Question

In: Electrical Engineering

Research on the Web the types of PSK modulation and answer the following questions: a) What...

Research on the Web the types of PSK modulation and answer the following questions:

a) What is differential phase shift keying (DPSK) modulation?

b) What are its advantages and disadvantages over the non-differential PSK modulation?

c) Why is DPSK used in power line communications instead of plain PSK?

Solutions

Expert Solution

Differential Phase Shift Modulation - It may view as a noncoherent version of PSK. It eliminates the need for a coherence reference signal by combining two operations at the transmitter:

1- Differential encoding of the input binary wave.

2-Phase shift keying, hence the name differential phase shift keying.

In effect of send symbol 0,we phase advance the current signal waveform by 180 degrees,and to send symbol 1, we leave the phase of the current signal unchanged.

You can observe here, when the symbol is zero , there is no phase reversal. When the symbol is 1 , It's phase is reversed by 180.

Advantages and Disadvantages over non-differential PSK modulation:

Differential phase shift modulation facilitates non coherent modulation, whereas non-differential PSK does not support this.Coherent demodulation means that the carrier sinusoid which is modulated by the message signal to get the passband signal has to somehow be reproduced at the receiver end and thereby used for demodulation of the passband signal to obtain the message.This can become difficult as recieved signal's carrier frequency has deviated from original because of doppler and other effects.So using the same carrier frequency as the transmitted signal will give a noisy demodulated message signal.

As coherent system provides better noise immunity over the non coherent one. So a high SNR required to achieve a bit error equivalent to non-differential phase shift keying.

Because DPSK is non coherent Scheme ,It is simpler to implement than non-differntial PSK, i.e there is no need for the demodulator to have a copy of the reference signal to determine the exact phase of the received signal, a trade-off is that it has more demodulation errors.




Related Solutions

Write a Matlab code for PSK modulation of Polar signal full widht rectangular pulses and data...
Write a Matlab code for PSK modulation of Polar signal full widht rectangular pulses and data rate 1 mbit/s also find PSD of psk and estimate Bandwidth
Research the three types of bankruptcy and answer the following questions: Who may file Chapter 7...
Research the three types of bankruptcy and answer the following questions: Who may file Chapter 7 bankruptcy? What are some of the reasons that people file bankruptcy? How does bankruptcy affect interest rates on loans? Credit cards? Then research, identify, and summarize a specific Chapter 7 bankruptcy case or issue. Incorporate the legal terminology from your textbook where appropriate, in both your original post and in your responses to your classmates. Use academic or legitimate news sources, such as The...
Research a good web article on impairment of goodwill or other intangibles. What types of factors...
Research a good web article on impairment of goodwill or other intangibles. What types of factors might impact the recognition of a write-down? Is it merely the economy, or are there other things that might impact operations?
answer the following questions: what prompt you to participate in research survey? and also the counter:what...
answer the following questions: what prompt you to participate in research survey? and also the counter:what prompt you to not participate in research survey? why?
Answer the following short questions: [Total: 10 marks] a) What are the two main types of...
Answer the following short questions: [Total: 10 marks] a) What are the two main types of disruptive innovation? Give one example of each. b) What are 3 differences between lead user and beta user?
Using your textbook, answer the following questions; 11. What are the five types of shoplifters? 12....
Using your textbook, answer the following questions; 11. What are the five types of shoplifters? 12. Burglary victims often struggle ____________________ afterward. 13. What is the most common weapon used in an armed robbery? 14. When burglary tools are found at a crime scene, they most often will be similar to; Circumstantial real
Answer the following questions using complete sentences. How is a particular audience targeted? What types of...
Answer the following questions using complete sentences. How is a particular audience targeted? What types of news can be created? Who could be the sources of "Fake News?" What could be the goals of the creators?   Explain how you can identify fake news and how it can possibly affect the public
5) Explain what is the following: 1.- PWM modulation. 2.- SPWM modulation with third harmonic. 3.-...
5) Explain what is the following: 1.- PWM modulation. 2.- SPWM modulation with third harmonic. 3.- Operation in over modulation and six-step.
Use the sample entry from an Apache web server log below to answer the following questions....
Use the sample entry from an Apache web server log below to answer the following questions. (10 marks total) CSE1CPR 2020 Final Exam Page 8 10.10.0.2 - - [1/Jan/2020:10:02:45 +0000] “GET /login.php?username=admin&password=password&submit=TRUE HTTP/1.1 302 i. Identify the key information in this message and briefly describe what this log entry is telling you? ii. What security threat or vulnerability can you see from this log entry? iii. How might this cause harm? iv. Suggest how the website developer or administrator might...
Use the sample entry from an Apache web server log below to answer the following questions....
Use the sample entry from an Apache web server log below to answer the following questions. 10.10.0.2 - - [1/Jan/2020:10:02:45 +0000] “GET /login.php?username=admin&password=password&submit=TRUE HTTP/1.1 302 i. Identify the key information in this message and briefly describe what this log entry is telling you? ii. What security threat or vulnerability can you see from this log entry? iii. How might this cause harm? i v. Suggest how the website developer or administrator might mitigate this threat or vulnerability?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT