Vous êtes sur la page 1sur 28

CE00036-3-Data Communication Systems Individual Assignment Page 1 of 28

QUESTION 1 a).
OBJECTIVE
Objective of this assignment is to measure mentation of information-entropy
THEORY
Entropy is a concept in thermodynamics statistical mechanics and information theory. Both
concepts of entropy have deep links with one another although it took many years for the
development of the theories of statistical mechanics and information theory to make this
connection apparent. This article is about information entropy the information-theoretic
formulation of entropy. Information entropy is occasionally called Shannon's entropy in honor of
Claude E. Shannon, who formulated many of the key ideas of information theory.

INFORMATION
Information is stimuli that has meaning in some context for its receiver. When information is
entered into and stored in a computer it is generally referred to as data. After processing output
data can again be perceived as information.

ENTROPY
In thermodynamics entropy is a measure of the number of specific realizations or microstates
that may realize thermodynamic in a defined state specified by macroscopic variables. Most
understand entropy as a measure of molecular disorder within a macroscopic system.
The second law of thermodynamics states that an isolated system's entropy never decreases. Such
a system spontaneously evolves towards thermodynamic equilibrium, the state with maximum
entropy. Non isolated systems may lose entropy provided they increase their environments
entropy by that increment

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 2 of 28

QUESTION 1 (b).
OBJECTIVE
Objective of this question is to determine the channel model and channel capacity.
THEORY
A Communication Channel is the medium used to transmit information from one point to the
other. Though wired channels are fast, cost-effective and secure, they are short ranged, motion
restricted. In telecommunications and computer networking a communication channel or channel
refers either to a physical transmission medium such as a wire or to a logical connection over
a multiplexed medium such as a radio channel. A channel is used
to convey an information signal, for example a digital bit stream, from one or several senders to
one or several receivers. A channel has a certain capacity for transmitting information, often
measured by its bandwidth in Hz or its data rate in bits per second. Communicating data from
one location to another requires some form of pathway or medium. These pathways
called communication channels, use two types of media cable and broadcast. Cable
or wire line media use physical wires of cables to transmit data and information.
Twisted-pair wire and coaxial cables are made of copper and fiber-optic cable is
made of glass.

CHANNEL MODEL
The medium between the transmitting antenna and the receiving antenna is generally termed as
channel. In wireless transmission, the characteristics of the signal changes as it travels from the
transmitter to the receiver. The signal characteristics are due to several phenomena
1) existence of line of sight path between the antennas
2) reflection, refraction and diffraction of the signal due to the objects in between the antennas,
3) The relative motion between the transmitter and receiver and the objects in between them
4) The signal attenuation as it travels through the medium
5) Noise The received signal can be obtained from the transmitter signal if we can accurately
model the channel in between the antennas.

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 3 of 28

Types of channel:
There are 3 types of channel.
1. Lossless channel.
2. Deterministic channel.
3. Noiseless channel.

CHANNEL CAPACITY
This means that theoretically, it is possible to transmit information nearly without error up to
nearly a limit of C bits per second. the probability of error at the receiver increases without
bound as the rate is increased. So no useful information can be transmitted beyond the channel
capacity.

QUESTION 1 c).
OBJECTIVE
Objective of this question is to compare the analog and digital modulation technique.
THEORY

Suppose you want to broadcast your music so that people from kilometers around can hear it.
Naively, you might simply turn up the volume. However, the sound would die off without
travelling far away, and people who do not want to hear your music will be forced to listen, as
well.
Think of instead converting your sound wave into an electromagnetic wave and transmitting
your music that way. Now, people who want to listen can use a converter to convert the
electromagnetic waves back into sound, and people who do not want to listen would not be
disturbed. A problem occurs however, when other people also start to broadcast their music.
Their electromagnetic waves are going to interfere with yours and your listeners are going to end
up with a jumble of sounds.

Analog Modulation

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 4 of 28

In analog modulation, the carrier signal is modulated in proportion to the information signal so
that it can take any value. There are three main types of analog modulation.

1) AM (Amplitude Modulation)

2) FM (Frequency Modulation)

3) PM (Phase Modulation)

Amplitude Modulation

Amplitude modulation the amplitude of the carrier wave is changed depending on the
information signal

Frequency Modulation

Frequency Modulation the frequency of the carrier wave is changed according to the information
signal.

Phase Modulation

Phase Modulation the phase of the carrier wave is altered according to he information signal:

Digital Modulation

In digital modulation, the information signal used is a digital one. it is a signal that can only take
up specific values. Digital signals are usually represented in binary using a series of 0 and 1. The
larger the number of 0 and 1 used to represent the signal in a given time interval, the more is the
number of values that the signal could take. For instance, in our example for a radio station, the
original audio signal would need to be chopped up into a number of small time intervals, and for
each time interval, an approximate allowed value for the signal would need to be selected. By
chopping up the signal into very small time intervals and by using a large number of allowed
values to represent data, the sound can be made to sound natural.

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 5 of 28

There are several different types of digital modulation as well.

In amplitude shift keying the amplitude of the signal is modulated to represent the information.
The simplest type of modulation is called on off keying where the carrier signal is turned on to
represent a 1 and turned off to represent a 0.

In frequency shift keying, the frequency of the wave is modulated whereas, in phase shift
keying, the phase of the wave is modulated. Quadrature amplitude modulation is a type of
modulation where amplitude and phase are both modulated to, and because there are several
different combinations, this type of modulation can represent many different values for the
signal.

Difference Between Analog and Digital Modulation

1) Allowed Values

Analog Modulation: An analog modulated signal can represent any value within a range.

Digital Modulation: A digitally modulated signal can only represent one of a set of discrete
values.

2) Variation with Time

Analog Modulation: Analog modulation can produce a signal that carries continually changing
information.

Digital Modulation: Digital modulation produces a signal whose value changes at specific
intervals of time.

3) Separation of Noise

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 6 of 28

Analog Modulation: It is difficult to separate the signal from noise in analog modulation.

Digital Modulation: In digital modulation, the signal can be easily separated from noise.

QUESTION 1 d).
OBJECTIVE
objective of this question is to define the channel coding system and its types
THEORY
The design of variable length code such that its average code word length approach the average
of entropy of DMS is often referred to as coding.
Shannon Fanon coding
Shannon Fanon coding, named after Claude Elwood Shannon and Robert Fanon, is a technique
for constructing a prefix code based on a set of symbols and their probabilities. It is suboptimal
in the sense that it does not achieve the lowest possible expected code word length like Huffman
coding; however unlike Huffman coding it does guarantee that all code word lengths are within
one bit of their theoretical ideal I(x) = log P(x). In Shannon Fanon coding, the symbols are
arranged in order from most probable to least probable, and then divided into two sets whose
total probabilities are as close as possible to being equal. All symbols then have the first digits of
their codes assigned symbols in the first set receive 0 and symbols in the second set receive 1. As
long as any sets with more than one member remain, the same process is repeated on those sets,
to determine successive digits of their codes. When a set has been reduced to one symbol, of
course this means the symbols code is complete and will not form the prefix of any other
symbol's code. The algorithm works and it produces fairly efficient variable-length encodings;
when the two smaller sets produced by a partitioning are in fact of equal probability the one bit
of information used to distinguish them is used most efficiently. Unfortunately ShannonFano
does not always produce optimal prefix codes.
Huffman coding
Huffman coding is a lossless data compression algorithm. The idea is to assign variable length
codes to input characters lengths of the assigned codes are based on the frequencies of

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 7 of 28

corresponding characters. The most frequent character gets the smallest code and the least
frequent character gets the largest code.

QUESTION 1 e).
OBJECTIVE
Objective of this question is the description of the application where digital modulation
technique is used.
THEORY
Digital modulation techniques Modulation is defined as the process by which some
characteristics of a carrier is varied in accordance with a modulating wave. In digital
communications, the modulating wave consists of binary data or an M-ary encoded version of it
and the carrier is sinusoidal wave. Different Shift keying methods that are used in digital
modulation techniques are

1) Amplitude shift keying [ASK]

2) Frequency shift keying [FSK]

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 8 of 28

3) Phase shift keying [PSK]

QUESTION 2
1. OBJECTIVE
Objective of this question is to write a MATLAB program to determine the free space path loss
and power received by antenna.
2. THEORY
An antenna is a device for converting electromagnetic radiation in space into electrical currents
in conductors or vice versa depending on whether it is being used for receiving or for
transmitting, respectively. Passive radio telescopes are receiving antennas. It is usually easier to
calculate the properties of transmitting antennas. Fortunately, most characteristics of a
transmitting antenna are unchanged when the antenna is used for receiving, so we often use the
analysis of a transmitting antenna to understand a receiving antenna used in radio astronomy.

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 9 of 28

2.1 Free space path loss

The free space path loss FSPL is used in many areas for predicting radio signal strengths that
may be expected in a radio system.

Although the free space path loss does not hold for most terrestrial situations because of other
effects from the ground, objects in the path and the like, there are still very many situations in
which it can be used. It is also useful as the basis for understanding many real life radio
propagation situations.

Accordingly, the free space path loss, FSPL, is an essential basic parameter for many RF
calculations. It can often be used as a first approximation for many short range calculations.
Alternatively it can be used as a first approximation for a number of areas where there are few
obstructions. As such it is a valuable tool for many people dealing with radio communications
systems.

In addition to this, these free space path loss, FSPL, calculations can be used in wireless survey
tools where the free space loss is calculated and other scenarios added to provide an overall view
of the signal strength at a given point. With the growing requirements to be able to analyses
wireless or radio coverage, wireless survey tools are being used increasingly to enable coverage
to be predicted at the early stages of design. Accordingly these wireless survey tools are being
used increasingly in the development and installation of radio and wireless systems.
1
Signal Strength
Distance
-------------------------------------------(1)
3. FORMULA
Formula for calculate the free space path loss is given below:

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 10 of 28

20 log 10 ( D) 20 log 10 ( F ) 32.44


FSPL= -----------------------------------------------(2)
Power received by antenna
Pr = Pt + Gt + Gr FSPL----------------------------------------------------------------(3)
Here,
Pr = Received power
Pt = transmitter power
Gt = Transmitted Gain
Gt = Received Gain
FSPL= Free space path loss

DESIGN OF ALGORITHM FOR MATLAB PROGRAM

Start the
Matlab
software

Now open the


editor window

Now write
Finally get the
the
Level 3 Result
Asia Pacific Institute
program ofis
Information
in Technology 2016
result
display on
editor window
according
command to
the Matlab
window
coding
CE00036-3-Data Communication Systems Individual Assignment Page 11 of 28

4. MATLAB CODE
clc;
clear all;
close all;
D=1:0.1:10 %this intervel devlop distance b/w T&R
F= input('frequency in Mhz')%transmitted freg. of signal
Pt=input('transmitted i/p power')
Gt=input('gain of the transmitted antena')
Gr=input('gain of the receiving antena')

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 12 of 28

FSTL=20*log(D)+20*log(F)+32.44
Pr=Pt+Gt+Gr-FSTL
plot(D,Pr)
title ('free space path loss')
xlabel('distance')
ylabel('power of received signal')
6. RESULT

7. CONCLUSION
In this question we done the free space path loss and power received by antenna and finally get
the result in MATLAB.
QUESTION 3
Objective
Objective of this question is to write a MATLAB code for BPSK, QPSK, & 16QAM digital
modulation schemes.
THEORY
BPSK (Binary phase shift keying)

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 13 of 28

BPSK is the simplest form of phase shift keying. It uses two phases which are separated by 180
degrees and so can also be termed 2-PSK. It does not particularly matter exactly where the
constellation points are positioned and in this figure they are shown on the real axis at 0 degrees
and 180 degrees. This modulation is the most robust of all the PSKs since it takes the highest
level of noise or distortion to make the demodulator reach an incorrect decision. It is however
only able to modulate at 1 bit symbol and so is unsuitable for high data rate applications.

In the presence of an arbitrary phase-shift introduced by the communications channel, the


demodulator is unable to tell which constellation point is which. As a result, the data is often
differentially encoded prior to modulation.

QPSK

QPSK is type of phase shift keying. Unlike BPSK which is a DSBCS modulation scheme with
digital information for the message QPSK is also a DSBCS modulation scheme but it sends two
bits of digital information a time
The amount of radio frequency spectrum required to transmit QPSK reliably is half that required
for BPSK signals, which in turn makes room for more users on the channel.
The figure below shows a QPSK modulated waveform.

QAM
Quadrature Amplitude Modulation or QAM is a form of modulation which is widely used for
modulating data signals onto a carrier used for radio communications. It is widely used because
it offers advantages over other forms of data modulation such as PSK, although many forms of
data modulation operate alongside each other.
Quadrature Amplitude Modulation, QAM is a signal in which two carriers shifted in phase by 90
degrees are modulated and the resultant output consists of both amplitude and phase variations.
In view of the fact that both amplitude and phase variations are present it may also be considered
as a mixture of amplitude and phase modulation.
A motivation for the use of quadrature amplitude modulation comes from the fact that a straight
amplitude modulated signal, i.e. double sideband even with a suppressed carrier occupies twice
the bandwidth of the modulating signal. This is very wasteful of the available frequency
spectrum. QAM restores the balance by placing two independent double sideband suppressed
carrier signals in the same spectrum as one ordinary double sideband supressed carrier signal.

ALGORITHM

Start the
Matlab
software

Now
Now write
open
Finally the
get the
the
Level 3 Result
Asia Pacific Institute is
editorofwindow
program
result
Information
in Technology 2016
display
editor on
window
according
command to
the Matlab
window
coding
CE00036-3-Data Communication Systems Individual Assignment Page 14 of 28

MATLAB CODE
Matlab code for BPSK
clc;
clear all;
close all;
%GENERATE CARRIER SIGNAL
Tb=1;
t=0:Tb/100:Tb;
fc=2;

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 15 of 28

c=sqrt(2/Tb)*sin(2*pi*fc*t);
%generate message signal
N=8;
m=rand(1,N);
t1=0;t2=Tb
for i=1:N
t=[t1:.01:t2]
if m(i)>0.5
m(i)=1;
m_s=ones(1,length(t));
else
m(i)=0;
m_s=-1*ones(1,length(t));
end
message(i,:)=m_s;
%product of carrier and message signal
bpsk_sig(i,:)=c.*m_s;
%Plot the message and BPSK modulated signal
subplot(5,1,2);
axis([0 N -2 2]);
plot(t,message(i,:),'r');
title('message signal(POLAR form)');
xlabel('t--->');
ylabel('m(t)');
grid on;
hold on;
subplot(5,1,4);
plot(t,bpsk_sig(i,:));
title('BPSK signal');
xlabel('t--->');
ylabel('s(t)');

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 16 of 28

grid on; hold on;


t1=t1+1.01;
t2=t2+1.01;
end
hold off
%plot the input binary data and carrier signal
subplot(5,1,1);
stem(m);
title('binary data bits');
xlabel('n--->');
ylabel('b(n)');
grid on;
subplot(5,1,3);
plot(t,c);
title('carrier signal');
xlabel('t--->');
ylabel('c(t)');
grid on;
t1=0;
t2=Tb
for i=1:N
t=[t1:.01:t2]
%correlator
x=sum(c.*bpsk_sig(i,:));
%decision device
if x>0
demod(i)=1;
else
demod(i)=0;
end
t1=t1+1.01;

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 17 of 28

t2=t2+1.01;
end
%plot the demodulated data bits
subplot(5,1,5);
stem(demod);
title('demodulated data');
xlabel('n--->');
ylabel('b(n)');
grid on
Matlab code for QPSK
clc;
clear all;
close all;
%GENERATE QUADRATURE CARRIER SIGNAL
Tb=1;
t=0:(Tb/100):Tb;
fc=1;
c1=sqrt(2/Tb)*cos(2*pi*fc*t);
c2=sqrt(2/Tb)*sin(2*pi*fc*t);
%generate message signal
N=8;
m=rand(1,N);
t1=0;
t2=Tb
for i=1:2:(N-1)
t=[t1:(Tb/100):t2]
if m(i)>0.5
m(i)=1;
m_s=ones(1,length(t));
else
m(i)=0;

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 18 of 28

m_s=-1*ones(1,length(t));
end
%odd bits modulated signal
odd_sig(i,:)=c1.*m_s;
if m(i+1)>0.5
m(i+1)=1;
m_s=ones(1,length(t));
else
m(i+1)=0;
m_s=-1*ones(1,length(t));
end
%even bits modulated signal
even_sig(i,:)=c2.*m_s;
%qpsk signal
qpsk=odd_sig+even_sig;
%Plot the QPSK modulated signal
subplot(3,2,4);
plot(t,qpsk(i,:));
title('QPSK signal');
xlabel('t---->');
ylabel('s(t)');
grid on;
hold on;
t1=t1+(Tb+.01);
t2=t2+(Tb+.01);
end
hold off
%Plot the binary data bits and carrier signal
subplot(3,2,1);
stem(m);
title('binary data bits');

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 19 of 28

xlabel('n---->');
ylabel('b(n)');
grid on;
subplot(3,2,2);
plot(t,c1);
title('carrier signal-1');
xlabel('t---->');
ylabel('c1(t)');
grid on;
subplot(3,2,3);
plot(t,c2);
title('carrier signal-2');
xlabel('t---->');
ylabel('c2(t)');
grid on;
% QPSK Demodulation
t1=0;
t2=Tb
for i=1:N-1
t=[t1:(Tb/100):t2]
%correlator
x1=sum(c1.*qpsk(i,:));
x2=sum(c2.*qpsk(i,:));
%decision device
if (x1>0&&x2>0)
demod(i)=1;
demod(i+1)=1;
elseif (x1>0&&x2<0)
demod(i)=1;
demod(i+1)=0;
elseif (x1<0&&x2<0)

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 20 of 28

demod(i)=0;
demod(i+1)=0;
elseif (x1<0&&x2>0)
demod(i)=0;
demod(i+1)=1;
end
t1=t1+(Tb+.01);
t2=t2+(Tb+.01);
end
subplot(3,2,5);
stem(demod);
title('qpsk demodulated bits');
xlabel('n---->');
ylabel('b(n)');
grid on;
Matlab code for QAM
clc; %clears all the input and output from the command window display.
clear all; % it removes all the variables from the memory
close all; % it closes all the open files in the window.
M = 16; %possible no. of messages or symbols
k = log2(M); % no of bits per code word (symbol)
no_of_bits = 100000; % total no of bits = 100,000
EbNo = 10; %dBs
Fs=2; %output message sampling frequency
% The Transmitter%
x = randint(no_of_bits,1); % 100,000 random binary 1's and 0's
figure;
subplot(211);
stem(x(1:40)) ;% a stem of first 60 bits.
title('(1st 40 out of 100,000) Message Bits');%defining title of the graph
xlabel('Bits-->'); %defining x-axis

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 21 of 28

ylabel('Bit value'); %defining y-axis


% symbol generation
r=reshape(x,k,length(x)/k)';
xsym=bin2dec(num2str(r));
% Stem of first 10 Symbols
subplot(212);
stem(xsym(1:10));
title('(1st 10 out of 25,000)Message Symbols'); %defining title of the graph
xlabel('Symbols-->'); %defining x-axis
ylabel('Magnitude'); %defining y-axis
% 16-QAM %
t_x = dmodce(xsym,1,Fs, 'qask',M); %the transmitted signal, s(t)
%the Channel%
SNR = EbNo + 10*log10(k);
r_x = awgn(t_x,SNR,'measured'); % the received Signal, r(t)=s(t)+no_of_bits(t)
% Scatter Plot of received signal
h = scatterplot(r_x,1,1);
grid
title('Received Signal Constellation');
axis([-5 5 -5 5]);
RESULT
Model graph for BPSK

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 22 of 28

Figure:
Model graph for QPSK

Figure:

Model graph for QAM

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 23 of 28

Figure:
CONCLUSION
In this question we write the coding for BPSK, QPSK & 16QAM in digital schemes and finally
we get the result.

QUESTION 4
Objective
Objective of this question is to generate the constant-envelope PSK signal waveform for M=8,
for convenience the signal Amplitude is normal to unity
Theory
Phase shift keying is a method of digital communication in which the phase of a
transmitted signal is varied to convey information. There are several methods that can be used to
accomplish PSK.
The simplest PSK technique is called binary phase-shift keying. It uses two opposite signal
phases. The digital signal is broken up time wise into individual bits. The state of each bit is
determined according to the state of the preceding bit. If the phase of the wave does not change,
then the signal state stays the same. If the phase of the wave changes by 180 degrees that is, if

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 24 of 28

the phase reverses then the signal state changes. Because there are two possible wave phases
BPSK is sometimes called bi phase modulation.

DESIGN OF ALGORITHM FOR MATLAB PROGRAM

Start the
Matlab
software

Now open the


editor window

Now write the


program in
editor window

Result is
display on
command
window

Finally get the


result
according to
the Matlab
coding

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 25 of 28

MATLAB CODE
clc;
clear all;
close all;
echo on
T=1;
M=8
Es=T/2;
fc=6/T;
N=100;
delta_T=T/(N-1);
t=0:delta_T:T;
u0=sqrt(2*Es/T)*cos(2*pi*fc*t);
u1=sqrt(2*Es/T)*cos(2*pi*fc*t+2*pi/M);
u2=sqrt(2*Es/T)*cos(2*pi*fc*t+4*pi/M);
u3=sqrt(2*Es/T)*cos(2*pi*fc*t+6*pi/M);
u4=sqrt(2*Es/T)*cos(2*pi*fc*t+8*pi/M);
u5=sqrt(2*Es/T)*cos(2*pi*fc*t+10*pi/M);
u6=sqrt(2*Es/T)*cos(2*pi*fc*t+12*pi/M);
u7=sqrt(2*Es/T)*cos(2*pi*fc*t+14*pi/M);
%Plotting Commands Follow%
subplot(8,1,1);
plot(t,u0);
subplot(8,1,2);
plot(t,u1);
subplot(8,1,3);
plot(t,u2);
subplot(8,1,4);
plot(t,u3);
subplot(8,1,5);
plot(t,u4);

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 26 of 28

subplot(8,1,6);
plot(t,u5);
subplot(8,1,7);
plot(t,u6);
subplot(8,1,8);
plot(t,u7);
RESULT

Figure:
CONCLUSION
In this question we done generate the constant envelope PSK signal waveform for M=8 for
convenience the signal and finally we get the result.

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 27 of 28

CONCLUSION
In there assignment we solving the PSK ,BPSK,QPSK 16QAM,space path loss and power
received by antenna so we are getting more knowledge in there question number one and after
that we get the result in Matlab software .

Level 3 Asia Pacific Institute of Information Technology 2016


CE00036-3-Data Communication Systems Individual Assignment Page 28 of 28

REFERANCES

Level 3 Asia Pacific Institute of Information Technology 2016

Vous aimerez peut-être aussi