SlideShare a Scribd company logo
1 of 34
DIGITAL
MODULATION
TECHNIQUES
PREPARED BY:-
SHRIYA GAUTAM
W18DEL1731
http://www.free-powerpoint-templates-design.com
OBJECT
Study the generation and detection
methods of the following digital
modulation techniques : ASK, PSK,
FSK and QPSK.
TOPICS COVERED
1INTRODUCTION
5PSK
6 FSK
4ASK
2ADVANTAGE OF DM OVER AM
3TYPES OF DIGITAL MODULATION
7 QPSK
8
9
10
11
ADVANTAGES
LIMITATIONS
APPLICATION
CONCLUSION
INTRODUCTION
The term DM stands for digital
modulation, and it is a common term for
the techniques of modulation.
Digital modulation is the process of transferring
digital low frequency baseband signal like digital
stream from computer over a high frequency
carrier signal.
With digital modulation technique, the modulation
process corresponds to switching or keying the
amplitude, frequency or phase of the carrier between
either of two possible values corresponding to binary ‘0’
or ‘1’.
DM OVER AM
2
1
3 3
2
1
An AM signal can signify
any value in a range.
In analog modulation (AM), the input
must be in the form of analog
The AM can generate a signal to carry the
frequently changing data.
A DM signal can only
signify with a set of discrete
values.
In digital modulation (DM), the input
must be the data in the form of digital
The DM generates a signal whose rate
changes at particular time intervals.
(DIGITAL MODULATION) (ANALOG MODULATION)
WHERE
AS
4
4
In AM, it is not easy to disconnect the
signal from noise.In DM, the signal can simply
disconnect from noise.
The main advantages of the digital
modulation over analog modulation
include available bandwidth , high
noise immunity and permissible
power. In digital modulation, a
message signal is converted from
analog to digital message, and then
modulated by using a carrier wave.
CONTI
NUED
TYPES OF DIGITAL MODULATION
TECHNIQUES
3
2
1
4
FSK – Frequency Shift
Keying
The frequency of the output
signal will be either high or
low, depending upon the
input data applied.
ASK –Amplitude Shift
Keying
The amplitude of the resultant
output depends upon the input
data whether it should be a
zero level or a variation of
positive and negative,
depending upon the carrier
frequency.
Quadrature Phase Shift Keying (QPSK)
Quadrature Phase Shift Keying (QPSK) is
a form of Phase Shift Keying in which two
bits are modulated at once, selecting one
of four possible carrier phase shifts (0, 90,
180, or 270 degrees).
PSK – Phase Shift
Keying
The phase of the output
signal gets shifted
depending upon the
input.
Amplitude Shift Keying ASK
01
02
03
04
05
ASK is a type of
Amplitude
Modulation
which
represents the
binary data in
the form of
variations in the
amplitude of a
signal.
Any
modulated
signal has a
high
frequency
carrier.
The binary signal
when ASK
modulated, gives
a zero value
for Low input while
it gives the carrier
output for High in
put.
Binary ‘1’ is
represented by
transmitting a
sinusoidal carrier
wave of fixed
amplitude A,
fixed frequency
‘fc’ and fixed
duration Tb
second.
Binary ‘0’ is
represented by
either switching
off the carrier or
transmitting the
same carrier of
frequency ‘fc’ but
with different
amplitude ‘A2’.
The binary ASK may be expressed as:-
ASK Modulator
C E R T I F I C AT E
• The ASK modulator block diagram comprises of the carrier signal
generator, the binary sequence from the message signal and the band-
limited filter. Following is the block diagram of the ASK Modulator.
ASK Modulator(continued)
C E R T I F I C AT E
The carrier generator, sends a continuous high-frequency carrier.
The binary sequence from the message signal makes the unipolar
input to be either High or Low.
When there is low input, the switch opens, allowing
no voltage to appear. Hence, the output will be low.
The band-limiting filter, shapes the pulse
depending upon the amplitude and phase
characteristics of the band-limiting filter or the
pulse-shaping filter.
The high signal closes the switch, allowing a carrier
wave. Hence, the output will be the carrier signal at
high input.
Synchronous ASK Demodulator
C E R T I F I C AT E
• The clock frequency at the transmitter when matches with the clock
frequency at the receiver, it is known as a Synchronous method , as
the frequency gets synchronized.
Synchronous ASK detector consists of a Square law detector, low
pass filter, a comparator, and a voltage limiter. Following is the block
diagram for the same:-
Synchronous ASK Demodulator (continued)
C E R T I F I C AT E
•The ASK modulated input signal is given to the Square
law detector.
• A square law detector is one whose output voltage is
proportional to the square of the amplitude modulated
input voltage.
•The low pass filter minimizes the higher frequencies.
• The comparator and the voltage limiter help to get a
clean digital output.
AMPLITUDE SHIFTING KEYING
(ADVANTAGES,DISADVANTAGES,APPLICATIONS)
ADVANTAGES DISADVANTAGES APPLICATIONS
It offers high bandwidth
efficiency.
ASK technique is not suitable
for high bit rate data
transmission.
Digital data through an optical
fiber is transmitted using ASK
technique.
It has simple receiver design. Poor bandwidth efficiency. The technique was widely used
in traditional telephone
modems.
ASK modulation can be used to
transmit digital data over
optical fiber.
Highly susceptible to noise and
other external factors.
Wireless base stations and
Tire pressuring monitoring
systems
ASK modulation and ASK
demodulation processes are
comparatively inexpensive.
Home automation devices
Frequency Shift Keying FSK
FSK is the digital modulation technique in which the frequency of the carrier
signal varies according to the digital signal changes. FSK is a scheme of
frequency modulation.
The output of a FSK modulated wave is high in frequency for a binary High
input and is low in frequency for a binary Low input. The binary 1s and 0s are
called Mark and Space frequencies.
The following image is the diagrammatic representation of FSK modulated
waveform along with its input:-
FSK Modulator (continued)
The FSK modulator block diagram comprises of two oscillators
with a clock and the input binary sequence. Following is its
block diagram:-
FSK Modulator
•The two oscillators, producing a higher and a
lower frequency signals, are connected to a
switch along with an internal clock.
• To avoid the abrupt phase discontinuities of
the output waveform during the transmission
of the message, a clock is applied to both the
oscillators, internally.
• The binary input sequence is applied to the
transmitter so as to choose the frequencies
according to the binary input.
Synchronous FSK Detector
•The block diagram of Synchronous FSK detector consists of two
mixers with local oscillator circuits, two band pass filters and a
decision circuit.
Following is the diagrammatic representation:-
Synchronous FSK Detector (continued)
•The FSK signal input is given to the two
mixers with local oscillator circuits.
• These two are connected to two band pass
filters.
• These combinations act as demodulators and
the decision circuit chooses which output is
more likely and selects it from any one of the
detectors.
• The two signals have a minimum frequency
separation.
ADVANTAGE DISADVANTAGE APPLICATION
It has lower probability of error It uses larger bandwidth compare to
other modulation techniques such as
ASK and PSK. Hence it is not
bandwidth efficient.
Commonly used for caller ID and
remote metering applications.
It provides high SNR (Signal to Noise
Ratio).
The bit error rate is less in AEGN channel
than phase shift keying.
It is used in wireless media.
It has higher immunity to noise due to
constant envelope.
It is also used in telephone lines.
Useful in high-frequency radio
transmissions
Preferable in high-frequency
communications
Due to the requirement of large
bandwidth, this FSK has limitations to
use only in low-speed modems which
the bit rate is 1200bits/sec.
FREQUENCY SHIFTING KEYING
(ADVANTAGES,DISADVANTAGES,APPLICATIONS)
Phase Shift Keying (PSK)
•PSK is the digital modulation technique in which the phase
of the carrier signal is changed by varying the sine and cosine
inputs at a particular time.
• PSK technique is widely used for wireless LANs, bio-metric,
contactless operations, along with RFID and Bluetooth
communications.
PSK is of two types, depending upon the phases the signal
gets shifted. They are :
1. Binary Phase Shift Keying (BPSK)
2. Quadrature Phase Shift Keying (QPSK)
Binary Phase Shift
Keying(BPSK)
This is also called as 2-phase PSK or Phase Reversal Keying.
In this technique, the sine wave carrier takes two phase
reversals such as 0° and 180°.
BPSK is basically a Double Side Band Suppressed
Carrier (DSBSC) modulation scheme, for message being the
digital information.
BPSK Modulator
The block diagram of Binary Phase Shift Keying consists of the balance
modulator which has the carrier sine wave as one input and the binary sequence
as the other input. Following is the diagrammatic representation:-
BPSK Modulator(continued)
The modulation of BPSK is done using a balance modulator, which multiplies the
two signals applied at the input. For a zero binary input, the phase will be 0° and
for a high input, the phase reversal is of 180°.
Following is the diagrammatic representation of BPSK Modulated
output wave along with its given input:-
The output sine
wave of the
modulator will be
the direct input
carrier or the
inverted 180°phase
Shifted 180°phase
shifted input
carrier, which is a
function of the
data signal.
BPSK Wave when carrier is Sine wave BPSK Wave when carrier is Cosine wave
BPSK Demodulator
The block diagram of BPSK demodulator consists of a mixer with local oscillator circuit,
a bandpass filter, a two-input detector circuit. The diagram is as follows:-
•By recovering the band-limited message signal, with the
help of the mixer circuit and the band pass filter, the first
stage of demodulation gets completed. The base band
signal which is band limited is obtained and this signal is
used to regenerate the binary message bit stream.
•In the next stage of demodulation, the bit clock rate is
needed at the detector circuit to produce the original
binary message signal. If the bit rate is a sub-multiple of
the carrier frequency, then the bit clock regeneration is
simplified. To make the circuit easily understandable, a
decision-making circuit may also be inserted at the
2nd stage of detection.
Quadrature Phase Shift Keying (QPSK)
QPSK is a form of modulation scheme in which two bits are
modulated at once, selecting one of the four possible carrier phase
shift.
It is a particularly interesting one because it actually transmits two
bits per symbol. In other words, a QPSK symbol doesn’t represent 0 or
1—it represents 00, 01, 10, or 11.
QPSK allows the signal to carry twice as much information as
ordinary PSK using the same bandwidth.
In QPSK as with BPSK information carried by transmitted signal is
contained in the phase of the carrier wave.
In particular, the phase of the carrier takes one of the
four equally spaced value such as 𝜋/4, 3𝜋/4, 5𝜋/4, 7𝜋/4 .
QPSK Modulator
The QPSK Modulator uses a bit-splitter, two multipliers with local oscillator, a 2-bit serial to parallel converter
and a summer circuit. Following is the block diagram for the same:-
𝟎𝟎→−𝑽𝑽
𝟏𝟏→+𝑽𝑽
01110010
Cos(𝟐𝝅𝒇𝒄𝒕)
sin (𝟐𝝅𝒇𝒄𝒕)
90o phase shifter
MODULATED OUTPUT WAVEFORM
QPSK Modulator(continued)
•Fig. shows a block diagram of QPSK transmitter. The incoming binary
data sequence is first tranformed into polar form by NRZ level
encoder.
•The symbol ‘1’and ‘0 are represented by ‘+V’ and ‘-V’ respectively.
•At the modulator’s input, the message signal’s even bits (i.e., 2nd bit,
4th bit, 6th bit, etc.) and odd bits (i.e., 1st bit, 3rd bit, 5th bit, etc.) are
separated by the bits splitter and are multiplied with the same carrier
to generate odd BPSK (called as PSKi) and even BPSK (called as
PSKq). The PSKQ signal is anyhow phase shifted by 90° before being
modulated.
•Finally the two PSK signals are added to produce the desired QPSK
signal.
QPSK Demodulator
The QPSK Demodulator uses two product demodulator circuits with local
oscillator, two band pass filters, two integrator circuits, and a 2-bit parallel to
serial converter. Following is the diagram for the same:-
The two product detectors at the input of demodulator simultaneously
demodulate the two BPSK signals. The pair of bits are recovered here from the
original data. These signals after processing, are passed to the parallel to serial
converter.
PHASE SHIFTING KEYING
(ADVANTAGES,DISADVANTAGES,APPLICATIONS)
ADVANTAGE DISADVANTAGE APPLICATIONS
This type of PSK allows information to
be carried with a radio
communications signal more
efficiently compare with FSK.
The bandwidth efficiency of this PSK
is less compared with ASK type of
modulation
This method is broadly used for bio-
metric, wireless LAN along
with wireless communications like
Bluetooth and RFID.
QPSK is another kind of data
transmits wherever 4 phase states are
utilized, all in 90 degrees of one
another.
By estimating the phase states of the
signal, the binary information can be
decoded. Algorithms like recovery and
detection are extremely difficult.
Local Oscillator
Optical Communications
It is less vulnerable to faults when we
evaluate with ASK modulation &
occupies similar bandwidth like ASK.
High-level PSK modulations like
QPSK is more sensitive to phase
differences.
Multi-channel WDM
Delay & add demodulator
It is a non-coherent reference signal Nonlinear effects for WDM
transmission
CONCLUSION
(DIFFERENCE BETWEEN ASK,FSK,PSK)
PARAMETER ASK FSK PSK
Variable characteristics Amplitude Frequency Phase
Bandwidth Is proportional to signal rate
(B =(1+d)S),d is due to
modulation & filtering ,lies
between 0 & 1.
B=(1+d)×S+2Δf B=(1+d)×S
Noise immunity low High High
Complexity Simple Moderately complex Very complex
Error probability High Low Low
Performance in presence of
noise
Poor Better than ASK Better than FSK
Bit rate Suitable upto 100 bits/sec Suitable upto about 1200
bits/sec
Suitable for high bit rates
THANK YOU
FOR YOUR ATTENTION

More Related Content

What's hot

M ary psk and m ary qam ppt
M ary psk and m ary qam pptM ary psk and m ary qam ppt
M ary psk and m ary qam pptDANISHAMIN950
 
Angle modulation
Angle modulationAngle modulation
Angle modulationUmang Gupta
 
Optimum Receiver corrupted by AWGN Channel
Optimum Receiver corrupted by AWGN ChannelOptimum Receiver corrupted by AWGN Channel
Optimum Receiver corrupted by AWGN ChannelAWANISHKUMAR84
 
Amplitude shift keying
Amplitude shift keyingAmplitude shift keying
Amplitude shift keyingSunny Kumar
 
PSK (PHASE SHIFT KEYING )
PSK (PHASE SHIFT KEYING )PSK (PHASE SHIFT KEYING )
PSK (PHASE SHIFT KEYING )vijidhivi
 
Comparsion of M-Ary psk,fsk,qapsk.pptx
Comparsion of M-Ary psk,fsk,qapsk.pptxComparsion of M-Ary psk,fsk,qapsk.pptx
Comparsion of M-Ary psk,fsk,qapsk.pptxkeshav11845
 
Chapter 6m
Chapter 6mChapter 6m
Chapter 6mwafaa_A7
 
Companding and DPCM and ADPCM
Companding and DPCM and ADPCMCompanding and DPCM and ADPCM
Companding and DPCM and ADPCMnaimish12
 
Amplitude modulation, Generation of AM signals
Amplitude modulation, Generation of AM signalsAmplitude modulation, Generation of AM signals
Amplitude modulation, Generation of AM signalsWaqas Afzal
 
Pre emphasis and de-emphasis
Pre emphasis and de-emphasisPre emphasis and de-emphasis
Pre emphasis and de-emphasismpsrekha83
 
Relationships Among EVM, BER and SNR + WiFi minimum SNR consideration
Relationships Among EVM, BER and SNR + WiFi minimum SNR considerationRelationships Among EVM, BER and SNR + WiFi minimum SNR consideration
Relationships Among EVM, BER and SNR + WiFi minimum SNR considerationPei-Che Chang
 
Digital Modulation Unit 3
Digital Modulation Unit 3Digital Modulation Unit 3
Digital Modulation Unit 3Anil Nigam
 
Phase shift keying(PSK)
Phase shift keying(PSK)Phase shift keying(PSK)
Phase shift keying(PSK)MOHAN MOHAN
 

What's hot (20)

M ary psk and m ary qam ppt
M ary psk and m ary qam pptM ary psk and m ary qam ppt
M ary psk and m ary qam ppt
 
Angle modulation
Angle modulationAngle modulation
Angle modulation
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Optimum Receiver corrupted by AWGN Channel
Optimum Receiver corrupted by AWGN ChannelOptimum Receiver corrupted by AWGN Channel
Optimum Receiver corrupted by AWGN Channel
 
Amplitude shift keying
Amplitude shift keyingAmplitude shift keying
Amplitude shift keying
 
PSK (PHASE SHIFT KEYING )
PSK (PHASE SHIFT KEYING )PSK (PHASE SHIFT KEYING )
PSK (PHASE SHIFT KEYING )
 
Comparsion of M-Ary psk,fsk,qapsk.pptx
Comparsion of M-Ary psk,fsk,qapsk.pptxComparsion of M-Ary psk,fsk,qapsk.pptx
Comparsion of M-Ary psk,fsk,qapsk.pptx
 
Dc unit iv
Dc unit ivDc unit iv
Dc unit iv
 
Chapter 6m
Chapter 6mChapter 6m
Chapter 6m
 
Companding and DPCM and ADPCM
Companding and DPCM and ADPCMCompanding and DPCM and ADPCM
Companding and DPCM and ADPCM
 
Modulation
ModulationModulation
Modulation
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Amplitude modulation, Generation of AM signals
Amplitude modulation, Generation of AM signalsAmplitude modulation, Generation of AM signals
Amplitude modulation, Generation of AM signals
 
Pre emphasis and de-emphasis
Pre emphasis and de-emphasisPre emphasis and de-emphasis
Pre emphasis and de-emphasis
 
Base band transmission
Base band transmissionBase band transmission
Base band transmission
 
Chebyshev filter
Chebyshev filterChebyshev filter
Chebyshev filter
 
Relationships Among EVM, BER and SNR + WiFi minimum SNR consideration
Relationships Among EVM, BER and SNR + WiFi minimum SNR considerationRelationships Among EVM, BER and SNR + WiFi minimum SNR consideration
Relationships Among EVM, BER and SNR + WiFi minimum SNR consideration
 
Digital Modulation Unit 3
Digital Modulation Unit 3Digital Modulation Unit 3
Digital Modulation Unit 3
 
Source coding
Source coding Source coding
Source coding
 
Phase shift keying(PSK)
Phase shift keying(PSK)Phase shift keying(PSK)
Phase shift keying(PSK)
 

Similar to Digital modulation techniques

Digital modulation (19ES28) Ghulam Mueed
Digital modulation (19ES28) Ghulam Mueed Digital modulation (19ES28) Ghulam Mueed
Digital modulation (19ES28) Ghulam Mueed MueedAbbas
 
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...BalaMurugan992669
 
E_PS431682@4234143ai.pptx
E_PS431682@4234143ai.pptxE_PS431682@4234143ai.pptx
E_PS431682@4234143ai.pptxUmesh Yadava
 
Comparative Study and Performance Analysis of different Modulation Techniques...
Comparative Study and Performance Analysis of different Modulation Techniques...Comparative Study and Performance Analysis of different Modulation Techniques...
Comparative Study and Performance Analysis of different Modulation Techniques...Souvik Das
 
Digital communication methods
Digital communication methodsDigital communication methods
Digital communication methodsMohammad Bappy
 
Modulation techniq of modem
Modulation techniq of modemModulation techniq of modem
Modulation techniq of modemAkshay Nagpurkar
 
Digital modulation
Digital modulationDigital modulation
Digital modulationAnkur Kumar
 
Digital to Analog conversion
Digital to Analog conversionDigital to Analog conversion
Digital to Analog conversionMariam Butt
 
Lecture Notes: EEEC6440315 Communication Systems - Digital Modulation
Lecture Notes:  EEEC6440315 Communication Systems - Digital ModulationLecture Notes:  EEEC6440315 Communication Systems - Digital Modulation
Lecture Notes: EEEC6440315 Communication Systems - Digital ModulationAIMST University
 
Digital modulation basics(nnm)
Digital modulation basics(nnm)Digital modulation basics(nnm)
Digital modulation basics(nnm)nnmaurya
 
Modulation
ModulationModulation
Modulationsristykp
 
Digital Modulation ppt for everyone who wants it
Digital Modulation ppt for everyone who wants itDigital Modulation ppt for everyone who wants it
Digital Modulation ppt for everyone who wants itShirish30
 
射頻期中整理.pptx
射頻期中整理.pptx射頻期中整理.pptx
射頻期中整理.pptxssuserb4d806
 
Digital carrier modulation
Digital carrier modulationDigital carrier modulation
Digital carrier modulationajitece
 
Modulation techniques
Modulation techniquesModulation techniques
Modulation techniquesSathish Kumar
 

Similar to Digital modulation techniques (20)

Digital modulation (19ES28) Ghulam Mueed
Digital modulation (19ES28) Ghulam Mueed Digital modulation (19ES28) Ghulam Mueed
Digital modulation (19ES28) Ghulam Mueed
 
Phase shift keying
Phase shift keyingPhase shift keying
Phase shift keying
 
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...
 
E_PS431682@4234143ai.pptx
E_PS431682@4234143ai.pptxE_PS431682@4234143ai.pptx
E_PS431682@4234143ai.pptx
 
Comparative Study and Performance Analysis of different Modulation Techniques...
Comparative Study and Performance Analysis of different Modulation Techniques...Comparative Study and Performance Analysis of different Modulation Techniques...
Comparative Study and Performance Analysis of different Modulation Techniques...
 
Digital communication methods
Digital communication methodsDigital communication methods
Digital communication methods
 
Modulation techniq of modem
Modulation techniq of modemModulation techniq of modem
Modulation techniq of modem
 
Digital modulation
Digital modulationDigital modulation
Digital modulation
 
Digital to Analog conversion
Digital to Analog conversionDigital to Analog conversion
Digital to Analog conversion
 
Lecture Notes: EEEC6440315 Communication Systems - Digital Modulation
Lecture Notes:  EEEC6440315 Communication Systems - Digital ModulationLecture Notes:  EEEC6440315 Communication Systems - Digital Modulation
Lecture Notes: EEEC6440315 Communication Systems - Digital Modulation
 
Digital modulation basics(nnm)
Digital modulation basics(nnm)Digital modulation basics(nnm)
Digital modulation basics(nnm)
 
mod.pptx
mod.pptxmod.pptx
mod.pptx
 
Modulation
ModulationModulation
Modulation
 
Project report
Project reportProject report
Project report
 
UNIT-4 Baseband Digital Modulation.pdf
UNIT-4 Baseband Digital Modulation.pdfUNIT-4 Baseband Digital Modulation.pdf
UNIT-4 Baseband Digital Modulation.pdf
 
Digital Modulation ppt for everyone who wants it
Digital Modulation ppt for everyone who wants itDigital Modulation ppt for everyone who wants it
Digital Modulation ppt for everyone who wants it
 
射頻期中整理.pptx
射頻期中整理.pptx射頻期中整理.pptx
射頻期中整理.pptx
 
Unit 5.pptx
Unit 5.pptxUnit 5.pptx
Unit 5.pptx
 
Digital carrier modulation
Digital carrier modulationDigital carrier modulation
Digital carrier modulation
 
Modulation techniques
Modulation techniquesModulation techniques
Modulation techniques
 

Recently uploaded

UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

Digital modulation techniques

  • 2. OBJECT Study the generation and detection methods of the following digital modulation techniques : ASK, PSK, FSK and QPSK.
  • 3. TOPICS COVERED 1INTRODUCTION 5PSK 6 FSK 4ASK 2ADVANTAGE OF DM OVER AM 3TYPES OF DIGITAL MODULATION 7 QPSK 8 9 10 11 ADVANTAGES LIMITATIONS APPLICATION CONCLUSION
  • 4. INTRODUCTION The term DM stands for digital modulation, and it is a common term for the techniques of modulation. Digital modulation is the process of transferring digital low frequency baseband signal like digital stream from computer over a high frequency carrier signal. With digital modulation technique, the modulation process corresponds to switching or keying the amplitude, frequency or phase of the carrier between either of two possible values corresponding to binary ‘0’ or ‘1’.
  • 5. DM OVER AM 2 1 3 3 2 1 An AM signal can signify any value in a range. In analog modulation (AM), the input must be in the form of analog The AM can generate a signal to carry the frequently changing data. A DM signal can only signify with a set of discrete values. In digital modulation (DM), the input must be the data in the form of digital The DM generates a signal whose rate changes at particular time intervals. (DIGITAL MODULATION) (ANALOG MODULATION) WHERE AS 4 4 In AM, it is not easy to disconnect the signal from noise.In DM, the signal can simply disconnect from noise.
  • 6. The main advantages of the digital modulation over analog modulation include available bandwidth , high noise immunity and permissible power. In digital modulation, a message signal is converted from analog to digital message, and then modulated by using a carrier wave. CONTI NUED
  • 7. TYPES OF DIGITAL MODULATION TECHNIQUES 3 2 1 4 FSK – Frequency Shift Keying The frequency of the output signal will be either high or low, depending upon the input data applied. ASK –Amplitude Shift Keying The amplitude of the resultant output depends upon the input data whether it should be a zero level or a variation of positive and negative, depending upon the carrier frequency. Quadrature Phase Shift Keying (QPSK) Quadrature Phase Shift Keying (QPSK) is a form of Phase Shift Keying in which two bits are modulated at once, selecting one of four possible carrier phase shifts (0, 90, 180, or 270 degrees). PSK – Phase Shift Keying The phase of the output signal gets shifted depending upon the input.
  • 8. Amplitude Shift Keying ASK 01 02 03 04 05 ASK is a type of Amplitude Modulation which represents the binary data in the form of variations in the amplitude of a signal. Any modulated signal has a high frequency carrier. The binary signal when ASK modulated, gives a zero value for Low input while it gives the carrier output for High in put. Binary ‘1’ is represented by transmitting a sinusoidal carrier wave of fixed amplitude A, fixed frequency ‘fc’ and fixed duration Tb second. Binary ‘0’ is represented by either switching off the carrier or transmitting the same carrier of frequency ‘fc’ but with different amplitude ‘A2’.
  • 9. The binary ASK may be expressed as:-
  • 10. ASK Modulator C E R T I F I C AT E • The ASK modulator block diagram comprises of the carrier signal generator, the binary sequence from the message signal and the band- limited filter. Following is the block diagram of the ASK Modulator.
  • 11. ASK Modulator(continued) C E R T I F I C AT E The carrier generator, sends a continuous high-frequency carrier. The binary sequence from the message signal makes the unipolar input to be either High or Low. When there is low input, the switch opens, allowing no voltage to appear. Hence, the output will be low. The band-limiting filter, shapes the pulse depending upon the amplitude and phase characteristics of the band-limiting filter or the pulse-shaping filter. The high signal closes the switch, allowing a carrier wave. Hence, the output will be the carrier signal at high input.
  • 12. Synchronous ASK Demodulator C E R T I F I C AT E • The clock frequency at the transmitter when matches with the clock frequency at the receiver, it is known as a Synchronous method , as the frequency gets synchronized. Synchronous ASK detector consists of a Square law detector, low pass filter, a comparator, and a voltage limiter. Following is the block diagram for the same:-
  • 13. Synchronous ASK Demodulator (continued) C E R T I F I C AT E •The ASK modulated input signal is given to the Square law detector. • A square law detector is one whose output voltage is proportional to the square of the amplitude modulated input voltage. •The low pass filter minimizes the higher frequencies. • The comparator and the voltage limiter help to get a clean digital output.
  • 14. AMPLITUDE SHIFTING KEYING (ADVANTAGES,DISADVANTAGES,APPLICATIONS) ADVANTAGES DISADVANTAGES APPLICATIONS It offers high bandwidth efficiency. ASK technique is not suitable for high bit rate data transmission. Digital data through an optical fiber is transmitted using ASK technique. It has simple receiver design. Poor bandwidth efficiency. The technique was widely used in traditional telephone modems. ASK modulation can be used to transmit digital data over optical fiber. Highly susceptible to noise and other external factors. Wireless base stations and Tire pressuring monitoring systems ASK modulation and ASK demodulation processes are comparatively inexpensive. Home automation devices
  • 15. Frequency Shift Keying FSK FSK is the digital modulation technique in which the frequency of the carrier signal varies according to the digital signal changes. FSK is a scheme of frequency modulation. The output of a FSK modulated wave is high in frequency for a binary High input and is low in frequency for a binary Low input. The binary 1s and 0s are called Mark and Space frequencies. The following image is the diagrammatic representation of FSK modulated waveform along with its input:-
  • 16. FSK Modulator (continued) The FSK modulator block diagram comprises of two oscillators with a clock and the input binary sequence. Following is its block diagram:-
  • 17. FSK Modulator •The two oscillators, producing a higher and a lower frequency signals, are connected to a switch along with an internal clock. • To avoid the abrupt phase discontinuities of the output waveform during the transmission of the message, a clock is applied to both the oscillators, internally. • The binary input sequence is applied to the transmitter so as to choose the frequencies according to the binary input.
  • 18. Synchronous FSK Detector •The block diagram of Synchronous FSK detector consists of two mixers with local oscillator circuits, two band pass filters and a decision circuit. Following is the diagrammatic representation:-
  • 19. Synchronous FSK Detector (continued) •The FSK signal input is given to the two mixers with local oscillator circuits. • These two are connected to two band pass filters. • These combinations act as demodulators and the decision circuit chooses which output is more likely and selects it from any one of the detectors. • The two signals have a minimum frequency separation.
  • 20. ADVANTAGE DISADVANTAGE APPLICATION It has lower probability of error It uses larger bandwidth compare to other modulation techniques such as ASK and PSK. Hence it is not bandwidth efficient. Commonly used for caller ID and remote metering applications. It provides high SNR (Signal to Noise Ratio). The bit error rate is less in AEGN channel than phase shift keying. It is used in wireless media. It has higher immunity to noise due to constant envelope. It is also used in telephone lines. Useful in high-frequency radio transmissions Preferable in high-frequency communications Due to the requirement of large bandwidth, this FSK has limitations to use only in low-speed modems which the bit rate is 1200bits/sec. FREQUENCY SHIFTING KEYING (ADVANTAGES,DISADVANTAGES,APPLICATIONS)
  • 21. Phase Shift Keying (PSK) •PSK is the digital modulation technique in which the phase of the carrier signal is changed by varying the sine and cosine inputs at a particular time. • PSK technique is widely used for wireless LANs, bio-metric, contactless operations, along with RFID and Bluetooth communications. PSK is of two types, depending upon the phases the signal gets shifted. They are : 1. Binary Phase Shift Keying (BPSK) 2. Quadrature Phase Shift Keying (QPSK)
  • 22. Binary Phase Shift Keying(BPSK) This is also called as 2-phase PSK or Phase Reversal Keying. In this technique, the sine wave carrier takes two phase reversals such as 0° and 180°. BPSK is basically a Double Side Band Suppressed Carrier (DSBSC) modulation scheme, for message being the digital information.
  • 23. BPSK Modulator The block diagram of Binary Phase Shift Keying consists of the balance modulator which has the carrier sine wave as one input and the binary sequence as the other input. Following is the diagrammatic representation:-
  • 24. BPSK Modulator(continued) The modulation of BPSK is done using a balance modulator, which multiplies the two signals applied at the input. For a zero binary input, the phase will be 0° and for a high input, the phase reversal is of 180°. Following is the diagrammatic representation of BPSK Modulated output wave along with its given input:- The output sine wave of the modulator will be the direct input carrier or the inverted 180°phase Shifted 180°phase shifted input carrier, which is a function of the data signal.
  • 25. BPSK Wave when carrier is Sine wave BPSK Wave when carrier is Cosine wave
  • 26. BPSK Demodulator The block diagram of BPSK demodulator consists of a mixer with local oscillator circuit, a bandpass filter, a two-input detector circuit. The diagram is as follows:- •By recovering the band-limited message signal, with the help of the mixer circuit and the band pass filter, the first stage of demodulation gets completed. The base band signal which is band limited is obtained and this signal is used to regenerate the binary message bit stream. •In the next stage of demodulation, the bit clock rate is needed at the detector circuit to produce the original binary message signal. If the bit rate is a sub-multiple of the carrier frequency, then the bit clock regeneration is simplified. To make the circuit easily understandable, a decision-making circuit may also be inserted at the 2nd stage of detection.
  • 27. Quadrature Phase Shift Keying (QPSK) QPSK is a form of modulation scheme in which two bits are modulated at once, selecting one of the four possible carrier phase shift. It is a particularly interesting one because it actually transmits two bits per symbol. In other words, a QPSK symbol doesn’t represent 0 or 1—it represents 00, 01, 10, or 11. QPSK allows the signal to carry twice as much information as ordinary PSK using the same bandwidth. In QPSK as with BPSK information carried by transmitted signal is contained in the phase of the carrier wave. In particular, the phase of the carrier takes one of the four equally spaced value such as 𝜋/4, 3𝜋/4, 5𝜋/4, 7𝜋/4 .
  • 28. QPSK Modulator The QPSK Modulator uses a bit-splitter, two multipliers with local oscillator, a 2-bit serial to parallel converter and a summer circuit. Following is the block diagram for the same:- 𝟎𝟎→−𝑽𝑽 𝟏𝟏→+𝑽𝑽 01110010 Cos(𝟐𝝅𝒇𝒄𝒕) sin (𝟐𝝅𝒇𝒄𝒕) 90o phase shifter MODULATED OUTPUT WAVEFORM
  • 29. QPSK Modulator(continued) •Fig. shows a block diagram of QPSK transmitter. The incoming binary data sequence is first tranformed into polar form by NRZ level encoder. •The symbol ‘1’and ‘0 are represented by ‘+V’ and ‘-V’ respectively. •At the modulator’s input, the message signal’s even bits (i.e., 2nd bit, 4th bit, 6th bit, etc.) and odd bits (i.e., 1st bit, 3rd bit, 5th bit, etc.) are separated by the bits splitter and are multiplied with the same carrier to generate odd BPSK (called as PSKi) and even BPSK (called as PSKq). The PSKQ signal is anyhow phase shifted by 90° before being modulated. •Finally the two PSK signals are added to produce the desired QPSK signal.
  • 30.
  • 31. QPSK Demodulator The QPSK Demodulator uses two product demodulator circuits with local oscillator, two band pass filters, two integrator circuits, and a 2-bit parallel to serial converter. Following is the diagram for the same:- The two product detectors at the input of demodulator simultaneously demodulate the two BPSK signals. The pair of bits are recovered here from the original data. These signals after processing, are passed to the parallel to serial converter.
  • 32. PHASE SHIFTING KEYING (ADVANTAGES,DISADVANTAGES,APPLICATIONS) ADVANTAGE DISADVANTAGE APPLICATIONS This type of PSK allows information to be carried with a radio communications signal more efficiently compare with FSK. The bandwidth efficiency of this PSK is less compared with ASK type of modulation This method is broadly used for bio- metric, wireless LAN along with wireless communications like Bluetooth and RFID. QPSK is another kind of data transmits wherever 4 phase states are utilized, all in 90 degrees of one another. By estimating the phase states of the signal, the binary information can be decoded. Algorithms like recovery and detection are extremely difficult. Local Oscillator Optical Communications It is less vulnerable to faults when we evaluate with ASK modulation & occupies similar bandwidth like ASK. High-level PSK modulations like QPSK is more sensitive to phase differences. Multi-channel WDM Delay & add demodulator It is a non-coherent reference signal Nonlinear effects for WDM transmission
  • 33. CONCLUSION (DIFFERENCE BETWEEN ASK,FSK,PSK) PARAMETER ASK FSK PSK Variable characteristics Amplitude Frequency Phase Bandwidth Is proportional to signal rate (B =(1+d)S),d is due to modulation & filtering ,lies between 0 & 1. B=(1+d)×S+2Δf B=(1+d)×S Noise immunity low High High Complexity Simple Moderately complex Very complex Error probability High Low Low Performance in presence of noise Poor Better than ASK Better than FSK Bit rate Suitable upto 100 bits/sec Suitable upto about 1200 bits/sec Suitable for high bit rates
  • 34. THANK YOU FOR YOUR ATTENTION

Editor's Notes

  1. https://www.elprocus.com/digital-modulation-different-types-and-their-differences/
  2. https://www.elprocus.com/digital-modulation-different-types-and-their-differences/
  3. https://www.watelectronics.com/types-of-modulation-techniques-with-applications/#:~:text=The%20main%20advantages%20of%20the,by%20using%20a%20carrier%20wave.
  4. For QPSK:-https://www.maximintegrated.com/en/glossary/definitions.mvp/term/QPSK/gpk/244#:~:text=Quadrature%20Phase%20Shift%20Keying%20(QPSK,PSK%20using%20the%20same%20bandwidth. AND SOME FROM YOUR LAST SEMESTER NOTES.
  5. https://www.tutorialspoint.com/digital_communication/digital_communication_amplitude_shift_keying.htm AND FROM YOUR LAST SEMESTER NOTES
  6. https://www.tutorialspoint.com/digital_communication/digital_communication_amplitude_shift_keying.htm
  7. https://www.tutorialspoint.com/digital_communication/digital_communication_amplitude_shift_keying.htm
  8. https://www.tutorialspoint.com/digital_communication/digital_communication_amplitude_shift_keying.htm
  9. https://www.tutorialspoint.com/digital_communication/digital_communication_amplitude_shift_keying.htm
  10. 1- https://www.rfwireless-world.com/Terminology/Advantages-and-Disadvantages-of-ASK.html#:~:text=Disadvantages%20of%20ASK%20modulation,-Following%20are%20the&text=%E2%9E%A8ASK%20modulation%20is%20very,error%20than%20ASK%20is%20used. 2- https://www.elprocus.com/amplitude-shift-keying-ask-working-and-applications/
  11. https://www.tutorialspoint.com/digital_communication/digital_communication_frequency_shift_keying.htm
  12. https://www.tutorialspoint.com/digital_communication/digital_communication_frequency_shift_keying.htm
  13. https://www.tutorialspoint.com/digital_communication/digital_communication_frequency_shift_keying.htm
  14. https://www.tutorialspoint.com/digital_communication/digital_communication_frequency_shift_keying.htm
  15. https://www.tutorialspoint.com/digital_communication/digital_communication_frequency_shift_keying.htm
  16. 1- https://www.rfwireless-world.com/Terminology/Advantages-and-Disadvantages-of-FSK.html#:~:text=Following%20are%20the%20benefits%20or,noise%20due%20to%20constant%20envelope. 2- https://www.elprocus.com/frequency-shift-keying-fsk-working-applications/
  17. https://www.tutorialspoint.com/digital_communication/digital_communication_phase_shift_keying.htm
  18. https://www.tutorialspoint.com/digital_communication/digital_communication_phase_shift_keying.htm
  19. https://www.tutorialspoint.com/digital_communication/digital_communication_phase_shift_keying.htm
  20. https://www.tutorialspoint.com/digital_communication/digital_communication_phase_shift_keying.htm
  21. FROM LAST SEMESTER NOTES
  22. https://www.tutorialspoint.com/digital_communication/digital_communication_phase_shift_keying.htm
  23. https://www.tutorialspoint.com/digital_communication/digital_communication_phase_shift_keying.htm
  24. https://www.tutorialspoint.com/digital_communication/digital_communication_phase_shift_keying.htm
  25. https://www.tutorialspoint.com/digital_communication/digital_communication_phase_shift_keying.htm
  26. https://www.tutorialspoint.com/digital_communication/digital_communication_frequency_shift_keying.htm
  27. https://www.elprocus.com/phase-shift-keying-psk-types-and-its-applications/
  28. https://www.ques10.com/p/3619/compare-ask-psk-fsk-systems-1/