Data rate limitations in PSTN's by using nyquist theorem, Computer Engineering

Assignment Help:

Explain with the help of Nyquist theorem, the data rate limitations in PSTN's.

Data rates in PSTNs: A voice channel in a public switched telephone network is band restricted with a nominal bandwidth of 3.1 kHz. A first-cut estimate of it can be acquired from Nyquist's theorem that applies to noiseless states and channels:

R = 2H log V bps

Where

R = maximum data rate

H = bandwidth of the channel

V = number of discrete levels in the signal

1094_Baud Rates and Bit Rates.png

FIG - Baud Rates and Bit Rates

For a 3-kHz channel and a binary signal, the maximum data rate works out to be 600 bits per second, when the channel is ideal. In the practical channel, the maximum rate would come down. Through increasing the number of levels used to signify the signal, the bit rate may be raised arbitrarily in a noiseless channel. This is significant to recognize that the actual number of signal transitions is even limited to the binary level limit; the effectual bit rate goes up with more than two signal levels when each signal level can represent a group of two or more bits. Now, the maximum rate of signal transitions which can be supported by a channel is termed as baud rate or symbol rate. In a channel, there is an absolute maximum limit for the bit rate where noise is present. This limit occurs since the difference MONG two signal levels becomes comparable to the noise level while the number of signal level is raised.

Claude Shannon, who was extend Nyquist's works to the case of noisy channels influenced by thermal or random noise. Result states of Shannon:

R = H log (1+S/N)

Here R= the maximum bit rate obtainable

H= bandwidth of the channel

S/N = signal to noise ratio.


Related Discussions:- Data rate limitations in PSTN's by using nyquist theorem

Analysts in various functional areas, Q. Analysts in various functional are...

Q. Analysts in various functional areas? Today systems analyst's job presents a exciting and fascinating challenge. It provides high management visibility and opportunities for

What are simm and dimm, What are SIMM and DIMM? SIMM are Single In-Line...

What are SIMM and DIMM? SIMM are Single In-Line Memory Module. DIMM is Dual In-Line Memory Modules. Such modules are an assembly of various memory chips on a separate small boa

Explain tri-state logic inverter, Explain Tri-state logic inverter with the...

Explain Tri-state logic inverter with the help of a circuit diagram. Give its Truth Table. Ans: Tri-state Logic Inverter: The functional diagram of Tri-state Logic Inve

Sap security audit log, You are required to use software of your choice (sp...

You are required to use software of your choice (spreadsheet, database, statistical package etc) to analyze the provided SAP security audit log data ( Userdata.xls ), generate appr

Illustrate some notations of object modeling notations, Illustrate some not...

Illustrate some notations of object modeling notations A classifier is a mechanism which describes behavioural and structural features. In UML significant classifiers are cla

What is set screen, SET SCREEN With SET SCREEN the present screen simpl...

SET SCREEN With SET SCREEN the present screen simply specifies the next screen in the chain , control branches to this next screen  as soon as the current screen has been proce

Human computer interaction, Preamble The owner of the local shopping mal...

Preamble The owner of the local shopping mall, MaxiMart, has contracted you to assist in the design of an interactive directory. The interactive directory is to be permanently l

Prove boolean identities using boolean algebra, Prove the following Boolean...

Prove the following Boolean identities using the laws of Boolean algebra: ABC + AB ‾C + ABC ‾ = A(B + C) Ans. ABC+AB'C+ABC'=A(B + C) LHS AC(B+B')+AB(C+C') OR  AC+AB OR  A(B

Differences between a uri, Question: (a) Describe the differences betwe...

Question: (a) Describe the differences between a URI, a URN and a URL. (b) What are the five basic syntax rules for a well-formed XML document? (c) Provide four uses of

Explain the violating basic security principles, Explain the violating basi...

Explain the violating basic security principles There are drawbacks to permitting users to access the Intranet as well as not permitting them. A simple consideration such as a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd