• 沒有找到結果。

Wireless Communication Systems

N/A
N/A
Protected

Academic year: 2022

Share "Wireless Communication Systems"

Copied!
48
0
0

加載中.... (立即查看全文)

全文

(1)

Wireless Communication Systems

@CS.NCTU

Lecture 2: Modulation and Demodulation Reference: Chap. 5 in Goldsmith’s book

Instructor: Kate Ching-Ju Lin (林靖茹)

1

(2)

Modulation

2

From Wikipedia:

The process of varying one or more properties of a

periodic waveform with a modulating signal that typically contains information to be transmitted.

0 5 10 15 20 25 30 35

-2 -1.5 -1 -0.5 0 0.5 1 1.5 2

0 5 10 15 20 25 30 35

-2 -1.5 -1 -0.5 0 0.5 1 1.5 2

0 5 10 15 20 25 30 35

-2 -1.5 -1 -0.5 0 0.5 1 1.5 2

0 5 10 15 20 25 30 35

-2 -1.5 -1 -0.5 0 0.5 1 1.5 2

modulate

(3)

Example 1

3

= bit-stream?

(a) 10110011 (b) 00101010 (c) 10010101

(4)

Example 2

4

= bit-stream?

(a) 01001011 (b) 00101011 (c) 11110100

(5)

Example 3

5

= bit-stream?

(a) 11010100 (b) 00101011

(c) 01010011 (d) 11010100 or

00101011

(6)

Types of Modulation

Amplitude ASK

Frequency FSK

Phase

PSK

(7)

Modulation

• Map bits to signals

wireless channel TX

transmitted Signal s(t)

1 0 1 1 0

bit stream

modulation

(8)

Demodulation

• Map signals to bits

RX

1 0 1 1 0

demodulation

received signal x(t) wireless

channel TX

transmitted Signal s(t)

1 0 1 1 0

bit stream

modulation

(9)

Analog and Digital Modulation

• Analog modulation

⎻ Modulation is applied continuously

⎻ Amplitude modulation (AM)

⎻ Frequency modulation (FM)

• Digital modulation

⎻ An analog carrier signal is modulated by a discrete signal

⎻ Amplitude-Shift Keying (ASK)

⎻ Frequency-Shift Keying (FSK)

⎻ Phase-Shift Keying (PSK)

⎻ Quadrature Amplitude Modulation (QAM)

9

(10)

Advantages of Digital Modulation

• Higher data rate (given a fixed bandwidth)

• More robust to channel impairment

⎻ Advanced coding/decoding can be applied to make signals less susceptible to noise and fading

⎻ Spread spectrum techniques can be applied to deal with multipath and resist interference

• Suitable to multiple access

⎻ Become possible to detect multiple users simultaneously

• Better security and privacy

⎻ Easier to encrypt

10

(11)

Modulation and Demodulation

• Modulation

⎻ Encode a bit stream of finite length to one of several possible signals

• Delivery over the air

⎻ Signals experience fading and are combined with AWGN (additive white Gaussian noise)

• Demodulation

⎻ Decode the received signal by mapping it to the closest one in the set of possible transmitted signals

11

Transmitter Receiver

+ x(t) n(t) AWGN Channel

i 1 K s(t)

m ={b ,...,b } ^

1 K

m ={b ,...,b }^ ^

Figure 5.1: Communication System Model

channel is analog, the message must be embedded into an analog signal for channel transmission. Thus, each message mi ∈ M is mapped to a unique analog signal si(t) ∈ S = {s1(t), . . . , sM(t)} where si(t) is defined on the time interval [0, T ) and has energy

Esi = ! T

0 s2i(t)dt, i = 1, . . . , M. (5.1)

Since each message represents a bit sequence, each signal si(t) ∈ S also represents a bit sequence, and detection of the transmitted signal si(t) at the receiver is equivalent to detection of the transmitted bit sequence. When messages are sent sequentially, the transmitted signal becomes a sequence of the corresponding analog signals over each time interval [kT, (k + 1)T ): s(t) = "ksi(t − kT), where si(t) is the analog signal corresponding to the message mi designated for the transmission interval [kT, (k +1)T ).

This is illustrated in Figure 5.2, where we show the transmitted signal s(t) = s1(t) + s2(t − T) + s1(t − 2T ) + s1(t − 3T) corresponding to the string of messages m1, m2, m1, m1 with message mi mapped to signal si(t).

T

0 2T 3T 4T

s (t)

1 1 1

s (t−T)2

s (t−2T) s (t−3T)

s(t)

...

m1 m

1 m

1

m2

Figure 5.2: Transmitted Signal for a Sequence of Messages

In the model of Figure 5.1, the transmitted signal is sent through an AWGN channel, where a white Gaussian noise process n(t) of power spectral density N0/2 is added to form the received signal x(t) = s(t) + n(t). Given x(t) the receiver must determine the best estimate of which si(t) ∈ S was transmitted during each transmission interval [kT, (k +1)T ). This best estimate for si(t) is mapped to a best estimate of the message mi(t) ∈ M and the receiver then outputs this best estimate ˆm = {ˆb1, . . . , ˆbK} ∈ M of the transmitted bit sequence.

The goal of the receiver design in estimating the transmitted message is to minimize the probability of message error:

Pe =

#M

i=1

p( ˆm ̸= mi|mi sent)p(mi sent) (5.2) over each time interval [kT, (k + 1)T ). By representing the signals {si(t), i = 1, . . . , M} geometrically, we can solve for the optimal receiver design in AWGN based on a minimum distance criterion. Note that, as we saw in previous chapters, wireless channels typically have a time-varying impulse response in addition to AWGN. We will consider the effect of an arbitrary channel impulse response on digital modulation performance in Chapter 6, and methods to combat this performance degradation in Chapters 11-13.

127

modulate demodulate

(12)

Band-pass Signal Representation

• General form

• Amplitude is always non-negative

⎻ Or we can switch the phase by 180 degrees

• Called the canonical representation of a band-pass signal

12

𝑎 𝑡

2𝜋𝑓&𝑡 + 𝜙 𝑡 𝑠 𝑡

amplitude frequency phase

s(t) = a(t)cos(2⇡f

c

t + (t))

(13)

In-phase and Quadrature Components

• : In-phase component of s(t)

• : Quadrature component of s(t)

13

Amplitude: a(t) = q

s

2I

(t) + s

2Q

(t) Phase: (t) = tan

1

( s

Q

(t)

s

I

(t) ) s

I

(t) = a(t) cos( (t))

s

Q

(t) = a(t) sin( (t))

s(t) = a(t) cos(2⇡f

c

t + (t))

= a(t)[cos(2⇡f

c

t) cos( (t)) sin(2⇡f

c

t) sin( (t))]

= s

I

(t) cos(2⇡f

c

t) s

Q

(t) sin(2⇡f

c

t)

(14)

• We can also represent s(t) as

s’(t) is called the complex

envelope of the band-pass signal

• This is to remove the annoying in the analysis

Band-Pass Signal Representation

𝑎 𝑡 𝜙 𝑡

𝑠′ 𝑡

s

0

(t) = s

I

(t) + js

Q

(t) s(t) = <[s

0

(t)e

2j⇡fct

]

e

2j⇡fct

exp(iθ) = cos(θ)+jsin(θ)

s(t) = s

I

(t) cos(2 f (t)t) s

Q

(t) sin(2 f (t)t)

I

Q

(15)

Types of Modulation

Amplitude

⎻ M-ASK: Amplitude Shift Keying

Frequency

⎻ M-FSK: Frequency Shift Keying

Phase

⎻ M-PSK: Phase Shift Keying

Amplitude + Phase

⎻ M-QAM: Quadrature Amplitude Modulation

s(t) = Acos(2πf

c

t+ 𝜙 )

(16)

Amplitude Shift Keying (ASK)

• A bit stream is encoded in the amplitude of the transmitted signal

• Simplest form: On-Off Keying (OOK)

⎻ ‘1’àA=1, ‘0’àA=0

16

TX RX

signal s(t)

1 0 1 1 0 1 0 1 1 0

bit stream b(t)

modulation demodulation

(17)

M-ASK

• M-ary amplitude-shift keying (M-ASK)

17

s(t) = A

i

cos(2 f

c

t) , if 0 t T

0 , otherwise,

where i = 1, 2, · · · , M

A

i

is the amplitude corresponding to bit pattern i

(18)

Example: 4-ASK

• Map ‘00’, ‘01’, ‘10’, ’11’ to four different amplitudes

18

Amplitude-Shift Keying (ASK) Modulation on Mac

(a) 0

... ...

E s i

i

= 2T cos 2 π f c t φ 1 t( )

0

s 0s 1 s 2s 3 (b)

φ 1 t( )

Figure 22.5 (a) M-ASK and (b) 4-ASK signal constellation diagrams.

0 0 0 1 1 0 1 1

0 Time

(a)

(c)

4-ary Time signal

3

-3 -1 1

0

(b)

m (t )

0 A -A -3A 3A

Time

T T

4-ASK signal

s (t ) Binary

sequence 1

Figure 22.6 4-ASK modulation: (a) binary sequence, (b) 4-ary signal, and (b) 4-ASK signal.

22.6

(19)

Pros and Cons of ASK

• Pros

⎻ Easy to implement

⎻ Energy efficient

⎻ Low bandwidth requirement

• Cons

⎻ Low data rate

§ bit-rate = baud rate

⎻ High error probability

§ Hard to pick a right threshold

1 baud

1 second

Bandwidth is the difference between the upper and lower frequencies in a

continuous set of frequencies.

(20)

Types of Modulation

Amplitude

⎻ M-ASK: Amplitude Shift Keying

Frequency

⎻ M-FSK: Frequency Shift Keying

Phase

⎻ M-PSK: Phase Shift Keying

Amplitude + Phase

⎻ M-QAM: Quadrature Amplitude Modulation

s(t) = Acos(2πf

c

t+ 𝜙 )

(21)

Frequency Shift Keying (FSK)

• A bit stream is encoded in the frequency of the transmitted signal

• Simplest form: Binary FSK (BFSK)

⎻ ‘1’àf=f1, ‘0’àf=f2

21

TX

signal s(t)

1 0 1 1 0

bit stream

modulation

RX

1 0 1 1 0

demodulation

(22)

M-FSK

• M-ary frequency-shift keying (M-FSK)

• Example: Quaternary Frequency Shift Keying (QFSK)

⎻ Map ‘00’, ‘01’, ‘10’, ’11’ to four different frequencies

22

s(t) = A cos(2 f

c,i

t) , if 0 t T

0 , otherwise,

where i = 1, 2, · · · , M

f

c,i

is the center frequency corresponding to bit pattern i

(23)

Pros and Cons of FSK

• Pros

⎻ Easy to implement

⎻ Better noise immunity than ASK

• Cons

⎻ Low data rate

§ Bit-rate = baud rate

⎻ Require higher bandwidth

§ BW(min) = Nb + Nb

(24)

Types of Modulation

Amplitude

⎻ M-ASK: Amplitude Shift Keying

Frequency

⎻ M-FSK: Frequency Shift Keying

Phase

⎻ M-PSK: Phase Shift Keying

Amplitude + Phase

⎻ M-QAM: Quadrature Amplitude Modulation

s(t) = Acos(2πf

c

t+ 𝜙 )

(25)

Phase Shift Keying (PSK)

• A bit stream is encoded in the phase of the transmitted signal

• Simplest form: Binary PSK (BPSK)

⎻ ‘1’à𝜙=0, ‘0’à𝜙=π

25

TX RX

signal s(t)

1 0 1 1 0

bit stream s(t)

modulation

1 0 1 1 0

demodulation

(26)

Constellation Points for BPSK

• ‘1’à𝜙=0

cos(2πfct+0)

= cos(0)cos(2πfct)- sin(0)sin(2πfct)

= sIcos(2πfct) – sQsin(2πfct)

• ‘0’à𝜙

cos(2πfct+π)

= cos(π)cos(2πfct)- sin(π)sin(2πfct)

= sIcos(2πfct) – sQsin(2πfct)

I

𝜙=0

Q

I Q

𝜙

(sI,sQ) = (1, 0)

‘1’à 1+0i (sI,sQ) = (-1, 0)

‘0’à -1+0i

(27)

‘0’ ‘1’

Demodulate BPSK

• Map to the closest constellation point

• Quantitative measure of the distance between the received signal s’ and any possible signal s

⎻ Find |s’-s| in the I-Q plane

I Q

s1=1+0i n1

n0

n

1

=|s’-s

1

|=|s’-(1+0i)|

n

0

=|s’-s

0

|=| |s’-(-1+0i)|

since n

1

< n

0,

map s’ to (1+0i)à‘1’

s’=a+bi s0=-1+0i

(28)

I Q

s1=1+0i

‘0’ ‘1’

s0=-1+0i

Demodulate BPSK

• Decoding error

⎻ When the received signal is mapped to an incorrect symbol (constellation point) due to a large error

• Symbol error rate

⎻ P(mapping to a symbol sj, j≠i | si is sent )

Given the transmitted symbol s

1

s’=a+bi

à incorrectly map s’ to

s

0

=(-1+0)à‘0’, when the

error is too large

(29)

SNR of BPSK

• SNR: Signal-to-Noise Ratio

• Example:

⎻ Say Tx sends (1+0i) and Rx receives (1.1 – 0.01i)

⎻ SNR?

I Q

s’ = a+bin

SN R = |s|

2

n

2

= |s|

2

|s s |

2

= |1 + 0i|

2

|(a + bi) (1 + 0i) |

2

SN R

dB

= 10 log

10

(SN R)

(30)

SER/BER of BPSK

• BER (Bit Error Rate) = SER (Symbol Error Rate)

30

SER = BER = P

b

= Q

✓ d

min

p 2N

0

= Q

r 2E

b

N

0

!

= Q( p

2SN R)

From Wikipedia:

Q(x) is the probability that a normal (Gaussian) random variable will obtain a value larger than x standard deviations above the mean.

Minimum distance of any two cancellation points

(31)

Constellation point for BPSK

Say we send the signal with phase delay π

31

cos(2j f

c

t + )

= cos(2j f

c

t) cos( ) sin(2j f

c

t) sin( )

= 1 cos(2j f

c

t) 0 sin(2j f

c

t)

=( 1 + 0i)e

2j fct

Illustrate this by the constellation

point (-1 + 0i) in an I-Q plane I

Q

𝜙

-1+0i Band-pass representation

(32)

Quadrature PSK (QPSK)

Use four phase rotations 1/4π, 3/4π, 5/4π, 7/4π to represent ‘00’, ‘01’, ‘11’, 10’

32

A cos(2j f

c

t + /4)

=A cos(2j f

c

t) cos( /4) A sin(2j f

c

t) sin( /4)

=1 cos(2j f

c

t) 1 sin(2j f

c

t)

=(1 + 1i)e

2j fct

A cos(2j f

c

t + 3 /4)

=A cos(2j f

c

t) cos(3 /4) A sin(2j f

c

t) sin(3 /4)

= 1 cos(2j f

c

t) 1 sin(2j f

c

t)

=( 1 + 1i)e

2j fct

I Q

‘00’

‘10’

‘01’

‘11’

(33)

Quadrature PSK (QPSK)

• Use 2 degrees of freedom in I-Q plane

• Represent two bits as a constellation point

⎻ Rotate the constellations by π/2

⎻ Demodulation by mapping the received signal to the closest constellation point

⎻ Double the bit-rate

• No free lunch:

⎻ Higher error probability (Why?)

I Q

‘00’

‘10’

‘01’

‘11’

(34)

Quadrature PSK (QPSK)

• Maximum power is bounded

⎻ Amplitude of each constellation point should still be 1

I Q

‘00’ = 1/√2(1+1i)

‘10’

‘01’

‘11’

1 2 1

2

1 2

1 2

Bits Symbols

‘00’ 1/√2+1/√2i

’01’ -1/√2+1/√2i

‘10’ 1/√2-1/√2i

‘11’ -1/√2-1/√2i

(35)

Higher Error Probability in QPSK

For a particular error n, the symbol could be decoded correctly in BPSK, but not in QPSK

⎻ Why? Each sample only gets half power

I Q

1 n

✔ in BPSK

I Q

✗ In QPSK 1/√2 n

‘0’ ‘1’ ‘x1’ ‘x0’

(36)

Trade-off between Rate and SER

• Trade-off between the data rate and the symbol error rate

⎻ Denser constellation points

à More bits encoded in each symbol à Higher data rate

⎻ Denser constellation points

à Smaller distance between any two points à Higher decoding error probability

36

(37)

SEN and BER of QPSK

• SNR

s

: SNR per symbol; SNR

b

: SNR per bit

• SER: The probability that each branch has a bit error

• BER

37

BER = P

b

⇡ P

s

2

QPSK: M=4

SN R

b

⇡ SN R

s

log

2

M , P

b

⇡ P

s

log

2

M

E

s

is the bounded maximum power

SER = P

s

= 1 [1 Q( p

2SN R

b

)]

2

= 1 [1 Q(

r 2E

b

N

0

)]

2

= 1 [1 Q( p

SN R

s

)]

2

= 1 [1 Q(

r E

s

N

0

)]

2

(38)

M-PSK

38

I Q

‘10’

‘01’

‘11’

1 2 1

2

1 2

I Q

1 2

‘0’ ‘1’

I Q

‘111’

‘100’

‘010’

‘011’

‘001’

‘000’

‘100’ ‘101’

I Q

‘1111’

‘0000’

BPSK QPSK

8-PSK 16-PSK

(39)

M-PSK BER versus SNR

Denser constellation points à higher BER

Acceptable reliability

(40)

Types of Modulation

Amplitude

⎻ M-ASK: Amplitude Shift Keying

Frequency

⎻ M-FSK: Frequency Shift Keying

Phase

⎻ M-PSK: Phase Shift Keying

Amplitude + Phase

⎻ M-QAM: Quadrature Amplitude Modulation

s(t) = Acos(2πf

c

t+ 𝜙 )

(41)

Quadrature Amplitude Modulation

• Change both amplitude and phase

• s(t)=Acos(2πf

c

t+ 𝜙 )

• 64-QAM: 64 constellation points, each with 8 bits I

Q

‘1000’

‘1100’

‘0100’

‘0000’

‘1001’

‘1101’

‘0101’

‘0001’

‘1011’

‘1111’

‘0111’

‘0011’

‘1010’

‘1110’

‘0110’

‘0010’

Bits Symbols

‘1000’ s1=3a+3ai

’1001’ s2=3a+ai

‘1100’ s3=a+3ai

‘1101’ s4=a+ai

expected power: E s !

i 2

" #

$ = 1

a 3a

16-QAM

(42)

M-QAM BER versus SNR

(43)

Modulation in 802.11

• 802.11a

⎻ 6 mb/s: BPSK + ½ code rate

⎻ 9 mb/s: BPSK + ¾ code rate

⎻ 12 mb/s: QPSK + ½ code rate

⎻ 18 mb/s: QPSK + ¾ code rate

⎻ 24 mb/s: 16-QAM + ½ code rate

⎻ 36 mb/s: 16-QAM + ¾ code rate

⎻ 48 mb/s: 64-QAM + ⅔ code rate

⎻ 54 mb/s: 64-QAM + ¾ code rate

• FEC (forward error correction)

⎻ k/n: k-bits useful information among n-bits of data

⎻ Decodable if any k bits among n transmitted bits are correct

(44)

Signal Encoder

90 degree

shift

×

× Message

Source

Band-pass Signal s(t) +

+

Map each bit into sI(t) and sQ(t)

Band-Pass Signal Transmitter

s(t) = sI(t) cos(2⇡fct) sQ(t) sin(2⇡fct)

sI(t)

sQ(t)

Σ

mixer

cos(2πfct)

sin(2πfct)

(45)

Band-Pass Signal Receiver

Band- pass Filter

90 degree

shift

×

×

Message Sink Received

Signal plus noise

Filters out out- of-band signals and noises

x(t) = s(t) + n(t)

Low-pass Filter

Signal Detector

Low- pass Filter

0.5[AcsI(t) + nI(t)]

0.5[AcsQ(t) + nQ(t)]

cos(2πfct)

sin(2πfct)

(46)

Detection

• Map the received signal to one of the possible transmitted signal with the minimum distance

• Find the corresponding bit streams

46

[sI(t)+n(t)] + j[sQ(t)+n(t)]

0000..000

0000..010 ...

0001..100 ...

0111..110

s1I(t) + js1Q(t) s2I(t) + js2Q(t)

...

skI(t) + jskQ(t) ...

sKI (t) + jsKQ(t)

received signal

possible transmitted

signals corresponding bit streams

closest

(47)

Announcement

• Install Matlab

• Teaming

⎻ Elevator pitch: 2 per group (Each group talks about 3-5 minutes. Each member needs to talk)

⎻ Lab and project: 3-4 members per group

⎻ Send your team members to the TA (張威竣)

• Sign up for the talk topic

⎻ Pick the paper (topic) according to your preference or schedule

⎻ Sign up from 18:00@Thu (will announce the url in the announcement tab of the course website)

⎻ Pick your top five choices (from Lectures 4-18)

⎻ FIFS

47

(48)

Quiz

• What are the four types of modulation introduced in the class?

• Say Tx sends (-1 + 0i) and Rx receives -(0.95+0.01i).

Calculate the SNR.

48

參考文獻

相關文件

The Performance Evaluation for Horizontal, Vertical and Hybrid Schema in Database Systems.. -A Case Study of Wireless Broadband

implications for further research.. Characteristics of package tours in Europe. Tourists and aboriginal people. The performance-importance response function: Observations

In response to the variance in manufacturing execution systems and comprehensive customized business logic, this study develops an integrated, extensible, and sustainable

Another point to financial performance indicators used to measure the performance of the industry's performance, to explore market in domestic container shipping industry

The purpose of this research is to explore the important and satisfaction analysis of experiential marketing in traditional bakery industry by using Importance-Performance and

The objective is to evaluate the impact of personalities balance in a project management team on the team’s performance.. To verify the effectiveness of this model, two

Investigating the effect of learning method and motivation on learning performance in a business simulation system context: An experimental study. Four steps to

In this section we establish an integral representation for the difference of values of the digamma function.. Integrals over a half-line.. In this section we consider integrals