GMSK Gaussian Filtered Minimum Shift Keying full report
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar topics
Active In SP

Posts: 559
Joined: Mar 2010
30-03-2010, 12:34 PM

Gaussian Filtered Minimum Shift Keying
Gina Colangelo
EE194 - SDR
Minimum Shift Keying (MSK)
Gaussian Filtering
Spectral Efficiency GMSK vs. MSK
Common Applications
Digital modulation schemes are becoming increasingly important in wireless communication systems.
Using an unfiltered binary data stream to modulate an RF carrier will produce an RF spectrum of considerable bandwidth.
Techniques have been developed to minimize this bandwidth, improve spectral performance, and ease detection.
MSK or Minimum Shift Keying is a digital modulation scheme in which the phase of the remains continuous while the frequency changes.
GMSK or Gaussian-filtered Minimum Shift Keying differs from MSK in that a Gaussian Filter of an appropriate bandwidth is used before the modulation stage.
We will first discuss MSK to understand the need for GMSK.
MSK “ Minimum Shift Keying
MSK is a continuous phase FSK (CPFSK) where the frequency changes occur at the carrier zero crossings.
MSK is unique due to the relationship between the frequency of a logic 0 and 1.
The difference between the frequencies is always ½ the data rate.
This is the minimum frequency spacing that allows 2 FSK signals to be coherently orthogonal.
MSK “ How It Works
The baseband modulation starts with a bitstream of 0â„¢s and 1â„¢s and a bit-clock.
The baseband signal is generated by first transforming the 0/1 encoded bits into -1/1 using an NRZ filter.
This signal is then frequency modulated to produce the complete MSK signal.
The amount of overlap that occurs between bits will contribute to the inter-symbol interference (ISI).
Example of MSK
1200 bits/sec baseband MSK data signal
Frequency spacing = 600Hz
Pros of MSK
Since the MSK signals are orthogonal and minimal distance, the spectrum can be more compact.
The detection scheme can take advantage of the orthogonal characteristics.
Low ISI (compared to GMSK)

Cons of MSK
The fundamental problem with MSK is that the spectrum has side-lobes extending well above the data rate (See figure on next slide).
For wireless systems which require more efficient use of RF channel BW, it is necessary to reduce the energy of the upper side-lobes.
Solution “ use a pre-modulation filter:
Straight-forward Approach: Low-Pass Filter
More Efficient/Realistic Approach: Gaussian Filter
The Need for GMSK
Gaussian Filter
Impulse response defined by a Gaussian Distribution “ no overshoot or ringing (see lower figure)
BT “ refers to the filter™s -3dB BW and data rate by:

Notice that a bit is spread over more than 1 bit period. This gives rise to ISI.
For BT=0.3, adjacent symbols will interfere with each other more than for BT=0.5
GMSK with BT=8 is equivalent to MSK.
Trade-off between ISI and side-lobe suppression (top and bottom figures)
The higher the ISI, the more difficult the detection will become.
GMSK “ Applications
An important application of GMSK is GSM, which is a time-division multiple-access system.
For this application, the BT is standardized at 0.3, which provides the best compromise between increased bandwidth occupancy and resistance to ISI.
Ninety-nine percent of the RF power of GMSK signals is specified to confine to 250kHz (+/- 25kHz margin from the signal), which means that the sidelobes need to be virtually zero outside this frequency band and the ISI should be negligible.
Haykin, S. 2001: Communication Systems. 4th ed. New York, NY. John Wiley & Sons.
GMSK: Practical GMSK Data Transmission
Minimum Shift Keying: A Spectrally Effiecient Modulation

Attached Files
.ppt   GMSK Gaussian Filtered Minimum Shift Keying.ppt (Size: 327 KB / Downloads: 234)
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Active In SP

Posts: 1
Joined: Sep 2010
09-02-2011, 07:05 AM

hello friends, As I have chosen GMSK as the subject for seminar and presentation but I have a little knowlegde of it. I want to know the related links and materials resourcefull of above mentioned topic and the recent advancements in gsm modulation in order to prepare for the choiceness of seminar and presentation.
seminar project explorer
Active In SP

Posts: 231
Joined: Feb 2011
09-02-2011, 09:40 AM

GMSK: Gaussian Filtered Minimum Shift Keying
GMSK was proposed by murota and Hirade in 1981 as the modulation scheme for mobile radio propagation. It is used in the GSM and DCS due to its bandwidth efficiency and constant envelope. This article studies the I-Q GMSK. The hardware realization of the GMSK modulator has been achieved through the new binary data. GSK detector has also been relized.

Hardware implementation:
In the GMSk modulator, the binary data is first converted into (+1,-1) sequence and then a sequence of rectangula pulses is achieved. Noise is added alongwith it and the noise is filtered using a gaussian filter. The phase accumulator integrates the filtered signal. The I and Q signals are obtained from the lookup tables for sine and cosine functions implemented in the PLAs.

GMSK detector:
The recieved signal is multiplied by the same carrier. Two signals are used-one is phase and other in quadrature with the signal. LPF stops the higher carrier terms. The phase detectors produce the in-phase and quadrature phase components. The differentiator produces the rectangular pulses. Envelope detector recieves the levels of pulses from which the binary data is recovered.

See for details:
Active In SP

Posts: 1
Joined: Mar 2011
04-03-2011, 07:09 AM

Hello, Gina Colangelo my names Umesh from INDIA Iam interested in your seminar and presentation on GMSK so can you provide me full report to study and related links of GMSK MODULATION
with regards,

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  UNIVERSAL SHIFT REGISTERS study tips 2 456 31-08-2016, 03:21 PM
Last Post: Dhanabhagya
  web spoofing full report computer science technology 13 9,012 20-05-2016, 11:59 AM
Last Post: Dhanabhagya
  android full report computer science technology 57 73,217 24-09-2014, 05:05 PM
Last Post: Michaelnof
  steganography full report project report tiger 23 25,789 01-09-2014, 11:05 AM
Last Post: computer science crazy
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 144 92,700 13-05-2014, 10:16 AM
Last Post: seminar project topic
Video Random Access Memory ( Download Full Seminar Report ) computer science crazy 2 2,419 10-05-2014, 09:44 AM
Last Post: seminar project topic
Brick Virtual keyboard (Download Full Report And Abstract) computer science crazy 37 31,030 08-04-2014, 07:07 AM
Last Post: Guest
  Towards Secure and Dependable Storage Services in Cloud Computing FULL REPORT seminar ideas 5 4,152 24-03-2014, 02:51 PM
Last Post: seminar project topic
  eyeOS cloud operating system full report seminar topics 8 11,474 24-03-2014, 02:49 PM
Last Post: seminar project topic
  XML encryption full report computer science technology 7 6,674 24-03-2014, 02:31 PM
Last Post: seminar project topic