Phase-locked loop: Difference between revisions

From formulasearchengine
Jump to navigation Jump to search
Undid revision 589288887 by 1.38.24.42 (talk)
en>Crystallizedcarbon
→‎Clock analogy: changing the time changes phase, making the clock faster or slower changes frequency.
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
{{Modulation techniques}}
Instead of various security guards posted at several locations, ideally, a burglar guard could investigate a bank of monitors are fed from multiple video security cameras hidden. You are busy going from work to getting your kids to after school activities.<br><br>


'''Phase-shift keying''' ('''PSK''') is a [[Digital data|digital]] [[modulation]] scheme that conveys [[Data#Uses of data in computing|data]] by changing, or modulating, the [[Phase (waves)|phase]] of a reference [[Signal (information theory)|signal]] (the [[carrier wave]]).
The basic requirements that you should a bare minimum for all users coming from all systems are Triplex, the capacity to back it up, strong technical support, and simple playback. These two-in-one cameras, as mentioned before, not merely cut the quantity of cameras needed, and also divide the quantity of domes needed for the system in half. From these we have come to learn about the thought of Biometric Access Control System. The newer units are smarter, as they could regulate the volume of power that is certainly distributed to one camera or twenty. There are DVR devices that have a built in CD burner - but this will likely come at additional cost. Cameras have been around for any long duration of course, before this development.<br><br>There are numerous reasons you should consider [http://Emilytylers.com/How_To_Make_Your_Product_The_Ferrari_Of_Sme_4221_Review installing] and utilizing CCTV in your own home. By ways of Router and Relevant Hardwares and Softwares,  cctv 8 channel dvr price the Communication will takes place. You may be spending wisely and saving for that future, and I am happy to suit your needs.<br><br>It [http://Www.killingmonkey.com/wikimonkey/index.php?title=10_Questions_You_Need_To_Ask_About_Cctv_Digital_Video_Recorder_Software actively] works to capture images of vehicles, too, so it is possible to still determine the quantity plate of the car. Unless you would like to keep each minute of all of the recordings this will be the easiest and simplest approach.<br><br>No you simply need to become mindful of your surveillance systems needs and what features and specifications will best suit your needs. However, with regards to CCTV video, content in lieu of quality takes preference. Security is fundamentally important across all walks of life to ensure the overall safety and possessions of all individuals are comprehensively protected.<br><br>In these difficult economic times, it is absolutely critical for any company, regardless of size, to guard their products. This is perfect should you be feeling stuck, unfulfilled, or should you just are aware that you are effective at achieving more. Yet national statistics demonstrate that regular Joe defendants receive over the 50% conviction rate for rape and 14% for many other crime.<br><br>This actually is really practical in any monitoring exercise and also for your reason of proof or proof in any court of law. But due on the rise in a variety of criminal assaults & major political changes, the impact within the society remains at a peak level.<br><br>A separate monitor about the a different space can however researching the market the spot. Such cameras are also employed to monitor babysitters, nannies and housekeepers in your own home or helpers and servants at office. A mini spy camera can be well suited for security purposes or spying on friends for the prank need to enjoy it.<br><br>Neither companies nor houses are totally free from burglary. Corporations send us information the consistent schedule - it's basically that virtually all of time it's not necessarily incredibly related or beneficial. Of all DVRs the latest is the multi-room DVR with a lot more than the normal safe-keeping.<br><br>For instance you can integrate with alarm systems so that your CCTV sets off the alarm if it detects movement. A CCTV strategy is comprised of the a protection DVR to tape suspicious activity, a camera to observe and the cables for connecting them together.<br><br>


Any digital modulation scheme uses a [[wiktionary:finite|finite]] number of distinct signals to represent digital data. PSK uses a finite number of phases, each assigned a unique pattern of [[bit|binary digit]]s. Usually, each phase encodes an equal number of bits. Each pattern of bits forms the [[Symbol (data)|symbol]] that is represented by the particular phase. The [[demodulator]], which is designed specifically for the symbol-set used by the modulator, determines the phase of the received signal and maps it back to the symbol it represents, thus recovering the original data. This requires the receiver to be able to compare the phase of the received signal to a reference signal &mdash; such a system is termed coherent (and referred to as CPSK).
Yes, we must go ahead and take bad using the good, the dark while using Light, which is the Law of Polarity. Wireless security [http://Emilytylers.com/How_To_Make_Your_Product_The_Ferrari_Of_Sme_4221_Review cameras] would also eliminate the hassle of digging holes around the wall to put things together in order to hold the camera.<br><br>Obsessive Facebook trolling, 'liking' post after post without contributing  [http://www.iohotspots.nl/out.php?url=cctvdvrreviews.com Samsung sme-2220 dvr security system manual] your individual is annoying. Also, some cameras desire more electricity than other individuals so it can be also critical you just read through the specs of one's cameras and know their ability demands.<br><br>Surveillance camera system makers must know which kind of purpose each surveillance camera must accomplish. They is going to be able to accurately survey the venue and recommend to you the right kind of security fence to work with. From reversing sensors and handsfree kits to tracking systems and vehicle CCTV, Base Systems are the specialists for your in car electronics needs. These are a few scenario when you need to get in touch using a trusted locksmith. To begin with, security camera systems may come in a variety of designs and styles. And obviously, I come with an app from my cable provider so when I am around the road and can't get home to view that NFL playoff came, I can the choice is yours to record to my DVR.
 
Alternatively, instead of operating with respect to a constant reference wave, the broadcast can operate with respect to itself. Changes in phase  of a single broadcast waveform can be considered the significant items. In this system, the demodulator determines the changes in the phase of the received signal rather than the phase (relative to a reference wave) itself. Since this scheme depends on the difference between successive phases, it is termed '''differential phase-shift keying (DPSK)'''. DPSK can be significantly simpler to implement than ordinary PSK since there is no need for the demodulator to have a copy of the reference signal to determine the exact phase of the received signal (it is a non-coherent scheme). In exchange, it produces more erroneous demodulation.
 
==Introduction==
 
There are three major classes of [[modulation#Digital modulation methods|digital modulation]] techniques used for transmission of [[Digital data|digital]]ly represented data:
 
* [[Amplitude-shift keying]] (ASK)
* [[Frequency-shift keying]] (FSK)
* Phase-shift keying (PSK)
 
All convey data by changing some aspect of a base signal, the [[carrier wave]] (usually a [[Sine wave|sinusoid]]), in response to a data signal. In the case of PSK, the phase is changed to represent the data signal. There are two fundamental ways of utilizing the phase of a signal in this way:
 
* By viewing the [[Phase (waves)|phase]] itself as conveying the information, in which case the [[demodulator]] must have a reference signal to compare the received signal's phase against; or
* By viewing the ''change'' in the phase as conveying information &mdash; [[#Differential encoding|''differential'']] schemes, [[Phase-shift keying#Differential phase-shift keying .28DPSK.29|some]] of which do not need a reference carrier (to a certain extent).
 
A convenient way to represent PSK schemes is on a [[constellation diagram]]. This shows the points in the [[complex plane]] where, in this context, the [[real number|real]] and [[imaginary number|imaginary]] axis are termed the in-phase and quadrature axes respectively due to their 90° separation. Such a representation on perpendicular axes lends itself to straightforward implementation. The amplitude of each point along the in-phase axis is used to modulate a cosine (or sine) wave and the amplitude along the quadrature axis to modulate a sine (or cosine) wave.
 
In PSK, the [[constellation diagram|constellation points]] chosen are usually positioned with uniform [[angle|angular]] spacing around a [[circle]]. This gives maximum phase-separation between adjacent points and thus the best immunity to corruption. They are positioned on a circle so that they can all be transmitted with the same energy. In this way, the moduli of the complex numbers they represent will be the same and thus so will the amplitudes needed for the cosine and sine waves. Two common examples are "binary phase-shift keying" ([[Phase-shift keying#Binary phase-shift keying (BPSK)|BPSK]]) which uses two phases, and "quadrature phase-shift keying" ([[Phase-shift keying#Quadrature phase-shift keying (QPSK)|QPSK]]) which uses four phases, although any number of phases may be used. Since the data to be conveyed are usually binary, the PSK scheme is usually designed with the number of constellation points being a [[power (mathematics)|power]] of 2.
 
===Definitions===
 
For determining error-rates mathematically, some definitions will be needed:
 
*<math>E_b</math> = Energy-per-[[bit]]
*<math>E_s</math> = Energy-per-symbol = <math>nE_b</math> with ''n'' bits per symbol
*<math>T_b</math> = [[Bit rate|Bit duration]]
*<math>T_s</math> = [[Symbol rate|Symbol duration]]
*<math>N_0/2</math> = [[Signal noise|Noise]] [[spectral density|power spectral density]] ([[Watt|W]]/[[Hertz|Hz]])
*<math>P_b</math>  = [[Probability]] of bit-error
*<math>P_s</math>  = Probability of symbol-error
 
<math>Q(x)</math> will give the probability that a single sample taken from a random process with zero-mean and unit-variance [[Normal distribution|Gaussian probability density function]] will be greater or equal to <math>x</math>. It is a scaled form of the [[Error function|complementary Gaussian error function]]:
: <math>Q(x) = \frac{1}{\sqrt{2\pi}}\int_{x}^{\infty}e^{-t^{2}/2}dt = \frac{1}{2}\,\operatorname{erfc}\left(\frac{x}{\sqrt{2}}\right),\ x\geq{}0</math>.
 
The error-rates quoted here are those in [[additive white Gaussian noise|additive]] [[white noise|white]] [[Gaussian noise]] ([[AWGN]]). These error rates are lower than those computed in [[fading channel]]s, hence, are a good theoretical benchmark to compare with.
 
==Applications==
 
Owing to PSK's simplicity, particularly when compared with its competitor [[quadrature amplitude modulation]], it is widely used in existing technologies.
 
The [[wireless LAN]] standard, [[IEEE 802.11b-1999]],<ref name="ref80211">[http://standards.ieee.org/getieee802/download/802.11-1999.pdf IEEE Std 802.11-1999: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications] &mdash; the overarching IEEE 802.11 specification.{{dead link|date=October 2011}}</ref><ref name="80211b">[http://standards.ieee.org/getieee802/download/802.11b-1999.pdf IEEE Std 802.11b-1999 (R2003)] &mdash; the IEEE 802.11b specification.</ref> uses a variety of different PSKs depending on the data-rate required. At the basic-rate of 1 [[Mbit]]/s, it uses DBPSK (differential BPSK). To provide the extended-rate of 2 Mbit/s, DQPSK is used. In reaching 5.5 Mbit/s and the full-rate of 11 Mbit/s, QPSK is employed, but has to be coupled with [[complementary code keying]]. The higher-speed wireless LAN standard, [[IEEE 802.11g-2003]]<ref name="ref80211" /><ref name="80211g">[http://standards.ieee.org/getieee802/download/802.11g-2003.pdf IEEE Std 802.11g-2003] &mdash; the IEEE 802.11g specification.</ref> has eight data rates: 6, 9, 12, 18, 24, 36, 48 and 54 Mbit/s. The 6 and 9 Mbit/s modes use [[Orthogonal frequency-division multiplexing|OFDM]] modulation where each sub-carrier is BPSK modulated. The 12 and 18 Mbit/s modes use OFDM with QPSK. The fastest four modes use OFDM with forms of [[quadrature amplitude modulation]].
 
Because of its simplicity BPSK is appropriate for low-cost passive transmitters, and is used in [[RFID]] standards such as [[ISO/IEC 14443]] which has been adopted for [[biometric passport]]s, credit cards such as [[American Express]]'s [[ExpressPay]], and many other applications.<ref>[http://www.atmel.com/dyn/resources/prod_documents/doc2056.pdf Understanding the Requirements of ISO/IEC 14443 for Type B Proximity Contactless Identification Cards], Application Note, Rev. 2056B–RFID–11/05, 2005, ATMEL</ref>
 
[[Bluetooth]] 2 will use <math>\pi/4</math>-DQPSK at its lower rate (2 Mbit/s) and 8-DPSK at its higher rate (3 Mbit/s) when the link between the two devices is sufficiently robust. Bluetooth 1 modulates with [[Minimum-shift keying|Gaussian minimum-shift keying]], a binary scheme, so either modulation choice in version 2 will yield a higher data-rate. A similar technology, [[IEEE 802.15.4]] (the wireless standard used by [[ZigBee]]) also relies on PSK. IEEE 802.15.4 allows the use of two frequency bands: 868&ndash;915 [[Megahertz|MHz]] using BPSK and at 2.4 [[Hertz|GHz]] using OQPSK.
 
Notably absent from these various schemes is 8-PSK. This is because its error-rate performance is close to that of [[quadrature amplitude modulation|16-QAM]] &mdash; it is only about 0.5 [[decibel|dB]] better{{Citation needed|date=October 2007}} &mdash; but its data rate is only three-quarters that of 16-QAM. Thus 8-PSK is often omitted from standards and, as seen above, schemes tend to 'jump' from QPSK to 16-QAM ([[Quadrature amplitude modulation#Rectangular QAM|8-QAM]] is possible but difficult to implement).
 
Included among the exceptions is [[HughesNet]] satellite ISP.  For example, the model HN7000S modem
(on KU-band satcom) uses 8-PSK modulation.
 
==Binary phase-shift keying (BPSK)==
 
[[File:BPSK Gray Coded.svg|200px|right|thumb|Constellation diagram example for BPSK.]]
 
BPSK (also sometimes called PRK, phase reversal keying, or 2PSK) is the simplest form of phase shift keying (PSK). It uses two phases which are separated by 180° and so can also be termed 2-PSK. It does not particularly matter exactly where the constellation points are positioned, and in this figure they are shown on the real axis, at 0° and 180°. This modulation is the most robust of all the PSKs since it takes the highest level of noise or distortion to make the [[demodulator]] reach an incorrect decision. It is, however, only able to modulate at 1 bit/symbol (as seen in the figure) and so is unsuitable for high data-rate applications.
 
 
 
In the presence of an arbitrary phase-shift introduced by the [[communications channel]], the demodulator is unable to tell which constellation point is which. As a result, the data is often [[#Differential encoding|differentially encoded]] prior to modulation.
 
BPSK is functionally equivalent to [[Quadrature amplitude modulation|2-QAM]] modulation.
 
=== Implementation ===
The general form for BPSK follows the equation:
:<math>s_n(t) =  \sqrt{\frac{2E_b}{T_b}} \cos(2 \pi f_c t + \pi(1-n )), n = 0,1. </math>
This yields two phases, 0 and π.
In the specific form, binary data is often conveyed with the following signals:
:<math>s_0(t) =  \sqrt{\frac{2E_b}{T_b}} \cos(2 \pi f_c t + \pi )
              = - \sqrt{\frac{2E_b}{T_b}} \cos(2 \pi f_c t)</math> for binary "0"
:<math>s_1(t) = \sqrt{\frac{2E_b}{T_b}} \cos(2 \pi f_c t) </math> for binary "1"
where ''f''<sub>''c''</sub> is the frequency of the carrier-wave.
 
Hence, the signal-space can be represented by the single [[basis function]]
:<math>\phi(t) = \sqrt{\frac{2}{T_b}} \cos(2 \pi f_c t) </math>
where 1 is represented by <math>\sqrt{E_b} \phi(t)</math> and 0 is represented by <math>-\sqrt{E_b} \phi(t)</math>. This assignment is, of course, arbitrary.
 
This use of this basis function is shown at the [[#timing|end of the next section]] in a signal timing diagram. The topmost signal is a BPSK-modulated cosine wave that the BPSK modulator would produce. The bit-stream that causes this output is shown above the signal (the other parts of this figure are relevant only to QPSK).
 
=== Bit error rate ===
 
The [[bit error rate]] (BER) of BPSK in [[AWGN]] can be calculated as:<ref>Communications Systems, H. Stern & S. Mahmoud, Pearson Prentice Hall, 2004, p283</ref>
:<math>P_b = Q\left(\sqrt{\frac{2E_b}{N_0}}\right)</math> or <math>P_b = \frac{1}{2} \operatorname{erfc} \left( \sqrt{\frac{E_b}{N_0}}\right)</math>
 
Since there is only one bit per symbol, this is also the symbol error rate.
 
==Quadrature phase-shift keying (QPSK)==
 
[[File:QPSK Gray Coded.svg|200px|right|thumb|Constellation diagram for QPSK with [[Gray coding]]. Each adjacent symbol only differs by one bit.]]
 
Sometimes this is known as ''quaternary PSK'', ''quadriphase PSK'', 4-PSK, or 4-[[QAM]]. (Although the root concepts of QPSK and 4-QAM are different, the resulting modulated radio waves are exactly the same.) QPSK uses four points on the constellation diagram, equispaced around a circle. With four phases, QPSK can encode two bits per symbol, shown in the diagram with [[Gray coding]] to minimize the [[bit error rate]] (BER) &mdash; sometimes misperceived as twice the BER of BPSK.
 
The mathematical analysis shows that QPSK can be used either to double the data rate compared with a BPSK system while maintaining the ''same'' [[bandwidth (signal processing)|bandwidth]] of the signal, or to ''maintain the data-rate of BPSK'' but halving the bandwidth needed. In this latter case, the BER of QPSK is ''exactly the same'' as the BER of BPSK - and deciding differently is a common confusion when considering or describing QPSK. The transmitted carrier can undergo numbers of phase changes.
 
Given that radio communication channels are allocated by agencies such as the [[Federal Communication Commission]] giving a prescribed (maximum) bandwidth, the advantage of QPSK over BPSK becomes evident: QPSK transmits twice the data rate in a given bandwidth compared to BPSK - at the same BER. The engineering penalty that is paid is that QPSK transmitters and receivers are more complicated than the ones for BPSK. However, with modern [[electronics]] technology, the penalty in cost is very moderate. 
 
As with BPSK, there are phase ambiguity problems at the receiving end, and [[#Differential encoding|differentially encoded]] QPSK is often used in practice.
 
=== Implementation ===
 
The implementation of QPSK is more general than that of BPSK and also indicates the implementation of higher-order PSK. Writing the symbols in the constellation diagram in terms of the sine and cosine waves used to transmit them:
 
:<math>s_n(t) = \sqrt{\frac{2E_s}{T_s}} \cos \left ( 2 \pi f_c t + (2n -1) \frac{\pi}{4}\right ),\quad n = 1, 2, 3, 4. </math>
 
This yields the four phases π/4, 3π/4, 5π/4 and 7π/4 as needed.
 
This results in a two-dimensional signal space with unit [[basis functions]]
:<math>\phi_1(t) = \sqrt{\frac{2}{T_s}} \cos (2 \pi f_c t) </math>
:<math>\phi_2(t) = \sqrt{\frac{2}{T_s}} \sin (2 \pi f_c t) </math>
The first basis function is used as the in-phase component of the signal and the second as the quadrature component of the signal.
 
Hence, the signal constellation consists of the signal-space 4 points
 
:<math>\left ( \pm \sqrt{E_s/2}, \pm \sqrt{E_s/2} \right ).</math>
 
The factors of 1/2 indicate that the total power is split equally between the two carriers.
 
Comparing these basis functions with that for BPSK shows clearly how QPSK can be viewed as two independent BPSK signals. Note that the signal-space points for BPSK do not need to split the symbol (bit) energy over the two carriers in the scheme shown in the BPSK constellation diagram.
 
QPSK systems can be implemented in a number of ways. An illustration of the major components of the transmitter and receiver structure are shown below.
 
[[File:Transmitter QPSK 2.PNG|thumb|600px|center|Conceptual transmitter structure for QPSK. The binary data stream is split into the in-phase and quadrature-phase components. These are then separately modulated onto two orthogonal basis functions. In this implementation, two sinusoids are used. Afterwards, the two signals are superimposed, and the resulting signal is the QPSK signal. Note the use of polar non-return-to-zero encoding. These encoders can be placed before for binary data source, but have been placed after to illustrate the conceptual difference between digital and analog signals involved with digital modulation.]]
 
[[File:Receiver QPSK.PNG|thumb|600px|center|Receiver structure for QPSK. The matched filters can be replaced with correlators. Each detection device uses a reference threshold value to determine whether a 1 or 0 is detected.]]
 
=== Bit error rate ===
 
Although QPSK can be viewed as a quaternary modulation, it is easier to see it as two independently modulated quadrature carriers. With this interpretation, the even (or odd) bits are used to modulate the in-phase component of the carrier, while the odd (or even) bits are used to modulate the quadrature-phase component of the carrier. BPSK is used on both carriers and they can be independently demodulated.
 
As a result, the probability of bit-error for QPSK is the same as for BPSK:
:<math>P_b = Q\left(\sqrt{\frac{2E_b}{N_0}}\right).</math>
 
However, in order to achieve the same bit-error probability as BPSK, QPSK uses twice the power (since two bits are transmitted simultaneously).
 
The symbol error rate is given by:
<!--Note this needs to be in a table to make the alignment and spacing right. -->
{|
|<math>\,\!P_s</math>
|<math>= 1 - \left( 1 - P_b \right)^2</math>
|-
|
|<math>= 2Q\left( \sqrt{\frac{E_s}{N_0}} \right) - \left[ Q \left( \sqrt{\frac{E_s}{N_0}} \right) \right]^2</math>.
|}
 
If the [[signal-to-noise ratio]] is high (as is necessary for practical QPSK systems) the probability of symbol error may be approximated:
:<math>P_s \approx 2 Q \left( \sqrt{\frac{E_s}{N_0}} \right )</math>
 
 
 
<div id="timing">The modulated signal is shown below for a short segment of a random binary data-stream. The two carrier waves are a cosine wave and a sine wave, as indicated by the signal-space analysis above. Here, the odd-numbered bits have been assigned to the in-phase component and the even-numbered bits to the quadrature component (taking the first bit as number 1). The total signal &mdash; the sum of the two components &mdash; is shown at the bottom. Jumps in phase can be seen as the PSK changes the phase on each component at the start of each bit-period. The topmost waveform alone matches the description given for BPSK above.</div>
 
[[File:QPSK timing diagram.png|frame|center|Timing diagram for QPSK. The binary data stream is shown beneath the time axis. The two signal components with their bit assignments are shown the top and the total, combined signal at the bottom. Note the abrupt changes in phase at some of the bit-period boundaries.]]
 
The binary data that is conveyed by this waveform is: 1 1 0 0 0 1 1 0.
 
* The odd bits, highlighted here, contribute to the in-phase component: '''<u>1</u>''' 1 '''<u>0</u>''' 0 '''<u>0</u>''' 1 '''<u>1</u>''' 0
* The even bits, highlighted here, contribute to the quadrature-phase component: 1 '''<u>1</u>''' 0 '''<u>0</u>''' 0 '''<u>1</u>''' 1 '''<u>0</u>'''
 
===Variants===
 
====Offset QPSK (OQPSK)====
 
[[File:Pi-by-O-QPSK Gray Coded.svg|thumb|Signal doesn't cross zero, because only one bit of the symbol is changed at a time]]
 
''Offset quadrature phase-shift keying'' (''OQPSK'') is a variant of phase-shift keying modulation using 4 different values of the phase to transmit.  It is sometimes called ''Staggered quadrature phase-shift keying'' (''SQPSK'').
 
[[File:Oqpsk phase plot.svg|thumb|Difference of the phase between QPSK and OQPSK]]
 
Taking four values of the phase (two [[bit]]s) at a time to construct a QPSK symbol can allow the phase of the signal to jump by as much as 180° at a time. When the signal is low-pass filtered (as is typical in a transmitter), these phase-shifts result in large amplitude fluctuations, an undesirable quality in communication systems. By offsetting the timing of the odd and even bits by one bit-period, or half a symbol-period, the in-phase and quadrature components will never change at the same time. In the constellation diagram shown on the right, it can be seen that this will limit the phase-shift to no more than 90° at a time. This yields much lower amplitude fluctuations than non-offset QPSK and is sometimes preferred in practice.
 
The picture on the right shows the difference in the behavior of the phase between ordinary QPSK and OQPSK. It can be seen that in the first plot the phase can change by 180° at once, while in OQPSK the changes are never greater than 90°.
 
The modulated signal is shown below for a short segment of a random binary data-stream. Note the half symbol-period offset between the two component waves. The sudden phase-shifts occur about twice as often as for QPSK (since the signals no longer change together), but they are less severe. In other words, the magnitude of jumps is smaller in OQPSK when compared to QPSK.
 
[[File:OQPSK timing diagram.png|frame|center|Timing diagram for offset-QPSK. The binary data stream is shown beneath the time axis. The two signal components with their bit assignments are shown the top and the total, combined signal at the bottom. Note the half-period offset between the two signal components.]]
 
====''&pi;'' /4&ndash;QPSK====
 
[[File:Pi-by-4-QPSK Gray Coded.svg|thumb|right|Dual constellation diagram for π/4-QPSK. This shows the two separate constellations with identical Gray coding but rotated by 45° with respect to each other.]]
 
This variant of QPSK uses two identical constellations which are rotated by 45° (<math>\pi/4</math> radians, hence the name) with respect to one another. Usually, either the even or odd symbols are used to select points from one of the constellations and the other symbols select points from the other constellation. This also reduces the phase-shifts from a maximum of 180°, but only to a maximum of 135° and so the amplitude fluctuations of <math>\pi/4</math>&ndash;QPSK are between OQPSK and non-offset QPSK.
 
One property this modulation scheme possesses is that if the modulated signal is represented in the complex domain, it does not have any paths through the origin. In other words, the signal does not pass through the origin. This lowers the dynamical range of fluctuations in the signal which is desirable when engineering communications signals.
 
On the other hand, <math>\pi/4</math>&ndash;QPSK lends itself to easy demodulation and has been adopted for use in, for example, [[Time division multiple access|TDMA]] [[cellular telephone]] systems.
 
The modulated signal is shown below for a short segment of a random binary data-stream. The construction is the same as above for ordinary QPSK. Successive symbols are taken from the two constellations shown in the diagram. Thus, the first symbol (1 1) is taken from the 'blue' constellation and the second symbol (0 0) is taken from the 'green' constellation. Note that magnitudes of the two component waves change as they switch between constellations, but the total signal's magnitude remains constant ([[constant envelope]]). The phase-shifts are between those of the two previous timing-diagrams.
 
[[File:Pi-by-4-QPSK timing diagram.png|frame|center|Timing diagram for π/4-QPSK. The binary data stream is shown beneath the time axis. The two signal components with their bit assignments are shown the top and the total, combined signal at the bottom. Note that successive symbols are taken alternately from the two constellations, starting with the 'blue' one.]]
 
==== SOQPSK ====
 
The license-free '''shaped-offset QPSK''' (SOQPSK) is interoperable with Feher-patented QPSK ('''FQPSK'''), in the sense that an integrate-and-dump offset QPSK detector produces the same output no matter which kind of transmitter is used.<ref>
Tom Nelson, Erik Perrins, and Michael Rice.
[http://people.eecs.ku.edu/~esp/publications/c2005ItcCommon.pdf "Common detectors for Tier 1 modulations"].
 
T. Nelson, E. Perrins, M. Rice.
[http://www.researchgate.net/publication/4213516_Common_detectors_for_shaped_offset_QPSK_(SOQPSK)_and_Feher-patented_QPSK_(FQPSK) "Common detectors for shaped offset QPSK (SOQPSK) and Feher-patented QPSK (FQPSK)"]
{{cite doi|10.1109/GLOCOM.2005.1578470}}
ISBN 0-7803-9414-3
</ref>
 
These modulations carefully shape the I and Q waveforms such that they change very smoothly, and the signal stays constant-amplitude even during signal transitions. (Rather than traveling instantly from one symbol to another, or even linearly, it travels smoothly around the constant-amplitude circle from one symbol to the next.)
 
The standard description of SOQPSK-TG involves [[ternary signal|ternary symbols]].
 
==== DPQPSK ====
 
'''Dual-polarization quadrature phase shift keying''' (DPQPSK) or '''dual-polarization QPSK''' - involves the polarization multiplexing of two different QPSK signals, thus improving the spectral efficiency by a factor of 2. This is a cost-effective alternative, to utilizing 16-PSK instead of QPSK to double the spectral efficiency.
 
==Higher-order PSK==
 
[[File:8PSK Gray Coded.svg|200px|right|thumb|Constellation diagram for 8-PSK with Gray coding.]]
 
Any number of phases may be used to construct a PSK constellation but 8-PSK is usually the highest order PSK constellation deployed. With more than 8 phases, the error-rate becomes too high and there are better, though more complex, modulations available such as [[quadrature amplitude modulation]] (QAM). Although any number of phases may be used, the fact that the constellation must usually deal with binary data means that the number of symbols is usually a power of 2 &mdash; this allows an equal number of bits-per-symbol.
 
===Bit error rate===
For the general <math>M</math>-PSK there is no simple expression for the symbol-error probability if <math>M>4</math>. Unfortunately, it can only be obtained from:
:<math>
P_s = 1 - \int_{-\frac{\pi}{M}}^{\frac{\pi}{M}}p_{\theta_{r}}\left(\theta_{r}\right)d\theta_{r}
</math>
 
where
 
:<math>p_{\theta_{r}}\left(\theta_r\right) = \frac{1}{2\pi}e^{-2\gamma_{s}\sin^{2}\theta_{r}}\int_{0}^{\infty}Ve^{-\left(V-\sqrt{4\gamma_{s}}\cos\theta_{r}\right)^{2}/2}dV</math>,
:<math>V = \sqrt{r_1^2 + r_2^2}</math>,
:<math>\theta_r = \tan^{-1}\left(r_2/r_1\right)</math>,
:<math>\gamma_{s} = \frac{E_{s}}{N_{0}}</math> and
:<math>r_1 \sim{} N\left(\sqrt{E_s},N_{0}/2\right)</math> and <math>r_2 \sim{} N\left(0,N_{0}/2\right)</math> are jointly Gaussian [[random variable]]s.
 
[[File:PSK BER curves.svg|thumb|left|280px|Bit-error rate curves for BPSK, QPSK, 8-PSK and 16-PSK, AWGN channel.]]
This may be approximated for high <math>M</math> and high <math>E_b/N_0</math> by:
:<math>P_s \approx 2Q\left(\sqrt{2\gamma_s}\sin\frac{\pi}{M}\right)</math>.
 
The bit-error probability for <math>M</math>-PSK can only be determined exactly once the bit-mapping is known. However, when [[Gray code|Gray coding]] is used, the most probable error from one symbol to the next produces only a single bit-error and
:<math>P_b \approx \frac{1}{k}P_s</math>.
(Using Gray coding allows us to approximate the [[Lee distance]] of the errors as the [[Hamming distance]] of the errors in the decoded bitstream, which is easier to implement in hardware.)
 
The graph on the left compares the bit-error rates of BPSK, QPSK (which are the same, as noted above), 8-PSK and 16-PSK. It is seen that [[higher-order modulation]]s exhibit higher error-rates; in exchange however they deliver a higher raw data-rate.
 
Bounds on the error rates of various digital modulation schemes can be computed with application of the [[union bound]] to the signal constellation.
 
==Differential phase-shift keying (DPSK)==
 
===Differential encoding===
 
{{main|differential coding}}
 
Differential phase shift keying (DPSK) is a common form of phase modulation that conveys data by changing the phase of the carrier wave. As mentioned for BPSK and QPSK there is an ambiguity of phase if the constellation is rotated by some effect in the [[communications channel]] through which the signal passes. This problem can be overcome by using the data to ''change'' rather than ''set'' the phase.
 
For example, in differentially encoded BPSK a binary '1' may be transmitted by adding 180° to the current phase and a binary '0' by adding 0° to the current phase. Another variant of DPSK is Symmetric Differential Phase Shift keying, SDPSK, where encoding would be +90° for a '1' and -90° for a '0'.
 
In differentially encoded QPSK (DQPSK), the phase-shifts are 0°, 90°, 180°, -90° corresponding to data '00', '01', '11', '10'. This kind of encoding may be demodulated in the same way as for non-differential PSK but the phase ambiguities can be ignored. Thus, each received symbol is demodulated to one of the <math>M</math> points in the constellation and a [[comparator]] then computes the difference in phase between this received signal and the preceding one. The difference encodes the data as described above.
Symmetric Differential Quadrature Phase Shift Keying (SDQPSK) is like DQPSK, but encoding is symmetric, using phase shift values of -135°, -45°, +45° and +135°.
 
The modulated signal is shown below for both DBPSK and DQPSK as described above. In the figure, it is assumed that the ''signal starts with zero phase'', and so there is a phase shift in both signals at <math>t = 0</math>.
 
[[File:DBQPSK timing diag.png|frame|center|Timing diagram for DBPSK and DQPSK. The binary data stream is above the DBPSK signal. The individual bits of the DBPSK signal are grouped into pairs for the DQPSK signal, which only changes every ''T<sub>s</sub>'' = 2''T<sub>b</sub>''.]]
 
Analysis shows that differential encoding approximately doubles the error rate compared to ordinary <math>M</math>-PSK but this may be overcome by only a small increase in <math>E_b/N_0</math>. Furthermore, this analysis (and the graphical results below) are based on a system in which the only corruption is additive white Gaussian noise([[AWGN]]). However, there will also be a physical channel between the transmitter and receiver in the communication system. This channel will, in general, introduce an unknown phase-shift to the PSK signal; in these cases the differential schemes can yield a ''better'' error-rate than the ordinary schemes which rely on precise phase information.
 
===Demodulation===
 
[[File:DPSK BER curves.svg|thumb|right|280px|BER comparison between DBPSK, DQPSK and their non-differential forms using gray-coding and operating in white noise.]]
 
For a signal that has been differentially encoded, there is an obvious alternative method of demodulation. Instead of demodulating as usual and ignoring carrier-phase ambiguity, the phase between two successive received symbols is compared and used to determine what the data must have been. When differential encoding is used in this manner, the scheme is known as differential phase-shift keying (DPSK). Note that this is subtly different from just differentially encoded PSK since, upon reception, the received symbols are ''not'' decoded one-by-one to constellation points but are instead compared directly to one another.
 
Call the received symbol in the <math>k</math><sup>th</sup> timeslot <math>r_k</math> and let it have phase <math>\phi_k</math>. Assume without loss of generality that the phase of the carrier wave is zero. Denote the [[AWGN]] term as <math>n_k</math>. Then
:<math>r_k = \sqrt{E_s}e^{j\phi_k} + n_k</math>.
 
The decision variable for the <math>k-1</math><sup>th</sup> symbol and the <math>k</math><sup>th</sup> symbol is the phase difference between <math>r_k</math> and <math>r_{k-1}</math>. That is, if <math>r_k</math> is projected onto <math>r_{k-1}</math>, the decision is taken on the phase of the resultant complex number:
:<math>r_kr_{k-1}^{*} = E_se^{j\left(\theta_k - \theta_{k-1}\right)} + \sqrt{E_s}e^{j\theta_k}n_{k-1}^{*} + \sqrt{E_s}e^{-j\theta_{k-1}}n_k + n_kn_{k-1}</math>
where superscript * denotes [[complex conjugation]]. In the absence of noise, the phase of this is <math>\theta_{k}-\theta_{k-1}</math>, the phase-shift between the two received signals which can be used to determine the data transmitted.
 
The probability of error for DPSK is difficult to calculate in general, but, in the case of DBPSK it is:
:<math>P_b = \frac{1}{2}e^{-E_b/N_0},</math>
which, when numerically evaluated, is only slightly worse than ordinary BPSK, particularly at higher <math>E_b/N_0</math> values.
 
Using DPSK avoids the need for possibly complex carrier-recovery schemes to provide an accurate phase estimate and can be an attractive alternative to ordinary PSK.
 
In [[optical communications]], the data can be modulated onto the phase of a [[laser]] in a differential way. The modulation is a laser which emits a [[continuous wave]], and a [[Mach-Zehnder modulator]] which receives electrical binary data. For the case of BPSK for example, the laser transmits the field unchanged for binary '1', and with reverse polarity for '0'. The demodulator consists of a [[delay line interferometer]] which delays one bit, so two bits can be compared at one time.  In further processing, a [[photodiode]] is used to transform the [[optical field]] into an electric current, so the information is changed back into its original state.
 
The bit-error rates of DBPSK and DQPSK are compared to their non-differential counterparts in the graph to the right. The loss for using DBPSK is small enough compared to the complexity reduction that it is often used in communications systems that would otherwise use BPSK. For DQPSK though, the loss in performance compared to ordinary QPSK is larger and the system designer must balance this against the reduction in complexity.
 
===Example: Differentially encoded BPSK===
 
[[File:Differential Codec.png|center|500px|thumb|Differential encoding/decoding system diagram.]]
 
At the <math>k^{\textrm{th}}</math> time-slot call the bit to be modulated <math>b_k</math>, the differentially encoded bit <math>e_k</math> and the resulting modulated signal <math>m_k(t)</math>. Assume that the constellation diagram positions the symbols at ±1 (which is BPSK). The differential encoder produces:
:<math>\,e_k = e_{k-1}\oplus{}b_k</math>
where <math>\oplus{}</math> indicates [[binary addition|binary]] or [[modular arithmetic|modulo-2]] addition.
 
[[File:Diff enc BPSK BER curves.svg|thumb|right|280px|BER comparison between BPSK and differentially encoded BPSK with gray-coding operating in white noise.]]
 
So <math>e_k</math> only changes state (from binary '0' to binary '1' or from binary '1' to binary '0') if <math>b_k</math> is a binary '1'. Otherwise it remains in its previous state. This is the description of differentially encoded BPSK given above.
 
The received signal is demodulated to yield <math>e_k=</math>±1 and then the differential decoder reverses the encoding procedure and produces:
:<math>\,b_k = e_{k}\oplus{}e_{k-1}</math> since binary subtraction is the same as binary addition.
 
Therefore, <math>b_k=1</math> if <math>e_k</math> and <math>e_{k-1}</math> differ and <math>b_k=0</math> if they are the same. Hence, if both <math>e_k</math> and <math>e_{k-1}</math> are ''inverted'', <math>b_k</math> will still be decoded correctly. Thus, the 180° phase ambiguity does not matter.
 
Differential schemes for other PSK modulations may be devised along similar lines. The waveforms for DPSK are the same as for differentially encoded PSK given above since the only change between the two schemes is at the receiver.
 
The BER curve for this example is compared to ordinary BPSK on the right. As mentioned above, whilst the error-rate is approximately doubled, the increase needed in <math>E_b/N_0</math> to overcome this is small.  The increase in <math>E_b/N_0</math> required to overcome differential modulation in coded systems, however, is larger - typically about 3 dB. The performance degradation is a result of [[noncoherent transmission]] - in this case it refers to the fact that tracking of the phase is completely ignored.
 
== Channel capacity ==
 
[[File:Channel capacity for complex constellations.svg|thumb|300px|Given a fixed bandwidth, channel capacity vs. [[signal-to-noise ratio|SNR]] for some common modulation schemes]]
 
Like all M-ary modulation schemes with M = 2<sup>''b''</sup> symbols, when given exclusive access to a fixed bandwidth, the channel capacity of any phase shift keying modulation scheme rises to a maximum of ''b'' bits per symbol as the [[signal-to-noise ratio]] increases.
 
==See also==
 
*[[Differential coding]]
*[[Filtered symmetric differential phase-shift keying]]
*[[Modulation]] &mdash; for an overview of all modulation schemes
*[[Phase modulation]] (PM) &mdash; the analogue equivalent of PSK
*[[Polar modulation]]
*[[PSK31]]
*[[PSK63]]
 
==Notes==
 
<!--This article uses the Cite.php citation mechanism. If you would like more information on how to add references to this article, please see http://meta.wikimedia.org/wiki/Cite/Cite.php -->
{{reflist}}
 
==References==
 
The notation and theoretical results in this article are based on material presented in the following sources:
 
*{{cite book | author=Proakis, John G. | title=Digital Communications | location=Singapore | publisher=McGraw Hill | year=1995 | isbn=0-07-113814-5}}
*{{cite book | author=Couch, Leon W. II | title=Digital and Analog Communications | location=Upper Saddle River, NJ | publisher=Prentice-Hall | year=1997 | isbn=0-13-081223-4}}
*{{cite book | author=Haykin, Simon | title=Digital Communications | location=Toronto, Canada | publisher=John Wiley & Sons | year=1988 | isbn=0-471-62947-2}}
 
{{DEFAULTSORT:Phase-Shift Keying}}
[[Category:Quantized radio modulation modes]]
[[Category:Data transmission]]

Latest revision as of 19:49, 8 January 2015

Instead of various security guards posted at several locations, ideally, a burglar guard could investigate a bank of monitors are fed from multiple video security cameras hidden. You are busy going from work to getting your kids to after school activities.

The basic requirements that you should a bare minimum for all users coming from all systems are Triplex, the capacity to back it up, strong technical support, and simple playback. These two-in-one cameras, as mentioned before, not merely cut the quantity of cameras needed, and also divide the quantity of domes needed for the system in half. From these we have come to learn about the thought of Biometric Access Control System. The newer units are smarter, as they could regulate the volume of power that is certainly distributed to one camera or twenty. There are DVR devices that have a built in CD burner - but this will likely come at additional cost. Cameras have been around for any long duration of course, before this development.

There are numerous reasons you should consider installing and utilizing CCTV in your own home. By ways of Router and Relevant Hardwares and Softwares, cctv 8 channel dvr price the Communication will takes place. You may be spending wisely and saving for that future, and I am happy to suit your needs.

It actively works to capture images of vehicles, too, so it is possible to still determine the quantity plate of the car. Unless you would like to keep each minute of all of the recordings this will be the easiest and simplest approach.

No you simply need to become mindful of your surveillance systems needs and what features and specifications will best suit your needs. However, with regards to CCTV video, content in lieu of quality takes preference. Security is fundamentally important across all walks of life to ensure the overall safety and possessions of all individuals are comprehensively protected.

In these difficult economic times, it is absolutely critical for any company, regardless of size, to guard their products. This is perfect should you be feeling stuck, unfulfilled, or should you just are aware that you are effective at achieving more. Yet national statistics demonstrate that regular Joe defendants receive over the 50% conviction rate for rape and 14% for many other crime.

This actually is really practical in any monitoring exercise and also for your reason of proof or proof in any court of law. But due on the rise in a variety of criminal assaults & major political changes, the impact within the society remains at a peak level.

A separate monitor about the a different space can however researching the market the spot. Such cameras are also employed to monitor babysitters, nannies and housekeepers in your own home or helpers and servants at office. A mini spy camera can be well suited for security purposes or spying on friends for the prank need to enjoy it.

Neither companies nor houses are totally free from burglary. Corporations send us information the consistent schedule - it's basically that virtually all of time it's not necessarily incredibly related or beneficial. Of all DVRs the latest is the multi-room DVR with a lot more than the normal safe-keeping.

For instance you can integrate with alarm systems so that your CCTV sets off the alarm if it detects movement. A CCTV strategy is comprised of the a protection DVR to tape suspicious activity, a camera to observe and the cables for connecting them together.

Yes, we must go ahead and take bad using the good, the dark while using Light, which is the Law of Polarity. Wireless security cameras would also eliminate the hassle of digging holes around the wall to put things together in order to hold the camera.

Obsessive Facebook trolling, 'liking' post after post without contributing Samsung sme-2220 dvr security system manual your individual is annoying. Also, some cameras desire more electricity than other individuals so it can be also critical you just read through the specs of one's cameras and know their ability demands.

Surveillance camera system makers must know which kind of purpose each surveillance camera must accomplish. They is going to be able to accurately survey the venue and recommend to you the right kind of security fence to work with. From reversing sensors and handsfree kits to tracking systems and vehicle CCTV, Base Systems are the specialists for your in car electronics needs. These are a few scenario when you need to get in touch using a trusted locksmith. To begin with, security camera systems may come in a variety of designs and styles. And obviously, I come with an app from my cable provider so when I am around the road and can't get home to view that NFL playoff came, I can the choice is yours to record to my DVR.