Comparison of Different Modulation Techniques and Error Detection Process

Verified

Added on  2023/06/03

|17
|2315
|81
AI Summary
This article explains the concepts of different modulation techniques like ASK, FSK, PSK, QAM and error detection process like CRC. It also compares the OSI and TCP/IP protocols for wired and wireless LANs. The article also explains why hexagonal shapes are preferred over circles and squares in cellular communication.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
1. Convert the binary data “011010” into analog waveforms using following
modulation techniques:
a. Two level Amplitude Shift Keying
b. Two level Frequency Shift Keying
c. Two level Phase Shift Keying
d. Differential Phase shift keying
e. Four level Amplitude Shift Keying
f. Four level Phase Shift Keying
g. Eight level Amplitude Shift Keying
ANS:
a. Two level Amplitude Shift Keying
Amplitude Shift Keying is the simplest type of digital
CW modulation.
The ASK modulator is nothing but a multiplier followed by band
pass filter.
This multiplier multiply the NRZ digital signal and the sinusoidal
carrier to produce the ASK signal as its output.
Two level ASK means Binary ASK. Due to the multiplication the
ASK output will present only a binary 1 is to be transmitted.
ASK output corresponding to binary 0 is zero.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
b. Two level Frequency Shift Keying
In FSK frequency of the carrier signal varies according to the
digital input signal but there is no change in the amplitude and
phase of the carrier.
Two level FSK called as Binary FSK. The output of a FSK
modulated wave is high in frequency for a binary 1 input and is
low in frequency for a binary 0 input.
c. Two level Phase Shift Keying
Binary PSK is the most efficient of the three modulation methods,
i.e ASK, FSK, PSK. Therefore it is used for high bit rate.
In BPSK phase of the sinusoidal carrier changes according to
the data bit to be transmitted.
In BPSK carrier phase is changed between 0 degree and 180
degree by the bipolar digital signal.
d. Differential Phase shift keying
Document Page
DPSK combines two basic operations
1) The differential encoding and
2) Phase shift keying
DPSK will eliminate the ambiguity about whether the received
data was inverted or not.
DPSK does not require the synchronous carrier at the demodulator
at the detection.
e. Four level Amplitude Shift Keying
In four level Amplitude Shift Keying amplitude of carrier signal
changes in four levels according to the input digital signal which
is divide in 2 bit symbols.
Here binary input is 011010 ,so divide this in 2 bit symbol like this
01 10 10
For 00, 01, 10, 11 inputs 4 different amplitude carrier signal will
get at the output.
Document Page
f. Four level Phase Shift Keying
In Four level PSK carrier changes in 4 phases
(0,90,180,270 degrees) according to the 2 bit(symbol) input
digital signal.
For 00, 01, 10, 11 input signal phases are 0, 90, 180, 270 degree
respectively.
g. Eight level Amplitude Shift Keying
In eight level ASK amplitude of carrier signal changes in eight
level according to the binary input signal which is 3bit symbol.
Here binary input is 011010 ,so divide it into 3 bit symbol like this
011 010
For 000 , 001, 010, 011, 100, 101, 110, 111 these eight binary
input signal 8 different amplitude assigned.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2. With fc = 500 kHz, fd = 25 kHz, and M = 16 (L = 4 bits), compute
the frequency assignments for each of the sixteen possible 4-bit data
combinations.
ANS:
Here in that solution assign 16 different frequencies to the 4 bit input
data combinations. That means it is 16 level FSK.
Here carrier frequency is given fc = 500KHz , frequency difference
fd=25KHz , M=16 levels and L=4 bit symbol.
Consider carrier signal is sin wave then
Output =sin(2*pi*fc*t+M*fd*t) here m=1,2,3,4,…..,16.
M L Output
1 0000 sin(1000*pi*t+25*t)
2 0001 sin(1000*pi*t+50*t)
3 0010 sin(1000*pi*t+75*t)
4 0011 sin(1000*pi*t+100*t)
5 0100 sin(1000*pi*t+125*t)
6 0101 sin(1000*pi*t+150*t)
Document Page
7 0110 sin(1000*pi*t+175*t)
8 0111 sin(1000*pi*t+200*t)
9 1000 sin(1000*pi*t+225*t)
10 1001 sin(1000*pi*t+250*t)
11 1010 sin(1000*pi*t+275*t)
12 1011 sin(1000*pi*t+300*t)
13 1100 sin(1000*pi*t+325*t)
14 1101 sin(1000*pi*t+350*t)
15 1110 sin(1000*pi*t+375*t)
16 1111 sin(1000*pi*t+400*t)
3. Draw the approximate Analog Modulation and Frequency
Modulation waveforms in complete steps for the following signal:
ANS:
In Analog communication there are two type of modulation Ampitude and
Angle modulation .In angle modulation there are two types Frequency
and Phase modulation.
If the amplitude of the carrier wave is varied accordance with the
instantaneous amplitude of the modulating signal then this modulation
called Amplitude modulation.
If the frequency of the carrier wave is varied accordance with the
instantaneous value of the modulating signal then this modulation
called Amplitude modulation.
Document Page
4. Draw the 16 QAM Constellation Diagram having two different
amplitude levels and eight different phase levels.
Quadrature Amplitude Modulation utilizes both amplitude and phase
components to provide a form of modulation .
The constellation diagram shows all the possible symbols that can
be transmitted by the system as a collection of points.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Constellation diagram
5. With proper explanation visualize the Error detection process for the cyclic
redundancy check
CRC is the common technique used to detect data transmission errors.
Document Page
Binary division is the basis of the system.
As per the Sender Side
generator G(x) polynomial is present to the sender.
Appending of (n-1) zero bits with the data
is performed by the sender. N represents
no. of bits that are present in generator
Appending of dividend is performed as per the data present along generator G(x)
by means of modulo 2 division (arithmetic).
Remainder that will be present i.e. (n-1) bits are the CRC.
Combination from Data bits along with the CRC bits which
indicates Codeword = Data bits + CRC bits
Example
It can be assumed that –
(a) 10110 is the data.
(b) 1101 is the code generator. (polynomial also holds the
understanding of the polynomial : x^3+x^2+1)
Calculation of CRC Bits:
Processing of calculating CRC taking into consideration
for the bits that are used as per the gathered data.
As per the above code, generator is considered to be1101.
So, there has been a total 4 bits. Hence appending of 000
with the data can be made.
Cyclic redundancy check is performed as follows:
101 is the CRC. The receiver receives 10110101 from the sender.
Document Page
At Receiver Side
Generator is same for the receiver G(x).
Data is divided with the generator (data + CRC).
Data is accurately received if the remainder is 0
Otherwise error is detected.
Assume the received message is 10110110.
Calculation of CRC Bits:
No addition of padding bits is performed and hence calculation is performed as per
the commencing of the entirely received code.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Differentially projected CRC bits are calculated. Hence an error is detected.
6. Compute the frame check sequence for the following information: Message
= 10111100, Pattern = 11011 .
ANS:
Most common algorithm for frame check sequence is
Cyclic Redundancy Check algorithm.
So here we are using CRC algorithm , Here data is 10111100.
code generator is 11011.
In the above code, code generator is 11011. So, there is total 5
bits. So, we will append 0000 with the data.
Document Page
Cyclic redundancy check is 0010. Thus, the sender sends 101111000010 to
the receiver
7. Compare the differences of TCP and OSI protocols for wired and
wireless LANs using diagrams.
Ans:
OSI(Open System Interconnection)
OSI is considered to be a protocol independent and generic standard that
acts as per the communication gateway in between the platform of end
users and the network. Follows vertical approach & There are 7 layers
present in the OSI.
TCP/IP(Transmission Control Protocol / Internet Protocol)
TCP/IP model has been reliant on the standard protocols as per the usage of
the platform of features that are developed by Internet. There are a total of 4
layers.
Document Page
Application layer has the admittance as per the processing of the applications for
commencing the network. The protocols that are provided will be performed by
the functional processing.
(Hypertext Transfer Protocol) HTTP
(Packet Internet Groper) DHCP
(Network Time Protocol) NTP
(File Transfer Protocol) FTP
Telnet
(Dynamic Host Configuration Protocol)
(Network Time Protocol) NTP
DHCP
Transport layer finds its usage in checking errors, sequencing and controlling flow.
Protocols that are implemented for the layers are as follows:
(User Datagram Protocol) UDP

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
(Transmission Control Protocol) TCP
Internet layers that are responsible includes proper addressing and routing resolution. Protocols
are:
(Internet Protocol) IP
(Address Resolution Protocol) ARP
(Internet Control Message Protocol) ICMP
(Internet Group Management Protocol) IGMP
Network Interface layer helps in managing the transmission and formatting of data
as per the interface of the network. Ethernet is used by the layer.
8. Compute the signal that is transmitted with the help of DSSS as per the
provided information: Input: 1011, Locally Generated PN bit stream:
101011011010, T = 3Tc
Answer:
As per the processing of the benefits of the DSSS, spreading of the spectrum
signal is considered to be one of the most important aspect. The data signal
is multiplied with the chip code data stream. This ensures that processing of
the higher data return from the data that are calculated. The data is
performed as per the XOR function.
Chip is considered as the sequence that spreads and hence the processing of
the information bit size is considered to be shorter. Spreading of the
sequence and the chip sequence provides similar data rates as the output that
is generated via spreading multiplier. The rate is measures as per the (M
chip/ sec) M chip per seconds.
Document Page
9. What is the difference in between the ad hoc and Infrastructure modes that
are present in WLAN? Visualize their comparative illustrations as well.
Parameters Infrastructure mode Ad-hoc mode
Definition Communication process takes place only in
between the wireless nodes and the access
point. There is no direct relation in between
the wireless nodes.
Every single node performs communication in a
direct manner along with the different nodes,
hence there is no need for performing access point
Communication as
per external mode
Access point is the communication
bridge in between the wireless and
wired networks
In case the nodes are in the same range they
communicate with each other
Physical needs Physical infrastructure processing is vital Physical infrastructure usage is not needed.
Complexity Simple designing is used. The functionality
of the process is present in the AP. Clients
present is considered as the simple machine.
There is no presence of co-ordination existence. Need
of decentralization of the MAC protocols like the
CSMA/CA, as per the complexity and the cost
increases
Document Page
Parameters Infrastructure mode Ad-hoc mode
When it can’t be
used:
Usage of this technology cannot be made in
complex situation.
As no proper connection in between the two mobile
nodes and hence this might cause out of range of the
service as per the complexity
Applications HIPERLAN2 and IEEE 802.11 are
dependent on this platform
Bluetooth is an example.
Channel Access Uses the TDMA based protocols Contention MAC protocols are used
Topology As per the topology it helps in performing
the wired network diagram
Set up process is easier as infrastructure is not
needed.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10.Why hexagonal shapes are more preferable as compared to the circle and
squares in case of cellular communication?
Ans:
The geometric shapes that are used in the cellular communication.
The main reasons that the square and the circular shapes are used includes the fact in
case of the circles the main issue is that either overlapping takes place or the entire surface area
is not covered. Area that will be present needs to be high and hexagon provides higher area and
the entire area gets covered and overlapping does not occur. Another benefit that is received
includes reusing of frequency
1 out of 17
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]