Digital Modulation Handout
Digital Modulation Handout
A special case of ASK is when a logic 1 is represented by cos (i.e., the presence
of a carrier) and a logic 0 is represented by a zero voltage (i.e., the absence of a
carrier). This special case is called On-Off Keying (OOK) and is shown below.
Notice that you can visualize ASK as the process of Amplitude Modulation (AM)
using a “Polar NRZ” digital baseband message signal. In other words, we say that
ASK is the result of multiplying a binary Polar NRZ signal (with appropriate
DC shift) times a sinusoidal carrier. This is shown in the diagram below:
Page 1 of 18
The above diagram shows that a general ASK signal is simply an AM signal with a
modulation index m < 1, while an OOK is an AM signal with a modulation index
m = 1. Hence, an envelope detector can be used at the receiver to demodulate the
ASK signal. Actually, all types of modulators and demodulators we explained
earlier for AM are now applicable to ASK provided that the message signal m(t)
used is a digital baseband Polar NRZ signal.
The following is a sketch of the PSD for an ASK signal. It consists of two replicas of
the PSD for a Polar NRZ signal with additional carrier impulses. You can see that
the bandwidth of this ASK signal is approximately 2fo (Hz).
Advantages Disadvantages
• ASK is the simplest kind of • It can be used only when the signal-to-
modulation to generate and noise ratio (SNR) is very high.
detect. • Its bandwidth is too big (equals 2fo).
Page 2 of 18
Notice that FSK can be thought of as Frequency Modulation (FM) using a “Polar
NRZ” digital baseband signal as the message, and hence FSK can be seen as a subset
of FM modulation.
≈ ∆ +
Since FSK is a special case of FM modulation, the bandwidth of FSK is given by
Carson’s rule which says that , where B is the bandwidth of the
Polar NRZ signal (equal to fo (the bit rate)). Hence, the bandwidth of FSK is
2∆f + 2fo (Hz). In addition, all modulator and demodulator circuits for FM are still
applicable for FSK.
FSK has several advantages over ASK due to the fact that the carrier has a constant
amplitude. These are the same advantages present in FM which include: immunity
to non-linearities, immunity to rapid fading, immunity to adjacent channel
interference, and the ability to exchange SNR for bandwidth. FSK was used in early
slow dial-up modems.
Page 3 of 18
BPSK can be thought of as a special case of Phase Modulation (PM) using a “Polar
Since BPSK is a special case of PM, the bandwidth of PSK is 2B + 2∆f, where B is
the bandwidth for the polar NRZ signal and ∆f = 0 since the sinusoidal carrier signal
does not change its frequency. Hence, the bandwidth of BPSK is 2fo (Hz).
Data 10 11 00 01
QPSK(t)
1Notice that BPSK can also be thought of as a special case of DSB-SC in which the Polar NRZ signal
DSB-SC modulates a sinusoidal carrier. This is because multiplying a carrier by positive and negative
values switches its phase by 180°.
Page 4 of 18
You can imagine QPSK as a special case of Phase Modulation (PM) in which the
baseband message signal m(t) is a digital M-ary signal (with M = 4). In this case, the
bandwidth of the M-ary baseband signal is B = Baud Rate = fo / 2, which means that
the bandwidth of the QPSK signal is 2B + 2∆f = fo instead of 2 fo for BPSK. Hence,
QPSK can be used to double the data rate compared to a BPSK system while
maintaining the same bandwidth of the modulated signal.
Notice that in PSK, the constellation points are usually positioned with uniform
angular spacing around a circle. This gives maximum phase-separation between
adjacent points and thus the best immunity to noise. Points are positioned on a
circle so that all the different phases can be transmitted with the same carrier
amplitude.
The axes in a constellation diagram are called the in-phase (I) and quadrature (Q)
axes, respectively, due to their 90° separation. The nice thing about a constellation
diagram is that it lends itself to straightforward and simple implementation of PSK
modulation in hardware. This is because the PSK modulated signal can be
generated by individually DSB-SC modulating both a sine wave and a cosine wave
and then adding the resulting modulated carriers to each other. In such case, the
constellation diagram is extremely helpful since the amplitude of each point along
the in-phase axis is the one used to modulate the cosine wave and the amplitude
along the quadrature axis is the one used to modulate the sine wave. This procedure
will be much more obvious when we discuss QAM modulation in the next section.
It is worth mentioning that BPSK and QPSK can be regarded special cases of the
more general QAM modulation, where the amplitude of the modulating signal is
constant (see next section).
Example: Find the bandwidth of an 8-PSK modulated signal if the data bit rate is
)
66.67 kHz.
Page 5 of 18
Quadrature Amplitude Modulation (QAM):
QAM is a modulation scheme which conveys data by modulating the amplitude of
two carrier waves. These two waves (a cosine and a sine) are out of phase with each
other by 90° and are thus called quadrature carriers — hence the name of the
scheme.
Both analog and digital QAM are possible. Analog QAM was used in NTSC and
PAL television systems, where the I- and Q-signals carry the components of
chrominance (color) information.
Digital QAM, on the other hand, is constructed using two M-ary baseband signals
(called i(t) and q(t)) modulating the two quadrature carriers. For example, in 16-
them can assume one of four possibilities. This results in 4 4 = 16 possible carrier
QAM both i(t) and q(t) are 4-ary digital baseband signals, which means each one of
Page 6 of 18
For example, to send the bit sequence 100101110000 using 16-QAM, the bit stream is
split into 4-bit groups, with each 4-bit pattern affecting i(t) and q(t) as shown in the
figure below.
Data 1001 0111 0000
i(t) 3A
4-ary A
signal A
3A
180 0
i(t) cos( ct)
t
Notice that the baud rate (i.e., the symbol rate) of the resulting 16-QAM signal is one
fourth that of the data bit rate. This is why the bandwidth of 16-QAM is 2×Baud Rate
= 2 fo/4 = fo/2. You can see that this is correct because the bandwidth of each one of
the 4-ary signals is B = fo / 4 (one symbol per four bits). Performing DSB-SC
modulation for each one of these signals (i.e., QAM) results in a total bandwidth of
2B = 2 (fo/4) = fo/2.
Example: Find the bandwidth of an 16-QAM modulated signal if the data bit rate is
)
= 4 MHz.
Page 7 of 18
In QAM, the constellation points are usually arranged in a square grid with equal
vertical and horizontal spacing called rectangular QAM (see the above constellation
diagram). The number of points in the grid is usually a power of 2 (2, 4, 8...). The
most common forms of QAM are 16-QAM, 64-QAM, 128-QAM and 256-QAM. By
moving to higher-order constellations, it is possible to transmit more bits per
symbol, which reduces bandwidth. However, if the mean energy of the constellation
is to remain the same, the points must be closer together and are thus more
susceptible to noise; this results in a higher bit error rate (BER) and, hence, higher-
order QAM can deliver more data less reliably than lower-order QAM unless, of
course, the SNR is increased.
Rectangular QAM constellations are, in general, sub-optimal in the sense that they
do not maximally space the constellation points for a given energy. However, they
have the considerable advantage that they are easier to generate and demodulated
using simple hardware. Non-square constellations
achieve marginally better performance but are
harder to modulate and demodulate.
Note: It is worth mentioning that in practical systems, M-ary signals are shaped
case, the bandwidth of QAM (or PSK) becomes 2 ?@AB 1 + C /2 instead of just
using a raised-cosine pulse before modulating the two quadrature carriers. In such
2 ?@AB.
2Remember that baud rate = symbol rate = bit rate / bits-per-symbol. This means that the number of
above constellation diagram, you will notice 128 symbols corresponding to D = log 7 128 = 7 bits.
data bits-per-symbol is k = 14400 / 2400 = 6 bits. However, if you count the number of symbols in the
This seeming contradiction is a result of using one of the seven bits as a parity bit not as a data bit.
Using parity bits combined with high-order modulation is called Trellis Coded Modulation (TCM).
Page 8 of 18
Performance of digital modulation techniques in presence of Noise:
Remember that we measured the performance for analog modulation techniques in
terms of signal quality, which was related to output signal-to-noise ratio (SNRout).
For digital modulation techniques, the performance is measured in terms of output
bit error rate (BER), which represents the number of erroneous bits that the receiver
expects per second. For example, a BER = 10-4 means that we expect on average 1 bit
Remember that we are using the Additive White Gaussian Noise (AWGN)
mathematical model to describe the noise on a communication channel. Hence, the
Recall that for a standard Gaussian random variable X with zero-mean and unity-
variance , the probability density function (pdf) is:
1 L )
N 1 = P 7
√2
For the purpose of our performance analysis, we will define the Quantile function
Q(x) as the complement of the cumulative distribution function F(x) of the standard
Gaussian random variable, i.e.,
U
1 U LV)
Q 1 = 1 − R 1 = 1 − S N T BT = S N T BT = S P 7 BT
LU √2
The diagram below gives a visual representation for Q(x) which represents the
shaded area under the standard Gaussian density curve:
F(x)
Q(x)
x n
Usually we use a table (similar to the one shown below) to lookup Q(x) values for
specific x arguments since the above integral has no closed form solution.
Page 9 of 18
x Q (x ) x Q (x ) x Q (x ) x Q (x )
Generalized
Polar p(t)
–p(t)
p(t) = 5 V
5V
Polar
NRZ
-5 V
p(t) = A cos( ct)
A
BPSK t
–A
–A cos( ct) =
A cos( ct – 180 )
Page 10 of 18
We start by assuming that our receiver will sample the received pulse p(t) in the
middle of the pulse (also called symbol) period to read its amplitude. For example,
if the transmitted signal is Polar NRZ, as shown above, the detected samples are
supposed to be A = +5V or –A = –5V, which decides whether the received bit is a
logic 1 or a logic 0.
However, because of the channel noise the detected samples will be ±A + n, where
n is a zero-mean normally (Gaussian) distributed random noise, as shown below. In
threshold detection, and because of the symmetry of the situation, the preferred
detection threshold is zero; that is, the received pulse is detected as a 1 or 0
depending on whether the sample value is positive or negative.
above figure). Hence, for Gaussian noise with zero-mean and variance M 7 the
corresponding to a transmitted 0 but falling above the zero-voltage threshold (see
3 Notice that for a Gaussian random variable that has zero mean and variance M 7 , the probability that
f) f)
the random variable exceeds a value x is c N T BT = c P BT = chij P BT = Q h j.
L L
)g) )
∞
d√7e
∞ ∞
√7e g d
Page 11 of 18
Hence, using conditional probabilities, we have:
It is important to notice, however, that for AWGN noise the above threshold
detection is not optimal. For example, a better method is to sample the pulse p(t)
three times; if at least two out of three samples are positive, the received bit is
considered 1. It turns out that the optimal scenario is to sample the pulse infinitely
many times, which is equivalent to calculating the energy of the received symbol
instead of just using one sample value to make the final decision.
To achieve this optimal behavior, receivers use a matched filter before sampling the
output of the filter at the end of each symbol time (see the Figure below). The
sampling the received symbol l + ] , the receiver now samples the output of
To derive the mathematical equations at the receiver, we notice that instead of
~} =~ |
1 U
and,
l} = ℱ L €~} • = ℱ L €~ | •= S ~ | P ‚ƒ, B
2 LU
where ~ is the Fourier transform of the incoming symbol l . Since the output
of the matched filter is sampled at = „%- # , the peak sample value is now:
1 U
= l} …„%- #† = S ~ | P ‚ƒ‡ˆ‰Š‹ B
}
2 LU
Page 12 of 18
Œ • =Œ || |7
Hence, the rms of output noise is:
1 U 1 U
M} = ŽM 7• = Ž•••••••
]}7 =• S Œ B =• S Œ || |7 B
2 LU •
2 LU
‘} U
= • S || |7 B
4 LU
We explained earlier that the probability of error is given by the following equation:
And since the quantile function Q 1 decreases monotonically with 1, our objective
is to design the matched filter | such that the ratio } /M} is maximum . It can be
shown that (see Chapter 10 in your textbook for the analysis), that the matched filter
that maximizes the above ratio is:
| =~ − P L‚ƒ‡ˆ‰Š‹
If we use such a matched filter at the receiver (i.e., we use optimal threshold
detection), then irrespective of the symbol type or shape, we will have:
1 U
lP@D m@ lnP o@nAP = = S |~ |7 B = H%’ = P]PY“” p] ℎP p ,– m” —Zn
}
2 LU
‘! U ‘! H%’
Y m ZN ]ZpmP = M} = • S |~ |7 B =•
4 LU 2
Hence,
H%’ 2H%
= k Q£ ¥ Pr•žŸ qrstuv¡ = k Q ¦ • ’ § Pr•žŸ qrstuv¡
‘! H%’ ‘!
w&& xyz{'&x Ž w&& xyz{'&x
¢ 2 ¤
2 ∑ H%’ Pr6žŸ qrstuv:
= Q¦• §
‘!
Page 13 of 18
2H% 2H#
BER = Q ¦ • § = Q¦• §
‘! ‘!
The above analysis applies for other types of digital modulated signals, not just
polar signals, but with slight variations. A summary of the BER equations for the
different modulation techniques we discussed in this document is given below.
For the rest of this document, we will use the following notation:
• M = Number of possible symbols that the modulated signal can assume.
• k = the number of bits sent per transmitted symbol = log2 (M).
• Es = Average energy-per-transmitted-symbol in the modulated signal (Joule).
• To = Bit duration.
• Tsymb = Symbol duration = k To
• BER = Probability of bit-error = bit error rate.
H#
?HI = Q ¦ • §
FSK
‘!
2H#
?HI = Q ¦ • §
BPSK
‘!
2H#
?HI = Q ¦ • §
QPSK
‘!
2 H#
?HI ≅ Q ¦ •2D sin h j §
PSK (order M)
D ‘! «
4 1 3D H#
~# = _1 − `Q¦ • §
QAM (order M)
D √« « − 1 ‘!
(Rectangular QAM)
?HI = 1 − 1 − ~# 7
Page 14 of 18
Example:
amplitude of the carrier is = 0.5 V, data rate is 2 bps, and ‘! = 2 10L7 W/Hz.
Find the BER for BPSK if we use an optimal detector (a matched filter). Assume the
Solution:
In BPSK there is one symbol per bit (i.e., a total of two symbols that the modulated
signal can assume). The two symbols can be written as:
The energy-per-symbol here is the same as the energy-per-bit and is equal for both
possible symbols. Hence, its average is:
7 7 7 7 7
1
H# = H% = › „%- # œ Pr6a: + › „%- # œ Pr6\: = „%- = „} =
2 2 2 #
2 2 N!
Hence,
2H# 7 0.57
BER = Q ¦ • § = Q¦• § = Q¦• § = Q…√6.25† = Q 2.5
‘! ‘! N! 2 10L7 2
= 6.21 10L+
Example:
detector (a matched filter). Assume the data rate is 4 bps, and ‘! = 5 10L7 W/Hz.
Find the BER for the 16-QAM constellation shown below if we use an optimal
2
2.236
1
1.414
I
−2 −1 1 2
−1
2.828
−2
Solution:
In this system there are 16 possible symbols, which we assume to be equally
probable, i.e., each occurs with a probability of 1/16. Hence, the energy-per-symbol
Page 15 of 18
4 1 3D H# 4 1 3 4 0.625 3
~# = _1 − `Q¦ • § = _1 − `Q¦ • § = Q… √10†
D √« « − 1 ‘! 4 √16 16 − 1 0.05 4
3 3
= Q 3.162 = 8 10L> = 6 10L>
4 4
?HI = 1 − 1 − ~# 7
= 1− 1−6 10L> 7
= 1.2 10L+
-3
10
BER
-4
10
-5
10
-6
10
3 dB 4.5 dB
-7
10
0 5 10 15 20 25
E /N (dB)
b 0
Comparing BPSK and QPSK with ASK and FSK, we notice that BPSK and QPSK
provide smaller bit error rate for the same Eb/No. In other words, for the same bit
error rate, we need less signal-to-noise ratio (Eb/No) to send BPSK and QPSK. This
means that BPSK and QPSK have better immunity to noise than ASK and FSK.
Notice also that the performance of BPSK is the same as that for QPSK, while the
performance of 8-PSK and 16-PSK are worse (i.e., they require more signal-to-noise
ratio to achieve the same bit error rate). This is an expected result because 8-PSK and
16-PSK have more constellation diagram points (which are now closer and closer to
each other).
Also notice how 16-QAM has a superior performance compared to 16-PSK, which is
to be expected because the constellation points are further apart in 16-QAM
compared to 16-PSK.
Page 16 of 18
noise ratio (Eb/No) to achieve near error free transmission (this is ?HI ≈ 10L= ).
The following table shows the bandwidth requirements and the necessary signal-to-
Notice that for higher order modulation techniques, we require less bandwidth but
we need more signal-to-noise ratio (Eb/No) to maintain small bit error rate (i.e., to
maintain good performance).
2N}
Modulation Bandwidth Error free Eb/No (i.e., BER < 10-6)
2∆N + 2? = 2N} C + 1
ASK 13.5 dB
2 ?@AB = 2N}
FSK 13.5 dB
2 ?@AB = N}
BPSK 10.5 dB
2 ?@AB = 2N} /3
QPSK 10.5 dB
2 ?@AB = N} /2
8-PSK 14 dB
2 ?@AB = N} /2
16-PSK 18 dB
2 ?@AB = N} /3
16-QAM 14.5 dB
2 ?@AB = N} /4
64-QAM 18.5 dB
256-QAM 23.4 dB
The available signal-to-noise ratio (H# /‘! ) decides the level of modulation you can
you can send.
use while still maintaining a small bit error rate (good quality). In other words, it
decides the number of bits you can send per symbol.
Hence, the two factors together (bandwidth and SNR) decide the total bit rate you
can achieve over any single channel. Now compare this to Shannon’s Limit!!
IEEE 802.11 (Wi-Fi): A very important Wireless Local Area Networking technology.
Since Wi-Fi has many variants, it uses different modulation techniques such as:
BPSK, QPSK, 16-QAM, 64-QAM and CCK (Complementary Code Keying) (CCK is
an extension of QPSK).
DVB (Digital Video Broadcasting): This is the European standard for digital
television broadcasting. There are many variants within the standard: DVB-S (for
satellite broadcasting) uses QPSK or 8-PSK; DVB-C (for cable) uses 16-QAM,
32-QAM, 64-QAM, 128-QAM or 256-QAM; and DVB-T (for terrestrial television
broadcasting) uses 16-QAM or 64-QAM.
Page 17 of 18
DAB (Digital Audio Broadcasting): Future European standard for digital radio
broadcasting, which should replace AM and FM radio broadcasting. DAB use
DQPSK (Differential QPSK) (DQPSK is a variation of QPSK).
ADSL: Currently one of the main choices for connecting to the Internet. Uses
adaptive QAM in a scheme called DMT (Discrete Multi-Tone modulation).
Shannon's Limit:
You see by now that the two main resources in communication systems are the
channel bandwidth and the transmitted power (or SNR). In a given communication
channel, one resource may be more valuable than the other, and the communication
scheme should be designed accordingly.
The limitation imposed on communication by the channel bandwidth and the SNR
is dramatically highlighted by Shannon's noisy channel theorem, which applies for
channels contaminated with Additive White Gaussian Noise (AWGN) noise.
Shannon's equation states that:
where C is the rate of information transmission in bits per second, B is the channel
bandwidth (in Hz), and SNR is the signal-to-noise ratio (unitless) on the channel.
This rate C (known as the channel capacity) is the maximum number of binary bits
that can be transmitted per second with a probability of error arbitrarily close to
zero. In other words, it is impossible to transmit at a rate higher than C without
incurring errors. Shannon's equation clearly brings out the limitation on the rate of
communication imposed by B and SNR. This is why bandwidth and SNR are the
main quantities that we study in communication systems. Notice that if noise was
zero (i.e., SNR = ∞), or the bandwidth was infinite (B = ∞), then we can transmit
infinity information and communication would cease to be a problem.
It should be remembered that Shannon's result represents the upper limit on the rate
of communication over a channel and can be achieved only with a systems of great
complexity and a time delay in reception approaching infinity. Practical systems
operate at rates below the Shannon rate.
Page 18 of 18