We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
3.3.2 Modulation Techniques
To understand the functioning of a modem at a conceptual level is very easy. Modulation basically uses
@ coding scheme or a convention. ‘This coding can be achieved using the three properties of a signal
Se ‘Amplitude, Frequency and Phase. Depending upon the technique used, itis called Amplitude Shift,
“Keying (ASK), F
equency Shift Keying (FSK) or Phase Shift Keying (PSK). In all these techniques, we
choose a carrier signal with given amplitude, frequency and phase, and then choose a form of encod-
ing. Another variation of the basic techniques is the Quadrate Amplitude Modulation (QAM), which is
a combination technique.
Amplitude Shift Keying (ASK)
In amplitude shift keying or amplitude modulation, we do not alter the frequency or phase of the carrier
signal. However, we specify different amplitudes, i.e. we shift the amplitude values to represent a
binary | and a binary 0. Figure 3.5 illustrates this coding scheme.
‘The figure shows a bit string 10011010011 modulated as an analog signal. Note that only the ampli-
tudes of the signal change as per the values 0 and 1, but the phase and the frequency of the signals for
both 0 and 1 are same and the frequency is between 0 and 4000 Hz. Therefore, the signal can be sent
over the telephone lines
At the receiving end, the modem, working on this principle, measures amplitudes at regular inter-
vals to decode them as 0s and 1s and then generates a digital signal. The binary bits then can be storedL
ansmission Methods 47
Analog and Digital
S Amplitude Shift Keying (ASK) D
at the destination node. This technique is normally used for transmiting data over optical fiber (which
Wwe shall study later, when we discuss transmission media), However, on other lines, itis a very ineff-
Gient technique: since amplitude is the only aspect of the ASK encoding technique, noise is a major
Problem. Noise affects the amplitude of a signal and ASK is highly susceptible to noise
Frequency Shift Keying (FSK)
In Frequency Shift Keying (FSK) or frequency modulation technique, you keep the amplitude and the
Phase of the carrier signals unaltered. You assign a certain frequency f, to denote | and f, to denote 0
‘The frequency of the carrier signal is varied to represent binary 1 (using f,) and binary 0 (f.). Both f,
and f; must be in the bandwidth of the channel ie, between 0 and 4000 Hz, which can be easily carried
by the telephone wires.
Figure 3.6 depicts this. The signal component with slower cycle is f,, and the signal component that
shows the rapid cycle portions is f. The two represent 1 and 0 of the input digital signal respectively.
Iris obvious that the modem at the destination decodes these signals into 0s and 1s by measuring the
frequencies of the received signals at regular predefined time intervals.
]
Fig. 3.6 Frequency Shift Keying (FSK)
Seeteerreeemrntnentinnisncinensirineiigeoonnasinsle
Communications and Networks
‘figure shows the same bit String 10011010011 sent using frequency shift keying. Note that the
end | a for both 0 and 1 are same, only frequency varies. But both f, and f, are between 0
‘This scheme is less prone to error than
Unlike ASK, the Sos changes (i.e. amplitude changes) are ignored by FSK. This is simply because
1001
Bee ait Keying (PSK), we keep the amplitude and the frequency of the cartier signal unchanged
iand only change the phase to denote Os and 1s. For instance, we can start with a phase of 0 degrees 1
represent binary 0 and then change the phase to 180 degrees to represent binary |. In PSK. we change
Athe timing of the carrier wave abruptly to encode data. After a phase shift happens, the carrier wave still
‘Continues to oscillate, but it immediately jumps to a new point in its cycle. The phase of the signal
‘during each bit duration is constant and its value depends on whether it is 0 or 1 Figure 3.7 depicts this.
Fig. 3.7 Phase Shift Keying (PSK)
In the figure, the 0 bit indicates no phase change at all. This is true even if the preceding bit is either
Oor 1. However a bit | represents a phase shift of 180° Again this is true irrespective of whether the
previous bit is 0 or 1.
This technique is more noise-resistant. Its also more efficient than Frequency Shift Keying.
Quadrate Amplitude Modulation (QAM)
The main limitation of PSK is the inability of the hardware equipment to distinguish small differences
in terms of phase changes. This puts a limitation on its data rate. In ASK, FSK or PSK, we alter only
‘one characteristic (amplitude, frequency, and phase respectively) of the carrier wave. What if we alter
{wo of these together? Since the bandwidth of the transmission medium is a major limitation. we
cannot combine FSK with anything else. Therefore, the only possibility we have is to combine ASK
and PSK. Thus, we can have x variations in phase and y variations in amplitude. QAM does just that
QAM makes higher data rates possible. A detailed discussion of QAM is beyond the scope of the
‘current text.
ed ee)