CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/20151 Wei Su and John Kosinski U.S. ARMY CECOM RDEC Intelligence and Information.

Slides:



Advertisements
Similar presentations
Chapter 2: Digital Modulation
Advertisements

EE578 Assignment #3 Abdul-Aziz.M Al-Yami October 25 th 2010.
Principles of Electronic Communication Systems
Chapter : Digital Modulation 4.2 : Digital Transmission
1. INTRODUCTION In order to transmit digital information over * bandpass channels, we have to transfer the information to a carrier wave of.appropriate.
Optimization of pilot Locations in Adaptive M-PSK Modulation in a Rayleigh Fading Channel Khaled Almustafa Information System Prince Sultan University.
Communication Systems Simulation - II Harri Saarnisaari Part of Simulations and Tools for Telecommunication Course.
Synchronization in Software Radio (Timing Recovery) Presented by: Shima kheradmand.
© 2002 Pearson Education, Inc. Commercial use, distribution, or sale prohibited. Wireless Communications Principles and Practice 2/e T.S. Rapppaport Chapter.
Digital Communications I: Modulation and Coding Course Spring Jeffrey N. Denenberg Lecture 4: BandPass Modulation/Demodulation.
Bandpass Digital Transmission
Data Communication and Networking 332 Hardware Components of Data Communication.
EE 6332, Spring, 2014 Wireless Communication Zhu Han Department of Electrical and Computer Engineering Class 12 Feb. 24 nd, 2014.
Welcome to EQ2430/EQ2440 RF lecture
Carrier-Amplitude modulation In baseband digital PAM: (2d - the Euclidean distance between two adjacent points)
DIGITAL MODULATION.
1 WCA102 Fundamentals of Digital Modulation Digital Modulation – Introduction Digital Modulation in Wireless Communications.
ECE 4371, Fall, 2014 Introduction to Telecommunication Engineering/Telecommunication Laboratory Zhu Han Department of Electrical and Computer Engineering.
Lecture 3-1: Coding and Error Control
Pass-band Data Transmission
Presented by: Group 2.  Two-level PSK (BPSK)  Uses two phases to represent binary digits Where we can consider the above two functions to be multiplied.
CHAPTER 6 PASS-BAND DATA TRANSMISSION
EE 6331, Spring, 2009 Advanced Telecommunication
Lecture 71 Today, we are going to talk about: Some bandpass modulation schemes used in DCS for transmitting information over channel M-PAM, M-PSK, M-FSK,
BER of BPSK Figure 6.3 Signal-space diagram for coherent binary PSK system. The waveforms depicting the transmitted signals s1(t) and s2(t),
Software Defined Radio
EE345S Real-Time Digital Signal Processing Lab Fall 2006 Lecture 16 Quadrature Amplitude Modulation (QAM) Receiver Prof. Brian L. Evans Dept. of Electrical.
Wireless Communication Technologies 1 Outline Introduction OFDM Basics Performance sensitivity for imperfect circuit Timing and.
Wireless Networks Instructor: Fatima Naseem Lecture # 03 Computer Engineering Department, University of Engineering and Technology, Taxila.
Multiuser Detection (MUD) Combined with array signal processing in current wireless communication environments Wed. 박사 3학기 구 정 회.
1 Lab. 13 SISO Wireless System I  In a typical communication system, receiving starts with synchronization.  For a packet-based system, it includes –
ECE 4710: Lecture #17 1 Transmitters  Communication Tx  generate modulated signal s(t) at the carrier frequency f c from the modulating information signal.
Wireless Communication Technologies 1 Phase noise A practical oscillator does not produce a carrier at exactly one frequency, but rather a carrier that.
CENG 5931 GNU Radio Instructor:Dr.Collins Presented by Geetha Paturi ( )
CSCI 465 Data Communications and Networks Lecture 7 Martin van Bommel CSCI 465 Data Communications and Networks 1.
GMSK - Gaussian Minimum Shift Keying
Digital Communications. What is Digital Communications Communication using digital data –Digital Data = bits, nibbles, bytes…1’s and 0’s Two Broad Categories.
Geometric Representation of Modulation Signals
Digital modulation techniques. Modulations systems.
Digital Modulation Schemes
Modulations Amplitude Shift Keying ASK (OOK). BW for ASK Nbaud is baud rate.
Combined Linear & Constant Envelope Modulation
Chapter : Digital Modulation 4.2 : Digital Transmission
Constellation Diagram
Outline Transmitters (Chapters 3 and 4, Source Coding and Modulation) (week 1 and 2) Receivers (Chapter 5) (week 3 and 4) Received Signal Synchronization.
1 complex envelope of BFSK is nonlinear function of m(t) spectrum evaluation - difficult - performed using actual time averaged measurements PSD of BFSK.
Digital Modulation Basics
1 Digital to Analog Encoding. 2 3 Digital modulation techniques Amplitude Shift Keying Amplitude Shift Keying Frequency Shift Keying Frequency Shift.
Performance of Digital Communications System
DIGITAL MODULATION.
CHAPTER 4. OUTLINES 1. Digital Modulation Introduction Information capacity, Bits, Bit Rate, Baud, M- ary encoding ASK, FSK, PSK, QPSK, QAM 2. Digital.
Sistem Telekomunikasi, Sukiswo, ST, MT Sukiswo
1.) Acquisition Phase Task:
Principios de Comunicaciones EL4005
Optical PLL for homodyne detection
Analog and Digital Modulation Techniques
Techniques to control noise and fading
디지털통신 Bandpass Modulation 1 임 민 중 동국대학교 정보통신공학과.
Modulation Techniques
عوارض کانال(تداخل نمونه ها،نویز،فیدینگ) آنالیز خطا،کدینگ کانال
Modulation and OFDM.
Outline Transmitters (Chapters 3 and 4, Source Coding and Modulation) (week 1 and 2) Receivers (Chapter 5) (week 3 and 4) Received Signal Synchronization.
Channel Estimation in OFDM Systems
EE521 Analog and Digital Communications
S Transmission Methods in Telecommunication Systems (4 cr)
DATA COMMUNICATION Lecture-19.
Wireless PHY (Modulation)
Channel Estimation in OFDM Systems
(Digital Modulation Basics)
Phase Shift Keying (PSK)
Presentation transcript:

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/20151 Wei Su and John Kosinski U.S. ARMY CECOM RDEC Intelligence and Information Warfare Directorate Fort Monmouth, New Jersey COMPARISON AND SIMULATION OF DIGITAL MODULATION RECOGNITION ALGORITHMS

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/20152 signal center frequency Cooperative Communication Non-cooperative Communication symbol rate signal ? ? Signal processing Statistical estimation pulse shaping ? Demodulated signal Modulation recognition modulation type ? Automated Signal Exploitation and Modulation Recognition

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/20153 Factors Affect the Modulation Recognition Results  Residual carrier frequency estimation  Carrier frequency and phase tracking  Baud rate estimation and pulse timing  Pulse shaping recovery  Channel distortion

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/20154 PSK8 signal with phase shift produced by center frequency offset A PSK8 signal Center frequency offset

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/ samples per symbol 10/3 samples per symbol  Re-sampling will be necessary if the symbol frequency divided by sample frequency is not an integer  Error is introduced in re-sampling After re-sampling Before re-sampling Pulse Timing

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/20156 Before 16-QAM After Transmitter Radio Channel RF ReceiverEqualizer Decision Maker An adaptive filter (lower figure) is used to eliminate the multiple channel distortion in wireless communication. A distorted 16-QAM signal (left figure) is blindly equalized to give a correct output (right figure) before recognition process Channel Distortion

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/20157  A web site search of “modulation recognition” gave 52,500 hits.  More than a hundred publications on modulation recognition.  Many GOTS and COTS products available for various applications. Literature Search

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/20158 Modulation feature extraction  I-Q Analysis  Zero-crossing  Power-law Modulation classification  Pattern recognition  Maximum likelihood Some Well-known Approaches

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/20159  Deferent modulation type  Deferent assumption  Deferent signal environment  Deferent specification Problems in Algorithm Comparison PSK2 PSK8 PSK4 FSK8 FSK4 FSK2 ASK4 ASK8 ASK2 32QAM CW UNKNOWN 64QAM 16QAM MSK PSK FSK

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/ Based on signal parameter variances and variance thresholds CW PSK2 PSK4 ASK2 ASK4 FSK2 FSK4 Base Band Signal recognition tree thresholds s.t.d. abs frequency phase amplitude Azzouz and Nandi’s Method

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/ Phase Variance is affected by the Center Frequency Offset BPSK with residual carrier after phase tracking and compensation unwrapped phase tracking phase tracking

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/ Phase Variance is Affected by Pulse Shaping (  /4 DQPSK)

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/ Phase Variance is Affected by Phase Wrap

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/ Limitation in Azzouz and Nandi  Not robust to center frequency offset  Not robust to pulse shaping  Not robust to phase wrap  Thresholds depend on SNR level  Restricted in modulation types (2 bits)

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/ Liedtke’s Method I / ( ) 2 + tan -1 amplitude IF sqrt timing circuit Q Freq. delta phase BPF baud rate detector histograms CW PSK2 PSK4 PSK8 ASK2 FSK2 templates recognition tree s.t.d Based on delta-phase and histogram correlation

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/ Limitation in Liedtke’s Method  Manual tuning of center frequency  Manual tuning of the time-recovery band pass filter  Limited in modulation types

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/ IF s.t.d. delta-phase histogram frequency estimation phase estimation histogram templates zero-crossing counter recognition tree PSK2 PSK4 PSK8 FSK2 FSK4 FSK8 templates Zero-crossing Detection Method Based on zero-crossing phase, and delta phase histogram

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/  Not robust to multiple frequencies  Need high SNR  Need high sampling rate Limitation in Zero-Crossing Method

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/ signal ( ) 2 ( ) 4 FFT peak detection envelopes.t.d. PSK2 PSK4 ASK2 FSK2 recognition tree Power-Law Classification Method Based on power spectrum analysis

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/  Need very high sampling rate  Affected by pulse shape  Limited in modulation types  Noise is amplified with high order Limitation to Power-Law Method

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/ CW PSK2 PSK4 PSK8 ASK2 ASK4 FSK2 FSK4 IF I / ( ) 2 + tan -1 amplitude down demodulation sqrt Q frequency phase frequency estimation recognition tree adaptive thresholds s.t.d. abs timing recovery track and correct phase s.t.d. abs s.t.d. abs s.t.d. abs X2 phasex2 Modified Azzouz and Nandi

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/ Before BPSK After The unwanted phase rotation (left figure) is corrected adaptively (right figure) by a modified blind carrier phase tracker (upper figure) so that the feature variation methods can be used robustly for modulation recognition symbol x Estimated phase Center Frequency Offset Correction Method 1: Method 2: CFO = angle(  (y k y * k-1 )f s /2/  k = 1, 2, …, N y k is a sample at k f s is the sampling frequency

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/ Modified Liedtke I / ( ) 2 + tan -1 amplitude down demodulation sqrt timing circuit Q frequency delta phase variance test CW PSK2 PSK4 PSK8 ASK2 ASK4 ASK8 FSK2 FSK4 FSK8 frequency estimation peak detector recognition tree templates IF

CECOM Bottom Line: THE WARFIGHTER File Name.PPT - Briefer’s Name - Briefed10/12/  There are many publications but most of them are related to base band symbol recognition  Center frequency offset (CFO), pulse shape, timing, and channel fading can be estimated but the estimates will not be perfect  Signal type UNKNOWN should be defined in all algorithms  A good modulation recognition algorithm should be robust to CFO, timing error, and fading Summary