Preview

Fsk modulatio & demodulation

Powerful Essays
Open Document
Open Document
2665 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Fsk modulatio & demodulation
Continuous-Phase Frequency Shift
Keying (FSK)
Contents
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide

FSK-1
FSK-2
FSK-3
FSK-4
FSK-5
FSK-6
FSK-7
FSK-8
FSK-9
FSK-10
FSK-11
FSK-12
FSK-15
FSK-16
FSK-17
FSK-18
FSK-19
FSK-20
FSK-22
FSK-23

Introduction
The FSK Transmitter
The FSK Transmitter (cont. 1)
The FSK Transmitter (cont. 2)
The FSK Transmitter (cont. 3)
The FSK Transmitter (cont. 4)
The FSK Transmitter (cont. 5)
FSK Power Spectral Density
FSK Power Spectrum (cont. 1)
FSK Power Spectrum (cont. 2)
FSK Power Spectrum (cont. 2)
Spectrum with Rectangular Pulses
Specific Examples of FSK Spectra
Spectra for M = 2
Spectra for M = 4
FSK Demodulation
The Frequency Discriminator
Discriminator Block Diagram
Example of Discriminator Output
An Approximate Discriminator

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide

FSK-25
FSK-26
FSK-28
FSK-29
FSK-30
FSK-31
FSK-32
FSK-33
FSK-34
FSK-35
FSK-36
FSK-37
FSK-38
FSK-40
FSK-41
FSK-42

Slide FSK-43
Slide FSK-44
Slide FSK-45
Slide FSK-46
Slide FSK-47

Symbol Clock Tracking
Symbol Clock Tracking
The Phase-Locked Loop
The Phase-Locked Loop (cont. 1)
The Phase-Locked Loop (cont. 2)
The Phase-Locked Loop (cont. 3)
The Phase-Locked Loop (cont. 4)
The Phase-Locked Loop (cont. 5)
Example of PLL Output
Detection by Tone Filters
Detection by Tone Filters (cont. 1)
Computing Ik (N ) by Integration
Computing Ik (N ) by Filters
Discrete-Time Tone Filters
Filter Implementation (cont. 1)
Discrete-Time Filter Frequency
Response
Block Diagram of Receiver Using
Tone Filters
Efficient Computation with FIR Tone
Filters
Block Diagram of Receiver Using
Tone Filters
Recursive Implementation of the Tone
Filters
Recursive Implementation (cont. 1)

Slide FSK-48 Computation for the Recursive
Implementation

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Week 4 Lab Report

    • 925 Words
    • 4 Pages

    24. Calculate the magnitude and phase angle of the circuit impedance shown in Figure 11.39b.…

    • 925 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Frequency (Hz) 60 60 60 60 60 60 60 50 60 60 60 Frequency (Hz) 50 60 50 60 60 60 Frequency (Hz) 50 50 50 50 50 50 Frequency (Hz) 50 50 50 50 50 50 50 50 50…

    • 5123 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 8

    • 2459 Words
    • 10 Pages

    In a set of signals, if no signal can be represented as a linear combination of the remaining signals, then…

    • 2459 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The original methods of switching telephones came as soon as a public interest in the telephone arrived. This has occurred in 1877, and in less than a year after Bells original patent had been granted. The method was connected to every telephone individually and to every phone. This connection activity would become quickly complicated and harsh or impractical. Over one thousand different connections would be required to interconnect…

    • 606 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Checkpoint: Signals

    • 324 Words
    • 2 Pages

    Include a description comparing the differences between a private branch exchange (PBX) and Voice over Internet protocol (VoIP).…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Study Guide

    • 1194 Words
    • 5 Pages

    Direct sequence spread spectrum (DSSS), frequency hopping spread spectrum (FHSS), infrared, and orthogonal frequency division multiplexing (OFDM).…

    • 1194 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    HTC ChaCha

    • 8279 Words
    • 34 Pages

    1 AMERICAN INTERNATIONAL UNIVERSITY-BANGLADESH SPRING, 2013-2014 SCIENCE AND INFORMATION TECHNOLOGY Class Id Course Name Sec Time Day RM ADVANCE DATABASE MANAGEMENT A 8:0 - 10:0 W 441 8:0 - 11:0 M CL1 10:0 - 12:0 S 441 8:0 - 11:0 T CL1 2:0 - 4:0 T 434 5:0 - 8:0 S CL2 4:0 - 6:0 M 432 2:0-5:0 W CL7 4:0 - 6:0 M 434 2:0-5:0 W CL1 8:0 - 10:0 T 434 8:0 - 11:0 S CL1 10:0 - 12:0 W 434 11:0-2:0 M CL1 10:0 - 12:0 S 432 11:0-2:0 T CL7 10:0 - 12:0 M 434 8:0 - 11:0 W CL1 12:0 - 2:0 T 434 11:0-2:0 S CL1 LABORATORY COMPUTER GRAPHICS…

    • 8279 Words
    • 34 Pages
    Satisfactory Essays
  • Better Essays

    which are presented in Cases 12I and 13I. In addition, the case focuses on quantifying the…

    • 1599 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Modulation is the process in which a signal is entered into and transmitted by a signal carrier. There are several ways signals can be modulated and differ based on the equipment and technique utilized. Three common ways that signals are transmitted include a 56K modem, an asymmetrical digital subscriber line (ADSL), and Wireless Fidelity (Wi-Fi). Each of these methods are effective means of transmitting a digital signal, however, the 56K modem is all but phased out in favor of Wi-Fi which has evolved by way of ADSL.…

    • 523 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The advantages of AM radio are that it is relatively easy to detect with simple equipment, even if the signal is not very strong. The other advantage is that it has a narrower bandwidth than FM, and wider coverage compared with FM radio. The major disadvantage of AM is that the signal is affected by electrical storms and other radio frequency interference. Also, although the radio transmitters can transmit sound waves of frequency up to 15 kHz, most receivers are able to reproduce frequencies only up to 5kHz or less. Wideband FM was invented to specifically overcome the interference disadvantage of AM radio.…

    • 1302 Words
    • 6 Pages
    Good Essays
  • Good Essays

    9.1. Introduction: So far, in looking at carrier modulated data transmission, we have concentrated mainly on binary signalling using simple forms of ASK, FSK and PSK. With a suitable pulse-shape, binary signalling can achieve a bandwidth efficiency of up to 2 bits/second per Hz using real unipolar pulses (base-band equivalent of ASK) or real bipolar pulses (base-band equivalent of PSK) at base-band. Since multiplying the base-band signal by a sinusoidal carrier doubles its bandwidth, the maximum band-width efficiency of binary ASK and binary PSK becomes one bit/second/Hz . With this band-width efficiency, a computer modem could achieve a maximum of about 3.1 kb/s over a 300-3400 kHz domestic telephone link. This is less than one tenth of what we know to be achievable. A similar calculation for the bandwidth-efficiency of binary FSK is a little more complicated, but if we take the frequency spacing used by MSK, i.e. 1/(2T) Hz, which is the minimum spacing compatible with the desirable highly property of 'orthogonality' between the 2 symbols, we may expect to achieve a maximum of slightly less than 2 bit/second per Hz. To increase the band-width efficiency over what can be achieved with binary signalling we must use multi-level modulation schemes where each symbol represents more than one bit. 9.2. Multi-level ASK and Gray coding: Perhaps the most obvious multi-level modulation technique, though rarely used, is 'M-ary ASK' which modulates the amplitude of a sinusoidal carrier with M different amplitudes. To encode N bits per symbol, rather than just one as with binary signalling, choose M=2N rather than M=2. For example, to encode 3 bits per symbol, we could have 8 rectangular symbols of heights 0, A, 2A, 3A, 4A, 5A, 6A and 7A volts. Consider what happens to the 'bit-error probability', PB , when we adopt this new signalling strategy. We can hope to keep PB approximately…

    • 948 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Tomasulo Loop Example Loop: • • • • LD MULTD SD SUBI BNEZ F0 F4 F4 R1 R1 0 F0 0 R1 Loop R1 F2 R1 #8 This time assume Multiply takes 4 clocks Assume 1st load takes 8 clocks, 2nd load takes 1 clock Clocks for SUBI, BNEZ Show 2 iterations Load=8,1…

    • 2916 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Protection of data from a natural disaster such as a tornado is a network management issue.…

    • 812 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hierarchical Modulation

    • 304 Words
    • 2 Pages

    6. On the General BER Expression of One- and Two-Dimensional Amplitude Modulations. Yoon, Kyongkuk Cho and Dongweon. 7, July 2002, IEEE TRANSACTIONS ON COMMUNICATIONS,, Vol. 50, pp. 1074-1080. 0090-6778/02.…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The fortification on Markovi Kuli – Vodno was built somewhere before the middle of the 6th century. Considering the information preserved in Menander, which coincides with the archaeological finds, the first possible date of the destruction of the fortification walls and the triangular tower is the time of the Slavic raid in Hellas in year 578/579. At this point, we should correct previous researchers about that the polygonal tower - bastion isn`t built in the period immediately after this damage to the fortification was done. Firstly follow the reconstruction of the walls and the triangular tower (fortification phase 2), and the bastion was built afterwards (fortification phase 3). This interpretation is based on clearly visible mortar…

    • 714 Words
    • 3 Pages
    Good Essays

Related Topics