Académique Documents
Professionnel Documents
Culture Documents
by
Davide Micheli
Table of Contents
CODING ........................................................................................................................................................... 14
2.1
2.2
BANDPASS SIGNALING............................................................................................................................... 32
4.1
COMPLEX ENVELOPE RAPPRESTNATION OF BANDPASS WAVEFORMS ................................32
4.1.1
Definitions: Baseband, Bandpass, and modulation ............................................................................. 32
4.1.2
Complex Envelope Representation ...................................................................................................... 33
4.1.3
Theorem............................................................................................................................................... 33
4.2
REPRESENTATION OF MODULATED SIGNALS..............................................................................35
4.3
SPECTRUM OF BANDPASS SIGNALS................................................................................................36
Theorem ............................................................................................................................................................. 36
7.6
7.7
8
10
11
12
QUADRATURE PHASE-SHIFT KEYNG (QPSK) AND M-ARY PHASE-SHIFT KEYNG (MPSK) .......................95
OQPSK AND /4 QPSK ..........................................................................................................................102
QUADRATURE AMPLITUDE MODULATION (QAM)..................................................................................106
PSD FOR MPSK, QAM, OQPSK, AND /4 QPSK WITHOUT PRE-MODULATION FILTERING ....................107
SPECTRAL EFFICIENCY FOR MPSK, QAM,OQPSK, AND /4 QPSK WITH RAISED COSINE FILTERING ...109
RECEIVER QPSK, MSK AND PERFORMANCE ..........................................................................................117
14
13
INTRODUCTION........................................................................................................................................121
SIGNAL MODEL FOR FQPSK ...................................................................................................................121
SIGNAL MODEL FOR FQPSK-B................................................................................................................131
SPECTRAL EFFICIENCY COMPARISON .......................................................................................................133
15
16
INTRODUCTION........................................................................................................................................151
EDGE SIGNAL DESCRIPTION: MODULATING SYMBOL RATE AND SYMBOL MAPPING .............................153
16.3
SYMBOL ROTATION.................................................................................................................................158
16.4
(8PSK EDGE) MODULATION AM DISTORTION .......................................................................................165
16.4.1
First problem (ISI):....................................................................................................................... 165
16.4.2
Second problem (AM):.................................................................................................................. 166
16.5
USED GAUSSIAN EDGE FILTER ..............................................................................................................167
16.6
EFFECT DUE TO GAUSSIAN EDGE FILTERING IN 3/8 SHIFTED 8PSK .....................................................170
16.7
MODULATION..........................................................................................................................................173
16.8
CONCLUSION ...........................................................................................................................................173
17
18
19
20
21
22
23
23.7
OFDM TRANSMITTER .............................................................................................................................254
23.8
FFT(LINE SPECRA FOR PERIODIC WAVEFORMS).....................................................................................256
23.8.1
Theorem ........................................................................................................................................ 256
23.8.2
Theorem ........................................................................................................................................ 258
24
APPENDIX..................................................................................................................................................... 267
24.1
24.2
25
CONVOLUTION PROCESS..........................................................................................................................267
DIRAC DELTA FUNCTION AND CONVOLUTION PROCESS ...........................................................................270
REFERENCE................................................................................................................................................. 271
Source
information
Transduction
Receiver
skay
NOISE
added
Transmitter
Transduction
Modulated
signal
Destination
figure 1
For digital systems, the optimum system might be defined as the system that
minimizes the probability of bit error at the system output. The variables are bit
error, signal bandwidth, transmitted energy and channel bandwidth.
The question is: is it possible to invent a system with non bit error at the output
even when we have noise introduced into the channel ? The answer is yes, under
certain assumption Shannon showed that (for the case of signal plus white
Gaussian noise) a channel capacity C(bits/s) could be calculated such that if the
rate information R(bits/s) was less then C, the probability of error would
approach to zero.
C = B log 2 1 +
N
eq 1
where B is the channel bandwidth in (Hz) and S/N is the signal-to-noise power
ratio(watts/watts, no dB) at the input to the digital receiver.
Shannon gives us a theoretical performance bound that we can strive to achieve
with practical communication systems. Systems that approach this bound usually
incorporate error correction coding.
The law above, in the first equation, it was found considering that: if S is a continuous
signal between that varies s1 and s2 values and, if p(s) is the density of probability for S,
than p(s)ds gives the probability for S of felling inside ds interval.
Therefore the information bits quantity related to S signal is
s2
q = p ( s ) log 2
s1
1
ds
p(s)
eq 2
1
is the number of bits needed to represent all values of signal S, each of
p(s)
which is multiplied by the density probability p(s) of the signal S
In a discrete case we easily have:
where log 2
q = Pn log 2
n=1
1
Pn
eq 3
q = Pn log 2
n=1
N
1
1
1
= log 2 N =
Pn n=1 N
N
log
n =1
N = log 2 N
eq 4
As an example the representation of 8 states discrete signal, where all states are
supposed with the same probability, require 3 bits (each bit can assume 2 values high,
low so we using log2x) because
3 = log 2 8
eq 5
In the continuous scenario, if S is the average signal and 2 is the variance, then it can
be shown that q (the number of bits needed to represent S) became maximum when
p(s) has a Gaussian distribution probability:
p( s) =
S2
2 2
eq 6
2 2
q=
p ( s ) log 2
e
S2
2 2
1
ds = log 2 (2 eS 2 ) 2 = log 2 (2 eS 2 )
2
bits/sample
eq 7
2 2
here S2 is the average signal power.
Considering now the Shannon theorem which says that a signal of bandwidth B
requires at least 2B sample rate (samples/second). Therefore in a time interval t are
necessary 2Bt samples of the signal S, here each sample are univocally determined by
q bits. So the information quantity bit related to the sampled signal S with q bits
quantizing, on the time interval t is:
1
Q = 2 B t q = 2 Bt log 2 (2 eS 2 ) 2 = Bt log 2 (2 eS 2 )
bits
eq 8
The presence of noise corrupts the receiving information at the receiver input. The
relative information associated is:
1
eq 9
eq 10
where PS+PN =S2 is the total power of signal plus noise with Gaussian probability
density function
The uncorrupted quantity of information will be
2 e(PS + PN )
P
= B t log 2 1 + S bits
2 e(PN )
PN
eq 11
P
Q
= B log 2 1 + S = Rb bits/s
t
PN
eq 12
eq 13
where
PN = KTB
BQt
BQt
PS
= 2 1 PS = KTB 2 1
KTB
eq 14
bandwidth B
power of signal PS
power pf noise PN
duration of message t
temperature of reference T
PS and PN power are reported in figure below as a function of the bandwidth, we have
fixed T=300 (K), Q=270833 (bit), K=1.38*10-23 (J/K) , t= 1 (s)
T
1.38E-23
tempo t (s)
300
Q (bit)
B (Hz)
Pn (w)
Ps (w)
1
270833
10000.0
4.1E-17
12500.0
5.2E-17
15625.0
6.5E-17
19531.3
8.1E-17
24414.1
1.0E-16
30517.6
1.3E-16
38147.0
1.6E-16
47683.7
2.0E-16
59604.6
2.5E-16
74505.8
3.1E-16
93132.3
3.9E-16
116415.3
4.8E-16
145519.2
6.0E-16
181898.9
7.5E-16
227373.7
9.4E-16
284217.1
1.2E-15
355271.4
1.5E-15
444089.2
1.8E-15
555111.5
2.3E-15
693889.4
2.9E-15
867361.7
3.6E-15
1084202.2
4.5E-15
1355252.7
5.6E-15
1694065.9
7.0E-15
2117582.4
8.8E-15
2646978.0
1.1E-14
3308722.5
1.4E-14
4135903.1
1.7E-14
5169878.8
2.1E-14
6462348.5
2.7E-14
5.9E-09
1.7E-10
1.1E-11
1.2E-12
2.2E-13
5.9E-14
2.2E-14
9.9E-15
5.5E-15
3.5E-15
2.5E-15
1.9E-15
1.6E-15
1.4E-15
1.2E-15
1.1E-15
1.0E-15
9.7E-16
9.2E-16
8.9E-16
8.7E-16
8.5E-16
8.3E-16
8.2E-16
8.1E-16
8.1E-16
8.0E-16
8.0E-16
7.9E-16
7.9E-16
-40.0
80
-45.0
75
-50.0
70
-55.0
65
-60.0
60
-65.0
55
-70.0
50
40
-80.0
35
-85.0
30
-90.0
25
-95.0
20
PS/PN=0 dB
and Q=B
-100.0
-105.0
-110.0
10
5
6462348.5
5169878.8
4135903.1
3308722.5
2646978.0
2117582.4
1694065.9
1355252.7
867361.7
1084202.2
693889.4
555111.5
444089.2
355271.4
284217.1
227373.7
181898.9
145519.2
93132.3
116415.3
74505.8
59604.6
47683.7
-20
38147.0
-15
-135.0
30517.6
-10
-130.0
24414.1
-5
-125.0
19531.3
-120.0
15625.0
Pn (dBm)
Ps (dBm)
Ps/Pn (dB)
15
-115.0
12500.0
Ps/Pn (dB)
45
-75.0
10000.0
Ps (dBm), Pn (dBm)
bandwidth (Hz)
figure 2
E:\documenti per
corsi\ELETTRONICA T
10
eq 15
i.e. where
P
Q
= B log 2 1 + S = B log 2 (1 + 1) = B = Rb
t
PN
bits/s
eq 16
Therefore when PS=PN, then the maximum transmission bandwidth (Hz) needed
for a correct received signal, is the same order of the channel capacity (bit/s).
Onboard of a satellite, one of the main problems concerns the heavy of the transmitter
systems, and the power required to transmission signaling. Therefore we are looking
for a system which can beneficial of exchanging between (PS/PN) and bandwidth
between input and output of the receiver.
In frequency modulation systems the bandwidth of the carrier channels are greater
than RX_output bandwidth channel, so at the input of the receiver can be used a
lower PS/PN. Anyway FM must work above FM C/N threshold and since the greater the
bandwidth, the greater the noise, then C/N threshold will increase with bandwidth. As a
consequence the Carrier power C will be affected by the same amount of growth too,
resulting in a bigger amplifier rather then a little amplifier as required.
As a conclusion, once we have been fixed PS/PN and the bit_rate Q/t, then we can
observe that the lower the PN, the lower PS. So the very important component of a
transmission design is trying to reducing the noise power PN.
11
R
(bits/s)/Hz
B
eq 17
P
Rb
= log 2 1 + S
B
PN
(bits/s)/Hz
eq 18
All the binary codes have 1. Multilevel signaling can be used to achieve much
greeter spectral efficiency.
12
The greater Ps/PN, the more is the spectral efficiency. Plotting this function we have the
following graph:
300.00
8.00
250.00
7.00
200.00
5.00
150.00
4.00
3.00
SNR (Lineare)
Spectral efficiency
6.00
100.00
2.00
Spectral efficiency
50.00
SNR (lineare)
1.00
24.33
24.23
24.13
24.03
23.93
23.82
23.71
23.60
23.48
23.36
23.24
23.12
22.99
22.86
22.72
22.58
22.43
22.28
22.12
21.96
21.79
21.61
21.43
21.24
21.04
20.83
20.61
20.37
20.13
19.87
19.59
19.29
18.98
18.63
18.26
17.85
17.40
16.90
16.33
15.68
14.91
13.98
12.79
8.45
11.14
0.00
0.00
0.00
SNR (dB)
figure 3
E:\documenti per
corsi\ELETTRONICA T
13
2 CODING
If the data at the output of a digital communication system have errors that are too
frequent for the desired use, the errors can be often reduced by use either of two main
techniques:
In an ARQ system, when a receiver circuit detects parity errors in a block of data, it
requests that the data block be retransmitted. In FEC system, the transmitted data are
encoded so that the receiver can correct, as well as detect errors. These procedures are
also classified as channel coding because they are used to correct errors caused by
channel noise. This is different from source coding, where the purpose of coding is to
extract the essential information from the source and encode it into digital form so that it
can be efficiently stored or transmitted using a digital techniques (example PCM)
The choice between using the ARQ or the FEC technique depends on the particular
application.
ARQ is often used in computer communication systems because is relatively
inexpensive to implement and there is usually a duplex (two-way) channel so that
the receiving and can transmit back an acknowledgement (ACK) for correctly
received data or a requests for retransmission (NAC) when the data are received
in error.
FEC is preferred on systems with large retransmission delays because if the
ARQ technique were used, the effective data rate would be small; the transmitter
would have long periods while waiting for the ACK/NAC indicator, which is
retarded by the long transmission delay.
14
figure 4
It is assumed that a digital signal plus channel noise is present at the receiver input. The
performance of a system that uses binary-phase-shift-keyed (BPSK) signaling is
shown both for the case when coding is used and for the case when there is no coding.
For the no coding case, the optimum (matched filter detector ) circuits is used at the
receiver. For the coded case a Golay code is used.
Pe is the probability of error-also called the Bit Error Rate (BER)- that is
measured at the receiver output.
The coding gain is defined as the reduction in Eb/N0 (in dB) that is achieved
when coding is used, when compared with required for the uncoded case at
some specific level of Pe. This improvement is significant in space
communication applications, where every decibel of improvement is valuable
since its possible to get the same Pe by using a lower Bit energy ( lower Power)
in transmission .
The figure also show noted that there is a coding threshold in the sense that the coded
system actually provides poorer performance than the uncoded system when Eb/N0 is
less than the threshold value.
15
For optimum coding, Shannons channel capacity theorem already seen, gives the
Eb/N0 required.
Channel
capacity
Q
P
= B log 2 1 + S = Rb bits/s
eq 19
t
PN
That is, if the source rate is below the channel capacity Rb, the optimum code will
allow the source information to be decoded at the receiver with Pe0. (i.e.10-) , even
though there is some noise in the channel.
We will now find the required Eb/N0 so that Pe0 with the optimum (unknown) code.
Assume that the optimum encoded signal is not restricted in bandwidth, i.e. assuming
an optimum encoder formed by a sequence of infinite redundant bit such that in order
to transmit signal plus redundant coding bit, the required bandwidth became infinite.
Then from equation above where it has been posed C( as channel capacity), PS=S ( as
power signal) and PN=N (as Noise power):
S
C = B log 2 1 +
N
bit/s
E / T
S [Watt ]
C = lim B log 2 1 +
= lim B log 2 1 + b b =
B
N 0 B
N [Watt ] B
1
if B = :
x
Eb
x
log 2 1 +
1
N 0Tb
Eb / Tb
C = lim log 2 1 +
x = lim
x0 x
N0
x
x0
eq 20
eq 21
where :
Tb is the time needed to send one bit and N is the noise power that occurs within the
bandwidth of the signal:
N0
df = N 0 B
B 2
N =
eq 22
where B is the signal bandwidth and N0/2 is the noise power spectral density (W/Hz).
16
E
log 2 1 + b x
N 0Tb
x
C = lim
=
x 0
x
x
1
Eb
log 2 e
NT
E
1 + b x 0 b
N 0Tb
E
E ln e
E
1
= lim
= b (log 2 e ) = b
= b
x 0
1
N 0Tb ln 2 N 0Tb ln 2
N 0Tb
eq 23
log a ( x ) =
log b ( x )
log b (a )
log 2 (e ) =
log e (e ) ln (e )
1
=
=
log b (2) ln (2 ) ln(2)
eq 24
d
du
1
log a (u ) =
dx
u ln (a ) dx
E
d
lim log 2 1 + b
x 0
N 0Tb
dx
Eb
Eb 1
1
x =
=
1 + Eb x ln 2 N 0Tb N 0Tb ln 2
N 0Tb
eq 25
If we signal at a rate, approaching the channel capacity, then Pe0, and we have the
maximum information rate allowed for the Pe0 (i.e. the optimum system). Thus
C=
1
Tb
E
1
1
= b
Tb N 0Tb ln 2
17
Eb
= ln 2 = 1,59 dB
N0
eq 27
This minimum value for Eb/N0 is -1.59 dB and is called Shannon limit.
That is, if the optimum coding/decoding is used at the transmitter and receiver, error
free data will be recovered at the receiver output, provided that the Eb/N0 at the receiver
input is larger than -1.59 dB, assuming that the ideal (unknown )code is used.
Any practical systems will perform worse than this ideal system described by Shannons
limit, thus the goal of digital system designer is to find practical codes that approach the
performance of Shannons limit.
The better code reported in figure above, achieves their coding gains at the expense of
bandwidth expansion. That is when redundant bits are added to provide coding gain, the
overall data rate and, consequently, the bandwidth of the signal are increased by a
multiplicative factor that is the reciprocal of the code rate. Thus, if the uncoded signal
takes up all the available bandwidth, coding cannot be added to reduce receivers errors,
because the coded signal would take up too much bandwidth.
18
3 INTERSYMBOL INTERFERENCE
The absolute bandwidth of rectangular multilevel pulses tend to infinity; on the contrary
the bandwidth available in communication system is always limited. Therefore in order
to limit the bandwidth and reducing the PSD (Power Spectral Density) of signaling we
needed some kind of filtering system for the binary pulses.
When these pulses are filtered improperly as they pass through a communication
system, they will spread in time, and the pulse for each symbol may be smeared into
adjacent time slot and cause intersymbol interference (ISI).
T
0
t0
t0
t0
t0
Intersymbol interference
0
t0
Sampling points
(trasmitter clock)
t0
Sampling points
(receiver clock)
Sampling points
(receiver clock)
figure 5
Now, how do we can restrict the bandwidth and still not introduce ISI ? This problem
was first studied by Nyquist who discovered three different methods for pulse shaping
that could be used to eliminate/reducing ISI.
Let us consider a digital signaling system as shown below, in which the flat-topped
multilevel signal at the input is:
19
Trasmitting filter
HT(f)
Win(t)
Channel (filter)
charateristics
HC(f)
Wc(t)
Receiver filter
HR(f)
Flat top
pulses
Wout(t)
Recovered rounded
Pulse (to sampling
and decoding cicuits)
figure 6
Where at the input we have a series of flat-top impulse of a symbol rate D=1/Ts
(pulses/s):
eq 28
where an is the amplitude of multilevel signal (for a binary signal there are only two
levels permitted) and, where the shaping of a single flat top-impulse is
t
h(t) =
TS
Ts
1, se t 2
0, se t > Ts
2
0.8
0.6
2/Ts
0.4
0.2
-Ts/2
Ts/2
0
-20
-15
-10
-5
10
15
-0.2
20
freq
-0.4
20
H( f ) =
Ts / 2
1 e
Ts / 2
+ Ts / 2
T /2
j t
e jt
1 s
e jTs / 2 e + jTs / 2
j t
j e dt =
=
=
dt =
j Ts / 2
j
j T / 2
s
T
Ts
sen s
jTs / 2
+ jTs / 2
+ jTs / 2
jTs / 2
e
e
e
2Ts e
2
= 2
=
= Ts
Ts
T
j
Tss
2j
s
2
2
eq 30
T /2
1 s
H ( f ) = 1 e jt dt =
j e jt dt =
Ts / 2
Ts / 2
2
1 j t
e jTs / 2 e jTs / 2 (Ts / 2)
e
=2
=
=
(Ts / 2)
2 j
j
Ts / 2
Ts / 2
T
sen s
2
2
= Ts
T
s
2
eq 31
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
-20
-15
-10
-5
10
15
20
figure 9
21
-T/2
-t/2
t/2
T/2
figure 10
-T/2
-t/2
t/2
t
T/2
figure 11
-4/t
-2/t
2/t
4/t
figure 12
22
0=2/T0
-4/t
-2/t
2/t
4/t
Figura 1
eq 32
The output of the linear system would be just the input impulse train convolved with the
equivalent impulse response of the overall system; that is
eq 33
eq 34
23
then
eq 35
Note that he(t) is also the pulse shape that will appear at the output of the receiver filter
when a single Dirac pulse is fed into the transmitting filter.
The equivalent system transfer function is in frequency domain and it is represented by
the product of the corresponding Fourier transform of each single element:
H e ( f ) = H ( f )HT ( f )HC ( f )H R ( f )
eq 36
H(f) is the Fourier transform already seen that define the pulse shape
Ts
sen s 2
H ( f ) = Ts
T
s
s
eq 37
HR( f ) =
He ( f )
H ( f )HT ( f )HC ( f )
eq 38
When He(f) is chosen to minimize the ISI, HR(f) is called an equalizing filter. The
equalizing filter characteristic depends on Hc(f), the channel frequency response, as
well as on the required He(f).
When the channel consists of dial-up telephone lines, the channel transfer function
changes from call to call and the equalizing filter may need to be an adaptive filter. In
this case, the equalizing filter adjusts itself to minimize the ISI. In some adaptive
schemes, each communication session is preceded by a test pattern that is used to
adapt the filter electronically for the maximum eye opening (minimum ISI). Such
sequence are called learning or training sequence and preambles.
As an example of training sequence we report those used in GSM mobile network
Um-Interface for a burst of 148 bits:
24
Normal burst (NB): TCH end other control channel, except. RACH, SCH e FACH
TB
3
Encrpted bits
57
Training sequence
26
0.577 ms
Encrpted bits
57
TB
3
GP
8.25
156.25 bit
Freq. correction burst (FB): Is equivalent to unmodulated carrier . I used to synchronize the
mobile in frequency
TB
3
Fixed bits
142
0.577 ms
TB
3
GP
8.25
156.25 bit
Synchronization burst (SB): Is used to temporally synchronize the mobile, it contains TDMA
frame number and and BSIC
TB
3
Encrpted bits
39
Synchronization sequence
64
0.577 ms
Encrpted bits
39
TB
3
GP
8.25
156.25 bit
figure 13
eq 39
The output pulse shape is affected by the input pulse shape (flat-topped in this
case), the transmitter filter, the channel filter, and the receiving filter. Because, in
practice, the channel filter is already specified, the problem is to determine the
transmitting filter and the receiving filter that will minimize the ISI on the rounded pulse
at the output of the receiving filter.
0 for k 0
eq 40
where k is an integer, Ts is the symbol (sample) clocking period, is the offset in the
receiver sampling clock times due to propagation delay that should be compared with
the times of the input symbols, and C is a nonzero constant.
25
That is, for a single flat-top pulse of level a at the input to the transmitting filter at t=0,
the received pulse would be ahe(t) and it would have a value of aC at t= (i.e. for
K=0) but it would not cause interference at any other sampling time because
he(kTs+)=0 when k0.
Input weaveform, win(t)
0
Ts
t0
t0
t0
t0
Ts
No Intersymbol interference
0
t0
Sampling points
(trasmitter clock)
t0
Sampling points
(receiver clock)
Sampling points
(receiver clock)
figure 14
t
Ts
2Ts
3Ts
figure 15
26
A rectangular filter function can be used for this purpose, therefore suppose that we
chose a (sinx)/x function for he(t), in particular, let =0, and chose
he (t ) =
sin f s t
f st
KTs=0 KTs0
eq 41
f s = 1 / Ts
Then this impulse response satisfies zero ISI Nyquists first criterion because in t=KTs=0
we have max amplitude of the output function he(t) whereas in t=KTs0 we have zero
amplitude of function.
lim he (t ) = lim
t 0
t 0
sin f s t 0
=
f st
0
lim
t 0
f cos f s t
d sin f s t
= 1 = 1
= lim
t
0
dt f s t
fs
eq 42
Consequently, if the transmit and receive filters are designed so that the overall transfer
function is
He ( f ) =
1 f
f s f s
B=
D
2
+B=
D
2
freq
eq 43
The overall amplitude transfer characteristic He(f) has to be flat over a bandwidth
B<f<B and zero elsewhere. This is physically unrealizable (i.e. the impulse
response would be non casual and of infinite duration)
The synchronization of the clock in the decoding sampling circuit has to be
almost perfect, since the (sinx/x) pulse decays only as 1/x and is zero in
adjacent time slot only when is at the exactly correct sampling time. Thus,
inaccurate sync will cause ISI.
Because of these difficulties, we are forced to consider other pulse shapes that have a
slightly wider bandwidth then a rectangular B<f<B.
27
The idea is to find pulse shapes that go through zero at adjacent sampling points and
yet have an envelope that decays much faster than 1/x so that clock jitter in the
sampling times KTs0 does not cause appreciable ISI. One solution for the equivalent
transfer function, which has many desirable future, is the raised cosine-rolloff Nyquist
filter.
1,
( f f1 )
1
H e ( f ) = 1 + cos
,
2 f
2
0,
f < f1
f1 < f < B
f > B
eq 44
f = B f0
eq 45
f1 = f 0 f
f
f0
f = rf 0
eq 46
B = f 0 + f = f 0 + rf 0 = f 0 (1 + r )
eq 47
f1 = f 0 f = f 0 rf 0 = f 0 (1 r )
28
He(f)
1.0
0.5
-B
-f0
-f1
f1
f0
Freq.
6-db bandwidth
figure 16
For several value of the rolloff factor r the corresponding required signaling transmission
bandwidth B are:
He(f)
1.0
0.5
f0=fB
r1=0.5
r2=1
Freq.
figure 17
For rolloff factors r=0 we have f=0 and we obtain the minimum-bandwidth required
case, where f0=B.
29
0
1 (4 f t )
eq 48
when r = 0, the corresponding impulse pulse shape response became like (sinx/x):
sin (2f 0t )
sin (2f 0t ) cos(0)
he (t ) = F 1 [H e ( f )] = 2 f 0
= 2 f 0
2
2f 0t
2f 0t 1 (0 )
eq 49
r= 0.5 r=1
20
impulse responce
15
10
he_(r=0)
he_(r=0.5)
he_(r=1)
5
0.400
0.350
0.300
0.250
0.200
0.150
0.100
0.050
0.000
-0.050
-0.100
-0.150
-0.200
-0.250
-0.300
-0.350
-0.400
-5
Ts (symbol time)
figure 18
E:\documenti per
corsi\ELETTRONICA T
As the absolute bandwidth is increased (e.g. r=0, r=0.5 or r = 1.0) the filtering
requirements are relaxed, the clock timing requirements are relaxed too, since the
envelope of the impulse response decays faster than 1/t (on the order of 1/t3 for large
value of t).
30
Let us now develop a formula which gives the baud rate that the raised cosine-rolloff
system can support without ISI. From figure above, the zeros in the system impulse
response occur at t =n/2f0 where n0. Therefore, data pulses may be inserted at each
of these zero points without causing ISI. That is, referring to
C for k = 0
he (kTs + ) =
0 for k 0
eq 50
with =0, we see that the raised cosine-rolloff filter, satisfies Nyquists first criterion (for
the absence of ISI) if the symbol clock period is equal to Ts=1/(2f0). The
corresponding baud rate is
D=
1
= 2 f0
Ts
(Symbol / s )
f0 =
D
2
That is, the 6-dB bandwidth of the raised cosine-rolloff filter, f0, is designed to be half
the symbol (baud) rate.
D 2B D
B f0
2B D
f
2 =
2
=
=
r= =
D
D
D
f0
f0
2
2
2B
D r = 2B D
D=
1+ r
B
eq 51
where B is the absolute bandwidth of the system and r is the system rolloff factor.
B=
D
(1 + r )
2
eq 52
The greater r the grater B, and as a function of B and r we can aspect a maximum
value of symbol rate D.
Comparing to first criteria where B=D/2 now the bandwidth is increased when r0
31
4 BANDPASS SIGNALING
4.1 COMPLEX ENVELOPE RAPPRESTNATION OF BANDPASS
WAVEFORMS
4.1.1 Definitions: Baseband, Bandpass, and modulation
Definition. A baseband waveform has a spectral magnitude that is nonzero for
frequencies in the vicinity of the origin (i.e. f=0) and negligible elsewhere.
f0
figure 19
Definition. A bandpass waveform has a spectral magnitude that is non zero for
frequencies in some band concentrated about a frequency f =fc, where fc>>0. the
spectral magnitude is negligible elsewhere. fc is called the carrier frequency.
f
-fC
+fC
figure 20
32
Signal
processing
g(t)
Carrier
circuits
s(t)
Trasmission
medium
(channel)
r(t)
Carrier
circuits
g*(t)
Signal
processing
m*
Receiver
Trasmitter
4.1.3 Theorem
Any physical bandpass waveform can be represented by
eq 53
here, Re() denotes the real part of (), g(t) is called the complex envelope of v(t), and
fc is the associated carrier frequency (in Hertz) where c=2fc is the radian frequency.
Furthermore, two other equivalent representations are
v(t ) = R (t ) cos [c t + (t )]
eq 54
and
eq 55
where
g (t ) = x(t ) + jy (t ) = g (t ) e jg (t ) = R(t )e j (t )
eq 56
33
x(t ) = Re { g (t )} = R (t ) cos (t )
eq 57
y (t ) = Im { g (t )} = R (t ) sin (t )
eq 58
R(t )
g (t ) = x 2 (t ) + y 2 (t )
eq 59
and
y (t )
x(t )
(t ) g (t ) = tan 1
eq 60
Consequently we obtain:
In communication systems, the frequencies in the baseband signal g(t) are said to be
heterodyned up to fc.
The complex envelope, g(t), is usually a complex function of time, it is the baseband
equivalent of the bandpass signal v(t), and it is a generalization of the phasor concept.
In this case x(t) is said to be the in-phase modulation component also colled I(t), and
y(t) is said to be quadrature modulation component Q(t) associated with v(t).
Alternatively, the polar form of g(t) is represented by R(t) and (t); here R(t) is always
non negative and is said to be amplitude modulation (AM) on v(t), while (t) is said to
be the phase modulation (PM) on v(t).
34
s (t ) = Re g (t )e jct
eq 62
where c=2fc is the carrier frequency. The complex envelope g(t) is a function of
modulating signal m(t). That is,
g (t ) = g [m(t )]
eq 63
35
Theorem.
If a bandpass waveform is represented by
v(t ) = Re g (t )e jct
eq 64
V( f ) =
1
G ( f f c ) + G * ( f f c )
2
eq 65
where
G ( f ) = F [g (t )]
eq 66
Pv ( f ) =
1
Pg ( f f c ) + Pg ( f f c )
4
eq 67
where
Pg ( f )
is the PSD of g(t)
G(f)
G(f)
G(-f-fc)
G(f-fc)
figure 22
36
g (t ) = Ac [1 + m(t ) ]
eq 68
Where the constant Ac, has been included to specify the power level and m(t) is the
modulating signal (which may be analog or digital).
These equations reduce to the following representation for AM signal:
37
eq 69
s (t ) = Ac [1 + m(t ) ] cos c t
eq 70
For convenience, it is assumed that the modulating signal m(t) is a sinusoid. The
modulating signal corresponds to the in-phase component x(t) of the complex envelope;
it also correspond to the real envelope g (t ) when m(t)-1 (the usual case).
If m(t ) = m cos(mt )
Then recalling that
eq 71
cos cos =
1
[cos( + ) + cos( )]
2
we have
1
1
Ac m cos (c + m ) t + Ac m cos (c m ) t
2
2
eq 72
in figure below is shown a sinusoidal modulating wave and the resulting modulated AM
signal.
m(t)
g (t ) = Ac [1 + m(t ) ]
s(t )
Amin Ac
Amax
Tc
1/Tc=fc
figure 23
38
%modulation=
eq 73
1
2
g (t ) =
2
1
1
1
1
2
= Ac2 [1 + m(t )] = Ac2 1 + m 2 (t ) + 2m(t ) = Ac2 + Ac2 m(t ) + Ac2 m 2 (t )
2
2
2
2
s 2 (t ) =
eq 74
If modulation m(t) contains no dc level, then m(t ) = 0 and the normalized power of an
AM signal is
s 2 (t ) =
1 2 1 2 2
Ac + Ac m (t )
2
2
discrete
carrier
power
eq
sideband
power
S( f ) =
Ac
[ ( f f c ) + M ( f f c ) + ( f + f c ) + M ( f + f c )]
2
eq 76
39
M(f )
-B
S( f ) A
(f-fc)
Ac
2
-fc-B
-fc
Discrete carrier
term with
weight=1/2Ac
(f+fc)
Lower
sideband
-fc+B
fc-B
Upper
sideband
fc
fc+B
figure 24
1 2 2
Ac m (t )
m 2 (t )
2
100 =
E=
100
2
1 2 1 2 2
1
(
)
+
m
t
Ac + Ac m (t )
2
2
eq 77
The highest efficiency that can be attained for a 100% AM signal would be 50%, (for
the case when square-wave modulation is used m=1).
40
g (t ) = Ac e j (t )
eq 78
here (t) is a linear function of the modulating signal m(t), while g(t) is a non linear
function of the modulation.
The resulting angle-modulated signal is:
eq 79
The relation between phase (t) and the instantaneous frequency fi is:
fi =
1 d (t )
2 dt
(t ) = 2
f dt
i
eq 80
1. for PM, the phase is directly proportional to the modulating signal m(t);
(t ) = D p m(t )
eq 81
(t ) = D f m( )d
eq 82
41
m(t ) = Am cos m t
eq 83
eq 84
Where
p = D p Am
(t ) = D f m( )d = D f
cos m d = Am D f
sin m t = f sin m t
eq 85
Where
f = Am D f
g (t ) = Ac e j ( t ) = Ac e
j f sin mt
eq 86
s (t ) = Re g (t )e jct =
= Re Ac e
j f sin mt
e jct = Re Ac e
j f sin mt +c t
}= A cos[
c
sin m t + c t =
eq 87
t
t
D f Am
cos m t
= Ac cos c t + f cos m t = Ac cos c t +
m
42
figure 25
s (t ) = R (t ) cos (t ) = R (t ) cos[c t + (t )]
eq 88
f i (t ) =
1
1 d (t ) 1 d [c t + (t )]
i (t ) =
=
=
dt
2
2 dt 2
1
1 d (t )
1 d (t )
=
c +
= fc +
2
2 dt
2 dt
Therefore using (t ) = D f
eq 89
m( )d
d D f m( )d
1 d (t )
1
= f + 1 D m(t )
f i (t ) = f c +
= fc +
c
f
2 dt
2
dt
2
eq 90
43
Of course, this is the reason for calling this type of signaling frequency modulation
the instantaneous frequency varies about the assigned carrier frequency fc, in a manner
that is directly proportional to the modulating signal m(t).
vp
fc+f
fc
fc-f
s(t)---correspondign FM signal
Ac
figure 26
figure above show how the instantaneous frequency varies when a sinusoidal
modulation (for illustrative purposes ) is used.
The frequency deviation from the carrier frequency is
f d (t ) = f i (t ) f c =
1 d (t )
2 dt
eq 91
1 d (t )
f = max [ f d (t ) ] = max
2 dt
eq 92
44
note that f is a non negative number. In some applications, such as unipolar digital
modulation, the peak to peak deviation is used:
1 d (t )
1 d (t )
f pp = max
min
2 dt
2 dt
eq 93
For FM signaling, the peak frequency deviation is related to the peak modulating
voltage by:
1
1 d (t )
1
1
D f m(t ) =
D f max[m(t )] =
D f Vp
f = max[ f d (t )] = max
= max
2
2 dt
2
2
eq 94
eq 95
eq 96
6.1.1 Definition for peak phase deviation and peak frequency deviaton.
p =
eq 97
45
f =
F
B
eq 98
where F is the peak frequency deviation and B is the bandwith of the modulating
signal, which, for the case of sinusoidal modulation, is fm, i.e the sinusoid sinusoid.
Using the deviation frequency expression found above we can rewrite:
1
D m(t ) D m(t ) D m(t )
F 2 f
f
f
=
=
=
f =
m
fm
fm
2f m
eq 99
Therefore the more greater m(t) the more greater f, and the more greater m, the lower
f. These facts have fundamental implication when we will speak about noise effect in
FM / PM modulation.
For digital signals, an alternative definition of modulation index is sometimes used and
is denoted by h in the literature. This digital index is:
h=
eq 100
where 2 is the maximum peak to peak phase deviation change during the time that it
takes to send one symbol, Ts.
Strictly speaking, the FM index is different only for the case of single-tone (i.e.
sinusoidal) modulation.
However, it is often used for other waveshapes, where B is chosen to be the highest
frequency or the dominant frequency in the modulating waveform.
1
[G( f f c ) + G * ( f f c )]
2
eq 101
where
G ( f ) = F [g (t )] = F Ac e j (t ) = F Ac e j [ f ( m (t ) ]
eq 102
46
Since g(t) is a non linear function of m(t) a general formula relating G(f) cannot be
obtained, that is G(f) must be evaluated case by case basis for the particular
modulating waveshape of interest, furthermore superposition does not hold, and the FM
spectrum for the sum of two modulating waveshapes is not the same as summing the
FM spectra that were obtained when the individual waveshapes were used.
The evaluation into a closed form is not easy, one often has to use a numerical
techniques to approximate the Fourier transform integral. An example for the case of
sinusoidal waveshape will now be worked out.
(t ) = D f m( )d = D f
cos m d = Am D f
sin m t = f sin m t
eq 103
eq 104
1 2
=
f m m
eq 105
consequently g(t) could be represented by a Fourier series that is valid over all time
(-<t<);
g (t ) =
c e
n=
jnmt
eq 106
where:
1
cn =
Tm
Tm
2
1
jn t
T g (t )e m dt = Tm
m
Tm
2
[A e
c
T
m
2
j sin mt
A
e jnmt dt = c
Tm
Tm
2
[e
j ( sin mt nmt )
]dt
eq 107
T
m
2
Calling:
47
= mt
eq 108
Tm 2 Tm
=
=
2 Tm 2
T 2 Tm
2 = m + m =
= +
2 Tm 2
eq 109
1 = m
2
dt
Tm
d = m dt =
dt =
Tm
d
2
eq 110
Substituting we obtain
cn =
Ac
Tm
Tm
2
(
[e
j sin mt nmt )
T
m
2
1
cn = Ac
2
]dt = TA
[e
j ( sin n )
2 Tm
Tm 2
j ( sin n )
[e
2 T
= m
Tm 2
] 2T d = TA
m
]d = A J ( )
Tm
2
[e
j ( sin n )
]d
eq 111
eq 112
This integral [ known as the Bessel function of the first kind of the nth order, Jn() ]
cannot be evaluated in closed form, but it has been evaluated numerically.
Taking the Fourier transform of g(t) we obtain:
G ( f ) = F [g (t )] =
n= +
n = +
n=
n =
cn ( f nf m ) = Ac
J ( ) ( f nf )
n
eq 113
BT = 2( + 1) B
eq 114
where is either the phase modulation index or the frequency modulation index
and B is the bandwidth of the modulating signal (which is fm for sinusoidal
modulation).
This formula is called Carsons rule.
Using this result, we get the spectrum of FM or PM with sinusoidal modulation for
various modulation indexes as reported in figure below.
Fig below shows the spectral distribution of an FM wave, The column labelled fc is the
carrier and the other columns are the nth sidebands. Note the increasing in large
number of sidebands and the simultaneously carrier amplitude decreasing (in the centre
of the diagram) close to zero, when change up to =2, we can see how most of the
FM wave energy is in the sidebands.
The values of Bessel functions are commonly published in tables as in Table below. In
the table, mf is the modulation index and J0..Jn are the amplitude coefficients for the
carrier and sidebands
mf
J0
J1
J2
J3
0.00
1.000
0.000
0.000
0.000
0.05
0.999
0.025
0.000
0.000
0.50
0.938
0.242
0.031
0.003
1.00
0.765
0.440
0.115
0.020
1.50
0.512
0.558
0.232
0.061
2.00
0.224
0.577
0.353
0.129
2.50
-0.048
0.497
0.446
0.217
3.00
-0.260
0.339
0.486
0.309
4.00
-0.397
-0.066
0.364
0.430
Table 1
49
S( f )
1A
c
2
J0(0,2)
1.0
J1(0,2)
f
fc
=0,2
BT
S( f )
1A
c
2
J0(1)
J1(1)
1.0
J2(1)
f
fc
=1
fc+fm
fc+2fm
BT
S( f )
1A
c
2
J0(2)
J1(2)
1.0
J2(2)
J2(2)
fc
=2
fc+fm
fc+3fm
BT
S( f )
1A
c
2
=5
1.0
J0(5)
J1(5)
J2(5)
J3(5)
J4(5)
J5(5) J (5)
6
f
fc
fc+fm
fc+6fm
BT
figure 27
50
Resulting Vector
The modulation index due to the noise voltage is constant, whereas the modulation
index for the desired modulation signal decreases with the increasing of the modulating
frequency fm or with the band B of the modulating signal (for FM).
f = D f Am
f f
B
fm
eq 115
eq 116
Consequently the lower the f, the lower the phase variation (t) and the lower the
deviation frequency f:
t
(t ) = D f m( )d = D f
cos m d = Am D f
sin m t = f sin m t
eq 117
This means that the noise degrades the Signal-to-Noise Ratio for an FM / PM
modulation more at higher modulating frequencies than at lower modulating frequency.
51
A plot of the noise vs frequency has a triangular shape, hence the term noise triangle
noise
AM noise rectangular
FM noise triangle
fc
Figure above shows the distribution of noise sidebands compared with the AM case.
52
Modulating
Input signal
vin
Pre-emphasis
filter
mf
FM
trasmitter
s(t)
Trasmission
medium
(channel)
r(t)
FM
receiver
Trasmitter
g*(t)
De-emphasis
filter
m*
Receiver
figure 30
Log H p ( f )
R1
R2
Pre-enphasis filter
Hp( f ) = K
1 + j ( f / f1 )
1 + j( f / f 2 )
f1 =
1
2 1
Log H p ( f )
1
2R1C
Log(f)
R + R2
1
f2 =
= 1
2 2 2R1 R2C
R1
De-enphasis filter
Log(f)
f1
Hp( f ) =
1
1 + j ( f / f1 )
f1 =
1
2 1
f2
1
2R1C
figure 31
53
UNLIMITED
75uS
26 dB
75uS (roofed)
26 dB
25uS (roofed)
50 Hz
100 Hz
500 Hz
1 KHz
2 KHz
3 KHz
4 KHz
5 KHz
6 KHz
7 KHz
8 KHz
9 KHz
10 KHz
11 KHz
12 KHz
13 KHz
14 KHz
15 KHz
16 KHz
17 KHz
18 KHz
19 KHz
20 KHz
100 KHz
1 MHz
-0.00 dB
-0.01 dB
-0.23 dB
-0.87 dB
-2.76 dB
-4.77 dB
-6.58 dB
-8.16 dB
-9.54 dB
-10.75 dB
-11.82 dB
-12.78 dB
-13.66 dB
-14.45 dB
-15.18 dB
-15.86 dB
-16.49 dB
-17.07 dB
-17.62 dB
-18.14 dB
-18.63 dB
-19.09 dB
-19.53 dB
-33.47 dB
-53.47 dB
-0.00 dB
-0.01 dB
-0.23 dB
-0.87 dB
-2.75 dB
-4.75 dB
-6.55 dB
-8.11 dB
-9.46 dB
-10.64 dB
-11.68 dB
-12.60 dB
-13.43 dB
-14.17 dB
-14.85 dB
-15.47 dB
-16.04 dB
-16.56 dB
-17.05 dB
-17.50 dB
-17.91 dB
-18.30 dB
-18.66 dB
-25.27 dB
-25.97 dB
-0.00 dB
-0.00 dB
-0.03 dB
-0.11 dB
-0.41 dB
-0.87 dB
-1.44 dB
-2.08 dB
-2.75 dB
-3.43 dB
-4.10 dB
-4.75 dB
-5.37 dB
-5.97 dB
-6.54 dB
-7.09 dB
-7.61 dB
-8.10 dB
-8.58 dB
-8.95 dB
-9.45 dB
-9.86 dB
-10.26 dB
-21.85 dB
-25.95 dB
table 2
--
J-17
1.00
50.00
200.00
400.00
800.00
1.42
2.00
4.00
6.40
8.00
10.00
100.00
+9.38
+9.32
+8.68
+7.10
+3.72
+0.00
-2.40
-6.28
-7.89
-8.37
-8.70
-9.38
Hz
Hz
Hz
Hz
Hz
KHz
KHz
KHz
KHz
KHz
KHz
KHz
table 3
Note that all the losses shown on the De-emphasis tables would become gains for the
Pre-emphasis network within any FM modulator
54
m1(t)
Subcarrier modulator
fSC1
Ssc1(t)
m2(t)
Subcarrier modulator
fSC2
Ssc1(t)
m3(t)
Subcarrier modulator
fSCN
SscN(t)
mb(t)
Transmitter
s(t)=FDM
fC
Transmitter
figure 32
55
Any type of modulation, such as AM, DSB, SSB, PM, FM, and so on, can be used. The
types of modulation used on the subcarriers, as well as the type of modulation used on
the main carrier, may be different.
However, as shown in figure below the composite signal spectrum must consists of
modulated signal that do not have overlapping spectra; otherwise, crosstalk will occur
between the message signals at the receiver output.
The composite baseband signal then modulates a main transmitter to produce the FDM
signal that is transmitted over the wideband channel.
Mb( f )
fSC1
fSC2
fSC3
fSCN
BSC1
BSC2
BSC3
BSC
f (Hz)
B
figure 33
The received FDM signal, is first demodulated to reproduce the composite baseband
signal that is passed through filters to separate the individual modulated subcarriers.
Then the subcarriers are demodulated to reproduce the message signals m1(t), m2(t),
and so on.
56
Composite
baseband signal
Badnpass filter
fSC1
Badnpass filter
fSC2
s(t)=FDM Main
receiver
Badnpass filter
fSCN
Ssc1(t)
Demodulator
fSC1
Ssc2(t)
Demodulator
fSC2
Ssc3(t)
Demodulator
fSCN
m1(t)
m2(t)
mN(t)
Receiver
figure 34
r (t ) = s (t ) + n(t )
eq 118
eq 119
or
r (t ) = Re gT (t )e j (ct +c )
eq 120
where
57
g T (t ) = g s (t ) + g n (t ) =
= [xs (t ) + xn (t )] + j[ y s (t ) + y n (t )] =
eq 121
= xT (t ) + jyT (t ) =
= RT (t )e jT
RT (t ) = g s (t ) + g n (t )
eq 122
gT(t) denotes the total (i.e. composite) complex envelope at the receiver input; it
consists of the complex envelope of the signal plus complex envelope of the noise.
s(t)
PN=2BxN0/2= N0B
(S/N)in
Lowpass filter
Bandwidth =B
r(t)=s(t)+n(t)
(S / N )in = (S / N )baseband
r (t ) = Re g T (t )e j (ct +c )
Receiver
Ps
N0 B
where:
58
P
S
= s
N baseband N 0 B
eq 123
r (t ) = s (t ) + n(t ) = Re gT (t )e j ( c t + c )
Product detector
(S / N )in = (S / N )baseband
Lowpass filter
Bandwidth =B
IF filter
r(t) = Modulated signal
plus noise in
m * (t ) = Re{gT (t )}
(S / N )out
2 cos(ct + c )
(S / N )out
(S / N )baseband
m *2
1 + m *2
eq 124
(S / N )out
(S / N )baseband
1
1
= 2 =
1 3
1+
2
eq 125
This illustrates that AM system is worse than a baseband system that uses the same
amount of signal power, because of the additional power in the discrete AM carrier that
does not contribute to the information ability of the signal but permits AM receivers to
use economical envelope detectors
(S / N )out
(S / N )baseband
=1
eq 126
7.4 PM systems
The modulation on a PM signal is recovered by a receiver that uses a (coherent) phase
detector.
r (t ) = s (t ) + n(t ) = Re gT (t )e j ( c t + c )
IF filter
Detector
(PM or FM)
r0 (t ) = g T (t ) for PM
d
r0 (t ) = [g T (t )] for FM
dt
m * (t ) = Re{gT (t )}
Lowpass filter
Bandwidth =B
(S / N )out
Modulated signal
plus noise in
g s (t ) = Ac e j s ( t )
eq 127
where
s (t ) = D p m(t )
eq 128
the complex envelope of the complex signal plus noise at the detector inputs is
gT (t ) = gT (t ) e j ( t ) = [g s (t ) + g n (t )] = Ac e j s (t ) + Rn (t )e j n (t )
eq 129
Imaginary
g n (t ) = Rn (t )e j n (t )
g s (t ) = Ac e j s (t )
Rn sin( n s )
Rn
n
AC
Real
(S / N )out
(S / N )baseband
m
=
V
p
2
p
eq 130
where:
p is the PM modulation index and Vp is the peak value of m(t).
61
This equation shows that the improvement of a PM system over a baseband signalling
system depends on amount of phase deviation that is used; the larger the phase
deviation, the better the signal-to-noise-ratio.
It seems to indicate that we can make the improvement as large as we wish simply by
increasing p. This depends on the types of circuits used. If the peak phase deviation
exceed radians, special phase unwrapping techniques have to be used in some
circuits to obtain the true value (as compared to the relative value) of the phase output.
Thus the maximum value of
p m(t )
Vp
pm
2
2
6.9 dB over
modulation, this would provide an improvement of
= Dp m =
2
V p
baseband signaling.
It is emphasized that the results obtained previously for (S/N)out are valid only when the
input signal is above the threshold [i.e. when (S/N)in>1]
7.5 FM Systems
The procedure that we will use to evaluate the output SNR for FM systems is essentially
the same as that used for PM systems, except that the output for the FM detector is
proportional to d(t)/dt, whereas the output of the PM detector is proportional to (t).
assuming that (S/N)in>1 then we can find
(S / N )out
(S / N )baseband
m
= 3
V
p
2
f
eq 131
2
m
1
for the case of sinusoidal modulation = we have
V
2
p
(S / N )out = 3 2
(S / N )baseband 2 f
At first glance, these results seem to indicate that the performance of FM systems can
be increased without limit simply by increasing the FM index f. However, as f is
increased, the transmission bandwidth increases, and consequently, (S/N)in decreases.
These equations for (S/N)out are valid only when (S/N)in >>1 (i.e. when the input signal
power is above the threshold), so (S/N)out does not increase to an excessively large
value simply by increasing the FM index f. Figure below, by dashed line, show a plot of
the preceding equation.
62
figure 39 : noise performance of an FM discriminator for a sinusoidal modulated FM signal plus Gaussian noise (no
deemphasis)
A generalized expression to describe S/N near the threshold, for the case of sinusoidal
modulation is plotted by the solid line.
Figure illustrates that the FM noise performance can be substantially better than
baseband performance, particularly when f increases.
e * (t )
e(t )
vin (t )
IF Filter
FM
Discriminator
( S / N ) in
FM Signal in
Demodulated
output
m * (t ) = Re{gT (t )}
( S / N ) out
v0 (t )
VCO
figure 40
63
the FMFB receiver provides threshold extension by lowering the modulation index
for the FM signal that is applied to the discriminator input. That is, the modulation
index of e*(t) is smaller than that for vin(t) (that in a normal case would have been
applied to the discriminator input).
the FM signal at the receiver input is
vin (t ) = Ac cos[c t + i (t )]
eq 132
where
t
i (t ) = D f m( )d
eq 133
eq 134
where
t
0 (t ) = Dv m * ( )d
eq 135
With these representations for vin(t) e v0(t), the output of multiplier (mixer) is:
e(t ) = A0 Ac cos[c t + i (t )]cos[0 t + 0 (t )] =
=
1
1
A0 Ac cos[(c 0 )t + ( i (t ) 0 (t ) )] + A0 Ac cos[(c + 0 )t + ( i (t ) + 0 (t ) )]
2
2
eq 136
If the IF filter is tuned to pass the band of frequencies centered about f IF f c f 0 , the
IF filter output is
e * (t ) =
1
1
A0 Ac cos[(c 0 )t + ( i (t ) 0 (t ) )] = A0 Ac cos[ IF t + ( i (t ) 0 (t ) )]
2
2
eq 137
or
64
e * (t ) =
1
A0 Ac cos if t + D f m( ) Dv m * ( ) d
2
eq 138
d D f m( ) Dv m * ( ) d
K
m * (t ) =
dt
2
eq 139
Evaluating the derivative and solving the resulting equation for m*(t), we obtain
K
K
K
D f m(t ) Dv m * (t ) =
D f m(t )
Dv m * (t )
2
2
2
K
K
m * (t ) +
Dv m * (t ) =
D f m(t )
2
2
K
D f m(t )
KD f m(t )
K
K
m * (t ) 1 +
Dv =
D f m(t ) m * (t ) = 2
=
K
[2 + KDv ]
2 2
1 + 2 Dv
m * (t ) =
KD f
m(t )
m * (t ) =
2 + KDv
eq 140
eq 141
e * (t ) =
=
KD f
1
A0 Ac cos IF t + D f m( ) Dv
2
2 + KDv
m( ) d
2D f m( ) + KDv m( ) Dv KD f m( )
1
A0 Ac cos IF t +
d
2
2 + KDv
eq 142
1
1
D m( )d
= A0 Ac cos IF t +
k f
2
Dv
1+
65
This demonstrates that the modulation index of e*(t) (i.e of the signal in input to the
1
of the modulation index of vin(t).
discriminator), is exactly
1 + (k / 2 )Dv
Since f = D f Am
, the lower the modulation index Df the lower the , then once,
(S / N )out
(S / N )baseband
3 2
f .
2
The threshold extension provided by the FMFB receiver is on the order of 5 dB,
whereas that of PLL receiver is on the order of 3 dB (when both are compared with the
threshold of an FM discriminator). Although this is not a fantastic improvement, it can
be quite significant for systems that operate near the threshold, such as satellite
communication systems. A System that uses a threshold extension receiver instead of a
conventional receiver may be much less expensive than the system that requires a
double-sized antenna to provide the 3-dB signal gain.
(S / N )out
(S / N )baseband
1 2 B
f
2 f1
eq 143
of course, each of these results is valid only when the FM signal at the receiver input is
above the threshold.
66
figure 41
Of course, when operating above the threshold, all the non linear modulation systems
have better SNR performance than the linear modulation systems, because the non
linear systems have larger transmission bandwidths.
eq 144
where Cin is the bandpass channel capacity and Cout is the channel capacity after
detection.
The equation for channel capacity is
S
C = B log 2 1 +
N
eq 145
S
S
BT log 2 1 + = B log 2 1 +
N out
N in
eq 146
where BT is the transmission bandwidth of the bandpass signal at the receiver input
and B is the bandwidth of the baseband signal at the receiver output. Solving for
(S/N)out , we get
S
1 +
N in
S
N out
BT
S
= 1 +
N out
S
1 +
N in
BT
B
S
= 1+
N out
eq 147
BT
S B
= 1 + 1
N in
eq 148
but
68
P
P
S
= s = s
N in N 0 BT N 0 B
BT
B
=
BT
S
N baseband
eq 149
B
S
= 1 +
N out BT
BT
B
S
1
N baseband
eq 150
equation above, which describes the ideal system performance, is plotted in figure
below for the case of BT/B=12. As expected, none of the practical signalling systems
equals the performance of the ideal system. However, some of the non linear systems
(near the threshold) approach the performance of the ideal systems.
figure 42
69
On-off keing (OOK) also called Amplitude Shift Keying (ASK), which consists
of keying (switching) a carrier sinusoid on and off with a unipolar binary signal.
Morse code radio transmission is an example of this technique.
figure 43
figure 44
70
figure 45
= Ac cos c t + D p m(t )
eq 151
Where
(t ) = D p m(t )
eq 152
In BPSK m(t) is a polar baseband data signal. For convenience, let m(t) have a peak
values of 1 and a rectangular pulse shape.
We now show that BPSK is also a form of AM-type signalling, in fact expanding the
preceding equation we get
eq 153
71
eq 154
eq 155
Accos[Dpm(t)]
cosct
+
s(t)
sinct
Acsin[Dpm(t)]
figure 46
Now recalling that m(t)= 1 and that cos(x) and sin(x) are even and odd functions of
x we get:
eq 156
eq 157
72
The level of the pilot carrier term is set by the value of the peak phase deviation
constant, =Dp.
For digital angle-modulated signals, the digital modulation index h is defined by
h=
2D p
eq 158
where 2 =2Dp is the maximum peak-to-peak phase deviation (radians) during the
time required to send one symbol, Ts.
h
2=2Dp
2
1
For binary signaling, the symbol time is equal to the bit time (Ts=Tb).
The level of the pilot carrier term is set by the value of the peak deviation, which is
=Dp for m(t)=1. The value of m is determined by the input data bit stream converted
in NRZ for example.
If Dp is small, the pilot carrier term has a relatively large amplitude compared to the
data term; consequently, there is a very little power in the data term (which contains
the source information). To maximize the signaling efficiency (so that there is a low
probability of error), the power in the data term needs to be maximized. This is
accomplished by letting =Dp=/2 radians, which corresponds to a digital modulation
index of h=1.
For this optimum case of h=1, the BPSK signal becomes
s (t ) = Ac m(t ) sin c t
eq 159
73
Imaginary
eq 160
g1(t)
Real
g2(t)
s (t ) = Re g (t )e jct = Re jAc m(t )e jct = Re[ jAc m(t ) cos c t Ac m(t ) sin c t ]
eq 161
= Ac m(t ) sin c t
s1 (t ) = Ac sin c t
m(t ) = +1
s 2 (t ) = + Ac sin c t
m(t ) = 1
To simplify the explanation, suppose now to 90 rotate all constellation then we can
obtain the simulation like as obtained by using WINIQ software as shown below.
This means that
g (t ) = Ac m(t )
eq 162
Consequently
eq 163
In figure below are reported the phase i(t)=1 and quadrature q(t)=0 components of the
baseband modulating signal g(t) plus the constellation diagram.
g1(t)
g2(t)
74
g1(t)
figure 47:
g2(t)
When the modulating wave shape is rectangular and the symbol 0,1 are equally
probable, the Power Spectral Density (PSD) for the baseband complex envelope is
sin f Tb
Pg ( f ) = A T
f Tb
2
c b
eq 164
The resulting FFT of the bandpass digital signals s(t) can be obtained by WienerKhintchine theorem:
A 2Tb
1
PSD[ s (t )] = Pg ( f f c ) + Pg ( f + f c ) =
4
4
=
sin ( ( f f )T ) 2 sin ( ( f + f )T ) 2
c
b
c
b
+
=
( f f c )Tb ( f + f c )Tb
A 2Tb
[sin c( ( f f c )Tb )]2 + [sin c( ( f + f c )Tb )] 2
4
A2T b
Pg ( f f c )
4
A 2T b
Pg ( f + f c )
4
figure 48
75
Considering the positive frequency only, we can have the FFT reported on figure below:
figure 49
To have an easier BPSK model, we can eliminate the minus sign by a 90 rotation of all
signals s(t):
s (t ) = Ac m(t ) sin( c t
eq 165
The symbols, s1(t) and s2(t) representing the ones and zeros respectively, are then,
s1 (t ) = + Ac cos c t
when m = +1
s 2 (t ) = Ac cos c t
when m = 1
1 + cos 2 x
2
1
cos
2x
sin 2 x =
2
cos 2 x =
eq 166
is :
76
1 cos(2 c t )
1
2
2
2
2
2 Tb
Eb = s(t ) dt = Ac sen (c t ) dt =Ac
dt =Ac cos(2 c t ) dt =
2
0
0
0
2 2 0
2
2
sen 2 c
b
b Ac2
2 Tb
2 1 sen(2 c t )
2 Tb
2 1
0 =
Ac
Ac
Ac
T
= Ac
2 b
2
2 2c 0
2
2
2c
Tb
Tb
Tb
Tb =
c = nb with n = 1,2,3,4.......
eq 167
Eb Ac2
=
2
Tb
[W ]
eq 168
Ac =
2 Eb
Tb
[V]
eq 169
s1 (t ) = Ac m(t ) cos c t = + Eb
2
cos c t
Tb
when m = +1
s 2 (t ) = Ac m(t ) cos c t = Eb
2
cos c t
Tb
when m = 1
eq 170
This form of BPSK is referred to as phase-reversal keying since the two carrier signals
representing the logic ones and zeros are exactly 180 out of the phase i.e. the phase
modulation index h=1. A more general form of BPSK occurs when the phase difference
between the two signals is other than 180. This creates a residual carrier term that
allows carrier tracking by a phase-lock loop (PLL). Unless stated otherwise, BPSK will
refer to 180 mode.
77
Accos (ct)
A c
cos ct
figure 50: BPSK modulator
C (t ) = r (t ) s (t )dt
0<t <T
eq 171
s(t )r (t )dt
0
s(t)
r(t)
figure 51:hardware implementation of correlation
78
A BPSK correlation receiver is shown in figure below, with each block of hardware
labeled with its functional purpose.
Receiver
Bit synchronizer
em(t)
Low-pass Filter
Or Matched
Filter
a(t )
r (t )s(t )dt
Sam
ple &
Hold
Threshold
device
S/H
si(t)=
BPSK
Output of the
receiver and
input to the bit
synchronizer
2
cos c t
Tb
The correlation receiver is so called because it correlates the received signal, composed
of signal plus noise, with a replica of the signal. For the correlation to be achieved, it is
necessary for the receiver to be phase locked to the carrier as discussed earlier.
The purpose of the correlation receiver is to reduce the received symbol to a single
point or statistic that will be used by the decision device to determine which symbol has
been transmitted. In practice, the single point is a fixed voltage obtained by a S/H
device. The decision device is a voltage comparator that is set such that if the voltage
point is above a certain level, the comparator indicates a one is received; if the voltage
is below this level, a received zero is indicated, the case for no noise will be treated first.
Functionally and conceptually, the correlation receiver is composed of the receiver and
bit synchronizer.
The correlation receiver and the matched filter are equivalent. Specifically, the integrator
and the S/H, at t=Tb, are equivalent to a matched filter, sampled at the output.
Since there is no discrete carrier term in the ideal BPSK signal, a PLL may be used to
extract the carrier reference only if a low level pilot carrier is transmitted together with
the BPSK signal otherwise is needed a coherent detection.
However, the 180 phase ambiguity must be resolved, this can be accomplished by
using differential coding at the transmitter input and differential decoding at the
receiver output.
79
9.1.2.1 No Noise
An exact replica of the carrier multiplies the received symbol, and the output of the
multiplier is applied to an integrator. The output of the multiplier is given by:
em (t ) = Eb
2
2
cos c t
cos c t =
Tb
Tb
2 1 1
2
2 1 + cos 2 c t
= Eb cos 2 c t = Eb
= Eb
+ cos 2c t
2
Tb
Tb
Tb 2 2
eq 172
The output of the multiplier, em(t), is applied to integrator. The integrator will integrate
the double frequency term over an integer number of cycles therefore deleting this term.
In practice, a low pass filter follows the integrator to ensure that this term is deleted from
the output. The output a(t), is:
a(t = Tb ) = Eb
t
a (t ) = Eb
2 1 1
1
+ cos 2 c t dt = Eb t
Tb 0 2 2
Tb
eq 173
t=Tb
This is the output of the correlator is either a positive- or negative-going ramp function
(triangular function).
The S/H device is usually set to sample the ramp whenever it reaches a maximum
value, which ideally occurs whenever t=Tb. the upper limit of the integrator is also set to
Tb. For the no noise case, the output of the integrator a t=Tb is:
T
2 b 1 1
1
a (t = Tb ) = Eb
+ cos 2 c t dt = Eb Tb = Eb
Tb 0 2 2
Tb
eq 174
The S/H device is clocked to sample the output of the integrator whenever the maximum
voltage is expected. For this case, the S/H samples at t=Tb and the output voltage
Eb is applied to the threshold device, which normally triggers out a crisp waveform
representing a one if the voltage is greater than zero or a zero if the voltage is less than
zero.
80
s (t ) = Eb
2
cos c t + n(t )
Tb
eq 175
t
T
t
T
figure 53: Integrator output of a correlation receiver: (left) low noise, and (right) high noise.
Let the baseband sampled voltage outgoing by the integrator at t=T, can be
represented by z, then
z = Eb + N
eq 176
It can be shown that N is a Gaussian random variable with zero mean and variance
2 given by:
2 = N0 / 2
eq 177
Therefore, the output random variable voltage, z, outgoing from the integrator is also
a Gaussian random variable. Then z will have a variance of N0/2 and a mean of
a = Eb , depending upon which symbol has been received.
Letting
a = Eb
eq 178
81
The conditional probability density function for z, gives an information about the
correspondence of symbol with a. Precisely it gives an indication if a one or a zero
has been transmitted:
p( z | + a) =
p( z | a) =
1
2 2
1
2 2
1 z Eb
2
1 z + Eb
2
eq 179
eq 180
-a
+a
Figure 54: Conditional probability density functions, gives if a one or a zero has been transmitted
The baseband signal constellation for a BPSK is shown below, we can observe the
jitter around a points due to the noise presence.
(t)
-a
+a
82
1
p ( z | + a ) p ( z | + Eb )
=
=
=
p ( z | a ) p ( z | Eb )
1
2 2
1 z Eb
2
1 z + Eb
2
1
2 2
z+ E
b
1
2
1 z Eb
2
eq 181
Assuming each symbol is equally likely and the cost of all errors is the same, the
received point z is substituted as Gaussian random variable. Therefore a value for
p(z | +a)
-a
+a
figure 56
83
P (a | a) = P ( z | a )dz =
0
1
2 2
1 z ( a )
2
dz =
2 2
1 z ( a )
2
eq 182
calling
x=
z+a
dz = dx
then
eq 183
P(a | a) =
1
2 2
1 2
(x)
2
dz =
2 2
1 2
(x)
2
dx =
a /
then x=
1
2
1 2
(x)
2
dx = Q(a / )
eq 184
a /
By the symmetry, a bit error is made if a one is transmitted and the sampled voltage, Z,
falls under zero. The probability of this occurrences is the area beneath the Gaussian
curve, with mean +a, from zero to -infinity, the probability of mistaking a for +a is
P(a | a) =
x=
za
1
2 2
then
P(a | a) =
1
2 2
1 z (+ a )
2
dz
eq 185
dz = dx
0
1 2
(x)
2
dz =
eq 186
1
2 2
a /
1 2
(x)
2
dx =
1
2
a /
1 2
(x)
2
dx = Q(a / ) eq 187
Considering that P(a)=P(-a)=1/2 then the total error probability is, for the Bayes
theorem:
1
1
Pe = P(a | a) P( a) + P( a | a) P(a) = P (a | a) + P( a | a)
2
2
eq 188
1
1
Pe = Q(a / ) + Q(a / ) = Q(a / )
2
2
eq 189
Since
a = Eb
Eb
Pe = Q
= Q
then
Eb
E
= Q 2 b
N0
N0
eq 190
84
f x (x | ) =
2 2
eq 191
f(x)
0.0025
0.002
0.0015
0.001
0.0005
0
-250
-200
-150
-100
-50
50
100
150
200
250
The curve is symmetric around the parameter and the relative probability
distribution function referred to an interval within - to x is given by
Fx ( x ) =
f ( y )dy =
x
1
2 2
F ( x) =
1
2 2
dy =
dy =
z=
( y )2
2 2
( y )2
2 2
1 y
2
dy
eq 192
then y = z + dy = dz consequently
1
2 2
z2
2
dz =
1
e
2
z2
2
x
dz = Q( z ) = Q
eq 193
85
1
e
2
z2
2
dz
eq 194
F(X)
0.8
0.6
0.4
0.2
0
-250
-200
-150
-100
-50
50
100
150
200
250
The constant 2 2 is a normalization factor which maintain the area under the F(x)
unitary within the interval -, +
When =0 then the Q function is defined as:
Q( Z ) = Q(a / ) =
1
2
y2
2
dy
eq 195
a/
i.e. the probability value F(x) computed within an interval starting from a/ to +
That is, for a Gaussian distribution with mean equal to zero and variance 2=1, Q(a/)
i.e. Q(a), is the area beneath the tail of the curve from a to +.
86
2 =
N0
2
eq 196
N0 = one-sided power spectral density (PSD) of the white noise going into the
IF bandwidth measured in [W/Hz].
Calling:
C
Rb
eq 197
Where:
N p = N 0 BIF
eq 198
E R
E R
C
= b b = b b
N p N 0 BIF N 0 BIF
eq 199
The greater the Rb, the greater the C/Np needed at the receiver side, whereas the
greater the bandwidth B, the lower will be the S/N ratio required.
87
C/Np is the carrier-to-noise ratio in the IF, which is determined by link analysis, the
BER may be predicted based on this engineering parameter.
Consequently :
Eb
C BIF
=
N 0 N p Rb
eq 200
Under the ideal condition and NRZ data format, the assumption is that BIF Rb ( this is
usually not the case unless raised cosine filtering is used);
In fact using a RRC filter the since for a BPSK the Symbol rate D is equal to the bit
rate Rb, then we can write:
B=
D
Rb
(r + 1) =
(r + 1) Rb
2
2
when
r 1
eq 201
Eb
C
N0 N p
eq 202
Then using the above relationship, the error probability Pe (BER) may be written as
Eb
= Q
Pe = Q
Eb
N0
2
= Q 2 Eb Q 2 C
N 0
N p
eq 203
This is an important equation that relates the BER to the carrier-to-noise ratio, (C/Np)
in the IF bandwidth, which is determined by link analysis.
88
DPSK
in
Bandpass filter
Low-pass Filter
integrator
H(f) BT
-fc
S&H
Threshold
r0(t0) device
t0
Binary
output
(..)dt
+fc
t 0 T
f
One-bit
Delay, Tb
r0(t0),Bit
sync
1 N
Pe = e 0
2
eq 204
89
eq 205
Modulo 2 adder
(EX-OR)
dn
en
Data
in
en-1
Line
Encoder
circuit
Channel
Line
Decoder
circuit
One-bit
Delay, Tb
Modulo 2 adder
(EX-OR)
dn
en
Data
out
One-bit
Delay, Tb
Differential Encoder
en-1
Differential Decoder
figure 60 : differential coding system
eq 206
90
eq 207
And where 1 and 1 are the start-up phases of the two oscillators.
Oscillator
Freq=f1
Electronic
switch
Discontinuous
FSK output
Oscillator
Freq=f2
Control line
Bynary data input
m(t)
figure 61
91
Continuous
FSK output
figure 62
eq 208
If the serial data input waveform is binary, such as polar baseband signal, m(t)=1, the
resulting FSK signal is called a binary FSK (BFSK) signal.
t
y = 2f c t + 2 h m( )d = 2f c t + 2 h 1d = 2f c t + 2 ht = 2 ( f c + h)t
eq 209
92
BT = 2( + 1) B = 2 + 1 B = 2f + 2 B
B
eq 210
Where B is the bandwidth of the signal (e.g. square wave) modulation waveform.
If the Bandwidth B is equal to the Bit Rate R i.e. B=R, then BT became:
f
BT = 2( + 1) B = 2 + 1 B = 2f + 2 B = 2f + 2 R = 2(f + R )
B
eq 211
D(1 + r )
R (1 + r )
= 2f + 2
= 2f + R (1 + r )
2
2
eq 212
Low-pass
filter
cos(1t)
Binary out
FSK in
cos(2t)
Low-pass
filter
93
FSK in
Frequency
detector
Binary out
94
Digital-to-Analog
converter L bits
M=2L -level
digital signal
Transmitter
Modulated output
D(symbol/sec)=R/L
figure 65: multilevel digital transmission system
g(t)
g(t)
Imaginary
(Quadrature)
Imaginary
(Quadrature)
i
Real
(in Phase)
QPSK
Real
(in Phase)
QPSK
figure 66
95
The signal constellation are essentially the same, except for a shift in the carrier-shiftkeyed (QPSK) signalling. A constellation is an N-dimensional plot for the possible
signal vectors corresponding to the possible diagram signals as reported in figure
below.
figure 67
For instance, suppose that the permitted multilevel values at the DAC are -3,-1,+1,+3 V;
then these multilevel values might correspond to PSK phase of 0,90,180,270,
respectively.
This example of M-ary PSK where M=4 is called quadrature phase-shift-keyed
(QPSK) signalling.
MPSK can also be generated by using two quadrature carriers modulated by the x and
y components of the complex envelope (instead of using a phase modulator); in that
case,
g (t ) = Ac e j (t ) = x(t ) + jy (t )
eq 213
eq 214
and where the permitted phase angles are I , i=1,2,.,M of the MPSK signal.
96
eq215
Binary
input
R
bits/s
Digital-toanalog
converter
L-bits
Multilevel
digital signal
Signal
processing
x(t)
cos(ct)
QAM
signal out
s(t)
y(t)
M=2 level
D=R/L
symbols / sec
sin(ct)
Oscillator
f=fc
-90 phase
shift
Binary
input
R
bits/s
2-bit
serial-toparallel
converter
d1(t)
R/2 bits/sec
L/2 bit
DAC
x(t)
cos(ct)
d2(t)
R/2 bits/sec
L/2 bit
DAC
y(t)
QAM
signal out
s(t)=Re[g(t)ejt]
sin(ct)
Multilevel
digital signal
Oscillator
f=fc
-90 phase
shift
97
For rectangular-shaped data pulses, the envelope of the QPSK signal is constant.
That is, there is no AM (Amplitude Modulation) on the signal, even during the
transmission times when there is a 180 phase shift, since the data switches value
(say, from +1 to -1) instantaneously.
Phase shift:
180
-90
180
QPSK
figure 70
figure 71
98
The rectangular-shaped data pulse produce a (sinx/x) -type power spectrum for the
QPSK signal that has large undesirable spectral sidelobes.
figure 72
These undesirable sidelobes can be eliminated if the data pulses are filtered by a
pulse shaping filter corresponding for example to a raised cosine rolloff filter.
Unfortunately this produces AM on the resulting QPSK signal, because the filtered data
waveform cannot change instantaneously from one peak to another when 180 phase
transition occur.
On figure below it possible to observe how the spectrum changes, when a raised
cosine rolloff filter is used
figure 73
99
Although filtering solves the problem of poor spectral sidelobes, it creates another one:
AM on the QPSK signal, see figure below:
figure 74
On figure below are reported the constellation diagram and the vector diagram at the
output of the transmitter. We can observe how shape filtering causes a constellation
point position dispersion around the expected position symbol.
Constellation point
position dispersion
figure 75
s (t ) = cos[2f c t + (t )] =
1
1
d I (t ) cos(2f c t + ) +
d Q (t ) sin( 2f c t + )
4
4
2
2
Where
d I = d 0 , d 2 , d 4 ......(bit
even)
d Q = d1 , d 3 , d 5 ......(bit
odd )
figure 76
In other word, as we have already seen a QPSK signal can be represented as the
superposition of two BPSK signal with carrier in quadrature. Each signal is
characterized by a 2Tb symbol time, i.e. double time length with respect to original
modulating signal.
101
g(t)=x(t)+jy(t)
M=2l point constellation
D=R/l symbol/sec
x(t)
Ts/2
delay
cos(ct)
y(t)
QAM
signal out
s(t)=Re[g(t)ejt]
sin(ct)
Oscillator
f=fc
-90 phase
shift
figure 77
eq 216
D = symbol _ rate =
Symbol _ delay =
1
BitRate
R
=
=
Ts number _ of _ bit _ per _ symbol l
Ts
2
eq 217
eq 218
x(t ) = xn hl t
D
n
eq 219
y (t ) = yn hl t
D
n
eq 220
where: (xn,yn) denotes one of the permitted (xi,yi) value during the symbol time that is
centred on t=nTs=n/D (s) (it takes Ts (s) to send each symbol), hl(t) is the pulse shape
that is used for each symbol. If the bandwidth of the QAM signal doesnt need to be
restricted, the pulse shape will be rectangular and of Ts (s) duration.
In OQPSK the timing between the x(t) and y(t) components is offset by
Ts/2=(1/2D) (s). that is
x(t ) = xn hl t
D
n
eq 221
n T
n
1
y (t ) = yn hl t s = yn hl t
D 2 n
D 2D
n
eq 222
In Figure Below is reported a comparison between the QPSK and OQPSK (I,Q) signal
QPSK
Shift=0
Tsymbol
O-QPSK
Shift=1/2
Tsymbol
Ts
figure 78
103
In the other figure is shown a comparison between QPSK and OQPSK vector
constellation, note that in OQPSK case there is no zero crossing by the modulating
vector.
180
90
O-QPSK
QPSK
figure 79
At the output of the QPSK and OQPSK transmitter the modulated signal s(t) could be
as shown in example below:
S(t)
QPSK
Max phase
shift
180
OQPSK
Max phase
shift
90
figure 80
104
From mathematical point of view the only difference between QPSK and OQPSK is a
shift/delay of Ts/2 on Q branches, so for OQPSK we can use the representation
reported below:
s (t ) = cos[2f c t + (t )] =
T
1
1
d I (t ) cos(2f c t + ) +
d Q (t ) sin( 2f c t + s ) eq 223
4
4 2
2
2
Where
d I = d 0 , d 2 , d 4 ......(bit
even)
d Q = d1 , d 3 , d 5 ......(bit
odd )
This equation is very similar to that used for QPSK which is reported as a reminder:
s (t ) = cos[2f c t + (t )] =
1
1
d I (t ) cos(2f c t + ) +
d Q (t ) sin( 2f c t + )
4
4
2
2
eq 224
Using rectangular modulating signal, we must observe that there are no difference
between QPSK and OQPSK signal spectrum. This can be explained observing that
while the OQPSK amplitude phase shift is only half with respect to QPSK, the
transitions can occur more frequently (in each period of 2Tb for aQPSK and in each
period of Tb of OQPSK)
Anyway thanks to a lower phase transition OQPSK induces lower AM modulation
amount when the signal is filtered prior to modulation.
Both modulation techniques QPSK and OQPSK, are used in order to reduce BPSK
bandwidth to 1/2, and the staggering doesnt modify the properties.
figure 81
105
eq 225
g (t ) = x(t ) + jy (t ) = R (t )e j ( t )
For example, a popular 16-symbol (M= 16 levels) QAM constellation is shown in figure
below, where the relationship between (Ri,i) and (xi,yi) can readily be evaluated for
each of the 16 signal values permitted. This type of signaling is used by 2400-bit/s V.22
modem.
figure 82
The spectrum of the output transmitted signal s(t) and the I,Q modulating signal can be
evaluated for a random rectangular binary input signal:
figure 83
106
12.4 PSD for MPSK, QAM, OQPSK, and /4 QPSK without premodulation filtering
The PSD for MPSK and QAM signals for the case of rectangular bit-shape signaling is
the same of the BPSK, provided that proper frequency scaling is used.
13,5 dB
f(Hz)=R/l=1/Ts
figure 84
The PSD for the complex envelope of MPSK and QAM signals with data modulation of
rectangular bit shape is:
sin f lTb
Pg ( f ) = K
f lTb
K = ClTb
eq 226
R = 1 / Tb
M = 2l
C=power (watts)
For L=1 we have the BPSK PSD,
QPSK PSD.
107
It is also realized that the PSD for the complex envelope of bandpass signals (i.e.
envelope of the modulated signal), is essentially the same as the PSD for baseband
multilevel signals (i.e. envelope of the modulated signal) when any filtering method is
used.
From figure above, we can see that the null-to-null transmission bandwidth of MPSK
or QAM when rectangular data pulses are used is
BT = 2 R / l = 2(1 / Ts ) = 2 DS
eq 227
bit/s
Hz
R
R
l
=
=
R
BT 2
2
l
eq 228
As a consequence if:
L=2
L=4
L=8
then
then
then
R=B
R=2B
R=4B
One way to define the transmission bandwidth efficiency for a waveform encoding is the
Out-Of-Band-Power (POB), which is defined as:
f
POB( f ) =
S( f )
df + S ( f ) df
S( f )
df
S( f )
S( f )
df
eq 229
df
13,5 dB
figure 85
The high side lobes can be eliminated if raised cosine filtering is used (since the
raised cosine filter has an absolutely band limited frequency response).
We should select the 6-dB bandwidth f0 of the raised cosine filter, for the baseband
signal, equal to half of the symbol (baud) rate in order for o avoid ISI. That is
f0 =
1
1R 1 1
=
D=
2
2 l 2 Ts
eq 230
109
B=
1
[(1 + r )D] Hz
2
or
eq 231
2B R
symbol/s
D=
=
1+ r l
eq 232
so the overall absolute transmission bandwidth of the QAM signal with raised
cosine filtered pulses is:
BT = 2 B = 2
1
[(1 + r )D] = [(1 + r )D] = (1 + r ) R Hz
2
l
eq 233
R
of rectangular pulse
l
shaping i.e. without SRRC filter). We can see that the greeter the r , the greeter the BT,
when r=1 then we have again the maximum bandwidth such as we used the rectangular
filter shape.
This bandwidth can be compared to a null bandwidth BT = 2
On table below are reported some values of the parameter related to the above
equations supposing a fixed bit-rate R=812 Kbit/s.
Note that when the rolloff factor of the SRRC filter tend to 1 then the bandwidth BT
become the same as found for rectangular filter data pulse shape.
110
figure 86
Transmission Bandwidth Bt as a function of rolloff factor r for SRRC and Rectangular pulse shape
filter
1800.0
l=1-bit
1600.0
1400.0
Bt KHz
1200.0
1000.0
l=2-bit
800.0
l=3-bit
600.0
BT (KHz) SRRC
BT (KHz) rectang
BT (KHz) SRRC
BT (KHz) rectang
BT (KHz) SRRC
BT (KHz) rectang
400.0
200.0
R=812,499 Kbit/s
0.0
0
0.1
0.2
0.4
0.6
0.8
Rolloff factor r
figure 87
E:\documenti per
corsi\ELETTRONICA T
111
Transmission Bandwidth Bt as a function of rolloff factor r for SRRC and Rectangular pulse shape
filter
0
0.1
0.2
0.4
0.6
0.8
1800.0
1600.0
1400.0
l=1-bit
Bt KHz
1200.0
l=2-bit
1000.0
800.0
l=3-bit
600.0
400.0
200.0
0.0
BT (KHz) SRRC
BT (KHz) rectang
BT (KHz) SRRC
BT (KHz) rectang
BT (KHz) SRRC
BT (KHz) rectang
figure 88
Because
M = 2l
eq 234
which implies
l = Log 2 M =
ln M
ln 2
eq 235
Then the spectral efficiency of QAM-type signaling with raised cosine filtering is
ln M
l
ln M
R
R
=
=
= ln 2 =
=
1 + r 1 + r (1 + r ) ln 2
BT 1 + r
R
l
bit/s
Hz
eq 236
112
The above equation can be compared with the rectangular data pulse shape filter
efficiency already seen
l
R
R
=
=
BT 2 R 2
l
bit/s
Hz
eq 237
If we used BPSK (M=2) with a r=50% rolloff factor, we could signal at rate of
R = BT = 2.4 0.677 = 1.60 Mbit / s
eq 238
If we used QPSK (M=4) with a r=25% rolloff factor, we could signal at a rate of
R = BT = 2.4 1.6 = 3.84
Mbit / s
eq 239
Table below illustrates the allowable bit rate per hertz of transmission bandwidth for
a QAM signalling
Size of DAC
E:\documenti per
corsi\ELETTRONICA T
Rolloff factor r
Number ofLevels
M symbols
1
2
3
4
5
2
4
8
16
32
0
1.00
2.00
3.00
4.00
5.00
0.1
0.91
1.82
2.73
3.64
4.55
0.25
0.80
1.60
2.40
3.20
4.00
0.5
0.67
1.33
2.00
2.67
3.33
0.75
0.57
1.14
1.71
2.29
2.86
1
0.50
1.00
1.50
2.00
2.50
figure 89
113
Spectral efficiency for QAM signaling with Raised Cosine-Rolloff Pulse Shaping filtering
6
efficiency=R/Bt ((bit/s)/Hz))
ln M
l
ln M
R
R
=
=
= ln 2 =
=
1 + r 1 + r (1 + r ) ln 2
BT 1 + r
R
l
bit/s
Hz
4
0
0.1
0.25
0.5
0.75
1
0
1
figure 90
In order to conserve more bandwidth, the number of levels M cannot be increased too
much, since for a given peak envelope power (PEP) the spacing between the signal
points on the signal constellation will decrease and noise on the received signal will
cause errors (Noise moves the received signal vector to a new location that might
correspond to a different signal level.) However, we know that R certainly has to be less
than C, the channel capacity, if the errors are to be kept small.
< max
eq 240
max = Log 2 1 +
114
24.33
24.23
24.13
24.03
23.93
23.82
23.71
23.60
2.00
23.48
23.36
23.24
23.12
22.99
22.86
22.72
22.58
22.43
22.28
22.12
21.96
21.79
21.61
21.43
21.24
21.04
20.83
20.61
20.37
20.13
19.87
19.59
19.29
18.98
18.63
18.26
17.85
17.40
16.90
16.33
15.68
14.91
13.98
12.79
11.14
8.45
0.00
Spectral efficiency
9.00
6.00
5.00
4.00
150.00
3.00
Spectral efficiency
SNR (lineare)
0.00
SNR (Lineare)
8.00
7.00
250.00
200.00
100.00
1.00
50.00
0.00
SNR (dB)
figure 91
115
As an example related to the effect of rolloff factor value on the constellation dispersion
and on the PSD, we can consider a QPSK modulation at the transmitter output side. Let
us consider two cases: Rectangular filter pulse shaping and SRRC filter pulse
shaping. In this last case are being considered the value of rolloff factor: r = 0.5
QPSK constellation
With rectangular pulse shaping
figure 92
QPSK constellation
With SRRC pulse shaping and
rolloff factor r = 0.5
figure 93
116
0<t T
eq 241
Where the (A) on the cosine carrier is one bit of data and the (A) factor on the sine
carrier is another bit of data.
The relevant input noise is represented by
n(t ) = x(t ) cos( c t + n ) y (t ) sin( c t + n )
eq 242
Total input power it will be given by adding signal and noise: after the demodulation we
have A+x(t) and A+y(t) as input to the integrator.
The QPSK signal is equivalent to two BPSK signals-one using a cosine carrier and the
other using a sine carrier. The QPSK signal is detected by using a coherent receiver
shown in figure below:
A+x(t)
Matched Filter:
integrator
t0
QPSK
signal +
noise
(..)dt
2cos(ct+c)
S
&
H
Threshold
device
t0 T
+90
phase
shift
-2sin(ct+c)
A+y(t)
Carrier recovery
t0
(..)dt
S
&
H
R/2 bits/sec
Parallel
To serial
converter
Threshold
device
R/2 bits/sec
t0 T
Because both the upper and lower channels of the receiver are BPSK receivers, the
BER is the same as that for BPSK system. Thus the BER for the QPSK receiver is:
117
Digital
output
E
Pe = Q 2 b
N0
eq 243
figure 95 : Comparison of the probability of bit error for several digital signaling schemes
Except for the curves describing the non coherent detection cases, all of these results
assume that the optimum filter-the matched filter- is used in the receiver.
Comparing the various bandpass signaling techniques, we see that QPSK and MSK
give the best overall performance in terms of the minimum bandwidth required for a
given signaling rate and one of the smallest Pe for a given Eb/N0. However QPSK is
relatively expensive to implement, since it requires coherent detection.
Channel coding can be used to reduce the Pe below values given above.
The BERs for BPSK and QPSK signaling are identical. But for the same bit rate R, the
bandwidth of the QPSK is exactly one-half the bandwidth of the BPSK, i.e. the same
information but in half bandwidth.
118
When rectangular data pulses is used, the null-to-null transmission bandwidth is:
BT =
2R
l
BT ( BPSK ) = R
BT (QPSK ) =
1
R
2
eq 244
( BPSK ) = 1
(QPSK ) = 2
eq 245
119
TYPE OF DIGITAL
SIGNALING
MINIMUM
TRANSMISSION
BANDWIDTH
REQUIRED
ERROR PERFORMANCE
1
R
2
Eb
Q
N 0
Polar
1
R
2
E
Q 2 b
N 0
Bipolar
1
R
2
3 Eb
Q 2
2 N 0
Bandpass Signalling
Coherent detection
1 2 N 0
e
2
Eb
Q
N 0
BPSK
E
Q 2 b
N 0
PCM/FM
1 2 N0
e
2
FSK
2f + R
1 Eb
Eb 1
>
N0 4
Requires coherent
detection
1 Eb
where
f = f 2 f1 =frequency
shift
Eb
Q
N 0
1 Eb
1 2 N 0
e
2
DPSK
1 N 0
e
2
QPSK
1
R
2
E
Q 2 b
N 0
Requires coherent
detection
MSK
E
Q 2 b
N 0
Eb
1 Eb
1 2 N 0
e
2
120
A= 2
Eb
1/ 2
Tb
eq 246
And:
121
eq 247
122
123
124
Note that for any value of A other then unity, s5(t) and s6(t) as well as their negatives,
s13(t) and s14(t), will have a discontinuous slope at their midpoints (i.e., at t = 0),
whereas the remaining 12 waveforms all have a continuous slope throughout their
defining intervals. Also note that all 16 waveforms have zero slope at their end points
and, thus, concatenation of any pair of these will not result in a slope discontinuity.
The wavelets are numbered according to a Trellis mapping rule that determines which
wavelet is transmitted. Specifically, the mapping rule specifies that during the n-th
channel symbol interval, [(n - [1/2])Ts] t [(n + [1/2])Ts], the baseband I- and Qchannel waveforms Ik and QK are assigned wavelets sI(t)=si and sQ(t)=sj respectively,
where the indices i and j are given by:
i = I 3 2 3 + I 2 2 2 + I1 21 + I 0 2 0
j = Q3 2 3 + Q2 2 2 + Q1 21 + Q0 2 0
eq 248
with
I 0 = d Q ,n d Q ,n1
Q0 = d I ,n+1 d I ,n1
I1 = d Q ,n1 d Q ,n2
Q1 = d I ,n d I ,n1 = I 2
I 2 = d I ,n d I ,n1
Q2 = d Q ,n d Q ,n1 = I 0
I 3 = d I ,n
Q3 = d Q ,n
eq 249
respectively
The particular sI(t) and sQ(t) waveforms chosen for any particular Ts signalling interval
on each channel depend on the most recent data transition on that channel, as well as
the two most recent successive transition on the other channel.
Next, define the following mapping function for the baseband I-channel transmitted
waveform [yI (t)=sI (t) ] in the n-th signalling interval [(n - [1/2])Ts] t [(n + [1/2])Ts]
in terms of the transition properties of the I and Q data symbol sequences dIn and dQn,
respectively.
125
Making use of the signal properties of eq above, the mapping conditions in (1) through
(4) for the I-channel baseband output can be summarized in a concise form described
by Table 1. A similar construction for the baseband Q-channel transmitted waveform
[yQ(t)=sQ(t-Ts/2) ] in the n-th signalling interval nTs t (n + 1)Ts in terms of the
transition properties of the I and Q data symbol sequences, dIn and dQn, respectively,
126
can be obtained analogously to (1) through (4) above. The results can once again be
summarized in the form of a table, as in Table 2.
Tables below specify the details where dIK is the data sequence on the I channel, and
dQK the data sequence for the Q channel.
127
A block diagram of a FQPSK transmitter based on the reformulation by Simon and Yan
is shown in figure below:
si(t)
Ik
cos(ct+c)
Digital
source
Encoder
Qin=2
Bin=1/Tb
Qout=4
Bout= Bin /2
Ts=2Tb
cos = [ t / 2Ts ]
I and Q
Comb
logic
sin = [ t / 2Ts ]
+
sin (ct+c)
Qk
Delay
=Tb
=Ts/2
SFQPSK(t)
Modulated
signal
Q seq. Logic
And switch
sQ(t-T/2)
QPSK Modulator
128
Ik
Delay
=Tb
=Ts/2
Decision r1
unit
Tb
(.)dt
0
cos(ct+c)
Digital
sink
ei
Decoder
mk
I and Q
Decision
logic
r(t)=
SFQPSK(t)
Decision mapping
+ 1 r1 > 0
1 r1 < 0
Received
Modulated
signal
sin (ct+c)
Qk
Decision r
2
unit
Tb
(.)dt
0
Correlator
Decision mapping
+ 1 r2 > 0
1 r2 < 0
figure 98: coherent FQPSK receiver
Ts
) cos(2f c t + c )
2
eq 250
Ik = +
Qk =
2 Es
cos (2k 1)
Ts
4
2Es
sin (2k 1)
Ts
4
Encoder
Input
Encoder
Input
Encoder
Output
I logic
Q logic
Ej-1
0
0
1
1
Ej
0
1
0
1
k
0
1
2
3
IK
+1
+1
-1
-1
QK
+1
-1
-1
+1
figure 99
129
As an example for Ik and Qk which in turn are the dI e dQ data flow on I and Q channels,
we have:
I0 =
2 Es
2Es
cos (0 1) =
cos =
4
Ts
Ts
2 Es 2
=
Ts 2
Es
= +1
Ts
I1 =
2 Es
2Es
cos (2 1) =
cos
=
4
Ts
Ts
4
2Es 2
=
Ts 2
Es
= +1
Ts
I2 =
2 Es
2Es
2Es 2
E
cos (4 1) =
cos 3 =
= s = 1
4
Ts
Ts
Ts 2
Ts
4
I3 =
E
2 Es
2Es
2 Es 2
cos (6 1) =
cos 5 =
= s = 1
Ts
Ts
Ts 2
Ts
4
4
eq 251
Q0 =
2 Es
2Es
sin (0 1) =
sin =
4
Ts
Ts
2Es 2
=
Ts 2
Q1 =
2 Es
2Es
sin (2 1) =
sin
=
4
Ts
Ts
4
2 Es 2
E
= s = 1
Ts 2
Ts
Q2 =
2 Es
2Es
2Es 2
E
sin (4 1) =
sin 3 =
= s = 1
4
Ts
Ts
Ts 2
Ts
4
Q3 =
2 Es
2Es
sin (6 1) =
sin 5 =
Ts
Ts
4
4
2 Es 2
=
Ts 2
Es
= +1
Ts
Es
= +1
Ts
eq 252
Consecutive values of Ik and Qk assume A=1 values, and are then nonlinearity filtered
by the I sequential logic and switch, and by the Q sequential logic and switch
respectively. The switch outputs are defined in table 1 and table 2. Note that the
switch output is determined by three consecutive inputs, and thus has memory.
This is in contrast to OQPSK, which is memory less.
130
T
S XPSK (t ) = S FQPSK B (t ) = ~
sI (t ) sin(2f c t + c ) + ~
sQ (t s ) cos(2f c t + c )
2
eq 253
~
sI (t ) = s I (t )h(t )d
~
sQ (t ) =
eq 254
(t )h(t )d
are the low pass filtered version of the sI(t) and sQ(t) seen so far in FQPSK form, and
h(t) is the impulse response of the low-pass filter.
The functional block diagram below depicts full-symbol cross-correlation mapping
followed by the transmission filter and an Offset-QPSK (OQPSK) modulator.
sI(t)
SQ(t)
Figure below shows the phasor diagrams and the eye diagrams of both FQPSK and
FQPSK-B baseband signals.
131
figure 102: transmitter eye figure for FQPSK (top) and FQPSK-B (bottom)
132
figure 103
133
figure 104
134
135
14.2.1
FQPSK-B is the only modulation type in the Phase 3 Efficient Modulation Methods Study
for which there are actual hardware measurements. On 1 July 1997 FQPSK-B hardware
tests were conducted at the Naval Air Warfare Center at Point Mugu. Dr. Feher
contributed a laboratory model of his FQPSK-B modulator. The test configuration
included: a random data generator producing 1 Mb/s, Dr. Fehers FQPSK-B modulator,
a Hewlett Packard (HP) Model 8780A Vector Signal Generator for QPSK modulation, a
frequency translator, a 1-Watt SSPA, and an HP spectrum analyzer.
136
Tests were run with the SSPA in full saturation at 2.44 GHz and frequency spectra were
plotted by the HP spectrum analyzer. Figure reproduces the HP analyzers plot on the
same scale as that used for the Fine Detail spectra shown in Figure. Separate figures
are provided because the spectrum plotted in Figure is virtually indistinguishable from
the FQPSK-B curve in Figure, down to a level 55 dB below the peak sideband
amplitude. Below the -55 dB point, the hardware generated spectrum in Figure
becomes wider than the SPW computed spectrum in Figure. Readers should
understand that no attempt was made to optimize the hardware test configuration at Point
Mugu. The test bed was constructed using hardware elements designed for a variety of
other uses.
These measurements confirm the bandwidth efficiency of FQPSK-B modulation, as
predicted by SPW. Neither a 2 GHz receiver nor an FQPSK-B demodulator-symbol
synchronizer were available to measure Bit-Error-Rate. Therefore, system losses
calculated by SPW could not be confirmed using this test configuration.
Additional hardware tests were conducted using an FQPSK-B modem provided by Dr.
Feher. The test configuration operated at 70 MHZ. This inexpensive commercially
available modem was designed to operate over a more restrictive set of signal levels
than the laboratory modulator described above. It did not provide sideband attenuations
much below 40 dB.
137
138
139
15.1.1
SUMMARY
15.1.1.1
Summary of Losses
Table below shows system and filtering losses occurring in the end-to-end system for
each modulation type. Column 2 contains losses relative to ideal BPSK/NRZ
modulation. Recall that ideal BPSK/NRZ assumes: perfect data (Pm = Ps = 0.5), an ideal
system (perfect carrier tracking and symbol synchronization), and no filtering
(BT = 4).
140
Filtering losses, inherent in GMSK and FQPSK-B, are included in leftmost column of
Table containing losses relative to ideal BPSK/NRZ.
NOTE: All modulation types exhibit a loss with respect to ideal BPSK/NRZ. To find the
true cost of a modulation method, one should subtract 0.56 dB which is the loss for filtered
BPSK.
Thus, the true loss for GMSK (BTS = 0.5) is about 0.8 dB and FQPSK-B is about 1.1 dB.
Phase 3 studies employed baseband filtering exclusively. A principal objective was the
selection of the proper filter bandwidth. Recall that filter selection criteria required
using a filter producing the narrowest RF spectrum while introducing only
moderate losses.
From Table it is clear that filters having a BTS = 1 often exceeded the allowable loss of
approximately 1 dB. However, filters having a BTS = 2 generally met the 1 dB loss
criterion.
8-PSK was the exception requiring a BTS = 3 filter bandwidth to be acceptable. For the
other modulation types, BER curves showed that there was no significant benefit in
using a BTS = 3 filter bandwidth. Thus, Butterworth and Bessel baseband filters, with a
BTS = 2, were used.
141
15.1.1.2
RF Spectrum Efficiency
Another Phase 3 study objective was to determine the RF spectral bandwidth of each
modulation type. This was necessary to rank the several modulation methods with
respect to one-another.
Many Spectrum Managers are concerned principally with occupied bandwidth (i.e., 99%
power containment).
The Efficient Modulation Methods Study was motivated by a desire to pack a substantially
greater number of spacecraft into a given frequency allocation, particularly in the 2 and
8 GHz Category A mission bands. Maximum packing density occurs when spectra from
two spacecraft, operating on adjacent frequencies, just begin to overlap at n dB below
the peak of the data sidebands spectrum.
This follows from a worst-case assumption that the Earth stations antenna is bore
sighted on both spacecraft simultaneously. Where spacecraft are not coincidently within
the Earth station antennas beamwidth, the interferers and victims relative signal
strengths will determine the special separation necessary to avoid interference.
Obviously, even as frequency band usage increases, some spatial separation is
expected. This study attempted to determine the value of n.
Views differ regarding the optimal value of n. Some believe that spectra from spacecraft
on adjacent frequencies could be permitted to intersect at a level of 20 dB below the
peak sideband amplitude.
Others believe that the number should be greater or less than 20 dB.
In any event, Category A missions in highly elliptical orbits can undergo signal level
changes of 30 dB or more at the Earths surface. Thus, it would seem prudent to prohibit
RF spectra, from spacecraft operating on adjacent frequencies, from intersecting at
levels higher than 50 dB below the peak of the data sideband generated by the
spacecraft having the stronger signal.
To provide maximum flexibility, RF spectrum bandwidths have been tabulated at values
of n from 20 to 60 (dB) below the data sidebands peak. RF spectrum width increases
as a function of n and each user must select the proper value. A value of n = 50 is
recommended for most applications.
For a specific value of n, one can calculate the improvement in spectral efficiency.
CCSDS concluded that BPSK/NRZ was to be the reference modulation type. A
Spectrum Improvement Factor (SIF) can be calculated by comparing the bandwidth of
unfiltered BPSK/NRZ to the bandwidth of the modulation method under discussion
according to the relationship:
eq 255
Since the bandwidth is a function of n, the SIF will also vary with n. Table below
contains the bandwidths and SIFs at several values of n for all modulation types
covered in this Phase 3 study.
142
Bandwidths for all phase modulation types were evaluated using a Butterworth, BTS = 2
filter.
For symmetrical data, no spikes are present in the spectra of unfiltered BPSK/NRZ. All
measurements in Table were made with respect to a continuous unfiltered BPSK/NRZ
reference spectrum. Conversely, all phase modulation schemes, which employ
baseband filtering, have both continuous and discrete parts to their spectrum.
SIF measurements in Table below were made with respect to the discrete part of the
baseband filtered modulation spectrum. This represents a worst case bandwidth
comparison. Readers should understand that no discrete spectral components exceed
the value of n in any of the SIFs shown in Table. Since SPWs resolution bandwidth
was set to 1.33 Hz, one can conclude that the SIFs should be close to those obtained
using real hardware viewed on a spectrum analyzer with a 1 Hz resolution.
Preferred modulation types become immediately apparent when SIFs are plotted as a
function of n as in Figure below. Modulation types fall into two distinct groups FQPSK-B
/ GMSK and everything else. Even 8-PSK is not a competitor for those two types. The
message is clear:
If RF bandwidth is important, then the results of this study show that FQPSK-B and GMSK
(BTS = 0.5) are the modulation methods of choice.
143
15.2 CONCLUSIONS
Conclusions fall into distinct categories relating to filtering methods, losses, modulation
types, and Spectrum Improvement Factors (SIFs). Each conclusion is summarized in the
subsections below.
15.2.1
Filtering Conclusions
15.2.2
Loss Conclusions
Table above partitions losses into two categories: System (losses relative to ideal
BPSK) and Filtering (ISI and Mismatch). One criterion for the Phase 3 study was that
end-to-end losses should be reasonable. CCSDS determined that approximately 1 dB
was reasonable. The following conclusions regarding losses were reached:
High system loss (1.5 dB) found for PCM/PM/NRZ, resulted from a 10% data
imbalance.
o When a BTS = 2 Butterworth filter is used, data imbalance should not
exceed 5%.
8-PSK modulation exhibits an excessive system loss (3.4 dB).
o Filtering losses decreased for non-constant envelope modulation.
However, spectrum width increased.
Losses were not reduced to an acceptable level.
o High losses make 8-PSK modulation unsuitable for power-limited
Category A missions.
GMSK (BTS =0.5) also exhibited high (1.4 dB) system losses.
145
15.2.3
Figures above , graphically identify the preferred modulation methods. For the several
modulation methods considered, the following conclusions were reached.
FQPSK-B provides the narrowest RF spectrum of all modulation methods
studied.
o FQPSK-B should be considered for all high and very high data rate
missions.
Provided that losses are acceptable.
GMSK, with a filter bandwidth BTS = 0.5, produces virtually equivalent results to
FQPSK-B.
o Further work is required to validate system losses using real hardware.
8-PSK, with its high losses, does not appear useful for most Category A
missions.
o Excessive losses and modest performance gains do not provide sufficient
advantages.
QPSK has comparatively poorer bandwidth efficiency than does FQPSK-B and
GMSK.
o Its common usage may dictate its consideration in some applications.
o Absent spread spectrum, QPSK cannot provide simultaneous telemetry
and ranging.
OQPSK could not be evaluated properly with the UPM.
o OQPSK should be reserved for applications requiring separate,
independent data channels.
o Orthogonally phased BPSK/NRZ modulators, with a symbol offset
should be used.
BPSK/NRZ has poor bandwidth efficiency and should not be used if bandwidth is
important.
o Bandwidth efficiency is slightly lower than PCM/PM/NRZ modulation.
o BPSK/NRZ may be an alternative to PCM/PM/NRZ when:
A residual carrier is not required.
The data imbalance is so great that PCM/PM/NRZ would suffer
excessive losses.
PCM/PM/NRZ has poor bandwidth efficiency, but has best efficiency of residual
carrier types.
o Applications requiring a residual carrier should consider this modulation
method.
o When using PCM/PM/NRZ, care must be taken to ensure proper data
balance.
MSK modulation is not highly spectrum efficient.
146
15.2.4
15.3 RECOMMENDATIONS
Based upon the results of the Phase 3 Efficient Modulation Methods Study, the CCSDS
and SFCG are encouraged to create and adopt Recommendations specifying the
preferred modulation methods.
Because space missions have a broad range of objectives, communication
requirements will vary. Some grouping of applications is necessary before assigning a
modulation type.
15.3.1
Mission Classification
One method for grouping applications is by specific attributes. Missions sharing those
attributes are assigned a classification and a modulation method(s) most appropriate to
that group are selected.
Where RF spectrum and modulation types are of paramount concern, the
telemetry data symbol rate appears to be the best discriminator. The following
classifications are recommended:
147
15.3.1.1
This class includes low rate scientific missions as well as the Telemetry, Tracking, and
Command (TT&C) services for most missions. Turnaround ranging may be required. If it
is, subcarrier modulation may be appropriate (see CCSDS Recommendation 401
(3.3.4) B-1). If ranging is not required, then any appropriate modulation type should be
acceptable. All mission types operating in the space services can be found in this class.
15.3.1.2
Most Category A missions fall in this and the following classification. If space agencies
are serious about reducing RF spectrum requirements, they must use appropriate
filtering and modulation techniques for spacecraft in these classes. Typical missions
operate in the SpaceResearch service and include NASAs ISTP Wind and ESAs Integral
missions.
The recommended modulation method depends upon whether or not simultaneous
telemetry and turnaround ranging signals are required (see CCSDS Recommendation
401 (3.4.1) B-1). If they are, a residual carrier modulation method is suggested
because users can independently control the division of power between the carrier,
telemetry, and ranging channels.
PCM/PM/NRZ is the most bandwidth-efficient residual carrier modulation method
and is recommended provided that the telemetry data imbalance is less than 5%
during a time interval equal to one time-constant of the Earth station receivers
phase-locked-loop.
At low data symbol rates, care must be taken with PCM/PM/NRZ modulation to ensure
that the Earth stations receiver can distinguish between the RF carrier and the spectral
components of the data sidebands. The spacecrafts modulation index and the Earth
station receivers phaselocked-loop bandwidth should be adjusted to ensure proper
operation.
If simultaneous telemetry and turnaround ranging is required and the data imbalance is
greater than 5%, then Unbalanced QPSK (UQPSK) is the recommended modulation
type. Within limits, telemetry and ranging powers can be set independently. If
simultaneous telemetry and turnaround ranging is not required or where data imbalance
exceeds 5%, BPSK/NRZ is recommended.
15.3.1.3
As noted, most Category A scientific missions fall into this and the prior classification.
Generally, such spacecraft operate in the Space Research service allocation. Examples
include NASAs Polar and ESAs SOHO missions.
Because many of these missions are collecting scientific data, simultaneous turnaround
ranging is frequently required. In these cases, PCM/PM/NRZ modulation is
recommended, providing the telemetry data symbol imbalance does not exceed 5% in
one time-constant of the Earth station receivers phase-locked-loop. If data imbalance
exceeds 5%, then UQPSK can be used.
In this classification, data symbol rates can be as high as 2 Ms/s, so bandwidth
conservation is important. If simultaneous turnaround ranging is not required, then
QPSK modulation is recommended.
148
15.3.1.4
Typically, missions with data symbol rates in this range operate in the Earth Exploration
Satellite service. Examples include NASAs Lewis and the Canadian Space Agencys
(CSAs) Radarsat projects. In this and the following classification, RF spectrum
limiting becomes imperative.
Decreasing bandwidth utilization by a factor of 10 saves considerably more RF
spectrum when the data symbol rate is 20 Ms/s than in the case when it is 200 ks/s.
Both the CCSDS and SFCG should immediately adopt filtering and modulation
Recommendations for these last two classes.
From Figures above, and Table above, FQPSK-B or GMSK (BTS = 0.5) modulation are
the clear choices if RF spectrum conservation is important. Modulator modifications may
be required to provide turnaround ranging with either of these modulation types and the
ranging signal will have to be sequential, not simultaneous, with the telemetry data.
15.3.1.5
Missions with data symbol rates in this range operate almost exclusively in the Earth
Exploration Satellite service. Examples include NASAs Earth Observation Satellite
(EOS) and ESAs Earth Resources Satellite (ERS-1). Previous comments regarding
bandwidth conservation and modulation methods apply emphatically to this class.
FQPSK-B or GMSK (BTS = 0.5) are the recommended modulation methods.
The CCSDS and SFCG are urged to move with all dispatch to obtain the additional
system performance information for both FQPSK-B and GMSK modulation types. The
authors recommend that tests, using real hardware, be conducted in a carefully
controlled environment to validate these simulations and to measure actual system
performance. Recommendations, consistent with Table below, should be adopted at the
earliest possible opportunity.
149
GLOSSARY
ARX II A Research and Development Earth Station Receiver, (Prototype for DSN Block
V)
BER Bit-Error-Rate
Bi- Binary-Phase [Manchester] modulation
BL Receiver phase-locked-loops bandwidth, expressed in Hz
BPSK Bi-Phase Shift Keying [modulation method]
BTB Bandwidth Time Product Based on Bit-Period
BTS Bandwidth Time Product Based on Symbol-Period
Category A Space Mission whose distance from Earth is less than 2 106 km
CCSDS Consultative Committee for Space Data Systems
DSN Deep Space Network
DTTL Digital Transition Tracking Loop
ESA European Space Agency
ESOC ESA Operation Center (Darmstadt, Germany)
ESTEC ESA Technical Center (Noordwijk, The Netherlands)
FQPSK Feher QPSK [modulation method]
GMSK Gaussian Minimum Shift Keying
HP Hewlett Packard
Hz Hertz
k Kilo (1,000)
kb/s Kilo Bits per Second
kHz Kilo Hertz
ks/s Kilo Symbols Per Second
M Mega (1,000,000)
MHZ Mega Hertz
MAP Maximum A Posteriori
MODEM Modulation-Demodulation
MSK Minimum Shift Keying
NRZ Non Return to Zero [format]
OQPSK Offset QPSK [modulation method]
PA Power Amplifier
PCS Personal Communications System
PM Phase Modulation
PSK Phase Shift Keying
PT Total Power [transmitted]
QPSK Quadrature Phase Shift Keying [modulation method]
SAW Surface Acoustic Wave [Filter]
SER Symbol-Error-Rate
SFCG Space Frequency Coordination Group
SPW Cadence Design Systems Inc. Signal Processing Worksystem
SRRC Square Root Raised Cosine [Filter]
SSPA Solid State Power Amplifier
Subpanel 1E CCSDS group concerned with RF and Modulation standards
150
D( symbols / s ) =
2B
1+ r
eq 256
where instead
2 B = 200 Khz for GSM e EGPRS
In order to achieve the desired symbol rate using 200 KHz of bandwidth, a more
severe filtering approach is required.
8PSK-EDGE makes this trade-off, resulting in a conservation of bandwidth versus the
increase of ISI. This also necessitates a more complex design for the receiver.
151
In the EDGE modulation system the serial bit stream is converted into 3 bit words and
mapped to the 8PSK modulation using Gray encoding. The symbol are than rotated by
3/8 radians to ensure that the envelope of the signals does not go to zero. Next, the
symbols are up-sampled and filtered using Linearized Gussian Filter (similar to, but
different than the method used for GSM). In this manner, the spectrum of 8PSK signal
can be restricted to 200 KHz. Linearized Gussian Filtering allows the 8PSK signal
spectrum to occupy the same bandwidth as a GPRS/GSM signals. It also introduces a
considerable ISI component.
EDGE provides nine different coding schemes and is possible to switch a connection
between different schemes. The choice of the coding scheme is dynamic and depends
on the Carrier to Interference ratio (C/I).
As the signal quality deteriorates, switches to a more robust coding scheme with lower
throughput are done.
User
data MCS1 MCS2 MCS3 MCS4 MCS5 MCS6 MCS7 MCS8 MCS9
Rate
( in Kbps)
1 Timeslot
8.4
11.2
14.8
16.8
22.4
29.6
44.8
54.4
59.2
table 4
In this chapter the focus is on generating the EDGE signal, which unlike GMSK, has a
time-varying envelope which exposes in turns the signal to AM-PM distortion.
For simulations of EDGE I,Q signals we have been using a software program (winiq
downloadable by Internet on www.rohde-schwarz.com )
152
Bit
Input
source
dk=[0,1]
Group
into
3-bit
triplets
GRAY
Code
encoding
Cn
= e
2C
IQ
generator
Rn
Sn
Cn =[0.1,2,3,4,5,6,7]
= S
j 3 n
8
e
Modulator IQ
i(t)
Complex
QAM
modulator
Filter
quadrature q(t)
S(t)
y(t)
3 n
8
Carrier fc
modulator
i(t)
y(t)
+
-90
S(t)
q(t)
sin(ct)
carrier
Figure 114
The bit source generates bits dk at a rate of fb=812.5 Kbps. Each group of 3 bits is
Gray-coded into an octal-valued symbol cn=[0,1,2,3,4,5,6,7] (see table below). This
symbols are produced at rate fs= fb/3=270.833 Ksps, which is identical to the GSM
symbol rate.
Table 1. Gray-coding of binary bit triplets into ocatal symbols
d1, d2, d3
0,0,0 0,0,1 0,1,0 0,1,1 1,0,0 1,0,1 1,1,0 1,1,1
cn
3
4
2
1
6
5
7
0
table 5
153
Index n in cn, is the n-th step used to send a symbol, for example we can decide to
send the same symbol for n-consecutive times.
The octal-valued symbols cn are used to phase modulate a carrier, yielding an
8-PSK-EDGE waveform sequence Sn :
= A e
n
c
2 C
8
n
= A cos
c
2 C n
2 C n
+ j A sin
= I + jQ
c
8
8
eq 257
j 2 0
8
= cos 0
+ j sin 0 = 1 + j 0
= e
j 2 1
8
= cos
+ j sin
= e
j 2 2
8
= cos
= e
j 2 3
8
= cos
= e
j 2 4
8
= cos
= e
j 2 5
8
= cos
= e
j 2 6
8
= cos
S7 = e
j 2 7
8
= cos
S
S
S
S
0
1
4
5
+ j sin
0.7 + j 0.7
0 + j1
S
S
0
1
=1
=1
=1
3
3
+ j sin
-0.7 + j 0.7 S = 1
3
4
4
+ j sin 1 + j 0
5
5
+ j sin
-0.7 - j 0.7
4
4
3
3
+ j sin
0 - j1
2
2
5
5
+ j sin
0.7 j 0.7
4
4
4
5
=1
=1
=1
=1
eq 258
154
S2= (010)
(S 2 ) = 2
S3= (000)
S1= (011)
Q=0.7
(S1 ) = 4
S0= (111)
S4= (001)
I=0.7
(S 0 ) = 0
S7= (110)
S5= (101)
S6= (100)
Figure 115
Figure below shows the i(t),q(t) signal time variation for an unfiltered 8PSK
modulation, when a sequence of 8 symbols, see table 1, is used as a single ordinate,
binary input data stream. To each single couple i(t),q(t), corresponds one and only one
point on the unitary imaginary plane, as showed above.
155
Figure 116
Figure below shows corresponding vector amplitude and phase time variation.
Note that in case of unfiltered constellation, the vector amplitude is constant. This is not
true when a complex filter is used, since amplitude modulation AM is introduced .
Figure 117
156
Figure below shows the corresponding vector constellation for unfiltered implementation.
S2(010)
S3(000)
S1(011)
S0(111)
S4(001)
S5(101)
S6(100)
Figure 118
Figure 119
157
In so doing we should keep in mind that in ideal case of unfiltered signals there is
no phase jitters, Hence each single constellation point remains easily selectable by the
receiver.
Another observation is that vectors constellation does go through origin. This is
the main problem since signal filtering introduces an Amplitude Modulation, and
hence, also a greeter sensitivity at low C/I with respect to GMSK modulation.
Figure below reports the relative FFT magnitude for unfiltered case we have
showed so far, note the great sidelobes that are a consequence of rectangular data
pulses.
13dB
Figure 120
Rn = S n e
3 n
8
=e
2 C n
8
3 n
8
=e
( 2C n +3n )
= an + jbn
eq 259
158
R
R
R
R
R
R
R
R
0
1
2
3
4
5
6
7
( ) = cos 0 +
j 0
= e 8
j sin 0 = 1 + j 0
j 2 + 3
= e 8
= cos
=
=
=
=
=
=
5
5
+ j sin
- 0 . 38 + j 0.92
8
8
j (4 + 6 )
10
10
+ j sin
0.71 - j 0 . 71
= cos
e 8
8
8
j (6 + 9 )
15
15
+ j sin
0.92 j 0 . 38
= cos
e 8
8
8
j (8 + 12 )
20
20
+ j sin
0 + j1
= cos
e 8
8
8
j (10 + 15 )
25
25
+ j sin
0 . 92 j 0.38
= cos
e 8
8
8
j (12 + 18 )
30
30
+ j sin
0.71 j 0.71
= cos
e 8
8
8
j (14 + 21 )
35
35
= cos
+ j sin
0.38 + j 0 . 92
e 8
8
8
=1
R
R
R
R
R
R
=1
2
3
4
5
6
7
=1
=1
=1
=1
=1
=1
eq 260
Table below reports Rn and the corresponding angle . Note that the difference:
Rn- Rn-1 between two consecutive vector constellation point is always 112.5
Rn
Rn- Rn-1
angle
R0
R1
112.5
112.5
R2
225
112.5
R3
337.5
112.5
R4
450
112.5
R5
562.5
112.5
R6
R7
675
112.5
787.5
112.5
table 6
159
R1=011
R4=001
R7=110
112.5
112.5
112.5 112.5
R0=111
112.5
112.5
R5=101
R3=000
112.5
R6=100
R2=010
Figure 121
Imaginary Part (Q)
Rn=4--001
Rn=1--011
Rn=7--110
Rn=0--111
Rn=3--000
Rn=2-010
Rn=6--100
Figure 122
160
Transmitting at each time step n the same symbol we note that the relative position on
the constellation plane is continually rotated by 67.5
67.5
figure 123
Note that with symbol rotation we have no longer 8 constellation point but 16.
8PSK
Fixed position
Shift
position
figure 124
161
Figure below shows i(t), q(t) signals time variation for an 3/8 shifted 8PSKEDGE unfiltered modulating input signals when a single ordinate sequence of 8 symbols
(0,1,2,3,4,5,6,7), is used as a binary input data stream.
Figure 125
Figure below shows the corresponding vector amplitude and phase time variation. Note
that in case of unfiltered constellation, the vector amplitude is constant. This is not
true when a complex filter is used.
Figure 126
162
/8 shifted 8PSK-EDGE
8PSK
Zero
Figure 127
As shown in figure above, the EDGE signal has a non-zero minimum magnitude when
3/8 radiant rotation is used, therefore this phase rotation assures that the signal
envelope never goes to zero.
Without the CPS operation, the vectors constellation goes through origin.
Figure below reports the relative FFT magnitude, note that in case of unfiltered
signals there is no spectrum difference with a standard 8PSK. This is because the
points of constellation in 8PSK EDGE are only shifted by 3/8 radiants.
163
13dB
Figure 128
For a non shifted standard 8PSK, we can try to explain passages of the vector through
the origin on the constellation imaginary plane.
For example, if we consider a pseudorandom PRBS9 as a binary input data sequence
and if we focusing our attention around a few random points transition, it is possible to
observe that some times, vectors i(t),q(t) have a contemporary passage through origin.
Figure 129
In order to switch from one constellation point to another opposite constellation point,
the corresponding i(t),q(t) resulting vector, has to pass through the origin. By doing
so, the amplitude of i(t),q(t) resulting vector goes to zero. Defining the envelope
dynamic range as the ratio between maximum and minimum envelope values, we note
that without CPS, the signal envelope goes to zero and the envelope dynamic range
becomes infinite.
164
16.4.1
Although ISI is eliminated using raised-cosine filter, a 200 KHz channel spacing
results in a symbol rate less than 200 KSymbol/s. The 8PSK EDGE signal with
rised-cosine filtering does not fit within 200 KHz of bandwidth, for example using
a raised cosine rolloff filter we could have:
D( symbols / s ) =
2B
for a raised cosine rolloff filter.
1+ r
eq 261
165
The transmit filter used is a Linearized Gussian Filter (similar to, but different
than the method used for GSM).
In this manner, the spectrum of 8PSK signal can be restricted to 200 KHz and
the symbols filtering allow the 8PSK signal spectrum to occupy the same
bandwidth as a GPRS/GSM signals. In the same time it also introduces a
considerable ISI component.
Because of the severe ISI introduced by the linearized Gussian Filters, the
receiver includes an equalizer, and the Signal-to-Noise Ratio on Co-channel
interference of about C/N 18 dB is quite high if compared to a GMSK
modulation where C/N 9 dB
Since the EDGE transmit mask is nearly identical to the GSM transmit mask,
the EDGE signal succeeds in tripling the data throughput within the standard
GSM channel.
16.4.2
These AM effects can be reduced with 3/8 offset 8PSK in which we never have
the phase shift transition.
166
x(t ) = Rn p(t nT )
eq 262
where T=1/fs is the symbol interval, and p(t) is the filter pulse shape. We can rewrite in
the alternative form:
eq 263
with real symbol an, bn and real pulse p(t), for two real filtered signals I(t) and O(t). Each
real filtered signals can be visualized as the output of a linear time-invariant (LTI) filter
driven by a stream of impulse scaled by an, (or bn), yielding a linear superposition of
scaled time-shifted pulses p(t).
The exact filter pulses shape p(t) defined for EDGE signal is non-zero over the interval
-5(T/2) t 5(T/2),
5
p ( t ) = c0 t + T
2
eq 264
3
f (t + iT )
c0 (t ) =
i =0
0 t 5T
elsewhere
eq 265
167
sin g (u )du
0
t 4T
f (t ) = cos g (u )du
0 t 4T
4T t 8T
elsewhere
eq 266
g (t ) =
1
g GMSK (t 2T )
2
g GMSK (t ) =
Q (t ) =
eq 267
t 5T / 2
1
q 2 0.3 t 3T / 2
Q 2 0.3
T ln( 2)
2T
T ln( 2)
1
2
r2
eq 268
y (t ' ) = Rn c0 (t 'nT + 2T )
eq 269
The time reference t=0 is the starting of the active part of burst as shown figure this is
also the start of the symbol period of symbol 0 (containing the first tail bit)
168
9 tail bits
9 tail bits
1/2 symbol
The active part
figure above show Relation between active part of burst and tail bits. For the normal
burst the useful part lasts for 147 modulating symbols. Before the first bit of the bursts
as defined in GSM 05.02 [3] enters the modulator, the state of the modulator is
undefined. Also, after the last bit of the burst, the state of the modulator is undefined.
The tail bits (see GSM 05.02) define the start and the stop of the active and the useful
part of the burst as illustrated in figure above. Nothing is specified about the actual
phase of the modulator output signal outside the useful part of the burst.
169
Amplitude
modulation
(AM)
Figure 130
Figure above shows the corresponding amplitude vector and phase time variation
for Gaussian EDGE filtered signals. Note that in case of an unfiltered constellation,
the vectors amplitude is constant, this is not true when a complex filter is used having
Amplitude Modulation AM.
Amplitude
of modulated
signal
Phase
of modulated
signal
Bandwidth
of modulated
signal
figure 131
Focusing out attention at the transmitter output, we can se haw the baseband signal
filtering produces ISI.
Obviously the same filter applied at the receiver side reduces these phenomena.
171
figure 132
172
16.7 Modulation
Let us indicate the frequency carrier fc. Follows that the QAM modulation is:
eq 270
because y(t)=i(t)+jq(t) than the real part of output modulated signal becomes:
eq 271
s (t ) = i (t ) cos ct q (t ) sin ct
using the filtering equation already seen before for a single burst:
y (t ' ) = Rn c0 (t 'nT + 2T )
eq 272
the modulated RF carrier during the useful part of the burst became:
s (t ' ) =
2 Es
Re y (t ' ) e j (2f ct ' +0 )
T
eq 273
where Es is the energy per modulating symbol, fc is the center frequency and 0 is a
random phase and is constant during one burst (see TS 05.04).
16.8 Conclusion
The 3/8 shifted 8PSK-EDGE signals succeeds in its primary goals of tripling the onair data rate while maintaining nearly the same spectral occupancy as the original GSM
signal. The 3/8 shift assures that the signal envelope never falls below a certain level.
Nonetheless, this signal has a significant envelope variation, which exposes the signal
to AM-PM distortion impairments that dont degrade the signal quality of GMSK.
173
174
175
figure 134
176
figure 135
177
eq 274
eq 275
where 1=2 for the continuous phase condition at the switching time t=0.
For orthogonal signaling, we require the integral of the product of the two signals over
the bit period 2Tb to be zero. Thus, we require:
2Tb
s (t )s
1
2Tb
2
(t )dt =
2Tb
2
c
i.e.
1
Ac2 cos[(1 + 2 )t + (1 + 2 )] + cos[(1 2 )t + (1 2 )] dt =
2
1 (1 + 2 )
1 (1 2 )
cos[(1 + 2 )t + (1 + 2 )] +
cos[(1 2 )t + (1 2 )] dt =
Ac2
2 (1 2 )
2 (1 + 2 )
0
2Tb
2Tb
1 (1 + 2 )
1 (1 2 )
cos[(1 + 2 )t + (1 + 2 )] dt + Ac2
cos[(1 2 )t + (1 2 )] dt =
= Ac2
2 (1 + 2 )
2 (1 2 )
0
0
2Tb
= Ac2
+ Ac2
1
(1 + 2 )
1
(1 2 )
2Tb
2Tb
+ 2 ) cos[(1 + 2 )t + (1 + 2 )] dt +
2
Ac2 (1 2 ) cos[(1 2 )t + (1 2 )] dt =
2
2Tb
2Tb
1
1
1
sin[(1 + 2 )t + (1 + 2 )] + Ac2
sin[(1 2 )t + (1 2 )] = 0
=A
(1 + 2 ) 2
(1 2 ) 2
0
0
2
c
178
2Tb
s (t )s
1
(t )dt = Ac2
1
1
1
(1 + 2 ) 2
2
1
1
1
sin[(1 2 )2Tb + (1 2 )] sin[(1 2 )] = 0
+A
(1 2 ) 2
2
eq 276
2
c
The first term is negligible, because (1+2) is large, so the requirements reduces to
2Tb
s1 (t )s2 (t )dt =
0
=0
1 2
2
eq 277
for the continuous phase case the phase must be 1=2; and the equation above is
satisfied (i.e. equal to zero) for a minimum value h=0.5 .
in fact sin[2(1 2 )Tb + (1 2 )] sin[(1 2 )] = 0 is verified when
2(1 2 )Tb =
but
2(1 2 )Tb =
2 2 ( f1 f 2 )Tb = 2 ( f1 f 2 )Tb =
1 = 2
1
1
h=
2
2
h = 1/ 2
2( f1 f 2 )Tb =
2
2(1 2 )Tb Tb 2
=
=
1
2
1
=
2
f = ( f1 f 2 ) =
2 =
1
4Tb
then when
eq 278
i.e. the peak to peak phase variation is 90 while the peak to peak frequency shift is
Tb.
Now we will demonstrate that MSK signal is also a form OQPSK with sinusoidal pulse
shaping. First, consider the FSK signal over the signalling interval (0,Tb). Then using
equation:
s (t ) = Re[ g (t )e jct ]
eq 279
179
g (t ) = Ac e j ( t ) = Ac e
j 2 f m ( ) d
0
eq 280
g (t ) = Ac e
j ( t )
= Ac e
j 2 f t
= Ac e
j 2
1
t
4Tb
= Ac e
t
2 Tb
eq 281
where the signs denote the possible data during the (0,Tb) interval. Thus,
g (t ) = Ac e j (t ) = Ac e
t
2Tb
t
t
j sin
= x(t ) jy (t ),
= Ac cos
2Tb
2Tb
0 < t < Tb
eq 282
t
s (t ) = Re[ g (t )e jct ] = x(t ) cos c t y (t ) sin c t = cos
2Tb
cos c t m sin
2Tb
sin c t eq 283
This type of FSK modulation with modulation index h=0.5 is a form of orthogonal FSK
with minimum bandwidth required, called MSK (Minimum Shift Keying). This type of
modulation is also a particular case of CPM (Continuous Phase Modulation).
In CPM techniques the phase is slowly varied in each symbol interval starting from the
phase value assumed in the preceding symbol interval. Consequently are also called
modulation technique with memory.
Since a frequency shift produces an advancing or a retarding in phase, frequency shifts
can be detected by sampling phase at each symbol period. Phase shifts of (2N + 1)/2
radians are easily detected with an I/Q demodulator.
At even numbered symbols, the polarity of the I channel conveys the transmitted data,
while at odd numbered symbols the polarity of the Q channel conveys the data. This
orthogonally between I and Q simplifies detection algorithms and hence reduces power
consumption in a mobile receiver. The minimum frequency shift which yields
orthogonality of I and Q is that which results in a phase shift of /2 radians per symbol
(90 degrees per symbol). FSK
The binary data of m(t) alternatively modulate the x(t) and y(t) components, and the
pulse shape for the x(t) and y(t) symbols( which are 2Tb wide instead of Tb) is a
sinusoid. Thus MSK is equivalent to OQPSK with sinusoidal pulse shaping.
180
FSK and MSK produce constant envelope carrier signals, which have no amplitude
variations. This is a desirable characteristic for improving the power efficiency of
transmitters. Amplitude variations can exercise nonlinearities in an amplifiers amplitudetransfer function, generating spectral regrowth, a component of adjacent channel power.
Therefore, more efficient amplifiers (which tend to be less linear) can be used with
constant-envelope signals, reducing power consumption.
MSK has a narrower spectrum than wider deviation forms of FSK. The width of the spectrum is
also influenced by the waveforms causing the frequency shift. If those waveforms have fast
transitions or a high slew rate, then the spectrum of the transmitter will be broad. In practice,
these Waveforms are filtered with a Gaussian filter, resulting in a narrow spectrum. In addition,
the Gaussian filter has no time-domain overshoot, which would broaden the spectrum by
increasing the peak deviation.
MSK with a Gaussian filter is termed GMSK (Gaussian MSK).
dI
Sinusoid
filter
Baseband
processing
modulator f=fc
X
cos(fc)
Delay
dQ
Cosinusoid Q
filter
MSK
X
sen(fc)
Baseband
processing
X
cos(fc)
Delay
dQ
OQPSK
X
sen(fc)
figure 136
Baseband
x data
Oscillator
f0=f=1/4R
m(t)
input
x(t)
Carrier
oscillator
fc
cos(t/2Tb)
Serial-toparallel
converter
(2bit)
Accos(ct)
+
-90
phase
shift
-90
phase
shift
Sync
input
sin(t/2Tb)
y data
s(t)
MSK
signal
Acsin(ct)
y(t)
In order to make the difference between FSK and MSK we are going to show an
example for CPM using a Trellis phase transitions representation where phase
transitions permitted are only of 90.
Particularly a phase shift of +90 degrees represents a data bit equal to 1, while 90
degrees represents a -1(or 0 in a binary form).
Because CPM can be represented also as an OQPSK modulation and, an MSK as a
pre-filtered OQPSK, by now on will call the two modulation types using the quadrature
meaning title.
Supposing an input NRZ data format, then one possible Trellis phase representation
could be the following:
182
+1
NRZ
data
-1
3/2
Sharp slope
variation
(discontinuity)
/2
-/2
-
-3/2
-2
2Tb
4Tb
6Tb
8Tb
10Tb 12Tb
MSK
phase
+1 Tx
2Tb
4Tb
6Tb
-1 Tx
figure 138: Trellis tree phase representation for a CPM
Although there are only /2 phase shift, these discontinuity on the phase transitions
requiring a large bandwidth. In order to limit this bandwidth a filtering method is needed.
Anyway this filtering method introduce ISI.
OQPSK no filtered
OQPSK filtered
Phase
transition
rounded
183
The main difference between MSK and OQPSK is the sinusoidal pre-filtering method
used into MSK:
OQPSK
MSK
eq 284
t
t
s (t ) = d I (t ) cos
sin( 2fct )
cos(2fct ) + d Q (t ) sin
2 Tb
2 Tb
eq 285
As an example we report a plot of the MSK signalling and that for the corresponding RF
output:
I baseband
MSK output
modulated signal
I(t)
I modulated
signal
I MSK
Modulated
signal
Q baseband
Q(t)
Q modulated
signal
Q MSK
Modulated
signal
figure 140
184
The peculiarity of MSK is not in the main lobe which is 50% more greater than a
OQPSK. Instead what is worth of consideration is that MSK has a fast side lobes
decaying. Spectrum of MSK decays with the four power of the frequency, while in the
case of QPSK and OQPSK the law is modestly of quadratic type.
Therefore we can say that MSK is characterized by a better interference control on
adjacent channels.
figure 141
18.1 GMSK
Another form of MSK is Gaussian-filtered MSK (GMSK). For GMSK, the data
(rectangular-shaped pulses) are filtered by a filter having a Gaussian-shaped frequency
response characteristic before the data are frequency modulated onto the carrier. The
transfer function of the Gaussian low pass filter is
f ln 2
B 2
2
H( f ) = e
eq 286
Where B is the 3-dB bandwidth of the filter. This filter reduces the spectral sidelobes on
the transmitted MSK signal.
The product of B with bit period Tb:
185
= B Tb
eq 287
For BTb=0.3 GMSK has lower spectral sidelobes than those for MSK, QPSK, or
OQPSK (with rectangular-shaped data pulses). In addition GMSK has a constant
envelope, since it is a form of FM. Consequently GMSK can be amplified without
distortion by high efficiency Class C amplifiers.
In figure below is reported an example of power efficiency
figure 142
186
In figure below are reported an example for amplitude and phase vector representation
and the vector and constellation diagrams.
We can see how the amplitude remains constant while the phase change continuously.
In this way the vector representation is a circle which has been made of all possible
phase point transitions, for the modulated signal s(t), from a symbol to another symbol.
In the other figures are reported the spectrum and bandwidth and the ISI representation
of modulated signal as a function of normalized bandwidth = B Tb . Its possible to
observe that the lower = B Tb the greater the ISI.
Constant
amplitude
No phase
discontinuity
figure 143
187
BTb=0.5
BTb=0.5
BTb=0.2
BTb=0.2
figure 144
188
BTb=0.1
figure 145
189
18.1.1
1.
2.
3.
4.
5.
Quadrature modulation
cos ( t )
0,1..
NRZ
-1,+1
code
NRZ code
Integrator
b(t)
I(t)
(t )
Gaussia
LP
900
BTb is
s(t)
RF
modulated
output
transformer
Q(t)
sin ( t )
figure 146
190
Mathematically:
t iTb
m(t ) = mi
Tb
NRZ Data:
Gaussian Filter:
( t )
hG (t ) =
e
After Filter:
b(t ) = hG (t ) m(t ) =
= mi
After integrator: (t ) = 1
4Tb
1
=
4Tb
, mi = 1
( )m(t )d
( )
e
d
Tb
2
T
t iTb b
2
t iTb +
b( z ) dz
mi
-
= mi
1
4Tb
Tb
2
T
z iTb b
2
z iTb +
Tb
2
T
z iTb b
2
z iTb +
( )
e
d dz
hG ( )d dz
= mi i (t )
= LL +
+ LL
191
18.1.2
However to avoid the receiver to have its own reference (i.e. the necessity of coherent
demodulation), a differential encoding can be used to create NRZ signal at the input of
demodulator.
Table below show as an example how to convert binary signal (0,1) to differential NRZ
symbol. It can be easily computed using the following operations:
192
table 7
Y NRZ
figure 149
193
figure 150
figure 151
figure 152
195
figure 153
196
197
100,000
10,000
1,000
100
10
1970
1975
1980
1985
1990
1995
2000
2005
2010
Year
These trends of increasing data requirements and decreasing availability of
spectrum have focused attention on the efficient use of the remaining spectrum. It is the
responsibility of all programs to insure that their use of spectrum is as efficient as
possible and that spectrum is not needlessly being wasted. Some of the major test
ranges have already been forced to schedule use of the telemetry spectrum by the hour
to accommodate all of the required users. Under these conditions, it has become
imperative that all programs be as efficient and flexible as possible to ensure that they
are able to secure the use of a sufficiently large portion of the spectrum to complete
their required testing.
198
To be spectrally efficient means that data rates must be kept at the absolute
minimum bandwidth, so proper transmitter pre-modulation filtering techniques must be
used, and efficient modulation schemes must be employed. Currently the most
common modulation scheme is PCM/FM; this is a very robust modulation technique that
is fairly efficient. To be efficient these systems must have proper pre-modulation
filtering and be properly aligned. As can be seen from figure below, improper selection
of pre-modulation filtering, and over deviation of the transmitter can increase the
required channel bandwidth by over 50%. Figure shows ideal spectrum with proper
modulation filtering of .7 x Fb (Bit frequency), improper pre-modulation filtering at 1.4 x
Fb & 2 x Fb, and excessive transmitter deviation of 1.2 x Fb (.35 x Fb is ideal).
0
-10
-20
Improper
Pre-modulation Filter
2 x Fb
Over deviation
1.2 x Fb
-30
-40
-50
-60
-70
Ideal
PCM/FM
-80
-90
-100
1450.5
1452.5
1454.5
1456.5
1458.5
1460.5
figure 154
expect to see vast improvements in spectrum efficiency. In the meantime efforts should
be concentrated on insuring that currently deployed telemetry systems have been
properly constructed and aligned.
200
21 CORRELATED DETECTION
Let us consider a linear system (filter) through which passes a signal when a white
noise is present. The aim of filter is to extract the signal with the maximum S/N ratio at
the output. We want to find the linear filter transfer function H() that maximize the S/N
ratio at the output. Calling f(t) the signal applied to filter and , the noise spectral power
density which is present within the filter bandwidth.
Linear filter
H()
f(t)
g(t)
figure 156
f (t )e
j t
dt
eq 288
G ( ) = F ( ) H ( )
eq 289
and
g (t ) = F 1 [F ( )G ( )] =
1
2
F ( ) H ( )e
j t
eq 290
F ( ) H ( )e
jt
eq 291
201
NoisePSD =
(W/Hz)
eq 292
Where the spectrum is extended from positive to negative frequencies, then the
filter output noise power spectral density will be
G N ( ) =
H ( )
eq 293
H ( )
2 H ( )
eq 294
We want find H() in order to maximize the output signal-to-noise ratio S/N:
g 2 ( )
max
P
N
g 2 ( ) = signal power
where
Ones the input signal is defined, its also defined its energy which is a constant given by
+
E=
f 2 (t )dt =
1
2
F ( )
eq 295
The signal to noise ratio, we want to maximize, can be divided by the energy E without
altering the maximum S/N ratio determination. Therefore
g 2 ( )
= max
max
E PN
1
2
F ( ) H ( )e d
= max
+
+
1
2
2
1
F ( ) d 2 2 H ( )
2
1
2
j t
F ( ) H ( )e d
+
+
2
2
F
d
H
j t
eq 296
202
In order to maximize the preceding ratio we can use the Schwarz theorem for complex
function integral:
2
X ( )Y ( )d
X ( )
d Y ( ) d
2
eq 297
X ( ) = kY ( )
eq 298
so we have
2
kY ( )Y ( )d =
*
*
kY ( ) d Y ( ) d
eq 299
X ( ) = H ( )
eq 300
Y ( ) = F ( )e j t
We can write
X ( ) = H ( ) = kY * ( ) = kF * ( )e j t
i.e. H ( ) = kF * ( )e j t
eq 301
Then substituting on the S/N ratio we can obtain the maximum value given by:
2
+
+
1 +
1
2
2
j t
F
H
e
d
(
)
(
)
F
d
H
d
(
)
(
)
2
g 2 ( )
= max
max
= max
=
+
+
+
+
E PN
1 F ( ) 2 d 1 H ( ) 2
1 F ( ) 2 d 1 H ( ) 2
2
2 2
2 2
2
+
1
2
k F ( ) d
2
1
=
max
2
+
1 1
2
2 2 2 k F ( ) d 4
203
g max
k
=
2
F ( )
d = kE
eq 302
This is the optimum filter function to reveal the signal when white noise is present. If
we get k=1 then by Parseval theorem we can rewrite:
g max =
1
2
F ( )
d = f 2 (t )dt = E
eq 303
Where the second integral it has been extended to the duration T of the input signal.
Therefore, the optimum correlator receiver must to perform an integration, over the
signal period T, of the product between the input signal and the replica of the input
signal locally available. The term correlator follows by the correlation existing between
input signal and the locally available reference signal.
The reference signal (replica of input signal) can be obtained by PLL circuits. These
circuits have a bandwidth which can be reduced to a small bandwidth around the
carrier, thus the carrier can be extracted and can be used as a reference signal. Also
PLL circuits use the correlation.
From a general point of view we can say that the correlation detection is a way to use as
better as possible the known characteristics of the input signal (frequency. Shape, ..).
The equation for the correlation detection is:
g (t ) = v(t ) s R (t )dt
eq 304
Where
204
v(t)=s(t)+n(t)
PLL
sR(t)
(..)dt
g(t)
correlator
figure 157
The Modulation process must be conserve some power on the carrier (other to that on
the side band) in order to allow carrier extraction by the PLL circuits.
205
22 INTRODUCTION TO CDMA
22.1 Multiple Access
A cell in a cellular radio network could be seen as a multi-user communication system,
in which a large amount of users share a common physical resource to transmit and
receive information. The resource is the frequency band in the radio spectrum. There
are several different radio access techniques in which multiple users could send the
information through the common channel to the receiver:
FDMA
F
TDMA
FDMA
P
P - Power
T Time
F - Frequency
F
T
CDMA
FDD
P
T
figure 158
In FDMA and TDMA the common channel is partitioned into orthogonal single user
subchannls. A problem arises if the data from the users accesing the network is bursty
in nature. A single user who has reserved a channel may transmit data irregularly so
that silent periods are even longer than transmission periods. For example, a speech
signal may contain long pauses. In such cases TDMA or FDMA tends to be inefficient
because a certain percentage of frequency or of the time slots allocated to the user
caries no information. An inefficiently designed multiple access system limits the
number of simultaneous users of the common communication channel.
206
One way of overcoming this problem is to allow more than one users to share the
channel or sub-channel by the use of spread spectrum signals. In this method each user
is assigned a unique code sequence or signature sequence that allow the users signal
to be spread on the common channel.
By designing these code sequence with relatively little cross correlation, the crosstalk
inherent in the demodulation signals received from multiple transmitters is minimized.
This multiple access method is called CODE DIVISION MULTIPLE ACCESS (CDMA)
Trasmitter
Receiver
Channel
Sn
Sn
()
n(t)
()=-1()
Sn
i(t)
Formally the operation of both transmitter and receiver can be partitioned into two steps.
At the transmitter site:
the first step is modulation in which the narrowband signal Sn, which occupies
frequency band Wi, is formed. In the modulation process, bit sequences of
length n are mapped to 2n different narrowband symbols constituting the
narrowband signal Sn.
in the second step the spreading is carried out, in which the narrowband signal
Sn is spread in a large frequency band Wc. The spread signal is denoted by Sw,
and the spreading functions expressed as (). An example for spreading is
reported in figure below:
207
Bit period Tb
Data
-1
Spreading/expansion
code
-1
Expanded signal
= Data * Expansion code
1
-1
Chip period Tc
where:
Rb =
1
Tb
1
Rc =
Tc
BIT RATE;
Tc<<Tb and
Tb=NTc,
eq 305
CHIP RATE.
N i.e. the Rc/Rb, is defined as spreading factor, in the example above the spreading
factor is SF=8.
SF =
Rc Tb
=
Rb Tc
eq 306
208
Antenna
Source of
information
Coding
Spreading
sequence
Modulator
O.L.
RF
signal
figure 161
At the receiver side the first step is dispreading, which can be formally represented by
the inversion function -1()=(). In dispreading, the wideband signal Sw, is converted
back to a narrowband signal Sn which can then be demodulated using digital
demodulation schemes.
The primary reason for going to the process of spreading and dispreading is to enable
the CDMA multiple access method, but due to the signal spreading and resulting
enlarged bandwidth, spread spectrum signals have many other interesting properties
that differ from those of narrowband signals. The most important are discussed in the
following section.
209
P[W/Hz]
P[W/Hz]
Sn
in
Despreading
iwr
Sw
iW
f0
fi
f [Hz]
f0
f [Hz]
fi
Wi
Wc
Wc
1 (S w + in ) = 1 [ (S n )] + 1 [in ] = S n + iw
eq 307
The dispreading operation converts the input signal into a sum of the useful narrowband
signal Sn and an interfering wideband signal iw.
210
After the dispreading operation a narrowband filtering (operation F()) is applied, with the
bandpass filter of bandwidth Bn equal to the bandwidth Wi of Sn , this result in:
F ( S n + iw ) = S n + F (iw ) = S n + iwr
eq 308
Only a small proportion of the interfering signal energy passes the filter and remains as
residual interference, because the bandwidth Wc of iw is much larger than Wi. The ratio
between the transmitted modulation bandwidth and the information signal bandwidth is
called processing gain, Gp:
Gp =
Wc
Wi
eq 309
Wc=chip rate
W=bit rate
In WCDMA system the value of Wc is 3.84 Mcps which, owing to spectral sidel lobes,
results in 5 MHz carrier raster.
Its important to note that processing gain process is composed of the spreading part
and coding part.
the
The wideband spreading signal has to be approximated closely to a random signal with
uniform distribution of the symbols. Typical representatives of such signal in digital form
are pseudonoise (PN) sequence over a finite alphabet.
211
Since the WCDMA system has to maximize system capacity during the spreading, the
operation is done in two phases:
In the first the user signal is spread by the channelisation code. This is called
the Orthogonal Variable Spreading Factor (OVSF) Code, its construction is
based on the Hadmard Matrix. The code has the property that two different codes
from the family are perfectly orthogonal if in phase. Thus, its use guarantees
maximum capacity, measured by the number of active users. The channelization
operation, transforms every data symbol into a number of chips, thus increasing
the bandwidth of the signal. The number of chips per data symbol is called the
Spreading Factor (SF).
In the second, all the spread userssignals are scrambled by the cell specific
scrambling sequence, which has the statistical properties of random sequence.
The second operation is the scrambling operation, where a scrambling code is
applied to the spread signal.
Channelisation
code
Scrambling
code
Data
Bit rate
Chip rate
Chip rate
figure 163
22.4.1
Channelization operation
In 3GPP the OVSF codes used for different symbol rates are uniquely described as
Cch,SF,k, where SF is the Spreading Factor of the code and k is the code number
(0 k SF - 1). Each level of the code tree defines the channelization codes of length
SF, where SF is the spreading factor of the codes.
The channelization codes have orthogonal properties and are used for separating the
information transmitted from a single source, i.e.
different connections within one cell in the downlink (thus reducing the own
interference),
dedicated physical data channels from one UE in the uplink.
In the downlink the OVSF codes are a limited resources and need to be managed by
the radio network controller, whereas in the uplink such a problem does not exist.
The OVSF codes are effective only when the channels are perfectly synchronized at
chip level (the loss in crosscorrelation, e.g. due to multipath, is compensated for by the
additional scrambling operation).
212
22.4.1.1
The channelization codes are OVSF (Orthogonal Variable Spreading Factor) codes
that preserve the orthogonality between a users different physical channels. The OVSF
codes can be defined using the code tree of figure below:
( Cch, 2, 0 , Cch, 2, 0 )
Cch, 8, 0 = (1, 1, 1, 1, 1, 1, 1, 1)
( Cch, 2, 0 , - Cch, 2, 0 )
Cch, 4, 0 = (1, 1, 1, 1)
Cch, 2, 0 = (1, 1)
Cch, 1, 0 = (1)
( Cch, 2, 1 , Cch, 2, 1 )
( Cch, 2, 1 , - Cch, 2, 1 )
SF = 1
SF = 2
SF = 8
SF = 4
figure 164
Each level in the code tree defines channelization codes of length SF, corresponding to
a spreading factor SF. The channelization codes are Welsh codes. Their generation
method, which is based on the Hadamard matrix is shown in figure below:
C ch,1,0 = 1
Cch , 2, 0 Cch ,1, 0 Cch ,1,0 1
=
=
Cch , 2,1 Cch ,1, 0 Cch ,1, 0 1
Cch ,3, 0 Cch , 2, 0 Cch , 2, 0 1 1
C
ch ,3,1 = Cch , 2,0 Cch , 2, 0 = 1 1
Cch ,3, 2 Cch , 2,1 Cch , 2,1 1 1
Cch ,3,3 Cch , 2,1 Cch , 2,1 1 1
...
1
1
1 1
1 1
1 1
1 1
figure 165
It is easy to verify that all the codes with the same SF are orthogonal, i.e. they fulfil the
orthogonality condition specified by equation:
213
SF 1
S
k =0
1, k
S 2, k = 0
eq 310
This orthogonality, however, is not guaranteed between a generic code and the codes
belonging to its subtree. As a consequence, the selection of one code, blocks the
corresponding subtree.
22.4.2
Scrambling operation
Ri i ( ) = si (t + ) si (t ) dt
eq 311
R1 2 ( ) = s1 (t + ) s2 (t ) dt
eq 312
and
b
R2 1 ( ) = s2 (t + ) s1 (t ) dt
eq 313
214
Definition:
The finite energy signals s1 (t ) and s2 (t ) are ORTHOGONAL R1 2 (0) = 0
R2 1 (0) = 0 .
s (t ) s (t ) dt = 0 s (t ) s (t ) dt = 0
1
eq 314
Let us now suppose that s1 (t ) and s2 (t ) are two channelisation sequences with the
same SF, as shown in figure below. We will show that
SF 1
Note:
SF 1
The term
S
k =0
1, k
sequences. If we indicate
[
= [S
2, 1
, S 2, 2 , LS 2, SF 1
]
]
eq 315
S1 S 2T
eq 316
Proof:
s (t ) s (t ) dt = 0
1
Tb
SF 1
S
k =0
1, k
SF 1
S 2, k Tc = 0 S1, k S 2, k = 0
eq 317
k =0
215
S1, 0
S1, 1
S1, 2
S1, SF-1
s1 (t )
S2, 0
S2, 1
S2, 2
S2, SF-1
s2 (t )
Tc
2Tc
(SF-1)Tc
figure 166
216
No interference scenario
Data
11
-11
Spreading
Spreding code
11
-11
11
-11
DeSpreading
Spreding code
11
-11
11
-11
88
Correlation result
-8
figure 167
Figure below show the effect of despreading operation when applied to the CDMA
signal of another user whose signal is assumed to have been spread with a different
spreading code. The result of multiplying the interfering signal with the own code and
integrating the resulting products leads to interfering signal values lingering around 0.
The basic idea is that the receiver works as a correlation receiver, which means that it
correlates a known (reference) code with an incoming signal that is composed of
several different CDMA signal (from different users or channels), with general
interference (from other RF systems), and with a noise (of thermal nature).
The output from the receiver is in the form of the autocorrelation function of the wanted
signal.
217
Interference example
Other interfering signal
11
-11
Spreding code
11
-11
11
-11
88
Correlation result
-88
figure 168
As can be seen, the amplitude of the own signal (correlation result in graphics)
increases on average by a factor of 8 relative to that of the user of the other interfering
system, i.e. the correlation detection has raised the desired user signal by the spreading
factor, here 8, from the interference presenting the CDMA system. This effect is termed
processing gain and is a fundamental aspect of all CDMA systems, and in general of
all spread spectrum system.
Processing gain is what gives CDMA systems the robustness against-interference that
is necessary in order to reuse the available 5 MHz carrier frequencies over
geographically close distances.
Lets take an example with real WCDMA parameters. Speech service with a bit rate of
12.2 kbps has a processing gain of:
Rc
3.84 10 6
Chip _ rate
=
=
Pg = 10 Log
10
Log
10
Log
= 25dB
3
Bit _ rate
12.2 10
Rb
eq 318
After despreading, the signal power needs to be typically a few decibel above the
interference and noise power. The required power density over the interference power
density after despreading is designated as Eb/N0, where Eb is the energy, or power
density, per user bit and N0 is the interference and noise power density.
For speech service the ratio Eb/N0 is typically in the order of 5.0 dB, and the required
wideband signal to interference ratio C/I is therefore 5.0 dB minus the processing gain
i.e.
C
(dB) wdeband = 5dB 25dB = 20dB
I
eq 319
218
In other words, the signal power can be 20 dB under the interference or thermal noise
power, and the WCDMA receiver can still detect the signal.
Due to spreading and despreading, C/I can be lower in WCDMA than, for example, in
GSM. A good quality speech connection in GSM requires C/I=9-10 dB.
Since the wideband signal can be around the thermal noise level, its detection is difficult
without knowledge of the spreading sequence. For this reason spread spectrum
systems were originated in military applications where the wideband nature of the signal
allowed have to be hidden below omnipresent thermal noise.
It should be observed that the more is the bit rate Rb, the lower is Pg(dB), therefore
higher bit-rate service require an increasing C/I.
Rb
(Kbit/sec)
12.2
64
384
2000
Pg
314.7541
60
10
1.92
Pg(dB)
25.0
17.8
10.0
2.8
table 8
It should be also observed that the processing gain comes at the price of an increased
transmission bandwidth (by the amount of the processing gain).
219
frequency band. Therefore in WCDMA uplink the two dedicated physical channel are
not time multiplexed but I-Q/code multiplexing is used.
The continuous transmission achieved with an I-Q/code multiplexed control channel is
shown in figure below.
Data
(DPDCH)
DTX Period
User Data
(DPDCH)
Dedicate Phisical Data
Channel
figure 169 : parallel transmission of DPDCH and DPCCH when data is present/absent (DTX)
Now, as the pilot and the power control signaling are maintained on a separate
continuous channel, non pulsed transmission occurs. The only pulse occurs when the
data channel DPDCH is switched on and off, but such switching has happens quite
seldom. For the best possible power amplifier efficiency, the terminal transmission
should have as low-peak-to-average ratio (PAR) as possible to allow terminal to operate
with a minimal amplifier back-off requirement.
With the I-Q/code multiplexing, also called dual-channel QPSK modulation, the
power level of the DPDCH and DPCCH are typically different, especially as data
rates increase, and would lead in extreme case to a BPSK-type transmission
when transmitting the branches independently. This has been avoided by using a
complex-valued scrambling operation after the spreading with channelisation
codes.
The signal constellation of the I-Q/code multiplexing before complex scrambling is
shown in figure below, the same constellation is obtained after descrambling in the
receiver for data detection.
Q
G=0.5
G=1
figure 170: Constellation of I-Q/code multiplexing before complex scrambling, G denotes the relative gain
factor between DPCCH and DPDCH
220
Figure below illustrates the principle of the uplink spreading of DPCCH and DPDCHs.
The binary DPCCH and DPDCHs to be spread are represented by real-valued
sequences, i.e. the binary value "0" is mapped to the real value +1, while the binary
value "1" is mapped to the real value 1. The DPCCH is spread to the chip rate by the
channelization code cc, while the n-th DPDCH called DPDCHn is spread to the chip rate
by the channelization code cd,n. One DPCCH and up to six parallel DPDCHs can be
transmitted simultaneously, i.e. 1 n 6.
cd,1
cd,3
DPDCH1
DPDCH3
cd,5
DPDCH5
Sdpch,n
I+jQ
cd,2
cd,4
cd,6
cc
DPDCH2
DPDCH4
DPDCH6
DPCCH
After channelization, the real-valued spread signals are weighted by gain factors, c for
DPCCH and d for all DPDCHs.
At every instant in time, at least one of the values c and d has the amplitude 1.0. The
-values are quantized into 4 bit words. The quantization steps are given in table below.
221
After the weighting, the stream of real-valued chips on the I- and Q-branches are then
summed and treated as a complex-valued stream of chips. This complex-valued signal
is then scrambled by the complex-valued scrambling code Sdpch,n. The scrambling code
is applied aligned with the radio frames, i.e. the first scrambling chip corresponds to the
beginning of a radio frame.
In the uplink, the complex-valued chip sequence generated by the spreading process (
spreding phase + scrambling phase) is QPSK modulated as shown in Figure below:
cos(t)
Complexvalued chip
sequence from
spreading
operations
Split
real
&
imag
Re{S}
Pulseshaping
Im{S}
Pulseshaping
-sin(t)
figure 172: Uplink Modulation
222
22.7.1
SC=Scrambing Code
I
DPDCH OFF
I+jQ
S
DPCCH
Cc
c
Chanelisation
Code
Supposing the gain factor parameter equal to one: c=1; then the signal can assume
only the values 1 along the Q axes i.e. 1j, in other word we are obtaining a BPSK
constellation.
223
In order to minimize the zero crossing by the vector constellation, we are using the
scrambling codes which are formed in such a way that the rotations between
consecutive chips within one symbol period are limited to 90. The full 180 rotation
can happen only between consecutive symbols. This method further reduces the peakto-peak-average ratio of the transmitted signal from the normal QPSK transmission.
The scrambling codes, during the chip time, can assume only the values:
j (1 + j ) = 1 + j
j (1 j ) = 1 + j
j ( 1 + j ) = 1 j
j ( 1 j ) = 1 j
j (1 + j ) = 1 j
j (1 j ) = 1 j
j ( 1 + j ) = 1 + j
j ( 1 j ) = 1 j
eq 320
-1+j
1-j
1+j
1+j
-1-j
1-j
-1-j
1-j
224
22.7.2
As a second analysis case let us consider the transmission of two parallel channels,
DPDCH (dedicated physical data channel) and DPCCH (dedicated physical control
channel):
cd
d
Sc
DPDCH
I+jQ
S
DPCCH
cc
figure 176
Consider the peak-to-average power ratio (PAR=crest factor) defined as the ratio
between the peak and average power.
The amplifier efficiency is maximized when the peak-to-average power ratio
(PAR=crest factor) is minimized. This mean that the mobile phone amplifier can
operate with a minimum back-off, in other word with a minimum output power reduction
with respect to the maximum output power allowed.
The peak-to-average power ratio (PAR=crest factor) is affected and degraded by
power unbalance of I and Q channels, notably in phase and quadrature component of
the signal. To minimize peak-to-average power ratio (PAR=crest factor) is required a
balanced QPSK constellation.
The power ratio between Q and I component is called G=c/d
The multicode transmission of more channels increases the peak-to-average power
ratio (PAR=crest factor) and, as in the case of one channel, the Scrambling code
application at the end, transform the Unbalanceed-QPSK into a Balanced-QPSK.
In such a way the efficiency of the power amplifier remains constant irrespective of the
power difference G=c/d between DPCCH and DPDCH.
This can be explained by figure below, which show the signal constellation for
I-Q/code multiplexed control channel with complex spreading.
There are three case study in which we use/not use scrambling operation:
225
22.7.2.1
When no scrambling code are used, we obtain an unbalance QPSK which is poorly
efficient from the amplifier point of view; this is shown in simulation below :
Q
Q
2
I
22.7.2.2
When scrambling code are used, then even when G=c/d0 dB we obtain always a
balance rotated QPSK.
Thus, the signal envelope variations with complex spreading, are very similar to a
balanced QPSK transmission for all value of G=c/d:
226
(1 +
(1 +
(1 +
(1 +
j ) (1 + j ) = 2 j
j ) (1 j ) = 2
j ) ( 1 + j ) = 2
j ) ( 1 j ) = 2 j
( 1 +
( 1 +
( 1 +
( 1 +
j ) (1 + j ) = 2 j
j ) (1 j ) = 2
j ) ( 1 + j ) = 2
j ) ( 1 j ) = 2 j
(1 j ) (1 + j ) = 2
(1 j ) (1 j ) = 2 j
(1 j ) ( 1 + j ) = 2 j
(1 j ) ( 1 j ) = 2
2
I
( 1 j ) (1 + j ) = 2 j
( 1 j ) (1 j ) = 2
( 1 j ) ( 1 + j ) = 2
( 1 j ) ( 1 j ) = 2 j
figure 177
In this example from constellation point of view, it doesnt appear clearly the difference
between no scrambling and scrambling application.
The difference appears more clearly by considering G0 dB as in the following
examples:
In this case the Q component is half of I component and the scrambling code operation
give the following:
1 3
1
1
1 3
1 + j (1 + j ) = + j
1 j (1 + j ) = j
2
2
2
2
2 2
Q
3 1
1
1
3
1
(
)
+
1
j
1
j
j
1 j (1 j ) = + j
2 2
2
2
2 2
3 1
1
1
3 1
1 + j ( 1 + j ) = + j 1 j ( 1 + j ) = j
2 2
2
2 2
2
1 3
1
1 3
1
1 + j ( 1 j ) = j 1 j ( 1 j ) = + j
2 2
2
2 2
2
1
1
2
1
1
2
1
1
2
1
1
2
3 1
j (1 + j ) = j
2 2
1 3
j (1 j ) = j
2 2
1 3
j ( 1 + j ) = + j
2 2
3 1
j ( 1 j ) = + j
2 2
1 +
2
1 +
2
1 +
2
3 1
j (1 + j ) = + j
2 2
1 3
j (1 j ) = + j
2 2
1 3
j ( 1 + j ) = j
2 2
1
3 1
1 + j ( 1 j ) = j
2
2 2
figure 178
227
228
The I-Q/code multiplexing solution with complex scrambling result in a power amplifier
output back-off requirements that remain constant as a function of the power difference
between DPDCH and DPCCH.
The power difference between DPDCH and DPCCH has been quantified in UTRA
physical layer specifications to 4-bit words, i.e. 16 different values. At a given point in
time the gain value for either DPDCH or DPCCH is set to 1 and then for the other
channels a value between 0 and 1 is applied to reflect the desired power difference
between channels.
Limiting the number of possible values to 4-bit representation is necessary to make the
terminal transmitter implementation simple. The power difference can have 15 different
values between -23.5 dB and 0 dB and one bit combination for non DPDCH when there
is non data to be transmitted.
UTRA will face challenges in amplifier efficiency when compared to GSM. The GSM
modulation is GMSK (Gaussian Minimum Khift Leyng) which has a constant envelope
and is thus optimized for amplifier peak-to-average ratio. As a narrowband system, the
GSM signal can be spread relatively more widely in the frequency domain.
This allows the use of a less linear amplifier with better power conversion efficiency.
Narrowband amplifiers are also easier to linearize if necessary. In practice, the
efficiency of the WCDMA power amplifier is slightly lower than that of the GSM
power amplifier. On the other hand, WCDMA uses fast power control in the uplink,
which reduces the average required transmission power.
229
22.7.3
Using three parallel channel one DPCCH and two DPDCH, we have the following
scheme:
cd,1
DPDCH1
SC
I
cd,6
cc
I+jQ
S
DPDCH2
DPCCH
Q
j
figure 181
22.7.3.1
Supposing c=d=1; than on the I branch the normalized signal value are the same i.e.
1.
Diversely on the Q branch the amplitude of two channel DPDCH and DPCCH channels
is added, therefore the chip to chip sum give four possible values: (1+1)=2; (1-1)=0; (1+1)=0; (-1-1)=-2.
Obviously the complex value on the Q branch is obtained multiplying by j, therefore the
possible values for the branch are (2J, 0 ,-2J).
The corresponding constellation and spectrum FFT of the output modulated RF signal
are:
230
+2
j
-1
2j
figure 182: FFT and constellation obtained with 1 DPCCH + 2 DPDCH, c=d=1 e without SC
The constellation points coordinates are: (1+0j) (-1+0j) (1+2j) (-1+2j) (1-2j) (-1-2j).
The WINIQ configuration is shown below:
231
22.7.3.2
(1 + 0 j ) (1 + j ) = +1 + j
(1 + 0 j ) (1 j ) = +1 j
(1 + 0 j ) ( 1 + j ) = 1 + j
(1 + 0 j ) ( 1 j ) = 1 j
( 1 + 0 j ) (1 + j ) = 1 j
( 1 + 0 j ) (1 j ) = 1 + j
( 1 + 0 j ) ( 1 + j ) = +1
( 1 + 0 j ) ( 1 j ) = +1 +
(1 + 2 j ) (1 + j ) = +1 + j + 2 j 2 = 1 + 3 j
(1 + 2 j ) (1 j ) = +1 j + 2 j + 2 = 3 + j
(1 + 2 j ) ( 1 + j ) = 1 + j 2 j 2 = 3 j
(1 + 2 j ) ( 1 j ) = 1 j 2 j + 2 = 1 3 j
( 1 + 2 j ) (1 + j ) = 1 j + 2 j 2 = 3 + j
( 1 + 2 j ) (1 j ) = 1 + j + 2 j + 2 = 1 + 3 j
( 1 + 2 j ) ( 1 + j ) = +1 j 2 j 2 = 1 3 j
( 1 + 2 j ) ( 1 j ) = +1 + j 2 j + 2 = 3 j
(1 2 j ) (1 + j ) = +1 + j 2 j + 2 = +3 j
(1 2 j ) (1 j ) = +1 j 2 j 2 = 1 3 j
(1 2 j ) ( 1 + j ) = 1 + j + 2 j + 2 = +1 + 3 j
(1 2 j ) ( 1 j ) = 1 j + 2 j 2 = 3 + j
( 1 2 j ) (1 + j ) = 1 j 2 j + 2 = +1 3 j
( 1 2 j ) (1 j ) = 1 + j 2 j 2 = 3 j
( 1 2 j ) ( 1 + j ) = +1 j + 2 j + 2 = +3 + j
( 1 2 j ) ( 1 j ) = +1 + j + 2 j 2 = 1 + 3 j
j
j
3
I
232
233
figure 187: FFT magnitude and Eye Diagram of constellation obtained with 1 DPCCH + 2 DPDCH, c=d=1
e with SC.
22.7.3.2.1
234
figure 189: constellation and vector constellation with: DPCCH+DPDCH1+DPDCH2 and c=1/2, d=1 e SC
long
figure 190: FFT Magnitude and Eye I(channel) figure with :DPCCH+DPDCH1+DPDCH2 and c=1/2, d=1
and SC long
235
From figure above we note that the FFT magnitude remains the same for both
configurations i.e. c=1, d=1 and c=1/2, d=1.
22.7.4
Filtering
Until now we have been considered transmission without any kind of filtering action.
Because we have no-unlimited bandwidth we must consider a filtering system, thus
reducing the bandwidth and simultaneously without introducing to much inter-symbol
interference.
Choosing a Rised Cosine Filter with r=0.22 in Tx end Rx we obtain the following:
figure 192: FFT Magnitude and Eye I(channel) figure with :DPCCH+DPDCH1+DPDCH2 and c=1/2, d=1
and SC long and Tx/Rx Rised Cosine Filter with Rolloff Factor r=0.22
236
figure 193: constellation and vector constellation with: DPCCH+DPDCH1+DPDCH2 and c=1/2, d=1 and SC
long and Tx/Rx Rised Cosine Filter with Rolloff Factor r=0.22.
After filtering operation we can observe haw the bandwidth has been limited to
approximately 5(Mhz) 3.84*(1+0.22) but at the same time the Intersymbol interference
has been increased. Choosing a rolloff factor r=0.62 the situation became the following:
237
P-SCH
Gp
S-SCH
Any d-link
phisical
channel
except SCH
Seri
al to
Para
llel
con
Cos(t)
Sdl,n
I+jQ
cch,SF,m
GS
Q
G1
DL modulated
signal
Q
-sin(t)
J
G2
figure 194 : spreading and scrambling scheme for all downlink physical channel
Apart from SCHs, each pair of to consecutive symbols is first serial-to-parallel converted
and mapped onto I and Q branches. The I and Q branches are then spread to the chip
rate by the same channelisation code Cch,SF,m. The sequence of real-valued chips on
the I and Q branches are then scrambled using a complex-valued scrambling code,
denoted Sdl,n . The scrambling code is applied aligned with the scrambling code applied
to the P-CCPCH, where the first complex chip of the spread P-CCPCH frame is
multiplied by chip number zero of the scrambling code.
After spreading, each physical downlink channel (except SCHs) is separately weighted
by a weigh factor, denoted Gi. The comlex-valued P-SCH and S-SCH are separately
weighted by weight factor GP and GS.
All downlink physical channel are combined using a complex addition and the resulting
sequence generated by spreading and scrambling process is then QPSK modulated.
22.8.1
In the downlink the same channelisation codes as in the uplink (OVSF codes) are used.
Typically only one code tree per cell is used and the code tree under a single
scrambling code is then shared between several users.
By definition, the channelisation codes used for P-CPICH and P-CCPCH are Cch,256,0
and Cch,256,1 respectively.
In compressed mode there are three methods for generating gaps:
238
Rate matching
Reduction of the spreading factor by a factor of 2
higher-layer scheduling.
When the mechanism for opening the gap is to reduce the SF by factor of 2, the OVSF
code used for compressed frames is Cch,SF/2,[n/2] if and ordinary scrambling code is used,
and Cch,SF/2,n mod SF/2 if an alternative scrambling code is used where, Cch,SF,n is the
channelisation code used for non compressed frames.
In the downlink the SF of the dedicated physical channel does not vary on
frame-by-frame basis.
The dedicated physical channel (DPCH) structure is shown in figure below. In this
model each two-bit pair represents an I/Q pair of QPSK modulation (symbol).
As shown in the figure, the frame structure consists of a sequence of radio frames.
One radio frame (10 ms, 38400 chips) corresponds to 15 slots and one slot
corresponds to 2560 chips 1 (2/3 ms, i.e. 0.667 ms 2), which equals one power control
period (PC period).
N.B.: 38400 chips in 10 ms 3840000
chips/second, i.e. 3.84 Mchips/second
Radio frame
(10 ms, 38400 chips)
#0
#1
# 71
#1
# 14
#0
Data
DPDCH
Uplink
structure
DPCCH
Pilot
TFCI
FBI
TPC
I/Q code
multiplexed
with complex
scrambling
Data
DPDCH
TPC
TFCI
DPCCH
Data
Pilot
DPDCH
DPCCH
1
2
Different spreading factors may employed in the case of several CCTrCHs received by
the same UE.
The OVSF code my vary from frame to frame on the PDSCH. The rule is that the OVSF
code(s) below the smallest spreading factor is from the branch of the code tree pointed
by the code with smallest spreading factor used for that connection.
240
23.1 Introduction
Research has just recently begun on the development of 4th generation (4G) mobile
communication systems. The commercial rollout of these systems is likely to begin
around 2008 - 2012, and will replace 3rd generation technology. Few of the aims of 4G
networks have yet been published, however it is likely that they will be to extend the
capabilities of 3G networks, allowing a greater range of applications, and improved
universal access. Ultimately 4G networks should encompass broadband wireless
services, such as High Definition Television (HDTV) (4 - 20 Mbps) and computer
network applications (1 - 100 Mbps). This will allow 4G networks to replace many of the
functions of WLAN systems. However, to cover this application, cost of service must be
reduced significantly from 3G networks. The spectral efficiency of 3G networks is too
low to support high data rate services at low cost.
As a consequence one of the main focuses of 4G systems will be to significantly
improve the spectral efficiency.
figure 195: Current and future mobile systems. The general trend will be to
provide higher data rates and greater mobility.
Orthogonal Frequency Division Multiplexing (OFDM) is an alternative wireless
modulation technology to CDMA. OFDM has the potential to surpass the capacity of
CDMA systems and provide the wireless access method for 4G systems.
OFDM is a modulation scheme that allows digital data to be efficiently and reliably
transmitted over a radio channel, even in multipath environments. OFDM transmits data
by using a large number of narrow bandwidth carriers. These carriers are regularly
spaced in frequency, forming a block of spectrum. The frequency spacing and time
synchronisation of the carriers is chosen in such a way that the carriers are orthogonal,
241
meaning that they do not cause interference to each other. This is despite the carriers
overlapping each other in the frequency domain. The name OFDM is derived from the
fact that the digital data is sent using many carriers, each of a different frequency
(Frequency Division Multiplexing) and these carriers are orthogonal to each other,
hence Orthogonal Frequency Division Multiplexing. The origins of OFDM development
started in the late 1950s with the introduction of Frequency Division Multiplexing (FDM)
for data communications. In 1966 Chang patented the structure of OFDM and
published the concept of using orthogonal overlapping multi-tone signals for data
communications. In 1971 Weinstein introduced the idea of using a Discrete Fourier
Transform (DFT) for implementation of the generation and reception of OFDM signals,
eliminating the requirement for banks of analog subcarrier oscillators. This presented an
opportunity for an easy implementation of OFDM, especially with the use of Fast Fourier
Transforms (FFT), which are an efficient implementation of the DFT. This suggested
that the easiest implementation of OFDM is with the use of Digital Signal Processing
(DSP), which can implement FFT algorithms. It is only recently that the advances in
integrated circuit technology have made the implementation of OFDM cost effective.
The reliance on DSP prevented the wide spread use of OFDM during the early
development of FDM. It wasnt until the late 1980s that work began on the
development of OFDM for ommercial use, with the introduction of the Digital Audio
Broadcasting (DAB) system.
242
243
multipath. DVB-T allows for two transmission modes depending on the number of
subcarriers used. Table below shows the basic transmission parameters for these two
modes. The major difference between DAB and DVB-T is the larger bandwidth used
and the use of higher modulation schemes to achieve a higher data throughput. The
DVB-T allows for three subcarrier
modulation schemes: QPSK, 16-QAM (Quadrature Amplitude Modulation) and 64-QAM;
and a range of guard period lengths and coding rates. This allows the robustness of the
transmission link to be traded at the expense of link capacity. Table below shows the
data throughput and required SNR for some of the transmission combinations.
DVB-T is a uni-directional link due to its broadcast nature. Thus any choice in data rate
verses robustness affects all receivers. If the system goal is to achieve high reliability,
the data rate must be lowered to meet the conditions of the worst receiver.
table 12: SNR required and net bit rate for a selection of the coding and modulation combinations for
DVB. Note: Code rate can be any of the following values: 1/2, 2/3, 3/4, 5/6, 7/8. The Guard Period
duration can be any following values: 1/4, 1/8, 1/16, 1/32.
244
they are bandwidth limited and are spaced sufficiently far apart in frequency so that their
transmitted signals do not overlap in the frequency domain. At the receiver, each signal
is individually received by using a frequency tuneable band pass filter to selectively
remove all the signals except for the station of
interest. This filtered signal can then be demodulated to recover the original transmitted
information.
OFDM is different from FDM in several ways. In conventional broadcasting each radio
station transmits on a different frequency, effectively using FDM to maintain a
separation between the stations. There is however no coordination or synchronisation
between each of these stations. With an OFDM transmission such as DAB, the
information signals from multiple stations is combined into a single multiplexed stream
of data. This data is then transmitted using an OFDM ensemble that is made up from a
dense packing of many subcarriers. All the subcarriers within the OFDM signal are time
and frequency synchronised to each other, allowing the interference between
subcarriers to be carefully controlled. These multiple subcarriers overlap in the
frequency domain, but do not cause Inter-Carrier Interference (ICI) due to the
orthogonal nature of the modulation. Typically with FDM the transmission signals need
to have a large frequency guard-band between channels to prevent interference. This
lowers the overall spectral efficiency. However with OFDM the orthogonal packing of the
subcarriers greatly reduces this guard band, improving the spectral efficiency.
Each of the carriers in a FDM transmission can use an analogue or digital modulation
scheme. There is no synchronisation between the transmission and so one station could
transmit using FM and another in digital using FSK. In a single OFDM transmission all
the subcarriers are synchronised to each other, restricting the transmission to digital
modulation schemes. OFDM is symbol based, and can be thought of as a large number
of low bit rate carriers transmitting in parallel. All these carriers transmit in unison using
synchronised time and frequency, forming a single block of spectrum. This is to ensure
that the orthogonal nature of the structure is maintained. Since these multiple carriers
form a single OFDM transmission, they are commonly referred to as subcarriers, with
the term of carrier reserved for describing the RF carrier mixing the signal from base
band. There are several ways of looking at what make the subcarriers in an OFDM
signal orthogonal and why this prevents interference between them.
OFDM is a multi carrier modulation scheme that transmits data over a number of subcarriers. A conventional transmission uses only a single carrier, which is modulated with
all the data to be sent. OFDM breaks the data to be sent in to small chunks, allocating
each sub data stream to a sub-carrier. The data is sent in parallel, so that instead of
sending just a single bit of information per symbol, many bits are sent per symbol. The
symbol rate for OFDM is N times lower than single carrier modulation, where N is the
number of subcarriers in the OFDM transmission.
245
power
Conventional
sigle carrier
frequency
OFDM
frequency
figure 196: in EFDM data is transmitted over many narrow bandwidth carriers
23.5 Orthogonality
Signals are orthogonal if they are mutually independent of each other. Orthogonality is a
property that allows multiple information signals to be transmitted perfectly over a
common channel and detected, without interference. Loss of orthogonality results in
blurring between these information signals and degradation in communications.
Many common multiplexing schemes are inherently orthogonal. Time Division
Multiplexing (TDM) allows transmission of multiple information signals over a single
channel by assigning unique time slots to each separate information signal. During each
time slot only the signal from a single source is transmitted preventing any interference
between the multiple information sources. Because of this TDM is orthogonal in nature.
In the frequency domain most FDM systems are orthogonal as each of the separate
transmission signals are well spaced out in frequency preventing interference. Although
these methods are orthogonal the term OFDM has been reserved for a special form of
FDM.
The subcarriers in an OFDM signal are spaced as close as is theoretically possible
while maintain orthogonality between them.
OFDM achieves orthogonality in the frequency domain by allocating each of the
separate information signals onto different subcarriers. OFDM signals are made up from
a sum of sinusoids, with each corresponding to a subcarrier. The baseband frequency
of each subcarrier is chosen to be an integer multiple of the inverse of the symbol time,
resulting in all subcarriers having an integer number of cycles per symbol. As a
consequence the subcarriers are orthogonal to each other. Figure below shows the
construction of an OFDM signal with four subcarriers
246
g (t ) = Ac n n (t ),
eq 321
n =0
where:
n (t ) = e j 2 f t
n
eq 322
where
247
fn =
N 1
1
n
T
2
1 N 1
for n = 0 f n = T 2
1
1
N
for n = N 1 f n = +
2
T
eq 323
The duration of the data symbol on each carrier is T seconds, and carriers are spaced
1/T Hz apart in fact:
f n+1 f n =
1
N 1 1
N 1 1
n +1
n
=
2 T
2 T
T
eq 324
This assures that the carriers are orthogonal, since n(t) satisfy the orthogonality
condition over the T-sec interval:
b
(t ) m* (t )dt = 0
eq 325
fn =
1
N 1
1
N 1
n
and f m = m
with nm consequently:
T
2
T
2
(t ) m* (t )dt = 0
j 2f nt
j 2f mt
dt = e
j 2 ( f n f m ) t
1
dt =
j 2 ( f n f m )e j 2 ( f n f m ) t =
j 2 ( f n f m ) 0
T
j 2 1 n N 1 1 m N 1 t
1
e T 2 T 2 =
1
N 1 1
N 1
j 2 n
0
m
2 T
2
T
T
j 2 T1 ( nm ) t
j 2 T1 (nm )T
1
1 =
e
e
=
1
1
0 j 2 (n m )
j 2 (n m )
1
1
[cos[2 (n m )] + j sin[2 (n m )] 1]
=
e j 2 ( n m ) 1 =
1
j 2 (n m )
j 2 (n m )
T
1
[1 1] = 0
=
1
j 2 (n m )
eq 326
T
248
Because the carriers are orthogonal, data can be detected on each of these closely
spaced carriers without interference from the other carriers.
Another way of thinking to orthogonality concept is that if we look at a matched receiver
for one of the orthogonal functions, a subcarrier in the case of OFDM, then the receiver
will only see the result for that function. The results from all other functions in the set
integrate to zero, and thus have no effect.
Equation below shows a set of orthogonal sinusoids, which represent the subcarriers
for an unmodulated real OFDM signal.
k = 1,2,......M
0<t <T
sin( 2kf 0t )
sk (t ) =
otherwise
0
eq 327
Where f0 is the carrier spacing, M is the number of carriers, T is the symbol period.
Since the highest frequency component is Mf0 the transmission bandwidth is also Mf0.
These subcarriers are orthogonal to each other because when we multiply the
waveforms of any two subcarriers and integrate over the symbol period the result is
zero. Multiplying the two sine waves together is the same as mixing these subcarriers.
This results in sum and difference frequency components, which will always be integer
subcarrier frequencies, as the frequency of the two mixing subcarriers has integer
number of cycles. Since the system is linear we can integrate the result by taking the
integral of each frequency component separately then combining the results by adding
the two sub-integrals. The two frequency components after the mixing have an integer
number of cycles over the period and so the sub-integral of each component will be
zero, as the integral of a sinusoid over an entire period is zero. Both the sub-integrals
are zeros and so the resulting addition of the two will also be zero, thus we have
established that the frequency components are orthogonal to each other.
23.5.1
Another way to view the orthogonality property of OFDM signals is to look at its
spectrum. In the frequency domain each OFDM subcarrier has a sinc, sin(x)/x,
frequency response, as shown in Figure below. This is a result of the symbol time
corresponding to the inverse of the carrier spacing. As far as the receiver is concerned
each OFDM symbol transmitted for a fixed time (TFFT) with no tapering at the ends of the
symbol. This symbol time corresponds to the inverse of the subcarrier spacing of 1/TFFT
Hz 1. This rectangular, boxcar, waveform in the time domain results in a sinc frequency
response in the frequency domain. The sinc shape has a narrow main lobe, with many
side-lobes that decay slowly with the magnitude of the frequency difference away from
the centre. Each carrier has a peak at the centre frequency and nulls evenly spaced
with a frequency gap equal to the carrier spacing.
The orthogonal nature of the transmission is a result of the peak of each subcarrier
corresponding to the nulls of all other subcarriers. When this signal is detected using
249
a Discrete Fourier Transform (DFT) the spectrum is not continuous as shown in Figure
below, but has discrete samples. The sampled spectrum are shown as os in the figure.
If the DFT is time synchronised, the frequency samples of the DFT correspond to just
the peaks of the subcarriers, thus the overlapping frequency region between subcarriers
does not affect the receiver. The measured peaks correspond to the nulls for all other
subcarriers, resulting in orthogonality between the subcarriers.
250
Carrier
Phase
Serial
TX
data
Serial
to
para.
TRANSMITTER
Subcarrier
Modulation
&
Mapping
IFFT
I
Q
Carrier
Amplitude
Guard
Period
Insertion
Frame
Sync
Insertion
Para
To
Serial
RF
Modulation
Amplifier
Time Waveform
Frequency Correction
Serial
RX
data
Carrier
Modulation Phase FFT
Slicer
Guard
Period
Removal
RF
Demod
Amplifier
Q
Carrier
Amplitude
OL
Time Sync
Frame
Detection
RECEIVER
figure 199
23.6.1
Data to be transmitted is typically in the form of a serial data stream. In OFDM, each
symbol typically transmits 40 - 4000 bits, and so a serial to parallel conversion stage
is needed to convert the input serial bit stream to the data to be transmitted in each
OFDM symbol. The data allocated to each symbol depends on the modulation scheme
used and by the number of subcarriers. For example, for a subcarrier modulation of
16-QAM each subcarrier carries 4 bits of data, and so for a transmission using 100
subcarriers the number of bits per symbol would be 400.
For adaptive modulation schemes, the modulation scheme used on each subcarrier can
vary and so the number of bits per subcarrier also varies. As a result the serial to
parallel conversion stage involves filling the data payload for each subcarrier. At the
receiver the reverse process takes place, with the data from the subcarriers being
converted back to the original serial data stream.
When an OFDM transmission occurs in a multipath radio environment, frequency
selective fading can result in groups of subcarriers being heavily attenuated, which in
turn can result in bit errors. These nulls in the frequency response of the channel can
cause the information sent in neighbouring carriers to be destroyed, resulting in a
clustering of the bit errors in each symbol. Most Forward Error Correction (FEC)
schemes tend to work more effectively if the errors are spread evenly, rather than in
251
large clusters, and so to improve the performance most systems employ data
scrambling as part of the serial to parallel conversion stage. This is implemented by
randomising the subcarrier allocation of each sequential data bit. At the receiver the
reverse scrambling is used to decode the signal. This restores the original sequencing
of the data bits, but spreads clusters of bit errors so that they are approximately
uniformly distributed in time. This randomisation of the location of the bit errors improves
the performance of the FEC and the system as a whole.
23.6.2
Once each subcarrier has been allocated bits for transmission, they are mapped using a
modulation scheme to a subcarrier amplitude and phase, which is represented by a
complex In-phase and Quadrature-phase (IQ) vector. Figure below shows an example
of subcarrier modulation mapping. This example shows 16-QAM, which maps 4 bits for
each symbol. Each combination of the 4 bits of data corresponds to a unique IQ vector,
shown as a dot on the figure. A large number of modulation schemes are available
allowing the number of bits transmitted per carrier per symbol to be varied.
figure 200:
Subcarrier modulation can be implemented using a lookup table, making it very efficient
to implement.
In the receiver, mapping the received IQ vector back to the data word performs
subcarrier demodulation. During transmission, noise and distortion becomes added to
the signal due to thermal noise, signal power reduction and imperfect channel
equalisation. Figure below shows an example of a received 16-QAM signal with a SNR
of 18 dB. Each of the IQ points is blurred in location due to the channel noise. For each
received IQ vector the receiver has to estimate the most likely original transmission
vector. This is achieved by finding the transmission vector that is closest to the received
vector. Errors occur when the noise exceeds half the spacing between the transmission
IQ points, making it cross over a decision boundary.
252
23.6.3
After the subcarrier modulation stage each of the data subcarriers is set to an
amplitude and phase based on the data being sent and the modulation scheme; all
unused subcarriers are set to zero. This sets up the OFDM signal in the frequency
domain. An IFFT is then used to convert this signal to the time domain, allowing it to
be transmitted. Figure below shows the IFFT section of the OFDM transmitter. In the
frequency domain, before applying the IFFT, each of the discrete samples of the IFFT
corresponds to an individual subcarrier. Most of the subcarriers are modulated with
data. The outer subcarriers are unmodulated and set to zero amplitude. These zero
subcarriers provide a frequency guard band before the Nyquist frequency and
effectively act as an interpolation of the signal and allows for a realistic roll off in the
analog anti-aliasing reconstruction filters.
Time
End
Frequency
Input
data
SubcarrierM
odulation &
Mapping.
Parallel
to Serial
IFFT
IQ vector
Amplitue and
phase
zeros
Output baseband
OFDM signal
Q
Guard
Period
Symbol
start
253
n (t ) = e j 2 f t
where
i.e.
fn =
n
T
N 1
1
n
T
2
fn =
then n (t ) = e
N 1
N 1
n =0
n =0
n
j 2 t
T
eq 328
= e j 2 k where t = k
g (t ) = Ac wn n = Ac wn e j 2 k where
T
, and substitute into equation;
n
w = [w0 , w1 , w2 ,......wn1 ]
eq 329
then the elements of the IFFT vector, as defined by the equation already seen, are
obtained.
n = +
n = +
n =
n =
W ( f ) = H ( f ) f 0 ( f nf 0 ) =
f H (nf
0
) ( f nf 0 )
Thus, the OFDM signal may be generated by using the IFFT algorithms as shown in
figure below.
In that figure, the complex envelope, g(t), is described by the I and Q components x(t)
and y(t), where g(t)=x(t) and jy(t).
Baseband signal processing
w
RF circuits
g
x(t)
m(t)
Serial
data
Serial to
Parallel
converter
IFFT
Parallel
to Serial
converter
cos(ct)
y(t)
-90
phase
shift
OFDM
signal
sin(ct)
Carrier
oscillator, fc
v(t)=x(t)cos(ct)-y(t)sin(ct)
254
Let the input serial data symbol have a duration of Ts second each. These data can be
binary (1) to produce BPSK modulated carriers or can be multilevel complex-valued
serial data to produce (as appropriate) QPSK, MPSK, or QAM carriers.
Ds=1/Ts, is the input symbol (baud) rate. The serial-to-parallel converter reads in N input
serial symbol at a time and hold their values (element of w) on the parallel output line
for T=NTs seconds, where T is the time span of the IFFT. The IFFT uses w to evaluate
output IFFT vector g, which contains elements representing samples of the complex
envelope.
The parallel-to-serial converter shifts out the element values of g. These are the sample
of the complex envelope for the OFDM signal described by the equation
N 1
N 1
n =0
n =0
g (t ) = Ac wn n = Ac wn e j 2 k
where x(t) and y(t) are the I and Q components of the complex envelope.
The OFDM signal is at the end produced by the classic IQ modulators.
1. At the receiver, the serial data are recovered from the received OFDM signal by
demodulating the signal to produce serial I and Q data,
2. converting the serial data to parallel data,
3. evaluating the FFT, and
4. converting the FFT vector (parallel data) to serial output data.
The length-of-the-FFT vector determines the resistance of OFDM to errors caused by
multipath channels. N is chosen so that T=NTs is much larger than the maximum delay
time of echo components in the received multipath signal.
The PSD (power spectral density) of the OFDM signal can be obtained recalling that
OFDM signal consists of orthogonal carriers modulated by data with rectangular pulse
shapes that have a duration of T sec. consequently, the overall PSD of the complex
envelope of the OFDM signal is of the form
N 1
Pg ( f ) = C
n =0
sin[ ( f f n )T ]
( f f n )T
2
where C = Ac2 n T
eq 330
and n = 0
Since the spacing between carriers is 1/T [Hz] and there are N carriers, the null
bandwidth of the OFDM signal is
BT =
N +1 N +1 1
=
= Ds
T
NTs Ts
[Hz ]
eq 331
255
A key advantage of OFDM is that it can be generated by using FFT digital signal
processing techniques. An Example of FFT theory is reported in the following
paragraph.
23.8.1
Theorem
If a waveform is periodic with period T0, the spectrum of the waveform w(t) is:
W( f ) =
n = +
c ( f nf ) = F [w(t )]
n =
eq 332
Where:
a +T0
w(t )e
jnw0t
dt
c e
n =
jn0t
waveform (i.e. finite energy) over the interval a<t<a+T0. When w(t) is periodic with
period T0, this Fourier series representation is valid over all time (i.e. over the interval <t<).
Proof.
w (t ) =
n =
jn 0 t
eq 333
256
W ( f ) = cn e jn0t e jt dt =
n =
=
c e
n =
jt
c e
n
c e
n
n =
j ( 2f 0 + 2f ) t
dt =
c ( f nf
n
j ( n0 ) t
dt =
c e
n
c e
n =
n =
n =
dt =
n =
jn0t
j 2 ( nf 0 + f ) t
dt =
dt =
c e
n =
j ( n0 + ) t
eq 334
j 2 ( f nf 0 ) t
dt =
v(t ) = A sin 0 t
where 0 = 2f 0
V( f ) =
e j0t e j0t
A
2 j
+
+
jt
A
A
j0t jt
e dt =
e j0t e jt dt =
e
e
dt
2
2
j
j
A
A
A
A
e j 2 ( f + f0 )t dt ) =
e j 2 ( f f0 ) t dt
e j 2f0t e j 2ft dt =
e j 2f0t e j 2ft dt
2 j
2 j
2 j
2 j
+
= j
eq 335
A
A
A
A
e j 2 ( f f0 )t dt + j e j 2 ( f + f0 ) t dt ) = j ( f + f 0 ) j ( f f 0 ) =
2
2
2
2
c1 ( f + f 0 ) + c1 ( f f 0 )
V( f ) =
A
A
( f + f0 ) ( f f0 )
2
2
Magnitude Spectrum
Phase Spectrum
(f)
V(f)
A/2
-f0
+90
f0
f
-90
257
figure 203
In this case c1=-jA/2 and c-1=jA/2 and the other cns were zero.
It is also obvious that there is no dc component, since there is no line at f=0 (i.e. c0=0).
Conversely, if a function does not contain any periodic component, the spectrum will be
continuous (no lines), except for a line at f=0 when the function has a dc component.
It is also possible to evaluate the Fourier coefficients by sampling the Fourier transform
of a pulse corresponding to w(t) over a period. This is shown by the following theorem:
23.8.2
Theorem
w(t ) =
n =
h(t nT0 ) =
n=
n =
c e
n =
jn0t
eq 336
where
w(t ), t < 0
h(t ) =
2
0,
t elsewhere
eq 337
cn = f 0 H (nf 0 )
eq 338
where
w(t ) =
n= +
h(t nT0 ) =
n=
n= +
h(t ) (t nT0 ) =
n=
n = + +
h( ) [(t ) nT ]d =
n =
= h( ) [ [ (t nT0 )]]d
n =
n =+ +
eq 339
258
Thus,
w(t ) =
n= +
n = +
h(t nT ) = h(t ) (t nT )
0
n=
eq 340
n =
But the impulse train may itself be represented by its Fourier series; that is,
n = +
(t nT0 ) =
n =
n =+
c e
n =
jn0t
eq 341
Where all the Fourier coefficients are just cn=f0. Substituting the last in the preceding
equation we have:
w(t ) =
n= +
n =+
n =+
n=
n =
n =
jn0t
= h(t )
n= +
fe
n=
jn0t
eq 342
W ( f ) = H ( f ) f 0 ( f nf 0 )
eq 343
n =
n = +
c ( f nf ) = F [w(t )]
n =
n = +
n =
n =
W ( f ) = H ( f ) f 0 ( f nf 0 ) =
f H (nf
0
) ( f nf 0 )
eq 344
As an example we find the Fourier coefficients for the periodic rectangular wave shown
below:
259
w(t)
A
1
T0
2
1
T0
2
Waveform
3
T0
2
T0
2T0
T0
Envelope =
A/2
W( f ) =
A/4
Magnitude Spectrum
-3f0
-2f0
-f0
f0 2f0
A sin (fT )
2 fT
A sin (n / 2 )
( f nf 0 )
n / 2
n =
n = +
3f0
4f0
figure 204
The complex Fourier coefficients for the periodic rectangular wave shown above is:
1
cn =
T0
T0 / 2
Ae
0
jn0t
A 1
dt =
T0 jn0
T0 / 2
jn e
0
jn0t
dt =
A 1
e jn0t
T0 jn0
T0 / 2
A 1
e jn0T0 / 2 1
T0 jn0
which reduces, (using lHospitals rule, for evaluating the indeterminant form for n=0), to
260
c0 =
A
= dc term
2
A 1
A 1 j0T0 / 2
c1 =
e
1 =
T0 j 2
T0 j0
T0
j 2T T0 / 2
A 1
A 1
A
e j 1 =
[
1 =
1 1] = j
e 0
T0 j 2
T0 j 2
T0
T0
2
A 1
A 1 j T0 T0
A 1 j 2
A 1
2 j0T0 / 2
c2 =
e
1 =
1 =
e
1 =
[1 1] = 0
e
T0 j 20
T0 j0
T0 j0
T0 j0
A
c3 = j
3
c4 = 0
c5 = j
A
5
W( f ) =
n =
c ( f nf ) = .......... c ( f 5 f ) c ( f 4 f ) c ( f 3 f ) c ( f 2 f ) c ( f f )
n =
A
( f ) + c1 ( f f 0 ) + c3 ( f 3 f 0 ) + c4 ( f 4 f 0 ) + c5 ( f 5 f 0 ) + ...........
2
A
A
A
= .......... + j
( f 5 f0 ) + j ( f 3 f0 ) + j ( f f0 )
5
3
A
A
A
A
( f ) j ( f f0 ) j ( f 3 f0 ) j
( f 5 f 0 ) + ...........
2
3
5
c0 ( f ) +
eq 345
These coefficients may be verified by using the last Theorem and the spectrum of the
single flat-top impulse:
t
h(t) =
TS
Ts
1, se t 2
0, se t > Ts
2
261
0.8
0.6
2/Ts
0.4
0.2
-Ts/2
Ts/2
0
-20
-15
-10
-5
10
15
20
freq
-0.2
-0.4
time domain
frequency domain
figure 205
H( f ) =
Ts / 2
1 e
Ts / 2
jt
T /2
+ Ts / 2
e jt
e jTs / 2 e + jTs / 2
1 s
jt
=
=
dt =
j
e
dt
=
j
j
j Ts / 2
T / 2
T
Ts
sen s s
jTs / 2
+ jTs / 2
+ jTs / 2
jTs / 2
2Ts e
e
e
e
2
= 2
=
= Ts
Ts
T
j
2j
Ts s
s s
2
2
eq 346
Then the coefficients cn for the periodic repetition of the flat top pulse, which period is
T0=2Ts, are:
262
T0
sen n0 2
Ts
2
sen 0
1
1
1
2 1 T0
cn = f 0 H (nf 0 ) = H (n ) = Ts
=
T
T0
T0
T0
T0
T0 2
0 s
2
n0 2
2
2 T0
sen n
sen n
T
4
1 T0
2
0
=1
=
T
2
T0 2
2 n
0
n
T0 4
2
T0
1 T sen n0
4
=
0
=
T
T0 2
n0 0
4
eq 347
since the pulse serie is offset in time, we lost the symmetry with respect to zero
1, 0 < t < Ts
t T / 2
h(t ) =
=
t elsewere
2
0,
Ts
T0
figure 206
T
sen s
2
H ( f ) = e j f Ts Ts
T
s
2
eq 348
263
1
cn = e jn f Ts
2
sen n
1 T0 sen n
sen n
jn
jn
1
1
2
2 = e 2
2 = e T0 2
2
2
n
n
n
2
2
2
eq 349
The effect of ISI on an OFDM signal can be further improved by the addition of a guard
period to the start of each symbol. This guard period is a cyclic copy that extends the
length of the symbol waveform. Each subcarrier, in the data section of the symbol, (i.e.
the OFDM symbol with no guard period added, which is equal to the length of the IFFT
size used to generate the signal) has an integer number of cycles. Because of this,
placing copies of the symbol end-to-end results in a continuous signal, with no
discontinuities at the joins. Thus by copying the end of a symbol and appending this to
the start results in a longer symbol time. Figure below shows the insertion of a guard
period.
264
IFFT
IFFT
Output
Guard
Period
TG
Symbol N+1
TFFT
TS
IFFT
Guard
Period
Time
Symbol N+1
The total length of the symbol is TS=TG + TFFT, where Ts is the total length of the symbol in
samples, TG is the length of the guard period in samples, and TFFT is the size of the IFFT
used to generate the OFDM signal.
In addition to protecting the OFDM from ISI, the guard period also provides protection
against time-offset errors in the receiver.
In multipath environments ISI reduces the effective length of the guard period leading to
a corresponding reduction in the allowable time offset error.
265
Im(z) y1,q
QPSK
Bit ordering:
y0,q y1,q
10 1
-1
11 -1
00
1
Re(z) y0,q
01
QPSK
Bit ordering:
y0,q y1,q
266
25 Appendix
25.1 Convolution process
The product convolution between two time functions is defined as:
f1 (t ) f 2 (t ) =
Inversion process
f ( ) f (t )d = f ( ) f [ ( t )]d
1
267
f2(t)
In the following example taking f1 and f2 as shown below and considering a shift =a we
have:
268
f2(t)
269
f1 (t ) (0) =
i.e.
f1 (t ) (t ) =
f ( ) (t )d = f (t )
1
f1 (t ) (t T0 ) =
f ( ) [(t ) T ]d = f (t T )
1
270
26 Reference
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
http://telemetry.nmsu.edu/Conference_Pub.html
C:\documenti davide\
documenti per corsi\E
[14]
http://www.ee.byu.edu/faculty/mdr/publications.phtml
[15]
SFCG Meeting SF17 - 28/D Galveston, Texas 16-25 September 1997: CCSDS - SFCG
EFFICIENT MODULATION METHODS STUDY AT NASA/JPL PHASE 3: END-TO-END SYSTEM PERFORMANCE
C:\documenti davide\
documenti per corsi\E
[16]
[17]
OFDM_thesys_lawray
UMTS Architecture model vers 33 [Massaccesi Andrea]
271