Data rate limitations in PSTN's by using nyquist theorem, Computer Engineering

Assignment Help:

Explain with the help of Nyquist theorem, the data rate limitations in PSTN's.

Data rates in PSTNs: A voice channel in a public switched telephone network is band restricted with a nominal bandwidth of 3.1 kHz. A first-cut estimate of it can be acquired from Nyquist's theorem that applies to noiseless states and channels:

R = 2H log V bps

Where

R = maximum data rate

H = bandwidth of the channel

V = number of discrete levels in the signal

1094_Baud Rates and Bit Rates.png

FIG - Baud Rates and Bit Rates

For a 3-kHz channel and a binary signal, the maximum data rate works out to be 600 bits per second, when the channel is ideal. In the practical channel, the maximum rate would come down. Through increasing the number of levels used to signify the signal, the bit rate may be raised arbitrarily in a noiseless channel. This is significant to recognize that the actual number of signal transitions is even limited to the binary level limit; the effectual bit rate goes up with more than two signal levels when each signal level can represent a group of two or more bits. Now, the maximum rate of signal transitions which can be supported by a channel is termed as baud rate or symbol rate. In a channel, there is an absolute maximum limit for the bit rate where noise is present. This limit occurs since the difference MONG two signal levels becomes comparable to the noise level while the number of signal level is raised.

Claude Shannon, who was extend Nyquist's works to the case of noisy channels influenced by thermal or random noise. Result states of Shannon:

R = H log (1+S/N)

Here R= the maximum bit rate obtainable

H= bandwidth of the channel

S/N = signal to noise ratio.


Related Discussions:- Data rate limitations in PSTN's by using nyquist theorem

Difference between aggregation and association, Difference between aggregat...

Difference between aggregation and association Aggregation is a particular form of association, not an independent concept. Aggregation acts semantic connotations. If two objec

Describe the bespoke versus off-the-shelf software, Bespoke versus off-the-...

Bespoke versus off-the-shelf software Generally software packages are bought off-the-shelf. Though, certain applications (generally for industrial companies, commercial busines

What is write miss, What is write miss? During the write operation if t...

What is write miss? During the write operation if the addressed word is not in cache then said to be write miss.

What are the general security issues, What are the General Security Issues ...

What are the General Security Issues Many issues exist when linking a computer system to the Internet or indeed to an external link via a network set up. There are numerous way

What are delay systems in telecommunication networks, What are delay system...

What are delay systems in telecommunication networks? Delay System: A class of telecommunication networks like data a network that places the call or message arrivals in a qu

Simulate a worm propagation considering traffic delay, At time t when an in...

At time t when an infected machine scans and finds a vulnerable machine, the vulnerable one will be compromised and start to scan and infect others at time t+X, where X is a r.v. f

Explain working of bit serial associative processor, Q. Explain working of ...

Q. Explain working of Bit Serial Associative Processor? When associative processor accepts bit serial memory organization subsequently it is known as bit serial associative pr

Explain bitwise-and operator, Bitwise-AND Operator: & AND-expression : ...

Bitwise-AND Operator: & AND-expression : relational-expression AND-expression & equality-expression The bitwise-AND operator (&) compares each bit of its first operand t

Listening sockets, a) What command do you use to list all listening sockets...

a) What command do you use to list all listening sockets? The output should also contain the name of the program to which the socket belongs.   b) Write the command to use to

Enumerate data structures used during 1-pass of assembler, Enumerate the da...

Enumerate the data structures used during the first pass of the assembler. Indicate the fields of these data structures and their purpose/usage. Three main data structures used

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd