Browse Definitions :
Definition

linearity

Linearity is the behavior of a circuit, particularly an amplifier , in which the output signal strength varies in direct proportion to the input signal strength. In a linear device, the output-to-input signal amplitude ratio is always the same, no matter what the strength of the input signal (as long it is not too strong).

In an amplifier that exhibits linearity, the output-versus-input signal amplitude graph appears as a straight line. Two examples are shown below. The gain, or amplification factor, determines the slope of the line. The steeper the slope, the greater the gain. The amplifier depicted by the red line has more gain than the one depicted by the blue line. Both amplifiers are linear within the input-signal strength range shown, because both lines in the graph are straight.

 

Illustration of linearity (2292 bytes)


In analog applications such as amplitude-modulation ( AM ) wireless transmission and hi-fi audio, linearity is important. Nonlinearity in these applications results in signal distortion, because the fluctuation in gain affects the shape of an analog output waveform with respect to the analog input waveform.

Even if an amplifier exhibits linearity under normal conditions, it will become nonlinear if the input signal is too strong. This situation is called overdrive. The amplification curve bends towards a horizontal slope as the input-signal amplitude increases beyond the critical point, producing distortion in the output. An example is a hi-fi amplifier whose gain is set to the point where the VU (volume-unit) meter needles kick into the red range. The red zone indicates that the amplifier is not operating in a linear fashion. This can degrade the fidelity of the sound.

This was last updated in June 2010
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • multifactor authentication (MFA)

    Multifactor authentication (MFA) is a security technology that requires more than one method of authentication from independent ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close