Skip to main content
Engineering LibreTexts

2.9: Summary

  • Page ID
    41181
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)

    All modern modulation methods impress information on a sinusoidal carrier that is at a high enough frequency that it can be easily transmitted. There are many modulation techniques with the choice of which to use based on the technology available to implement the modulation scheme, the tolerance of the modulation scheme to interference, how efficiently the modulation scheme uses the EM spectrum, and the amount of DC power consumed. In military communications it is also important that a modulation scheme produce a noise-like signal that is difficult to detect and intercept.

    The first widely adopted modulation schemes produced simple pulses as used in wireless telegraphy. The tolerance to interference was achieved through the relatively slow transmission of bits, and hence redundancy. More information was transmitted when amplitude modulation was introduced to superimpose voice on a carrier. With this scheme, interference was always a problem, and once interference appeared on a signal it could not be removed nor suppressed. The first significant advance in modulation techniques was the invention of frequency modulation. In this scheme a narrowband analog modulating signal (e.g. voice) became a relatively wideband frequency-modulated RF signal. When the modulated signal was received and demodulated, the wide bandwidth of the modulated signal was collapsed to the original relatively narrowband modulating signal. The demodulation process combined correlated components of the modulated signal and the uncorrelated components, noise and interference, were suppressed.

    The introduction of digital modulation was a significant advance in the suppression of interference. Digital information was now being transmitted, and errors in the data caused by interference and noise would be completely unacceptable. The solution was to embed error-correcting codes in the data so that if a manageable number of bits were lost in the transmitted signal, the original data could still be fully recovered. As a result, digital radio (using digital modulation) could be used in situations with even more distortion than was acceptable in analog radio (using analog modulation). If interference is low, then today’s wireless systems use high-order modulation switching to lower-order (and less spectrally efficient) modulation when necessary to cope with higher interference.

    Several important metrics are used to provide a measure of the signal characteristics. The crest factor, peak-to-average ratio, and peak-to-mean envelope power ratio (PMEPR) are all indicators of how much care must be given to nonlinear circuit design, especially to amplifier and mixer design. Amplifiers must operate so that the peak signal is amplified with minimal distortion. It is the peak signal that determines the DC power drawn by an amplifier. However, the average RF output power of an RF front end is determined by the mean of the envelope. So a high PMEPR signal will result in lower amplifier efficiency.

    Many of the techniques described in this chapter for modulating and demodulating RF signals were presented as circuit techniques. However many modern phones support multiple standards and hardware implementation would require multiple copies of similar versions of analog circuits. Today it is more cost effective to perform most of the operations in a DSP unit. Most of the time the DSP realization is close to the hardware implementation. An example is carrier recovery. For narrow-band communication signals in wireless communicators, carrier recovery can be performed using a digital implementation of the concepts described for the hardware carrier recovery circuits. While it is more power efficient to implement many of the techniques in hardware, the need to support multiple standards has necessitated the software reconfigurability available with a DSP unit. Which approach is used is the decision of the RF system designer— an experienced engineer with a rich background in wireless technologies. It is therefore important that the aspiring and practicing RF engineer have a broad perspective of RF circuits and of communications theory. Hence the emphasis of this book on a systems approach to RF and microwave design.

    Frequency modulation, and the similar PM modulation method were used in the 1G analog cellular radio. With the addition of AM, the three schemes are the bases of all analog radio. Digital cellular radio began with 2G and there were two types of 2G cellular radios with the GSM system using GMSK modulation, a type of FSK modulation, and the NADC system using \(π/4\)-DQPSK modulation. The two 2G systems were incompatible. The 3G cellular radio used two types of QPSK modulation, one for the up-link from handset to basestation, and one from the basestation to a handset. The 1G–3G systems implemented most of the modulation and demodulation functions in analog hardware. With 4G and 5G cellular radio a large number of modulation schemes are supported choosing as high an order of modulation as allowed by the channel conditions. Most of the modulation and demodulation in 4G and 5G are implemented in DSP with just the translation to and from the radio frequency signal implemented in analog hardware.


    This page titled 2.9: Summary is shared under a CC BY-NC license and was authored, remixed, and/or curated by Michael Steer.

    • Was this article helpful?