Upload
manu-viswanadhan
View
227
Download
0
Embed Size (px)
Citation preview
7/27/2019 Binary Detection
1/80
7/27/2019 Binary Detection
2/80
2012/2013 Meixia Tao @ SJ TU 2
Topics to be Covered
Binary digital modulation
M-ary digital modulation
Tradeoff study
data basebandDigital
modulator
Bandpasschannel
Digitaldemodulator
BPFdetector
Noise
7/27/2019 Binary Detection
3/80
2012/2013 Meixia Tao @ SJ TU 3
Digital Modulation
The message signal is transmitted by a sinusoidal carrierwave
In digital communications, the modulation processcorresponds to switching or keying the amplitude, frequency,
or phase of the carrier in accordance with the incomingdigital data
Three basic digital modulation techniques Amplitude-shift keying (ASK) - special case of AM
Frequency-shift keying (FSK) - special case of FM Phase-shift keying (PSK) - special case of PM
Will use signal space approach in receiver design andperformance analysis
7/27/2019 Binary Detection
4/80
2012/2013 Meixia Tao @ SJ TU 4
8.1 Binary Modulation Types
In binary signaling, the modulator produces one oftwodistinct signals in response to 1 bit of source data at atime.
Binary modulation types
Binary PSK (BPSK)
Binary FSK
Binary ASK
7/27/2019 Binary Detection
5/80
2012/2013 Meixia Tao @ SJ TU 5
Binary Phase-Shift Keying (BPSK)
Modulation
, , bit duration
: carrier frequency, chosen to be for some fixedinteger or
: transmitted signal energy per bit, i.e.
The pair of signals differ only in a relative phase shift of 180degrees
0 1 1 0 1 0 0 1
1
0
1 /c bf T>>
7/27/2019 Binary Detection
6/80
2012/2013 Meixia Tao @ SJ TU 6
Clearly, there is one basis function of unit energy
Then
A binary PSK system is therefore characterized by havinga signal space that is one-dimensional (i.e. N=1), and with
two message points (i.e. M = 2)
Signal Space Representation for
BPSK
s1s20
7/27/2019 Binary Detection
7/80
2012/2013 Meixia Tao @ SJ TU 7
Decision Rule of BPSK
Assume that the two signals are equally likely, i.e. P(s1) =P(s2) = 0.5. Then the optimum decision boundary is themidpoint of the line joining these two message points
Decision rule:
Guess signal s1(t) (or binary 1) was transmitted if thereceived signal point r falls in region R1
Guess signal s2(t) (or binary 0) was transmitted otherwise
s1s2
Region R1Region R2
0
7/27/2019 Binary Detection
8/80
7/27/2019 Binary Detection
9/80
2012/2013 Meixia Tao @ SJ TU 9
Recall ML decision criterion:
Thus
And
Finally
Choose s1> r
2
When r1< r
2, r falls inside region R2 and the receiver decides in
favor ofs2
Message point
Messagepoint
Decision boundary
R1
R2
7/27/2019 Binary Detection
18/80
2012/2013 Meixia Tao @ SJ TU 18
Probability of Error for Binary FSK
Given that s1 is transmitted,
Since the condition r1< r
2corresponds to the receiver
making a decision in favor of symbol s2, the conditional
probability of error given s1 is transmitted is given by
Define a new random variable
Since n1 and n2 are i.i.d with
Thus, n is also Gaussian with
and
7/27/2019 Binary Detection
19/80
2012/2013 Meixia Tao @ SJ TU 19
By symmetry
Since the two signals are equally likely to betransmitted, the average probability of error forcoherent binary FSKis
3 dB worse than BPSK
i.e. to achieve the same Pe, BFSK needs 3dB moretransmission power than BPSK
7/27/2019 Binary Detection
20/80
2012/2013 Meixia Tao @ SJ TU 20
Binary FSK Transmitter
On-off signalling form
0
1
7/27/2019 Binary Detection
21/80
2012/2013 Meixia Tao @ SJ TU 21
Coherent Binary FSK Receiver
bT
dt0
bT
dt0
Decision
Device+
Choose 1 ifl>0
Choose 0 otherwise
+
-
7/27/2019 Binary Detection
22/80
2012/2013 Meixia Tao @ SJ TU 22
Binary ASK
Modulation
Average energy per bit
0 1 1 0 1 0 0 1
(On-off signalling)
1
0
s1s2
Region R1Region R2
0
7/27/2019 Binary Detection
23/80
2012/2013 Meixia Tao @ SJ TU 23
Probability of Error for Binary ASK
Average probability of error is
Exercise: Prove Pe
Identical to that of coherent binary FSK
7/27/2019 Binary Detection
24/80
2012/2013 Meixia Tao @ SJ TU 24
Probability of Error and the Distance
Between Signals
These expressions illustrate the dependence of the error
probability on the distance between two signal points. Ingeneral,
BPSK BFSK BASK
7/27/2019 Binary Detection
25/80
2012/2013 Meixia Tao @ SJ TU 25
0 2 4 6 8 10 12 1410
-7
10-6
10-5
10-4
10-3
10-2
10-1
100
Eb/No in [dB]
Probability
ofBitError
PSK
ASK/FSK
3dB
Probability of Error Curve for BPSK and FSK/ASK
e.g.
7/27/2019 Binary Detection
26/80
2012/2013 Meixia Tao @ SJ TU 26
Example #1
Binary data are transmitted over a microwave linkat the rate of106 bits/sec and the PSD of thenoise at the receiver input is 10-10 watts/Hz.
a) Find the average carrier power required tomaintain an average probability of errorfor coherent binary FSK.
b) Repeat the calculation in a) for noncoherent
binary FSK
7/27/2019 Binary Detection
27/80
2012/2013 Meixia Tao @ SJ TU 2727
We have discussed
Coherent modulation schemes, .e.g.
BPSK, BFSK, BASK They needs coherent detection,
assuming that the receiver is able todetect and track the carrier wavesphase
Update
We now consider:
Non-coherent detection on binary FSK
Differential phase-shift keying (DPSK)
In many practical situations, strict phasesynchronization is not possible. In thesesituations, non-coherent reception is required.
7/27/2019 Binary Detection
28/80
2012/2013 Meixia Tao @ SJ TU 28
8.2: Non-coherent scheme: BFSK
Consider a binary FSK system, the two signals are
Where and are unknown random phases withuniform distribution
7/27/2019 Binary Detection
29/80
2012/2013 Meixia Tao @ SJ TU 29
Signal Space Representation
No matter what the two phases are, the signalscan be expressed as a linear combination of thefour basis functions
Signal space representation
7/27/2019 Binary Detection
30/80
2012/2013 Meixia Tao @ SJ TU 30
Correlating the received signal r(t) with the four basis
functions produces the vector representation of thereceived signal
Detector
7/27/2019 Binary Detection
31/80
2012/2013 Meixia Tao @ SJ TU 31
Decision Rule for Non-coherent FSK
ML criterion, assume P(s1) = P(s2):
Conditional pdf
Similarly,
Choose s1>envelop detector
Carrier phase is irrelevant in decision making
7/27/2019 Binary Detection
35/80
2012/2013 Meixia Tao @ SJ TU 35
Structure of Non-Coherent Receiver for
Binary FSK
It can be shown that
Comparator
(selectthelargest)
(For detailed proof, see Section 10.4.2 in the textbook )
7/27/2019 Binary Detection
36/80
2012/2013 Meixia Tao @ SJ TU 36
Performance Comparison Between coherent
FSK and Non-Coherent FSK
0 2 4 6 8 10 12 1410
-7
10-6
10
-5
10-4
10-3
10-2
10-1
10
0
Eb/No in [dB]
P
robability
ofBit
Error
BPSK
ASK/FSK
NC FSK
DPSK
7/27/2019 Binary Detection
37/80
2012/2013 Meixia Tao @ SJ TU 37
Differential PSK (DPSK)
DPSK can be viewed as the non-coherent versionof PSK.
Phase synchronization is eliminated using
differential encoding Encoding the information in phase difference
between successive signal transmission
In effect:
to send 0, we phase advance the current signalwaveform by 1800 ;
to send 1, we leave the phase unchanged
7/27/2019 Binary Detection
38/80
2012/2013 Meixia Tao @ SJ TU 38
DPSK (contd)
Provided that the unknown phase contained inthe received wave varies slowly (constant over twobit intervals), the phase difference betweenwaveforms received in two successive bit interval
will be independent of
7/27/2019 Binary Detection
39/80
2012/2013 Meixia Tao @ SJ TU 39
Generation of DPSK signal
We can generate DPSK signals by combining two basicoperations
Differential encoding of the information binary bits
Phase shift keying
The differential encoding process starts with an arbitraryfirst bit, serving as reference
Let {mi}be input information binary bit sequence, {di}bethe differentially encoded bit sequence
If the incoming bit miis 1, leave the symbol d
iunchanged
with respect to the previous bit di-1 If the incoming bit mi is 0, change the symbol di with respect
to the previous bit di-1
7/27/2019 Binary Detection
40/80
2012/2013 Meixia Tao @ SJ TU 40
Illustration
The reference bit is chosen arbitrary, here taken as 1
DPSK transmitter diagram
1 0 0 1 0 0 1 1Binary data
1 1 0 1 1 0 1 1 1
0 0 0 0 0 0 0
Initial bit
Differentiallyencoded
binary data
TransmittedPhase
mi
di___________
1 iii mdd =
7/27/2019 Binary Detection
41/80
2012/2013 Meixia Tao @ SJ TU 41
Differential Detection of DPSK Signals
Multiply the received DPSK signal with its delayed version
Output of integrator (assume noise free)
The unknown phase becomes irrelevant
If = 0 (bit 1), the integrator outputy is positive
if = (bit 0), the integrator output y is negative
Decision
device
bT
dt0
Threshold of
zero volts
Choose 1 ifl >0
Otherwise choose 0
Delay
Tb
7/27/2019 Binary Detection
42/80
2012/2013 Meixia Tao @ SJ TU 42
Error Probability of DPSK
The differential detector is suboptimal in the senseof error performance
It can be shown that
7/27/2019 Binary Detection
43/80
2012/2013 Meixia Tao @ SJ TU 43
Summary of Pe for Different Binary
Modulations
Coherent PSK
Coherent ASK
Coherent FSK
Non-Coherent FSK
DPSK
7/27/2019 Binary Detection
44/80
2012/2013 Meixia Tao @ SJ TU 44
0 2 4 6 8 10 12 1410
-7
10-6
10-5
10-4
10
-3
10-2
10-1
100
Eb/No in [dB]
Probability
of
BitError
BPSK(QPSK)
ASK/FSK
NC FSK
DPSK
Pe Plots for Different Binary Modulations
7/27/2019 Binary Detection
45/80
2012/2013 Meixia Tao @ SJ TU 45
We have discussed binary case
Coherent modulation techniques:
BPSK, BFSK, BASK
Noncoherent modulation techniques:
Non-coherent FSK, DPSK
Update
We now consider:
M-ary modulation techniques
MPSK
MQAM
MFSK
7/27/2019 Binary Detection
46/80
2012/2013 Meixia Tao @ SJ TU 46
8.3 M-ary Modulation Techniques
In binary data transmission, send only one of two possiblesignals during each bit intervalTb
In M-ary data transmission, send one ofM possible signalsduring each signaling intervalT
In almost all applications, M = 2
n
andT = nTb, where n isan integer
Each of the M signals is called a symbol
These signals are generated by changing the amplitude,
phase or frequency of a carrier in M discrete steps. Thus, we have M-ary ASK, M-ary PSK, and M-ary FSK
digital modulation schemes
7/27/2019 Binary Detection
47/80
2012/2013 Meixia Tao @ SJ TU 47
Binary is a special case of M-ary
Another way of generating M-ary signals is tocombine different methods of modulation intohybrid forms
For example, we may combine discrete changesin both the amplitude and phase of a carrier to
produce M-ary amplitude phase keying. A specialform of this hybrid modulation is M-ary QAM(MQAM)
7/27/2019 Binary Detection
48/80
7/27/2019 Binary Detection
49/80
2012/2013 Meixia Tao @ SJ TU 49
MPSK (contd)
Signal space representation
7/27/2019 Binary Detection
50/80
2012/2013 Meixia Tao @ SJ TU 50
MPSK Signal Constellations
BPSK QPSK 8PSK 16PSK
7/27/2019 Binary Detection
51/80
2012/2013 Meixia Tao @ SJ TU
The Euclidean distance between any two signal points in theconstellation is
The minimum Euclidean distance is
dmin plays an important role in determining error performance asdiscussed previously (union bound)
In the case of PSK modulation, the error probability is dominated bythe erroneous selection of either one of the two signal points adjacent
to the transmitted signal point. Consequently, an approximation to the symbol error probability is
51
2 ( )
2 1 cosmn m n sm n
d E M
= =
s s
min
22 1 cos 2 sin
s sd E EM M
= =
min
0
/ 22 2 2 sin
/ 2MPSK s
dP Q Q E
MN
=
7/27/2019 Binary Detection
52/80
2012/2013 Meixia Tao @ SJ TU
Exercise
Consider the M=2, 4, 8 PSK signal constellations.All have the same transmitted signal energy Es.
Determine the minimum distance betweenadjacent signal points
For M=8, determine by how many dB thetransmitted signal energy Es must be increased toachieve the same as M =4.
52
mind
mind
7/27/2019 Binary Detection
53/80
2012/2013 Meixia Tao @ SJ TU 53
Error Performance of MPSK
For large M, doubling thenumber of phases requires anadditional 6dB/bit to achievethe same performance
4dB 5dB 6dB
M ary Quadrature Amplitude Modulation
7/27/2019 Binary Detection
54/80
2012/2013 Meixia Tao @ SJ TU 54
M-ary Quadrature Amplitude Modulation
(MQAM)
In an M-ary PSK system, in-phase and quadraturecomponents are interrelated in such a way that theenvelope is constant (circular constellation). If werelax this constraint, we get M-ary QAM.
Signal set:
E0 is the energy of the signal with the lowest amplitude
ai, bi are a pair of independent integers
7/27/2019 Binary Detection
55/80
2012/2013 Meixia Tao @ SJ TU 55
MQAM (contd)
Basis functions:
Signal space representation
7/27/2019 Binary Detection
56/80
2012/2013 Meixia Tao @ SJ TU 56
MQAM Signal Constellation
Square lattice
Can be related with two L-ary ASK in in-phase andquadrature components, respectively, where M = L2
1 3 5 7
7/27/2019 Binary Detection
57/80
2012/2013 Meixia Tao @ SJ TU
Error Performance of MQAM
It can be shown that the symbol error probability ofMQAM is tightly upper bounded as
Exercise: From the above expression, determine the increasein the average energy per bit Eb required to maintain the sameerror performance if the number of bits per symbol is increased
from k to k+1, where k is large.
57
0
34
( 1)
b
e
kEP Q
M N
(for )2kM =
M ary Frequency Shift Keying (MFSK) or
7/27/2019 Binary Detection
58/80
2012/2013 Meixia Tao @ SJ TU 58
M-ary Frequency-Shift Keying (MFSK) or
Multitone Signaling
Signal set:
where
As a measure of similarity between a pair of signalwaveforms, we define the correlation coefficients
7/27/2019 Binary Detection
59/80
2012/2013 Meixia Tao @ SJ TU 59
MFSK (contd)
For orthogonality, minimum frequency separationbetween successive frequencies is 1/(2T)
1
0.715/T
7/27/2019 Binary Detection
60/80
2012/2013 Meixia Tao @ SJ TU
M-ary orthogonal FSK has a geometric presenation as MM-dim orthogonal vectors, given as
The basis functions are
60
( )0 , 0, 0, , 0sE=s
( )1 0, , 0, , 0sE=s
( )1 0, 0, , 0,M sE =s
( )2
cos2m c
f m f tT
= +
7/27/2019 Binary Detection
61/80
2012/2013 Meixia Tao @ SJ TU 61
Error Performance of MFSK
7/27/2019 Binary Detection
62/80
2012/2013 Meixia Tao @ SJ TU 62
Notes on Error Probabil ity Calculations
Pe is found by integrating conditional probability oferror over the decision region
Difficult for multi-dimensions
Can be simplified using union bound (see ch07)
Pe depends only on the distance profile of signalconstellation
7/27/2019 Binary Detection
63/80
2012/2013 Meixia Tao @ SJ TU 63
Example #2
The 16-QAM signal constellation shown below is aninternational standard for telephone-line modems (calledV.29).
a) Determine the optimum decision
boundaries for the detectorb) Derive the union bound of the
probability of symbol errorassuming that the SNR issufficiently high so that errors
only occur between adjacentpoints
c) Specify a Gray code for this 16-QAM V.29 signal constellation
7/27/2019 Binary Detection
64/80
7/27/2019 Binary Detection
65/80
2012/2013 Meixia Tao @ SJ TU 65
Bit Error Rate with Gray Coding
Gray coding is a bit-to-symbol mapping When going from one symbol to an adjacent
symbol, only one bit out of the k bits changes
An error between adjacent symbol pairs results inone and only one bit error.
7/27/2019 Binary Detection
66/80
2012/2013 Meixia Tao @ SJ TU 66
Example: Gray Code for QPSK
0001
11 10
7/27/2019 Binary Detection
67/80
2012/2013 Meixia Tao @ SJ TU 67
Bit Error Rate for MPSK and MFSK
For MPSK with gray coding An error between adjacent symbol will most likely occur
Thus, bit error probability can be approximated by
For MFSK When an error occurs anyone of the other symbols may result
equally likely.
On average, therefore, half of the bits will be incorrect. That is k/2bits every k bits will on average be in error when there is a symbol
error Thus, the probability of bit error is approximately halfthe symbol
error
eb PP2
1
8 4 Comparison of M-ary Modulation
7/27/2019 Binary Detection
68/80
2012/2013 Meixia Tao @ SJ TU 68
8.4 Comparison of M ary Modulation
Techniques
Channel bandwidth and transmit power are twoprimary communication resources and have to beused as efficient as possible
Power utilization efficiency (energy efficiency):
measured by the required Eb/No to achieve acertain bit error probability
Spectrum utilization efficiency (bandwidthefficiency): measured by the achievable data rate
per unit bandwidth Rb/B It is always desired to maximize bandwidth
efficiency at a minimal required Eb/No
Example # 3
7/27/2019 Binary Detection
69/80
2012/2013 Meixia Tao @ SJ TU 69
Example # 3
Suppose you are a system engineerin Huawei, designing a part of thecommunication systems. You are required to design three systems as follow:
I. An ul tra-wideband system. This system can use a large of amount ofbandwidth to communicate. But the band it uses is overlaying with the othercommunication system. The main purpose of deploying this system is toprovide high data rates.
II. A wireless remote control system designated for controlling devicesremotely under unlicensed band.
III. A fixed wireless system.The transmitters and receivers are mounted in afixed position with power supply. This system is to support voice and dataconnections in the rural areas. This system works under licensed band.
You are only required to design a modulation scheme for each of the abovesystems. You are allowed to use MFSK, MPSK and MQAM only. You alsoneed to state the modulation level. For simplicity, the modulation level shouldbe chosen from M=[Low, Medium, High]. J ustify your answers.
(Hints: Federal Communications Commission (FCC) has a power spectraldensity limit in unlicensed band. It is meant that if your system works underunlicensed band, the power cannot be larger than a limit.)
Energy Efficiency Comparison
7/27/2019 Binary Detection
70/80
2012/2013 Meixia Tao @ SJ TU 70
e gy c e cy Co pa so
MFSK MPSK
7/27/2019 Binary Detection
71/80
2012/2013 Meixia Tao @ SJ TU71
Energy Efficiency Comparison (contd)
MFSK: At fixed Eb/No, increase M can provide an improvement
on Pb
At fixed Pb increase M can provide a reduction in theE
b/N
orequirement
MPSK
BPSK and QPSK have the same energy efficiency
At fixed Eb/No, increase M degrades Pb
At fixed Pb, increase M increases the Eb/Norequirement
MFSK is more energy efficient than MPSK
B d idth Effi i C i
7/27/2019 Binary Detection
72/80
2012/2013 Meixia Tao @ SJ TU
Bandwidth Efficiency Comparison
To compare bandwidth efficiency, we need to know thepower spectral density (power spectra) of a givenmodulation scheme
MPSK/MQAM
If is rectangular, the bandwidth of mainlope is
If it has a raised cosine spectrum, the bandwidth is
Spectrumshaping filter
Inputdata
Signal pointmapper
Spectrumshaping filter
+MPSK/MQAM
signal
B d idth Effi i C i ( td)
7/27/2019 Binary Detection
73/80
2012/2013 Meixia Tao @ SJ TU
Bandwidth Efficiency Comparison (contd)
In general, bandwidth required to pass MPSK/MQAM signalis approximately given by
But
Then bandwidth efficiency may be expressed as
73
= bit rate
(bits/sec/Hz)
B d idth Effi i C i ( td)
7/27/2019 Binary Detection
74/80
2012/2013 Meixia Tao @ SJ TU74
MFSK:
Bandwidth required to transmit MFSK signal is
Bandwidth efficiency of MFSK signal
Bandwidth Efficiency Comparison (contd)
(Adjacent frequencies need to be separatedby 1/2T to maintain orthogonality)
(bits/s/Hz)
M 2 4 8 16 32 64
1 1 0.75 0.5 0.3125 0.1875(bits/s/Hz)
As M increases, bandwidth efficiency of MPSK/MQAM increases, butbandwidth efficiency of MFSK decreases.
Fundamental Tradeoff :
7/27/2019 Binary Detection
75/80
2012/2013 Meixia Tao @ SJ TU75
Fundamental Tradeoff :Bandwidth Efficiency and Energy Efficiency
To see the ultimate power-bandwidth tradeoff, we need touse Shannons channel capacity theorem:
Channel Capacity is the theoretical upper bound for the maximumrate at which information could be transmitted without error(Shannon 1948)
For a bandlimited channel corrupted by AWGN, the maximum rateachievable is given by
Note that
Thus
)1(log)1(log0
22BN
PBSNRBCR s+=+=
R
BSNR
BRN
BP
RN
P
N
TP
N
Esssb
====0000
)12( /
0
= BRbR
B
N
E
Power-Bandwidth Tradeoff
7/27/2019 Binary Detection
76/80
2012/2013 Meixia Tao @ SJ TU76
Power-Bandwidth TradeoffCapacity boundary
with R = C
UnachievableRegion with R > C
Shannon
limit
N t th F d t l T d ff
7/27/2019 Binary Detection
77/80
2012/2013 Meixia Tao @ SJ TU77
Notes on the Fundamental Tradeoff
In the limits as R/B goes to 0, we get
This value is called the Shannon Limit
Received Eb/N0 must be >-1.6dB for reliable communicationsto be possible
BPSK and QPSK require the same Eb/N0 of 9.6 dB to achievePe=10
-5. However, QPSK has a better bandwidth efficiency,which is why QPSK is so popular
MQAM is superior to MPSK
MPSK/MQAM increases bandwidth efficiency at the cost oflower energy efficiency
MFSK trades energy efficiency at reduced bandwidth efficiency.
S t D i T d ff
7/27/2019 Binary Detection
78/80
2012/2013 Meixia Tao @ SJ TU78
System Design Tradeoff
Power Limited Systems:Powerscarce
but bandwidth available
Bandwidth Limited Systems:
Bandwidth scarce
Power available
Which
Modulation
to Use?
Example # 3
7/27/2019 Binary Detection
79/80
2012/2013 Meixia Tao @ SJ TU79
p
Suppose you are a system engineerin Huawei, designing a part of thecommunication systems. You are required to design three systems as follow:
I. An ul tra-wideband system. This system can use a large of amount ofbandwidth to communicate. But the band it uses is overlaying with the othercommunication system. The main purpose of deploying this system is toprovide high data rates.
II. A wireless remote control system designated for controlling devicesremotely under unlicensed band.
III. A fixed wireless system.The transmitters and receivers are mounted in a
fixed position with power supply. This system is to support voice and dataconnections in the rural areas. This system works under licensed band.
You are only required to design a modulation scheme for each of the abovesystems. You are allowed to use MFSK, MPSK and MQAM only. You alsoneed to state the modulation level. For simplicity, the modulation level shouldbe chosen from M=[Low, Medium, High]. J ustify your answers.
(Hints: Federal Communications Commission (FCC) has a power spectraldensity limit in unlicensed band. It is meant that if your system works underunlicensed band, the power cannot be larger than a limit.)
Practical Applications
7/27/2019 Binary Detection
80/80
Practical Applications
BPSK:
WLAN IEEE802.11b (1 Mbps)
QPSK:
WLAN IEEE802.11b (2 Mbps, 5.5 Mbps, 11 Mbps)
3G WDMA
DVB-T (with OFDM)
QAM
Telephone modem (16QAM)
Downstream of Cable modem (64QAM, 256QAM)
WLAN IEEE802.11a/g (16QAM for 24Mbps, 36Mbps; 64QAM for 38Mbpsand 54 Mbps)
LTE Cellular Systems
FSK:
Cordless telephone
Paging system