• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Computer Notes

Library
    • Computer Fundamental
    • Computer Memory
    • DBMS Tutorial
    • Operating System
    • Computer Networking
    • C Programming
    • C++ Programming
    • Java Programming
    • C# Programming
    • SQL Tutorial
    • Management Tutorial
    • Computer Graphics
    • Compiler Design
    • Style Sheet
    • JavaScript Tutorial
    • Html Tutorial
    • Wordpress Tutorial
    • Python Tutorial
    • PHP Tutorial
    • JSP Tutorial
    • AngularJS Tutorial
    • Data Structures
    • E Commerce Tutorial
    • Visual Basic
    • Structs2 Tutorial
    • Digital Electronics
    • Internet Terms
    • Servlet Tutorial
    • Software Engineering
    • Interviews Questions
    • Basic Terms
    • Troubleshooting
Menu

Header Right

Home » Networking » Switching » What is Modulation? Different Types of Modulation Techniques
Next →
← Prev

What is Modulation? Different Types of Modulation Techniques

By Dinesh Thakur

Modulation has defined as the process of combining an input signal m (t) and a frequency carrier FC to produce an S (t) signal whose bandwidth is (usually) centred around FC. In the case of digital data, the justification of the modulation must be clear: it is necessary when there is only the possibility of analogue transmission, to convert the digital data into analogues. However, when the data is analogue, the justification is not so apparent. After all, voice signals are transmitted through telephone lines using their original spectrum (this is called baseband transmission). There are two main reasons:

To carry out a more effective transmission, a higher frequency may require for unguided media; it is practically impossible to transmit baseband signals since the size of the antennas would have to be several kilometres in diameter.

Modulation allows multiplication by frequency division, a very important technique.

To convert analogue signals to digital and vice versa, several types of modulation are required.

We’ll be covering the following topics in this tutorial:

  • Analog to digital conversion
  • Digital to analog conversion

Analog to digital conversion

Sometimes it is necessary to digitise an analogue signal. For example, to send the human voice over a long distance, it is necessary to digitise them since digital signals are less vulnerable to noise. It is called analogue to digital conversion or digitisation of an analogue signal. To carry it out, it is necessary to reduce the number of values, potentially infinite in an analogue message, so that they can represent as a digital flow with minimal loss of information. There are several methods for converting from analogue to digital. The figure shows an analogue to digital converter, called a codec (encoder and decoder).

Pulse amplitude modulation (PAM)

This technique takes an analogue signal, the sample and generates a series of pulses based on the sampling results. The term sampling means measuring the amplitude of the signal at equal intervals.

The method used in PAM is more useful for other engineering series than for data transmission. However, PAM is the foundation of a significant analogue to digital conversion method called pulse coding modulation (PCM).

In PAM, the original signal is shown at equal intervals of time, as shown in the figure. PAM uses a technique called sampling and retention. At a particular time, the signal level is read and briefly maintained.

The reason that PAM not used for data transmission is that, although it translates the original wave into a series of pulses, these pulses still do not have any amplitude (they are still an analogue signal, not digital). To convert them into a digital signal, it is necessary to code them using pulse coding modulation (PCM).

Pulse amplitude modulation (PAM) has some applications, but it not used in itself for data transmission. However, it is the first step for another popular conversion method called pulse coding modulation (PCM).

Pulse coding modulation (PCM)

PCM modifies the pulses created by PAM to create a fully digital signal. To do this, PCM first quantifies the PAM pulses. Quantification is the method of assigning integral values within a specific range of sampled instances — the result of the quantification presented in the figure.

The figure shows a simple method for assigning sign and magnitude values to quantified samples — each value translated in a binary equivalent of seven bits. The eighth bit indicates the sign.

The digital binaries are then transformed into a digital signal using one of the digital to digital coding techniques. The figure shows the results of the pulse code modulation of the original signal finally encoded within the unipolar signal. Only the three sampled values represented.

The PCM is composed of four different processes: PAM, quantification, binary quantification and digital to digital coding. This sampling method is used for digitising voice on the transmission lines T of the North American telecommunications system.

Digital to analog conversion

The conversion from digital to analogue, or analogue digital modulation, is the process of changing one of the characteristics of an analogue base signal into information based on a digital signal (zeros and ones). For example, when data is transmitted from one computer to another through a public telephone network, the original data is digital, but, because telephone cables carry similar signals, it is necessary to convert that data. The digital data must modulate on an analogue signal that has been manipulated to appear as two different values corresponding to 0 and 1 binary. The figure shows the relationship between the digital information, the digital to analogue modulation hardware and the resulting analogue signal value.

Of the many existing mechanisms for analogue digital modulation, only the most useful for data transmission will treat.

As seen in the previous topics, a sine wave defined by three characteristics: amplitude, frequency and phase. When any of these characteristics are changed, the second version of this wave created. If it said then that the original wave represents the binary 1, the variation might represent the binary 0, or vice versa. Therefore, changing the appearance of a pure electrical signal forward and backward can be used to represent digital data. Any of the three characteristics mentioned can be altered in this way, giving us at least three mechanisms to modulate digital data in analogue signals:

Amplitude shift modulation (ASK), Frequency shift modulation (FSK) and Phase shift modulation (PSK). Besides, there is a fourth mechanism (and better) that combines changes in phase and amplitude and is called quadrature amplitude modulation (QAM). QAM is the most efficient of these options and is the mechanism used in all modern modems.

Amplitude shift modulation (ASK)

In this modulation, the power of the carrier signal is changed to represent binary 1 and 0. Both the frequency and the phase remain constant while the amplitude changes. What voltage represents 1, and what voltage represents 0 is left for system designers. The duration of the bit is the period that defines a bit. The peak signal amplitude during each bit duration is constant, and its value depends on the bit (0 or 1). The transmission speed using ASK limited by the physical characteristics of the transmission medium. The figure shows a conceptual view of the ASK.

Unfortunately, ASK transmission is highly susceptible to noise interference. Recall the term noise refers to the intentional voltages introduced into a line by various phenomena such as heat or electromagnetic induction created by other sources.

These unintentional voltages combine with the signal and change their amplitude. A 0 can change to a 1 and a 1 to a 0. You can already see that noise is especially problematic for the ASK, which relies solely on the amplitude for recognition. Noise usually affects amplitude; therefore, ASK is the modulation method most affected by noise.

Frequency shift modulation (FSK)

In this type of modulation, the frequency of the carrier signal changes to represent binary 1 and 0. The frequency of the signal during the bit duration is constant, and its value depends on a bit (0 or 1): both the peak amplitude and the phase remain constant. The figure shows a conceptual view of the FSK.

FSK avoids most of the noise problems of the ASK. Because the receiving device is looking for specific frequency changes in a certain number of periods, ignore the voltage peaks. The factors that limit the FSK are the physical capabilities of the carrier.

Phase Shift Modulation (PSK)

In PSK modulation, the carrier phase changes to represent the binary 1 or 0. Both peak amplitude and frequency remain constant while the phase changes. For example, if you start with a phase of 0 degrees to represent a binary 0, you can change the phase to 180 degrees to send a binary 1. The phase of the signal during the duration of each bit is constant, and its value depends on the bit (0 or 1). The figure gives a conceptual view of PSK.

The above method is often called 2-PSK, 0 binary PSK because two different phases (0 and 180 degrees) used. The figure clarifies this point by showing the relationship between the phase and binary value. A second diagram, called a constellation or a phase-state diagram, shows the same relationship illustrating only the phases.

PSK is not susceptible to noise degradation that affects ASK or FSK band limitations. It means that small variations in the signal can be detected reliably in the receiver. In addition to using only two variations of a signal, each representing one bit, you can use four variations and let each phase shift represent two bits.

Quadrature amplitude modulation (QAM)

PSK limited by the ability of teams to distinguish small differences in phase. This factor limits your potential bit rate.

So far, only the three characteristics of a sine wave have been altered one at a time, but what happens if two altered. Bandwidth limitations make combinations of FSK with other changes virtually useless. However, why not combine ASK and PSK. In that case, we could have x variations in phase and variations in amplitude, giving us x times and possible variations and the corresponding number of bits per variation. Quadrature amplitude modulation (QAM) does just that. The term quadrature is derived from the restrictions necessary for minimum performance and is related to trigonometry.

Quadrature amplitude modulation (QAM) means combining ASK and PSK so that there is maximum contrast between each bit, debit, tibit, quadbit, etc. The figure shows two possible combinations, 4-QAM and 8-QAM.

You’ll also like:

  1. Switching Techniques
  2. Techniques for Maintenance
  3. What are the Different Techniques Used for Proving the Correctness of a Program
  4. Explain Various DESIGN TECHNIQUES
  5. Software Testing Techniques
Next →
← Prev
Like/Subscribe us for latest updates     

About Dinesh Thakur
Dinesh ThakurDinesh Thakur holds an B.C.A, MCDBA, MCSD certifications. Dinesh authors the hugely popular Computer Notes blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps.

Dinesh Thakur is a Freelance Writer who helps different clients from all over the globe. Dinesh has written over 500+ blogs, 30+ eBooks, and 10000+ Posts for all types of clients.


For any type of query or something that you think is missing, please feel free to Contact us.


Primary Sidebar

Networking

Networking Tutorials

  • Network - Home
  • Network - Uses
  • Network - Advantages
  • Network - Classification
  • Network - Architecture Type
  • Nework - Networks Vs Comms

Networking Devices

  • Network - Modem
  • Network - Routers Types
  • Network - Bluetooth
  • Network - RS-232C
  • Network - Hub
  • Network - Devices
  • Network - Bridges
  • Network - Repeaters
  • Network - Routers
  • Network - Switching Hubs
  • Network - Transceiver
  • Network - Multiplexer
  • Network - Gateway
  • Network - BNC Connector
  • Network - Optical Connectors
  • Network - NICs
  • Networking Protocol

  • Protocol - Definition
  • Protocol - IP
  • Protocol - Aloha
  • Protocol - MAC Layer
  • Protocol - Sliding Window
  • Protocol - Stop & Wait
  • Protocol - Network Protocols
  • Protocol - Token Passing
  • Protocol - SIP
  • Protocol - Ad-Hoc Networks Routing
  • Protocol - Lap-f
  • Protocol - Point-to-Point
  • Protocol - PPP
  • Protocol - PPP Phases
  • Protocol - LDP
  • Protocol - MPLS
  • Protocol - MPOA
  • Protocol - HDLC
  • Protocol - Distance Vector routing
  • Protocol - IGMP
  • Protocol - ICMP
  • Protocol - SLIP
  • Protocol - DVMRP
  • Protocol - SDLC
  • Protocol - Routing
  • Protocol - UDP
  • Protocol - ARP and RARP
  • Protocol - Link-State
  • Protocol - ARP Table
  • Protocol - RTP
  • Protocol - NHRP
  • Network Addressing

  • Addressing - Home
  • Addressing - SubNetting
  • Addressing - Classless
  • Addressing - Classes or Classful
  • Addressing - IPV4 vs IPV6
  • Addressing - IPv6
  • Addressing - Subnet Mask
  • Addressing - MAC Address
  • Addressing - Supernetting
  • Addressing - Private IP
  • Addressing - IPv4
  • Addressing - Public IP
  • Addressing - Multihomed
  • Addressing - Indirect Addressing
  • Addressing - ASP
  • Addressing - VLSM
  • Addressing - Routing Algorithms
  • Addressing - Hierarchical Routing
  • Addressing - Routing
  • Addressing - Distributed Routing
  • Addressing - Data Routing
  • Addressing - Services
  • Addressing - IP forwarding
  • Addressing - Aging
  • Addressing - Algorithm CR
  • Networking Media

  • Transmission - Home
  • Transmission - Modes
  • Transmission - Media
  • Transmission - System
  • Transmission - Bound
  • Transmission - Unbound
  • Transmission - Baseband
  • Transmission - Wired
  • Transmission - Fiber Benfits
  • Transmission - Infrared
  • Transmission - UnGuided
  • Transmission - Microwave
  • Transmission - Infrared
  • Transmission - Radio Wave
  • Transmission - Network
  • Transmission - Digital Signal
  • Transmission - Data
  • Transmission - Asynchronous
  • Transmission - Sync Vs Async
  • Cable - Twisted-Pair
  • Cable - Coaxial
  • Cable - UTP and STP
  • Cable - Fiber Optics
  • Cable - Gigabit Ethernet
  • Cable - Fast Ethernet
  • Cable - Ethernet Cable
  • Cable - Fiber-Optic Using
  • Cable - CATV
  • Cable - 100Base T
  • Cable - 10BASE T
  • Cable - 10 Base 2
  • Cable - 10 Base 5
  • Networking Types

  • IEEE - 802.11
  • IEEE - 802.5
  • IEEE - 802.15
  • IEEE - 802.11e
  • IEEE - 802.11n
  • Network - Ethernet
  • Network - Arpanet
  • Network - Frame Relay
  • Network - X.25
  • Network - Telephone
  • Network - WSN
  • Network - Metro Ethernet
  • Network - WAN Ethernet
  • Network - Wireless Mesh
  • Network - SAN
  • Network - SNA
  • Network - Cisco Architecture
  • Network - Vlan
  • Network - FDDI
  • Network - 100VG-Any
  • Network - EPON
  • Network - ISDN
  • Network - ARCNet
  • Network - Passive Optical
  • Networking Reference Models

  • Models - TCP/IP
  • Models - OSI
  • Models - MAC Layer
  • Models - Network Layer
  • Models - MAC Layer Functions
  • Models - TCP/IP Vs OSI
  • Models - CSMA
  • Models - CSMA/CD
  • Models - CSMA/CA
  • Models - CDMA
  • Models - STDM
  • Models - FDMA
  • Models - TDMA
  • Models - SDH
  • Models - CDM
  • Models - Multiplexing
  • Models - Reference
  • Models - Random Access Methods
  • Models - TCP/IP Architecture
  • Models - FDM
  • Models - IP Header
  • Models - OTN
  • Models - Amplitude Levels
  • Models - MIMO
  • Models - Plesiochronous Media
  • Models - Half Duplex
  • Models - ISO Architecture
  • Models - Data-Link Layer
  • Models - WDM
  • Models - Duplex
  • Models - Ethernet FDSE
  • Networking Switching Techniques

  • Switching - Home
  • Switching - Techniques
  • Switching - Packet
  • Switching - Circuit
  • Switching - Message
  • Switching - Packet Vs virtual Circuit
  • Switching - Cell
  • Switching - ATM Cell Structure
  • Switching - Virtual Circuit Vs Datagram
  • Switching - Time Space
  • Switching - Modulation
  • Switching - Cell Relay
  • Switching - ATM Structure
  • Switching - VC Vs PVC
  • Switching - Packet and Circuit
  • Switching - VPC
  • Switching - IP
  • Switching - Logical Channels
  • Switching - TDM
  • Switching - FDM
  • Network Codes

  • Codes - CRC
  • Codes - Error Correction and Detection
  • Codes - Hamming
  • Codes - Piggybacking
  • Codes - Encoding Techniques
  • Codes - Error Control
  • Codes - Parity Check
  • Codes - Parity bit
  • Codes - Bit Error
  • Codes - CRC
  • Codes - Transmission Errors
  • Codes - Error Detection and Correction
  • Network Communication

  • Communication - Home
  • Communication - Satellite
  • Communication - Wireless
  • Communication - Data Type
  • Communication - Congestion Control
  • Communication - Network
  • Communication - Data
  • Communication - Software
  • Communication - Layering Process
  • Networking Signaling

  • Signal - Analog
  • Signal - Digital
  • Signal - Analog Vs Digital
  • Signal - Digitization
  • Network Security

  • Security - Home
  • Security - Requirements
  • Security - Threats
  • Security - Services

Other Links

  • Networking - PDF Version

Footer

Basic Course

  • Computer Fundamental
  • Computer Networking
  • Operating System
  • Database System
  • Computer Graphics
  • Management System
  • Software Engineering
  • Digital Electronics
  • Electronic Commerce
  • Compiler Design
  • Troubleshooting

Programming

  • Java Programming
  • Structured Query (SQL)
  • C Programming
  • C++ Programming
  • Visual Basic
  • Data Structures
  • Struts 2
  • Java Servlet
  • C# Programming
  • Basic Terms
  • Interviews

World Wide Web

  • Internet
  • Java Script
  • HTML Language
  • Cascading Style Sheet
  • Java Server Pages
  • Wordpress
  • PHP
  • Python Tutorial
  • AngularJS
  • Troubleshooting

 About Us |  Contact Us |  FAQ

Dinesh Thakur is a Technology Columinist and founder of Computer Notes.

Copyright © 2025. All Rights Reserved.

APPLY FOR ONLINE JOB IN BIGGEST CRYPTO COMPANIES
APPLY NOW