Browse Definitions :
Definition

multi-carrier modulation (MCM)

Multi-carrier modulation (MCM) is a method of transmitting data by splitting it into several components, and sending each of these components over separate carrier signals. The individual carriers have narrow bandwidth , but the composite signal can have broad bandwidth.

The advantages of MCM include relative immunity to fading caused by transmission over more than one path at a time (multipath fading), less susceptibility than single-carrier systems to interference caused by impulse noise, and enhanced immunity to inter-symbol interference. Limitations include difficulty in synchronizing the carriers under marginal conditions, and a relatively strict requirement that amplification be linear.

MCM was first used in analog military communications in the 1950s. Recently, MCM has attracted attention as a means of enhancing the bandwidth of digital communications over media with physical limitations. The scheme is used in some audio broadcast services. The technology lends itself to digital television , and is used as a method of obtaining high data speeds in asymmetric digital subscriber line ( ADSL ) systems. MCM is also used in wireless local area networks ( WLAN s).

Also see orthogonal frequency-division multiplexing ( OFDM ), frequency-division multiplexing ( FDM ), and time-division multiplexing ( TDM ).

This was last updated in March 2011
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close