1 and B = 1
• If result = 0  A = 0 and B = 0
• BUT if result = 1  (A = 1 and B = 0) or (A = 0 and B = 1)
• The idea with CDMA is to encode the 1s and 0s in such a
way that the receiver can always undo the superposition of
coded data and get back to the original data streams.
 Different signals, intended for different recipients, can
be sent simultaneously, but retrieved independently at
the receiver
CDMA: channelisation codes
Arab Open University- Spring 2012
15
• Coding creates separate channels of
communication  It makes the data streams
Orthogonal
• Orthogonality: when multiple signals are
conveyed through a shared medium, the signals
should not interfere with each other in a way that
prevents data recovery.
• TDMA, CDMA and OFDMA enable signals to remain
orthogonal (even when they are sharing the same
transmission medium)
CDMA: channelisation codes
Arab Open University- Spring 2012
16
• The CDMA encoding consists of replacing the 1s
and 0s of a user’s binary data stream by patterns
of shorter chips prior to transmission.
• The chips, like binary data itself, can exist in
either of two states: represented as 1 and -1,
rather than 1 and 0.
• The pattern of chips used to encode the 1s and 0s
is different for each stream of data
• Individual users receive more than one stream of data,
and each stream would have its own code.
CDMA: channelisation codes
Arab Open University- Spring 2012
17
Wherever there is a 1 in the bipolar data, it is replaced by
the chip sequence
Code chips for A
Data for A in binary form (a)
and bipolar form (b)
CDMA: channelisation codes
Arab Open University- Spring 2012
18
Encoding of A’s data:
(a) binary data;
(b) bipolar data;
(c) is (b) encoded with A’s code
CDMA: channelisation codes
Arab Open University- Spring 2012
19
• The transmission of A’s and B’s data is accomplished by
transmitting a superposition of the two encoded versions
Code chips for A
Code Chips for B
CDMA: channelisation codes
Arab Open University- Spring 2012
20
• How to reconstruct A’s and B’s data from the superposed
version of their encoded data which arrives at A’s and B’s
receivers?
• By carrying out a mathematical operation
called correlation.
• A’s receiver ‘knows’ that the code used to encode the data
intended for A was 1, -1,1, -1.
• Using this code during correlation enables A’s data to be
extracted uncorrupted from the signal sent by the base station.
• the superposed set of chips received is 2, -2, 0, 0
• To extract A’s data, we multiply, in order, each chip in the
received signal by the corresponding chip in A’s code.
• Example: the first chip of the signal is 2. The first chip of A’s code
is 1. We multiply them and store the result; that is, 2 x 1= 2.
CDMA: channelisation codes
Arab Open University- Spring 2012
21
Arab Open University- Spring 2012
22
• You can see that the result of the correlation process has
been to recover a bipolar form of A’s original data, scaled
by a factor of 4.
Recovered data (a) and original data (b)
CDMA: channelisation codes
Arab Open University- Spring 2012
23
• Replacing bits by chips  Spreading the frequency
spectrum of the transmitted signal over a wider band of
frequencies.
• This gives enhanced immunity to certain types of noise,
which is known as processing gain.
• Processing gain is related to the number of chips used per
bit.
• If we had used 8-chip codes instead of 4-chip codes, the
processing gain would have been doubled.
• Processing gain accounts for the robustness of CDMA
in the presence of noise.
CDMA: channelisation codes
Arab Open University- Spring 2012
24
• The codes create orthogonal channels for users A and B
 As if the data had been transmitted through dedicated
channels
• Codes such as those used above are generally referred to as
channelization codes in CDMA.
• In the downlink in CDMA, channelization codes are used to
define independent channels of communication to different
users.
• In the uplink, the scrambling code distinguishes users 
Channelisation codes are nevertheless still needed in the
uplink.
CDMA: channelisation codes
Arab Open University- Spring 2012
25
• For CDMA to work as a practical system, we
require not only that individual users be able to
extract their data, but also that, if no data is
transmitted, none should be recovered by the
correlation process.
CDMA: channelisation codes
Arab Open University- Spring 2012
26
• Suppose we have a user C who has been assigned the
code: 1,1,-1, -1
• There is no data for C in the encoded stream
• What happens when the correlation process is carried out
using this code on the stream in which there is only data
for A and B?
• In the first period, A’s and B’s superposed data consisted
of the chip sequence 2, -2, 0, 0. Carrying out correlation
using C’s chip sequence on this interval gives
• (2 x1) + (-2 x1) + (0 x -1) + (0 x -1) = 0
 C has no data in the transmitted chips, and correlation
yields no data for C.
CDMA: channelisation codes
Arab Open University- Spring 2012
27
• All the channelization codes in CDMA must be
mutually orthogonal.
• Two codes are said to be orthogonal  their
correlation result should be ZERO
• Why orthogonality?
• It is the orthogonality of these codes that ensures that
streams of data can be recovered from the composite
signal uncontaminated by the other streams of data also
present in the composite signal.
• Orthogonality also ensures that correlation yields
nothing when there is no relevant contribution to the
composite signal
• Walsh codes: set of mutually orthogonal codes
Orthogonality of channelization codes
Arab Open University- Spring 2012
28
• In practice, the number of chips used in W-CDMA varies from 4 to
256 (and up to 512 for downlink only).
• The maximum number of chips is also the maximum number of
codes available in practice.
• Thus, for the uplink there is a maximum of 256 parallel codes available
per user and for the downlink there is a maximum of 512 parallel codes
available per cell.
• The number of chips in a Walsh code is always an integer power of 2.
• The codes are allocated to users by the RNC and allocated according
to the desired data rate.
• Shorter codes are associated with higher data rates because
• They use fewer chips to represent a bit of data, and
• The chip rate is constant for all codes.
CDMA: channelisation codes
Arab Open University- Spring 2012
29
• Walsh codes can lose their orthogonality if they
become unsynchronized.
• Example: if the codes for B and C were put out of
synchronism by an amount equal to the duration of 1 chip.
• The orthogonality of B and C depends on the synchronization
of the codes.
CDMA: channelisation codes - Synchronisation
Arab Open University- Spring 2012
30
• Synchronization between data streams cannot always
be guaranteed.
• It can be achieved in the downlink from the base station,
since individual data streams originate from the same place
• Each user’s equipment needs to be synchronized with the
data stream as it arrives, so that correlation can be properly
carried out by the user’s equipment.
• Using synchronisation channels (designated SCH) in
the transmission from the base station, the receiving equipment
is able to interpret these synchronization channels without
initially being synchronised to them
CDMA: channelisation codes – Synchronization
Arab Open University- Spring 2012
31
• Channelisation codes have the property that even codes of
different length retain their orthogonality.
• 4-chip code will be orthogonal to a 64-chip code (if
synchronized).
• Restrictions apply when long and short codes coexist.
• The particular long code chosen would restrict the allowed
shorter codes that could be used at the same time.
• only certain short codes are orthogonal to certain long
codes.
CDMA: channelisation codes – Synchronisation
Arab Open University- Spring 2012
32
• Replacing each bit by several chips increases the
bandwidth of the signal carrying the data.
• The signal energy in the modulated wave is spread over a
wider span of frequencies.
• The signal now makes more fluctuations in a given length
of time.
• CDMA, therefore, is an example of spread spectrum
transmission.
• Spreading the spectrum of a signal increases its resilience
to noise.
• The degree of spectrum spreading can be quantified via
the spreading factor.
Spreading factor, frames and data rate
Arab Open University- Spring 2012
33
• The spreading factor is equal to the number of chips used to
represent a single bit of data in the coding process.
• The spreading factor is numerically equal to the processing
gain.
• In UMTS, the chip rate is fixed at 3.84 Mchip/s.
• In the commonest variant of UMTS, the downlink occupies
5MHz and the uplink occupies 5MHz
• As in GSM, data is chunked into frames at the physical level.
• In UMTS, the frames are 10ms long.
 there are 100 frames per second,
 number of chips per frame is (3.84*106)/100 = 38 400 chips.
Spreading factor, frames and data rate
Arab Open University- Spring 2012
34
• If a spreading factor of 4 is used, then a group of 4 chips
represents a single bit of data.
Spreading factor, frames and data rate
Arab Open University- Spring 2012
35
• Larger spreading factors there are fewer bits per frame
and, hence, lower data rates.
• A frame is subdivided into 15 equal-length slots
• The length of a single slot, 2560 chips, comfortably
encompasses even the longest spreading codes, which are
512 chips long, and does so an integer number of times (5
times).
• A slot, therefore, always contains a whole number of
encoded bits of data.
• Spreading factor is sometimes expressed in terms of chip
rate and data rate as follows:
Spreading factor, frames and data rate
Arab Open University- Spring 2012
36
• Channelization codes are also named : orthogonal
variable spreading factor (OVSF) codes
• Variable because the possibility of varying the spreading
factor
• The length of spreading code used cannot be changed
within a frame
• In voice communication, the spreading factor is usually
much higher than in data.
• The much greater spreading factor (and, hence, processing
gain) in voice communication gives much greater resilience
to noise .
Spreading factor, frames and data rate
Arab Open University- Spring 2012
37
• CDMA uses orthogonal channelisation codes to keep
streams of data separate.
• Orthogonality of channel-coded data depends on
synchronisation, and synchronisation cannot always be
guaranteed  there is a need for additional coding
process!
• The additional coding process, in both the uplink and the
downlink, uses Scrambling codes
• Scrambling codes are different from the channelisation
codes, although, like channelisation codes, they are used
to create orthogonal (or almost orthogonal) streams of
data.
CDMA: Scrambling codes - Identifying the source
Arab Open University- Spring 2012
38
Downlink
Uplink
• Adjacent cells use the same
frequency in UMTS
• users can receive signals from
more than one Node B.
• channelisation codes are not
unique to a given source, the
Node Bs cannot reliably
determine which user a signal
arrives from.
Why the scrambling codes?
Arab Open University- Spring 2012
39
• Scrambling codes uniquely identify sources of signals in
either direction
• User equipment can distinguish one Node B from another
through the Node B’s different scrambling codes;
• A Node B can distinguish one piece of user equipment
from another through the different scrambling codes
allocated to user equipment.
• Scrambling codes in UMTS can be either 256 chips long
or 38 400 chips long (number of chips in a frame).
• Scrambling codes have a pseudo-random character that
makes them look like noise  known as pseudo-noise
codes or pseudo-random codes.
CDMA: Scrambling codes - Identifying the source
Arab Open University- Spring 2012
40
• Because encoding does not
increase the number of chips,
scrambling codes are not
spreading codes.
• At the receiver, scramblingencoded data is decoded
through the process of
correlation.
• Received chip sequences are
multiplied by the scrambling
code.
• The scrambling code needs to
be in the right relationship with
the received chips for this to
work.
CDMA: Scrambling codes - Identifying the source
Arab Open University- Spring 2012
41
• Channelization codes are used in the uplink prior
to the application of the scrambling code.
• Channelization codes spread the signal bandwidth,
which gives processing gain.
• The need to distinguish between different sorts of data
transmitted by user equipment: traffic and control data
• In the uplink direction, control data and traffic are
differentiated by being assigned to different
channels, each with its own channelization code.
• In the downlink direction, the two sorts of data are
time-division multiplexed within the same
channel.
CDMA: Scrambling codes - Identifying the source
Arab Open University- Spring 2012
42
• In Figure 3.22, at the left, we have A’s and B’s data which
are to be transmitted by the imaginary communication
system. Data is represented as Xs and Os because its form
is not important.
CDMA: Scrambling codes – Properties
Arab Open University- Spring 2012
43
• A’s and B’s data are encoded with the respective Walsh
codes (that is, channelisation codes).
• This new form is represented with coloured stripes.
• These two encoded versions are synchronised.
• Because a shared medium is used, they are superposed, or
added.
• At the receiver, correlation of the received signal with A’s
code (which has to be synchronised with the encoded
data) leads, theoretically, to perfect recovery of A’s data.
• B’s data could also be recovered perfectly using B’s
code.
CDMA: scrambling codes – Properties
Arab Open University- Spring 2012
44
Synchronized
streams with
walsh codes used
Nonsynchronized
streams with
walsh codes
used
CDMA: Scrambling codes – Properties
Arab Open University- Spring 2012
45
• Gold codes: a set of scrambling codes named after the
person who devised them.
CDMA: scrambling codes – Properties
Arab Open University- Spring 2012
46
CDMA: scrambling codes – Properties
Arab Open University- Spring 2012
47
CDMA: scrambling codes – Properties
Arab Open University- Spring 2012
48
Arab Open University- Spring 2012
49
• Synchronisation achieves two main outcomes:
• Enables receiving devices to work out where the frame
boundary is; that is, when frames start
• Enables a receiving device to work out the scrambling code of
the Node B it is receiving a signal from.
• Synchronisation takes place using two special
synchronisation channels transmitted from the Node B:
• Primary synchronisation channel (P-SCH)
• Secondary synchronisation channel (S-SCH)
• Each of these transmits fixed data, using a channelisation
code but no scrambling code.
Synchronisation of user equipment to Node B
Arab Open University- Spring 2012
50
• The primary synchronisation channel transmits a
fixed data word repeatedly once per slot
• Each frame contains an identical set of slots
• In every cell the Node B transmits the same code word in
the primary synchronisation channel
Synchronisation of user equipment to Node B
Arab Open University- Spring 2012
51
1. When the user equipment is switched on, it scans the
radio channels in the 3G band, based on a stored list of
preferred frequencies.
• Priority is given to the user equipment’s home network;
that is, the one with which the user is registered as a
customer.
2. Once the user equipment has found a frequency on
which transmissions are taking place, it looks for the
primary synchronisation channel and uses the fact that
the fixed data word is transmitted once per slot to align
itself to the slot boundary.
Synchronisation of user equipment to Node B
Arab Open University- Spring 2012
52
3. The UE then looks for the secondary synchronisation channel.
• The secondary synchronisation channel transmits a sequence
which occupies a whole frame.
• The sequence is repeated in all frames.
• Within a frame, the sequence is divided into portions across the 15
slots.
• Unlike the case with the primary synchronisation code, the
sequence in the secondary synchronisation channel varies from cell
to cell. However, there are only 64 possible sequences, so the user
equipment is able to work out which sequence is in use.
• Needs to know where the slot boundaries are, (discovered from the
primary synchronisation channel.)
• With the sequence established, the location of the frame boundary is
known.
Synchronisation of user equipment to Node B
Arab Open University- Spring 2012
53
• One of the objectives of 3G was to achieve higher data
rates than were possible in 2G and its derivatives, such as
GPRS and EDGE.
• The various 3G systems have themselves given rise to
derivatives designed to give higher data rates than
were achievable with the original specifications.
• The most notable of these are
• HSDPA(high-speed downlink packet access)
• HSUPA (high-speed uplink packet access)
Achieving high data rates in UMTS
Arab Open University- Spring 2012
54
• In the pursuit of higher wireless data rates, the trend has
been towards the use of wider bandwidths of
electromagnetic spectrum.
• Provided spectrum is being used efficiently, there is not
much alternative to using more spectrum if the data rate is to
be increased significantly.
• CDMA tends to have difficulties with wide bandwidths (up
to 20 MHz envisaged ‘beyond 3G’)
• Interest has focused on OFDMA, which holds out the
prospect of less computationally complex implementations.
• OFDMA is already used in the 802.11g Wi-Fi standard, which
uses channel widths of 20 MHz.
OFDMA
Arab Open University- Spring 2012
55
• OFDMA is based on orthogonal FDM (OFDM).
• The essence of OFDM is the simultaneous use of many
wireless carrier signals, known as subcarriers, each with a
different frequency, and with the frequencies chosen in a
way that gives particular properties.
• Separate subcarriers, or groups of subcarriers, can be
allocated to different streams of data, giving a type of
FDM.
• However, the way the frequencies are chosen in OFDM
differentiates it from ‘ordinary’ FDM.
OFDMA
Arab Open University- Spring 2012
56
• Sometimes in OFDM all the subcarriers are allocated
to a single data stream.
• This can be advantageous over the use of a single
carrier.
• You can probably appreciate that
if, instead of having just a single
carrier at 1GHz, you also had
additional carriers at 1.1 and
1.2GHz, and could use them
simultaneously, you could
enhance the rate of transmission
of data by spreading the data
across three channels rather than
restricting it to one.
OFDMA
Arab Open University- Spring 2012
57
• Modulation: is the process
of modifying a radio wave to
enable it to carry data.
• The radio wave which is
modulated is called the
carrier wave.
• Modulation methods based
on changes of amplitude can
be problematic because the
circuitry that generates and
transmits varying-amplitude
carrier waves tends to be
inefficient .
Modulation and Symbols
Arab Open University- Spring 2012
58
• There are benefits in using multilevel signalling, as
more data can be conveyed per symbol.
• In the context of modulation, this means modulating the
carrier in a way that gives more than two discernible
states.
• The more states that there are, the more bits can be
represented by each state.
Symbols and multilevel modulation
Arab Open University- Spring 2012
59
• Sine and Cosine Orthogonality
• Binary phase-shift keying is sometimes regarded as a special type
of amplitude modulation (amplitude changes by a factor of -1)
• This way of thinking about amplitude change is useful in
connection with quadrature amplitude modulation (QAM)
techniques.
Quadrature methods and quadrature amplitude
modulation
Arab Open University- Spring 2012
60
• Two sine waves different in phase by 90º are orthogonal,
where as sine waves different in phase by 180º are not
orthogonal.
• sine waves and cosine waves are orthogonal  changes of
amplitude or phase on a sine wave do not affect the amplitude
and phase states of a cosine wave that is superposed on it; and
vice versa.
Quadrature methods and quadrature amplitude
modulation
Arab Open University- Spring 2012
61
Quadrature methods and quadrature amplitude
modulation
Arab Open University- Spring 2012
62
• The orthogonality of sine and cosine waves means that
they can separately represent data.
• The data can be extracted by correlation.
• Hence, in quadrature modulation methods we transmit a
superposition of a modulated sine wave carrier and a
modulated cosine carrier.
• At the receiver, correlation could consist of multiplying
the received superposition of carriers by a synchronised
sine wave and by a synchronised cosine carrier wave
(Similar to correlation in CDMA channelization codes).
Quadrature methods and quadrature amplitude
modulation
Arab Open University- Spring 2012
63
• The I and Q axes represent the orthogonal carrier
waves, and graduations on these axes represent available
amplitudes.
• One wave is referred to as the ‘in-phase’ (I) component
and the other as the ‘quadrature’ (Q) component.
• Putting the axes at right angles indicates the
orthogonality of these carriers.
• This modulation method is known as quadrature phaseshift keying (QPSK).
4-QAM constellation diagram
Constellation diagrams
Arab Open University- Spring 2012
64
• In practice, the four blobs in QPSK are usually rotated
relative to the axes
• Each blob now represents a particular combination of “I”
and “Q” signal states.
• Sometimes, rather than absolute “I” and “Q” states, the
blobs represent changes of state data is conveyed by a
change of symbol, rather than by a symbol itself.
Constellation diagrams
Arab Open University- Spring 2012
65
• All the blobs are equidistant from the origin (the place
where the axes cross) there is no change of peak-to-peak
amplitude in the I and Q waves .
• Because this modulation scheme does not cause the
inefficiencies associated with changes of signal
amplitude, a form of QPSK is used in the uplink in
UMTS.
Constellation diagrams
Arab Open University- Spring 2012
66
• One of the drawbacks of 16-QAM (and 64-QAM) is that
the relative closeness of the constellation points increases
the likelihood of one point being mistaken for another
when the symbols are subject to noise interference (as
they usually are in radio transmission).
• Hence, 64-QAM and 16-QAM work best in areas of
relatively strong signal, and relatively low noise.
• When conditions are not favorable to multiple-state
modulation methods, transmitters tend to fall back on
ones with fewer states that are more resistant to noise.
• For instance, in a noisy environment, 64-QAM usually
falls back to 16-QAM, and then to QPSK.
Constellation diagrams
Arab Open University- Spring 2012
67
• How many additional bits of data are represented by each blob
in 16-QAM compared with
• (a) QPSK?
• (b) BPSK?
Sol:
• (a) In 16-QAM there are 16 blobs, or states. Hence, each blob
can represent 4bits of data(2^4 = 16). In QPSK there are four
blobs; hence, each blob represents 2 bits of data (2^2 = 4).
Thus, each blob in 16 QAM carries two more bits of data than
does each blob in QPSK.
• (b) In BPSK there are only two blobs, so each blob represents
1 bit of data. Hence, each blob in 16-QAM represents three
more bits of data than does each blob in BPSK.
Constellation diagrams - Activity
Arab Open University- Spring 2012
68
Download