1 / 43

DCSP-4: Modem

DCSP-4: Modem. Jianfeng Feng Department of Computer Science Warwick Univ., UK Jianfeng.feng@warwick.ac.uk http://www.dcs.warwick.ac.uk/~feng/dcsp.html. This representation is quite general. In fact we have the following theorem due to Fourier.

delta
Télécharger la présentation

DCSP-4: Modem

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DCSP-4: Modem Jianfeng Feng Department of Computer Science Warwick Univ., UK Jianfeng.feng@warwick.ac.uk http://www.dcs.warwick.ac.uk/~feng/dcsp.html

  2. This representation is quite general. In fact we have the following theorem due to Fourier. Any signal x(t) of period T can be represented as the sum of a set of cosinusoidal and sinusoidal waves of different frequencies and phases. Script1_1.m

  3. 1 10 Time domain Frequency domain S1(t)= 10 cos(t) + cos(10t) Sound(s) for i=1:10000 x(i)=10*cos(i*0.01)+cos(i*10*0.01); end

  4. 1 10 Time domain Frequency domain S2(t)= cos(t) + 10 cos(10t) Sound(s) for i=1:10000 x(i)=1*cos(i*0.01)+10*cos(i*10*0.01); end

  5. Conclusions In frequency domain, the height of the spectrum indicates the energy of the corresponding signal. For example, for S1, we have more energy concentrating on the signal cos(t), hence we hear a low frequency singal for S2, we have more energy concentratin on the singal cos(10t), hence we hear a high frequency signal

  6. j

  7. Note that the spectrum is continuous now: having power all over the place, rather than discrete as in periodic case. 2. A straightforward application is in data compression (MP3, MP4).

  8. Can you do FT for cos(2 pi t)?

  9. Give you a digital signal, how can you perform FT?

  10. Bandwidth

  11. Touch-tone dialing

  12. Freqs 1209 Hz 1336 Hz 1477 Hz 1633 Hz • 697 Hz 1 2 3 A • 770 Hz 4 5 6 B • 852 Hz 7 8 9 C • 941 Hz * 0 # D touch_tone.m

  13. Fourier transform, a simple piece of math, is widely used in our daily life , • We will come back to it in audio and video signal processing later on

  14. Harmonic: The nodes of a vibrating string are harmonics.

  15. Data transmission: Channel characteristics, signalling methods, interference and noise, synchronisation, data compression and encryption;

  16. Signals have to be modulated to be carried away Signals

  17. Digital Modulation: ASK, FSK and PSK There are three ways to modify the channel carrier (a wave): • ASK (amplitude-shift-keying) • FSK (frequency-shift-keying) • PSK (phase-shift-keying )

  18. ASK • ASK describes the technique by which a carrier wave is multiplied by the digital singal f(t). s(t) = f(t) cos(fc t+ f) The property of ASK is that the bandwidth is unchanged.

  19. This can be easily seen Cos(A+B)=cos(A)cos(B)-sin(A)sin(B) Cos(A-B)=cos(A)cos(B)+sin(A)sin(B) Assume the signal is f(t)=cos(F t), we then have S(t) = cos(Ft) cos(Fct) =1/2 [ cos((Fc+F)t) + cos((Fc-F)t) ]

  20. FSK • FSK describes the modulation of a carrier (or two carriers) by using a different frequency for a 1 or 0. • The resultant modulated signal may be regarded as the sum of two amplitude modulated signals of different carrier frequency

  21. PSK PSK describes the modulation technique that alters the phase of the carrier. S(t)=cos(fc t +F(t)) Binary phase-shift-keying (BPSK) has only two phase, 0 and p. Obviously, the bandwidth is unchanged

  22. Spread spectrum techniques Spread-spectrum techniques are methods in which energy generated at a single frequency is deliberately spread over a wide band of frequencies. This is done for a variety of reasons, including increasing resistance to natural interference or jamming and to prevent hostile detection.

  23. We shall not delve deeply into mechanisms, but shall look at one particular technique that is used call frequency hopping, as shown in Fig above

  24. We shall not delve deeply into mechanisms, but shall look at one particular technique that is used call frequency hopping, as shown in Fig. In frequency hoping, the bandwidth is effectively split into frequency channels.

  25. We shall not delve deeply into mechanisms, but shall look at one particular technique that is used call frequency hopping, as shown in Fig. In frequency hoping, the bandwidth is effectively split into frequency channels. The signal is then spread across the channels.

  26. We shall not delve deeply into mechanisms, but shall look at one particular technique that is used call frequency hopping, as shown in Fig. In frequency hoping, the bandwidth is effectively split into frequency channels. The signal is then spread across the channels. The hop set (channel hopping sequence) is not arbitrary, but determined by the use of a pseudo random sequence.

  27. We shall not delve deeply into mechanisms, but shall look at one particular technique that is used call frequency hopping, as shown in Fig. In frequency hoping, the bandwidth is effectively split into frequency channels. The signal is then spread across the channels. The hop set (channel hopping sequence) is not arbitrary, but determined by the use of a pseudo random sequence. The receiver an reproduce the identical hop set and so decode the signal.

  28. The hope rate (the rate at which the signal switches channels) can be thousands of times a second, so the dwell time (time spent on one channel) is very short.

  29. The hope rate (the rate at which the signal switches channels) can be thousands of times a second, so the dwell time (time spent on one channel) is very short. If the hop set is generated by a pseudo random number generator then the seed to that generator is effectively a key decoding the transmitted message, and so this technique has obvious security applications, for instance military use or in mobile phone systems.

  30. Digital Demodulation Demodulation schemes requiring the carrier phase are termed coherent. Those that do not need knowledge of the carrier phase are termed incoherent. Incoherent demodulation can be applied to ASK and wide-band FSK. With ASK, the power is either present, or it is not.

  31. Digital Demodulation With wide-band FSK, the power is either present at one frequency, or the other. Incoherent modulation is in expensive but has poorer performance. Coherent demodulation requires more complex circuity, but has better performance.

  32. In ASK incoherent demodulation, the signal is passed to an envelope detector. This is a device that output the outline of the signal. Incoherent demodulation can also be used for wide-band FSK. Here the signals are passed to two circuits, each sensitive to one of the two carrier frequencies.

  33. With coherent demodulation systems, the incoming signal is compared with a replica of the carrier wave. With BPSK the comparison is performed by multiplying the incoming signal with a replica of the carrier.

  34. If the output of this process is h(t), we have that By removing, or filtering out, the harmonic term, the output of the demodulation is the modulation f(t).

  35. The difficulty with coherent detection is the need to keep the phase of the replica signal, termed local oscillator 'locked' to the carrier. This is not easy to do. Oscillators are sensitive to (among other things) temperature, and a 'free-running' oscillator will gradually drift in frequency and phase. Suppose there is some phase error \phi present in the local oscillator signal.

More Related