Notes for EECS 120, Sp 2002

Total Page:16

File Type:pdf, Size:1020Kb

Notes for EECS 120, Sp 2002 Notes for EECS 120, Sp 2002 Pravin Varaiya January 27, 2002 Chapter 1 Communication system Transmitter Receiver m x x y m power T R ym y modulator channel amplifier demodulator amplifier received source carrier modulated transmitted received baseband baseband signal, signal signal signal signal signal 2πω t e c channel ω |M(ω)| |XT( )| ω ω −ω ω c c Figure 1.1: Basic components of a communication system. Figure 1.1 indicates the basic components of a communication system. The source signal m ∈ ContSignals is a baseband signal. The modulator transforms this signal into the signal xm ∈ ContSignals whose frequency spectrum is centered around the carrier frequency ωc rad/sec. The power amplifier boosts the amplitude of xm to a level sufficient for transmission. The transmitted signal xT propagates through the channel. The output of the channel is the received signal yR. The receiver amplifies this signal to ym. The demodulator processes it and the final received signal is y. A well-designed communication system should have y ≈ m. The FCC assigns a particular part of the electromagnetic spectrum—called a channel—to each station. The modulator transforms the baseband signal x into the signal xm whose spectrum Xm fits inside the station’s channel, as shown in the lower part of the figure. For example, the AM station KCBS is assigned the 10 kHz-wide channel, 740 ± 5 kHz, while the FM station KQED is assigned the 200 kHz-wide channel 88.5 ± 0.1 MHz. KRON TV is assigned the 6 MHz-wide channel, 66-72 MHz, called channel # 4. 3 4 CHAPTER 1. COMMUNICATION SYSTEM The FCC also assigns a portion of the spectrum to each cellphone company, e.g., Cingular, Verizon, ATT wireless. That spectrum is shared by the carrier’s subscribers when they make a call. 1.1 Radio, TV and cellular phones The FCC imposes standards on AM and FM broadcast radio, and broadcast TV. AM channels are 10 kHz wide, FM channels are 200 kHz wide, broadcast TV channels are 6 MHz wide. Some features of the standards are shown in Tables 1.1 and 1.2. The oldest cellular telephone system is AMPS, described in Table 1.3. In the AMPS system, the carrier uses a modulation scheme to divide its assigned spectrum among a number of 30 kHz-wide channels. A voice connection between a mobile and the base station occupies two 30 kHz channels, one for uplink, the other for downlink. The voice signal is modulated at the mobile and at the base station so that the modulated signal fits in the assigned channel. Digital control channels are used by the mobile to request the base station for a voice channel and by the base station to assign a voice channel. The voice signal in AMPS is analog. Newer cellular systems digitize voice, and the voice channels are narrower than 30 kHz. As a result, newer systems can carry a larger number of voice calls in the same spectrum as the AMPS system. One says that the newer systems have greater spectral efficiency than AMPS. Appendix 1 is a chart that shows the FCC’s allocation of the radio spectrum (3 kHz–300 GHz) to different uses. The chart in Appendix 2 focuses on wireless radio. Appendix 3 is a primer on the electromagnetic spectrum. Appendix 4 is a brief history of the telegraph and broadcast media. 1.1. RADIO, TV AND CELLULAR PHONES 5 Item Description Assigned frequency, fc In 10-kHz increments from 540 to 1700 kHz Channel bandwidth 10 kHz Carrier frequency stability ±20 Hz % modulation Maintain 85-95%; max: 100% neg; 125% pos Noise and carrier hum At least 45 db below 100% modulation in the band 30 Hz to 20 Hz Max power licensed 50 kW Table 1.1: FCC restrictions on AM broadcast radio. Item Description Assigned frequency, fc In 200-kHz increments from 88.1 MHz to 107.9 MHz Channel bandwidth 200 kHz Carrier frequency stability ±200 Hz 100% modulation ∆F =75kHz Modulation index 5 (∆F =75kHz,B = 200kHz) FM noise At least 60 db below 100% modulation at 400 Hz Max power licensed 100 kW Table 1.2: FCC restrictions on FM broadcast radio. Item Description Channel bandwidth 6 MHz Visual carrier frequency 1.25 MHz ±1000 Hz above lower boundary of channel Aural carrier frequency 4.5 MHz ±1000 Hz above visual carrier Chrominance subcarrier fre- 3.579545 MHz ±10 Hz quency Aspect ratio (width-to-height) 4:3 Modulation visual AM with negative polarity, i.e. decrease in light level causes increases in amplitude Aural modulation FM with 100% modulation being ∆F =25kHz. Table 1.3: FCC restrictions on broadcast TV. 6 CHAPTER 1. COMMUNICATION SYSTEM Item Description Base station transmit bands 869–896 MHz Mobile transmit bands 824–851 Mobile max power 3 Watts Channel bandwidth 30 kHz Voice modulation FM, 12-kHz peak deviation Control channel FSK, 8-kHz peak deviation, 10 kbps Table 1.4: AMPS cellular telephone. 1.2 Channel models The transmitted signal xT is an electromagnetic wave, which propagates or travels through the channel at the speed of light. The received signal is xR. See figure 1.1. A channel has three forms of propagation media, free space, copper, and optical fiber (glass): • Broadcast signals (radio, TV, cellphone) are transmitted freely through space; • Point-to-point transmission is over copper (twisted pair local loop or CATV coax cable) or optical fiber (high-speed Ethernet or long-distance telephony) As the signal propagates through a channel, it degrades through attenuation, dispersion, noise. Attenuation xT yR channel transmit receive power power p pT R Figure 1.2: The signal is attenuated as it propagates through the channel In free space the attenuation is PR c 2 = GT ( ) GR, (1.1) PT 4πfd 5 where GT ,GR are the transmit and receive antenna gains, c =3× 10 km/s is the speed of light, d km is the distance between transmitter and receiver, and f Hz is the carrier frequency. It is standard in communications and control to express power and attenuation in db (decibels). (P Watts equals 10 log10 P db.) So, taking GT = GR =1for illustration, the free space attenuation is 5 PR 3 × 10 10 log10 =20log10 . (1.2) PT 4πfd 1.2. CHANNEL MODELS 7 Thus attenuation gets worse as f and d increase. A ten-fold increase in f or d decreases attenuation by 20 db. Example 1.1: At a distance of 10 km, the attenuation for KCBS-AM with f = 740 kHz is 3 × 105 20 log10 ≈−50 db. 4π × 740 × 103 × 10 For KQED-FM, also at d =10km, but f =88.5 MHz, nearly 100 times the carrier frequency of KCBS, the attenuation will be 1002 or 40 db worse, 3 × 105 20 log10 ≈−90 db. 4π × 88.5 × 106 × 10 For a PCS cellphone in the 2 GHz band, if the distance between the base station and mobile is 1 km, the attenuation is 3 × 105 20 log10 ≈−100 db. 4π × 2 × 109 When the signal is transferred over a waveguide, like coax cable or optical fiber, the signal is con- fined to the waveguide, and attenuation is caused by power dissipation in the medium. So attenuation is expressed in db/km. Example 1.2: For one coax cable (LMR-195), the attenuation is given in the following table. Frequency (MHz) 1 10 100 1000 Attenuation (db/km) -12 -37 -118 -385 By contrast, the attenuation of light in single-mode optical fiber is -0.2 db/km for wave- lengths near 1.55 µm. To explore the consequences of attenuation, refer again to figure1.1. The received power PR must exceed a minimum level so that the demodulated signal y is close to the original signal x. This minimum level is called the receiver sensitivity. For illustration suppose your FM radio receiver sensitivity is -50 db or 10 µW. The transmit power of KQED-FM is 100,000 W or 50 db. Thus your radio can receive the KQED broadcast at a distance of d km if PR 10 log10 = −100 = −70 − 20 log10 d, PT or d ≈ 14 km. For optical receivers the sensitivity is -75 db (0.03 µW). The laser transmit power is small, PT = −30 db (1 mW). So the maximum distance d of the optical fiber (with attenuation of -0.2 db/km) is 10 log10 PR − 10 log10 PT = −0.2d, so −75 + 30 = −0.2d or d = 225 km. Thus signals can travel through optical fiber for 225 km before they need to be amplified. 8 CHAPTER 1. COMMUNICATION SYSTEM Dispersion Σ δ y Σ xT = a(n) (t-nT) R = a(n)h(t-nT) nT channel Figure 1.3: The sequence of impulses xT is spread out by the channel. If T is too small, the responses of the impulses overlap and lead to errors. Dispersion is best appreciated in the context of digital communication. Suppose a binary signal a : Integers →{0, 1} is encoded into a sequence of very narrow pulses T seconds apart. Ideally these pulses are δ functions, so ∞ ∀t ∈ Reals,xT (t)= a(n)δ(t − nT ). n=−∞ Thus a ‘1’ is encoded into the presence of an impulse and a ‘0’ into the absence of an impulse. The channel is an LTI system with impulse response h so the received signal is ∞ ∀t ∈ Reals,yT (t)= a(n)h(t − nT ). n=−∞ Typically, h is spread out or dispersed as shown in figure1.3, and the response to adjacent δ func- tions will overlap if T is very small.
Recommended publications
  • Early Forms of Long-Distance Communication
    EARLY FORMS OF LONG-DISTANCE COMMUNICATION In this material, you will learn about Telegraphy, Telephone and GSM architecture Before the development of the electric telegraph in the 19th century revolutionized how information was transmitted across long distances, ancient civilizations such as those in China, Egypt and Greece used drumbeats or smoke signals to exchange information between far-flung points. However, such methods were limited by the weather and the need for an uninterrupted line of sight between receptor points. These limitations also lessened the effectiveness of the semaphore, a modern precursor to the electric telegraph. Developed in the early 1790s, the semaphore consisted of a series of hilltop stations that each had large movable arms to signal letters and numbers and two telescopes with which to see the other stations. Like ancient smoke signals, the semaphore was susceptible to weather and other factors that hindered visibility. A different method of transmitting information was needed to make regular and reliable long-distance communication workable. Did You Know? SOS, the internationally recognized distress signal, does not stand for any particular words. Instead, the letters were chosen because they are easy to transmit in Morse code: "S" is three dots, and "O" is three dashes. The Electric Telegraph In the early 19th century, two developments in the field of electricity opened the door to the production of the electric telegraph. First, in 1800, the Italian physicist Alessandro Volta (1745-1827) invented the battery, which reliably stored an electric current and allowed the current to be used in a controlled environment. Second, in 1820, the Danish physicist Hans Christian Oersted (1777-1851) demonstrated the connection between electricity and magnetism by deflecting a magnetic needle with an electric current.
    [Show full text]
  • Rethinking the Role of History in Law & Economics: the Case of The
    09-008 Rethinking the Role of History in Law & Economics: The Case of the Federal Radio Commission in 1927 David A. Moss Jonathan B. Lackow Copyright © 2008 by David A. Moss and Jonathan B. Lackow Working papers are in draft form. This working paper is distributed for purposes of comment and discussion only. It may not be reproduced without permission of the copyright holder. Copies of working papers are available from the author. Rethinking the Role of History in Law & Economics: The Case of the Federal Radio Commission in 1927 David A. Moss Jonathan B. Lackow July 13, 2008 Abstract In the study of law and economics, there is a danger that historical inferences from theory may infect historical tests of theory. It is imperative, therefore, that historical tests always involve a vigorous search not only for confirming evidence, but for disconfirming evidence as well. We undertake such a search in the context of a single well-known case: the Federal Radio Commission’s (FRC’s) 1927 decision not to expand the broadcast radio band. The standard account of this decision holds that incumbent broadcasters opposed expansion (to avoid increased competition) and succeeded in capturing the FRC. Although successful broadcaster opposition may be taken as confirming evidence for this interpretation, our review of the record reveals even stronger disconfirming evidence. In particular, we find that every major interest group, not just radio broadcasters, publicly opposed expansion of the band in 1927, and that broadcasters themselves were divided at the FRC’s hearings. 1. Introduction What is the role of history in the study of law and economics? Perhaps its most important role in this context is as a test of theory and a source of new hypotheses.
    [Show full text]
  • A Concise History of Fort Monmouth, New Jersey and the U.S
    A CONCISE HISTORY OF FORT MONMOUTH, NEW JERSEY AND THE U.S. ARMY CECOM LIFE CYCLE MANAGEMENT COMMAND Prepared by the Staff of the CECOM LCMC Historical Office U.S. Army CECOM Life Cycle Management Command Fort Monmouth, New Jersey Fall 2009 Design and Layout by CTSC Visual Information Services, Myer Center Fort Monmouth, New Jersey Visit our Website: www.monmouth.army.mil/historian/ When asked to explain a loyalty that time had not been able to dim, one of the Camp Vail veterans said shyly, "The place sort of gets into your blood, especially when you have seen it grow from nothing into all this. It keeps growing and growing, and you want to be part of its growing pains." Many of the local communities have become very attached to Fort Monmouth because of the friendship instilled...not for just a war period but for as long as...Fort Monmouth...will inhabit Monmouth County. - From “A Brief History of the Beginnings of the Fort Monmouth Radio Laboratories,” Rebecca Klang, 1942 FOREWORD The name “Monmouth” has been synonymous with the defense of freedom since our country’s inception. Scientists, engineers, program managers, and logisticians here have delivered technological breakthroughs and advancements to our Soldiers, Sailors, Airmen, Marines, and Coast Guardsmen for almost a century. These innovations have included the development of FM radio and radar, bouncing signals off the moon to prove the feasibility of extraterrestrial radio communication, the use of homing pigeons through the late-1950s, frequency hopping tactical radios, and today’s networking capabilities supporting our troops in Overseas Contingency Operations.
    [Show full text]
  • The Ieee North Jersey Section Newsletter
    1 PUBLICATION OF THE NORTH JERSEY SECTION OF THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS THE IEEE NORTH JERSEY SECTION NEWSLETTER Vol. 60, No. 2 FEBRUARY 2013 Calendar of Events • February 6, 10:30 AM to 4:30 PM: FCC Workshop on Network Resiliency Read More… Location: Brooklyn Law School, 22nd floor, Forchelli Center, Feil Hall, 205 State Street, Brooklyn, NY 11201, Getting to Brooklyn Law School NY Contact: Prof. Henning Schulzrinne, CTO, FCC and/or Adriaan J. van Wijngaarden, ([email protected]) • February 6, 5:00 PM to 7:00 PM: AP/MTT - The Evolution of Low Noise Devices and Amplifiers - Dr. Edward Niehenke of Niehenke Consulting Read More… Location: NJIT - ECE 202, 161 Warren Street, Newark, NJ 07102 Getting to NJIT Contact: Dr. Ajay Kumar Poddar (201)-560-3806, ([email protected]), Prof. Edip Niver (973)596-3542, ([email protected]) • February 6, 6:00 PM to 8:45 PM: IEEE North Jersey Section EXCOM meeting - Clifton, NJ Read More… Location: Clifton Public Library - Allwood Branch, Activity Room, 44 Lyall Road, Clifton, NJ 07012, Getting to Clifton Library Contact: Russell Pepe ([email protected]), Chris Peckham [email protected] and/or Adriaan J. van Wijngaarden, ([email protected]) • February 8, 9:00 AM to 2:00 PM: The PES and IAS Chapters: Batteries - Andrew Sagl of Megger Read More… Location: PSE&G - Hadley Road Facility, Auditorium, 4000 Hadley Road, South Plainfield, NJ 07080 Getting to PSE&G Contact: Ronald W. Quade, P.E ([email protected]), Ken Oexle ([email protected]) • February 12, 6:00 PM to 7:30 PM IEEE Control System Society - Feedback, Control and Dynamic Networks – Prof.
    [Show full text]
  • Does the Communications Act of 1934 Contain a Hidden Internet Kill Switch?
    FEDERAL COMMUNICATIONS LAW JOURNAL VOLUME 65 I SSUE 1 J ANUARY 2013 D OES THE COMMUNICATIONS ACT OF 1934 CONTAIN A H IDDEN INTERNET KILL SWITCH? David W. Opderbeck FEDERAL COMMUNICATIONS LAW JOURNAL VOLUME 65 ISSUE 1 JANUARY 2013 Editor-in-Chief DENNIS HOLMES Senior Managing Editor Senior Production Editor JONATHAN MCCORMACK JESSICA KRUPKE Senior Articles Editor Senior Notes Editor AVONNE BELL JOHN COX Articles Editors Managing Editors Notes Editors RHONDA ADATO N. JAY MALIK ALLARD CHU ROBERT HOPKINS KATHERINE MANTHEI BETSY GOODALL ROBERT VORHEES EMILY SILVEIRO-ALLEN JOSHUA KRESH CHARLES POLLACK Journal Staff KEENAN ADAMCHAK BEN ANDRES JAMES CHAPMAN ANDREW ERBER ADETOKUNBO FALADE DAVID HATEF MATHEW HATFIELD ADAM HOTTELL DARREL JOHN JIMENEZ EVIN LUONGO JAMI MEVORAH MILENA MIKAILOVA MELISSA MILCHMAN CLAYTON PREECE SEETA REBBAPRAGADA MEREDITH SHELL MICHAEL SHERLING MARY SHIELDS TOM STRUBLE HOLLY TROGDON MARGOT VANRIEL CARLA VOIGT BRANDON WHEATLEY MICHAEL WILLIAMS JARUCHAT SIRICHOKCHATCHAWAN Faculty Advisors PROFESSOR JEROME BARRON PROFESSOR KAREN THORNTON PROFESSOR DAWN NUNZIATO Adjunct Faculty Advisors MATTHEW GERST ETHAN LUCARELLI NATALIE ROISMAN RYAN WALLACH Published by the GEORGE WASHINGTON UNIVERSITY LAW SCHOOL and the FEDERAL COMMUNICATIONS BAR ASSOCIATION Does the Communications Act of 1934 Contain a Hidden Internet Kill Switch? David W. Opderbeck* TABLE OF CONTENTS I.! INTRODUCTION .................................................................................... 3! II.! THE WAR AND EMERGENCY POWERS IN SECTION 606 OF THE COMMUNICATIONS
    [Show full text]
  • Sarah Clemens* Journalists Face a Credibility Crisis, Plagued by Chants
    FROM FAIRNESS TO FAKE NEWS: HOW REGULATIONS CAN RESTORE PUBLIC TRUST IN THE MEDIA Sarah Clemens* Journalists face a credibility crisis, plagued by chants of fake news and a crowded rat race in the primetime ratings. Critics of the media look at journalists as the problem. Within this domain, legal scholarship has generated a plethora of pieces critiquing media credibility with less attention devoted to how and why public trust of the media has eroded. This Note offers a novel explanation and defense. To do so, it asserts the proposition that deregulating the media contributed to the proliferation of fake news and led to a decline in public trust of the media. To support this claim, this Note first briefly examines the historical underpinnings of the regulations that once made television broadcasters “public trustees” of the news. This Note also touches on the historical role of the Public Broadcasting Act that will serve as the legislative mechanism under which media regulations can be amended. Delving into what transpired as a result of deregulation and prodding the effects of limiting oversight over broadcast, this Note analyzes the current public perception of broadcast news, putting forth the hypothesis that deregulation is correlated to a negative public perception of broadcast news. This Note analyzes the effect of deregulation by exploring recent examples of what has emerged as a result of deregulation, including some of the most significant examples of misinformation in recent years. In so doing, it discusses reporting errors that occurred ahead of the Iraq War, analyzes how conspiracy theories spread in mainstream broadcast, and discusses the effect of partisan reporting on public perception of the media.
    [Show full text]
  • Making Radio Pirates Walk the Plank with Aiding and Abetting Liability
    Arrr! Sever Thee Transmitters! Making Radio Pirates Walk the Plank with Aiding and Abetting Liability Max Nacheman * TABLE OF CONTENTS I. INTRODUCTION ............................................................................... 299 II. THE INTERTWINED FATE OF BROADCAST REGULATION AND PIRATE RADIO ............................................................................................. 301 A. Origins of Radio Broadcast Regulation in the United States .. 301 B. Pirates of the (Air)waves: The Swell of Unauthorized Broadcasting ............................................................................ 303 C. From Radio Pirates to Cellular Ninjas: The Future of Unauthorized Broadcasting ..................................................... 304 III. UNAUTHORIZED BROADCASTING POSES A UNIQUE ENFORCEMENT CHALLENGE THAT MAY BE ADDRESSED BY ESTABLISHING AUTHORITY TO CRACK DOWN ON AIDERS AND ABETTORS OF PIRATE BROADCASTERS .............................................................................. 305 A. The FCC’s Enforcement Procedure for Unauthorized Broadcasters Is an Inadequate Deterrent to Pirates ............... 306 B. Aiding and Abetting Liability Would Cut the Supply Chain of Essential Resources to Unauthorized Broadcasters ................ 309 1. How the United Kingdom Sank Pirate Radio ................... 310 2. Aiding and Abetting Liability for Securities Violations ... 311 IV. THREE WAYS TO CRACK DOWN ON AIDERS AND ABETTORS OF UNAUTHORIZED BROADCASTING: STATUTE, RULEMAKING, AND EXISTING CRIMINAL LAW .............................................................
    [Show full text]
  • History in the Computing Curriculum 6000 BC to 1899 AD
    History in the Computing Curriculum Appendix A1 6000 BC to 1899 AD 6000 B.C. [ca]: Ishango bone type of tally stick in use. (w) 4000-1200 B.C.: Inhabitants of the first known civilization in Sumer keep records of commercial transactions on clay tablets. (e) 3000 B.C.: The abacus is invented in Babylonia. (e) 1800 B.C.: Well-developed additive number system in use in Egypt. (w) 1300 B.C.: Direct evidence exists as to the Chinese using a positional number system. (w) 600 B.C. [ca.]: Major developments start to take place in Chinese arithmetic. (w) 250-230 B.C.: The Sieve of Eratosthenes is used to determine prime numbers. (e) 213 B.C.: Chi-Hwang-ti orders all books in China to be burned and scholars to be put to death. (w) 79 A.D. [ca.]: "Antikythera Device," when set correctly according to latitude and day of the week, gives alternating 29- and 30-day lunar months. (e) 800 [ca.]: Chinese start to use a zero, probably introduced from India. (w) 850 [ca.]: Al-Khowarizmi publishes his "Arithmetic." (w) 1000 [ca.]: Gerbert describes an abacus using apices. (w) 1120: Adelard of Bath publishes "Dixit Algorismi," his translation of Al-Khowarizmi's "Arithmetic." (w) 1200: First minted jetons appear in Italy. (w) 1202: Fibonacci publishes his "Liber Abaci." (w) 1220: Alexander De Villa Dei publishes "Carmen de Algorismo." (w) 1250: Sacrobosco publishes his "Algorismus Vulgaris." (w) 1300 [ca.]: Modern wire-and-bead abacus replaces the older Chinese calculating rods. (e,w) 1392: Geoffrey Chaucer publishes the first English-language description on the uses of an astrolabe.
    [Show full text]
  • VOLUME II Public School Code of 1949 Goods and Services
    Public School Code of 1949 Goods and Services Expenditures Fiscal Year 2015-2016 VOLUME II Temple University Financial Disclosure Report Purchase of Goods and Services Contracts Notes and Definitions The following report provides the required disclosures for reporting the purchase of goods and services contracts. The University’s Banner Finance System does not include data enabling the distinction between the purchases of goods and services. Therefore, a single report is provided that includes both. Expenditures are categorized in the attached report using the following categories: General Supplies & Services: o General supplies, expendable equipment and software. Health Service Programs: o Animal lab, professional billing and other outside professional services. Insurance: o Malpractice, property, general liability, and employees insurances. Interest & Taxes: o Bond interest, real estate tax and debt service costs. Library: o Books, electronic periodicals, subscriptions and film. Professional Fees & Contracts: o Auditing, legal and collection fees and subcontracts. Property, Plant & Equipment: o Capital equipment, buildings and building improvements. Rent: o Equipment, building and office rentals. Repairs & Maintenance: o Equipment repair, maintenance of buildings and grounds. Telecommunications: o Telephone equipment, data communications and cellular services. Travel: o Travel agency fees, foreign and domestic travel expenses. Utilities: o Electric, gas, water, sewer, steam, chilled water and other miscellaneous utilities expenses. Each entry provides the category into which the purchase falls, the vendor name and address and the amount of the purchase. There is no more than one entry per vendor for a single category within a responsibility center. Purchases of goods and services in the Disclosure Report include those which equal or exceed $1,000 for each vendor from all Budgeted Operating Funds including Temple University Physicians.
    [Show full text]
  • GAO-02-906 Telecommunications
    United States General Accounting Office GAO Report to Congressional Requesters September 2002 TELECOMMUNICATIONS Better Coordination and Enhanced Accountability Needed to Improve Spectrum Management a GAO-02-906 Contents Letter 1 Results in Brief 2 Background 5 Concern Over Concentrating Authority Led to Divided Structure for Spectrum Management 6 Methods for Allocating Spectrum Face Difficulties and Are Not Guided by a Coordinated National Plan 11 Issues Have Emerged Regarding the Adequacy of U.S. Preparations for World Radiocommunication Conferences 19 Federal Officials Said Activities to Encourage Efficient Federal Spectrum Use Are Hindered by Staffing and Resource Problems 25 Conclusions 34 Recommendations for Executive Action 35 Agency Comments 36 Appendixes Appendix I: Major Parts of the Radiofrequency Spectrum and Their Uses 38 Appendix II: Timeline of Spectrum Management 40 Appendix III: Comments from the Federal Communications Commission 67 Appendix IV: Comments from the Department of Commerce 69 Appendix V: Comments from the Department of State 71 Figures Figure 1: Interdepartment Radio Advisory Committee’s Membership 10 Figure 2: Percent of Spectrum Shared by Federal and Nonfederal Users (9 kHz to 3.1 GHz) 12 Figure 3: Spectrum Reallocation Process 13 Figure 4: Relationship of U.S. Participants in Preparing for World Radiocommunication Conferences 21 Figure 5: NTIA Frequency Assignment Process 26 Figure 6: Timeline of Spectrum Management (1895–1925) 41 Figure 7: Timeline of Spectrum Management (1925–1955) 47 Figure 8: Timeline
    [Show full text]
  • Telephone Two Inventors, Elisha Grey and Alexander Graham Bell, Independently Designed Devices to Transmit Electrically Speech (The Telephone)
    In 1825 William Sturgeon had exhibited the electro-magnet. In 1830 Joseph Henry showed how Sturgeon's device helped with long-distance communication to strike a bell. This was the beginning of the electric telegraph proper and it was exploited very successfully by Samuel F B Morse, who with Alfred Vail developed in 1838 a simple tap key through a series of dots and dashes now known as the Morse Code. Telegraph quickly spread across Europe and the USAand many improvements were developed over the century. http://en.wikipedia.org/wikilElectrical telegraph http://www.telegraph-office.com/ http://mysite.du.edu/'''jcalvert/tel/morse/morse.htm#C http://mysite.du.edu/'''jcalvert/tel/morse/morse.htm http://www.sparkmuseum.com/TELEGRAPH.HTM S'II""''lJAnD \\'1[U~Lm;~ I,"~. http://www.juliantrubin.com/bigten/morsetelegraph.html Telephone Two inventors, Elisha Grey and Alexander Graham Bell, independently designed devices to transmit electrically speech (the telephone). Bell won the race to patent the device. Competition is fierce as the following shows: • 11 February 1876 - Gray invents a liquid transmitter for use with a telephone but does not build one. • 14 February 1876 - Elisha Gray files a patent caveat for transmitting the human voice through a telegraphic circuit. • 14 February 1876 - Alexander 'Bell applies for the patent "Improvements in Telegraphy", for electromagnetic telephones using undulating currents. • 19 February 1876 - Gray is notified by the U.S. Patent Office of an interference between his caveat and Bell's patent application. Gray decides to abandon his caveat. • 7 March 1876 - Bellis U.S. patent 174,465 "Improvement in Telegraphy" is granted, covering "the method of, and apparatus for, transmitting vocal or other sounds telegraphically ..
    [Show full text]
  • A Little More About and Around the Morse Code
    1 A LITTLE MORE ABOUT AND AROUND THE MORSE CODE Featuring Samuel Finley Breese MORSE (left), Alfred VAIL (middle) and… Friedrich Clemens GERKE (right) 1. Shall we say the Morse code, or should we call it the Vail code? And where does Gerke comes in? (see point 2). A controversy exists over the role of each in the invention of the code. Vail and Morse certainly collaborated in the invention of the Morse telegraph and almost certainly in the final form of the code. But it is clear that the basic ideas came from Morse, years before Vail became, in 1837, his assistant. So, perhaps we should say that Morse was the inspirer, and Vail the man who brought out their final version. Here are some observations in this regard. > During his voyage home to New York in 1832 on the Sully, Samuel Morse first conceived the idea of the electromagnetic telegraph during his conversations with another passenger, Dr Charles T. Jackson of Boston, a twenty-eight-year-old physician with a Harvard M.D. Below you see the reproduction of some drawings in Morse’s notebook, in which he has noted down during this voyage some of his first ideas about a telegraph machine. He originally devised a cipher code (digits 0…9), similar to that used in existing semaphore line telegraphs, by which words were assigned three- or four-digit numbers and entered into a codebook. The sending operator converted words to these number groups and the receiving operator converted them back to words using this codebook. Morse spent several months compiling this code dictionary.
    [Show full text]