Unit - I Digital Communication System
Unit - I Digital Communication System
Formatter
Source
Encoder
Channel
encoder
Baseband
Processor/
Bandpass
Modulator
Channel
Output
transducer &
output signal
Deformatter
Source
Decoder
Channel
Decoder
Baseband
Decoder/
Bandpass
DeModulator
16. What is meant by base band signal and band pass signal?
The base band is the original signal that is intended to be transmitted
without modulation. It has a spectral magnitude near the origin (i.e. f = 0) and
zero elsewhere.
The band pass communication signal is obtained by modulating a base
band signal onto a carrier. It has spectral magnitude which is nonzero in a
band of
frequencies (i.e. fc) where fc > 0. fc is the carrier frequency.
17. Define base band processor.
The transmitters job is to convert the information source into a waveform
suitable for transmission. In low speed wired transmission, for proper
detection in the receiver and to combat noise and interference, line coding is
used. Some pulse shaping is also done to combat interference. All these are
collectively calles base band processor.
18. Define band pass modulator.
For transmission of high speed digital data, the signal needs to be
modulated,
i.e., frequency translated. The primary purpose of band pass modulator is to
map
the digital signal to high frequency analog waveforms.
Channel classification & Performance measure:
19. What is meant by channel?
The physical medium that is used to send the signal from the transmitter to
the receiver
(i)
e.g., the atmosphere (free space) in wireless transmission
(ii)
e.g., in telephone systems wire lines, fiber optic cables, and
wireless (microwave radio).
20. List out the mathematical models of communication channel.
(i)
Additive noise channel (Gaussian channel)
(ii)
Linear filter channel
(iii)
Linear time-variant filter channel.
21. Define multipath fading.
The term multipath refers to the fact that the transmitted signal arrives at
the receiver via multiple propagation paths at different delays. Multipath
fading will occur if the signal components arriving via different propagation
paths may add destructively.
22. What is meant by distortion less transmission?
In communication systems, in order to have distortion less transmission,
the channel should be noise free or distortion less. This implies that the
channel output is just proportional to a delayed version of the input.
For distortion less transmission, the transfer function will be
Y(f)
H(f) = ------ = A e-j2fTd
X(f)
23. What are the conditions to be satisfied for distortion less transmission?
In communication systems, in order to have distortion less transmission,
two conditions must be satised:
(i) When the amplitude response is at, then there is no amplitude
distortion.
(ii)When the phase response is a linear function of frequency, then
there
is no phase distortion.
24. Define Bit Error Rate (BER).
In digital transmission, the bit error rate or bit error ratio (BER) is the
number of bit errors divided by the total number of transferred bits during a
studied time interval. BER is a unit less performance measure, often expressed
as a percentage.
i.e., BER = number of errors / total number of bits sent
25. Which parameter is called figure of merit of a digital communication
system and why?
In digital communications, we use Eb/ = b a normalized version of SNR,
as
a figure of merit. Eb is bit energy and can be described as signal power S times
the bit time Tb. is noise power spectral density.
For a digital waveform the average power goes to zero and the symbol
energy is a more useful parameter for characterizing digital waveform. Hence
instead of SNR, Eb/ or b is more frequently used as the figure of merit.
26. Define Spectral Efficiency.
This is given by the number of bits per second of data that can be
supported by each hertz of bandwidth.
=R/B (bits/s)/Hz
where R is the data rate and B is the bandwidth.
Geometric Representation of Signal:
27. What are the properties of physically realizable waveforms?
Physically realizable waveforms satisfy the following properties:
1. Signicant non zero values over a composite time interval which is nite
2. The spectrum has signicant nonzero values over a composite frequency
interval which is nite
3. A continuous function of time
4. Finite peak value
5. Has only real values. (no complex values for any time)
28. Define and give an example for time limited and time unlimited signal.
A signal x(t) is called time limited if there exists a time period T > 0, such
that
X(t) = 0, for all |t| T. Time limited means band unlimited. Example: a
Rectangular pulse and its spectrum.
A signal x(t) is called time unlimited if there exists a bandwidth B > 0,
such
that X() = 0, for all || B.Time unlimited means band limited. Example:
sinusoid of the form
Theoretically, it is not possible for an absolutely bandlimited waveform to
be absolutely time limited and vice versa.
29. What is meant by basis function and basis set?
Basis functions are the collection of functions necessary to represent a
given
signal. Basis functions are independent. They are always orthogonal to each other,
i.e., the projection of one basis function on any other basis function is zero.
Basis set is the collection of basis functions. Any arbitrary signal in the
space
can be generated by a linear combination of these basis functions.
30. Define signal space and signaling set.
Signal space: The complete set of all signals is called signal space. The
minimum number of basis function used to represent a signal is called the
dimension of signal space.
Signalling set: A signal waveform used to transmit each logical level of
the input signal in a digital communication system is called signaling set.
31. Why we go for Gram Schmidt orthogonalisation procedure?
Consider a message signal m. The task of transforming an incoming
message
mi=1,2,..M, into a modulated wave si(t) may be divided into separate discrete
time and continuous time operations. The justification for this separation lies in
the Gram-Schmidt orthogonalization procedure which permits the representation
of any set of M energy signals,{si(t)}, as linear combinations of N orthonormal
basis functions.
32. What is GSOP?
The procedure for obtaining the basis set from the original set is known as the
Gram-Schmidt orthogonalisation procedure. It permits the representation of any
set of M energy signals,{si(t)}, as linear combinations of N orthonormal basis
functions.
Bandwidth:
33. Define bandwidth.
Bandwidth is defined as a band containing all frequencies between upper cutoff frequencies and lower cut-off frequencies.
UNIT II
BASEBAND FORMATTING TECHNIQUES
Sampling:
1. State sampling theorem for low pass signals.
A band limited signal having no spectral components above fm hertz can be
determined uniquely by values sampled at uniform intervals of
Ts 1/2fm sec.
2. State Nyquist criterion and Nyquist rate.
The sampling rate fs = 2fm is called the Nyquist rate.
The statement fs 2fm is known as Nyquist criterion. The Nyquist criterion
is a sufficient condition to allow an analog signal to be reconstructed
completely from a set of uniformly spaced discrete time samples.
3. What do you understand by the term aliasing?
When the sampling rate is reduced such that f s < 2fm, the replications of
signal spectrum will overlap and some information will be lost. This
phenomenon due to under sampling is called aliasing.
4. State band pass sampling theorem.
If a waveform has a non-zero spectrum only over the interval fL < |f| < fH,
where the transmission bandwidth BT is taken to be same as absolute BW,
BT=fH-fL, then the waveform may be reproduced by its sample values if the
sampling rate is fs 2BT.
5. Why is prefiltering done before sampling?
An anti-aliasing filter is a filter used before sampling, to restrict the
bandwidth of a signal to approximately satisfy the sampling theorem.
6. What should be the pass band for antialiasing and smoothing filters used
with pulse modulation systems?
The antialiasing filter should have a pass band equal to the signal
bandwidth (2fm) plus the transition bandwidth (ft). This additional spectral
interval ft does not represent any useful signal content; rather, it protects the
signal by reserving free spectral interval between two spectral replicas.
7. Define transition bandwidth.
All realizable filters requires a non zero bandwidth for the transition
between the pass band and the stop band, commonly known as transition
bandwidth.
8. A band pass signal has the spectral range that extends from 20 KHz to 82
KHz. Find the acceptable range of sampling frequency fs.
The bandwidth BW = 82k 20k = 62 KHz.
The acceptable sampling frequency fs = 2 BW = 124 KHZ.
Quantization:
9. Define Quantization.
Quantization is the process of taking continuous samples (analog signal)
and converting them to a finite set of discrete levels.
10. What is meant by quantile interval?
The step size between quantization levels is called quantile interval. It is
denoted by q.
11. Define uniform quantizer.
When the quantization levels are uniformly distributed over the full range,
the quantizer is called uniform quantizer.
12. What is quantization error or noise?
The approximation (rounding off) of each sample values of analog base
band signal to a quantization level gives rise to an error called quantization
noise given by eq(t) = m(t) mq(t).
Where m(t) is sampled analog signal,
Mq(t) is quantized signal.
13. Define quantization noise power.
Quantization error is bounded by half the step size i.e., q/2. For any
uniformly distributed random variable in the range (-q/2 to q/2) the average
power (variance) is given by q2/12.Hence, quantization noise power or mean
square error is given by q2= q2/12, where q is the quantile interval.
14. Give the expression for peak SNR of quantized signal.
Generally noise power is expressed on an average basis, whereas the signal
power may be peak power or average power. For peak SNR (i.e. peak signal
power to average quantization noise power ratio),
(S/N)q = 3L2
where L represents number of levels.
15. Define non uniform quantization.
Nonuniform quantizers have unequally spaced levels. The spacing can be
chosen to optimize the Signal-to-Noise Ratio for a particular type of signal.
It is characterized by:
a. Variable step size
b. Quantizer size depend on signal size
16. Why non uniform quantization is preferred for processing human
speech?
For human speech, uniform quantization would be wasteful because it
would give rise to low average SNR due to significance of low amplitude
signals. Hence to improve the overall SNR non uniform quantization is used
where quantization of the low amplitude portion of a speech is done more
finely than the larger amplitude portion.
where
28. What is the SNR of PCM system if number of quantization levels is 28?
Where, M = 2n = 28
= 4.77 for peak SNR
= 0 for average SNR
(S/N)dB = 6.02 X 8 + 4.77 = 52.93 dB.
29. Define PCM word size.
It represents the minimum number of bits/sample that should be used in
digitizing the analog waveform. It is given by the relation,
p = 0.5/100 = 0.005
l log2 (1/0.01) log2 (100) 6.64
Hence we can take l = 7 bits / sample
31. Why compressors are used in PCM?
It is used for having better signal-to-noise ratio (SNR) at lower bit rates.
The SNR of a companded PCM is independent of signal strength which improves
the dynamic range of the system.
32. State the principle of DPCM.
Differential pulse code modulation is a derivative of the standard PCM
It uses the fact that the range of differences in amplitudes between successive
samples of the signal is less than the range of the actual sample amplitudes.
The difference signal needs only fewer bits to represent the signal than PCM.
Thus DPCM can efficiently remove the redundancy in the encoded signal.
33. Define Delta modulation.
If we over sample (typically more than 4 times of Nyquist rate) a signal,
the correlation between adjacent samples increases and as a result, the
prediction error decreases. If this prediction error is small enough, it can be
encoded by only one bit. DM is basically a 1-bit DPCM where no extra
encoding effect is needed thereby simplifying the circuitry.
34. What are the limitations (or disadvantages) of delta modulation?
The two types of quantization errors are slope overload noise and granular
noise.
35. What is meant by slope over load distortion?
If the step size is too small for the staircase approximation u(t) to follow
a steep segment of the input waveform x(t), with the result that u(t) falls
behind x(t). This condition is called slope over load, and the resulting
quantization noise is called slope over load distortion.
36. Define granular noise.
Granular noise occurs when the step size is too large relative to the local
slope characteristics of the input waveform x(t), thereby causing the staircase
approximation u(t) to hunt around a relatively flat segment of the input
waveform.
37. Define Adaptive Delta Modulation.
Adaptive delta modulation (ADM) or continuously variable slope delta
modulation (CVSD) is a modification of DM in which the step size is not
fixed. Rather, when several consecutive bits have the same direction value, the
encoder and decoder assume that slope overload is occurring, and the step size
UNIT III
BASEBAND CODING TECHNIQUES
Error control codes:
1. Define Channel coding.
Channel coding adds redundancy in the signal so that the error caused by
the noisy channel can be rectified. The combined goal of channel encoder and
decoder is to minimize the effect of channel noise.
2. State Channel coding theorem.
The channel coding theorem states that if a discrete memoryless channel
has capacity C and a source generates information at a rate less than C, then
there exists a coding technique such that the output of the source may be
transmitted over the channel with an arbitrarily low probability of symbol
error.
3. What are the limitations of channel coding techniques?
Due to addition of redundant bits with message bits,
i) The transmission bandwidth increases.
ii) System complexity increases especially the implementation of
decoding operation in the receiver.
4. List out the objectives of channel code.
The four broad objectives of channel code are:
a) To have the capability to detect and correct errors.
b) To be able to keep the overhead of error control and correction as
minimum as practicable.
c) To be able to encode the symbol in a fast and efficient way.
d) To be able to decode the symbol in a fast and efficient way.
5. Classify the various types of error control methods.
The error control methods are of two types:
a) Error detection and retransmission The most common type is ARQ
(Automatic Request for retransmission) method used in computer
communication.
b) Error detection and Correction It is known as forward acting error
correction (FEC). Error correction codes (EEC) belongs to FEC.
6. List out the various types of error correction codes.
The error correction codes are divided into two basic categories:
a) Block codes : The various types of block codes are i) parity check
code, ii) Linear block code, iii) cyclic code.
b) Convolution code
7. Define codeword and a systematic codeword.
In block codes, each block of k information bits is encoded into a block of
n bits (n > k). This n-bit block is called codeword. The n-k check bits are
derived from the message bits.
A block code of length n and 2k code word is called a linear (n, k) block code
iff its 2k code words form a k-dimensional subspace of the vector space of all the
n-tuple over the field GF(2). {Note : GF(2) means Galois field of two elements. It
is the smallest finite field}
16. Write the features (or properties) of linear block code.
A linear code has the following properties:
a) The sum of two codewords belonging to the block code is also a codeword
belonging to the block code.
b) The all-zero word is always a codeword.
c) The minimum distance between two codewords of a linear code is equal to
the minimum weight of the code.
17. Check whether the given block code is linear or not. The block code C =
[000,010,110,100].
a) The sum of two codewords (010 + 110 = 100, 010 + 100 = 110, 100+110 = 010)
is
also a code word.
b) An all-zero code word is there (000).
c) d* = 1, w* = 1. Thus d* = w*.
The block code C satisfies all the properties of linear block code. Hence the
given code C is linear.
18. What is meant by nearest neighbour decoding?
A noisy channel randomly transforms some of the symbols of the transmitted
codeword into some other symbols. If a received word is not identical to any of
the valid codeword, then the transmitted codeword would be decided in favour of
the codeword whose Hamming distance from the received codeword is minimum.
This strategy is called Nearest Neighbour Decoding.
19. Define complete decoder and incomplete decoder.
In nearest neighbour decoding, if more than one codeword are at the same
Hamming distance from the received word, then the receiver can do either one of
the following:
i) It can randomly decide in favor of any one of the equally distant
neighbours. These decoders are called complete decoders.
ii) It can request the transmitter for retransmission. These decoders are called
incomplete decoders.
20. How will you find the minimum distance d* of a linear block code from the
given Parity check matrix (H)? Also find the minimum distance of the given
H matrix.
For the given parity check matrix, the sum of three columns (for example,
columns 1, 4 and 7) can produce zero. Hence for this code d* = 3.
21. Define a perfect code.
A perfect code is one which has equal radius disjoint spheres centered at the
codewords, completely filling the entire code space. Hamming codes perfect
codes.
22. What is meant by syndrome of a linear block code?
The receiver has the task of decoding the transmitted code vector c from the
received code vector r. The algorithm commonly used to perform this decoding
operation needs a 1-by-(nk) vector called error-syndrome vector or simply
syndrome.
The Syndrome is given by [s] = [r] [HT] = [e] [HT] where r = c+e
If [s] is non-zero, it means an error occurred.
23. How is syndrome computed for block codes?
The Syndrome is given by [s] = [r] [HT]
where r = c+e
= [c] [HT] + [e][HT]
= [e][HT]
where c is the transmitted word, r is the received word and e represents the
error word.
If [s] is non-zero, it means an error occurred.
24. List the important properties of syndrome.
i) The syndrome depends only on the error pattern and not on the transmitted
code word.
ii) The syndrome s is the sum of those columns of the H matrix corresponding
to
the error location.
iii) All error patterns that differ at most by a code word have the same
syndrome.
25. Define repetition codes.
A repetition code represents the simplest type of linear block codes. In
particular, a single message bit is encoded into a lock on n identical bits,
producing an (n,1) block code. There are only two code words in the code: an allzero codeword and all-one codeword.
26. Define Hamming code.
The Hamming code is capable of correcting all the error patterns with a single
error or of detecting all the error patterns of two or fewer errors.
For any positive integer m 3, there exists a Hamming code with the
following parameters :
Code length:
n = 2m 1
Number of information symbols:
k = 2m m 1
Number of parity-check symbols:
nk=m
27. Determine the generator matrix for a rate 1/3 repetition code.
For the given repetition code, k = 1, n = 3. The generator matrix [G]kXn is
given by,
Cyclic codes:
28. What are the fundamental properties exhibited by cyclic codes?
A binary code is said to be a cyclic code if it exhibits two fundamental
properties:
i) Linearity property: The sum of two code words is also a codeword.
ii) Cyclic property: Any cyclic shift of a code word is also a code word.
29. Show that the code C = {000,100,011,111} is not cyclic.
The cyclic shift of 100 is 010 which is not a code word. Hence C is not a cyclic
code.
30. List out the properties of cyclic code.
i)
The generator polynomial of an (n,k) cyclic code is unique in that it is
the only code word polynomial of minimum degree (n-k).
ii)
The generator polynomial g(x) and the parity check polynomial h(x)
are factors of the polynomial 1+xn as shown by h(x).g(x) = 1+xn.
31. What are the steps involved in the encoding procedure for an (n,k) systematic
cyclic code.
Step 1: Multiply the message polynomial d(x) by xn-k.
Step 2: Divide xn-k d(x) by the generator polynomial g(x) and obtain the
remainder (x).
Step 3: The code word polynomial c(x) is obtained from c(x) = xn-k d(x) + (x).
32. What are the advantages of cyclic codes?
i)
The implementation of encoders and decoders for cyclic codes are
simple.
ii)
Cyclic codes also detect error burst that span many successive bits.
33. List out the important classes of cyclic codes.
i)
Cyclic Redundancy Check codes (CRC code).
ii)
Golay codes.
iii)
Reed-Solomon codes (RS code).
iv)
Bose-Chaudhuri-Houquenqhem (BCH) codes.
34. What does mean by RS coding?
These are nonlinear BCH codes. The encoders for RS codes operate on
multiple bits simultaneously. The (n, k) RS code takes the groups of m-bit
symbols of the incoming binary data stream. It takes such k number of symbols
in one block. Then the encoder adds (n-k) redundant symbols to form the
codeword of n symbols.
35. What is meant by BCH code?
BCH code is a powerful cyclic code. It can correct any number of errors based
on the specifications of error correcting capability the code can be designed.
Hamming code is a special case of BCH code whose error correcting capability is
1.
36. Define CRC codes.
CRC codes are specially designed for detecting burst errors. In any event,
binary (n, k) CRC codes are capable of detecting the following error patterns:
i)
All CRC error bursts of length n-k or less.
ii)
A fraction of CRC error bursts of length equal to n-k+1. The fraction
equals 1 2-(n-k-1).
iii)
A fraction of CRC error bursts of length greater than n-k+1. The
fraction equals 1 2-(n-k).
iv)
All combinations of d* -1 (or less) errors.
Convolutional codes:
37. What is convolutional code?
A convolutional encoder operates on the incoming message sequence
continuously in a serial manner. Fixed number of input bits is stored in the shift
register and they are combined with the help of mod-2 adders. This operation is
equivalent to binary convolution and hence it is called convolution coding.
38. Explain the fundamental difference between block codes and convolutional
codes.
In block coding, the encoder accepts a k-bit message block and generates an nbit code word. Thus, code words are produced on a block by block basis.
In convolutional coding, the encoder operates on the incoming message
sequence continuously in a serial manner.
39. What is meant by constraint length of convolutional code?
Constraint length (K) is the number of shifts over which the single message bit
can influence the encoder output. It is expressed in terms of message bits.
40. Draw the diagram of convolutional encoder of rate with generator
polynomial: g1(D) = 1 + D + D2 and g2(D) = 1.
Info
bit
K1
K2
K3
2 bit code
41. How will you define coding gain with reference to error control codes?
UNIT IV
BASEBAND RECEPTION TECHNIQUES
Noise in communication systems:
1. List out the various noise that affects the communication systems.
The important sources of noise that affects the communication systems are,
i)
Noise occurs during sampling Timing jitter.
ii)
Quantization noise.
iii)
Channel noise Additive white Gaussian Noise(AWGN) and Inter
Symbol Interference (ISI)
2. Define timing jitter.
In analog to digital and digital to analog conversion of signals, the sampling
frequency is normally assumed to be constant. Samples should be converted at
regular intervals. If there is a slight timing error (jitter), the sampling is no
longer uniform in time.
Receiving Filter:
3. What is a matched filter?
A filter whose response is a time reversed and delayed version of some signal
j(t), is said to be matched to j(t). It is a linear filter to provide maximum
signal to noise ratio.
4. How is the transfer function of matched filter related to the spectrum of the
input signal?
In frequency domain, the magnitude spectrum of the matched filter and the
signal are same. The transfer function of matched filter is given by,
where S*(f) represents the spectrum of the input signal.
5. List out the properties of matched filter.
i) If a signal s(t) gets corrupted by AWGN, the filter with impulse response
matched to s(t) maximizes the output SNR.
ii) The matched filter impulse response is the mirror image of the signal.
iii) Matched filter does not contribute inter symbol interference.
iv) In frequency domain, the magnitude spectrum of the matched filter and the
signal are same.
6. List the applications of matched filter.
Matched filters are commonly used in radar, in which a known signal is sent
out, and the reflected signal is examined for common elements of the out-going
signal. Pulse compression is an example of matched filtering. Two-dimensional
matched filters are commonly used in image processing.
Equalizing Filter & ISI:
7. What is the need for equalization? (or) Why do we require equalization for a
communication system?
Where,
Eye Pattern:
16. How is eye pattern obtained on the CRO?
The received signal is fed to the vertical deflection plates of an oscilloscope
and to apply a sawtooth wave at the transmitted symbol rate R = 1/T s to the horizontal
deflection
plates. The waveforms in successive symbol intervals are thereby
translated into one
interval on the oscilloscope display. The resulting display is
called an eye pattern because of its resemblance to human eye.
17. From the eye pattern, how is the best time for sampling determined?
The width of the eye opening defines the time interval over which the received
signal can be sampled without error from ISI. The best sampling time is the instant
where the vertical opening of the eye is the largest.
18. What is an eye pattern (or eye diagram)?
It is an experimental tool to evaluate the combined effect of noise and inter
symbol interference on overall system performance. It is defined as the synchronized
superposition of all possible combinations of signal, noise and ISI in the system,
viewed between particular symbol intervals.
19. What is the purpose of using an eye pattern? (or) Give the application of eye
pattern.
i) Eye diagrams reveal the impact of ISI and noise
ii) Eye diagram can also give an estimate of achievable BER.
iii) Eye diagram is a means of evaluating the quality of a received digital
waveform
27. What is the need for demodulator in case of baseband signaling when the
received waveforms are already pulse like forms?
The arriving baseband pulses are not in the form of ideal pulse shapes, each
one occupying its own symbol interval. The filtering at the transmitter and the channel
typically causes the received pulse sequence to suffer from inter symbol interference
(ISI). The goal of the demodulator is to recover a baseband pulse with the best
possible Signal to Noise Ratio (SNR), free of any ISI.
28. Why digital detection is superior over analog detection process?
If a noise contaminated digital signal have enough signal energy to noise
energy ratio then it can be properly detected, and thereafter noise has no bearing on
its processing. On the other hand, in case of analog detection, the in band noise cannot
be fully eliminated because the detection is not based on any discrete value of
signal energy; rather it depends on the shape of the signal as well.
29. What is meant by maximum likelihood detector?
A detector that minimizes the error probability for the case where the symbols
are equally likely is known as maximum likelihood detector. For equally likely
signals, the optimum threshold o passes through the intersection of the likelihood
functions.
30. What is meant by a posteriori probability?
If the symbols are not equally likely, for a received signal sample value of r,
compare the following two probabilities:
a)
The probability that the symbol 1 was transmitted and
r has been the received signals sample value.
b) The probability that the symbol 0 was transmitted and r has been the received
signals sample value.
The greater of the two probabilities give us the most likely symbol was
transmitted. The probabilities a & b is called a posteriori probability.
31. Define MAP detector.
A detector based on choosing the symbol whose a posteriori probability is
maximum is known as MAP detector (Maximum a posteriori probability detector).
32. Bipolar pulse waveforms gi(t) (i = 1, 2) of amplitude 1V are received in the
presence of AWGN that has a variance of 0.1V 2. Find the optimum detection
threshold of MAP detector, if the a priori probability is p(gi) = 0.5.
The optimum threshold detection of MAP detector is given by,
UNIT V
BANDPASS SIGNAL TRANSMISSION & RECEPTION
Memoryless modulation methods:
1. State the difference between base band and band pass transmission.
Baseband transmission sends the information signal as it is without modulation
(without frequency shifting). In baseband transmission, line coding is utilized,
resulting
in a pulse train or pulse amplitude modulated (PAM) signal. This is
typically used over non-filtered wires such as fiber optical cables and short-range
copper links.
Bandpass transmission shifts the signal to be transmitted in frequency to a
higher frequency (modulation) and then transmits it, where at the receiver the signal
is shifted
back to its original frequency (demodulation). Passband transmission is
typically utilized
in wireless communication.
2. What are the advantages of digital modulation techniques?
i) Spectral efficiency use of a narrow bandwidth to send a large amount of
data. Effective use of limited frequency resources.
ii) Good privacy and security features - Digital encryption techniques
may be
employed.
iii) Lower power consumption.
iv) Reduced device size.
3. Define memoryless modulator.
If the analog waveform {gm(t)} is mapped from the digital sequence {an}
without any constraint imposed by the previously transmitted symbols, the
modulated signal is called
memoryless.
4.
5.
State the difference between coherent and non coherent binary modulation
techniques. (or) Differentiate coherent and non-coherent detection.
Coherent detection: In coherent detection, exact replicas of the possible arriving
signals are available at the receiver. This means that the receiver has exact knowledge
of the carrier waves phase reference, in which case the receiver is said to phase
locked to the transmitter. ASK, FSK, PSK, QPSK are examples for coherent
modulation techniques.
Non Coherent detection: In non coherent detection, the knowledge of the
carrier waves phase is not required. The complexity of the receiver is thereby
reduced but at the expense of an inferior error performance, compared to a coherent
system.
6.
binary one and its absence to indicate a binary zero. This type of modulation is called
on-off keying (OOK).
7.
8.
19. Explain how QPSK differs from PSK in terms of transmission bandwidth and
bit information it carries.
For a given bit rate 1/Tb, a QPSK wave requires half the transmission
bandwidth
of the corresponding binary PSK wave. Equivalently, for a given
transmission bandwidth,
a QPSK wave carries twice as many bits of information
as the corresponding binary PSK
wave.
20. Define QAM and draw its constellation diagram.
Quadrature amplitude modulation (QAM) is both an analog and a digital
modulation scheme. In this modulation, the carrier experiences amplitude as well as
phase modulation. Thus the resulting waveform is a combination of both Phase
Shift
Keying (PSK) and amplitude-shift keying (ASK).
The constellation diagram for 16-QAM is,
techniques
Coherent ASK
Coherent FSK
Coherent PSK
Coherent QPSK
Non coherent ASK
Non coherent FSK
Where, Eb is the transmitted signal energy per bit
represents the noise spectral density
The figure of merit b = Eb /
27. Write the expression for bit error rate for coherent binary FSK.
In general,