TishkInternational University Information Technology Department Data .

1y ago
12 Views
2 Downloads
711.69 KB
22 Pages
Last View : 16d ago
Last Download : 3m ago
Upload by : Mariam Herr
Transcription

Tishk International UniversityScience FacultyInformation Technology DepartmentData Communication &Computer Networks IIModulation and Modems3rd Grade Spring Semester 2020-2021Instructor: Bilal Ahmed1

Chapter 10Modulation And Modems2

Topics Covered 10.1 Introduction10.2 Carriers, Frequency, And Propagation10.3 Analog Modulation Schemes10.4 Amplitude Modulation10.5 Frequency Modulation10.6 Phase Shift Modulation10.7 Amplitude Modulation And Shannon's Theorem10.8 Modulation, Digital Input, And Shift Keying10.9 Modem Hardware For Modulation And Demodulation10.10 Optical And Radio Frequency Modems10.11 Dialup Modems3

10.1 Introduction This chapter– focuses on the use of high-frequency signals to carry information– discusses how information is used to change a high-frequencyelectromagnetic wave– explains why the modulation is important– describes how analog and digital inputs are used4

10.2 Carriers, Frequency, AndPropagationMany long-distance communication systems use aoscillating electromagnetic wave, called a carrierThe system makes small changes to the carrier thatrepresent information being sentThe frequency of electromagnetic energy determines howthe energy propagatesOne reason to carriers is to select a frequency that willpropagate well5

10.3 Analog Modulation Schemes We use the term modulation to refer to changes made in a carrier– according to the information being sent Modulation takes two inputs– a carrier signal, and– an information signal Then it generates a modulated carrier as output A sender must change one of the fundamental characteristics of thewave There are three primary techniques that modulate an electromagneticcarrier according to an information signal:– Amplitude modulation (AM)– Frequency modulation (FM)– Phase modulation (PM)6

10.3 Analog Modulation Schemes7

10.4 Amplitude Modulation (AM) AM varies the amplitude of a carrier in proportion to theinformation being sent The carrier continues oscillating at a fixed frequency– but the amplitude of the wave varies Figure 10.2 illustrates– an unmodulated carrier wave– an analog information signal– and the resulting amplitude modulated carrier As it is seen from the figure:– only the amplitude (i.e., magnitude) of the sine wave is modified– a time-domain graph of a modulated carrier has a shape similar tothe signal that was used– Envelope curve (that connects the peaks of a sine wave) as shownin Figure 10.2c has the same shape as the signal in Figure 10.2b8

10.4 Amplitude Modulation (AM) 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.9

10.5 Frequency Modulation (FM) In FM, the amplitude of the carrier remains fixed Frequency changes according to the signal:– when the signal is stronger, the carrier frequency increases,– and when the signal is weaker, the carrier frequency decreases Figure 10.3 illustrates an example of FM FM is more difficult to visualize– because slight changes in frequency are not as clearly visible– However, one can notice that the modulated wave has higherfrequencies when the signal used for modulation is stronger10

10.5 Frequency Modulation (FM)11

10.6 Phase Modulation (PM) One property of a sine wave is its phase– the offset from a reference time (at which the sine wave begins) It is possible to use changes in phase to represent a signal– Phase shift term used to characterize such changes If phase changes after cycle k, the next sine wave will startslightly later than the time at which cycle k completes– A slight delay resembles a change in frequency PM can be thought of as a special form of FM– However, phase shifts are important when a digital signal is used tomodulate a carrier12

10.7 AM and Shannon's Theorem Figure 10.2c shows the amplitude varying from a maximumto almost zero The figure is slightly misleading:– in practice, modulation only changes the amplitude of a carrierslightly, depending on a constant known as the modulation index Practical systems do not allow for a modulated signal toapproach zero Consider Shannon's Theorem– assuming the amount of noise is constant the signal-to-noise ratio will approach zero as the signal approaches zero Keeping the carrier wave near maximum insures that thesignal-to-noise ratio (SNR) remains as large as possible– This permits the transfer of more bits per second13

10.8 Modulation, Digital Input, And ShiftKeying How can digital input be used in modulation? Modifications are needed:– instead of modulation that is proportional to a continuous signal,digital schemes use discrete values To distinguish between analog and digital modulation– we use the term shift keying rather than modulation Shift keying operates similar to analog modulation– Instead of a continuum of possible values, digital shift keying has afixed set– For example, AM allows the amplitude of a carrier to vary byarbitrarily small amounts in response to a change in the signal In contrast, amplitude shift keying (ASK) uses a fixed set of possibleamplitudes Figure 10.4 illustrates concept for ASK and FSK14

Figure 10.4Illustration of(a) a carrier wave(b) a digital inputsignal(c) ASK(d) FSK15

16

10.9 Modem HW For Modulation AndDemodulation Modulator– a mechanism that accepts a sequence of data bits and appliesmodulation to a carrier wave according to the bits Demodulator– a mechanism that accepts a modulated carrier wave and recreatesthe sequence of data bits that was used to modulate the carrier Transmission of data requires a modulator at one end of thetransmission medium and a demodulator at the other Most communication systems are full duplex17

10.9 Modem Hardware For ModulationAnd Demodulation Users would like keep cost low and make the pair of deviceseasy to install and operate Manufacturers combine modulation and demodulationmechanisms into a single device called a modem– Modem (modulator and demodulator) Figure 10.9 illustrates how a pair of modems use a 4-wireconnection to communicate Modems are designed to provide communication over longdistances18

10.9 Modem HW for Modulation andDemodulation19

10.10 Optical And Radio FrequencyModems Modems are also used with other media– including Radio Frequency (RF) transmission and optical fibers A pair of RF modems can be used to send data via radio A pair of optical modems can be used to send data across apair of optical fibers20

10.11 Dialup Modems A dialup modem uses an audio tone A dialup modem uses data to modulate an audible carrier– which is transmitted to the phone system Difference between dialup and conventional modems is thataudible dialup modems uses lower bandwidths Interior of a modern telephone system used today is digital–––––The phone system digitizes the incoming audioInternally, transports a digital signalConverts the digitized version back to analog audio for deliveryThe receiving modem demodulates the analog carrierExtracts the original digital data21

Dialup Modems22

10.3 Analog Modulation Schemes 10.4 Amplitude Modulation 10.5 Frequency Modulation 10.6 Phase Shift Modulation 10.7 Amplitude Modulation And Shannon's Theorem 10.8 Modulation, Digital Input, And Shift Keying 10.9 Modem Hardware For Modulation And Demodulation 10.10 Optical And Radio Frequency Modems 10.11 .

Related Documents:

Information Technology Careers: Past, Present, and Future Precisely when the information technology age started is a matter of conjecture. According to one source, it started when the first abacus was created nearly 2000 years ago (19). Many professors of introductory information technology courses place the beginning in 1890 when

This Guideline presents a methodology for Information Technology (IT) security audits suitable for supporting the requirements of the Commonwealth of Virginia (COV) Information Technology Security Policy (ITRM Policy SEC500-02), the Information Technology Security Standard (ITRM Standard SEC501-01), and the Information Technology Security Audit

Information Technology Services will continue to support alternative modes of information technology access and technology-enabled instruction as necessitated by COVID-19. Emphasis must be placed on training and professional development to assist students, faculty, and staff with the use and application of information technology.

Information Technology, Ph.D. College of Information, Science & Technology . Vision Statement . The PhD program is to prepare students with the following abilities: Strong understanding of the theory and application of information technology focused around the core areas of computer science, management information systems and .

Technology Pearson BTEC Level 3 National Foundation Diploma in Information Technology First teaching 2016 Pearson BTEC Level 3 National Diploma (2017) in Information Technology Pearson BTEC Level 3 National Extended Diploma (2017) in Information Technology First teaching 2017 . Edexcel, BTEC and LCCI qualifications Edexcel, BTEC and LCCI qualifications are awarded by Pearson, the UK’s .

cardozo school of law 1 catholic university of america 3 charleston school of law 1 connecticut, university of 1 dayton, university of 1 denver, university of 1 depaul university 1 district of columbia 3 florida state university 1 fordham university 2 george mason university 5 george washington university 6 georgia, university of 1 golden gate .

herzing university-birmingham as - as - health information mgmt; birmingham al; herzing university-birmingham as - as - information technology birmingham . devry university-phoenix associate - electronics and computer technology phoenix; az devry university-phoenix associate - information technology & networking;

a result of poor understanding of human factors. Patient deaths have occurred as a result. Example: unprotected electrodes n Problems: Device use errors - improper hook ups, improper device settings n Solutions: “Ergonomic or Human factors engineering - See “Do it by Design” and AAMI Human Factors Engineering Guidelines.