You are on page 1of 14

Department of Electrical and Computer Engineering

Faculty of Engineering and Architecture


American University of Beirut






EECE 442L Communications Laboratory






Experiment on
Digital Modulation Techniques: Part I




Version: August 2009

Bigital Nouulation Techniques: Pait I August 2uu9 Page 1

Digital Modulation Techniques: Part I
OBJECTIVES

Understand the basic concepts of MPSK and MQAM digital modulation techniques.
Demonstrate and analyze MPSK and MQAM modulation techniques.
Evaluate the performance of MPSK and MQAM modulation techniques.
THEORETICAL BACKGROUND
A. INTRODUCTION
The main blocks of a digital communication system are illustrated in Figure 1. The
information source produces a message or sequence of messages to be communicated to the
receiver. The message may be of various types: a sequence of letters, a voice waveform, an
image, a temperature measurement, etc. If the signal is analog in nature, A/D conversion is
performed which is mainly composed of sampling and quantization blocks.
The digital output of the A/D converter is then fed into a source encoder for data
compression. The output of the source encoder is then processed by a channel encoder in
order to add redundancy to overcome errors at the receiver due to channel distortion. Next,
the digital modulator maps the codeword bits into modulated analog signals for
transmission over the channel. Because the channel is subject to various types of noise,
distortion, and interference, the channel output differs from the channel input. The channel
is the medium used to transmit the signal from transmitter to receiver. It may be a pair of
wires, a coaxial cable, a band of radio frequencies, a beam of light, etc.
At the receiver side, the demodulator converts each received channel output signal into one
of the channel codeword symbols. Because of the channel distortion, the demodulator
might make errors in detecting the received symbols. The channel decoder uses the
redundancy introduced by the channel encoder in order to try to correct symbol errors. If all
errors are corrected, the estimated codeword matches the original source codeword. The
source decoder performs the inverse operation of the source encoder and delivers its output
to the sink.
Bigital Nouulation Techniques: Pait I August 2uu9 Page 2

Figure 1: A block diagram of a digital communication system.
This experiment deals with the modulator block at the transmitter side of a digital
communication system. The main considerations in choosing a particular digital
modulation technique are the following: data rate, spectral efficiency (data rate per unit
bandwidth), power efficiency (minimum required energy per bit for a given quality),
robustness to channel distortion (probability of bit error or block error), and cost (function
of implementation complexity).
B. DIGITAL MODULATION SCHEMES
There are several digital modulation schemes that that have been proposed for digital
communication systems. These digital modulation schemes include basic schemes such as
MPSK (M-ary Phase Shift Keying), MPAM (M-ary Pulse Amplitude Modulation), MQAM
(M-ary Quadrature Amplitude Modulation), and MFSK (M-ary Frequency Shift Keying).
Other more advanced digital modulation techniques that build on these basic schemes
include GMSK (Gaussian Minimum Shift Keying) which is used in the GSM cellular
standard, Spread Spectrum Modulation which is used in the UMTS cellular standard, and
OFDM (Orthogonal Frequency Division Modulation) which is used in the WiFi, WiMAX,
and LTE standards.
Transmitter
Source
A/D
Converter
Source
Encoder
Channel
Encoder
Digital
Modulator
Channel
Sink
D/A
Converter
Source
Decoder
Channel
Decoder
Digital
Demodulator
Receiver
Bigital Nouulation Techniques: Pait I August 2uu9 Page S

Given an M-ary digital modulation scheme, the constellation set is composed of M
constellation points (also called symbols) where each symbol represents K = log
2
H bits.
The constellation set can be represented as points in a two-dimensional space where each
point has specific coordinates. The coordinates of a given constellation point can be
represented either via a real (x-axis) and imaginary (y-axis) components or via amplitude
and phase components (polar coordinates). The symbol duration is represented as I
s
and the
symbol rate is given byR
s
= 1I
s
. The bit duration is represented as I
b
and the bit rate is
given byR
b
= 1I
b
.
The symbol rate is normally a function of the pulse shaping filter used after the modulator,
the bandwidth occupied, and the channel characteristics. Since one symbol represents K
bits, the following relation holds: R
b
= KR
s
. Therefore, for a given symbol rate over the
channel, it is better to use higher order modulation schemes with a larger value of M in
order to achieve higher bit rate. On the other hand, as the value of M increases, the
constellation points in the constellation set become closer to each other for a given fixed
energy per bit. The closer the constellation points are, the higher is the probability of
making demodulation errors due to noise in the channel. Therefore, as M increases, there is
a tradeoff between bit rate and bit error probability. This requires careful analyses in order
to select the most suitable digital modulation scheme for a given system design.
This experiment deals with MPAM, MPSK, and MQAM modulation schemes with
emphasis on the tradeoffs between energy per bit, number of constellation points, and the
constellation set properties. The eye diagram is used to assess the performance
characteristics as a function of various parameters. The MFSK modulation scheme and
digital demodulation techniques are covered in other experiments.
C. AMPLITUDE AND PHASE MODULATION
In amplitude and phase modulation schemes, the information bit stream is modulated via
the amplitude and the phase of the transmitted signal, respectively. The transmitted signal
over symbol duration can be represented as: s(t) = s
I
(t)cos(2n
c
t) - s

(t)sin(2n
c
t)
where s
I
(t) is the in-phase component (real component), s

(t) is the quadrature


component (imaginary component), and
c
is the carrier frequency. Figure 2 presents the
general structure of an amplitude and/or phase modulator.
Bigital Nouulation Techniques: Pait I August 2uu9 Page 4


Figure 2: Amplitude and/or phase modulator.
The bandwidth of the transmitted signal is determined by the characteristics of the pulse
shaping filter g(t). The selection of the pulse shaping filter provides a tradeoff between the
required bandwidth and the level of intersymbol interference between consecutive pulses.
The most commonly used pulse shaping filter in practice is the raised cosine pulse shaping
filter. The characteristics of the raised cosine pulse shaping filter depend on a filter
parameter known as the roll-off factor . Figure 3 presents the frequency domain and time
domain properties of a raised cosine pulse shaping filter with different values of .

Figure 3: Frequency-domain and time-domain properties of a raised cosine pulse shaping filter.
sin(2fct)
cos(2fct)
cos(2fct)
s(t)
Quadrature component
In-phase component
Pulse shaping
filter
g(t)
Pulse shaping
filter
g(t)
2
Bigital Nouulation Techniques: Pait I August 2uu9 Page S

For more background information on pulse shaping filters, check Sections 8.2-8.3 in
[1], Sections 7.4-7.5 in [2], and/or Section 5.5 in [3].
C.1 M-ARY PULSE AMPLITUDE MODULATION (MPAM)
MPAM modulation schemes do not have a quadrature component and, thus, can be represented
using a one-dimensional constellation set. For MPAM, the information is encoded in the amplitude
of the transmitted signal. The coordinates of the points on the constellation set and the distance
between consecutive points depend on the symbol energy.
The mapping of bits to symbols is usually done via Gray encoding in order to reduce the bit error
rate for a given symbol error rate. With Gray mapping, consecutive symbols differ by only one bit
position. Figure 4 presents the constellation set for MPAM with M = 8 and Gray mapping. It can be
seen that each symbol represents three bits and that there is only one bit difference between
consecutive symbols.

Figure 4: Example constellation set with Gray mapping for 8PAM.
For more background information on MPAM modulation schemes, check Section 7.2
in [1], Sections 6.3 and 7.7 in [2], and/or Section 5.3 in [3].
C.2 M-ARY PHASE SHIFT KEYING (MPSK)
For MPSK modulation schemes, the information is encoded in the phase of the transmitted
signal with constant amplitude. Therefore, the MPSK constellation set can be represented
as a circle of equidistant constellation points. The number of points and the angular
difference between them depend on the value of M. Figure 5 presents the constellation sets
for MPSK with M = 4 and M = 8. The case with M = 2 is normally referred to as BPSK
(Binary PSK) whereas the case with M = 4 is normally referred to as QPSK (Quadrature
PSK).
For more background information on MPSK modulation schemes, check Section 7.3
in [1], Sections 8.11, 8.13, and 8.19 in [2], and/or Section 5.3 in [3].
Bigital Nouulation Techniques: Pait I August 2uu9 Page 6


Figure 5: Example constellation sets with Gray mapping for MPSK.
C.3 M-ary Quadrature Amplitude Modulation (MQAM)
For MQAM modulation schemes, the information is encoded in both the amplitude and the phase of
the transmitted signal. Therefore, the constellation set of MQAM can have any shape depending on
the allocation of the constellation points. The most common MQAM constellation sets are
rectangular MQAM where the constellation points are placed on a rectangular grid. It is important
to realize that MPAM and MPSK are special cases of MQAM. Figure 6 presents the constellation
sets for rectangular MQAM with M = 4 and M = 8.
For more background information on MQAM modulation schemes, check Section 7.3
in [1], Section 8.19 in [2], and/or Section 5.3 in [3].

Figure 6: Example constellation sets for MQAM.
Bigital Nouulation Techniques: Pait I August 2uu9 Page 7

D. ADDITIVE WHITE GAUSSIAN NOISE (AWGN)
In communication systems, the most common type of noise added over the channel is the
Additive White Gaussian Noise (AWGN). It is additive because the received signal is equal
to the transmitted signal plus the noise. It is white because it has a constant power spectral
density. It is Gaussian because its probability density function can be accurately modeled to
behave like a Gaussian distribution. It is noise because it distorts the received signal. The
higher the variance of the noise, the more is the deviation of the received symbols with
respect to the constellation set and, thus, the higher is the probability to demodulate a
wrong symbol and make errors.
For more background information on AWGN, check Sections 4.4 and 5.5 in [1] and/or
Sections 4.13-4.14 in [2].


PREPARATION EXERCISE FOR MPAM MODULATION TECHNIQUES

This demo presents a PAM system implemented using built in LabVIEW SubVIs. It will be
a good exercise to understand the role of each. Open the front panel of Demo_PAM.vi,
and set the following parameters:

Quantity/Setting Value
M 2
Symbol Rate 1000 Hz
Pulse Shaping Filter Raised-Cosine
Rolloff Factor 0.3
Size of input Bit stream 1024

Observe the following graphs: the PAM constellation at the transmitter, the Eye
Diagram at transmitter. How are the bits modulated using PAM? Increase the number of
bits per symbol. What are the advantages and disadvantages of increasing M (try values of
M =4, 8, 32, 128)? Can we overcome the disadvantages by using other modulation
schemes? List these modulation schemes and compare them with PAM.


Bigital Nouulation Techniques: Pait I August 2uu9 Page 8

EXPERIMENT DESCRIPTION

GENERAL RULES
If you open a VI and are not asked to do any changes in it, then close it without saving
changes by clicking on Defer decision.
Save VIs as [GroupID]_name of VI.vi.
Save plots as [GroupID]_Question number.jpg. For questions with more than one plot,
append extra info to the name to differentiate between the plots.
Remember to zip and upload only the files you created without the ones given to you in
ModulationI.zip.
PARTI: M-PSK MODULATION
In this part, we will observe an M-PSK modulated signal and study the effects of power,
bandwidth and pulse shaping filter.
Q.1 How do we compare the different Modulation Schemes?
A. BPSK MODULATION WITH DETERMINISTIC INPUT
In this part, we will observe a BPSK modulated signal where the input is a deterministic
signal to calculate the number of bits in error.
Open the Block Diagram of thePSK.VI.
The SubVIs are the following:

Generate Bits
Generates the sequence of data bits to be modulated.

Generate System Parameters
Calculates parameters for use with modulation and demodulation VIs.

Generate Filter Coefficients
Calculates filter coefficients for pulse shaping and matched filters applied by
the digital modulation VIs and demodulation VIs.
Bigital Nouulation Techniques: Pait I August 2uu9 Page 9


Modulate PSK
Inputs a sequence of data bits, performs PSK modulation, and returns the
modulated complex baseband waveform in the output complex waveform
parameter.

Add AWGN
Generates zero-mean complex additive white Gaussian noise with uniform
power spectral density and adds it to the complex baseband modulated
waveform, returning a signalplusnoise waveform having a specified E
b
/N
0
.

Format Constellation
Prepares a signal for presentation on a graph showing the detected symbol
locations and the transitions between those symbols.

Format Eye Diagram
Inputs a complex- or real-valued waveform, divides it into segments, and
displays those segments as plots on a waveform graph. It determines the
segment length based on the symbol rate and eye length input parameters.
On the Block Diagram, the input bit stream to the SubVI Modulate PSK should be
connected to the output of the SubVI Initialize Array that generates a 1D array of 1s
whose dimension size is 20.
On the Front Panel, set the following parameters:
M 2
Symbol Rate 1000 Hz
Pulse Shaping Filter Raised-Cosine
Rolloff Factor 0.3

Q.2 Vary E
b
/N
o
according to the following values (30 and 10 dB). Run the VI
then Stop it to observe the noisy constellation and count in each of the
above cases the number of bits in error, given that the threshold value
is set to zero.
Q.3 How would you relate the number of bits in error to E
b
/N
o
.
Bigital Nouulation Techniques: Pait I August 2uu9 Page 1u

B. BPSK MODULATION WITH ARBITRARY INPUT
In this part, we will observe a BPSK modulated signal where the input is a random signal.
We will study the effect of E
b
/N
0
on the constellation and Eye Diagram and the effect of
filter parameter on bandwidth.
On the Block Diagram, the input bit stream to the SubVI Modulate PSK should be
connected to the output bit stream of the SubVI Generate Bits.
On the Front Panel, set the following parameters:
M 2
Symbol Rate 1000 Hz
Pulse Shaping Filter Raised-Cosine
Rolloff Factor 0.3
Size of input Bit stream 1024

Q.4 Provide plots of the Constellations and the Eye Diagrams at the
transmitter and at the output of the channel for E
b
/N
o
= 17 and 30 dB.
Q.5 What does the Eye Diagram represent?
Q.6 What is the effect of decreasing E
b
/N
o
on the Constellations and the
Eye Diagram.
Q.7 By the way, how can one control the value of Eb/No over the channel
from a practical point of view?
Q.8 Why do we apply a Raised cosine instead of a rectangular pulse
shaping filter?
Q.9 Calculate the baseband bandwidth of the waveform (from the spectrum
plot) for Rolloff Factor = 0 and 1 and compare it to the theoretical
values.
Q.10 From the bandwidth point of view, which value of Roll Off Factor is
better (0 or 1) and why?
Q.11 What is the disadvantage using this value of Rolloff Factor.
Bigital Nouulation Techniques: Pait I August 2uu9 Page 11

C. BPSK PASSBAND SIGNAL
Open the Block Diagram of the PSK.VI.
Load the Sub-VI Passband.VI into PSK.VI, and connect the Symbols Out from the
Modulate PSK SubVI to the Symbols In of Passband.VI. Create additional graph
indicators to display the time domain waveform and the PSD of the passband modulated
signal.
Save the final VI as GroupID_PSK_PB.VI.
On the Front Panel, set the following parameters:
M 2
Symbol Rate 1000 Hz
Pulse Shaping Filter Raised-Cosine
Rolloff Factor 1
Size of input Bit stream 1024

Q.12 Why do we need to modulate the baseband signal on a carrier?
Q.13 Observe the time domain waveform of the passband signal. Explain the
phase differences and comment on how 0 and 1 are transmitted.
Q.14 Provide a plot of the passband spectrum. Compare its bandwidth to
that of the baseband signal. Note that you have to put the Y-axis in
logarithmic scale.
Q.15 Observe the time domain waveform of the passband signal for M=4.
Explain the phase differences and comment.
CloseGroupID_PSK_PB.VI.


Bigital Nouulation Techniques: Pait I August 2uu9 Page 12

D. M-PSK MODULATION
Open thePSK.VI, and set on the Front Panel the following parameters:
E
b
/N
0
25dB
Symbol Rate 1000 Hz
Pulse Shaping Filter Raised-Cosine
Rolloff Factor 0.3
Size of input Bit stream 2048

Q.16 What type of modulation does M=4 correspond to? Is it more power
efficient than BPSK? Refer to theoretical part to answer the Question.
Q.17 Provide a plot for the noisy Eye Diagram for M=16.
Observe the constellations and eye diagrams for M =8, 32 and 64 to answer the following
Questions:
Q.18 List an advantage and a disadvantage of increasing M at a constant
E
b
/N
o
?
Q.19 Calculate for the above values of M (8, 32, 64) the bit rate taking into
account the number of bits per symbol.
ClosePSK.VI.

PART II: QAM MODULATION
In this part, we will observe an MQAM modulated signal and compare it to an MPSK
modulated signal.
Open QAM.VI, and set on the Front Panel the following parameters:
E
b
/N
0
25dB
Symbol Rate 1000 Hz
Pulse Shaping Filter Raised-Cosine
Rolloff Factor 0.3
QAM symbols 500

Bigital Nouulation Techniques: Pait I August 2uu9 Page 1S

Q.20 Provide plots of Constellations and Eye Diagrams for M=16.
Q.21 Compare the noisy Eye Diagrams of 16PSK (Q17) and 16QAM, what
do you conclude?
Q.22 For high order modulation schemes and at the same conditions,
which is better MQAM or MPSK? Why?
Observe the Constellations and Eye Diagrams for M=8, 32, 64 at E
b
/N
0
=20 and 30dB.
Q.23 Given the above data, what is the highest M that can be used for the
different values of E
b
/N
o
?



REFERENCES

[1] J . Proakis and M. Salehi, Communication Systems Engineering. Prentice-Hall, 2
nd

edition, 2002.
[2] S. Haykin, Communication Systems. J ohn Wiley & Sons, 3
rd
edition, 1994.
[3] A. Goldsmith, Wireless Communications. Cambridge University Press, 2005.

You might also like