TT Lecture 5 EN NB
TT Lecture 5 EN NB
Lecture 5 overview:
EE2T21 Telecommunications B
Dr.ir. Gerard J.M. Janssen
May 2, 2022
1
Lectures & Work-instructions Telecommunications B
Telecommunication Techniques
Lectures:
Monday 9-5 1st+2nd hour
Tuesday 3-5 1st+2nd hour
Wednesday 11-5 3rd+4th hour
Q&A/Working lectures:
Wednesday 4-5 3rd+4th hour
Thursday 12-5 5th+6th hour
2
Multi-level modulation techniques
Rb [bit/s] R
The symbol rate D b [ symb / s ] or [baud]
l [bit/symb] l
Per symbol, l bits are transmitted and the symbol time is Ts lTb.
3
M-PSK
4
Quadrature Phase Shift Keying (QPSK)
6
Offset QPSK (OQPSK)
7
Quadrature Amplitude Modulation (QAM)
8
Quadrature Amplitude Modulation (QAM)
9
Quadrature Amplitude Modulation (QAM)
As shown by the I,Q-description, general QAM can be seen as
two M-ASK signals modulating the quadrature carriers:
n
x(t ) xn h t xn h t nTs
n D n
n
y (t ) yn h t yn h t nTs
n D n
y (t ) y h t nT
n
n s
sin 2 fTs
Pg ( f ) 2 PTs 2
2 PlTb sinc 2
flTb
( fTs )
Proof in Couch p. 397.
In which P is the transmitted signal power.
2 Rb 2
The null-null bandwidth is: BT _ 00 2 Rs ( 2 D )
l Ts
12
Power Spectral Density (PSD)
Note: this is the single sided
spectrum in baseband!
13
Spectral efficiency: profit (1)
14
Spectral efficiency: cost
According to Shannon:
2 S Rb C 2 S
Rb C B log 1 log 1
N B B N
So, for a larger a larger S/N is required.
15
Minimum Shift Keying (1)
16
Minimum Shift Keying (2)
With application of:
2cos cos cos( ) cos( )
we get:
sin((1 2 )Tb (1 2 )) sin(1 2 )
1 2
sin((1 2 )Tb (1 2 )) sin(1 2 )
1 2
sin(2 h (1 2 )) sin(1 2 )
0
2 h / Tb
18
Minimum Shift Keying (4)
Now we find: 2 h 2 h 1
1 Rb
and F ,
2Tb 2
which is twice as large as for CPFSK.
19
Minimum Shift Keying (5)
MSK is FSK with h = 0.5.
The complex envelope for Minimum Shift Keying is given by:
g (t ) Ac e j ( t )
t
t
with (t ) 2F m( )d
m(t ) 0 t Tb
0
2Tb
t
With x(t ) Ac cos kTb t (k 2)Tb
2 Tb
t
y (t ) Ac sin (k 1)Tb t (k 3)Tb
2T b
Since s (t ) x(t ) cos ct y (t )sin ct we can conclude that MSK
is equivalent to OQPSK with half-sine symbol shapes with
duration 2Tb . The odd bits determine y(t) and the even bits x(t).
21
Minimum Shift Keying (7)
22
Power Spectral Density of MSK
The spectral main lobe of MSK is
1.5x wider than for QPSK due to the
cos 2 (2 f / R )
[ Py ( f )]dB 10log 2 2
[1 (4 f / R) ] half-sine pulse shape, however, the
side lobes decrease much faster,
sin(2 f / R ) 2
because the pulse shape contains
[ Py ( f )]dB 10 log
( 2 f / R ) less high frequency components (less
abrupt changes): better adjacent
channel properties.
cos 2 (2 f / R)
[ Py ( f )]dB 10 log
In GMSK (Gaussian Minimum Shift
2 2
[1 (4 f / R ) ]
Keying, used in GSM), Gaussian
shaped pulses are used with even
more gradual slopes and therefore
less high frequency components and
even larger side lobe attenuation and
thus even better adjacent channel
properties.
23
Generation of MSK
24
Spectral efficiency of digital signals
25
Orthogonal Frequency Division Multiplexing (1)
26
Orthogonal Frequency Division Multiplexing (2)
27
Orthogonal Frequency Division Multiplexing (3)
Rs
w1 N
Rs cos 2 f1t
w2 N
l N bits cos 2 f 2t
M 2l Rs
wN N
Rb l Rs
cos 2 f N t
OFDM transmission
Rs
Subcarrier symbol rate Rss
N ...
N
Subcarrier symbol time Tss NTs
Rs
Frequency
28
Generation of OFDM (1)
With w1e j1 , w2 e j2 the complex amplitudes of the modulated signal states.
n
Orthogonality is obtained for: f1 f 2 n Rss with n , n 0
Tss
For minimum separation between subcarrier center frequencies: f Rss .
29
Generation of OFDM (3)
Orthogonal sub-carriers (in baseband) in frequency and time domain.
1 1
0.8
0.8
0.6
0.6 0.4
0.2
0.4
0
0.2 -0.2
-0.4
0
-0.6
-0.2
-0.8
-0.4 -1
-10 -8 -6 -4 -2 0 2 4 6 8 10 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Time [Ts]
Frequency [1/T
Frequency [1/Ts] Time [TSS]
SS]
30
Generation of OFDM (4)
w1e j1
j 2 x(t )
w2 e
cos 2 f c t
l N bits
y (t )
l wN e j N
M 2 sin 2 f c t
g (t ) x(t ) jy (t )
A simple way to generate the OFDM baseband signal is by using the
Inverse Fast Fourier Transform (IFFT):
1 N N complex samples
j { k 2 ( k 1)( i 1)/ N } for i 1, .. , N samples
gi
N k 1
wk e
for k 1, .. , N frequencies
per OFDM symbol of
duration Tss
32
Generation of OFDM (2)
Some important parameters of OFDM:
2 Rs
fc Frequency
cos 2 f N t w n
wk k k
This has delayed practical application of OFDM till the end of the
1990s when fast digital signal processing components (especially
hardware implemented FFT/IFFT) became available.
36
OFDM receiver (2)
w1
x(t )
w2
cos 2 f c t
l N bits
y (t )
wN
sin 2 f ct
w n
wk k k
The FFT operates on N complex time samples taken uniformly over Tss .
The output of the FFT are N complex amplitudes (symbol states)
belonging to each of the subcarriers.
Accurate synchronization in time and frequency is crucial. Errors result
in ISI and inter-carrier interference (ICI), respectively.
37
Direct Sequence Spread Spectrum
Direct Sequence Spread Spectrum (DS-SS) modulation was originally
developed for military communication systems between 1950 - 1980
to ensure robust and covered communication.
In DS-SS modulation, the information signal is spread over a much wider
bandwidth than required based on the symbol rate.
A narrowband signal is made extremely wideband !
How?
Signal spreading over a much wider bandwidth is achieved by multiplying
the signal at the transmitter by a wideband code signal: spreading code.
Why?
- to create robustness against interference
- to allow multiple access: multiple users share the same frequency band;
- coveredness: the low PSD makes it difficult to detect and eavesdrop.
38
DS-SS Transmitter (1)
c(t )
Tb
Data modulation can be
m(t )
arbitrary, e.g. BPSK, DPSK,
Tc QPSK, MSK, QAM, etc.
m(t )c(t )
Short code: repeats every
symbol time
Long code: extends over
m(t )c(t ) cos c t many symbol times
40
DS-SS Transmitter (3)
m(t ) m(t )c (t )
2 Rs c(t ) 2 Rc
2 Rc c '(t ) 2 Rs
2 Rc
42
DS-SS Reception (2)
DS-SS is very robust against interference. When de-spreading the
desired signal, the interference is spread.
Processing
gain
c '(t )
PI
N I f fc [W/Hz]
2 Rc
43
DS-SS Reception (3)
DS-SS is also robust against interference of other DS-SS signals: when
the SS-code or code phase is different, the signal remains spread.
Processing
gain
44
Pseudo-Random Noise code generators (1)
A DS-SS code is a "pseudo random" sequence of {-1,1}. There are
several ways to generate such codes depending on the required
properties. One way is to use Maximum Length sequences which are
also called Pseudo-Random Noise (PRN) codes because of their noise
like spectral properties.
s4 s3 s2 s1 s0
A ML-code generator using a 5-stage shift register with code length 31.
45
Pseudo-Noise code generators (2)
P
A shift register length of P stages results in an ML-code of 2 1 chips.
Tcode
1
46
Pseudo-Noise code generators (3)
47
Spectral efficiency of DS-SS
48
Code Division Multiple Access (CDMA)
In Code Division Multiple Access (CDMA) the spectral resources
(bandwidth) are shared among multiple users using different DS-SS
codes.
5 5
c j (t ) m j (t ) m1 (t ) c1' (t )c j (t )m j (t )
j 1 c1' (t ) j 2
49
Pseudo-Random Noise code generators (3)
The cross-correlation of two codes, c1 (t ) and c2 (t ) , of the same
length, is given by: Tcode
Cross-correlation
1
1 0 Tcode
Acquisition
Carrier
&
recovery
tracking
Tc Data symbol