Browse Definitions :
Definition

traveling-wave tube (TWT)

A traveling-wave tube (TWT) is a specialized vacuum tube used in wireless communications, especially in satellite systems. The TWT can amplify or generate microwave signals. Two common types of TWT include the Klystron and the magnetron .

In the Klystron, a negatively charged cathode emits a beam of high-speed, high-energy electron s that travel through the cylindrical tube in straight lines to a positively charged anode. A coil is wound around the tube. When the coil is energized with a radio-frequency ( RF ) signal, the electrons in the beam alternately bunch up and spread out. In the magnetron, the electrons move in circles rather than in straight lines. The circular motion, produced by magnets at either end of the tube, allows the electrons to pick up energy over a greater distance.

Inside the TWT, the regions of high and low electron concentration move along or around the tube in waves. When the tube is properly operating, some of the energy from the electrons is imparted to the signal in the coil. The result is amplification of the signal.

A TWT can be made to function as an oscillator by coupling some of the output back into the input. This configuration is called a backward-wave oscillator , because the feedback is applied opposite to the direction of movement of the electrons inside the tube. Such an oscillator can generate up to approximately 0.1 watt of signal power in the microwave range.

A parametric amplifier is a TWT amplifier that operates from a high-frequency alternating current ( AC ) power source, rather than the usual direct current ( DC ) source. Some characteristic of the circuit, such as its impedance ,is made to vary with time at the power-supply frequency. Parametric amplifiers are useful because they generate very little internal noise . This makes it possible to obtain excellent sensitivity in receiving systems, minimizing data-transfer errors.

This was last updated in March 2011
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close