Fact-checked by Grok 2 weeks ago

Amplitude-shift keying

Amplitude-shift keying (ASK) is a technique in which the of a constant-frequency signal is varied to represent , while the frequency and remain unchanged. The technique has historical roots in early , where on-off keying was used for in the early 1900s. In this method, the modulating signal—typically a sequence—controls the levels of the , enabling the of over analog channels such as radio or optical links. The basic form of ASK, known as binary ASK or on-off keying (OOK), uses two levels: a non-zero for a binary '1' and zero (carrier off) for a '0', producing bursts of the sinusoid corresponding to the data bits. For higher data rates, multi-level ASK employs more than two discrete levels, where each symbol can represent multiple bits (e.g., four levels for two bits per symbol). Generation typically involves switching or multiplying the with the binary , often followed by to shape the signal and reduce to twice the rate, centered around the frequency. Detection can be asynchronous using an for simplicity or synchronous with a phase-locked for better , though both require decision circuitry to recover the original bits. ASK offers advantages in ease of and low-cost via detection, making it suitable for power-efficient systems. However, its non-constant demands linear , increasing susceptibility to , , and amplitude compared to phase- or frequency-shift keying. Common applications include passive RFID systems for tag-reader communication via load modulation, links where intensity modulation aligns with drive, and simple devices like garage door openers.

Introduction

Definition

Amplitude-shift keying (ASK) is a modulation technique in which the of a constant-frequency signal is switched between levels to represent the message, typically symbols of 0 and 1, while the and of the remain unchanged. This imparts two or more distinct values to the sinusoidal , directly corresponding to the logical states of the input . At its core, modulation encodes onto an analog for efficient transmission across channels that may not support direct signaling. The signal itself is a high-frequency characterized by a fixed and initial , serving as the base upon which the is impressed. In ASK, the bits are mapped such that a '1' corresponds to a higher level of the , while a '0' is represented by a lower , often zero, thereby creating an on-off pattern for the simplest implementation. A typical ASK modulator block diagram features the input stream feeding into an control , such as a switch or , which then combines with the carrier signal from an oscillator to generate the modulated output; this effectively scales the carrier's based on the value. As a linear modulation scheme, ASK treats the message signal proportionally in the domain, distinguishing it as a digital extension of traditional principles. In contrast to (FSK) or (PSK), ASK exclusively varies without altering the carrier's frequency or phase.

Historical Development

The foundations of amplitude-shift keying (ASK) emerged from early experiments in during the late 19th and early 20th centuries, building on efforts to transmit information via variations in amplitude. Reginald Fessenden's pioneering work in the 1900s, including the first wireless transmission of voice using in 1900 and the inaugural radio broadcast of music and speech on December 24, 1906, established key principles for amplitude-based encoding, transitioning radio from spark-gap to continuous-wave . ASK's digital adaptation took form through on-off keying (OOK), its simplest variant, which emerged with the of continuous-wave () transmitters in the early 1900s. Fessenden's use of an alternator-generated CW carrier in 1900 enabled OOK for transmission by switching the carrier on and off. This technique became integral to radio telegraphy in the 1910s and 1920s, supplanting earlier spark-gap systems like those used in Guglielmo Marconi's 1897 demonstrations, and marked ASK as one of the earliest practical methods for digital signaling over radio waves due to its minimal complexity compared to emerging frequency or approaches. A key milestone came during , when OOK was widely adopted in pulse systems for military applications, enabling short bursts of carrier transmission to detect aircraft and ships with high precision, as seen in Allied radars operational by 1940. Post-war advancements in the 1960s and 1970s saw ASK integrated into digital telephony and data transmission infrastructures, with contributing to schemes for reliable over-the-air and wireline systems, paving the way for standards in early computer modems and telegraphic networks. Research into multi-level ASK for fiber optic communications began in the late 1970s, with practical high-speed deployments employing multiple amplitude levels (e.g., PAM-4) emerging in the 2000s and 2010s to support multi-Gbps rates in long-haul links using single-mode fiber. ASK's inherent simplicity positioned it as a foundational digital technique, predating more intricate methods like (QAM) and influencing IEEE standards for wireless technologies, including precursors to modern low-power networks.

Principles of Operation

Modulation Method

Amplitude-shift keying (ASK) generates a modulated signal by varying the amplitude of a sinusoidal according to the discrete levels of the input stream, while maintaining constant and . The process starts with the input data, often in (NRZ) format, where each bit is represented by a specific voltage level (e.g., 0 V for bit 0 and a positive voltage for bit 1). This data modulates the amplitude of the signal through multiplication in a product modulator. For ASK, particularly on-off keying (OOK), the is effectively turned off for bit 0 and fully on for bit 1, producing an output where the absence or presence of the represents the data bits. The mathematical representation of a general ASK signal is given by
s(t) = A_k \cos(2\pi f_c t + \phi),
where A_k is the level for the k-th (e.g., for OOK, A_0 = 0 for bit 0 and A_1 = A for bit 1), f_c is the frequency, and \phi is a fixed offset. In ASK using OOK, two distinct symbols are used: s_0(t) = 0 ( for bit 0) and s_1(t) = A \cos(2\pi f_c t) (full for bit 1), with the A often normalized such that its energy matches the bit duration T_b. This ensures the signal encodes the solely through variations.
Hardware implementation of ASK modulation typically employs analog multipliers or switches to achieve the amplitude variation. A basic product modulator multiplies the NRZ data signal with the , using components like balanced modulators for precise control. For simple OOK, a -based switch can the : the acts as a low-resistance path when forward-biased by the positive data voltage (passing the ) and high-resistance when reverse-biased (blocking it), often combined with an for signal strength. More advanced setups use switches or integrated circuits for higher speeds and efficiency. The bandwidth required for an ASK signal is approximately $2B, where B is the baseband signal bandwidth (equal to the bit rate for rectangular pulses), due to the double-sideband nature of the modulation. This scheme is inherently susceptible to amplitude noise, as fluctuations in the channel can distort the discrete amplitude levels, leading to detection errors without additional noise resilience measures.

Signal Waveforms

In the time domain, a binary amplitude-shift keying (ASK) signal consists of a carrier wave whose amplitude is switched between two discrete levels corresponding to the binary data symbols, typically a high amplitude for a logical '1' and a low amplitude (or zero in the on-off keying variant) for a logical '0'. For a data sequence such as 1010, the waveform envelope exhibits alternating bursts of high-amplitude carrier oscillations followed by periods of low or absent carrier, creating a pattern of rectangular amplitude pulses modulating the underlying sinusoidal carrier at frequency f_c. This results in a modulated signal that appears as intermittent carrier transmissions, with the envelope directly mirroring the baseband data pulse train. A key distinction exists between on-off keying (OOK), a special case of ASK where the low amplitude is zero (fully suppressing the for '0' symbols), and full-carrier ASK, where both amplitudes are non-zero, maintaining a continuous but varying presence. Conceptually, the OOK resembles sporadic bursts separated by , akin to a series of on-off switches applied to the , whereas full-carrier ASK produces a smoother with two positive levels, avoiding complete nulls and resembling partial . In OOK, the reaches 100%, defined as m = \frac{A_{\max} - A_{\min}}{A_{\max} + A_{\min}} where A_{\min} = [0](/page/0), which maximizes the contrast but introduces a component in the due to the non-zero of the modulating signal. In the , the spectrum of an ASK signal with rectangular pulses comprises a tone at f_c (prominent in OOK due to the DC component) flanked by sidebands whose width is inversely proportional to the bit duration T, reflecting the rate $1/T. For ASK using rectangular pulses, the power (PSD) approximates G(f) \approx \frac{A^2 T}{4} \left[ \mathrm{sinc} \left( (f - f_c) T \right) \right]^2, where A is the level and \mathrm{sinc}(x) = \frac{\sin(\pi x)}{\pi x}, yielding a bandwidth of approximately $2/T centered at f_c with decaying . This sinc-squared shape arises from the of the rectangular pulses, shifted to the , and results in higher occupancy for faster rates as the sidebands broaden. To mitigate interference from these sidelobes, pulse shaping techniques replace rectangular pulses with smoother profiles, such as the , which confines the baseband spectrum within (1 + \alpha)/(2T) (where \alpha is the roll-off factor, typically 0 to 1) and suppresses out-of-band emissions. In ASK, applying to the pulses reduces and spectral regrowth, enabling more efficient use in band-limited channels by tapering the and minimizing adjacent channel overlap.

Variants

On-Off Keying (OOK)

On-off keying (OOK) represents the simplest variant of amplitude-shift keying, in which the signal's is set to zero to encode a '0' and to a nonzero value A to encode a '1'. This technique effectively turns the on or off in accordance with the input data bits, making it a direct form of digital signaling without intermediate amplitude levels. The signal waveform in OOK can be expressed as s(t) = A \cos(2\pi f_c t) for the duration of a '1' bit, where f_c is the frequency, and s(t) = 0 for a '0' bit. Assuming equally likely bits, the average transmitted power is half that of a continuous at amplitude A, since no power is consumed during '0' bits. This power-saving characteristic arises from the complete absence of the during off periods, contrasting with general ASK schemes that maintain some baseline . Unique advantages of OOK include its simplicity in transmitter design, as no precise amplitude control or linear is required beyond switching the on and off, which reduces complexity and cost. Additionally, the zero power draw for '0' bits contributes to overall lower energy consumption, particularly beneficial in battery-powered or low-duty-cycle systems. These traits make OOK ideal for applications prioritizing ease of implementation over robustness to . In practice, OOK is commonly implemented in low-cost (RF) systems using a basic keying switch, such as a or , to gate the carrier oscillator output based on the signal. For example, discrete-component circuits often employ an RF detector at the paired with a simple , enabling operation in unlicensed bands like 260–470 MHz without complex . OOK constitutes a special case of ASK featuring 100% modulation depth, where the fully switches between zero and maximum, and it has been widely adopted since the early days of radio for transmitting via on-off pulsing of the , with optical analogs in light-based signaling systems.

Multi-level ASK

Multi-level shift keying (M-ary ASK) generalizes ASK by employing M levels, where M > 2, to encode multiple bits per and achieve higher rates within limited . The levels are typically set as 0, A, 2A, ..., (M-1)A, with each of the M representing \log_2 M bits; for instance, ASK corresponds to the special case of M=2. This approach allows for more efficient use of the compared to schemes, as the remains the same while the increases proportionally with \log_2 M. The signal for the i-th in M-ary ASK is represented as s_i(t) = A_i \cos(2\pi f_c t), where A_i = i \cdot d for i = 0, 1, \dots, M-1, d is the minimum step, f_c is the , and the signal spans the symbol duration T. In the , the M symbols appear as equally spaced points aligned along the in-phase (real) axis in the I-Q plane, with no component, reflecting the pure variation while keeping constant. This linear arrangement simplifies but demands precise control to avoid symbol errors. Bandwidth efficiency in M-ary ASK improves with larger M, yielding a data rate R = \frac{\log_2 M}{T} bits per second for symbol duration T, compared to binary ASK's R = \frac{1}{T}; thus, for the same (and approximately the same ), the scales with \log_2 M. However, distinguishing closely spaced levels requires significantly higher (SNR), as affects lower-amplitude symbols more severely, increasing overall sensitivity to additive . Additionally, M-ary ASK is prone to non-linear from amplifiers or channels, which can compress or expand levels unevenly, necessitating advanced equalization techniques to mitigate (ISI) and maintain performance. In modern systems, M-ary ASK finds application in optical communications, particularly in dispersion-uncompensated links, where variants like 4-ary ASK at 10 Gbit/s demonstrate reduced to chromatic compared to simpler schemes, enabling higher over fiber-amplifier spans up to 105 km. For example, optimal level spacing in such systems incurs a back-to-back penalty of up to 7 relative to OOK due to noise and but outperforms binary in high- environments. In contemporary systems as of 2025, 4-level ASK (PAM4) is widely used in optical transceivers for data rates of 400 Gbit/s and beyond in data centers and networks.

Detection and Demodulation

Coherent Detection

In coherent detection of amplitude-shift keying (ASK) signals, the generates a local signal that is synchronized in and with the transmitted . The received signal r(t), which consists of the modulated ASK plus additive , is multiplied by this local , typically represented as \cos(2\pi f_c t + \theta), where f_c is the and \theta is the offset (ideally zero). The resulting product is then passed through a to extract the signal, effectively downconverting the amplitude variations while suppressing high-frequency components. This process recovers the original data amplitudes, assuming ASK with levels such as A for a '1' and 0 for a '0'. The structure typically employs a correlator or following the downconversion stage to optimally detect each over its duration. The output is sampled at the and compared against a decision , often set at the between the possible levels (e.g., A/2 for ASK), to determine the transmitted bit. is achieved using a (PLL) or similar synchronization circuit, such as a , which tracks the phase of the incoming signal to maintain alignment. This setup assumes an ideal channel without or significant distortions, focusing on (AWGN) conditions. Coherent detection provides optimal performance in AWGN channels by exploiting full knowledge of the carrier phase, achieving the minimum possible error rate for a given among linear detection methods for ASK. It is particularly suited to ASK's amplitude-only , where phase information is not encoded, allowing efficient recovery in high-SNR environments such as links. However, the need for precise introduces complexity, making it less practical in scenarios with poor .

Non-coherent Detection

Non-coherent detection of (ASK) signals relies on extracting the of the received signal without requiring knowledge of the , making it suitable for scenarios where is challenging or unnecessary. The principle involves applying an to the received signal r(t), typically consisting of a followed by a to isolate the amplitude variations while suppressing high-frequency components. The resulting is then compared to a predefined to make bit decisions, with a '1' bit declared if the envelope exceeds the threshold and '0' otherwise; this approach is particularly effective for on-off keying (OOK), a of ASK where one symbol has zero . A typical for a non-coherent ASK includes an RF front-end for bandpass filtering to select the signal band, followed by the , an integrator or sampler to accumulate the over the symbol period, and a for threshold-based to recover the . This structure avoids the complexity of circuits used in coherent detection, which serves as the optimal alternative but demands precise phase alignment. The primary advantages of non-coherent detection include the elimination of the need for carrier phase recovery, rendering it robust against phase jitter and Doppler shifts, and its widespread adoption in low-cost designs due to simpler requirements. However, it incurs a performance penalty, requiring approximately 3 dB higher (SNR) than coherent detection to achieve the same (BER) in channels, and it exhibits increased error rates in environments where amplitude fluctuations exacerbate detection challenges. Non-coherent detection is predominant for OOK in systems, where direct detection via photodiodes performs envelope-like processing, and in simple RF systems for short-range applications. Variants such as square-law detectors enhance noise handling by squaring the signal before low-pass filtering, improving in low-SNR conditions by emphasizing the signal power over .

Performance Characteristics

Error Probability

The error probability in amplitude-shift keying (ASK) systems is a critical performance metric, typically analyzed under the (AWGN) model, where the noise is assumed to be zero-mean with power N_0/2. This model facilitates the derivation of closed-form expressions for (BER) and symbol error rate (SER) using maximum likelihood (ML) detection principles, which minimize the probability of error by choosing the symbol that maximizes the likelihood given the received signal. The minimum between constellation points determines the error performance, with larger distances yielding lower error probabilities for a given (SNR). For binary coherent ASK, where symbols are represented by amplitudes +A and -A (bipolar signaling), the BER is identical to that of binary phase-shift keying (BPSK) due to equivalent constellation geometry in the signal space. The expression is P_b = Q\left(\sqrt{\frac{2E_b}{N_0}}\right), where Q(\cdot) is the Gaussian , E_b is the energy per bit, and N_0 is the power . This formula arises from the detector's at the origin, with the error occurring when exceeds the signal projection. In contrast, for non-coherent on-off keying (OOK), a common variant of ASK that uses amplitudes 0 and A without phase reference, the detection relies on measurements, leading to degraded performance. The approximate BER is P_b \approx \frac{1}{2} \exp\left(-\frac{E_b}{2N_0}\right). This approximation stems from the envelope detector's output following a non-central for the 'on' symbol and central for the 'off' symbol, with the error probability dominated by false alarms and misses at low SNR. For M-ary coherent ASK, which employs M equally spaced levels, the symbol error rate (SER) provides insight into multi-level performance, with BER approximated as P_b \approx P_s / \log_2 M. The SER is approximately P_s \approx \frac{2(M-1)}{M} Q\left(\sqrt{\frac{3 \log_2 M \cdot E_b}{(M^2 - 1) N_0}}\right), derived from the union bound on pairwise errors between adjacent symbols, where the minimum distance scales as d_{\min} \propto 1/\sqrt{M} relative to the average energy, increasing susceptibility to as M grows. Error probabilities in ASK are influenced by deviations from ideal AWGN assumptions, such as amplitude fluctuations (e.g., due to or multiplicative noise), which reduce the effective SNR and elevate BER beyond theoretical predictions. (ISI) from channel dispersion or imperfect filtering further degrades performance by blurring constellation points, often requiring equalization to mitigate; in severe cases, ISI can double the required SNR for target BER. Simulations and analyses confirm that non-coherent ASK variants generally demand about 3.8 dB higher SNR than coherent BPSK for equivalent BER, while coherent OOK is comparable to coherent FSK at ~3 dB worse than BPSK, owing to reliance on amplitude differences alone.

Advantages and Disadvantages

Amplitude-shift keying (ASK) offers several advantages stemming from its inherent simplicity, making it suitable for applications where cost and ease of implementation are priorities. The modulation technique requires minimal circuitry for both and , often utilizing basic analog components such as envelope detectors for , which reduces design complexity and integration challenges. Binary ASK is also bandwidth-efficient, occupying spectral resources comparable to other binary schemes while supporting straightforward over like optical fibers. Despite these benefits, ASK exhibits significant disadvantages related to its performance in noisy or variable environments. It is highly susceptible to amplitude noise, , and multipath fading, as the signal relies solely on amplitude variations without or frequency diversity for robustness. In on-off keying (OOK), a common ASK variant, efficiency is limited, with average transmitted reaching only about 50% of the peak due to the absence of during the "off" state for equal bit probabilities. Additionally, ASK demonstrates poor at higher data rates compared to advanced schemes like (QAM). These characteristics lead to key trade-offs in ASK deployment, balancing its low-complexity appeal against reduced robustness. For instance, non-coherent OOK typically requires approximately 13.4 Eb/N0 for a BER of 10^{-5}, compared to 9.6 for coherent BPSK and 12.6 for coherent binary FSK. These limitations confine ASK primarily to short-range, low-rate applications, though its power-saving potential endures in constrained devices where simplicity outweighs the need for high reliability. To mitigate BER degradation, ASK systems often incorporate error correction coding, enhancing effective performance without overhauling the modulation core.

Applications

Communication Systems

Amplitude-shift keying (ASK), particularly its on-off keying (OOK) variant, has played a foundational role in (RF) communication systems since the early days of , where operators used simple on-off switching of carrier signals to transmit dots and dashes over long distances. This analog precursor evolved into digital ASK during the mid-20th century as communication needs shifted toward transmission, with early implementations in low-complexity RF links by the for experimental signaling. In modern RF systems, ASK remains integral to short-range and technologies, such as proximity RFID tags operating at 13.56 MHz under the ISO/IEC 14443 standard, where Type A cards employ 100% ASK with Modified coding for efficient reader-to-tag data transfer at rates up to 106 kbps. Its enables low-power implementations, as seen in early protocols that influenced Bluetooth's low-energy modes, though ASK/OOK is favored in cost-sensitive, battery-operated devices for minimal circuitry requirements. Wireless applications continue to leverage ASK/OOK for reliable, low-data-rate transmission in everyday scenarios, including openers and remote keyless entry systems that operate at 315-433 MHz with typically between 1-20 kbps to encode commands like lock/unlock sequences. Automotive key fobs, for instance, use OOK-based ASK at similar frequencies and rates—often around 2-10 kbps—for secure, short-range , prioritizing and efficiency over higher bandwidths. In wireless sensor networks, OOK modulation supports ultra-low-power operation at data rates of 1-100 kbps in sub-GHz bands, enabling applications like where and intermittent transmission are critical. System integration of ASK often occurs at the level within modems for straightforward encoding, or it is combined with spread-spectrum techniques like direct-sequence spreading to enhance resistance in noisy RF environments, as demonstrated in early low-rate digital links. ASK/OOK continues to be used in these 1-100 kbps regimes for economic reasons, underscoring its enduring value in resource-constrained RF designs despite advances in more complex modulations. This longevity stems from ASK's inherent , requiring fewer components than - or phase-based alternatives for basic signaling.

Optical Communications

In optical communications, amplitude-shift keying (ASK) is predominantly implemented through intensity modulation direct detection (IM/DD) schemes, where the of the optical signal from a is modulated to represent data bits. On-off keying (OOK), a of ASK, serves as the standard format, turning the "on" to transmit a logical '1' with full power and "off" or to a low power level for a logical '0', enabling simple direct detection at the receiver using a . This approach leverages the positive nature of optical , avoiding the phase complexities of coherent systems, and is well-suited for short- to medium-haul links where cost and simplicity are prioritized over . ASK finds extensive application in metro and access networks, such as passive optical networks (PONs), where OOK supports high-speed data delivery over fiber. For instance, 10G Ethernet PON systems, including XG-PON standards, employ OOK for downstream and upstream transmission to achieve symmetric or asymmetric 10 Gbps rates across shared fiber infrastructure, serving residential and enterprise broadband. In free-space optical (FSO) systems for satellite links, OOK-based ASK enables high-data-rate inter-satellite or satellite-to-ground communications, benefiting from laser beams' narrow divergence for secure, low-latency connectivity in environments like low Earth orbit networks. Additionally, in data centers, short-reach multimode fiber links utilize OOK for intra-rack connections up to 100 meters, providing cost-effective, low-power alternatives to copper cabling for 10G and 25G Ethernet. For higher capacities, multi-level ASK variants like pulse amplitude modulation-4 (PAM-4), equivalent to 4-ASK, are deployed in optical systems to double the data rate per symbol without requiring coherent detection. PAM-4 encodes two bits per symbol using four levels and is integral to 400G Ethernet standards defined in IEEE 802.3bs, supporting applications in data center interconnects and networks over single-mode fiber up to 10 km via four parallel 100 Gbps lanes. This format achieves greater than 400 Gbps aggregate throughput while maintaining compatibility with IM/DD receivers, facilitating upgrades from legacy 100G systems without full infrastructure overhauls. Despite its advantages, optical ASK faces challenges from chromatic dispersion, which causes inter-symbol interference in high-speed links, and power budget limitations influenced by the extinction ratio—the ratio of '1' to '0' power levels. Dispersion is mitigated through electronic equalization techniques, such as feedforward or decision-feedback equalizers at the receiver, which adaptively compensate for fiber-induced pulse broadening in IM/DD systems operating at 50 Gbps per lambda or higher. To ensure reliable detection, extinction ratios exceeding 10 dB are typically required, optimizing signal contrast and minimizing bit error rates in power-constrained environments like PONs and FSO links. Overall, ASK in its IM/DD form dominates non-coherent optical links, underpinning a substantial portion of access and short-haul traffic in modern networks.

References

  1. [1]
    1.4 Amplitude-shift keying (ASK) | OpenLearn - The Open University
    1.4 Amplitude-shift keying (ASK). In ASK, only the amplitude of the carrier signal is modified in modulation. The simplest version is on–off keying (OOK).
  2. [2]
    Experiment No.12: ASK - Amplitude Shift Keying - NJIT
    PREPARATION. Generation. Amplitude shift keying -ASK -in the context of digital communications is a modulation process which imparts to a sinusoid two or more ...
  3. [3]
    None
    ### Summary of Amplitude Shift Keying (ASK) from https://www.eng.auburn.edu/~roppeth/courses/TIMS-manuals-r5/TIMS%20Experiment%20Manuals/Student_Text/Vol-D1/D1-06.pdf
  4. [4]
    [PDF] ELC 4350: Principles of Communication
    ▷ Basic techniques: 1. Amplitude Modulation (AM) −→ Amplitude Shift Keying. (ASK). 2. Frequency Modulation (FM) −→ Frequency Shift Keying. (FSK). 3. Phase ...<|control11|><|separator|>
  5. [5]
    [PDF] Range Maximization of RFID Tags - University of Washington
    Optimal backscatter modulation indices for amplitude-shift-keying are derived for range maximization of next generation low-power RFID tags. Passive RFID tags ...
  6. [6]
    [PDF] Optical Communication Systems (OPT428) - University Lab Sites
    • Amplitude-shift keying (ASK): modulate A0. • Frequency-shift keying (FSK): modulate ω0. • Phase-shift keying (PSK): modulate φ0. • Polarization-shift keying ...
  7. [7]
    Digital Modulation — Real Time Digital Signal Processing B Term ...
    is changed as a function of the symbol pulse shape. Three common modulation schemes are Amplitude Shift Keying ... applications such as garage door openers.
  8. [8]
    [PDF] Introduction to Digital Modulation
    Nonlinear modulation: when the modulating signal, ν(t), affects the frequency of the modulated signal. The definition of nonlinear is that superposition does ...
  9. [9]
    Digital Modulation — Real Time Digital Signal Processing B Term ...
    Three common modulation schemes are Amplitude Shift Keying (ASK), Phase Shift Keying (PSK) and Frequency Shift Keying (FSK). These schemes directly map a ...
  10. [10]
    NIHF Inductee Reginald Fessenden Invented the AM Radio
    Reginald Fessenden is known for discovering amplitude modulation (AM) radio and explaining its scientific principles. With his heterodyne principle, he put ...
  11. [11]
    Exploring the Evolution and Efficiency of AM Modulation — RDGI
    Apr 25, 2024 · This was accomplished by the crudest method of AM possible: on-off keying or OOK. When the sender pressed down on the telegraph key, it turned ...
  12. [12]
    Radar - WWII, Detection, Technology | Britannica
    Oct 29, 2025 · It was first used in combat early in 1944 on the Anzio beachhead in Italy. Its introduction was timely, since the Germans by that time had ...
  13. [13]
    Digital amplitude modulation (ASK) (Chapter 4)
    This signal type was very popular through the first half of the twentieth century through the use of Morse Code in wireless telegraphy. As commercial ...Missing: 20th | Show results with:20th
  14. [14]
    Fiber-optic transmission and networking: the previous 20 and the ...
    Celebrating the 20th anniversary of Optics Express, this paper reviews the evolution of optical fiber communication systems, and through a look at the ...
  15. [15]
    [PDF] Evolution of Modulation Techniques: From Analog to Digital and ...
    The usual essential keying approach is to key the carrier's amplitude, frequency, and phase. There are three basic digital modulation methods: amplitude shift ...
  16. [16]
    [PDF] Digital Modulation Techniques:Simon,Sklar,Proakis1,Proakis
    Mar 13, 2017 · Amplitude Shift Keying (ASK)or On-Off Keying. Manjunatha. P. (JNNCE) ... [3] J. G. Proakis, Digital communications, 4th ed. Prentice Hall ...
  17. [17]
    [PDF] Implementation of Binary Shift Keying Techniques
    s(t) = A m(t) cos 2∏fct, 0 < t< T where A is a constant, m(t) = 1 or 0, fc is the carrier frequency, and T is the bit duration. Frequency-shift keying (FSK) is ...
  18. [18]
    Digital Signal Modulations with ASK: RF Modulation Schemes Part 3 ...
    Oct 15, 2024 · ASK receiver very simple to implement (diode followed by RC). Limited data rate to few kilobit per second (changing carrier amplitudes requires ...
  19. [19]
    [PDF] Digital Modulation
    Digital Modulation. ▫ On-Off keying (OOK), or amplitude shift keying (ASK). ▫ Phase shift keying (PSK), particularly binary PSK (BPSK). ▫ Frequency shift keying.<|control11|><|separator|>
  20. [20]
    Pulse Shaping in Single-Carrier Communication Systems
    Apr 10, 2008 · The "pulses" are "rectangular" simply because of their geometric shape within the stream, holding a constant amplitude at either the A or B ...
  21. [21]
    Digital Modulation: Amplitude and Frequency - All About Circuits
    Digital Amplitude Modulation. This type of modulation is referred to as amplitude shift keying (ASK). The most basic case is “on-off keying” (OOK), and it ...
  22. [22]
    OOK vs FSK vs ASK: Modulation Techniques Compared
    OOK stands for On-Off Keying. It's essentially a modified version of ASK (Amplitude Shift Keying). While ASK represents logic-0 with a lower amplitude and logic ...
  23. [23]
    I'm OOK. You're OOK? - Analog Devices
    Apr 8, 2009 · This article describes ASK/OOK techniques, and outlines implementations of ASK/OOK receivers using RF power detectors and a few discrete components.Missing: differences | Show results with:differences
  24. [24]
    Normalized average transmitted power of on-off keying (OOK ...
    Its average transmitted power is greater than others, and the peak transmitted power is obviously smaller than that of other modulation schemes. The power ...
  25. [25]
    A mm-Wave On-Off-Keying radio transmitter with 10 GHz bandwidth ...
    The OOK modulation offers significant advantages, including simple hardware structure, compact chip size, and low DC power dissipation compared to more complex ...Missing: average | Show results with:average
  26. [26]
    [PDF] AN1833 - NXP Semiconductors
    A low-cost solution for an OOK (on-off keying) transmitter and receiver in the periodic operation part 15 band from 260 to 470 MHz is described.
  27. [27]
    AMPLITUDE SHIFT KEYING (ASK)
    ASK uses the modulated amplitude of the carrier to represent digital information. On-Off Keying (OOK) is the simplest form of ASK.
  28. [28]
    Sending And Receiving Radio Waves - DONE.LAND
    Mar 16, 2025 · OOK (On-Off-Keying) is the modern name for the basic principle of an early Marconi Morse Code Transmitter, and it is basis of RF remote ...
  29. [29]
    [PDF] Revision of Lecture 3
    • Pure ASK: carrier amplitude is used to carry symbol information. • An example of 4-ASK with constellation diagram and modulation signal set si(t) = Ai cos ...
  30. [30]
    None
    ### Summary of M-ary ASK or Amplitude Modulation from Chapter 7
  31. [31]
    Multilevel amplitude shift keying in dispersion uncompensated ...
    Aug 6, 2025 · The authors model and characterise the performance of 10 Gbit/s 4-ary amplitude shift keying (ASK) systems in dispersive environments at 1550 nm.
  32. [32]
    [PDF] Noncoherent Receivers
    It will be shown in the case of additive white Gaussian noise that the receiver can be implemented using an envelope detector. Next we derive an expression ...Missing: ASK | Show results with:ASK
  33. [33]
    [PDF] Communications II Lecture 7: Performance of digital modulation
    • Noncoherent detection (envelope detection etc.) □ Makes no explicit efforts ... SNR, PSK only has a 3 dB improvement over ASK, and FSK has the same ...
  34. [34]
    Amplitude Shift Keying – ASK - Electronics Coach
    It consists of a signal generator that produces a high-frequency sinusoidal waveform, a message signal in digitized form and a bandpass filter. The switch ...Missing: hardware implementation<|control11|><|separator|>
  35. [35]
    [PDF] Modulation and Detection Techniques for Optical Communication ...
    We consider coherent detection of M-ary phase-shift keying (M-PSK) or M-ary quadrature-amplitude modulation (M-QAM).
  36. [36]
    (a) Block diagram of noncoherent ASK transceiver, and (b ...
    A noncoherent amplitude shift keying (ASK)-based RF-interconnect (RF-I) system design for off-chip communication is analyzed.
  37. [37]
    [PDF] Digital Communications - Spiros Daskalakis Homepage
    ... Digital Communications. Fifth Edition. John G. Proakis. Professor Emeritus ... Modulation Schemes. 95. Chapter 4. Optimum Receivers for AWGN Channels. 160.
  38. [38]
    ASK Modulation: Advantages and Disadvantages | RF Wireless World
    It's used to transmit digital data over optical fiber, and its variant, OOK (On-Off Keying), is used at radio frequencies to transmit Morse code.
  39. [39]
    [PDF] Mobile Computing Lecture 3 Modulation
    known as Shift Keying. Amplitude Shift Keying (ASK):. ○ very simple. ○ low bandwidth requirements. ○ very susceptible to interference. Frequency Shift ...
  40. [40]
    (PDF) Simulation and Implementation of Amplitude-Shift Keying ...
    Among the array of digital modulation methods, Amplitude Shift Keying (ASK) holds a significant position. This study centrally involves the simulation of the ...
  41. [41]
    Theoretical vs. simulated BER vs. SNR for ASK, FSK, and PSK
    Overview of Energy per Bit (Eb / N0) Online Simulator for constellation diagrams of ASK, FSK, and PSK Theory behind Constellation Diagrams of ASK, FSK, ...
  42. [42]
    Internet of Things (IoT) Equipment with ASK/FSK Modulation - Keysight
    ASK/FSK modulation has been widely adopted in low power, low data rate RF communications because it ties low cost, high performance wireless connectivity with ...Missing: advantages | Show results with:advantages
  43. [43]
    Commercial Wireless Telegraphy (1903) - Early Radio History
    By turning this current on and off with an ordinary sending-key its waves would be divided into dots and dashes. To catch these waves an aerial wire was ...
  44. [44]
    [PDF] ISO/IEC 14443 Analog Parameter Comparison and Alignment
    ISO/IEC 14443 standard series defines the 13.56 MHz interface for applications like ... Amplitude Shift Keying (ASK). Implicit. Requirement. NFC-F subcarrier Load ...
  45. [45]
    Decoding Automotive Key Fob Communication based on ASK ...
    Learn how to probe and capture an automotive key fob signal based on ASK modulation, and how to demodulate into digital pulses using InfiniiVision scopes.
  46. [46]
    Characterization of Remote Keyless Entry device
    In general, the data packets consist of from 64 to 256 bits transmitted at from 1 to 20 kilobits per second (kbps). The packets include a preamble, command code ...
  47. [47]
    An ultra-low power OOK RF transceiver for wireless sensor networks
    An ultra-low power On-Off Keying (OOK) RF transceiver using a quasi-Monolithic Microwave Integrated Circuits (quasi-MMICs) method has been designed and ...
  48. [48]
    An Introduction to Spread-Spectrum Communications
    Feb 18, 2003 · This application note is a tutorial overview of spread-spectrum principles. The discussion covers both direct-sequence and fast-hopping methods.
  49. [49]
    Design and Analysis of Enhanced IM/DD System with ... - MDPI
    Modulation schemes for IM/DD-based OWCs can be broadly categorized into On-Off Keying (OOK) [11,12], Pulse Position Modulation (PPM) [5,28], Sequence Inversion ...
  50. [50]
    Optical Communication - an overview | ScienceDirect Topics
    The simplest scheme employs on/off keying (OOK) ... Compared to IM/DD systems, coherent optical communication systems have greater sensitivity and selectivity.
  51. [51]
    Using OOK Modulation for Symmetric 40-Gb/s Long-Reach Time ...
    Feb 22, 2010 · Due to the requirement of broad bandwidth for next-generation access networks, present passive optical networks (PONs) will be upgraded to ...
  52. [52]
    Roadmap to free space optics - Optica Publishing Group
    The most widespread modulation format is known as on–off keying (OOK), where a binary one corresponds to the laser being “on,” and when the laser is “off,” the ...
  53. [53]
    Performance Comparison of OOK, PAM4 and DMT for 50Gb/s ...
    Sep 22, 2022 · In this paper, we experimentally compare the performance of on-off keying (OOK), four-level pulse amplitude modulation (PAM4) and discrete multi
  54. [54]
    [PDF] IEEE P802.3bs 400GbE Baseline Summary
    Jul 18, 2015 · Energy Efficient Ethernet (EEE) for 802.3bs. Arthur Marris - Cadence ... □ Adopt 8x50G PAM-4 WDM duplex SMF architecture for. P802.3bs ...
  55. [55]
    Adaptive Equalization for Dispersion Mitigation in Multi-Channel ...
    Nov 17, 2019 · The simulation results show that the proposed technique plays a key role in dispersion mitigation in multi-channel optical transmission to uphold multi-Gb/s ...
  56. [56]
    [PDF] Measuring Extinction Ratio of Optical Transmitters - HPWiki
    Similar to SDH transmitters, extinction ratio minimums of 8.2 dB to 10 dB are required. IEEE 802.3Z: Defines requirements for Gigabit Ethernet trans- mitters.Missing: ASK | Show results with:ASK