WhatsApp Group Join Now
Telegram Join Join Now

DIGITAL MODULATION IN FREQUENCY SELECTIVE MOBILE CHANNELS , Irreducible Bit Error Rate (BER)

Irreducible Bit Error Rate (BER) and DIGITAL MODULATION IN FREQUENCY SELECTIVE MOBILE CHANNELS
(i) Irreducible Bit Error Rate (BER)
Frequency selective fading caused by multipath time delay causes interference which results in an irreducible BER floor for mobile systems. However, even if a mobile channel is not frequency selective, the time-varying Doppler spread due to motion creates an irreducible BER floor due to the random spectral spreading. These factors impose bounds on the data rate and BER that can be transmitted reliably over a frequency selective channel. Simulation is the major tool used for analyzing frequency fading effects.
It has been observed the performance of various modulation schemes in frequency selective fading channels through simulations. Both filtered and unfiltered BPSK, QPSK, and MSK modulation schemes were studied, and their BER curves were simulated as a function of the normalized rms delay spread
(d = ).
(ii) Cause of Irreducible BER
The irreducible error floor in a frequency selective channel is primarily caused by the errors due to the intersymbol interference, which interferes with the signal component at the receiver sampling instants. This occurs when
(a) main (undelayed) signal component is removed through multipath cancellation,
(b) a non-zero value of d causes ISI, or
(c) the sampling time of a receiver is shifted as a result of delay spread. It has been observed that errors in a frequency selective channel tend to be bursty. Based on the results of simulations, it is known that for small delay spreads (relative to the symbol duration), the resulting flat fading is the dominant cause of error bursts. For large delay spread, timing errors and ISI are the dominant error mechanisms.
Figure 11.11 shows the average irreducible BER as a function of d for different unfiltered modulation schemes using coherent detection. From the figure, it is seen that the BER performance of BPSK is the best among all the modulation schemes compared. This is because symbol offset interference does not exist in BPSK. Both OQPSK and MSK have a timing offset between two bit sequences, hence the cross-rail ISI is more severe, and their performances are similar to QPSK. Figure 11.11 shows the BER as a function of rms delay spread normalized to the bit period (d = ) rather than the symbol period as used in figure 11.11. By comparing on a bit, rather

FIGURE 11.11 The irreducible BER performance for different modulations with coherent detection for a chance with a Gaussian shaped power delay profile. The parameter d is the rms delay spread normalized by the symbol period
than symbol basis, it becomes easier to compare different modulations. This is done in figure 11.12, when it is clear that 4-level modulations (QPSK, OQPSK, and MSK) are more resistant to delay spread than BPSK for constant information throughout. Interestingly, 8-ary keying has been found to be less resistant than 4-ary keying, and this has led to the choice of 4-ary keyibng for many 2G and 3G wireless standards.
FIGURE 11.12 The same set of curves as plotted in Figure 11.7 plotted as a function of rms delay spread normalized by bit period
SUMMARY
■ Spread spectrum may be defined as a technique in which a transmitted signal occupies a bandwidth which is kept much larger than that which is required by a base band information signal.
■ The basic concept of spread spectrum has been illustrated in figure 17.1. Obviously, the idea is to take the energy in bandwidth B and spread it over the wider bandwidth BRF. As a matter of fact, three techniques are, generally used to accomplish this as under:
(i) Direct sequence pseudonoise (DSPN)
(ii) Frequency hopping (FM)
(iii) Time hopping (TH)
■ A combination of these techniques is also available for use. Pseudorandom (PN) codes are used to achieve spreading of the spectrum. Before we discus methods of generating these codes in detail, let us first consider the techniques for widening the spectrum of a signal.
■ One of the most common method to widen the spectrum of a signal is simply to multiply (i.e., modulate) it. by wideband signal. We will observe that the spreading signal must hive properties which aid in acquiring and tracking the signal.
■ The second method of spreading the message signal is accomplished by transmitting each bit or subinteger bit (chip) on a different carrier which is selected from a wide range of frequencies.
■ Time Hop Sreading is the third technique which is used for spreading the message signal spectrum. Time hop channelizes via time slots within a given time frame.
■ The spread spectrum communication spreads the transmitted (RF) signals over a bandwidth which is as larger as is practical. This results in an RF bandwidth which is 10 to 100 times the information signal bandwidth. Frequency hopping and direct sequence modulation are two principle spread spectrum techniques.
■ Time hopping implemented by OOK may be used with PSK and FSK to achieve hybrid spread-spectrum modulation.
■ The number of such sequences has an upper bound S expressed by
S £
The equal sign applies when L is a prime number. These independent sequences can he divided into two equal groups so that each number of one group has a mirror image in the other group. Mirror image sequence have the same hit-sequence when one is forward in time and the other is backward in time.
■ If the PN generator sequenced through all it’s states, then the number of states will be an even number and the sequence available at any Q or .
■ If the sequence is correlated with itself, the result is referred to as auto- correlation. If a sequence is correlated with another sequence, the result is known as cross correlation. It is often desirable to use normalized correlation in our computations. We define this as under:
p =
■ The discrete modulation of the carrier frequency is usually performed as a multiple level (M-ray) PSK or frequency shift (FSK) signal.
■ A disadvantages associated with 4-PSK is a reduction in efficiency of the transmitter power amplifier.
■ In order for the receiver to detect and demodulate the received signal, certain information must be known to the receiver. The information includes the following:

  • Existence of the signal mixed-up in the noise signal
  • Carrier frequency of the signal
  • Modulation type
  • PN code rate
  • The code phase (i.e., propagation time delay)

■ Our study of conventional communication techniques has acquainted us with TDM and CDMA provides a relatively new type of channel multiplexing in which many information channels can be established in the same frequency channel simultaneously without interference between channels.

SHORT QUESTIONS WITH ANSWERS
Q.1 Explain the concept of spread spectrum.
Ans. Pseudorandom (PN) codes are used to achieve spreading of the spectrum. Before we discuss methods of generating these codes in detail, let us first consider the techniques for widening the spectrum of a signal.
diagram
FIGURE 11.13 Illustration of the concept of Spread Spectrum
Q.2. What do you mean by frequency HOP spreading? Explain.
Ans. The second method of spreading the message signal is accomplished by transmitting each bit or subinteger hit (chip) on a different carrier which is selected from a wide range of frequencies.
The simplified arrangement has been shown in figure 11.14.
diagram
FIGURE 11.14 Frequency hopping modulation
Q.3. What are the three basic spread-spectrum techniques.
Ans. As a matter of fact, three techniques are, generally used to accomplish this as under:
(i) Direct sequence pseudonoise (DSPN)
(ii) Frequency hopping (FH)
(iii) Time hopping (TH)
Q.4. Explain Time Hop spreading?
Ans. Time Hop Sreading is the third technique which is used for spreading the message signal spectrum. Time hop channelizes via time slots within a given time frame. This contrast with frequency hoping, where channels are established via frequency slots. The basic tune hop modulator has been shown in figure 11.15.
diagram
FIGURE 11.15 Time hop modulation
QUESTIONS

  1. A true random waveform has no DC term. Why is there a DC term in the power density of the PN code ?
  2. (a) What are the sequences generated by the polynomials x5 + x4 + x3 + x2 + 1 and x5 + x4 + x2 + x + 1 ? Assume an initial conditions of (11111) in both cases.

(b) Compute the plot the autocorrelation function for each sequence in part (a).
(c) Compute and plot the cross-correlation function for the two sequences.
(d) Draw the circuit diagram for generating each of the sequences.

  1. A PN sequences is 1215 – 1 in length. How many runs of four is would be expected ?
  2. Explain the principles of spread spectrum.
  3. With the help of block diagram, explain frequency Hopping modulation.
  4. Explain about time Hop spreading.
  5. What do you mean by Burst transmission? Explain.
  6. Explain the generation of pseudorandom sequences.

APPENDICES
APPENDIX – A
DEFINITIONS
X(w) = F[x(t)] = (t) e-jwt dt
x(t) = F-1 [X(w)] = (w) e-jwt dw
Parseval’s theorems :
Table A.1 : Properties of the Fourier Transform

Propertyx(t)X(w)
Linearity
Time shifting
Scaling
Time reversal
Duality
Frequency shifting
Modulation
Time differentiation
Frequency differentiation

Integration

Convolution

Multiplication
a1x1(t) + a2x2(t)
x(t – t0)
x(at)
x(-t)
X(t)
x(t)ejw0t
x(t)cos w0t
x‘(t)
jtx(t)
(t) dt

x1(t) Ä x2(t)

x1(t) x2(t)
a1X1(w) +a2X2(w)
X(w)e-jwt0
X
X(-w)
2πx(-w)
X(w-w0)
[X(w-w0)+X(w+w0)]
jwX(w)
X'(w)
X(w) + πX(0) (w)
X1(w)X2(w)
X1(w) Ä X2(w)


Table A.2 : Properties of the Fourier Transform

x(t) X(w)
(t)
(t-t0)
1
u(t)
sgn(t)

ejw0t
cos w0t
sin w0t
e-at u(t) a > 0
te-at u(t) a > 0
e-at u(t) a > 0
e-t2j (2 2)

equation
equation
equation
1
e-jwt0
2π (w)
π (w) +

– j sin(w)
2π (w-w0)
π[ (w-w0) + (w +w0)]
-jπ[ (w-w0) – (w +w0)]




equation
equation
equation
-jsgn(w) X(w)


APPENDIX B
Bessel functions of the first kind of order n and argument β:
Generating Function and Definition
equation
equation
equation
Properties of Jn(mf)

  1. J-n (β) = (-J)n Jn (β)
  2. Jn-1 (β) + Jn+1 (β) = Jn(β)

Table B : 1 Selected Values of Jn(β)

n/β0.10.20.5125810
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
0.997
0.050
0.001
0.990
0.100
0.005
0.938
0.242
0.031
0.003
0.765
0.440
0.115
0.020
0.002
0.224
0.577
0.353
0.129
0.034
0.007
0.001
-0.178
-0.328
0.047
0.365
0.391
0.261
0.131
0.053
0.018
0.006
0.001
0.172
0.235
-0.113
-0.291
-0.105
0.286
0.338
0.321
0.224
0.126
0.061
0.026
0.010
0.003
0.001
-0.246
0.043
0.255
0.058
-0.220
-0.234
-0.014
0.217
0.318
0.208
0.208
0.123
0.063
0.029
0.012
0.005
0.002


APPENDIX C
The Complementary Error Function Q(z)
equation
Q(z) = Q(-z) = 1 -Q(z) z > 0
Q(z) = -erf (z)
erf(z) =
Q(z) = z > > (z > 4)
Table C.1 : Q(z)

zQ(z)zQ(z)zQ(z)zQ(z)
0.00
0.05
0.10
0.15
0.20
0.25
0.30
0.35
0.40
0.45
0.50
0.55
0.60
0.65
0.70
0.75
0.80
0.85
0.90
0.95
0.5000
0.4801
0.4602
0.4404
0.4207
0.4013
0.3821
0.3632
0.3446
0.3264
0.3085
0.2912
0.2743
0.2578
0.2420
0.2266
0.2169
0.1977
0.1841
0.1711
1.00
1.05
1.10
1.15
1.20
1.25
1.30
1.35
1.40
1.45
1.50
1.55
1.60
1.65
1.70
1.75
1.80
1.85
1.90
1.95
0.1587
0.1469
0.1357
0.1251
0.1151
0.1056
0.0968
0.0885
0.0808
0.0735
0.0668
0.0606
0.0548
0.0495
0.0446
0.0401
0.0359
0.0322
0.0287
0.0256
2.00
2.05
2.10
2.15
2.20
2.25
2.30
2.35
2.40
2.45
2.50
2.55
2.60
2.65
2.70
2.75
2.80
2.85
2.90
2.95
0.0228
0.0202
0.0179
0.0158
0.0139
0.0122
0.0107
0.0094
0.0082
0.0071
0.0062
0.0054
0.0047
0.0040
0.0035
0.0030
0.0026
0.0022
0.0019
0.0016
3.00
3.05
3.10
3.15
3.20
3.25
3.30
3.35
3.40
3.45
3.50
3.55
3.60
3.65
3.70
3.75
3.80
3.85
3.90
3.95
4.00
4.25
4.75
5.20
5.60
0.00135
0.00114
0.00097
0.00082
0.00069
0.00058
0.00048
0.00040
0.00034
0.00028
0.00023
0.00019
0.00016
0.00013
0.00011
0.00009
0.00007
0.00006
0.00005
0.00004
0.0003
10-5
10-6
10-7
10-8


APPENDIX D
D.1. Trigonometric Identities
e±jq = cosq ± j sin q
cos q = (ejq + e-jq)
sin q = (ejq – ejq)
sin2q + cos2 q = 1
cos 2q = cos2q – sin2 q = 2 cos2 q – 1 = 1-2 sin2q
sin 2q = 2cosq sinq
con2 q = (1 + cos 2q)
sin2 q = (1 – cos 2q)
cos (a ± b) = cos α cos b sin α sin b
sin (a ± b) = sin α cos b cos α sin b
tan (a + b) =
cos α cos b = cos (α – b) + cos (α + b)
sin α sin b = cos (α – b) – cos (α + b)
sin α cis b = sin (α – b) + sin (α + b)
a cos x + b sin x = Ccos (x + q) where C = and q = – tan-1
D.2. Series Expansions and Approximations
equation
equation
equation
ex = exIna = 1 + x In a + (x In a)2 + …
cos x = 1 – x2 + x4 – …
sin x = x – x3 + x5 – …
In (1 + x) = xx2 + x3 – …
When | x | < < 1
(1 + x)n = 1 + nx
ex 1 + x
cos x 1
sin x x
ax 1 + x In a
In (1 + x) x
D.3. Integrals
Indefinite integral
ax dx = sin ax
ax dx = – cos ax
ax cos bx dx = a2 b2
ax sin bx dx = a2 b2
ax cos bx dx = – a2 b2
ax dx =
ax dx =
dx =
cos bx dx = (a cos bx + b sin bx)
sin bx dx = (a sin bx + b cos bx)
= tan-1
= = tan-1
a > 0
a > 0
a > 0
equation
a > 0
a > 0

a > 0, b > 0
a > 0, b > 0
Integration by Parts
a > 0, b > 0
ABBREVIATIONS
ac Alternating current
ADPCM adaptive differential pulse-code modulation
AM amplitude modulation
ARQ automatic-repeat-request
ASCII American Standard Code for Information Interchange
ASK amplitude-shift keying
ATM asynchronous transfer mode
BPF bandpass filter
B-ISDN broadband ISDN
BSC binary symmetric channel
CCITT Consultative Committee for International Telephone and Telegraph
CDM code-division multiplexing
CDMA code-division multiple access
CPFSK continuous-phase frequency-shift keying
CW continuous wave db decibel dc direct current
DFT discrete Fourier transform
DM delta modulation
DPCM differential phase-code modulation
DPSK differential phase-shift keying
DSB-SC double-sideband suppressed carrier
Ds/BPSK direct sequence/binary phase-shift keying exp exponential
FDM frequency-division multiplexing
FDMA frequency-division multiple access
FFT fast Fourier transform
FH frequency-hop/M-ary frequency-shift keying
FSK frequency-shift keying
Hz Hertz
IDFT Inverse discrete Fourier transform IF intermediate frequency
ISDN integrated services digital network
ISI inter-symbol interference
LDM linear delta modulation
In natural logarithm (loge x)
log logarithm (log10 x)
LPF lowpass filter
ms milisecond
ms microsecond
modem modulator-demodulator
MSK minimum-shift keying
NRZ non-return to zero
OOK on-off keying
OQPSK offset QPSK
OSI open-system interconnection
PAM pulse amplitude modulation
PCM pulse-code modulation]
PDM pulse-duration modulation
PPM pulse-position modulation
PG processing gain
PLL phase-locked loop
PN pseudo-noise
PSK phase-shift keying
QAM quadrature amplitude modulation
QPSK quadrature phase-shift keying
RF radio frequency
rms root-mean-square
RZ return-to-zero
SDMA space-division multiple access
SNR signal-to-noise ratio
STM synchronous transfer mode
TDM time-division multiple access
TDMA time-division multiple access
TSI time-slot interchanging
T-S-T time-space-time switching
TV Televiosion
UHF Ultra-high frequency
VCO Voltage controlled oscillator
VHF very high frequency
VLSI very-large-scale integration
WDM wavelength-division multiplexing

Leave a Reply

Your email address will not be published. Required fields are marked *