0% found this document useful (0 votes)
8 views3 pages

Modulation 12

ModulatioModulation12Modulation12Modulation12n12

Uploaded by

245123742004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
8 views3 pages

Modulation 12

ModulatioModulation12Modulation12Modulation12n12

Uploaded by

245123742004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
3.3.2 Modulation Techniques To understand the functioning of a modem at a conceptual level is very easy. Modulation basically uses @ coding scheme or a convention. ‘This coding can be achieved using the three properties of a signal Se ‘Amplitude, Frequency and Phase. Depending upon the technique used, itis called Amplitude Shift, “Keying (ASK), F equency Shift Keying (FSK) or Phase Shift Keying (PSK). In all these techniques, we choose a carrier signal with given amplitude, frequency and phase, and then choose a form of encod- ing. Another variation of the basic techniques is the Quadrate Amplitude Modulation (QAM), which is a combination technique. Amplitude Shift Keying (ASK) In amplitude shift keying or amplitude modulation, we do not alter the frequency or phase of the carrier signal. However, we specify different amplitudes, i.e. we shift the amplitude values to represent a binary | and a binary 0. Figure 3.5 illustrates this coding scheme. ‘The figure shows a bit string 10011010011 modulated as an analog signal. Note that only the ampli- tudes of the signal change as per the values 0 and 1, but the phase and the frequency of the signals for both 0 and 1 are same and the frequency is between 0 and 4000 Hz. Therefore, the signal can be sent over the telephone lines At the receiving end, the modem, working on this principle, measures amplitudes at regular inter- vals to decode them as 0s and 1s and then generates a digital signal. The binary bits then can be stored L ansmission Methods 47 Analog and Digital S Amplitude Shift Keying (ASK) D at the destination node. This technique is normally used for transmiting data over optical fiber (which Wwe shall study later, when we discuss transmission media), However, on other lines, itis a very ineff- Gient technique: since amplitude is the only aspect of the ASK encoding technique, noise is a major Problem. Noise affects the amplitude of a signal and ASK is highly susceptible to noise Frequency Shift Keying (FSK) In Frequency Shift Keying (FSK) or frequency modulation technique, you keep the amplitude and the Phase of the carrier signals unaltered. You assign a certain frequency f, to denote | and f, to denote 0 ‘The frequency of the carrier signal is varied to represent binary 1 (using f,) and binary 0 (f.). Both f, and f; must be in the bandwidth of the channel ie, between 0 and 4000 Hz, which can be easily carried by the telephone wires. Figure 3.6 depicts this. The signal component with slower cycle is f,, and the signal component that shows the rapid cycle portions is f. The two represent 1 and 0 of the input digital signal respectively. Iris obvious that the modem at the destination decodes these signals into 0s and 1s by measuring the frequencies of the received signals at regular predefined time intervals. ] Fig. 3.6 Frequency Shift Keying (FSK) Seeteerreeemrntnentinnisncinensirineiigeoonnasins le Communications and Networks ‘figure shows the same bit String 10011010011 sent using frequency shift keying. Note that the end | a for both 0 and 1 are same, only frequency varies. But both f, and f, are between 0 ‘This scheme is less prone to error than Unlike ASK, the Sos changes (i.e. amplitude changes) are ignored by FSK. This is simply because 1001 Bee ait Keying (PSK), we keep the amplitude and the frequency of the cartier signal unchanged iand only change the phase to denote Os and 1s. For instance, we can start with a phase of 0 degrees 1 represent binary 0 and then change the phase to 180 degrees to represent binary |. In PSK. we change Athe timing of the carrier wave abruptly to encode data. After a phase shift happens, the carrier wave still ‘Continues to oscillate, but it immediately jumps to a new point in its cycle. The phase of the signal ‘during each bit duration is constant and its value depends on whether it is 0 or 1 Figure 3.7 depicts this. Fig. 3.7 Phase Shift Keying (PSK) In the figure, the 0 bit indicates no phase change at all. This is true even if the preceding bit is either Oor 1. However a bit | represents a phase shift of 180° Again this is true irrespective of whether the previous bit is 0 or 1. This technique is more noise-resistant. Its also more efficient than Frequency Shift Keying. Quadrate Amplitude Modulation (QAM) The main limitation of PSK is the inability of the hardware equipment to distinguish small differences in terms of phase changes. This puts a limitation on its data rate. In ASK, FSK or PSK, we alter only ‘one characteristic (amplitude, frequency, and phase respectively) of the carrier wave. What if we alter {wo of these together? Since the bandwidth of the transmission medium is a major limitation. we cannot combine FSK with anything else. Therefore, the only possibility we have is to combine ASK and PSK. Thus, we can have x variations in phase and y variations in amplitude. QAM does just that QAM makes higher data rates possible. A detailed discussion of QAM is beyond the scope of the ‘current text. ed ee)

You might also like