GMSK Gaussian Filtered Minimum Shift Keying full report
#1

GMSK:
Gaussian Filtered Minimum Shift Keying
Gina Colangelo
EE194 - SDR
Topics
Background
Minimum Shift Keying (MSK)
Gaussian Filtering
Spectral Efficiency GMSK vs. MSK
Common Applications
Introduction
Digital modulation schemes are becoming increasingly important in wireless communication systems.
Using an unfiltered binary data stream to modulate an RF carrier will produce an RF spectrum of considerable bandwidth.
Techniques have been developed to minimize this bandwidth, improve spectral performance, and ease detection.
Background
MSK or Minimum Shift Keying is a digital modulation scheme in which the phase of the remains continuous while the frequency changes.
GMSK or Gaussian-filtered Minimum Shift Keying differs from MSK in that a Gaussian Filter of an appropriate bandwidth is used before the modulation stage.
We will first discuss MSK to understand the need for GMSK.
MSK “ Minimum Shift Keying
MSK is a continuous phase FSK (CPFSK) where the frequency changes occur at the carrier zero crossings.
MSK is unique due to the relationship between the frequency of a logic 0 and 1.
The difference between the frequencies is always ½ the data rate.
This is the minimum frequency spacing that allows 2 FSK signals to be coherently orthogonal.
MSK “ How It Works
The baseband modulation starts with a bitstream of 0â„¢s and 1â„¢s and a bit-clock.
The baseband signal is generated by first transforming the 0/1 encoded bits into -1/1 using an NRZ filter.
This signal is then frequency modulated to produce the complete MSK signal.
The amount of overlap that occurs between bits will contribute to the inter-symbol interference (ISI).
Example of MSK
1200 bits/sec baseband MSK data signal
Frequency spacing = 600Hz
Pros of MSK
Since the MSK signals are orthogonal and minimal distance, the spectrum can be more compact.
The detection scheme can take advantage of the orthogonal characteristics.
Low ISI (compared to GMSK)

Cons of MSK
The fundamental problem with MSK is that the spectrum has side-lobes extending well above the data rate (See figure on next slide).
For wireless systems which require more efficient use of RF channel BW, it is necessary to reduce the energy of the upper side-lobes.
Solution “ use a pre-modulation filter:
Straight-forward Approach: Low-Pass Filter
More Efficient/Realistic Approach: Gaussian Filter
The Need for GMSK
Gaussian Filter
Impulse response defined by a Gaussian Distribution “ no overshoot or ringing (see lower figure)
BT “ refers to the filter™s -3dB BW and data rate by:

Notice that a bit is spread over more than 1 bit period. This gives rise to ISI.
For BT=0.3, adjacent symbols will interfere with each other more than for BT=0.5
GMSK with BT=8 is equivalent to MSK.
Trade-off between ISI and side-lobe suppression (top and bottom figures)
The higher the ISI, the more difficult the detection will become.
GMSK “ Applications
An important application of GMSK is GSM, which is a time-division multiple-access system.
For this application, the BT is standardized at 0.3, which provides the best compromise between increased bandwidth occupancy and resistance to ISI.
Ninety-nine percent of the RF power of GMSK signals is specified to confine to 250kHz (+/- 25kHz margin from the signal), which means that the sidelobes need to be virtually zero outside this frequency band and the ISI should be negligible.
References
Haykin, S. 2001: Communication Systems. 4th ed. New York, NY. John Wiley & Sons.
GMSK: Practical GMSK Data Transmission
http://eetchinaARTICLES/2003AUG/PDF/2003AUG29_NTEK_AN.PDF
Minimum Shift Keying: A Spectrally Effiecient Modulation
http://elet.polimi.it/upload/levantin/Si...y_1979.pdf
Reply
#2
hello friends, As I have chosen GMSK as the subject for seminar but I have a little knowlegde of it. I want to know the related links and materials resourcefull of above mentioned topic and the recent advancements in gsm modulation in order to prepare for the choiceness of seminars.
Reply
#3
GMSK: Gaussian Filtered Minimum Shift Keying
GMSK was proposed by murota and Hirade in 1981 as the modulation scheme for mobile radio propagation. It is used in the GSM and DCS due to its bandwidth efficiency and constant envelope. This article studies the I-Q GMSK. The hardware realization of the GMSK modulator has been achieved through the new binary data. GSK detector has also been relized.

Hardware implementation:
In the GMSk modulator, the binary data is first converted into (+1,-1) sequence and then a sequence of rectangula pulses is achieved. Noise is added alongwith it and the noise is filtered using a gaussian filter. The phase accumulator integrates the filtered signal. The I and Q signals are obtained from the lookup tables for sine and cosine functions implemented in the PLAs.

GMSK detector:
The recieved signal is multiplied by the same carrier. Two signals are used-one is phase and other in quadrature with the signal. LPF stops the higher carrier terms. The phase detectors produce the in-phase and quadrature phase components. The differentiator produces the rectangular pulses. Envelope detector recieves the levels of pulses from which the binary data is recovered.

See for details:
http://nopr.niscair.resbitstream/1234567...8)%2065-70
http://scribddoc/42595880/GMSK-for-Digital-Mobile-Radio-Telephony
Reply
#4

Hello, Gina Colangelo my names Umesh from INDIA Iam interested in your seminar on GMSK so can you provide me full report to study and related links of GMSK MODULATION
with regards,
Umesh
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: viva question and ans about amplitude shift keying, implementation gmsk modem using matlab, seminar topic on logarithamic keying, gmsk gaussian filtered minimum shift keying paper conclusion, minimum shift keying pdf file, seminor topics on shift registers, verilog code for gaussian filter,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 42,443 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 30,912 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,122 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 26,840 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 66,712 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 74,820 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 23,586 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 41,632 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 44,094 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,041 01-05-2015, 03:36 PM
Last Post: seminar report asees

Forum Jump: