Exactly what is Duty Cycle?

Phil Morgan • November 1, 2017

So what exactly is Duty Cycle?  and what have Zombies got to do with it…. 

I want talk about the Duty Cycle that we see on our Spectrum Analyzers. Since it’s Halloween, and everyone loves a good horror story, I thought I’d try and explain what Duty Cycle is, with the use of Zombies!

A lot of people explain this concept as Utilization, but there is a problem with that interpretation.

Imagine the scenario pictured below in Diagram 1

What is Duty Cycle exactly?

Diagram 1 – Morgan ancestral family home (actual photo)

 

Let’s imagine our story is set in a post-apocalyptic world, but we are safe inside our castle. The only thing we have to watch out for are stray zombies.

Our castle backs up to the ocean, so we are safe in that direction, but we always post a guard to look out of windows 1, 6, and 11 (let’s refer to them as W1, W6, and W11). The green areas show the viewpoints from the relevant windows.

The first thing to point out here, is when the guard is looking out of one window, he cannot see anything out of any other windows. He spends his time every minute looking out of W1 for 20 seconds, then W6 for 20 seconds, then W11 for 20 seconds, then repeats. For this story will ignore the time it takes to move between windows.

So let’s imagine the terrain is quite rough and, if a zombie falls over, it takes him 2/3 of a minute to get back up – that’s 40 seconds. So the zombie walks for 20 seconds, trips, and takes 40 seconds to get back up. Let’s also assume that the zombie is walking in from the viewpoint of W1.

Let’s assume now that Bob (our guard) just finished looking out of W1, and he moves to W6. At this point our zombie starts walking by. As Bob moves to W11, our zombie trips, and falls down. Bob moves to W1 and sees nothing. He then moves to W6 and our zombie gets up and starts walking. As Bob moves to W11 again, our zombie trips and goes down. This cycle continually repeats, and Bob never sees the zombie. Bob reports zombie activity as 0% in W1.

Let’s imagine another scenario: As Bob arrives at W1, the zombie walks by. Bob sees him, and notes the event. Bob moves to W6, zombie falls over and goes down. Bob moves to W11, zombie stays down. As Bob moves back to W1, zombie gets up and starts walking in again. This cycle continues. The result here is Bob reports zombie activity as 100% in W1.

Neither of these reports are true, as neither represent actual zombie activity viewed out of the window. The chances of the zombie falling and staying down as we explained in the scenarios, at these exact timings, are very unlikely, but I hope you get the point.

 

It is the same with Duty Cycle

It is the same with Duty Cycle. Duty Cycle measures “of the time I looked, how often was the signal present”. Again, the chances of the signal only being there when you look, or never being there as you look, is very unlikely.

Hopefully, you now understand the point of my Halloween tale. Duty Cycle is an approximation of Utilization. How accurate it actually is, can be dependent on how many channels the Spectrum Analyzer has to scan.

Just as if Bob was to stay focused on W1, if the Spectrum Analyzer is locked on a channel – this will give much more accurate results. One caveat here is that you have to take into account the width of the Spectrum Analyzers scan: if it is greater than the channel width, you are ok, BUT if it is less than the channel width, you still get the problem as described above.

So, hopefully, now you have a better understanding of what Duty Cycle is. Next time you look at a Spectrum Analyzer showing you Duty Cycle remember Bob, our brave defender, and ensure you keep this in mind as you interpret the information!

Happy Halloween everyone, see you next time!

If you are looking to make your mark in the IT Industry, then NC-Expert offers excellent training courses aimed at relevant IT industry certifications – contact us today to get started.

NC-Expert Blog

By Rie Vainstein March 31, 2025
A Digital Shield for Your Online Adventures As tech professionals, we often spend a good chunk of our lives navigating the digital realm. Whether you’re troubleshooting a network, coding a new app, or just binge-watching the latest series, one thing is clear: your connection to the internet is a double-edged sword. It’s both incredibly convenient and, if not properly secured, a potential vulnerability. Enter the VPN (Virtual Private Network) our trusty, digital bodyguard. If you’re not already using one, or if you’re not entirely sure why you should, let’s walk through some of the reasons why a VPN is essential for anyone working in IT and, frankly, for anyone who uses the internet. What Is a VPN? In simple terms, a VPN creates a secure, encrypted tunnel between your device and the internet. It allows your data to travel securely, masking your IP address, and ensuring that no one (be it hackers or nosy advertisers) can track or intercept your online activity. Think of it as your personal “cloak of invisibility” in the digital world! 
By Phil Morgan March 13, 2025
Troubleshooting Wireless Networks with Ekahau: A Professional Engineer’s Guide Wireless networks have become the backbone of modern business infrastructure. From office environments to large-scale enterprises, ensuring a seamless wireless experience is essential for productivity. However, despite advancements in Wi-Fi technology, network performance issues often arise, ranging from signal interference and dead zones to capacity overloads and channel mismanagement. To tackle these issues efficiently, professional engineers rely on powerful tools. One such tool, Ekahau AI Pro, has become a gold standard in the wireless industry for troubleshooting and optimizing Wi-Fi networks. This blog delves into troubleshooting wireless networks using Ekahau tools, providing practical examples and technical insights to guide professional engineers in improving network performance.
By Rie Vainstein March 3, 2025
Futureproofing Our Security In our increasingly connected world, the security of digital information has never been more critical. From banking transactions to private communications, our data is constantly transmitted and stored across the internet. The current systems that protect this data rely on cryptography, a branch of mathematics that helps keep information secure by encoding it in ways that are difficult to decode without the proper key. However, with the rise of quantum computers, traditional cryptography is facing new and significant threats. This is where Post-Quantum Cryptography comes into play. What is Post-Quantum Cryptography? Post-Quantum Cryptography (PQC) [1] refers to cryptographic algorithms that are specifically designed to be secure against the power of quantum computers. Quantum computers, once they become practical, will be capable of solving complex mathematical problems much faster than classical computers. This will render many of the encryption methods we rely on today [such as RSA (Rivest, Shamir, and Adleman – initials of the inventors) and ECC (Elliptic Curve Cryptography)] vulnerable to attack. Quantum computers operate on quantum bits, or “qubits”, which can exist in multiple states simultaneously, unlike classical bits that are either a zer (0) or one (1). This allows quantum computers to perform certain calculations exponentially faster than classical computers. For example, in a matter of seconds, a quantum computer could potentially break an RSA key, which is considered secure by today’s standards. As quantum computing technology advances, the need for PQC becomes even more urgent.
Share by: