Explain frequency division multiplexing, Computer Engineering

Assignment Help:

Explain FDM and show how CCITT standards help in building the base band?

Frequency Division Multiplexing: This is the process of combining some information channels through shifting their signals to various frequency groups in the spectrum therefore they can be transmitted simultaneously over common transmission service.

The bandwidth of a telephone speech signal is quite less than 4 kHz. Where, the available bandwidth on unloaded cables pair is fine above 100 kHz. Therefore this is possible, by using modulation techniques, for divide up the cable bandwidth then a number of telephone speech paths can be carried at the same time along a single cable pair. The normal arrangement contains 24 telephone channels per cable pair, the modulation in 24 channels being carried out within the two stages. In the primary stage, 12 channels are multiplexed together to form that is commonly termed as a basic group. This basic group arrangement is demonstrated in figure. Each of the 12 telephone signals are single side-band amplitude modulated on to carriers spaced at 4 kHz intervals 64 kHz to 108 kHz. The lower side-band (LSB) is utilized in every case. The 12 base-band signals are thus translated in the frequency band from 60 kHz 108 kHz as demonstrated. The block diagram for the channel translating equipment is specified in figure. To form a 24-channel system, to basic groups are occupied together. One basic group (B) is transmitted directly as this stands. Another basic group (A) is amplitude modulated on to a carrier are 120 kHz and the lower side-band is occupied such as to take the frequency range from 12 kHz to 60 kHz as demonstrated in figure. by using two stages of modulation for basic group A, this is possible to decrease the physical size of the component needed for the LSB filters of the figure, because the lowest cut- off frequency needed is at 64 kHz quite than 12 kHz when the whole block of 24 channels were assembled together in one stage of modulation.

855_Basic Group Arrangement.png

FIG - Basic Group Arrangement

1635_Channel Translating Equipment.png

FIG - Channel Translating Equipment


Related Discussions:- Explain frequency division multiplexing

List the various file attributes, List the various file attributes. A f...

List the various file attributes. A file has certain other attributes, which differ from one operating system to another, but typically consist of these: Name, identifier, type

Artificial neural networks, Artificial Neural Networks: However imagin...

Artificial Neural Networks: However imagine now in this example as the inputs to our function were arrays of pixels and there actually taken from photographs of vehicles such

Mathematical theorems, Proving ( or disproving) mathematical theorems are ...

Proving ( or disproving) mathematical theorems are an intensive intellectual task. This is because it requires deductions from hypotheses and also involves judgment. This judgm

Explain indirect cycle in control unit, Q. Explain Indirect Cycle in contro...

Q. Explain Indirect Cycle in control unit? Once an instruction is fetched the subsequent step is to fetch the operands. The instruction may have indirect and direct addressing

What is a work process, What is a work process? A work process is where ...

What is a work process? A work process is where individual dialog steps are in fact processed and the work is done.  Every work process ocuurs one type of request.

Animation for project, Final Animation This is the final piece of work ...

Final Animation This is the final piece of work that should stand on its own as a piece of Art or Design. This is your personal response to the idea of Transformation - The pro

Illustrate the examples of simulations, Illustrate the Examples of simulati...

Illustrate the Examples of simulations -  Training (for example pilots, drivers, etc.) -  Running/testing nuclear plants and chemical plants -  trying out equipment to be

Explain the technique used in asymmetric key cryptography, Explain the tech...

Explain the technique used in the asymmetric Key Cryptography. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound

Slope deflection equations, Slope Deflection Equations for a Member: I...

Slope Deflection Equations for a Member: In this section, we will develop a few general equations needed for further discussion in the moment distribution context. Fig

Explain direct memory access, Explain Direct Memory Access. A modest en...

Explain Direct Memory Access. A modest enhances in hardware enables an IO device to transfer a block of information to or from memory without CPU intervention. This task needs

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd