throbber

`
`106
`
`Chapter 3 Modulation and Frequency-Division Multiple Access
`
`off increased transmission bandwidth for improved system performance in the
`presence of noise.
`3. Modulation permits the use ofmultiple-access techniques.
`A cellular radio channel represents a major capital investment and must there-
`fore be deployed in a cost—effective manner, permitting mobile users access to
`the channel. Multiple access is a signal-processing operation that makes this pos-
`sible. In particular, it permits the simultaneous transmission of information-
`bearing signals from a number of independent users over the channel and on to
`their respective destinations.
`
`In wireless communications, the carrier, denoted by C(t), is typically sinusoidal and is
`written as
`
`C(t) = Accos(27rfcr+ 6)
`
`(3.1)
`
`where AC is the amplitude, fc is the frequency, and dis the phase. With these three car-
`rier parameters individually available for modulation, we have three basic methods of
`modulation whose specific descriptions depend on whether the information-bearing
`signal is of an analog or a digital nature. These two families of modulation are dis-
`cussed in wh at follows.
`
`3.2.1 Linear and Nonlinear Modulation Processes
`
`Figure 3.3 shows the block diagram of a modulator supplied with a sinusoidal carrier
`C(t). The modulating signal, acting as input, is denoted by 1710:). The modulated signal,
`acting as output, is denoted by s(t). The inputeoutput relation of the modulator is gov-
`erned by the manner in which the output s(t) depends on the input m(t). On this basis,
`we may classify the modulation process as one of two basic types: linear and nonlinear.
`
`|
`
`I
`
`Input
`(modulating)
`signal
`MU)
`
`Output
`(modulated)
`signal
`m)
`
`Modulator
`
`Sinusoidal
`carrier
`c(r)
`
`FIGURE 3.3 Block diagram of modulator.
`
`Page 126 of 474
`
`SAMSUNG EXHIBIT 1010 (Part 2 of 4)
`
`Page 126 of 474
`
`SAMSUNG EXHIBIT 1010 (Part 2 of 4)
`
`

`

`5%
`
`l1
`
`i i l
`
`[Ii
`
`
`
`Section 3.2 Modulation
`
`107
`
`The modulation process is said to be linear if the inputwoutput relation of the
`modulator satisfies the principle ofsuperposition. According to this principle, the mod—
`ulation process, or equivalently, the modulator, satisfies two conditions:
`
`1. The output of the modulator produced by a number of inputs applied simulta-
`neously is equal to the sum of the outputs that result when the inputs are applied
`one at a time.
`
`2. If the input is scaled by a certain factor, the output of the modulator is scaled by
`exactly the same factor.
`
`The modulation process, or equivalently, the modulator, is said to be nonlinear if the
`principle of superposition is violated in part or in full.
`The linearity or nonlinearity of a modulation process has important conse-
`quences, in both theoretical as Well as practical terms, as we shall see in the remainder
`of the chapter.
`
`3.2.2 Analog and Digital Modulation Techniques
`
`
`
`
`
`Another way of classifying the modulation process is on the basis of whether the mes-
`sage signal m(r) is derived from an analog or a digital source of information. In the ana—
`log case, the message signal m(r) is a continuous function of time t. Consequently, the
`modulated signai s(t‘) is, likewise, a continuous function of time t. It is for this reason
`that a modulation process of the analog kind is commonly referred to as continuous—
`wave (CW) modulation.
`In the digital case, by contrast, the modulated signal 30‘) may exhibit discontinuiw
`ties at the instants of time at which the message signal m(t) switches from symbol 1 to
`symbol 0 or vice versa. Note, however (as we will find out later on in the chapter), that
`under certain conditions it is possible Jfor the modulated signal to maintain continuity
`even at the instants of switching.
`In other words, we may distinguish between analog and digital modulation pro—
`cesses as follows:
`
`0 All analog modulated signals are continuous functions of time.
`
`- Digitai modulated signals can be continuous or discontinuous functions of time,
`depending on how the modulation process is performed.
`
`3.2.3 Amplitude and Angie Modulation Processes
`
`Yet another way of classifying modulation processes is on the basis of which parame-
`ter of the sinusoidal carrier C(t) is varied in accordance with the message signal m(t).
`Accordingly, we speak of two kinds of modulation:
`
`1. Amplitude modulation, in which the amplitude of the carrier, AC, is varied
`linearly with the message signal ma).
`
`
`
`Page 127 of 474
`
`Page 127 of 474
`
`

`

`
`
`108
`
`Chapter 3 Modulation and Frequency—Division Multiple Access
`
`2. Angie modulation, in which the angle of the carrier, namely,
`
`1,110) = 27.11;: + 9
`
`(3.2)
`
`is varied linearly with the message signal m(t).
`
`Angle modulation may itself be classified into two kinds:
`
`2.1. Frequency modulation, in which the frequency of the carrier, fc, is varied linearly
`with the message signal m(r).
`
`2.2. Phase modulation, in which the phase of the carrier, 9, is varied linearly with the
`message signal m(z).
`
`In historical terms, the design of communication systems was dominated by analog
`modulation techniques. Nowadays, however, we find that the use of digital modulation
`techniques is the method of choice, due to the pervasive use of silicon chips and digital
`signal-processing techniques. For this reason, the focus in what follows is on digital
`modulation techniques.
`
`3.3
`
`LINEAR MODULATION TECHNIQUES
`
`3.3.1 Amplitude Modulation1
`
`By definition, amplitude modulation (AM), produced by an analog message signal
`m(i), is described by
`
`s(t) = AC(1 + kam(t))cos(27rfct)
`
`(3.3)
`
`where ka is the sensitivity of the amplitude modulator. For convenience of presenta-
`tion, we have set the carrier phase 9 equal to zero, as it has no bearing whatsoever on
`the transmission of information.
`
`Appendix A briefly reviews Fourier theory, which is basic to the spectral analy-
`sis of signals. In light of the theory presented therein, we may portray the spectral
`characteristics of amplitude modulation as illustrated in Fig. 3.4. The figure clearly
`shows that the bandwidth of the AM signal s(t) is 2W, where W is the bandwidth of
`m(t) itself. Most important, except for the frequency shift in the spectrum of the
`message signal m(t), denoted by MU), and the retention of the carrier, exemplified
`by the impulses at ifc, amplitude modulation has no other effect on the spectrum
`S(f) of 50?).
`
`Show that amplitude modulation is a nonlinear process, as it violates the prin-
`Problem 3.1
`ciple of superposition.
`I
`
`Page 128 of 474
`
`Page 128 of 474
`
`

`

`
`
`Section 3.3 Linear Modulation Techniques
`
`109
`
`MU)
`
`Delta function
`
`3w so — f.)
`
`A.
`
`('3)
`
`FIGURE 3.4
`
`(a) Message spectrum. (b) Spectrum of. corresponding AM signai.
`
`Note, however, that the Violation of the principle of superposition described in
`Problem 3.1 is of a mild sort which permits the application of the Fourier transform to
`an AM signal, as described in Fig. 3.4.
`Another important point to note is that, insofar as information transmission is
`concerned, retention of the carrier in the composition of the AM signal represents a
`loss of transmitted signal power. To mitigate this shortcoming of ampiitude modula-
`tion, the carrier is suppressed, in which case the process is referred to as double
`sidebandmsuppressed carrier (DSBMSC) modulation. Correspondingly, the DSB—SC
`modulated signai is defined simply as the product of the message signal m(r) and
`the carrier C(t); that is,
`
`30‘)
`
`C(t)m(r)
`Ach) cos(27rfct)
`
`(3'4)
`
`Figure 3.5 depicts the spectrum of the new S(t). Comparing this spectrum with that of
`Fig. 3.4, we see clearly that the absence of the delta functions at ifc is testimony to the
`suppression of the carrier in Eq. (3.4). Nevertheless, the AM signal of Eq. (3.3) and
`the DSBWSC modulated signal of Eq. (3.4) do share a common feature: They both
`require the use of a transmission bandwidth equai to twice the message bandwidth,
`namely, 2W.
`
`
`
`Page 129 of 474
`
`Page 129 of 474
`
`

`

`
`
`110
`
`Chapter 3 Modulation and Frequency-Division Multiple Access
`
`MU)
`
`W
`
`f
`
`— W
`
`0
`(a)
`
`Sif)
`
`‘1”: , W
`
`if.-
`
`if; t W
`
`0
`(b)
`
`)‘L- * W
`
`fr
`
`f: t W
`
`f
`
`FIGURE 3.5
`signal.
`
`(a) Message spectrum. (1)} Spectrum of corresponding DSB—SC modulated
`
`Problem 3.2 Consider the sinusoidal modulating signal
`
`mm = Amcos(2nf,nt)
`
`Show that the use of DSB-SC modulation produces a pair of side frequencies, one at fC +fm and
`the other at fE —fm ,where fc is the carrier frequency. What is the condition that the modulator
`has to satisfy in order to make sure that the two side-frequencies do not overlap?
`3'."
`Ans. .fL >f,
`
`I
`
`3.3.2 Binary Phase-Shift Keying
`
`Consider next the case of digital modulation in which the modulating signal is in the
`form of a binary data stream. Let p(t) denote the basic pulse used in the construction
`of this stream. Let T denote the bit duration (i.e., the duration of binary symbol 1 or 0).
`Then the binary data stream, consisting of a sequence of 1’s and 0’s, is described by
`
`m(t‘) = EbkpU—kfl
`k
`
`where
`
`bk : { +1
`
`#1
`
`for binary symbol 1
`
`tor binary symbol 0
`
`(3‘5)
`
`(3.6)
`
`Page 130 of 474
`
`Page 130 of 474
`
`

`

`Section 3.3 Linear Modulation Techniques
`
`111
`
`MI)
`
`1.0
`
`O
`
`T
`
`t
`
`FIGURE 3.6 Rectangular pulse.
`
`For example, in the case of a rectangular pulse we have
`
`p(t) ={ +1
`
`0
`
`for OStET
`
`otherwise
`
`(37)
`
`which is depicted in Fig. 3.6.
`
`In binary phase—shift keying (BPSK), the simplest form of digital phase modula—
`tion, the binary symbol 1 is represented by setting the carrier phase 6(t) = 0 radians,
`and the binary symbol 0 is represented by setting 9(r) = Irradians. Correspondingly,
`
`5(1) = Accos(2nfct)
`Accos(27cfct+a)
`
`1
`for binary symbol
`for binary symbol 0
`
`(3.8)
`
`Recognizing that
`
`cos(9(t)+n) = —cos(6(t)) for all time t,
`
`we may rewrite Eq. (3.8) as
`
`SO) I
`
`Accosanfct)
`—Accos(211:fct)
`
`for symbol 1
`for symbol 0
`
`(3‘9)
`
`In light of Eqs. (3.6), (3.7), and (3.9), we may express the BPSK signal in the compact
`form
`
`s(t) = c(t)m(r)
`
`(3.10)
`
`
`
`
`
`Page 131 of 474
`
`Page 131 of 474
`
`

`

`
`
`112
`
`Chapter 3 Modulation and Frequency-Division Multiple Access
`
`where m(t) is itself defined by Eq. (3.5). Most important. Eq. (3.10) shows that BPSK
`is another example of linear modulation.
`
`Problem 3.3 Consider a binary data stream m(r) in the form of a square wave with ampli-
`tudes i1, centered on the origin. Determine the spectrum of the BPSK signal obtained by multi-
`plying m(r) by a sinusoidal carrier whose frequency is ten times that of the fundamental
`frequency of the square wave.
`Ans.
`
`similar/2)
`r =
`_._._..
`s() klgfim (kn/2) cos
`1
`sin(k9r/2)[
`= _
`—.—.—
`2k:l;5
`(kn/2)
`
`(
`
`COS
`
`1‘75 j
`2 __z
`1:10
`(2 :[
`” f.
`
`2
`,r
`cos( Jrf()
`kit-D
`.+_
`10
`
`cos
`
`[ ( kch]
`2 t —_
`’r If 10
`
`.
`.
`.
`kfc
`.
`.
`.
`.
`.
`The spectrum of the BPSK stgmri COHSISLE‘ of stde-fi'equencies at j(, i m With decreasmg ampli-
`tude in accordance with ésiMkJr/ZVWE/Z) , where k 2 1, 3,5....
`l
`
`3.3.3 Quadriphase—Shift Keying
`
`As with DSB—SC modulation, BPSK requires a transmission bandwidth twice the
`message bandwidth. Now, channel bandwidth is a primary resource that should be
`conserved, particularly in wireless communications. How then can we retain the
`property of linearity that characterizes BPSK, yet accommodate the transmission of
`a digital phase-modulated signal over a channel whose bandwidth is equal to the
`bandwidth of the incoming binary data stream? The answer to this fundamental
`question lies in the use of a digital modulation technique known as quadriphase-shift
`keying (QPSK).
`.
`To proceed with a description of QPSK, suppose the incoming binary data
`stream is first demultiplexed into two substreams, m 1(t) and "12(1). Next, note that, as
`the name implies, the phase of the carrier in QPSK assumes one of four equally spaced
`values, depending on the composition of each dibit, or gIOUp of Mo adjacent bits, in
`the original binary data stream. For example, We may use 0, 75/2, 71:, and 3m’2 radians as
`the set of four values available for phase-shift keying the carrier. Specifically, the val-
`ues 0 and Jr radians are used to phase-shift key one of the two substreams, m1(t), and
`the remaining values, 75/2 and 3211’2 radians, are used to phase-shift key the other sub-
`stream, m2(r).
`Accordingly, we can formulate the block diagram for the QPSK modulator as
`shown in Fig. 3.7. On the basis of this structure, we can then describe the QPSK modu-
`lator as the parallel combination of two BPSK modulators that operate in phase
`quadrature with respect to each other. By phase quadrature, we mean the arrangement
`of phases such that the phase of the carrier in the lower path of the modulator is 90°
`out of phase with respect to the carrier in the Upper path.
`
`Page 132 of 474
`
`Page 132 of 474
`
`

`

`Section 3.3 Linear Modulation Techniques
`
`113
`
`ml“)
`
`510)
`
`
`
`
`Accos{2wfit)
`Binary data
`QPSK signal
`stream
`
`Demultiplexer
`5(1‘)
`Into
`
` Acsin(217fct)
`
`FIGURE 3.7 Block diagram of a Q?SK generator, using a phase-quadrature pair of carriers
`Accos(2flfct} and Acsinanfct).
`
`As remarked previously, m;(t) and m2(t) denote the two binary substreams that
`result from demuitipiexing of the binary data stream m(t). Extending the mathemati-
`cal description of Eq. (3.5) to the situation at hand, we may express the corresponding
`descriptions of binary substreams m1(t) and m2(t) as follows:
`
`
`
`fill-(f) 2 2%,:PU—kfl
`k
`
`fort: 1,2
`
`Fori=1,2 we have
`
`bin 2 { +1
`
`W1
`
`and for the case of a rectangular puise,
`
`for symbol
`
`for symbol 0
`
`1
`
`PU) = { +1
`
`0
`
`for OS fSZT
`
`otherwise
`
`Then the BPSK signal produced in the upper path of Fig. 3.7 is described by
`
`The BPSK signai produced in the lower path of Fig. 3.7 is described by
`
`510‘) = Acm1(r)cos(27rfct)
`
`520?) = Acm2(r)sin(27rfct)
`
`The QPSK signal is obtained by adding these two BPSK signals:
`If
`
`3(3)
`
`31(r) +320)
`
`I!
`
`Acm1(t)c0s(2xfct) + Acm2(t)sin(27zfct)
`
`(3.11)
`
`(312)
`
`(313)
`
`(3.14)
`
`(3.15)
`
`(3.16)
`
`
`
`Page 133 of 474
`
`Page 133 of 474
`
`

`

`
`
`114
`
`Chapter 3 Modulation and Frequency-Division Multiple Access
`
`Since both BPSK signals 51(r) and 520‘) are linear, the QPSK signal s(t) is likewise
`linear.
`
`The transmission bandwidth requirement of the QPSK signal s(t) is the same as
`that of the original binary data stream m(r). We justify this important property of
`QPSK signals as follows:
`
`The original binary data stream m(t) is based on bits, whereas the substreams
`m](r) and m2(t) are based on dibits. The symbol duration of both m1(t) and m2(t)
`is therefore twice the symbol duration of m(t).
`
`The bandwidth of a rectangular pulse is inversely proportional to the duration
`of the pulse. Hence, the bandwidth of both m1(t) and m2(t) is one—half that of
`m(r).
`
`The BPSK signals 51(1) and 32(1) have a common transmission bandwidth equal
`to twice that of m1(t) or m2(t).
`
`The QPSK signal 50:) has the same transmission bandwidth as s10) or 520).
`Hence, the transmission bandwidth of the QPSK signal is the same as that of the
`original binary data stream m(t).
`
`EXAMPLE 3.1 QPSK Waveform
`
`Figure 3.8(a) depicts the waveform of a QPSK signal for which the carrier phase assumes one of
`the four possible values 0°, 90", 180°, and 270”. Moreover, the waveform is the result of transmit-
`ting a binary data stream with the following composition over the interval 0 S t S 107':
`0
`
`The input dibit (i.e., the pair of adjacent bits in m(t)) changes in going from the interval
`0 S r S 2T to the next interval 2T S t S 4T.
`
`In going from the interval 2T S tS 4T to the next interval 47" S rS 6T, there is no change in
`the input dibit.
`The input dibit changes again in going from the interval 4TS t S 67‘ to 6T S t S ST.
`The input dibit is unchanged in going from the interval 6T S t S 87‘ to the next interval
`ST S t S 107".
`I
`
`Examining the waveform of Fig. 3.8(a), we see that QPSK signals exhibit two unique
`properties:
`
`1. The carrier amplitude is maintained constant.
`2. The carrier phase undergoes jumps of 0°, :90" or i180° every 2T seconds, where
`T is the bit duration of the incoming binary data stream.
`
`3.3.4 Offset Quadriphase-Shif‘t Keying
`
`Property 2 of the conventional QPSK signal, namely, the fact that the carrier phase
`may jump by 190" or :1800 every two bit durations can be of particular concern when
`the QPSK signal is filtered during the course of transmission over a wireless channel.
`
`Page 134 of 474
`
`Page 134 of 474
`
`

`

`
`
`Section 3.3 Linear Modulation Techniques
`
`115
`
`Amplitude
`
`Amplitude
`
`Amplitude
`
`o
`
`0
`
`2T
`
`4T
`
`6T
`Time
`
`(c)
`
`8T
`
`101“
`
`FiGURE 3.8 Waveforms of (a) conventional QPSK {b) offset QPSK, and (c) 75/4-shifted
`QPSK.
`
`The filtering action can, in turn, cause the carrier amplitude (i.e., the envelope of the
`QPSK signal) to fluctuate, thereby making the receiver produce additional symbol
`errors over and ab0ve those due to channei noise.
`
`The extent of amplitude fluctuations exhibited by conventional QPSK signals
`may be reduced by using offset quadriphase-Shifz keying (OQPSK), which is also
`referred to as staggered QPSK. In this variant of QPSK, the second substrearn m2(t),
`multiplied by the 90° phase-shifted carrier Acsin(2rg’cr), is delayed (i.e., offset) by a bit
`duration T with respect
`to the first substream 1721(1), multiplied by the carrier
`Accos(2afcr). Accordingly, unlike the phase transitions in conventional QPSK, the
`phase transitions likely to occur in offset QPSK are confined to 0°, $900, as illustrated
`in the next example. However, the $900 phase jumps in OQPSK occur twice as fre-
`quently, but with a reduced range of amplitude fluctuations, compared with those of
`conventional QPSK. Since, in addition to :900 phase jumps, there are $1800 phase
`jumps in conventional QPSK, we usually find that ampiitude fluctuations in OQPSK
`due to filtering have a smaller amplitude than in conventional QPSK.
`
`
`
`Page 135 of 474
`
`Page 135 of 474
`
`

`

`
`
`116
`
`Chapter 3 Modulation and Frequency-Division Multiple Access
`
`EXAMPLE 3.2 OQPSK Waveform
`
`Part (b) of Fig. 3.8 depicts the waveform of the OQPSK for the same binary data stream respon—
`sible for generating the conventional QPSK waveform depicted in part (a) of the figure. Here
`again, we see that the carrier amplitude of OQPSK is maintained constant. However, unlike the
`carrier phase in the conventional QPSK of Fig. 3.8(a). the carrier phase of the OQPSK showri in
`Fig. 3.8(b) has jumps of only i90°.
`l
`
`3.3.5 n/4-Shifted Quadriphase-Shift Keying
`
`As mentioned previously, ordinarily the carrier phase of a conventional QPSK signal
`may reside in one of two possible discrete settings:
`
`1. 0, 77.12, 7:, or 3M2 radians.
`
`2. m'4, 3rd4,51r/4, or 77:!4 radians.
`
`These two phase settings are shifted by M4 radians relative to each other. The QPSK
`waveform depicted in Fig. 3.8(a) follows setting 1. In another variant of QPSK known
`as JI/4-Shifted QPSK, the carrier phase used for the transmission of successive dibits is
`alternatively picked from settings 1 and 2.
`An attractive feature of trill-shifted QPSK signals is that amplitude fluctuations
`due to filtering are significantly reduced, compared with their frequency of occurrence
`in conventional QPSK signals. Thus, the use of JIM—shifted QPSK provides the band—
`width efficiency of conventional QPSK, but with a reduced range of amplitude fluctua-
`tions. The reduced amplitude fluctuations become important when the transmitter
`includes a slightly nonlinear amplifier, as we shall see in Section 3.9. Indeed, it is for this
`reason that Mai—shifted QPSK has been adopted in the North American digital cellular
`time-division multiple access (TDMA) standard, 15-54 as well as the Japanese digital
`cellular standard.2
`
`EXAMPLE 3.3 arm-Shifted QPSK Waveform
`
`Figure 3.8(c) depicts the arm-shifted QPSK waveform produced by the same binary data stream
`used to generate the conventional QPSK waveform of Fig. 3.8(a). Comparing these two wave-
`forms, we see that (1) the phase jumps in the JIM-shifted QPSK are restricted to inc/4 and flit/4
`radians and (2) the in phase jumps of QPSK are eliminatedfihence the advantage of 15’4—
`shifted QPSK over conventional QPSK. However. this advantage is attained at the expense of
`increased complexity.
`I
`
`3.4
`
`PULSE SHAPING
`
`The pulse defined in Eq. (3.7) for representing binary symbol 1 or 0 is rectangular in
`shape. From a practical perspective, the use of a rectangular pulse shape is undesirable
`for two fundamental reasons:
`
`1. The spectrum (i.e.. Fourier transform) of a rectangular pulse is infinite in extent.
`Correspondingly, the spectrum of a digitally modulated signal based on the use
`
`Page 136 of 474
`
`Page 136 of 474
`
`

`

`Section 3.4 Pulse Shaping
`
`117
`
`of a rectangular pulse is shifted by an amount equal to the carrier frequency but,
`most important, its frequency content is also infinite in extent. However, a wire-
`less channel is bandlimited, which means that the transmission of such a digi-
`tally modulated signal over the channel will introduce Signal distortion at the
`receiving end.
`
`2. A wireless channel has memory due to the presence of multipath. Consequently,
`the transmission of a digitally modulated signal over the channel results in a spe-
`cial form of interference called intersymbol interference (181), which refers to inter-
`ference betWeen consecutive signaling symbols of the transmitted data sequence.
`
`Now, in a wireless communication system, the goal is to accommodate the largest pos—
`sible number of users in a prescribed channel bandwidth. To satisfy this important
`requirement we must use a premodulation filter, whose objective is that of pulse
`shaping. Specifically, the shape of the basic pulse used to generate the digitally modu—
`lated signal must be designed so as to overcome the signal distortion and 131 problems
`cited under points 1 and 2.
`The design criteria for pulse shaping are covered by the fundamental theoretical
`work of. Nyquist.3 Let P(f) denote the overall frequency response made up of three
`components: the transmit filter, the channel, and the receive filter. According to
`Nyquist, the effect of intersymbol interference can be reduced to zero by shaping the
`overall frequency response P(f) so as to consist of a flat portion and sinusoidal rolloff
`portions, as illustrated in Fig. 3.9(a). Specifically, for a data rate of R bits/second, the
`channel bandwidth may extend from the minimum value W=Rf2 to an adjustable
`value from W to 2W by defining P(f) as follows:
`
`
`
`
`
`PU") m
`
`_...
`
`1
`W
`i
`.
`( 7t
`r
`4W[1 + cos ZWpcrl Wu pa]
`O
`
`_.__
`
`_
`
`W
`
`<
`0 — ifi sfl
`.
`<
`f1 m < W 11
`|ff 2 2 Wmf1
`
`2
`
`k
`
`__
`
`The frequency parameter f1 and bandwidth W are related by the parameter
`
`g
`
`fl
`= . - _
`1 W
`
`p
`
`(3.17)
`
`3.18
`
`(
`
`)
`
`Called the roll-offfactor, p indicates the excess bandwidth over the ideal solution cor-
`responding to p = 0 . An important characteristic of the frequency response P(f) is
`that its inverse Fourier transform, denoted by p(t) (i.e., the overall impulse response of
`the transmit filter, the channel, and the receive filter) has the value of unity at the cur-
`rent signaling instant (i.e., 13(0) = 1) and zero crossings at all other consecutive signal-
`ing instants (i.e., p(nT) : 0 for nonzero integer n), as shown in Fig. 3.9(b). The zero
`crossings of the impulse response p(t) ensure that the ISI problem is reduced to zero.
`The frequency response of Fig. 3.9(a) is called the raised-cosine (RC) spectrum, so
`called because of its trigonometric form as defined in Eq. (3.17).
`
`
`
`Page 137 of 474
`
`Page 137 of 474
`
`

`

`
`
`118
`
`Chapter 3 Modulation and Frequency-Division Multiple Access
`
`The variability of the rolloff factor ,0 over the range (0,1) allows the designer to
`tradeoff transmitted signal bandwidth for robustness of the pulse shape.
`
`2WP(f)
`
`.00)
`
`
`
`
`
`(3) Frequency response of the raised cosine spectrum for varying roll—off rates
`FIGURE 3.9
`(b) Impulse response of the Nyquist shaping filter (i.e., inverse Fourier transform of the
`spectrum plotted in part (a) for varying roll-off rates).
`
`Page 138 of 474
`
`Page 138 of 474
`
`

`

`Section 3.4 Pulse Shaping
`
`119
`
`Problem 3.4
`
`(a) Starting with the RC spectrum P(f) of Eq. (3.17), evaluate the inverse Fourier transform
`of P(f) and thus show that.
`
`11(3) : [cosmrrthgSmCQH/I}
`1— i6p2W2z‘
`
`(319)
`
`(b) Determine P(f) and p(t) for the special case of ,0 =1, which is known as the full-cosine
`roll—offpluse.
`
`Ans. (b) pm : sinc(4Wt)/(l—16W2t2)
`
`a
`
`3.4.1 Root Raised-Cosine Pulse Shaping;4
`
`A more sophisticated form of pulse shaping uses the root raised-cosine (RC) spec-
`trum rather than the reguiar RC spectrum of Eq. (3.17). Specifically, the spectrum of
`the basic pulse is now defined by the square root of the right-hand side of this equa-
`tion. Thus, using the trigonometric identity
`
`C0529 : %(i + c0526)
`
`where, for the problem at hand,
`
`gmi
`ZWp
`
`(lfl - W(1-p))
`
`and retaining P(f ) as the symbol for the root RC spectrum, we may Write
`
`
`
`
`«El—MI»?
`
`Pm =
`
`1
`
`fiwdmm— th—pn)
`
`n
`
`O
`
`OSlfl 5.13
`
`flslfl <2W f]
`
`_
`
`lflzZWmfl
`
`(3.20)
`
`where, as before, the roll-off factor p is defined in terms of the frequency parameter
`f] and the bandwidth W as in Eq. (3.18).
`If, now, the transmitter includes a pre-modulation filter with the transfer func-
`tion defined in Eq. (3.20) and the receiver includes an identical filter, then the overall
`pulse waveform wilt experience the spectrum P2 (f) ,which is the regular raised cosine
`spectrum. In effect, by adopting the root RC spectrum P0“) of Eq. (3.20) for pulse
`shaping, we would be working with P (f) in an overali transmitter-receiver sense. On
`this basis, we find that in the context of wireless communications, if the channei is
`affected by both flat fading and additive white Gaussian noise, and the pulse-shape fil-
`tering is partitioned equally between the transmitter and the receiver in the manner
`described herein, then effectiveiy the receiver would maximize the output signal-to-
`noise ratio at the sampling instants.
`
`
`
`Page 139 of 474
`
`Page 139 of 474
`
`

`

`
`
`120
`
`Chapter 3 Modulation and Frequency-Division Multiple Access
`
`
`
`.
`
`2/ T
`
`(b)
`
`FIGURE 3.10
`spectrum.
`
`(a) P(f) for root raised — cosine spectrum. (b) p(t) for root raised - cosine
`
`Page 140 of 474
`
`Page 140 of 474
`
`

`

`Section 3.4 Pulse Shaping
`
`121
`
`The inverse Fourier transform of Eq. (3.20) defines the root RC shaping pulse
`
`pa) = fi£Wfl+ 47:9cos(2aW(1+p)t))
`
`(3.21)
`
`The important point to note here is the fact that the root RC shaping pulse p(r) of
`Eq. (3.21) is radically different from the standard RC shaping pulse of Eq. (3.1.9). in
`particular, the new shaping pulse satisfies an orthogonality constraint under T—shifts,
`as shown by
`
`meprziprnnnd: = 0 for n = :1, 12,
`
`'
`
`(3.22)
`
`where T is the symbol duration. Yet, p(r) has exactly the same excess bandwidth as the
`standard RC pulse.
`It is important to note, however, that despite the added property of orthogonal-
`ity, the root RC shaping pulse of Eq. (3.21) lacks the zero—crossing property of the reg-
`ular RC shaping pulse defined in Eq. (3.19).
`Figure 3.10(a) plots the root RC spectrum P(f) for roll-off factor p z 0, 0.5, 1; the
`corresponding time-domain plots are shown in Fig. 3.10(b). These piots are different
`from those of Fig. 3.9 for nonzero p. The following example contrasts the waveform of
`a specific binary sequence using the root RC shaping pulse with the corresponding
`waveform using the regular RC shaping pulse.
`
`EXAMPLE 3.4 PuEse Shaping Comparison
`
`Using the root RC shaping pulse p(t) of Eq. (3.21) with roll-off factor ,0 = 0.5, plot the waveform
`for the binary sequence 01100, and compare it with the corresponding waveform obtained by
`using the regular RC shaping pulse p(r) of Eq. (3.19) with the same roll-off factor.
`Using the root RC pulse p(t) of Eq. (3.21) with a multiplying plus sign for binary symbol 1
`and multiplying minus sign for binary symbol 0, we get the dashed and dotted pulse train shown
`in Fig. 3.11 for the sequence 01100. The solid pulse train shown in the figure corresponds to the
`use of the regular RC pulse 19(3) of Eq. (3.15). The figure shows the root RC waveform occupies
`a Earger dynamic range than the regular RC waveform.
`l
`
`i’roblem 3.5
`
`(3) Starting with Eq. (3.20), derive the root RC pulse shape p(z) of Eq. (3.21).
`
`(h) Evaluate p(t) at (i) r: 0, and (ii) t = il/(Sp W) .
`
`(c) Show that the p(t) derived in part (3) satisfies the orthogonality constraint described in
`Eq.(3.22)
`Ans. (b)
`(i)p(0) z JzTr/(i—p+ie)
`
`(11)!)[8Wl=mal+2alfin£42l [1 :lcoslzi—pll
`
`'
`
`
`
`Page 141 of 474
`
`Page 141 of 474
`
`

`

`
`
`122
`
`Chapter 3 Modulation and Frequency-Division Multiple Access
`
`1.5
`
`
`
`Raised Cosine
`— - — Sqrt Raised Cosine
`
`
`
`0.5
`
`o
`
` Pulsep(t)
`
`
`
`—-0.5
`
`“1.5
`
`
`
`
`
`
`Binary sequence
`
`*1
`
`e .1
`
`+1
`Time t/Tb
`
`—I
`
`—1
`
`FIGURE 3.11 Two pulse trains for sequence 01100, one using regular RC pulse and the other
`using root RC pulse.
`
`3.5
`
`COMPLEX REPRESENTATION OF LINEAR MODULATED SIGNALS
`AND BAND-PASS SYSTEMS5
`
`The linear modulation schemes considered in Section 3.3 may be viewed as special
`cases of the canonical representation of a band-pass signal:
`
`5(2‘) = 51(t)cos(27rfct) —SQ(I)Sln(2KfCI)
`
`(3.23)
`
`It is customary to refer to 51(1) as the in-phase component of 5(t) and to SQU) as the
`quadrature component. This terminology follows from the definition of the sinusoi-
`dal carrier C(t) in Eq. (3.1). Table 3.1 summarizes descriptions of AM, DSB—SC, BPSK,
`and QPSK in terms of the components S10) and SQU).
`We may simplify matters further by introducing the complex signal
`
`E0) = 51(1) +.st(t)
`
`(3.24)
`
`Page 142 of 474
`
`Page 142 of 474
`
`

`

`Section 3.5 Complex Representation of Linear Modulated SignaEs and Band-Pass Systems
`
`123
`
`
`
`Special Cases of the Canonical Equation (3.23).
`
`Type of modulation
`
`In—phase component
`$10)
`
`Quadrature component
`SQU)
`
`Defining
`equation
`
`Amplitude modulation
`
`AC(1 + kam(:))
`
`O
`
`TABLE 3.1
`
`Analog
`
`
`
`3.3
`
`3.4
`
`'
`
`3.5
`
`3.1.1
`
`Q,
`i
`
`
`

`l
`
`Double sidebandn-
`suppressed carrier modulation
`
`ACmU)
`
`Di ital
`g
`
`Binar
`
`base-shift ke in
`Y g
`
`yp
`
`AczkaUWle
`k
`
`0
`
`D
`
`Quadri base-shift ke in
`P
`y
`
`g
`
`£1,2ka ,pn—zkr)
`k
`
`7ACZbk59’pU—2kT)
`
`k
`
`where j is the square root of -—1. For obvious reasons, the new signal 30) is referred to
`as the complex envelope of the modulated signal 3(t). Next, we invoke Euler’s for-
`mula
`
`exp(j2rtfct) = cos(27tfcr)+jsin(21tfct)
`
`(3.25)
`
`Hence, in light of Eqs. (3.24) and (3.25), we may considerably simplify the formulation
`of the modulated signal s(t) of Eq. (3.23) as
`
`30) = Re{§(t)exp(j27tfcr)}
`
`(3.26)
`
`Equation (3.26) is referred to as a single-carrier transmission.
`The material presented in this section is of profound theoretical importance in
`the study of linear modulation theory, be it in the context of analog or digital modula-
`tion techniques. Specifically, we may make the following four statements:
`
`1. The iii-phase component 51(t) and the quadrature component SQ(I) are both real—
`valued functions of time that are uniquely defined in terms of. the baseband (i.e.,
`message) signal m(t). Given the two components 51(t) and sQ(t), we may thus use
`the scheme shown in Fig. 3.12(a) to synthesize the modulated signal s(t).
`2. Given the modulated signal s(t), we may use the scheme shown in Fig. 3.1203) to
`analyze the modulated signal s(t) and thereby construct the in-phase component
`.910) and the quadrature component SQU).
`3. The in-phase and quadrature components are orthogonal to each other, occupy-
`ing exactly the same bandwidth as the message signal m(t).
`4. The complex envelope 3*(1‘) given in Eq. (3.24) completely preserves the infor—
`mation content of the modulated signal 5(3‘) except for the carrier frequency fc.
`
`Page 143 of 474
`
`Page 143 of 474
`
`

`

`
`
`124
`
`Chapter 3 Modulation and Frequency-Division Multiple Access
`
`In-phase component
`51(3)
`

`
`Modulated signal
`e m
`
`
`
`
`
`90" phase
`shifter
`
`Quadrature component
`we
`
`>3
`
`(a)
`
`
`
`Low—pass
`filter
`
`In-phase component
`510‘)
`
`
`Zoos (21rfct)
`Modulated signal
`S“)
`
`90° phase
`
`shifter
`
`423in(2qrfct)
`
`
`Quadrature component
`Low- ass
`
`filter
`p
`Self)
`
`(13)
`
`
`
`
`(a) Synthesizer for constructing a modulated signal from its in-phase and
`FIGURE 3.12
`quadrature components. (b) Analyzer for deriving the in-phase and quadrature components
`of the modulated band—pass signal.
`
`3.5.1 Complex Representation of Linear Band-Pass Systems
`
`In a communication system, modulators exist alongside linear band-pass systems rep—
`resented by band—pass filters and narrowband communication channels. As with any
`other linear system, these band-pass systems are uniquely characterized by an impulse
`response in the time domain and the corresponding transfer function in the frequency
`domain. From an analytic viewpoint, we find it highly instructive to develop complex
`representations of linear band-pass systems in a manner analogous to that followed
`for linear modulated (i.e., band-pass) signals. This form of representation not only sim—
`plifies the mathematical analysis of communication systems, but also provides the
`basis for

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket