Definition

# phase-shift keying (PSK)

Phase-shift keying (PSK) is a method of digital communication in which the phase of a transmitted signal is varied to convey information. There are several methods that can be used to accomplish PSK.

The simplest PSK technique is called binary phase-shift keying (BPSK). It uses two opposite signal phases (0 and 180 degrees). The digital signal is broken up timewise into individual bits (binary digits). The state of each bit is determined according to the state of the preceding bit. If the phase of the wave does not change, then the signal state stays the same (0 or 1). If the phase of the wave changes by 180 degrees -- that is, if the phase reverses -- then the signal state changes (from 0 to 1, or from 1 to 0). Because there are two possible wave phases, BPSK is sometimes called biphase modulation.

More sophisticated forms of PSK exist. In In m-ary or multiple phase-shift keying (MPSK), there are more than two phases, usually four (0, +90, -90, and 180 degrees) or eight (0, +45, -45, +90, -90, +135, -135, and 180 degrees). If there are four phases (m = 4), the MPSK mode is called quadrature phase-shift keying or quaternary phase-shift keying (QPSK), and each phase shift represents two signal elements. If there are eight phases (m = 8), the MPSK mode is known as octal phase-shift keying (OPSK), and each phase shift represents three signal elements. In MPSK, data can be transmitted at a faster rate, relative to the number of phase changes per unit time, than is the case in BPSK.

Amateur-radio operators use a special form of BPSK or QPSK known as PSK31. In this mode, the data transmission rate is 31.25 baud (state changes per second), and the signal bandwidth is approximately 31 Hz. The main advantage of PSK31 is its excellent signal-to-noise ratio (S/N or SNR), which allows communication under adverse conditions such as severe fading, noise, or interference where other communications modes fail.

This was last updated in September 2005

## SearchUnifiedCommunications

• ### Microsoft's Nuance buy enriches call center, security products

Analysts expect Microsoft to integrate Nuance voice technology with a wide range of Microsoft products, including Teams and ...

• ### Microsoft update of Teams Rooms for Android falls short

Microsoft has yet to add to Teams Rooms on Android critical features available on the Windows version. Missing features include ...

• ### 5 steps to managing team collaboration apps

Team collaboration apps offer measurable productivity and cost benefits. Follow these five steps to address technical, security ...

## SearchMobileComputing

• ### Chip shortage driving up PC prices, wait times

Businesses pay more for PCs and find it difficult to replace aging ones as the ongoing chip shortage leaves computer makers ...

• ### AR use cases gain ground due to COVID-19, maturing tech

AR technology is growing beyond technical instruction, helped by work-from-home mandates and maturing technology.

• ### Samsung introduces its cheapest A Series 5G phone yet

The Korean smartphone maker announced five additions to its midtier Galaxy A Series, including the A02s, A12, and three 5G phones...

## SearchDataCenter

• ### Programmable processor technology for next-gen data centers

The right processing technology can benefit your data center. Learn about advancements in CPU technologies, recent vendor ...

• ### Data processing units accelerate infrastructure performance

DPUs often run on networking packets to move information in the data center, instead of supporting processing workflows. Get an ...

• ### New Intel Ice Lake processors boost performance, security

Intel launches third-generation Xeon Scalable processors that bolster security, accelerate common data center workloads by 46% on...

## SearchITChannel

• ### IT industry's lack of diversity remains key issue in 2021

The first quarter of 2021 saw almost no changes in the composition of IT leadership teams. Here's how channel partners can change...

• ### How MSPs can build a post-merger integration team

Combining two companies is a complex undertaking, spanning employees, operations and line-of-business applications. An ...

• ### 3 basic cybersecurity measures to protect MSP businesses

Numerous MSP-targeted cyberattacks have driven home the need for improved internal security practices. Here's how MSPs can secure...

Close