Features of fdm - fundamentals of networks, Computer Networking

Features of FDM

1.The FDM channel carries  only  one phone  circuit  at a time.

2.If an FDM channel is not in sue then  it is  sits idle and cannot be   used by  other users  to increase of share capacity. It is essentially a wasted resources.

3.After the assignment of a frequency  channel  to user transmission is continuous.

4. The bandwidth of FDM channels are relatively  narrow as each channel supports only  one circuit per carrier. That  is FDM is usually  implemented in narrow  band  systems.

5.The  symbol time of a narrow ban signal is larger as compared to the average delay spread. This  implies that the  amount  of inter symbol  interference is low  and thus  little or no equalization is  required in FDM narrow  band systems.

6.The complexity of FDM systems is lower when compared to TDM system though this  is changing as digital signal processing methods improve for TDM.

7.Since FDM is a continuous transmission  scheme fewer bits are needed for  overhead purpose (such a synchronization and farm in gbits0 as  compared to TDM.

8.FDM system  have  higher  systems costs  as compared to TDM systems because of  single  channel  per carried  designed  and the need to use costly band pass filters to eliminate spurious radiation at the base station.

9.FDM requires tight  RF flitting to  minimize  adjacent channel interference.

 

 

 

Posted Date: 3/2/2013 5:33:02 AM | Location : United States







Related Discussions:- Features of fdm - fundamentals of networks, Assignment Help, Ask Question on Features of fdm - fundamentals of networks, Get Answer, Expert's Help, Features of fdm - fundamentals of networks Discussions

Write discussion on Features of fdm - fundamentals of networks
Your posts are moderated
Related Questions
Processor Arrangements It is a very frequent event in data parallel programming to group a number of processors to perform definite tasks. To reach this goal, HPF gives a direc

What is anonymous FTP? Anonymous FTP is a way of granting user access to files in public servers. Users that are permitted access to data in these servers do not require identi

Describe how EIGRP finds its successor and feasible successor?

How can the use of NAT and PAT, be considered a security mechanism? Research the acronym(s) if it is not a part of your collection.

Dijkstra Algorithms To calculate its  routing  table  each router applies an algorithm  called  the dijkstra algorithm to its  state database. The dijkstra algorithm  calculate

Q. Describe Differential Manchester? - Inversion at middle of bit interval is utilized for synchronization - Presence or else absence of additional transition at beginning o

QUESTION a) National regulations require the availability of the following services for all IP to PSTN, PSTN to IP, and IP to IP calls. Name any three types of these features

Network Problems Q1  Consider the single-sender CDMA example in Kurose & Ross. What would be the sender's output (for the 2 data bits shown), if the sender's CDMA code were (

Fat tree: It is a customized version of tree network. In this network bandwidth of edge (or connecting wire between nodes) increases in the direction of root. It's a more realisti

A communications channel is pathways over which information can be communicate. It may be described by a physical wire that connects communicating devices, or by a radio, laser, or