Campus ID News
Card, mobile credential, payment and security
FEATURED
PARTNERS
slider contactless card 1

Modulation: Carrying data on radio waves

CampusIDNews Staff   ||   Mar 01, 2003  ||   ,

A revised version of this article was printed in a later issue of Contactless News. Click here to read the updated version.

Last month we started at the beginning of the RFID lesson plan, reviewing the fundamental concept of frequency. We learned that frequency is the number of cycles or ‘waves' per second and that it is measured in hertz (Hz).

While one hertz equals one wave per second, radio waves tend to cycle extremely rapidly. In contactless ID applications, frequencies are measured in units of 1000 (kilohertz–kHz) or one million (megahertz-MHz). And we found that it is the ability of transmitters and receivers to tune into certain frequencies while tuning out others that enable systems to function. For example, this tuning enables a contactless card system to ‘see' the 13.56 MHz frequency while ignoring the 54 MHz television signal, the 824 MHz cellular phone signal, the 2.4 gigahertz (GHz) wireless LAN signal, and countless other frequencies that flow through the air at any point in time.

With this understanding of radio waves and frequency, we will now progress to a discussion of modulation–the process by which meaningful data is transmitted using radio waves.

In essence, data is ‘carried' on radio waves. Imagine that the radio waves are a conveyor belt. The belt moves on a steady pace never stopping, never varying. At each end of the belt sits a person, one called a transmitter and one called a receiver. Periodically, the transmitter places a box on the conveyor and it moves down the belt until it reaches the receiver. The transmitter has used the conveyor belt to send the box to the receiver. Much like a transmitter uses radio waves to send data to a receiver.

Obviously, we can't place a box on radio waves. So how is it that data is carried through the air? It is by modulating or changing some of the radio waves in a very specific manner. In fact, this is a pretty good working definition for modulation–the changing of radio waves in a specific manner in order to represent data.

As we know, data–whether it is alphanumeric, audio, video, or other–can be represented digitally as a series of ones and zeros. This is called binary data and it is the basis of all digital communication. RF uses binary data to encode and transmit data via radio waves. Rather than zeros and ones, think of it as altered and non-altered radio waves. To transmit a number, we use a specific combination of altered and non-altered radio waves to ‘code' the number in a manner that is meaningful to the receiver.

There are three basic ways in which radio waves are altered or modulated in RF communication. They are amplitude modulation (AM), frequency modulation (FM), and phase modulation (PM). Sound familiar? AM and FM have become household names because of their use in the audio radio bands. PM is lesser known but used in many new RF systems.

Amplitude modulation

Modulating amplitude refers to the process of altering the height of the radio waves. This is the original type of modulation which explains why AM is the oldest type of radio broadcast. As you can see in Figure 1, the frequency of the waves does not vary in the amplitude modulation, only the height of the waves. Amplitude modulation is the most common form of modulation used in RFID and is used in both the ISO 14443 and ISO 15693 specifications for reader to card communication.

Frequency modulation
Modulating the actual frequency of the radio waves is key to the process of frequency modulation. It is the changes in frequency that signify the zeros and ones in the binary communication. As you can see in Figure 2, the amplitude of the waves does not vary but their frequency does.

Phase modulation

Modulating the phase of the radio waves can be thought of as bouncing the waves off of a mirror at a specific point in time–in essence, changing their up and down pattern to a down and up pattern and so on. It is the pattern of these phase changes that is used to signify the zeros and ones in the binary data during phase modulation. As you will notice in Figure 3, neither the amplitude nor the frequency of the radio waves changes–only the phase or direction of the waves.

Shift Keying

Frequently, you will see modulation in RFID systems referred to as shift keying. The common terms are amplitude shift keying (ASK), frequency shift keying (FSK), or phase shift keying (PSK). Both ISO 14443 and ISO 15693 standards utilize ASK for modulation. Think of shift keying as the representation of data in the ‘shifting' between states. In ASK, the waves are shifting between amplitude states or heights; in FSK, the waves are shifting between frequencies; and in PSK they are shifting between phases.

So to summarize: Modulation is the process of altering the carrier waves in a specific manner to signify meaningful data. Data is coded using binary zeros and ones that are represented through changes in the waves. These changes can be to the waves amplitude, frequency, or phase. Now you have the basics of modulation in hand. In the next installment of RFID 101, we will investigate the concept of Coding–the manner in which data is represented via modulation.

Subscribe to our weekly newsletter

RECENT ARTICLES

Chef with food in AI scanner
Apr 02, 26 /

Measuring for a greener future: Why data is the cure for campus food waste

April 29 marks Stop Food Waste Day, a global movement that highlights a simple but powerful truth: what gets measured gets reduced. For campus leaders, this day serves as more than an environmental reminder. It is a strategic call to address the "data gap" in auxiliary services. While universities have digitized almost every other facet […]
sia corporate credential design guide cover art

Security Industry Association releases comprehensive guide to secure credential issuance

The Security Industry Association (SIA) released its Corporate Credential Design Guide, a new resource produced by their Credential Design Working Group. It specifies recommended practices for the design and implementation of credentials and badges by card issuers and security teams. Though the document is geared toward corporate issuers, it is also highly relevant and beneficial […]
Senator Roem supporting Virginia hunger free campus meal swipe bill
Mar 26, 26 /

Virginia lawmakers table statewide campus meal swipe donation mandate for now

The bill that would enable students at virtually all Virginia universities to donate their unused meal plan credits fell just short of passing this year. State lawmakers voted to continue debating the proposal – supported by the nonprofit Swipe Out Hunger organization – in the 2027 session. The bill was introduced by Senate Democrat Danica Roem […]
CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Twitter

Great inverview on the Public Key Open Credential (PKOC) standard with ELATEC's Jason Ouellette, Chairman of the Board for the @PSIAlliance.

Attn: friends in the biometrics space. Nominations close Friday for the annual Women in Biometrics Awards. Take five minutes to recognize a colleague or even yourself. http://WomenInBiometrics.com

Load More...
Contact
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301
www.AVISIAN.com[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2026 CampusIDNews. All rights reserved.