Amplitude Shifting Keying and Frequency Shift Keying
VerifiedAdded on 2023/04/03
|16
|1420
|253
AI Summary
This study material provides an overview of Amplitude Shifting Keying (ASK) and Frequency Shift Keying (FSK). It explains the concepts, applications, and advantages of ASK and FSK. The material also includes solved assignments and essays on ASK and FSK. Explore more at Desklib.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
MITS5003
By Name
Course
Instructor
Institution
Location
Date
By Name
Course
Instructor
Institution
Location
Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Question 1
Two level amplitude shifting key is also called On-OFF keying or BASK
(a) The analog carrier amplitude varies with bit stream
(b) The sinusoidal carrier shifts between two discrete values. Ther frequencies there in are fH for
binary 1 and fLfor binary 0
(c)They are also known as binary phase shift keying and uses opposite signals.
Two level amplitude shifting key is also called On-OFF keying or BASK
(a) The analog carrier amplitude varies with bit stream
(b) The sinusoidal carrier shifts between two discrete values. Ther frequencies there in are fH for
binary 1 and fLfor binary 0
(c)They are also known as binary phase shift keying and uses opposite signals.
(d) Differential phase shift keying combines two basic operations namely differential encoding
as well as phase shift keying. The sequence of the binaru bits is such that next bit relies on
previous one
(e) M=2m
Where M =4 levels then m=2 bit ; the four levels are 00, 01, 10 and 11. The input
binary is divided into 2 since m=2
as well as phase shift keying. The sequence of the binaru bits is such that next bit relies on
previous one
(e) M=2m
Where M =4 levels then m=2 bit ; the four levels are 00, 01, 10 and 11. The input
binary is divided into 2 since m=2
(f) Four phase in this level are0o, 90o, 180o and270o
(f) In eight levels ASK, the carrier signal amplitude varies with the input 3bit symbol. Here
M=8 since m=3 bits
(f) In eight levels ASK, the carrier signal amplitude varies with the input 3bit symbol. Here
M=8 since m=3 bits
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Question 2
Assign 16 different frequencies to the 4 bit input data combinations. This means it is 16 levels
FSK. Here, the carrier frequency is given as fc=500 kHz , frequency difference fd =25 kHz
M=16 and L=4
Output =cos (2 π fct+ Mfdt ) where M=1, 2, 16
M L OUT PUT
1 0000 cos (1000 πt+25 t )
2 0001 cos (1000 πt+50 t )
3 0010 cos (1000 πt+75 t )
4 0011 cos (1000 πt+100 t )
5 0100 cos (1000 πt+125 t )
6 0101 cos (1000 πt+150 t )
7 0110 cos (1000 πt+175 t )
8 0111 cos (1000 πt +200 t )
9 1000 cos (1000 πt+225 t )
10 1001 cos (1000 πt +250 t )
11 1010 cos (1000 πt+275 t )
12 1011 cos (1000 πt+300 t )
13 1100 cos (1000 πt+325 t )
14 1101 cos (1000 πt+350 t )
15 1110 cos (1000 πt+375 t )
16 1111 cos (1000 πt + 400 t )
Question 3
For Amplitude modulation, amplitude of carrier signal varies according to amplitude of the
modulating signal.
Assign 16 different frequencies to the 4 bit input data combinations. This means it is 16 levels
FSK. Here, the carrier frequency is given as fc=500 kHz , frequency difference fd =25 kHz
M=16 and L=4
Output =cos (2 π fct+ Mfdt ) where M=1, 2, 16
M L OUT PUT
1 0000 cos (1000 πt+25 t )
2 0001 cos (1000 πt+50 t )
3 0010 cos (1000 πt+75 t )
4 0011 cos (1000 πt+100 t )
5 0100 cos (1000 πt+125 t )
6 0101 cos (1000 πt+150 t )
7 0110 cos (1000 πt+175 t )
8 0111 cos (1000 πt +200 t )
9 1000 cos (1000 πt+225 t )
10 1001 cos (1000 πt +250 t )
11 1010 cos (1000 πt+275 t )
12 1011 cos (1000 πt+300 t )
13 1100 cos (1000 πt+325 t )
14 1101 cos (1000 πt+350 t )
15 1110 cos (1000 πt+375 t )
16 1111 cos (1000 πt + 400 t )
Question 3
For Amplitude modulation, amplitude of carrier signal varies according to amplitude of the
modulating signal.
For frequency modulation, frequency of modulated signal is changes while its amplitude remains
constant. All the power transmitted in frequency modulation is useful.
Question 4
In quadrature amplitude modulation, any variation in the input signal causes a variation in both
the amplitude and phase.
constant. All the power transmitted in frequency modulation is useful.
Question 4
In quadrature amplitude modulation, any variation in the input signal causes a variation in both
the amplitude and phase.
Question 5
CRC is one of most reliable tools for detection of error which is pegged on binary division.
In error detection process from algebraic polynomial general a bit pattern
Cyclic redundancy check tends to be reliable since it is able to sense single bit errors as well as
most of large burst error at relatively high chances
CRC is one of most reliable tools for detection of error which is pegged on binary division.
In error detection process from algebraic polynomial general a bit pattern
Cyclic redundancy check tends to be reliable since it is able to sense single bit errors as well as
most of large burst error at relatively high chances
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CRC process of error detection
For instance
1110110 as the bit stream
11011 is taken as divisor i.e. generator polynomial
Suppose m=Number of bits within generator; append (m-1) zero bit to data
There is 5 bit in generator polynomial hence string having 4 0s to bit stream
The data is appended by dividend with generator with the sue of 11101100000
(m-1) bits remainder would thus be the CRC
Code word=Data bits+ CRC bits
Finally Cyclic Redundancy Check would be generated as illustrated
Cyclic Redundancy Check is 1011 hence the send sends 11101101011 to the receiver
For instance
1110110 as the bit stream
11011 is taken as divisor i.e. generator polynomial
Suppose m=Number of bits within generator; append (m-1) zero bit to data
There is 5 bit in generator polynomial hence string having 4 0s to bit stream
The data is appended by dividend with generator with the sue of 11101100000
(m-1) bits remainder would thus be the CRC
Code word=Data bits+ CRC bits
Finally Cyclic Redundancy Check would be generated as illustrated
Cyclic Redundancy Check is 1011 hence the send sends 11101101011 to the receiver
Question 6
Cyclic Redundancy Check algorithm is the most widely used algorithm for frame check
Hence in this case CRC is adopted
Assuming 10111100 as bit stream
11011 is the divisor
There are 5 bits n the divisor hence string has 4 0’s to be appended to bit stream for transmission
Hence the final bit stream becomes 101111000000
The binary is thus performed as shown below
CRC is hence 0010
Cyclic Redundancy Check algorithm is the most widely used algorithm for frame check
Hence in this case CRC is adopted
Assuming 10111100 as bit stream
11011 is the divisor
There are 5 bits n the divisor hence string has 4 0’s to be appended to bit stream for transmission
Hence the final bit stream becomes 101111000000
The binary is thus performed as shown below
CRC is hence 0010
The code intended to be transmitted is got by substituting the last four zeros in 101111000000
using CRC
Hence the receiver would receive 101111000000 as the transmitted code
Question 7
DSSS provided protection against external generated interfering signal called jamming signals
The DSSS is averaging system
DSSS given data sequence converted into binary NRZ sequence
Spread spectrum signal also known as m (t) is a product of Binary NRZ sequence also called b
(t) and the PN sequence, abbreviated as c (t)
T is the time period for single bit of input data signal and Tc the time period for single bit of PN
sequence
T=3Tc as shown below
using CRC
Hence the receiver would receive 101111000000 as the transmitted code
Question 7
DSSS provided protection against external generated interfering signal called jamming signals
The DSSS is averaging system
DSSS given data sequence converted into binary NRZ sequence
Spread spectrum signal also known as m (t) is a product of Binary NRZ sequence also called b
(t) and the PN sequence, abbreviated as c (t)
T is the time period for single bit of input data signal and Tc the time period for single bit of PN
sequence
T=3Tc as shown below
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Question 8
There are only stations in Adhoc mode WLAN network
There are stations alongside a single or more access points in infrastructure mode
There is direct communication between stations in Adhoc mode which is as well related in the
form of independent typical service set or even peer-to-peer mode
Access points of mode in infrastructure device is as base stations that are employed in cellular
system
There is no need for physical infrastructure for the case of Adhoc mode
Infrastructure mode need physical infrastructure in order to operate
MAC protocols for instance CSMA are often adopted in most of the WLAN connections based
on Adhoc
Protocols based on TDMA are mostly used in infrastructure mode
There is direct communication in Adhoc mode over radio waves that are wireless
There are only stations in Adhoc mode WLAN network
There are stations alongside a single or more access points in infrastructure mode
There is direct communication between stations in Adhoc mode which is as well related in the
form of independent typical service set or even peer-to-peer mode
Access points of mode in infrastructure device is as base stations that are employed in cellular
system
There is no need for physical infrastructure for the case of Adhoc mode
Infrastructure mode need physical infrastructure in order to operate
MAC protocols for instance CSMA are often adopted in most of the WLAN connections based
on Adhoc
Protocols based on TDMA are mostly used in infrastructure mode
There is direct communication in Adhoc mode over radio waves that are wireless
Communication between the accesses points for instance PCs and router in the case of
infrastructure mode is through access points.
Question 9
OSI is an abbreviation for Open System Interconnection and is often generated by Internal
Organization responsible for standardization. It allows spread communication systems with the
aid of standard protocols. OSI model has about 7 layers
infrastructure mode is through access points.
Question 9
OSI is an abbreviation for Open System Interconnection and is often generated by Internal
Organization responsible for standardization. It allows spread communication systems with the
aid of standard protocols. OSI model has about 7 layers
TCP/IP is an abbreviation for Transmission Control Protocol/Internal Protocol and is a brief OSI
model version composed of four layers as opposed to the seven layers in OSI model
Network access layer Data Link layer & Physical layer combined as described in the OSI model
of references. Token ring, frame relay, Ethernet, FDDI among others is the main protocols that
are adopted by such layer
Internet layer is mainly responsible for sending packets to a given network without considering
the route or path and they arrive at the destination. Among the protocol used include:
IP Protocol which is the most fundamental aspect of whole TCP/IP model
ARP Protocol which is abbreviation for Address Resection Protocol
ICM Protocol which is abbreviation for Internet Control Message Protocol
Transport layer include Transmission Control Protocol as well as User Diagram Protocol as the
main layers used
User Diagram Protocol is used in the discovery of errors
model version composed of four layers as opposed to the seven layers in OSI model
Network access layer Data Link layer & Physical layer combined as described in the OSI model
of references. Token ring, frame relay, Ethernet, FDDI among others is the main protocols that
are adopted by such layer
Internet layer is mainly responsible for sending packets to a given network without considering
the route or path and they arrive at the destination. Among the protocol used include:
IP Protocol which is the most fundamental aspect of whole TCP/IP model
ARP Protocol which is abbreviation for Address Resection Protocol
ICM Protocol which is abbreviation for Internet Control Message Protocol
Transport layer include Transmission Control Protocol as well as User Diagram Protocol as the
main layers used
User Diagram Protocol is used in the discovery of errors
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Transmission Control Protocol is used in the creation of circuit linking recovers with sender
Application Layer is found on topmost part of layer in TCP/IP model and enables user to interact
with application. Among protocols used in this layer are inclusive of:
Hypertext transfer protocol, HTTP
Simple mail transfer protocol, SMTP
Domain Name Systems, DNS
Simple Network Management Protocol, SNMP
Terminal Network, TELNET
File Transfer Protocol, FTP that is mainly used in the transmission of file from a
computer to another
Question 10
The surface is subdivided in segments known as cells which are the basic aspect of all cellular
systems. Such cells together offer protection over enormous geographical surfaces.
Hexagonal forms are preferred in comparison with square or circular architecture since:
A cell has to be designed to set up the least strong mobile devices that are basically positioned at
cell boundary. For a specific distance between polygon center and the furthest points of
perimeter, hexagon exhibits great area among the three shapes.
With the aid of hexagon geometry, no numerous cells may cover a give geographical location
So from above criteria circles as shape cannot be used since when arranged at the same point
numerous regions would be generated that will be uncovered by any of the circles or overlapping
areas.
Application Layer is found on topmost part of layer in TCP/IP model and enables user to interact
with application. Among protocols used in this layer are inclusive of:
Hypertext transfer protocol, HTTP
Simple mail transfer protocol, SMTP
Domain Name Systems, DNS
Simple Network Management Protocol, SNMP
Terminal Network, TELNET
File Transfer Protocol, FTP that is mainly used in the transmission of file from a
computer to another
Question 10
The surface is subdivided in segments known as cells which are the basic aspect of all cellular
systems. Such cells together offer protection over enormous geographical surfaces.
Hexagonal forms are preferred in comparison with square or circular architecture since:
A cell has to be designed to set up the least strong mobile devices that are basically positioned at
cell boundary. For a specific distance between polygon center and the furthest points of
perimeter, hexagon exhibits great area among the three shapes.
With the aid of hexagon geometry, no numerous cells may cover a give geographical location
So from above criteria circles as shape cannot be used since when arranged at the same point
numerous regions would be generated that will be uncovered by any of the circles or overlapping
areas.
It is conceptual as well as simplistic model of coverage of radio for every base station
Hexagon enables easy as well as manageable cellular system analysis
Hexagon offer large are than square hence the hexagonal shape is more preferred to cell
Hexagonal shape covers whole region without having to overlap
There is possibility of reuse of frequent in hexagonal shape
References
Bi, S., Zeng, Y. and Zhang, R., 2016. Wireless powered communication networks: An
overview. IEEE Wireless Communications, 23(2), pp.10-18
Hexagon enables easy as well as manageable cellular system analysis
Hexagon offer large are than square hence the hexagonal shape is more preferred to cell
Hexagonal shape covers whole region without having to overlap
There is possibility of reuse of frequent in hexagonal shape
References
Bi, S., Zeng, Y. and Zhang, R., 2016. Wireless powered communication networks: An
overview. IEEE Wireless Communications, 23(2), pp.10-18
Chen, J.L., Yang, L., Vermani, S., Tandra, R. and Tian, B., Qualcomm Inc, 2018. Systems and
methods for improved communication efficiency in wireless networks. U.S. Patent Application
10/028,284
Ng, D.W.K., Lo, E.S. and Schober, R., 2015. Multiobjective resource allocation for secure
communication in cognitive radio networks with wireless information and power transfer. IEEE
transactions on vehicular technology, 65(5), pp.3166-3184
Wei, Z., Yuan, J., Ng, D.W.K., Elkashlan, M. and Ding, Z., 2016. A survey of downlink non-
orthogonal multiple access for 5G wireless communication networks. arXiv preprint
arXiv:1609.01856
methods for improved communication efficiency in wireless networks. U.S. Patent Application
10/028,284
Ng, D.W.K., Lo, E.S. and Schober, R., 2015. Multiobjective resource allocation for secure
communication in cognitive radio networks with wireless information and power transfer. IEEE
transactions on vehicular technology, 65(5), pp.3166-3184
Wei, Z., Yuan, J., Ng, D.W.K., Elkashlan, M. and Ding, Z., 2016. A survey of downlink non-
orthogonal multiple access for 5G wireless communication networks. arXiv preprint
arXiv:1609.01856
1 out of 16
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.