Amplitude Shift Keying Generation Circuit

Posted By admin On 13.12.20
  1. Amplitude Shift Keying Circuit
  2. Amplitude Shift Keying Generation Circuit Diagram

Change the amplitude of carrier, this kind of modulation is called amplitude modulation, and we call it as amplitude shift keying (ASK) modulation in digital communication. Figure 5.1 is the basic circuit diagram of ASK modulator. Let the input data be 5V, when. Amplitude Shift Keying & Frequency Shift Keying Aim: To generate and demodulate an amplitude shift keyed (ASK) signal and a binary FSK signal. Intro to Generation of ASK Amplitude shift keying - ASK - in the context of digital communications is a modulation process, which imparts to a sinusoid two or more discrete amplitude levels. Etc ssh ssh_host_rsa_key generate. If we modulate the amplitude of the input binary signal according to the carrier signal i.e. Called as amplitude shift keying. Here, in this article, we are going to discuss what is frequency shift keying and FSK modulation, demodulation process along with their advantages and disadvantages. What is Frequency Shift Keying? Aug 02, 2013 Frequency Shift Keying plays a great role in wide range of applications in the field of communication and was considered efficient one in data transmission of wireless modems.This above FSK modulator using IC 555 is capable of generating FSK signal with respect to the given input signal. Amplitude Shift Keying & Frequency Shift Keying Aim: To generate and demodulate an amplitude shift keyed (ASK) signal and a binary FSK signal. Intro to Generation of ASK Amplitude shift keying - ASK - in the context of digital communications is a modulation. Amplitude-shift keying (ASK) is a form of amplitude modulation that represents digital data as variations in the amplitude of a carrier wave.In an ASK system, the binary symbol 1 is represented by transmitting a fixed-amplitude carrier wave and fixed frequency for a bit duration of T seconds.

  • Digital Communication Tutorial
  • Digital Communication Resources
  • Selected Reading

Amplitude Shift Keying (ASK) is a type of Amplitude Modulation which represents the binary data in the form of variations in the amplitude of a signal.

Any modulated signal has a high frequency carrier. The binary signal when ASK modulated, gives a zero value for Low input while it gives the carrier output for High input.

The following figure represents ASK modulated waveform along with its input.

To find the process of obtaining this ASK modulated wave, let us learn about the working of the ASK modulator.

ASK Modulator

The ASK modulator block diagram comprises of the carrier signal generator, the binary sequence from the message signal and the band-limited filter. Following is the block diagram of the ASK Modulator.

The carrier generator, sends a continuous high-frequency carrier. The binary sequence from the message signal makes the unipolar input to be either High or Low. The high signal closes the switch, allowing a carrier wave. Hence, the output will be the carrier signal at high input. When there is low input, the switch opens, allowing no voltage to appear. Hence, the output will be low.

The band-limiting filter, shapes the pulse depending upon the amplitude and phase characteristics of the band-limiting filter or the pulse-shaping filter.

ASK Demodulator

There are two types of ASK Demodulation techniques. They are −

  • Asynchronous ASK Demodulation/detection
  • Synchronous ASK Demodulation/detection

The clock frequency at the transmitter when matches with the clock frequency at the receiver, it is known as a Synchronous method, as the frequency gets synchronized. Otherwise, it is known as Asynchronous.

Asynchronous ASK Demodulator

The Asynchronous ASK detector consists of a half-wave rectifier, a low pass filter, and a comparator. Following is the block diagram for the same.

The modulated ASK signal is given to the half-wave rectifier, which delivers a positive half output. The low pass filter suppresses the higher frequencies and gives an envelope detected output from which the comparator delivers a digital output.

Synchronous ASK Demodulator

Synchronous ASK detector consists of a Square law detector, low pass filter, a comparator, and a voltage limiter. Following is the block diagram for the same.

The ASK modulated input signal is given to the Square law detector. A square law detector is one whose output voltage is proportional to the square of the amplitude modulated input voltage. The low pass filter minimizes the higher frequencies. The comparator and the voltage limiter help to get a clean digital output.

Analog modulation
Digital modulation
Hierarchical modulation
Spread spectrum
See also

Amplitude-shift keying (ASK) is a form of amplitude modulation that represents digitaldata as variations in the amplitude of a carrier wave.In an ASK system, the binary symbol 1 is represented by transmitting a fixed-amplitude carrier wave and fixed frequency for a bit duration of T seconds. If the signal value is 1 then the carrier signal will be transmitted; otherwise, a signal value of 0 will be transmitted.

Any digital modulation scheme uses a finite number of distinct signals to represent digital data. ASK uses a finite number of amplitudes, each assigned a unique pattern of binary digits. Usually, each amplitude encodes an equal number of bits. Each pattern of bits forms the symbol that is represented by the particular amplitude. The demodulator, which is designed specifically for the symbol-set used by the modulator, determines the amplitude of the received signal and maps it back to the symbol it represents, thus recovering the original data. Frequency and phase of the carrier are kept constant.

Like AM, an ASK is also linear and sensitive to atmospheric noise, distortions, propagation conditions on different routes in PSTN, etc. Both ASK modulation and demodulation processes are relatively inexpensive. The ASK technique is also commonly used to transmit digital data over optical fiber. For LED transmitters, binary 1 is represented by a short pulse of light and binary 0 by the absence of light. Laser transmitters normally have a fixed 'bias' current that causes the device to emit a low light level. This low level represents binary 0, while a higher-amplitude lightwave represents binary 1.

The simplest and most common form of ASK operates as a switch, using the presence of a carrier wave to indicate a binary one and its absence to indicate a binary zero. This type of modulation is called on-off keying (OOK), and is used at radio frequencies to transmit Morse code (referred to as continuous wave operation),

More sophisticated encoding schemes have been developed which represent data in groups using additional amplitude levels. For instance, a four-level encoding scheme can represent two bits with each shift in amplitude; an eight-level scheme can represent three bits; and so on. These forms of amplitude-shift keying require a high signal-to-noise ratio for their recovery, as by their nature much of the signal is transmitted at reduced power.

ASK diagram

ASK system can be divided into three blocks. The first one represents the transmitter, the second one is a linear model of the effects of the channel, the third one shows the structure of the receiver. Outlook 365 for mac. The following notation is used:

  • ht(f) is the carrier signal for the transmission
  • hc(f) is the impulse response of the channel
  • n(t) is the noise introduced by the channel
  • hr(f) is the filter at the receiver
  • L is the number of levels that are used for transmission
  • Ts is the time between the generation of two symbols

Different symbols are represented with different voltages. If the maximum allowed value for the voltage is A, then all the possible values are in the range [−A, A] and they are given by:

vi=2AL1iA;i=0,1,,L1{displaystyle v_{i}={frac {2A}{L-1}}i-A;quad i=0,1,dots ,L-1}

the difference between one voltage and the other is:

Δ=2AL1{displaystyle Delta ={frac {2A}{L-1}}}

Considering the picture, the symbols v[n] are generated randomly by the source S, then the impulse generator creates impulses with an area of v[n]. These impulses are sent to the filter ht to be sent through the channel. In other words, for each symbol a different carrier wave is sent with the relative amplitude.

Out of the transmitter, the signal s(t) can be expressed in the form:

s(t)=n=v[n]ht(tnTs){displaystyle s(t)=sum _{n=-infty }^{infty }v[n]cdot h_{t}(t-nT_{s})}

In the receiver, after the filtering through hr (t) the signal is:

z(t)=nr(t)+n=v[n]g(tnTs){displaystyle z(t)=n_{r}(t)+sum _{n=-infty }^{infty }v[n]cdot g(t-nT_{s})}

where we use the notation:

nr(t)=n(t)hr(t)g(t)=ht(t)hc(t)hr(t){displaystyle {begin{aligned}n_{r}(t)&=n(t)*h_{r}(t)g(t)&=h_{t}(t)*h_{c}(t)*h_{r}(t)end{aligned}}}

where * indicates the convolution between two signals. After the A/D conversion the signal z[k] can be expressed in the form:

z[k]=nr[k]+v[k]g[0]+nkv[n]g[kn]{displaystyle z[k]=n_{r}[k]+v[k]g[0]+sum _{nneq k}v[n]g[k-n]}

In this relationship, the second term represents the symbol to be extracted. The others are unwanted: the first one is the effect of noise, the third one is due to the intersymbol interference.

If the filters are chosen so that g(t) will satisfy the Nyquist ISI criterion, then there will be no intersymbol interference and the value of the sum will be zero, so:

z[k]=nr[k]+v[k]g[0]{displaystyle z[k]=n_{r}[k]+v[k]g[0]}

the transmission will be affected only by noise.

Probability of error[edit]

The probability density function of having an error of a given size can be modelled by a Gaussian function; the mean value will be the relative sent value, and its variance will be given by:

σN2=+ΦN(f)Hr(f)2df{displaystyle sigma _{N}^{2}=int _{-infty }^{+infty }Phi _{N}(f)cdot H_{r}(f) ^{2}df}

where ΦN(f){displaystyle Phi _{N}(f)} is the spectral density of the noise within the band and Hr (f) is the continuous Fourier transform of the impulse response of the filter hr (f).

The probability of making an error is given by:

Pe=PeH0PH0+PeH1PH1++PeHL1PHL1=k=0L1PeHkPHk{displaystyle P_{e}=P_{e H_{0}}cdot P_{H_{0}}+P_{e H_{1}}cdot P_{H_{1}}+cdots +P_{e H_{L-1}}cdot P_{H_{L-1}}=sum _{k=0}^{L-1}P_{e H_{k}}cdot P_{H_{k}}}

where, for example, PeH0{displaystyle P_{e H_{0}}} is the conditional probability of making an error given that a symbol v0 has been sent and PH0{displaystyle P_{H_{0}}} is the probability of sending a symbol v0.

If the probability of sending any symbol is the same, then:

PHi=1L{displaystyle P_{H_{i}}={frac {1}{L}}}

If we represent all the probability density functions on the same plot against the possible value of the voltage to be transmitted, we get a picture like this (the particular case of L=4{displaystyle L=4} is shown):

The probability of making an error after a single symbol has been sent is the area of the Gaussian function falling under the functions for the other symbols. It is shown in cyan for just one of them. If we call P+{displaystyle P^{+}} the area under one side of the Gaussian, the sum of all the areas will be: 2LP+2P+{displaystyle 2LP^{+}-2P^{+}}. The total probability of making an error can be expressed in the form:

Pe=2(11L)P+{displaystyle P_{e}=2left(1-{frac {1}{L}}right)P^{+}}

We now have to calculate the value of P+{displaystyle P^{+}}. In order to do that, we can move the origin of the reference wherever we want: the area below the function will not change. We are in a situation like the one shown in the following picture:

it does not matter which Gaussian function we are considering, the area we want to calculate will be the same. The value we are looking for will be given by the following integral:

Amplitude Shift Keying Circuit

P+=Ag(0)L112πσNex22σN2dx=12erfc(Ag(0)2(L1)σN){displaystyle P^{+}=int _{frac {Ag(0)}{L-1}}^{infty }{frac {1}{{sqrt {2pi }}sigma _{N}}}e^{-{frac {x^{2}}{2sigma _{N}^{2}}}}dx={frac {1}{2}}operatorname {erfc} left({frac {Ag(0)}{{sqrt {2}}(L-1)sigma _{N}}}right)}

where erfc(x){displaystyle operatorname {erfc} (x)} is the complementary error function. Putting all these results together, the probability to make an error is:

Amplitude Shift Keying Generation Circuit Diagram

Pe=(11L)erfc(Ag(0)2(L1)σN){displaystyle P_{e}=left(1-{frac {1}{L}}right)operatorname {erfc} left({frac {Ag(0)}{{sqrt {2}}(L-1)sigma _{N}}}right)}

from this formula we can easily understand that the probability to make an error decreases if the maximum amplitude of the transmitted signal or the amplification of the system becomes greater; on the other hand, it increases if the number of levels or the power of noise becomes greater.

This relationship is valid when there is no intersymbol interference, i.e. g(t){displaystyle g(t)} is a Nyquist function.

See also[edit]

  • Frequency-shift keying (FSK)

External links[edit]

Retrieved from 'https://en.wikipedia.org/w/index.php?title=Amplitude-shift_keying&oldid=931017112'