Data rate limitations in PSTN's by using nyquist theorem, Computer Engineering

Assignment Help:

Explain with the help of Nyquist theorem, the data rate limitations in PSTN's.

Data rates in PSTNs: A voice channel in a public switched telephone network is band restricted with a nominal bandwidth of 3.1 kHz. A first-cut estimate of it can be acquired from Nyquist's theorem that applies to noiseless states and channels:

R = 2H log V bps

Where

R = maximum data rate

H = bandwidth of the channel

V = number of discrete levels in the signal

1094_Baud Rates and Bit Rates.png

FIG - Baud Rates and Bit Rates

For a 3-kHz channel and a binary signal, the maximum data rate works out to be 600 bits per second, when the channel is ideal. In the practical channel, the maximum rate would come down. Through increasing the number of levels used to signify the signal, the bit rate may be raised arbitrarily in a noiseless channel. This is significant to recognize that the actual number of signal transitions is even limited to the binary level limit; the effectual bit rate goes up with more than two signal levels when each signal level can represent a group of two or more bits. Now, the maximum rate of signal transitions which can be supported by a channel is termed as baud rate or symbol rate. In a channel, there is an absolute maximum limit for the bit rate where noise is present. This limit occurs since the difference MONG two signal levels becomes comparable to the noise level while the number of signal level is raised.

Claude Shannon, who was extend Nyquist's works to the case of noisy channels influenced by thermal or random noise. Result states of Shannon:

R = H log (1+S/N)

Here R= the maximum bit rate obtainable

H= bandwidth of the channel

S/N = signal to noise ratio.


Related Discussions:- Data rate limitations in PSTN's by using nyquist theorem

How numbering plan is achieved in modern telephony, How numbering plan is a...

How numbering plan is achieved in modern telephony? Give the structure with example. The objective of numbering plan is to uniquely identify every subscriber connected to a tel

What is telnet explain, Q. What is Telnet explain? TELNET stands for TE...

Q. What is Telnet explain? TELNET stands for TErminal NETwork. Telnet is both a protocol for connecting a local computer to a remote computer and a TCP/IP application. Telnet i

Define the system users, Q. Define the System users? System users are d...

Q. Define the System users? System users are defined as the people who employ information systems or who are affected by information system on a regular basis i.e. validating,

What is sisd, What is SISD?  Single Instruction stream, Single Data str...

What is SISD?  Single Instruction stream, Single Data stream (SISD) shows the organization of a single computer having a control unit, a processor unit, and a memory unit. Inst

Explain about RISC architecture, Q. Explain about RISC ARCHITECTURE? Le...

Q. Explain about RISC ARCHITECTURE? Let's first list some significant considerations of RISC architecture: 1. RISC functions are kept simple unless there is a very good reas

Software engineering, assignment on transaction flow, transform flow, trans...

assignment on transaction flow, transform flow, transform mapping: refining the architectural design

Identify the process of entering data into a ROM, The process of entering d...

The process of entering data into a ROM is called ? Ans. The process of entering data in ROM is termed as programming the ROM.

What are the different sections of a report, What are the different section...

What are the different sections of a report? A report is categorized into many sections: The Report header: In this you place a control which must appear only at the startin

Describe the instruction set architecture, Q. Describe the instruction set ...

Q. Describe the instruction set architecture? The significant role of the Central Processing Unit (CPU) is to perform calculations, to coordinate all other hardware components,

How do you add a developer to a trusted publishers list, Whenever a develop...

Whenever a developer is signing into the code project you will have three options they are disable the macro, enable the macro and explicitly trusting the publisher. You can trust

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd