Binary Detection

Embed Size (px)

Citation preview

  • 7/27/2019 Binary Detection

    1/80

  • 7/27/2019 Binary Detection

    2/80

    2012/2013 Meixia Tao @ SJ TU 2

    Topics to be Covered

    Binary digital modulation

    M-ary digital modulation

    Tradeoff study

    data basebandDigital

    modulator

    Bandpasschannel

    Digitaldemodulator

    BPFdetector

    Noise

  • 7/27/2019 Binary Detection

    3/80

    2012/2013 Meixia Tao @ SJ TU 3

    Digital Modulation

    The message signal is transmitted by a sinusoidal carrierwave

    In digital communications, the modulation processcorresponds to switching or keying the amplitude, frequency,

    or phase of the carrier in accordance with the incomingdigital data

    Three basic digital modulation techniques Amplitude-shift keying (ASK) - special case of AM

    Frequency-shift keying (FSK) - special case of FM Phase-shift keying (PSK) - special case of PM

    Will use signal space approach in receiver design andperformance analysis

  • 7/27/2019 Binary Detection

    4/80

    2012/2013 Meixia Tao @ SJ TU 4

    8.1 Binary Modulation Types

    In binary signaling, the modulator produces one oftwodistinct signals in response to 1 bit of source data at atime.

    Binary modulation types

    Binary PSK (BPSK)

    Binary FSK

    Binary ASK

  • 7/27/2019 Binary Detection

    5/80

    2012/2013 Meixia Tao @ SJ TU 5

    Binary Phase-Shift Keying (BPSK)

    Modulation

    , , bit duration

    : carrier frequency, chosen to be for some fixedinteger or

    : transmitted signal energy per bit, i.e.

    The pair of signals differ only in a relative phase shift of 180degrees

    0 1 1 0 1 0 0 1

    1

    0

    1 /c bf T>>

  • 7/27/2019 Binary Detection

    6/80

    2012/2013 Meixia Tao @ SJ TU 6

    Clearly, there is one basis function of unit energy

    Then

    A binary PSK system is therefore characterized by havinga signal space that is one-dimensional (i.e. N=1), and with

    two message points (i.e. M = 2)

    Signal Space Representation for

    BPSK

    s1s20

  • 7/27/2019 Binary Detection

    7/80

    2012/2013 Meixia Tao @ SJ TU 7

    Decision Rule of BPSK

    Assume that the two signals are equally likely, i.e. P(s1) =P(s2) = 0.5. Then the optimum decision boundary is themidpoint of the line joining these two message points

    Decision rule:

    Guess signal s1(t) (or binary 1) was transmitted if thereceived signal point r falls in region R1

    Guess signal s2(t) (or binary 0) was transmitted otherwise

    s1s2

    Region R1Region R2

    0

  • 7/27/2019 Binary Detection

    8/80

  • 7/27/2019 Binary Detection

    9/80

    2012/2013 Meixia Tao @ SJ TU 9

    Recall ML decision criterion:

    Thus

    And

    Finally

    Choose s1> r

    2

    When r1< r

    2, r falls inside region R2 and the receiver decides in

    favor ofs2

    Message point

    Messagepoint

    Decision boundary

    R1

    R2

  • 7/27/2019 Binary Detection

    18/80

    2012/2013 Meixia Tao @ SJ TU 18

    Probability of Error for Binary FSK

    Given that s1 is transmitted,

    Since the condition r1< r

    2corresponds to the receiver

    making a decision in favor of symbol s2, the conditional

    probability of error given s1 is transmitted is given by

    Define a new random variable

    Since n1 and n2 are i.i.d with

    Thus, n is also Gaussian with

    and

  • 7/27/2019 Binary Detection

    19/80

    2012/2013 Meixia Tao @ SJ TU 19

    By symmetry

    Since the two signals are equally likely to betransmitted, the average probability of error forcoherent binary FSKis

    3 dB worse than BPSK

    i.e. to achieve the same Pe, BFSK needs 3dB moretransmission power than BPSK

  • 7/27/2019 Binary Detection

    20/80

    2012/2013 Meixia Tao @ SJ TU 20

    Binary FSK Transmitter

    On-off signalling form

    0

    1

  • 7/27/2019 Binary Detection

    21/80

    2012/2013 Meixia Tao @ SJ TU 21

    Coherent Binary FSK Receiver

    bT

    dt0

    bT

    dt0

    Decision

    Device+

    Choose 1 ifl>0

    Choose 0 otherwise

    +

    -

  • 7/27/2019 Binary Detection

    22/80

    2012/2013 Meixia Tao @ SJ TU 22

    Binary ASK

    Modulation

    Average energy per bit

    0 1 1 0 1 0 0 1

    (On-off signalling)

    1

    0

    s1s2

    Region R1Region R2

    0

  • 7/27/2019 Binary Detection

    23/80

    2012/2013 Meixia Tao @ SJ TU 23

    Probability of Error for Binary ASK

    Average probability of error is

    Exercise: Prove Pe

    Identical to that of coherent binary FSK

  • 7/27/2019 Binary Detection

    24/80

    2012/2013 Meixia Tao @ SJ TU 24

    Probability of Error and the Distance

    Between Signals

    These expressions illustrate the dependence of the error

    probability on the distance between two signal points. Ingeneral,

    BPSK BFSK BASK

  • 7/27/2019 Binary Detection

    25/80

    2012/2013 Meixia Tao @ SJ TU 25

    0 2 4 6 8 10 12 1410

    -7

    10-6

    10-5

    10-4

    10-3

    10-2

    10-1

    100

    Eb/No in [dB]

    Probability

    ofBitError

    PSK

    ASK/FSK

    3dB

    Probability of Error Curve for BPSK and FSK/ASK

    e.g.

  • 7/27/2019 Binary Detection

    26/80

    2012/2013 Meixia Tao @ SJ TU 26

    Example #1

    Binary data are transmitted over a microwave linkat the rate of106 bits/sec and the PSD of thenoise at the receiver input is 10-10 watts/Hz.

    a) Find the average carrier power required tomaintain an average probability of errorfor coherent binary FSK.

    b) Repeat the calculation in a) for noncoherent

    binary FSK

  • 7/27/2019 Binary Detection

    27/80

    2012/2013 Meixia Tao @ SJ TU 2727

    We have discussed

    Coherent modulation schemes, .e.g.

    BPSK, BFSK, BASK They needs coherent detection,

    assuming that the receiver is able todetect and track the carrier wavesphase

    Update

    We now consider:

    Non-coherent detection on binary FSK

    Differential phase-shift keying (DPSK)

    In many practical situations, strict phasesynchronization is not possible. In thesesituations, non-coherent reception is required.

  • 7/27/2019 Binary Detection

    28/80

    2012/2013 Meixia Tao @ SJ TU 28

    8.2: Non-coherent scheme: BFSK

    Consider a binary FSK system, the two signals are

    Where and are unknown random phases withuniform distribution

  • 7/27/2019 Binary Detection

    29/80

    2012/2013 Meixia Tao @ SJ TU 29

    Signal Space Representation

    No matter what the two phases are, the signalscan be expressed as a linear combination of thefour basis functions

    Signal space representation

  • 7/27/2019 Binary Detection

    30/80

    2012/2013 Meixia Tao @ SJ TU 30

    Correlating the received signal r(t) with the four basis

    functions produces the vector representation of thereceived signal

    Detector

  • 7/27/2019 Binary Detection

    31/80

    2012/2013 Meixia Tao @ SJ TU 31

    Decision Rule for Non-coherent FSK

    ML criterion, assume P(s1) = P(s2):

    Conditional pdf

    Similarly,

    Choose s1>envelop detector

    Carrier phase is irrelevant in decision making

  • 7/27/2019 Binary Detection

    35/80

    2012/2013 Meixia Tao @ SJ TU 35

    Structure of Non-Coherent Receiver for

    Binary FSK

    It can be shown that

    Comparator

    (selectthelargest)

    (For detailed proof, see Section 10.4.2 in the textbook )

  • 7/27/2019 Binary Detection

    36/80

    2012/2013 Meixia Tao @ SJ TU 36

    Performance Comparison Between coherent

    FSK and Non-Coherent FSK

    0 2 4 6 8 10 12 1410

    -7

    10-6

    10

    -5

    10-4

    10-3

    10-2

    10-1

    10

    0

    Eb/No in [dB]

    P

    robability

    ofBit

    Error

    BPSK

    ASK/FSK

    NC FSK

    DPSK

  • 7/27/2019 Binary Detection

    37/80

    2012/2013 Meixia Tao @ SJ TU 37

    Differential PSK (DPSK)

    DPSK can be viewed as the non-coherent versionof PSK.

    Phase synchronization is eliminated using

    differential encoding Encoding the information in phase difference

    between successive signal transmission

    In effect:

    to send 0, we phase advance the current signalwaveform by 1800 ;

    to send 1, we leave the phase unchanged

  • 7/27/2019 Binary Detection

    38/80

    2012/2013 Meixia Tao @ SJ TU 38

    DPSK (contd)

    Provided that the unknown phase contained inthe received wave varies slowly (constant over twobit intervals), the phase difference betweenwaveforms received in two successive bit interval

    will be independent of

  • 7/27/2019 Binary Detection

    39/80

    2012/2013 Meixia Tao @ SJ TU 39

    Generation of DPSK signal

    We can generate DPSK signals by combining two basicoperations

    Differential encoding of the information binary bits

    Phase shift keying

    The differential encoding process starts with an arbitraryfirst bit, serving as reference

    Let {mi}be input information binary bit sequence, {di}bethe differentially encoded bit sequence

    If the incoming bit miis 1, leave the symbol d

    iunchanged

    with respect to the previous bit di-1 If the incoming bit mi is 0, change the symbol di with respect

    to the previous bit di-1

  • 7/27/2019 Binary Detection

    40/80

    2012/2013 Meixia Tao @ SJ TU 40

    Illustration

    The reference bit is chosen arbitrary, here taken as 1

    DPSK transmitter diagram

    1 0 0 1 0 0 1 1Binary data

    1 1 0 1 1 0 1 1 1

    0 0 0 0 0 0 0

    Initial bit

    Differentiallyencoded

    binary data

    TransmittedPhase

    mi

    di___________

    1 iii mdd =

  • 7/27/2019 Binary Detection

    41/80

    2012/2013 Meixia Tao @ SJ TU 41

    Differential Detection of DPSK Signals

    Multiply the received DPSK signal with its delayed version

    Output of integrator (assume noise free)

    The unknown phase becomes irrelevant

    If = 0 (bit 1), the integrator outputy is positive

    if = (bit 0), the integrator output y is negative

    Decision

    device

    bT

    dt0

    Threshold of

    zero volts

    Choose 1 ifl >0

    Otherwise choose 0

    Delay

    Tb

  • 7/27/2019 Binary Detection

    42/80

    2012/2013 Meixia Tao @ SJ TU 42

    Error Probability of DPSK

    The differential detector is suboptimal in the senseof error performance

    It can be shown that

  • 7/27/2019 Binary Detection

    43/80

    2012/2013 Meixia Tao @ SJ TU 43

    Summary of Pe for Different Binary

    Modulations

    Coherent PSK

    Coherent ASK

    Coherent FSK

    Non-Coherent FSK

    DPSK

  • 7/27/2019 Binary Detection

    44/80

    2012/2013 Meixia Tao @ SJ TU 44

    0 2 4 6 8 10 12 1410

    -7

    10-6

    10-5

    10-4

    10

    -3

    10-2

    10-1

    100

    Eb/No in [dB]

    Probability

    of

    BitError

    BPSK(QPSK)

    ASK/FSK

    NC FSK

    DPSK

    Pe Plots for Different Binary Modulations

  • 7/27/2019 Binary Detection

    45/80

    2012/2013 Meixia Tao @ SJ TU 45

    We have discussed binary case

    Coherent modulation techniques:

    BPSK, BFSK, BASK

    Noncoherent modulation techniques:

    Non-coherent FSK, DPSK

    Update

    We now consider:

    M-ary modulation techniques

    MPSK

    MQAM

    MFSK

  • 7/27/2019 Binary Detection

    46/80

    2012/2013 Meixia Tao @ SJ TU 46

    8.3 M-ary Modulation Techniques

    In binary data transmission, send only one of two possiblesignals during each bit intervalTb

    In M-ary data transmission, send one ofM possible signalsduring each signaling intervalT

    In almost all applications, M = 2

    n

    andT = nTb, where n isan integer

    Each of the M signals is called a symbol

    These signals are generated by changing the amplitude,

    phase or frequency of a carrier in M discrete steps. Thus, we have M-ary ASK, M-ary PSK, and M-ary FSK

    digital modulation schemes

  • 7/27/2019 Binary Detection

    47/80

    2012/2013 Meixia Tao @ SJ TU 47

    Binary is a special case of M-ary

    Another way of generating M-ary signals is tocombine different methods of modulation intohybrid forms

    For example, we may combine discrete changesin both the amplitude and phase of a carrier to

    produce M-ary amplitude phase keying. A specialform of this hybrid modulation is M-ary QAM(MQAM)

  • 7/27/2019 Binary Detection

    48/80

  • 7/27/2019 Binary Detection

    49/80

    2012/2013 Meixia Tao @ SJ TU 49

    MPSK (contd)

    Signal space representation

  • 7/27/2019 Binary Detection

    50/80

    2012/2013 Meixia Tao @ SJ TU 50

    MPSK Signal Constellations

    BPSK QPSK 8PSK 16PSK

  • 7/27/2019 Binary Detection

    51/80

    2012/2013 Meixia Tao @ SJ TU

    The Euclidean distance between any two signal points in theconstellation is

    The minimum Euclidean distance is

    dmin plays an important role in determining error performance asdiscussed previously (union bound)

    In the case of PSK modulation, the error probability is dominated bythe erroneous selection of either one of the two signal points adjacent

    to the transmitted signal point. Consequently, an approximation to the symbol error probability is

    51

    2 ( )

    2 1 cosmn m n sm n

    d E M

    = =

    s s

    min

    22 1 cos 2 sin

    s sd E EM M

    = =

    min

    0

    / 22 2 2 sin

    / 2MPSK s

    dP Q Q E

    MN

    =

  • 7/27/2019 Binary Detection

    52/80

    2012/2013 Meixia Tao @ SJ TU

    Exercise

    Consider the M=2, 4, 8 PSK signal constellations.All have the same transmitted signal energy Es.

    Determine the minimum distance betweenadjacent signal points

    For M=8, determine by how many dB thetransmitted signal energy Es must be increased toachieve the same as M =4.

    52

    mind

    mind

  • 7/27/2019 Binary Detection

    53/80

    2012/2013 Meixia Tao @ SJ TU 53

    Error Performance of MPSK

    For large M, doubling thenumber of phases requires anadditional 6dB/bit to achievethe same performance

    4dB 5dB 6dB

    M ary Quadrature Amplitude Modulation

  • 7/27/2019 Binary Detection

    54/80

    2012/2013 Meixia Tao @ SJ TU 54

    M-ary Quadrature Amplitude Modulation

    (MQAM)

    In an M-ary PSK system, in-phase and quadraturecomponents are interrelated in such a way that theenvelope is constant (circular constellation). If werelax this constraint, we get M-ary QAM.

    Signal set:

    E0 is the energy of the signal with the lowest amplitude

    ai, bi are a pair of independent integers

  • 7/27/2019 Binary Detection

    55/80

    2012/2013 Meixia Tao @ SJ TU 55

    MQAM (contd)

    Basis functions:

    Signal space representation

  • 7/27/2019 Binary Detection

    56/80

    2012/2013 Meixia Tao @ SJ TU 56

    MQAM Signal Constellation

    Square lattice

    Can be related with two L-ary ASK in in-phase andquadrature components, respectively, where M = L2

    1 3 5 7

  • 7/27/2019 Binary Detection

    57/80

    2012/2013 Meixia Tao @ SJ TU

    Error Performance of MQAM

    It can be shown that the symbol error probability ofMQAM is tightly upper bounded as

    Exercise: From the above expression, determine the increasein the average energy per bit Eb required to maintain the sameerror performance if the number of bits per symbol is increased

    from k to k+1, where k is large.

    57

    0

    34

    ( 1)

    b

    e

    kEP Q

    M N

    (for )2kM =

    M ary Frequency Shift Keying (MFSK) or

  • 7/27/2019 Binary Detection

    58/80

    2012/2013 Meixia Tao @ SJ TU 58

    M-ary Frequency-Shift Keying (MFSK) or

    Multitone Signaling

    Signal set:

    where

    As a measure of similarity between a pair of signalwaveforms, we define the correlation coefficients

  • 7/27/2019 Binary Detection

    59/80

    2012/2013 Meixia Tao @ SJ TU 59

    MFSK (contd)

    For orthogonality, minimum frequency separationbetween successive frequencies is 1/(2T)

    1

    0.715/T

  • 7/27/2019 Binary Detection

    60/80

    2012/2013 Meixia Tao @ SJ TU

    M-ary orthogonal FSK has a geometric presenation as MM-dim orthogonal vectors, given as

    The basis functions are

    60

    ( )0 , 0, 0, , 0sE=s

    ( )1 0, , 0, , 0sE=s

    ( )1 0, 0, , 0,M sE =s

    ( )2

    cos2m c

    f m f tT

    = +

  • 7/27/2019 Binary Detection

    61/80

    2012/2013 Meixia Tao @ SJ TU 61

    Error Performance of MFSK

  • 7/27/2019 Binary Detection

    62/80

    2012/2013 Meixia Tao @ SJ TU 62

    Notes on Error Probabil ity Calculations

    Pe is found by integrating conditional probability oferror over the decision region

    Difficult for multi-dimensions

    Can be simplified using union bound (see ch07)

    Pe depends only on the distance profile of signalconstellation

  • 7/27/2019 Binary Detection

    63/80

    2012/2013 Meixia Tao @ SJ TU 63

    Example #2

    The 16-QAM signal constellation shown below is aninternational standard for telephone-line modems (calledV.29).

    a) Determine the optimum decision

    boundaries for the detectorb) Derive the union bound of the

    probability of symbol errorassuming that the SNR issufficiently high so that errors

    only occur between adjacentpoints

    c) Specify a Gray code for this 16-QAM V.29 signal constellation

  • 7/27/2019 Binary Detection

    64/80

  • 7/27/2019 Binary Detection

    65/80

    2012/2013 Meixia Tao @ SJ TU 65

    Bit Error Rate with Gray Coding

    Gray coding is a bit-to-symbol mapping When going from one symbol to an adjacent

    symbol, only one bit out of the k bits changes

    An error between adjacent symbol pairs results inone and only one bit error.

  • 7/27/2019 Binary Detection

    66/80

    2012/2013 Meixia Tao @ SJ TU 66

    Example: Gray Code for QPSK

    0001

    11 10

  • 7/27/2019 Binary Detection

    67/80

    2012/2013 Meixia Tao @ SJ TU 67

    Bit Error Rate for MPSK and MFSK

    For MPSK with gray coding An error between adjacent symbol will most likely occur

    Thus, bit error probability can be approximated by

    For MFSK When an error occurs anyone of the other symbols may result

    equally likely.

    On average, therefore, half of the bits will be incorrect. That is k/2bits every k bits will on average be in error when there is a symbol

    error Thus, the probability of bit error is approximately halfthe symbol

    error

    eb PP2

    1

    8 4 Comparison of M-ary Modulation

  • 7/27/2019 Binary Detection

    68/80

    2012/2013 Meixia Tao @ SJ TU 68

    8.4 Comparison of M ary Modulation

    Techniques

    Channel bandwidth and transmit power are twoprimary communication resources and have to beused as efficient as possible

    Power utilization efficiency (energy efficiency):

    measured by the required Eb/No to achieve acertain bit error probability

    Spectrum utilization efficiency (bandwidthefficiency): measured by the achievable data rate

    per unit bandwidth Rb/B It is always desired to maximize bandwidth

    efficiency at a minimal required Eb/No

    Example # 3

  • 7/27/2019 Binary Detection

    69/80

    2012/2013 Meixia Tao @ SJ TU 69

    Example # 3

    Suppose you are a system engineerin Huawei, designing a part of thecommunication systems. You are required to design three systems as follow:

    I. An ul tra-wideband system. This system can use a large of amount ofbandwidth to communicate. But the band it uses is overlaying with the othercommunication system. The main purpose of deploying this system is toprovide high data rates.

    II. A wireless remote control system designated for controlling devicesremotely under unlicensed band.

    III. A fixed wireless system.The transmitters and receivers are mounted in afixed position with power supply. This system is to support voice and dataconnections in the rural areas. This system works under licensed band.

    You are only required to design a modulation scheme for each of the abovesystems. You are allowed to use MFSK, MPSK and MQAM only. You alsoneed to state the modulation level. For simplicity, the modulation level shouldbe chosen from M=[Low, Medium, High]. J ustify your answers.

    (Hints: Federal Communications Commission (FCC) has a power spectraldensity limit in unlicensed band. It is meant that if your system works underunlicensed band, the power cannot be larger than a limit.)

    Energy Efficiency Comparison

  • 7/27/2019 Binary Detection

    70/80

    2012/2013 Meixia Tao @ SJ TU 70

    e gy c e cy Co pa so

    MFSK MPSK

  • 7/27/2019 Binary Detection

    71/80

    2012/2013 Meixia Tao @ SJ TU71

    Energy Efficiency Comparison (contd)

    MFSK: At fixed Eb/No, increase M can provide an improvement

    on Pb

    At fixed Pb increase M can provide a reduction in theE

    b/N

    orequirement

    MPSK

    BPSK and QPSK have the same energy efficiency

    At fixed Eb/No, increase M degrades Pb

    At fixed Pb, increase M increases the Eb/Norequirement

    MFSK is more energy efficient than MPSK

    B d idth Effi i C i

  • 7/27/2019 Binary Detection

    72/80

    2012/2013 Meixia Tao @ SJ TU

    Bandwidth Efficiency Comparison

    To compare bandwidth efficiency, we need to know thepower spectral density (power spectra) of a givenmodulation scheme

    MPSK/MQAM

    If is rectangular, the bandwidth of mainlope is

    If it has a raised cosine spectrum, the bandwidth is

    Spectrumshaping filter

    Inputdata

    Signal pointmapper

    Spectrumshaping filter

    +MPSK/MQAM

    signal

    B d idth Effi i C i ( td)

  • 7/27/2019 Binary Detection

    73/80

    2012/2013 Meixia Tao @ SJ TU

    Bandwidth Efficiency Comparison (contd)

    In general, bandwidth required to pass MPSK/MQAM signalis approximately given by

    But

    Then bandwidth efficiency may be expressed as

    73

    = bit rate

    (bits/sec/Hz)

    B d idth Effi i C i ( td)

  • 7/27/2019 Binary Detection

    74/80

    2012/2013 Meixia Tao @ SJ TU74

    MFSK:

    Bandwidth required to transmit MFSK signal is

    Bandwidth efficiency of MFSK signal

    Bandwidth Efficiency Comparison (contd)

    (Adjacent frequencies need to be separatedby 1/2T to maintain orthogonality)

    (bits/s/Hz)

    M 2 4 8 16 32 64

    1 1 0.75 0.5 0.3125 0.1875(bits/s/Hz)

    As M increases, bandwidth efficiency of MPSK/MQAM increases, butbandwidth efficiency of MFSK decreases.

    Fundamental Tradeoff :

  • 7/27/2019 Binary Detection

    75/80

    2012/2013 Meixia Tao @ SJ TU75

    Fundamental Tradeoff :Bandwidth Efficiency and Energy Efficiency

    To see the ultimate power-bandwidth tradeoff, we need touse Shannons channel capacity theorem:

    Channel Capacity is the theoretical upper bound for the maximumrate at which information could be transmitted without error(Shannon 1948)

    For a bandlimited channel corrupted by AWGN, the maximum rateachievable is given by

    Note that

    Thus

    )1(log)1(log0

    22BN

    PBSNRBCR s+=+=

    R

    BSNR

    BRN

    BP

    RN

    P

    N

    TP

    N

    Esssb

    ====0000

    )12( /

    0

    = BRbR

    B

    N

    E

    Power-Bandwidth Tradeoff

  • 7/27/2019 Binary Detection

    76/80

    2012/2013 Meixia Tao @ SJ TU76

    Power-Bandwidth TradeoffCapacity boundary

    with R = C

    UnachievableRegion with R > C

    Shannon

    limit

    N t th F d t l T d ff

  • 7/27/2019 Binary Detection

    77/80

    2012/2013 Meixia Tao @ SJ TU77

    Notes on the Fundamental Tradeoff

    In the limits as R/B goes to 0, we get

    This value is called the Shannon Limit

    Received Eb/N0 must be >-1.6dB for reliable communicationsto be possible

    BPSK and QPSK require the same Eb/N0 of 9.6 dB to achievePe=10

    -5. However, QPSK has a better bandwidth efficiency,which is why QPSK is so popular

    MQAM is superior to MPSK

    MPSK/MQAM increases bandwidth efficiency at the cost oflower energy efficiency

    MFSK trades energy efficiency at reduced bandwidth efficiency.

    S t D i T d ff

  • 7/27/2019 Binary Detection

    78/80

    2012/2013 Meixia Tao @ SJ TU78

    System Design Tradeoff

    Power Limited Systems:Powerscarce

    but bandwidth available

    Bandwidth Limited Systems:

    Bandwidth scarce

    Power available

    Which

    Modulation

    to Use?

    Example # 3

  • 7/27/2019 Binary Detection

    79/80

    2012/2013 Meixia Tao @ SJ TU79

    p

    Suppose you are a system engineerin Huawei, designing a part of thecommunication systems. You are required to design three systems as follow:

    I. An ul tra-wideband system. This system can use a large of amount ofbandwidth to communicate. But the band it uses is overlaying with the othercommunication system. The main purpose of deploying this system is toprovide high data rates.

    II. A wireless remote control system designated for controlling devicesremotely under unlicensed band.

    III. A fixed wireless system.The transmitters and receivers are mounted in a

    fixed position with power supply. This system is to support voice and dataconnections in the rural areas. This system works under licensed band.

    You are only required to design a modulation scheme for each of the abovesystems. You are allowed to use MFSK, MPSK and MQAM only. You alsoneed to state the modulation level. For simplicity, the modulation level shouldbe chosen from M=[Low, Medium, High]. J ustify your answers.

    (Hints: Federal Communications Commission (FCC) has a power spectraldensity limit in unlicensed band. It is meant that if your system works underunlicensed band, the power cannot be larger than a limit.)

    Practical Applications

  • 7/27/2019 Binary Detection

    80/80

    Practical Applications

    BPSK:

    WLAN IEEE802.11b (1 Mbps)

    QPSK:

    WLAN IEEE802.11b (2 Mbps, 5.5 Mbps, 11 Mbps)

    3G WDMA

    DVB-T (with OFDM)

    QAM

    Telephone modem (16QAM)

    Downstream of Cable modem (64QAM, 256QAM)

    WLAN IEEE802.11a/g (16QAM for 24Mbps, 36Mbps; 64QAM for 38Mbpsand 54 Mbps)

    LTE Cellular Systems

    FSK:

    Cordless telephone

    Paging system