answersLogoWhite

0


Best Answer

Grab a seat and we'll kick it about PSK. PSK is phase shift keying. It's a modulation scheme, a way to put digital information onto a carrier wave. Let's do a quickie review and then go right to the answer. Ready? Let's jump. Let's say we need to send a digital signal. Our signal, the digital string, is just a series of "on's" and "off's" that isn't much different from something like, say, Morse Code. The telegraph code could be looked at as a binary code. It's just short and long pulses, not unlike our binary on's and off's in the digital domain. So how do we get that information onto a carrier wave? One way is to shift the phase of the carrier signal to modulate it, to add our signal to it. Let's look at the carrier wave. We have a carrier humming along at (probably) some microwave frequency. If we want to send an 'on' bit, we slow down the carrier just a tad, and for a tiny interval of time. If we want to send an 'off' bit, we speed the carrier up just a tad for a tiny interval of time. The slowing down or speeding up of the carrier in PSK is the keying. Wouldn't it be nice to know what effect this has on the other end of the transmission? Let's look. On the receiving end, we generate the original carrier frequency (our "beat" frequency), and then we "beat it against" the incoming signal. (Our generated signal in the receiver is held tightly "dead on" the carrier frequency.) When we beat the two signals together, if they are the same frequency, there is no "differential" signal generated. If the transmitter is slowing the carrier down a tad or speeding it up a tad, our detectors in the receiver will "see" the difference between the incoming signal and the signal that the receiver is beating against it. The differences are logged as on's and off's by the receiver, and the digital data is then reassembled to recreate the original pulse string. Piece of cake. Oh, and got a link for ya.

User Avatar

Wiki User

16y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What does the term keying mean in PSK?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What does the acronym 'BPSK' mean?

The acronym "BPSK" stands for burst pulse shift keying. Burst pulse shift keying is the simplest form of phase shift keying or PSK known currently to exist.


Advantages of psk over fsk and ask?

PSK (Phase Shift Keying) is advantageous over FSK (Frequency Shift Keying) and ASK (Amplitude Shift Keying) because it provides higher data rates and better spectral efficiency. PSK is less susceptible to noise and interference since phase changes are more discernible than frequency or amplitude changes. PSK also allows for easier implementation in digital communication systems.


How do we design binary phase shift keying modulator with detail circuit?

circuit of modulation PSK


What is the advantage of dpsk over psk?

DPSK (Differential Phase Shift Keying) is more robust against phase fluctuations during transmission compared to PSK (Phase Shift Keying). It eliminates the need for a phase reference, making it more suitable for noisy channels. Additionally, DPSK can provide better error performance in certain scenarios compared to PSK.


What is QPSK?

QPSK = Quadrature Phase Shift Keying In QPSK amplitude are not much.so the carrier is constant. transmission rate is higher when compared with PSK


Which type of modulation is used in TV transmission?

In television system for video transmission AM is used and for audio transmission FM is used....


Does the term WYSIWYG helps you save the most rime when keying a document?

The term WYSIWYG helps you to save most of the time when keying in a document.


Does the term WYSIWYG saves you the most time when keying a document?

WYSIWYG helps you save most of your when keying in a document.


What is psk?

See the related link below.


Which modulation technique is used in gsm?

GSM uses GMSK modulation scheme. GPRS also uses GMSK modulation scheme. EDGE and UMTS uses 8-PSK.


Compear fsk and psk?

fsk and psk


What is the name given to the person who leads a Bar Mitvah?

Steve,Unfortunately attacking WPA-PSK doesn't reqriue any kind of Evil-Twin or MITM (or any kind of ARP hijinks) if you have the PSK. All you have to do is capture the 4-way handshake for a session, and with the PSK in hand, derive the same PTK to decrypt traffic.The PTK is derived from the PMK (basically a derivation of the PSK) and a pair of nonces generated by the client station and the access point. These nonces are exchanged in the clear.And with that same lack of authentication you mention, an attacker can issue a deassociation packet forcing any arbitrary client to perform a 4-way handshake at will.To be completely clear: The PSK is the *only* secret in WPA-PSK, and anyone who has the PSK and is monitoring traffic can decrypt all of the traffic.I'm not completely sure why WPA-PSK doesn't use a DH key exchange for the PTK. Probably because the protocol isn't designed to be secure against people possessing the keying material. But it just doesn't.Regards,Sam