Wireless communication involves transferring information over a distance without wires. It includes technologies like cellular phones, WiFi, Bluetooth, and wireless networking. The Wireless Application Protocol (WAP) was developed to allow access to internet content on wireless devices like mobile phones. It uses protocols like WML and WMLScript to adapt webpages to smaller screens. Common types of wireless communication technologies include WiFi, Bluetooth, infrared, radio frequency, and PC Cards/PCMCIA.
A smart phone is a mobile device that combines a cell phone and computer capabilities. It allows users to make phone calls, access the internet, download and use apps, and more. Smart phones run operating systems like Android, iOS, Blackberry OS, and others. They use technologies like touch screens, processors, memory, and wireless networks to provide these connected computing features in a portable device.
Near Field Communication (NFC) allows for simple and secure communication between electronic devices by bringing them into close proximity. NFC provides ad hoc peer-to-peer connectivity between devices like transferring photos from a camera to a TV. It also enables automatic one-touch setup of wireless connections like Bluetooth. NFC operates at 13.56 MHz and has a range of about 20 cm. The protocol supports active and passive communication modes. Ecma International published NFC standards to facilitate interoperability between devices from different manufacturers.
Bluetooth is a short-range wireless technology that allows data exchange between fixed and mobile devices over short distances. It uses radio waves in the 2.4 GHz band and supports data rates of up to 1 Mbps within a 10 meter range. Bluetooth devices can form piconets with one device acting as the master to multiple slaves, or scatternets by interconnecting multiple piconets. Common applications include wireless headsets, file transfers between devices, and connecting peripherals like keyboards and mice. Advantages are wireless connectivity, low power usage, and avoidance of interference through frequency hopping. Limitations include short range and lower security compared to other wireless standards. Future versions aim to improve speed, range, and support larger networks.
RFID, NFC, Wi-Fi Direct, WiGig, ZigBee, DASH7, and EnOcean were discussed as emerging wireless technologies. RFID uses radio waves to identify objects while NFC allows communication between devices within 4 cm. Wi-Fi Direct and WiGig enable fast wireless connections without routers. ZigBee creates mesh networks for low power devices. DASH7 and EnOcean focus on long range and self-powered devices, respectively. Emerging areas discussed included cognitive radio, wireless sensor networks, high frequency antennas, spatial information transmission, Li-Fi, and lasers. The future of wireless is predicted to be ubiquitous connectivity everywhere with fewer physical wires.
Types of wireless communication technologiesMohamed Ahmed
There are several types of wireless communication technologies that allow devices to connect without cables, including Wi-Fi, Bluetooth, and ZigBee. Wi-Fi enables wireless networking between devices like laptops and smartphones using radio signals transmitted from a wireless router. Bluetooth connects devices like phones, keyboards and speakers within shorter ranges to share data. ZigBee supports low-power wireless networks for sensors and controls and is used in commercial monitoring applications.
This document discusses Bluetooth hotspot technology. A Bluetooth hotspot allows multiple Bluetooth-enabled devices to access the internet through a single connection. It works on a client-server model, where the server connects to the internet and shares the connection with clients. Key technologies involved include Bluetooth, L2CAP for packet data transfer, RFCOMM for streaming data, and OBEX for object exchange. The document outlines the architecture and process of using a Bluetooth hotspot network, including how clients connect to the server and request web pages. The objectives are to provide low-cost wireless internet access to multiple devices and help bridge the digital divide.
Wireless communication technologies allow for mobility and flexibility through radio signals rather than wired connections. They include technologies like Bluetooth, WiFi, wireless LANs and MANs that enable applications such as video conferencing, telemedicine, and distance learning. Common wireless standards are IEEE 802.11 for WiFi and IEEE 802.16 for WiMax. Wireless networks face challenges of limited spectrum availability, lower bandwidth and higher delays compared to wired networks. Emerging wireless technologies are expanding connectivity and access to services for more users.
Bluetooth is a short-range wireless technology originally developed for exchanging data over short distances between fixed and mobile devices, creating personal area networks as a wireless alternative to data cables. It was named after the 10th century Danish king Harald Bluetooth who united Scandinavian tribes into a single kingdom, similar to how Bluetooth unites different industries. Bluetooth was invented in 1994 by Ericsson and later developed with other companies. Major releases include Bluetooth 1.0 in 1999, 2.0 in 2004, and 3.0 in 2009. Applications include telephones, headsets, computers, and multimedia devices. It works by putting devices in discovery mode to identify others in range, then paging to create a link and expanding to connect following
A smart phone is a mobile device that combines a cell phone and computer capabilities. It allows users to make phone calls, access the internet, download and use apps, and more. Smart phones run operating systems like Android, iOS, Blackberry OS, and others. They use technologies like touch screens, processors, memory, and wireless networks to provide these connected computing features in a portable device.
Near Field Communication (NFC) allows for simple and secure communication between electronic devices by bringing them into close proximity. NFC provides ad hoc peer-to-peer connectivity between devices like transferring photos from a camera to a TV. It also enables automatic one-touch setup of wireless connections like Bluetooth. NFC operates at 13.56 MHz and has a range of about 20 cm. The protocol supports active and passive communication modes. Ecma International published NFC standards to facilitate interoperability between devices from different manufacturers.
Bluetooth is a short-range wireless technology that allows data exchange between fixed and mobile devices over short distances. It uses radio waves in the 2.4 GHz band and supports data rates of up to 1 Mbps within a 10 meter range. Bluetooth devices can form piconets with one device acting as the master to multiple slaves, or scatternets by interconnecting multiple piconets. Common applications include wireless headsets, file transfers between devices, and connecting peripherals like keyboards and mice. Advantages are wireless connectivity, low power usage, and avoidance of interference through frequency hopping. Limitations include short range and lower security compared to other wireless standards. Future versions aim to improve speed, range, and support larger networks.
RFID, NFC, Wi-Fi Direct, WiGig, ZigBee, DASH7, and EnOcean were discussed as emerging wireless technologies. RFID uses radio waves to identify objects while NFC allows communication between devices within 4 cm. Wi-Fi Direct and WiGig enable fast wireless connections without routers. ZigBee creates mesh networks for low power devices. DASH7 and EnOcean focus on long range and self-powered devices, respectively. Emerging areas discussed included cognitive radio, wireless sensor networks, high frequency antennas, spatial information transmission, Li-Fi, and lasers. The future of wireless is predicted to be ubiquitous connectivity everywhere with fewer physical wires.
Types of wireless communication technologiesMohamed Ahmed
There are several types of wireless communication technologies that allow devices to connect without cables, including Wi-Fi, Bluetooth, and ZigBee. Wi-Fi enables wireless networking between devices like laptops and smartphones using radio signals transmitted from a wireless router. Bluetooth connects devices like phones, keyboards and speakers within shorter ranges to share data. ZigBee supports low-power wireless networks for sensors and controls and is used in commercial monitoring applications.
This document discusses Bluetooth hotspot technology. A Bluetooth hotspot allows multiple Bluetooth-enabled devices to access the internet through a single connection. It works on a client-server model, where the server connects to the internet and shares the connection with clients. Key technologies involved include Bluetooth, L2CAP for packet data transfer, RFCOMM for streaming data, and OBEX for object exchange. The document outlines the architecture and process of using a Bluetooth hotspot network, including how clients connect to the server and request web pages. The objectives are to provide low-cost wireless internet access to multiple devices and help bridge the digital divide.
Wireless communication technologies allow for mobility and flexibility through radio signals rather than wired connections. They include technologies like Bluetooth, WiFi, wireless LANs and MANs that enable applications such as video conferencing, telemedicine, and distance learning. Common wireless standards are IEEE 802.11 for WiFi and IEEE 802.16 for WiMax. Wireless networks face challenges of limited spectrum availability, lower bandwidth and higher delays compared to wired networks. Emerging wireless technologies are expanding connectivity and access to services for more users.
Bluetooth is a short-range wireless technology originally developed for exchanging data over short distances between fixed and mobile devices, creating personal area networks as a wireless alternative to data cables. It was named after the 10th century Danish king Harald Bluetooth who united Scandinavian tribes into a single kingdom, similar to how Bluetooth unites different industries. Bluetooth was invented in 1994 by Ericsson and later developed with other companies. Major releases include Bluetooth 1.0 in 1999, 2.0 in 2004, and 3.0 in 2009. Applications include telephones, headsets, computers, and multimedia devices. It works by putting devices in discovery mode to identify others in range, then paging to create a link and expanding to connect following
This presentation presents a paper of IEEE CSCN 2015 on the DASH7 Alliance Protocol 1.0. It is an industry alliance standard for wireless sensor and actuator communication using the unlicensed sub-1 GHz bands. The paper explains its historic relation to active RFID standards ISO 18000-7 for 433 MHz communication, the basic concepts and communication paradigms of the protocol. Since the protocol is a full OSI stack specification, the paper discusses the implementation of every OSI layer.
This document summarizes a seminar presentation on bluejacking. Bluejacking involves sending unsolicited Bluetooth messages to nearby Bluetooth devices containing a vCard with a message. It does not alter recipient devices. The presentation covers how bluejacking works using Bluetooth technology, vCards, and OBEX protocol. It also discusses related concepts like bluesnarfing and bluecasting, and recommends disabling Bluetooth when not in use to prevent attacks.
This document provides an overview of Wi-Fi and Bluetooth technologies. It discusses how Wi-Fi allows wireless internet access and is widely available in public places. It also describes Bluetooth's technical features like encryption, authentication, and its goals of being a cable replacement and providing short-range wireless connectivity for both data and voice. The document concludes by comparing Wi-Fi and Bluetooth.
NFC allows contactless communication between devices over short distances. It uses radio frequency identification (RFID) standards to establish communication between devices, which can be used to transmit data like contact information, URLs, or initiate Bluetooth pairing when tapped. NFC operates at 13.56MHz and has a maximum range of about 4 cm. It supports three main operating modes and uses the NFC Data Exchange Format (NDEF) to structure payloads containing text, URLs, or other data in NDEF records for transmission between NFC-enabled devices.
Bluetooth is a wireless technology that allows devices to connect and exchange data over short distances without wires. It was created in 1994 by the Swedish company Ericsson and standardized by the Bluetooth Special Interest Group in 1998. Bluetooth works using low-power wireless signals within a range of about 30 feet. It allows devices like mobile phones, headphones, computers and more to connect and share data like audio, contacts, and files without needing to be physically plugged together. Some common types of Bluetooth devices include dongles and headsets. While Bluetooth enables wireless connectivity, its disadvantages include a limited range and higher battery usage than wired connections.
Bluetooth is a wireless technology that allows devices to connect and exchange data over short distances without wires. It was developed in 1994 by the Swedish company Ericsson and was named after the 10th-century Danish king Harald Bluetooth who united Denmark and Norway. Bluetooth works by using low-power radio signals to within a range of about 30 feet. It transmits data between devices like mobile phones, headphones, laptops, and other electronic devices. Bluetooth provides wireless connectivity and mobility by allowing data transfer without cables between various devices.
Wireless Communication Technologies (WIFI ,Bluetooth , NFC )layth jasim
This document provides an overview and comparison of different wireless communication technologies, including WiFi, Bluetooth, and NFC. It defines each technology, describes their characteristics and operating standards. WiFi allows wireless internet access and uses IEEE 802.11 standards including 802.11b, 802.11g, and 802.11n. Bluetooth is a short-range technology for connecting devices like mobile phones and laptops. NFC uses magnetic field induction to transfer data over short ranges of less than 4 centimeters. The document lists advantages and disadvantages of each technology and their applications.
This document provides information about Bluetooth technology. It discusses how Bluetooth allows for wireless connectivity between devices within a short range of up to 10 meters. Key features of Bluetooth include wireless connectivity without cables, low power consumption, industry-wide support, and small device size. While Bluetooth provides wireless data transfer, it has limitations such as short range and low data transfer speeds. The document outlines how Bluetooth works using radio frequency transmissions and describes the technology's frequency-hopping technique. It explains common Bluetooth-enabled devices and the technology's uses across various industries. In conclusion, the document discusses factors for Bluetooth's success, including integration into consumer products and providing clear benefits to users.
This document discusses the history, advantages, need, implementation, current devices and future of wireless communication. It covers the evolution of wireless technologies from early cellular phones to modern Wi-Fi and Bluetooth, explaining how wireless networks have become essential due to their convenience and mobility compared to wired connections. The future of wireless communication looks to advance connectivity through emerging technologies.
Three wireless technologies are described: Bluetooth, Wi-Fi, and infrared. Bluetooth transfers data at short ranges using radio waves, Wi-Fi enables wireless networking using the IEEE 802.11 standards at speeds up to 1 Mbps for most devices, and infrared uses line-of-sight infrared radiation to transmit data between devices over short distances and with lower power and cost than Bluetooth or Wi-Fi but at slower speeds and requiring line-of-sight.
Bluetooth is a short-range wireless technology that allows electronic devices to connect and exchange information over short distances without wires. It was developed as an open standard for affordable, low-power connections between devices like mobile phones, laptops, PCs, printers, digital cameras and video game consoles. Bluetooth has advantages like wireless connectivity, easy setup, low power usage, and industry support. However, it also has disadvantages like a short range of around 30 feet, lower data rates compared to other wireless technologies, and higher costs. Bluetooth works by using small, low-cost radio frequency transceivers called chips that are embedded in devices and allow them to communicate over the 2.4GHz spectrum in a piconet configuration.
This document discusses local area networks (LANs). It defines personal area networks (PANs), LANs, metropolitan area networks (MANs), and wide area networks (WANs) based on their range and purpose. The advantages of LANs include enabling collaboration, reducing costs and increasing productivity, while disadvantages are potential malfunctions and security vulnerabilities. Typical LAN devices are network interface cards, printers, storage, routers, and other peripherals. Most networks use digital rather than analog signals for easier error detection. Data packets on a network travel with destination addresses and routing devices examine addresses to send packets to their destinations.
After the read, you will learn the characteristics of the 6 wireless protocols IEEE protocols: LoRa, NB-IoT, ZigBee, Wi-Fi, BLE, WiMax.
In the field of IoT, a wide range of communication technologies wireless protocols exist simultaneously. In terms of transmission distance, there are BLE, WI-FI, ZigBee, sub1G, etc., which are widely used in the context of local wireless networks, such as wearable, home, and enterprise applications.
This document discusses wireless personal area networks (WPANs) and some common WPAN technologies used within short distances of less than 5 meters. It describes Bluetooth, which was originally proposed in 1998 for short-range wireless applications between devices like phones and cameras. Bluetooth uses frequency hopping spread spectrum in the 2.4 GHz band. ZigBee is also discussed as dealing with very low data rates but long battery life for applications like wireless sensor networks.
iContact(Call Center Management System)
iContact is a full featured call centre solution with a complete suite of applications that addresses the medium and large enterprise segment.
4G refers to the fourth generation of wireless communications that provides converged wired and wireless networks supporting high-speed data transmission and multimedia applications. 4G became necessary as 3G may not be able to support future high-bandwidth applications like video conferencing. Key 4G technologies include MIMO smart antennas, IPv6, VoIP, OFDM, and software-defined radios. 4G aims to provide data rates of 100 Mbps for applications like video calling, online gaming, and telemedicine while using technologies like LTE and WiMAX that support seamless global roaming.
Wi-Fi, also known as 802.11 networking, uses radio waves to provide wireless internet access over distances of up to 100 feet. It allows devices to connect to a wireless network using Wi-Fi network cards or adapters. Wi-Fi networks rely on wireless access points that connect users to the internet and each other. Common standards like 802.11b, 802.11a, and 802.11g provide transmission speeds of up to 54 megabits per second for connectivity between devices using radio frequency technology.
A telecommunications network connects terminals, links, and nodes to enable telecommunication between users. It uses addresses to route messages or connections to the correct recipients. A telecommunications network consists of terminals, processors, channels, computers, and control software that work together to transmit and receive data.
Identifying How WAP Can Be Used For Secure mBusinessOliver Pfaff
The document discusses security technologies for the Wireless Application Protocol (WAP), including:
- WAP 1.0 and 2.0 protocol stacks and their use of WTLS and TLS for secure communication
- WTLS limitations and enhancements like WPKI, WAPCert, and TLS over HTTP in WAP 2.0
- Information security technologies like WMLScript Crypto and the Wireless Identity Module (WIM) for digital signatures and credential storage
This presentation presents a paper of IEEE CSCN 2015 on the DASH7 Alliance Protocol 1.0. It is an industry alliance standard for wireless sensor and actuator communication using the unlicensed sub-1 GHz bands. The paper explains its historic relation to active RFID standards ISO 18000-7 for 433 MHz communication, the basic concepts and communication paradigms of the protocol. Since the protocol is a full OSI stack specification, the paper discusses the implementation of every OSI layer.
This document summarizes a seminar presentation on bluejacking. Bluejacking involves sending unsolicited Bluetooth messages to nearby Bluetooth devices containing a vCard with a message. It does not alter recipient devices. The presentation covers how bluejacking works using Bluetooth technology, vCards, and OBEX protocol. It also discusses related concepts like bluesnarfing and bluecasting, and recommends disabling Bluetooth when not in use to prevent attacks.
This document provides an overview of Wi-Fi and Bluetooth technologies. It discusses how Wi-Fi allows wireless internet access and is widely available in public places. It also describes Bluetooth's technical features like encryption, authentication, and its goals of being a cable replacement and providing short-range wireless connectivity for both data and voice. The document concludes by comparing Wi-Fi and Bluetooth.
NFC allows contactless communication between devices over short distances. It uses radio frequency identification (RFID) standards to establish communication between devices, which can be used to transmit data like contact information, URLs, or initiate Bluetooth pairing when tapped. NFC operates at 13.56MHz and has a maximum range of about 4 cm. It supports three main operating modes and uses the NFC Data Exchange Format (NDEF) to structure payloads containing text, URLs, or other data in NDEF records for transmission between NFC-enabled devices.
Bluetooth is a wireless technology that allows devices to connect and exchange data over short distances without wires. It was created in 1994 by the Swedish company Ericsson and standardized by the Bluetooth Special Interest Group in 1998. Bluetooth works using low-power wireless signals within a range of about 30 feet. It allows devices like mobile phones, headphones, computers and more to connect and share data like audio, contacts, and files without needing to be physically plugged together. Some common types of Bluetooth devices include dongles and headsets. While Bluetooth enables wireless connectivity, its disadvantages include a limited range and higher battery usage than wired connections.
Bluetooth is a wireless technology that allows devices to connect and exchange data over short distances without wires. It was developed in 1994 by the Swedish company Ericsson and was named after the 10th-century Danish king Harald Bluetooth who united Denmark and Norway. Bluetooth works by using low-power radio signals to within a range of about 30 feet. It transmits data between devices like mobile phones, headphones, laptops, and other electronic devices. Bluetooth provides wireless connectivity and mobility by allowing data transfer without cables between various devices.
Wireless Communication Technologies (WIFI ,Bluetooth , NFC )layth jasim
This document provides an overview and comparison of different wireless communication technologies, including WiFi, Bluetooth, and NFC. It defines each technology, describes their characteristics and operating standards. WiFi allows wireless internet access and uses IEEE 802.11 standards including 802.11b, 802.11g, and 802.11n. Bluetooth is a short-range technology for connecting devices like mobile phones and laptops. NFC uses magnetic field induction to transfer data over short ranges of less than 4 centimeters. The document lists advantages and disadvantages of each technology and their applications.
This document provides information about Bluetooth technology. It discusses how Bluetooth allows for wireless connectivity between devices within a short range of up to 10 meters. Key features of Bluetooth include wireless connectivity without cables, low power consumption, industry-wide support, and small device size. While Bluetooth provides wireless data transfer, it has limitations such as short range and low data transfer speeds. The document outlines how Bluetooth works using radio frequency transmissions and describes the technology's frequency-hopping technique. It explains common Bluetooth-enabled devices and the technology's uses across various industries. In conclusion, the document discusses factors for Bluetooth's success, including integration into consumer products and providing clear benefits to users.
This document discusses the history, advantages, need, implementation, current devices and future of wireless communication. It covers the evolution of wireless technologies from early cellular phones to modern Wi-Fi and Bluetooth, explaining how wireless networks have become essential due to their convenience and mobility compared to wired connections. The future of wireless communication looks to advance connectivity through emerging technologies.
Three wireless technologies are described: Bluetooth, Wi-Fi, and infrared. Bluetooth transfers data at short ranges using radio waves, Wi-Fi enables wireless networking using the IEEE 802.11 standards at speeds up to 1 Mbps for most devices, and infrared uses line-of-sight infrared radiation to transmit data between devices over short distances and with lower power and cost than Bluetooth or Wi-Fi but at slower speeds and requiring line-of-sight.
Bluetooth is a short-range wireless technology that allows electronic devices to connect and exchange information over short distances without wires. It was developed as an open standard for affordable, low-power connections between devices like mobile phones, laptops, PCs, printers, digital cameras and video game consoles. Bluetooth has advantages like wireless connectivity, easy setup, low power usage, and industry support. However, it also has disadvantages like a short range of around 30 feet, lower data rates compared to other wireless technologies, and higher costs. Bluetooth works by using small, low-cost radio frequency transceivers called chips that are embedded in devices and allow them to communicate over the 2.4GHz spectrum in a piconet configuration.
This document discusses local area networks (LANs). It defines personal area networks (PANs), LANs, metropolitan area networks (MANs), and wide area networks (WANs) based on their range and purpose. The advantages of LANs include enabling collaboration, reducing costs and increasing productivity, while disadvantages are potential malfunctions and security vulnerabilities. Typical LAN devices are network interface cards, printers, storage, routers, and other peripherals. Most networks use digital rather than analog signals for easier error detection. Data packets on a network travel with destination addresses and routing devices examine addresses to send packets to their destinations.
After the read, you will learn the characteristics of the 6 wireless protocols IEEE protocols: LoRa, NB-IoT, ZigBee, Wi-Fi, BLE, WiMax.
In the field of IoT, a wide range of communication technologies wireless protocols exist simultaneously. In terms of transmission distance, there are BLE, WI-FI, ZigBee, sub1G, etc., which are widely used in the context of local wireless networks, such as wearable, home, and enterprise applications.
This document discusses wireless personal area networks (WPANs) and some common WPAN technologies used within short distances of less than 5 meters. It describes Bluetooth, which was originally proposed in 1998 for short-range wireless applications between devices like phones and cameras. Bluetooth uses frequency hopping spread spectrum in the 2.4 GHz band. ZigBee is also discussed as dealing with very low data rates but long battery life for applications like wireless sensor networks.
iContact(Call Center Management System)
iContact is a full featured call centre solution with a complete suite of applications that addresses the medium and large enterprise segment.
4G refers to the fourth generation of wireless communications that provides converged wired and wireless networks supporting high-speed data transmission and multimedia applications. 4G became necessary as 3G may not be able to support future high-bandwidth applications like video conferencing. Key 4G technologies include MIMO smart antennas, IPv6, VoIP, OFDM, and software-defined radios. 4G aims to provide data rates of 100 Mbps for applications like video calling, online gaming, and telemedicine while using technologies like LTE and WiMAX that support seamless global roaming.
Wi-Fi, also known as 802.11 networking, uses radio waves to provide wireless internet access over distances of up to 100 feet. It allows devices to connect to a wireless network using Wi-Fi network cards or adapters. Wi-Fi networks rely on wireless access points that connect users to the internet and each other. Common standards like 802.11b, 802.11a, and 802.11g provide transmission speeds of up to 54 megabits per second for connectivity between devices using radio frequency technology.
A telecommunications network connects terminals, links, and nodes to enable telecommunication between users. It uses addresses to route messages or connections to the correct recipients. A telecommunications network consists of terminals, processors, channels, computers, and control software that work together to transmit and receive data.
Identifying How WAP Can Be Used For Secure mBusinessOliver Pfaff
The document discusses security technologies for the Wireless Application Protocol (WAP), including:
- WAP 1.0 and 2.0 protocol stacks and their use of WTLS and TLS for secure communication
- WTLS limitations and enhancements like WPKI, WAPCert, and TLS over HTTP in WAP 2.0
- Information security technologies like WMLScript Crypto and the Wireless Identity Module (WIM) for digital signatures and credential storage
A packet is a unit of data sent over the internet or network that is routed between an origin and destination. When a file is transmitted, the TCP layer divides it into chunks called packets that are individually numbered and routed. When all packets for a file arrive at their destination, they are reassembled into the original file. Local area networks connect computers and devices within an office or building through technologies like Ethernet or WiFi. Wireshark is a free and powerful network packet analyzer that allows inspection of network traffic at different levels to analyze security events and troubleshoot issues.
Location convenience is an important factor for customers when choosing a financial institution, as customers prefer banks that have branches or ATMs located near their home or work within 2 km. To increase convenience and competitiveness, banks aim to expand their branch and ATM networks, which can be done organically by building new locations or inorganically by acquiring existing networks from competitors or partners, though acquired networks may not complement existing networks perfectly due to coverage overlap.
M-commerce refers to mobile commerce or the use of mobile devices and wireless networks to conduct commerce transactions. Key activities include entertainment, information access, communication, and financial transactions. The growth of m-commerce is driven by increasing mobile connectivity worldwide and the benefits of ubiquity, reachability, convenience, and personalization for users. However, limitations like small screens, bandwidth constraints, and device capabilities present challenges. Standards like WAP and technologies aim to bridge mobile networks and the internet to support m-commerce applications and services.
The document discusses wireless communication technologies and protocols, including Wi-Fi, Bluetooth, and Wireless Application Protocol (WAP). It defines key terms like wireless clients and describes common wireless devices like smartphones, laptops, and smartwatches. The document also summarizes the WAP architecture and its layered design. It explains that WAP allows limited internet access from devices with low bandwidth and processing power, like early mobile phones, using protocols like WML and WSP.
Patton-Fuller Community Hospital has been providing medical care to the local community since 1975. As technology has advanced, the hospital now relies heavily on computer networks and digital systems. However, the hospital's current network infrastructure is outdated and in need of improvements to support modern medical equipment and ensure patient data security. Updating the network will require installing new wired and wireless networks, migrating systems to the cloud, and training staff on cybersecurity best practices. The goal is to implement a reliable and secure network to deliver high-quality care now and in the future.
Chp 6 infrastructure- the backbone of e-commerce techcheqala5626
The document discusses several key aspects of infrastructure that supports e-commerce technology:
1) Infrastructure requirements include the ability to build technology solutions, generate market demand, comply with regulations, and ensure interoperability.
2) The growth of computing infrastructure has exponentially increased processing power and data storage capacity over time.
3) Wireless infrastructure now enables many applications through technologies like RFID, wireless sensor networks, and cellular networks. This allows connectivity across distances without physical wires.
The document provides an overview of various wireless standards organizations and their standards including IEEE 802.11 Wi-Fi, IEEE 802.15 Bluetooth, IEEE 802.16 WiMAX, 3GPP for cellular networks, and discusses wireless network architectures, protocols like WAP and Mobile IP for mobility, and the future of seamless connectivity across different wireless technologies.
1. TCP/IP is the protocol used to break messages into packets and route them between mobile devices and networks using IP addresses and routers.
2. WAP allows users to access internet content and services on mobile devices by encoding requests and responses for transmission and decoding them on the other end.
3. The WAP architecture includes WAP devices, clients, servers, proxies, and gateways that allow mobile devices to communicate with the internet through wireless networks using protocols like WAP, WML, and WTA.
The document discusses the Internet of Things (IoT). It defines IoT as connecting physical objects to the internet and allowing them to transfer data without human interaction. It describes the different layers of an IoT architecture including sensors, gateways, management services, and applications. It also discusses some major challenges of IoT like big data, security, and power efficiency. Finally, it provides examples of IoT applications in various sectors like transportation, healthcare, agriculture, and retail.
The document discusses the Internet of Things (IoT). It defines IoT as a scenario where objects are provided identifiers and the ability to transfer data over a network without human interaction. It then describes the key layers of an IoT architecture including sensor, gateway, management, and application layers. It also outlines some major challenges of IoT like big data, security, and power efficiency. Finally, it discusses enabling technologies for IoT like RFID, sensors, and nanotechnology and provides examples of IoT applications in various sectors.
This document provides an overview of computer communication networks. It discusses the history of computer networking from the 1960s development of modems to connect computers over telephone lines. This allowed for the rapid expansion of local and wide area networks in the 1970s and 1980s. The document also describes different types of computer communication including email, chat, video chat, and VoIP phones. It defines key concepts like packets, packet headers, and routing in computer networks.
The document discusses the Wireless Application Protocol (WAP), which was developed to allow mobile devices like phones to access the internet. WAP defines a set of communication protocols to standardize how internet content can be adapted for narrowband mobile bearers. It enables applications and services to be accessed from any wireless terminal, including cell phones, pagers, two-way radios and smart phones. WAP uses Wireless Markup Language (WML) instead of HTML to optimize content for mobile screens.
WAP (Wireless Application Protocol) is a standard for accessing information on mobile devices like phones. It uses WML (Wireless Markup Language) instead of HTML. WAP has a layered architecture including application, session, security, transaction, and transport layers. It allows access to the internet from mobile devices in a standardized way and is supported by most phone manufacturers and wireless networks.
Embedded networking allows embedded systems to connect to sensors, actuators and each other over a network. It expands their capabilities and applications. Common networking options for embedded systems include CAN bus, I2C bus and Ethernet. Effective embedded networking requires selecting a protocol stack that meets requirements like memory, power and desired features while supporting functions like communication and data exchange. Embedded networking is important for connecting devices in applications like industrial control systems and the Internet of Things.
The document summarizes the key components of computer networks including hardware, software, protocols, networking models like client-server and peer-to-peer, local area networks (LANs), wide area networks (WANs), and the Ethernet standard for LANs. It discusses Ethernet frames, media access control (MAC) addressing, cabling, and transmission types.
This document provides an overview of computer networking and telecommunications. It discusses how networks allow hardware, software, and people to be connected. It describes the basic anatomy of networks, including network interface cards and modems. It also discusses different types of networks like local area networks and wide area networks. Additional topics covered include electronic mail, bulletin boards, teleconferencing, and emerging technologies like video conferencing and electronic funds transfer.
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
This document outlines learning objectives and concepts related to telecommunications and networking. It covers 13 key topics including understanding networks, Metcalfe's law, telecommunications trends, components of telecommunication networks, client/server networking, peer-to-peer networking, digital vs analog signals, transmission media, wireless technologies, TCP/IP, the OSI model, and more. Diagrams and examples are provided to explain concepts like intranets, extranets, routers, wireless technologies, and models like OSI and TCP/IP.
Similar to a-presentation-on-wireless-communication (20)
The document discusses the architecture and operation of wireless cellular networks. It covers topics like the cellular concept, frequency reuse, channel allocation strategies, capacity expansion techniques like cell splitting and sectoring, and mobility management functions. The key aspects are maximizing channel availability in an area through frequency planning and reuse, and techniques to increase network capacity as demand grows. Mobility management aims to provide continuous connectivity as users move between different areas of the network.
This document provides an overview of sonar technology. It discusses the history of sonar from its early developments in the late 19th/early 20th century to its modern applications. Key developments include Fessenden's early experiments in 1914, the creation of ASDIC by the British during WWI, and the transfer of technology between Britain and the US during WWII. The document also examines how sonar works using sound waves, and describes different sonar systems like active/passive sonar and side-scan/multi-beam sonar used for tasks like submarine detection, fishing, and seafloor mapping.
This document provides an overview of satellite communication systems. It discusses the need for satellites due to the curvature of the Earth, the different regions of space including low-Earth orbit (LEO), medium-Earth orbit (MEO), and geostationary orbit (GEO). It describes the basic components of a satellite system including satellites, ground stations, uplinks and downlinks. It also covers communication characteristics, advantages and disadvantages of satellite systems, and provides a historical overview of important milestones in satellite communication technology.
This document provides an overview of radio and satellite communication technologies. It discusses key topics such as radio propagation, signal characteristics, signal propagation ranges, antenna technology, the basics of how satellites work, different types of satellite orbits including GEO, LEO and MEO, factors that affect satellite communication, how satellites are used, and methods of capacity allocation like FDMA and TDMA. The document contains detailed information on these concepts through definitions, diagrams, and examples. It aims to educate the reader on the fundamentals of radio and satellite communication systems.
Satellite communications systems involve satellites orbiting Earth that relay signals between ground stations. The document discusses several key topics:
1. The types of satellites include communication, weather, navigation, military and scientific satellites. Different orbits are used including geostationary and polar orbits.
2. Satellite subsystems include power, communication, antenna and control subsystems. Earth stations have antenna, transmit, receive and power subsystems.
3. Satellites can route signals via transponders and techniques like frequency reuse increase channel capacity. Handovers allow signals to transfer between satellites or ground stations.
4. Applications include remote sensing, weather monitoring, global communications, navigation and space exploration. Satellite technology has many important
Satellite communication uses satellites in orbit around Earth to relay radio signals between Earth stations. There are three main types of satellite orbits - low Earth orbit (LEO), medium Earth orbit (MEO), and geosynchronous Earth orbit (GEO). Satellites have a payload that includes antennas and transponders to receive and transmit signals, and a bus that provides structure, power, and control. Common applications of satellite communication include satellite television broadcasting, internet access, telephony, and providing connectivity to remote areas.
A communication satellite receives radio signals from earth stations, amplifies them, and redirects them back to earth. It acts as a radio relay in space, allowing signals to be transmitted over greater distances than would be possible with terrestrial communication methods alone. A satellite's transponder receives uplink signals, amplifies them using a low-noise amplifier, down converts the frequency, filters it, amplifies it again using a power amplifier, and retransmits it back to earth on the downlink frequency. This allows the satellite to receive and redirect communications between various earth stations.
Radar uses radio waves to detect objects at a distance by transmitting pulses and measuring their reflection. It was developed for military use in World War 2 to locate ships and planes. There are two main types - pulse radar which measures distance using transit time of pulses, and continuous wave radar which relies on the Doppler effect. Radar has many applications including weather forecasting, air traffic control, and speed detection guns.
The document discusses the components and basic principles of radar. It explains that radar works by transmitting short bursts of radio signals and measuring the time it takes for those signals to reflect off objects and return. It identifies the three major components of radar as the scanner, transceiver, and indicator. The scanner rotates and transmits the radio signals, while the transceiver contains the transmitter and receiver. The indicator displays the objects detected by radar to help with navigation and collision avoidance. Basic radar components include a power supply, modulator, transmitter, and antenna system.
Radar uses radio waves to detect objects and determine their range, altitude, direction or speed. It works by transmitting pulses of radio waves which bounce off objects and return a portion of energy to the receiving antenna. Radar was developed in the 1930s-1940s and has two main types - pulse radar which uses pulse transmission and continuous wave radar which uses continuous transmission. Key components of radar systems include the transmitter, antenna, receiver and display. Factors like signal reception, bandwidth, power and beam width affect radar performance.
The document discusses the basic principles and components of pulse transmission and continuous wave radar systems. It describes how pulse radar determines range using pulse width, pulse repetition frequency, and time of return signals. Key components of pulse radar systems are identified as the synchronizer, transmitter, antenna, duplexer, receiver and display unit. Continuous wave radar relies on Doppler frequency shifts from moving targets and uses separate transmit and receive antennas. Modulation techniques for radar waves include amplitude, frequency, pulse-amplitude and pulse-frequency modulation. Factors that affect radar performance such as signal reception, bandwidth, power, beamwidth and signal-to-noise ratio are also covered.
Cellular communication allows for wireless communication as users travel within a city or between cities. It works by dividing geographic areas into cells served by low-power base stations. Each user is assigned a temporary radio channel to communicate with the local base station. As the user moves between cells, the channel is handed off to the new base station. A cellular system consists of cells managed by base stations, a switching office to connect calls to the public network, and mobile subscriber units used by customers.
This document provides an overview of mobile communication and cellular technologies. It begins with learning objectives which are to refresh basics of cellular technologies, understand functioning in a cellular environment, and explain technical aspects of cellular telecommunications. The document then outlines the course agenda which will cover topics like access methods, multiple access techniques, mobile services, evolution of cellular communication standards like GSM and CDMA, cellular networks, and wireless data technologies. It dives into concepts like electromagnetic waves, frequency division multiple access, time division multiple access, duplexing, cellular architecture with frequency reuse, and elements of mobile communication systems.
The document discusses the growth of cellular networks worldwide and in Pakistan. It provides statistics on the rising number of mobile subscribers globally, with Asia Pacific projected to account for half of all subscribers by the end of the decade. It then describes key components of cellular networks including mobile phones, base stations, mobile switching centers, and the use of frequency reuse to increase network capacity by dividing coverage areas into cells and assigning different frequency groups to adjacent cells.
The document provides an overview of cellular mobile communications including:
1) The historical development from isolated mobile systems to modern cellular networks with handoff capabilities and connections to public networks.
2) The key components of a cellular system including mobile stations, base transceiver stations, base station controllers, and mobile switching centers.
3) How the cellular concept enables frequency reuse through the use of lower power transmissions in smaller coverage areas called cells, allowing the same frequencies to be reused in separated cells.
Arduino is an open-source hardware and software platform for building electronics projects. It provides a simple environment for writing code to control sensors, actuators and other inputs/outputs. The Arduino platform includes affordable microcontroller boards, and a development environment that uses a simplified version of C/C++ to write code. This allows projects to sense and control the physical world through inputs like light, motion and temperature, and outputs like motors, lights and displays.
The document provides an overview of Arduino, describing it as an open-source physical computing platform consisting of a programmable integrated circuit board and integrated development environment. It can be used for physical computing projects, interactive installations, and rapid prototyping. The document outlines what Arduino can do, including interacting with sensors to detect inputs and actuators to produce outputs. It explains how to get started with Arduino by obtaining a board, learning the programming language based on C/C++, and uploading simple programs to control outputs like LEDs. A pushbutton example circuit is demonstrated.
The document discusses Arduino, an open-source hardware and software system for building electronics projects. It describes Arduino boards, which use AVR microcontrollers and can be programmed with a simplified version of C/C++. Arduino makes microcontrollers easy to use through an open development environment and standardized hardware/software components. A variety of Arduino boards and shields are available to add functionality like Ethernet, Bluetooth, and more. Alternative platforms like BascomAVR are also presented.
The document discusses the history and development of microprocessors and microcontrollers. It defines a microprocessor as a CPU integrated onto a single chip that serves as the central component of modern computers. Microcontrollers are similar but integrated with additional components like memory and I/O ports to control embedded systems. The first microprocessor was conceived in 1969 at Intel to power programmable calculators, and the first device was delivered in 1971. Microcontrollers were first created in 1971 and commercialized in 1974 to integrate all components needed to control a device. Modern microprocessors and microcontrollers now power many electronic devices from appliances to vehicles to cell phones.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
New techniques for characterising damage in rock slopes.pdf
a-presentation-on-wireless-communication
1.
2. What Is Wireless Communication ?
Wireless communication is the
transfer of information over a
distance without the use of electrical
conductors or "wires".
The distances involved may be
short (a few meters as in television
remote control) or long (thousands or
millions of kilometers for radio
communications).
When the context is clear, the term
is often shortened to "wireless".
Wireless communication is generally
considered to be a branch of
telecommunications.
3. It encompasses various types of fixed, mobile, and portable
two way radios, cellular telephones, personal digital assistants
(PDAs), and wireless networking.
Other examples of wireless technology include GPS units,
garage door openers and or garage doors, wireless computer
mice, keyboards and headsets, satellite television and cordless
telephones.
4. History
The term "Wireless" came into public use to
refer to a radio receiver or transceiver
(a dual purpose receiver and transmitter
device).
Establishing its usage in the field of wireless
telegraphy early on; now the term is used to
describe modern wireless connections such as
in cellular networks and wireless broadband
Internet.
It is also used in a general sense to refer to
any type of operation that is implemented
without the use of wires, such as "wireless
remote control" or "wireless energy transfer",
regardless of the specific technology that is
used to accomplish the operation
Examples - radio, infrared, ultrasonic.
5. WHATIS WAP ?
The wireless industry came up with the idea of
WAP. The point of this standard was to show
internet contents on wireless clients, like
mobile phones.
WAP stands for Wireless Application Protocol.
WAP is an application communication protocol.
WAP is used to access services and information.
WAP is inherited from Internet standards.
WAP is for handheld devices such as mobile phones.
WAP is a protocol designed for micro browsers.
WAP enables the creating of web applications for mobile devices.
WAP uses the mark-up language WML (not HTML).
WML is defined as an XML 1.0 application.
6. TheWirelessApplicationProtocol
WAP is published by the WAP Forum, founded in 1997
by Ericsson, Motorola, Nokia, and Unwired Planet.
Forum members now represent over 90% of the global
handset market, as well as leading infrastructure
providers, software developers and other organizations.
The WAP protocol is the leading standard for
information services on wireless terminals like digital
mobile phones.
The WAP standard is based on Internet standards
(HTML, XML and TCP/IP).
It consists of a WML language specification, a
WMLScript specification, and a Wireless Telephony
Application Interface (WTAI) specification.
7. what happens when you access a Website using a WAP-enabled device :-
You turn on the device and open the minibrowser.
The device sends out a radio signal, searching for service.
A connection is made with your service provider.
You select a Web site that you wish to view.
A request is sent to a gateway server using WAP.
The gateway server retrieves the information via HTTP from the Web
site.
The gateway server encodes the HTTP data as WML.
The WML-encoded data is sent to your device.
You see the wireless Internet version of the Web page you selected.
8. What happens between the gateway and the client relies on features of
different parts of the WAP protocol stack :-
WAE - The Wireless Application Environment
holds the tools that wireless Internet content
developers use. These include WML and WMLScript,
which is a scripting language used in conjunction
with WML. It functions much like JavaScript.
WSP - The Wireless Session Protocol determines
whether a session between the device and the
network will be connection-oriented or
connectionless.
WTP - The Wireless Transaction Protocol acts
like a traffic cop, keeping the data flowing in a
logical and smooth manner. It also determines how
to classify each transaction request:
Reliable two-way
Reliable one-way
Unreliable one-way
9. What happens between the gateway and the client relies on features of
different parts of the WAP protocol stack :-
WTLS - Wireless Transport Layer Security
provides many of the same security features found
in the Transport Layer Security (TLS) part of
TCP/IP. It checks data integrity, provides
encryption and performs client and server
authentication.
WDP - The Wireless Datagram Protocol works in
conjunction with the network carrier layer . WDP
makes it easy to adapt WAP to a variety of bearers
because all that needs to change is the information
maintained at this level.
Network carriers - Also called bearers, these
can be any of the existing technologies that
wireless providers use, as long as information is
provided at the WDP level to interface WAP with
the bearer.
10. Examples of WAP use
Checking train table information.
Ticket purchase.
Flight check in.
Viewing traffic information.
Checking weather conditions.
Looking up stock values.
Looking up phone numbers.
Looking up addresses.
Looking up sport results.
11. What is WML?
WML stands for Wireless Markup Language. It is a mark-up language
inherited from HTML, but WML is based on XML, so it is much stricter
than HTML.
WML is used to create pages that can be displayed in a WAP browser.
Pages in WML are called DECKS. Decks are constructed as a set of
CARDS.
12. What is WMLScript ?
WML uses WMLScript to run
simple code on the client.
WMLScript is a light JavaScript
language.
WML scripts are not embedded in
the WML pages.
WML pages only contains
references to script URLs.
WML scripts need to be compiled
into byte code on a server before
they can run in a WAP browser.
13. TYPES OF WIRELESS COMMUNICATION
Wi-Fi wireless
Bluetooth wireless
IrDA (Infrared Data Association)
PC card (also known as PCMCIA)
USB cable
Radio
14. Meaning of PC card or PCMCIA
Card types
Type I
Type II
Type III
Type IV
Card Information Structure
Card Bus
Card Bay
Descendants and variants
Technological obsolescence
A PC Card network adapter
Contents
PC card(also known as PCMCIA)
15. PC card
(also known as PCMCIA)
PCMCIA stands for Personal Computer Memory Card
International Association, the group of industry-leading
companies that defines and develops the standard.
While this acronym did clearly describe the original intentions
of the organization's standard, it was difficult to say and
remember, and was sometimes jokingly referred to as "People
Can't Memorize Computer Industry Acronyms".
To aid in the widespread marketing and branding of the
standard, and to account for the standard's widening scope
(beyond just memory cards), the association acquired the rights
to the simpler term "PC Card" from IBM, and began using it,
rather than "PCMCIA", from version 2 of the specification
onwards.
A PC Card network adapter
Meaning of PC card or PCMCIA :-
16. Card types
All PC Card devices use an identical 68 pin dual row connecting
interface.
All are 85.6 mm long and 54.0 mm wide.
This is the same size as a credit card. The form factor is also used by
the Common Interface form of Conditional Access Modules for DVB
broadcasts.
Two PC Card devices: Xircom Real Port
(top) type III and 3Com (bottom) type II.
Type I
Cards designed to the original specification
(version 1.x) are type I and feature a 16-bit
interface.
They are 3.3 mm thick.
Type-I PC Card devices are typically used
for memory devices such as RAM, flash
memory, OTP, and SRAM cards.
17. Type II
Type-II PC Card devices feature a 16- or 32-bit interface.
They are 5.0/5.5 mm thick.
Type-II cards introduced I/O support, allowing devices to attach an
array of peripherals or to provide connectors/slots to interfaces for
which the host computer had no built-in support.
For example, many modem, network and TV cards use this form
factor.
Due to their thinness, most Type II interface cards feature miniature
interface connectors on the card which are used together with a
dongle: a short cable that adapts from the card's miniature connector
to an external full-size connector.
Some cards instead have a lump on the end with the connectors.
This is more robust and convenient than a separate adaptor but can
block the other slot where slots are present in a pair.
A PC Card network adapter
18. Type III
Type-III PC Card devices are 16-bit or 32-bit.
These cards are 10.5 mm thick, allowing them to accommodate
devices with components that would not fit type I or type II height.
Examples are hard disk drive cards, and interface cards with full-
size connectors that do not require dongles (as is commonly
required with type II interface cards).
Type IV
Type-IV cards, introduced by Toshiba, have not been officially
standardized or sanctioned by the PCMCIA.
These cards are 16 mm thick.
A PC Card network adapter
19. A PC Card network adapter
Card Information Structure
The Card Information Structure (CIS) is information stored on a PC
card that contains information about the formatting and organization
of the data on the card.
The CIS also contains information about:
The type of card
Supported power supply options
Supported power saving features
The manufacturer
Model number
and so on.
When a card is unrecognized it is frequently because the CIS
information is either lost or damaged.
Card Information Structure (CIS)
20. A PC Card network adapter
Card Bus
Two Xircom Real Port Ethernet/56k
modem cards. Top one is Card Bus,
and the bottom is the 5 volt PCMCIA
version. Note the slightly different
notch.
Card Bus are PCMCIA 5.0 or later (JEIDA 4.2 or
later) 32-bit PCMCIA devices, introduced in 1995
and present in laptops from late 1997 onward.
Card Bus is effectively a 32-bit, 33 MHz PCI
bus in the PC Card form factor.
Card Bus includes bus mastering, which allows
a controller on the bus to talk to other devices or
memory without going through the CPU.
Many chipsets are available for both PCI and
Card Bus, such as those that support Wi-Fi.
The speed of Card Bus interfaces in 32 bit
burst mode depends on the transfer type; in
byte mode it is 33 MB/s, in Word mode it is 66
MB/s, and in DWord mode it is 132 MB/s.
21. A PC Card network adapter
Two Xircom Real Port Ethernet/56k
modem cards. Top one is Card Bus,
and the bottom is the 5 volt PCMCIA
version. Note the slightly different
notch.
The notch on the left hand front of the device
is slightly shallower on a Card Bus device, so a
32-bit device cannot be plugged into a slot that
can only accept 16-bit devices.
Most new slots are compatible with both Card
Bus and the original 16-bit PC Card devices.
Card bus cards have a gold band with eight
small studs on the top of the card next to the pin
sockets, which is not present in earlier models.
Card Bus
22. A PC Card network adapter
Card Bay
Card Bay is a variant added to the
PCMCIA specification in 2001.
This was intended to add some
forward compatibility with USB and IEEE
1394, but was not universally adopted
and only some notebooks have PC Card
controllers with Card Bay features.
The PC Card bay when in use
23. A PC Card network adapter
Descendants
Descendants and variants
The interface has spawned a generation
of flash memory cards that set out to
improve on the size and features of Type I
cards:
Compact Flash
Mini Card
Smart Media
For example - The PC Card electrical
specification is also used for Compact Flash,
so a PC Card Compact Flash adapter need
only be a socket adapter.
Compact Flash Mini Card Smart Media
socket adapter
24. A PC Card network adapter
Express Card is a later specification from the
PCMCIA, intended as a replacement for PC Card,
built around the PCI Express and USB 2.0
standards.
The PC Card standard is closed to further
development and PCMCIA strongly encourages
future product designs to utilize the Express Card
interface.
As of 2007, the majority of laptops now ship with
only Express Card slots or neither slot type (leaving
expansion to USB and Fire wire only), though the
Lenovo ThinkPad T60 and Z60m, among other
models, currently ships with both Card Bus and
Express Card slots.
variants
Fire wire Fire wire Variants
Express Card
USB
25. Express Card and Card Bus sockets are
physically and electrically incompatible.
A simple mechanical adapter between the
two formats is infeasible.
Several companies now produce Express
Card-to-Card Bus and Card bus-to-Express
Card adapters that use a secondary slot to
allow older cards to work with newer PCs and
vice versa.
A PC Card network adapter
Express Card and Card Bus
26. Technological obsolescence
A PC Card network adapter
Fire wire and USB devices are available for almost all
functions that the PC Card interface was used for in the
past, although it retains the advantage of containing
devices entirely or almost entirely inside the case of the
portable device.
This can be an important consideration for portable
systems, where additional external peripherals and their
associated cables, space, and sometimes additional
power supplies can reduce portability and convenience.
Even in this case Express Card devices have the same
advantages as PC Card devices, with additional
bandwidth & functionality.
On the other hand many devices do not need the
speed of PCI Express, and often PC Card devices with
adequate performance can be found cheaply, as
discounted new parts or on the used components
market, and will suffice for many users' purposes.
27. IrDA(Infrared Data Association)
Infrared Data Association Logo
Contents
Meaning of Infrared Data
Association
Specifications
1.IrPHY
2.IrLAP
3.IrLMP
4.Tiny TP
5.IrCOMM
6.IrOBEX
7.IrLAN
8.IrSimple
9.IrSimpleShot
Popularity
28. IrDA(Infrared Data Association)
Infrared Data Association logo
The Infrared Data Association (IrDA) defines physical specifications
communications protocol standards for the short-range exchange of data
over infrared light, for uses such as personal area networks (PANs).
IrDA is a very short-range example of free space optical communication.
IrDA interfaces are used in medical instrumentation, test and
measurement equipment, palmtop computers, mobile phones, and laptop
computers (most laptops and phones also offer Bluetooth but it is now
becoming more common for Bluetooth to simply replace IrDA in new
versions of products).
IrDA specifications include IrPHY, IrLAP, IrLMP, IrCOMM, Tiny TP, IrOBEX,
IrLAN and IrSimple. IrDA has now produced another standard, IrFM, for
Infrared financial messaging (i.e., for making payments) also known as
"Point & Pay".
For the devices to communicate via IrDA they must have a direct line of
sight similar to a TV remote control.
Meaning of Infrared Data Association :-
29. Infrared Data Association logo
1.IrPHY(InfraredPhysicalLayerSpecification)
Specifications
The mandatory IrPHY (Infrared Physical Layer Specification) is the lowest
layer of the IrDA specifications. The most important specifications are:-
Range : standard 1 m
Low power to low power : 0.2 m
Standard to low power : 0.3 m
Angle : minimum cone ±15°
Speed : 2.4 Kbit/s to 16 Mbit/s
Modulation : baseband
30. Infrared Data Association logo
IrDA transceivers communicate with infrared pulses
in a cone that extends minimum 15 degrees half angle
off center.
The IrDA physical specifications require that a
minimum irradiance be maintained so that a signal is
visible up to a meter away.
The specifications require that a maximum irradiance
not be exceeded so that a receiver is not overwhelmed
with brightness when a device comes close.
In practice, there are some devices on the market
that do not reach one meter, while other devices may
reach up to several meters.
There are also devices that do not tolerate extreme
closeness.
The typical sweet spot for IrDA communications is
from 5 to 60 cm (2.0 to 24 in) away from a
transceiver, in the center of the cone.
31. Infrared Data Association logo
2. IrLAP(Infrared Link Access Protocol)
The mandatory IrLAP (Infrared Link Access Protocol) is the second layer
of the IrDA specifications. It lies on top of the IrPHY layer and below
the IrLMP layer. It represents the Data Link Layer of the OSI model.
The most important specifications are:
Access control
Discovery of potential communication partners
Establishing of a reliable bidirectional connection
Distribution of the Primary/Secondary device roles
Negotiation of QoS Parameters
On the IrLAP layer the communicating devices are divided into a
Primary Device and one or more Secondary Devices.
The Primary Device controls the Secondary Devices. Only if the
Primary Device requests a Secondary Device to send is it allowed to do
so.
32. Infrared Data Association logo
3.IrLMP(Infrared Link Management Protocol)
The mandatory IrLMP (Infrared Link Management
Protocol) is the third layer of the IrDA
specifications.
It can be broken down into two parts. First, the
LM-MUX (Link Management Multiplexer) which lies
on top of the IrLAP layer. Its most important
achievements are:
Provides multiple logical channels
Allows change of Primary/Secondary devices
Second, the LM-IAS (Link Management
Information Access Service), which provides a list,
where service providers can register their services
so other devices can access these services via
querying the LM-IAS.
33. Infrared Data Association logo
4.Tiny TP(Tiny Transport Protocol)
The optional Tiny TP (Tiny Transport
Protocol) lies on top of the IrLMP layer. It
provides:
Transportation of large messages by
SAR (Segmentation and Reassembly)
Flow control by giving credits to every
logical channel
34. Infrared Data Association logo
The optional IrCOMM
(Infrared Communications Protocol) lets the
infrared device act like either a serial or
parallel port.
It lies on top of the IrLMP layer.
5. IrCOMM(Infrared Communications
Protocol)
Using IrCOMM to Replace a NULL Serial
Cable
35. Infrared Data Association logo
The optional IrOBEX (Infrared Object
Exchange) provides the exchange of arbitrary
data objects
For Example - vCard, vCalendar or even
applications between infrared devices.
It lies on top of the Tiny TP protocol, so Tiny
TP is mandatory for IrOBEX to work.
6. IrOBEX (Infrared ObjectExchange)
36. Infrared Data Association logo
The optional IrLAN (Infrared Local Area
Network) provides the possibility to
connect an infrared device to a local area
network. There are three possible
methods:
Access Point
Peer to Peer
Hosted
As IrLAN lies on top of the Tiny TP
protocol, the Tiny TP protocol must be
implemented for IrLAN to work.
7. IrLAN(Infrared Local AreaNetwork)
CVIS uses a range of communication
technologies including mobile cellular and
wireless local area networks, short-range
microwave and infrared to ensure that
drivers avoid congestion
37. Infrared Data Association logo
IrSimple achieves at least 4 to 10
times faster data transmission speeds
by improving the efficiency of the
infrared IrDA protocol.
A normal picture from a cell phone
can be transferred within 1 second.
8. IrSimple
38. Infrared Data Association logo
One of the primary targets of
IrSimpleShot(IrSS) is to allow the millions
of IrDA-enabled camera phones to
wirelessly transfer pictures to printers,
printer kiosks, flat panel TV's.
9. IrSimpleShot (IrSS)
FIR Transceivers help Implement
IrSimpleShot(TM) protocol
39. Infrared Data Association logo
Popularity
IrDA was popular on laptops and some desktops during the
late 90s through the early 2000s.
It has been displaced by other wireless technologies such as
Wi-Fi and Bluetooth, favored because they don't need a direct
line of sight, and can therefore support hardware such as mice
and keyboards.
It is still used in some environments where interference makes
radio-based wireless technologies unusable.
IrDA popularity is making a comeback with its highly efficient
IrSimple protocols by providing sub 1 second transfers of
pictures between cell phones, printers, and display devices.
IrDA hardware is still less expensive and doesn't share the
same security problems encountered with wireless technologies
such as Bluetooth.
40. Bluetooth wireless
Bluetooth Logo
Contents
Meaning of Bluetooth
Origin of the Bluetooth logo
Implementation
Uses
41. The word Bluetooth is an anglicized
version of Old Norse Blátönn or Danish
Blåtand, the name of the tenth-century
king Harald I of Denmark and Norway, who
united dissonant Scandinavian tribes into a
single kingdom.
The implication is that Bluetooth does the
same with communications protocols,
uniting them into one universal standard
Meaning of Bluetooth :-
Bluetooth wireless
A typical Bluetooth mobile phone headset.
Bluetooth Logo
42. Bluetooth Logo
Originof theBluetoothlogo
The Bluetooth logo design merges the
Germanic runes analogous to the modern
Latin letters H and B : (for Harald
Bluetooth ) (Hagall) and (Berkanan)
merged together, forming a bind rune.
A Bluetooth USB dongle with a 100m range.
43. Bluetooth Logo
Implementation
Bluetooth uses a radio technology called frequency-hopping spread
spectrum, which chops up the data being sent and transmits chunks
of it on up to 79 frequencies.
In its basic mode, the modulation is Gaussian frequency-shift
keying (GFSK). It can achieve a gross data rate of 1 Mb/s.
Bluetooth provides a way to connect and exchange information
between devices such as mobile phones, telephones, laptops,
personal computers, printers, Global Positioning System (GPS)
receivers, digital cameras, and video game consoles through a
secure, globally unlicensed Industrial, Scientific and Medical (ISM) 2.4
GHz short-range radio frequency bandwidth.
The Bluetooth specifications are developed and licensed by the
Bluetooth Special Interest Group (SIG). The Bluetooth SIG consists of
companies in the areas of telecommunication, computing, networking,
and consumer electronics.
44. Bluetooth Logo
Uses
Bluetooth is a standard and communications protocol primarily
designed for low power consumption, with a short range (power-class-
dependent: 1 meter, 10 meters, 100 meters) based on low-cost
transceiver microchips in each device.
Bluetooth makes it possible for these devices to communicate with
each other when they are in range. Because the devices use a radio
(broadcast) communications system, they do not have to be in line of
sight of each other.
Class Maximum Permitted Power Range(approximate)
mW (dBm)
Class 1 100 mW (20 dBm) ~100 meters
Class 2 2.5 mW (4 dBm) ~10 meters
Class 3 1 mW (0 dBm) ~1 meter
45. Bluetooth Logo
In most cases the effective range of class 2 devices is
extended if they connect to a class 1 transceiver,
compared to a pure class 2 network.
This is accomplished by the higher sensitivity and
transmission power of Class 1 devices.
Version Data Rate
Version 1.2 1 Mbit/s
Version 2.0 + EDR 3 Mbit/s
WiMedia Alliance
(proposed) 53 - 480 Mbit/s
A typical Bluetooth USB dongle
An internal notebook Bluetooth card (14×36×4 mm)Nokia BH-208 headset internals
47. Wi-Fi logo
Wi-Fi is a trademark of the Wi-Fi Alliance for
certified products based on the IEEE 802.11
standards (also called Wireless LAN (WLAN) and Wi-
Fi).
This certification warrants interoperability between
different wireless devices.
The term Wi-Fi often is used by the public as a
synonym for wireless Internet (WLAN); but not every
wireless Internet product has a Wi-Fi certification,
which may be because of certification costs that must
be paid for each certified device type.
Wi-Fi is supported by most personal computer
operating systems, many game consoles, laptops,
smartphones, printers, and other peripherals
Meaning of Wi-Fi wireless :-
Wi-Fi wireless
48. Wi-Fi logo
History
Half-size ISA 2.4 GHz WaveLAN card
by AT&T
Wi-Fi uses both single carrier direct-
sequence spread spectrum radio technology
(part of the larger family of spread spectrum
systems) and multi-carrier OFDM (Orthogonal
Frequency Division Multiplexing) radio
technology.
The regulations for unlicensed spread
spectrum enabled the development of Wi-Fi,
its onetime competitor HomeRF, Bluetooth,
and many other products such as some types
of cordless telephones.
Unlicensed spread spectrum was first made available in the US by
the Federal Communications Commission in 1985 and these FCC
regulations were later copied with some changes in many other
countries enabling use of this technology in all major countries.
The FCC action was proposed by Michael Marcus of the FCC staff
in 1980 and the subsequent regulatory action took 5 more years.
49. Wi-Fi logo
It was part of a broader proposal to allow civil
use of spread spectrum technology and was
opposed at the time by main stream equipment
manufacturers and many radio system
operators.
The precursor to Wi-Fi was invented in 1991
by NCR Corporation/AT&T (later Lucent &
Agere Systems) in Nieuwegein, the
Netherlands.
It was initially intended for cashier systems;
the first wireless products were brought on
the market under the name WaveLAN with
speeds of 1 Mbit/s to 2 Mbit/s. Vic Hayes, who
held the chair of IEEE 802.11 for 10 years and
has been named the 'father of Wi-Fi,' was
involved in designing standards such as IEEE
802.11b, and 802.11a.
A keychain size Wi-Fi detector
50. Wi-Fi logo
Uses
A Wi-Fi antenna
A Wi-Fi enabled device such as a PC, game
console, mobile phone, MP3 player or PDA can
connect to the Internet when within range of a
wireless network connected to the Internet.
The coverage of one or more interconnected
access points — called a hotspot — can
comprise an area as small as a single room
with wireless-opaque walls or as large as many
square miles covered by overlapping access
points.
Wi-Fi technology has served to set up mesh
networks, for example, in London.
Both architectures can operate in community
networks.
A roof mounted Wi-Fi antenna
51. Wireless USB Logo
USBcable
(Universal Serial Bus)
Original USB Logo
Contents
Meaning of USB
History
Device classes
1. USB mass-storage
2. Human-interface devices (HIDs)
Types of USB connector
1. USB-A.
2. USB-B.
3. Mini and micro.
4. USB OTG Sockets: Mini-AB, Micro-AB.
5. Proprietary connectors and formats.
Uses
52. Original USB Logo
USBcable
(Universal Serial Bus)
Meaning of USB :-
In information technology, Universal Serial Bus
(USB) is a serial bus standard to connect devices to a
host computer.
USB was designed to allow many peripherals to be
connected using a single standardized interface
socket and to improve plug and play capabilities by
allowing hot swapping; that is, by allowing devices to
be connected and disconnected without rebooting the
computer or turning off the device.
Other convenient features include providing power
to low-consumption devices, eliminating the need for
an external power supply; and allowing many devices
to be used without requiring manufacturer-specific
device drivers to be installed.
The USB trident logo
A USB Series “A” plug, the most
common USB plug
53. Original USB Logo
History
The USB 1.0 specification was introduced in 1994.
USB was created by the core group of companies that consisted of
Intel, Compaq, Microsoft, Digital, IBM, and Northern Telecom.
Intel produced the UHCI host controller and open software stack;
Microsoft produced a USB software stack for Windows and co-authored
the OHCI host controller specification with National Semiconductor and
Compaq; Philips produced early USB-Audio; and TI produced the most
widely used hub chips.
USB was intended to replace the multitude of connectors at the back of
PCs, as well as to simplify software configuration of communication
devices.
The USB 2.0 specification was released in April 2000 and was
standardized by the USB-IF at the end of 2001.
Hewlett-Packard, Intel, Lucent (now LSI Corporation since its merger
with Lucent spinoff Agere Systems), Microsoft, NEC, and Philips jointly
led the initiative to develop a higher data transfer rate, 480 Mbit/s, than
the 1.0 specification of 12 Mbit/s.
54. Original USB Logo
The USB 3.0 specification was
released on November 17, 2008 by
the USB 3.0 Promoter Group.
It has a transfer rate of up to 10
times faster than the USB 2.0 version
and has been dubbed the Super
Speed USB.
Equipment conforming with any
version of the standard will also work
with devices designed to any previous
specification (a property known as
backward compatibility).
A conventional USB hub.
Vodafone 3G USB modem
55. Original USB Logo
Deviceclasses
USB defines class codes used to identify a device’s functionality and to
load a device driver based on that functionality. This enables a device
driver writer to support devices from different manufacturers that
comply with a given class code.
Device classes include:
Class Usage Description Examples
00h Device Unspecified (Device class is unspecified.
Interface descriptors are used
for determining the required
drivers.)
01h Interface Audio Speaker, microphone, sound
card
56. Class Usage Description Examples
02h Both Communications
and CDC Control
Ethernet adapter, modem,
serial port adapter
03h Interface Human Interface
Device (HID)
Keyboard, mouse, joystick
05h Interface Physical Interface
Device (PID)
Force feedback joystick
06h Interface Image Webcams
07h Interface Printer Laser printer, Inkjet printer
08h Interface Mass Storage USB flash drive, memory card
reader, digital audio player,
digital camera, external drives
09h Device USB hub Full speed hub, hi-speed hub
0Ah Interface CDC-Data (This class is used together
with class 02h -
Communications and CDC
Control.)
57. Original USB Logo
1. USBmass-storage
USB implements connections to storage devices using a set of
standards called the USB mass storage device class (referred to
as MSC or UMS).
This was initially intended for traditional magnetic and optical
drives, but has been extended to support a wide variety of
devices, particularly flash drives.
This generality is because many systems can be controlled
with the familiar idiom of file manipulation within directories
(The process of making a novel device look like a familiar device
is also known as extension).
Though most newer computers are capable of booting off USB Mass
Storage devices, USB is not intended to be a primary bus for a
computer's internal storage: buses such as ATA (IDE), Serial ATA
(SATA), and SCSI fulfill that role.
However, USB has one important advantage in that it is possible to
install and remove devices without opening the computer case.
58. Original USB Logo
Originally conceived and still used today for optical
storage devices (CD-RW drives, DVD drives, etc.), a
number of manufacturers offer external portable USB
hard drives, or empty enclosures for drives, that offer
performance comparable to internal drives[citation
needed].
These external drives usually contain a translating
device that interfaces a drive of conventional
technology (IDE, ATA, SATA, ATAPI, or even SCSI) to
a USB port.
Functionally, the drive appears to the user just like
an internal drive.
Other competing standards that allow for external
connectivity are eSATA and FireWire.
Another use for USB Mass Storage devices is the
portable execution of software applications without the
need of installation on the host computer,e.g. Web
Browser, VoIP, etc.
A flash drive, a typical USB
mass-storage device.
59. Original USB Logo
2. Human-interface devices(HIDs)
Mice and keyboards are frequently fitted
with USB connectors, but because most PC
motherboards still retain PS/2 connectors
for the keyboard and mouse as of 2007,
they are often supplied with a small USB-
to-PS/2 adaptor, allowing usage with
either USB or PS/2 interface.
There is no logic inside these adaptors:
they make use of the fact that such HID
interfaces are equipped with controllers
that are capable of serving both the USB
and the PS/2 protocol, and automatically
detect which type of port they are plugged
into.
Joysticks, keypads, tablets and other
human-interface devices are also
progressively migrating from MIDI, PC
game port, and PS/2 connectors to USB.
INTERFACE
CABLES
60. Original USB Logo
Types of USB connector : -
1. USB-A
The Standard-A type of USB connector takes on
the appearance of a flattened rectangle that plugs
into downstream-port sockets on the USB host or a
hub and receives power.
This kind of connector is most frequently seen on
cables that are permanently attached to a device,
such as one on a cable that connects a keyboard or
mouse to the computer.
Different types of USB
connectors from left to right
• 8-pin AGOX connector
• Mini-B plug
• Type B plug
• Type A receptacle
• Type A plug
61. Original USB Logo
2. USB-B
Standard-B connectors—which
have a square shape with beveled
exterior corners—typically plug into
upstream sockets on devices that use
a removable cable, e.g. between a
hub and a printer.
Type B plugs deliver power and are
therefore analogous to a power
socket.
This two-connector scheme
prevents a user from accidentally
creating a loop.
Pin configuration of the USB
connectors Standard A/B, viewed from
face of plug
62. Original USB Logo
3. Mini and micro
Various connectors have been used
for smaller devices such as PDAs,
mobile phones or digital cameras.
These include the now-
deprecated(but standardized) Mini-A
and the current standard Mini-B,
Micro-A, and Micro-B connectors.
The Mini-A and Mini-B plugs are
approximately 3 by 7 mm.
While the Micro plugs have a
similar width but approximately half
the thickness, enabling their
integration into thinner portable
devices.
Schematic diagram of Standard,
Mini, and Micro USB receptacles.
63. Original USB Logo
4. USB OTGSockets: Mini-AB,Micro-AB
Except for special standard-to-Mini-A and
standard-to-Micro-A adapters, USB cables always
have an A-connector and a B-connector, on opposite
ends.
A-connectors can always connect to A-sockets; B-
connectors can always connect B-sockets.
These sockets all come in standard, mini, and
micro versions.
For USB On-The-Go (or 'OTG') support for another socket type is
defined: the AB, in both mini and micro versions.
It can accept both A and B connector, through careful mechanical
design.
OTG software detects the difference by use of the ID pin, which is
grounded in A-connectors and is otherwise floating.
64. Original USB Logo
When a B-connector is used, the socket
consumes VBUS power and starts in the peripheral
or device role.
OTG allows those two roles to be switched by
software, as needed for the task at hand.
When an A-connector is connected to an AB
socket, the socket supplies VBUS power to the
cable and starts in the host role.
Type A and Type B
USB Plugs and Sockets
65. Original USB Logo
5. Proprietary connectors andformats
Microsoft's original Xbox game console uses
standard USB 1.1 signaling in its controllers and
memory cards, but features proprietary connectors
and ports.
IBM UltraPort uses standard USB signaling, but via
a proprietary connection format.
American Power Conversion uses USB signaling
and HID device class on its uninterruptible power
supplies using 10P10C connectors.
HTC manufactures Windows Mobile-based
Communicators and the T-Mobile G1 which have a
proprietary connector called HTC ExtUSB.
The ExtUSB combines mini-USB (with which it is
backwards-compatible) with audio/video input and
output in an 11-pin connector.
ExtUSB
66. Original USB Logo
Nokia includes a USB connection as
part of the Pop-Port connector on
some older mobile phone models.
The second- and third-generation
iPod Shuffle use a TRS connector to
carry USB, audio, or power signals.
Iriver added a fifth power pin
within USB-A plugs for higher power
and faster charging, used for the
iriver U10 series.
A mini-USB version contains a
matching extra power pin for the
cradle.
Proprietary connectors and formats
67. Original USB Logo
Uses
Wireless USB is used in game
controllers, printers, scanners, digital
cameras, MP3 players, hard disks and
flash drives.
It is also suitable for transferring
parallel video streams.
Kensington released a Wireless
USB universal docking station in
August, 2008.
68. Radio
Classic radio receiver dial
The Radio Portal
Contents
Meaning of Radio
Processes
History
1 Invention
2 Development
Uses of radio
1 Audio
2 Telephony
3 Video
4 Navigation
5 Radar
6 Data (digital radio)
7 Heating
8 Amateur radio service
9 Unlicensed radio services
10 Radio control (RC)
The electromagnetic spectrum
69. The Radio Portal Radio
Meaningof Radio :-
Radio is the transmission of signals by modulation of
electromagnetic waves with frequencies below those of visible light.
Electromagnetic radiation travels by means of oscillating
electromagnetic fields that pass through the air and the vacuum of
space.
Information is carried by systematically changing (modulating)
some property of the radiated waves, such as amplitude, frequency,
or phase.
When radio waves pass an electrical conductor, the oscillating
fields induce an alternating current in the conductor.
This can be detected and transformed into sound or other signals
that carry information.
70. The Radio PortalProcesses
Radio systems used for communications will have
the following elements.
With more than 100 years of development, each
process is implemented by a wide range of methods,
specialized for different communications purposes.
Each system contains a transmitter.
This consists of a source of electrical energy,
producing alternating current of a desired frequency of
oscillation.
The transmitter contains a system to modulate
(change) some property of the energy produced to
impress a signal on it.
71. The Radio Portal
This modulation might be as simple as turning the
energy on and off, or altering more subtle properties
such as amplitude, frequency, phase, or combinations
of these properties.
The transmitter sends the modulated electrical
energy to an antenna; this structure converts the
rapidly-changing alternating current into an
electromagnetic wave that can move through free
space.
Early radio systems relied entirely on the
energy collected by an antenna to produce
signals for the operator.
Radio became more useful after the
invention of electronic devices such as the
vacuum tube and later the transistor, which
made it possible to amplify weak signals.
Today radio systems are used for
applications from walkie-talkie children's toys
to the control of space vehicles, as well as for
broadcasting, and many other applications.
72. The Radio PortalHistory
1. Invention :-
Development from a laboratory
demonstration to commercial utility
spanned several decades and required
the efforts of many practitioners.
Thomas Edison applied in 1885 to the
U.S. Patent Office for a patent on a
wireless telegraphy system which
anticipated later developments in the
field.
The patent was granted as Patent #
465971 on December 29, 1891, and
Guglielmo Marconi felt it necessary to
purchase rights to the Edison wireless
telegraphy patent as a foundation stone
of his own subsequent work in wireless
telegraphy.
Tesla demonstrating wireless transmissions
during his high frequency and potential lecture of
1891. After continued research, Tesla presented
the fundamentals of radio in 1893.
73. The Radio Portal
Telephone Herald in Budapest, Hungary (1901).
In 1893, in St. Louis, Missouri, Nikola
Tesla made devices for his experiments
with electricity.
Addressing the Franklin Institute in
Philadelphia and the National Electric
Light Association, he described and
demonstrated in detail the principles of
his wireless work.
The descriptions contained all the
elements that were later incorporated
into radio systems before the
development of the vacuum tube.
He initially experimented with magnetic receivers, unlike the coherers
(detecting devices consisting of tubes filled with iron filings which had
been invented by Temistocle Calzecchi-Onesti at Fermo in Italy in 1884)
used by Guglielmo Marconi and other early experimenters
74. The Radio Portal
The first radio couldn't transmit sound or speech and
was called the "wireless telegraph."
The first public demonstration of wireless telegraphy
took place in the lecture theater of the Oxford
University Museum of Natural History on August 14,
1894, carried out by Professor Oliver Lodge and
Alexander Muirhead. During the demonstration a radio
signal was sent from the neighboring Clarendon
laboratory building, and received by apparatus in the
lecture theater.
In 1895 Alexander Stepanovich Popov built his first radio receiver,
which contained a coherer.
Further refined as a lightning detector, it was presented to the Russian
Physical and Chemical Society on May 7, 1895.
A depiction of Popov's lightning detector was printed in the Journal of
the Russian Physical and Chemical Society the same year.
Popov's receiver was created on the improved basis of Lodge's
receiver, and originally intended for reproduction of its experiments.
75. The Radio Portal
2. Development :-
In 1896, Marconi was awarded the British patent
12039, Improvements in transmitting electrical
impulses and signals and in apparatus there-for, for
radio.
In 1897 he established the world's first radio
station on the Isle of Wight, England.
Marconi opened the world's first "wireless" factory
in Hall Street, Chelmsford, England in 1898,
employing around 50 people.
One of the first developments in the early 20th century (1900-1959)
was that aircraft used commercial AM radio stations for navigation.
This continued until the early 1960s when VOR systems finally became
widespread (though AM stations are still marked on U.S. aviation charts).
In the early 1930s, single sideband and frequency modulation were
invented by amateur radio operators.
This photo shows an early
1930's wooden radio receiver in
the classic "cathedral" shape
76. The Radio PortalUsesof radio :-
1. Audio
A Fisher 500 AM/FM hi-fi receiver
from 1959.
AM broadcast radio sends music and voice
in the Medium Frequency (MF, 0.3 MHz to 3
MHz) radio spectrum.
AM radio uses amplitude modulation, in
which the amplitude of the transmitted signal
is made proportional to the sound amplitude
captured (transduced) by the microphone,
while the transmitted frequency remains
unchanged.
Transmissions are affected by static and interference because lightning
and other sources of radio emissions on the same frequency add their
amplitudes to the original transmitted amplitude.
In the early part of the 20th century, American AM radio stations
broadcast with powers as high as 500 kW, and some could be heard
worldwide; these stations' transmitters were commandeered for military
use by the US Government during World War II.
77. The Radio Portal2. Telephony
Pure One Classic- DAB
Digital Radio from 2008
Mobile phones transmit to a local cell site
(transmitter/receiver) that ultimately connects to
the public switched telephone network (PSTN)
through an optic fiber or microwave radio and other
network elements.
When the mobile phone nears the edge of the
cell site's radio coverage area, the central
computer switches the phone to a new cell.
Cell phones originally used FM, but now most use various digital
modulation schemes.
Recent developments in Sweden (such as DROPme) allow for the
instant downloading of digital material from a radio broadcast (such as a
song) to a mobile phone.
Satellite phones use satellites rather than cell towers to communicate.
78. The Radio Portal
3. Video
Television sends the picture as AM and the sound
as FM, with the sound carrier a fixed frequency (4.5
MHz in the NTSC system) away from the video
carrier.
Analog television also uses a vestigial sideband
on the video carrier to reduce the bandwidth
required.
Digital television uses 8VSB modulation in North America (under the
ATSC digital television standard), and COFDM modulation elsewhere in the
world (using the DVB-T standard).
A Reed–Solomon error correction code adds redundant correction codes
and allows reliable reception during moderate data loss.
Although many current and future codecs can be sent in the MPEG-2
transport stream container format, as of 2006 most systems use a
standard-definition format almost identical to DVD: MPEG-2 video in
Anamorphic widescreen and MPEG layer 2 (MP2) audio.
79. The Radio Portal
4. Navigation
All satellite navigation systems use
satellites with precision clocks.
The satellite transmits its position, and
the time of the transmission.
The receiver listens to four satellites, and can figure its position as
being on a line that is tangent to a spherical shell around each satellite,
determined by the time-of-flight of the radio signals from the satellite.
A computer in the receiver does the math.
Radio direction-finding is the oldest form of radio navigation.
Before 1960 navigators used movable loop antennas to locate
commercial AM stations near cities.
In some cases they used marine radiolocation beacons, which share a
range of frequencies just above AM radio with amateur radio operators.
80. The Radio Portal
5. Radar
Radar (Radio Detection And Ranging) detects objects at a distance by
bouncing radio waves off them.
The delay caused by the echo measures the distance. The direction of
the beam determines the direction of the reflection.
The polarization and frequency of the return can sense the type of
surface.
Navigational radars scan a wide area two to four times per minute.
They use very short waves that reflect from earth and stone.
They are common on commercial ships and long-distance commercial
aircraft.
General purpose radars generally use
navigational radar frequencies, but modulate
and polarize the pulse so the receiver can
determine the type of surface of the reflector.
81. The Radio Portal
6. Data(digitalradio)
Most new radio systems are digital, see also:
Digital TV, Satellite Radio, Digital Audio Broadcasting.
The oldest form of digital broadcast was spark gap
telegraphy, used by pioneers such as Marconi.
By pressing the key, the operator could send
messages in Morse code by energizing a rotating
commutating spark gap.
The rotating commutator produced a tone in the
receiver, where a simple spark gap would produce a
hiss, indistinguishable from static.
Spark gap transmitters are now illegal, because
their transmissions span several hundred megahertz.
This is very wasteful of both radio frequencies and
power.
Modern GPS receivers.
82. The Radio Portal7. Heating
Radio-frequency energy generated for heating of objects is generally
not intended to radiate outside of the generating equipment, to prevent
interference with other radio signals.
Microwave ovens use intense radio waves to heat food.
Diathermy equipment is used in surgery for sealing of blood vessels.
Induction furnaces are used for melting metal for casting.
83. The Radio Portal8. Amateur radio service
Amateur radio, also known as "ham radio", is a
hobby in which enthusiasts are licensed to
communicate on a number of bands in the radio
frequency spectrum non-commercially and for their
own enjoyment.
They may also provide emergency and public service
assistance.
This has been very beneficial in emergencies, saving
lives in many instances.
Radio amateurs use a variety of modes, including
nostalgic ones like morse code and experimental ones
like Low-Frequency Experimental Radio.
Several forms of radio were pioneered by radio amateurs and later
became commercially important including FM, single-sideband (SSB), AM,
digital packet radio and satellite repeaters.
Some amateur frequencies may be disrupted by power-line internet
service.
Amateur radio station with
multiple receivers and
transceivers
84. The Radio Portal
9. Unlicensed radio services
Unlicensed, government-authorized personal radio
services such as Citizens' band radio in Australia, the USA,
and Europe, and Family Radio Service and Multi-Use Radio
Service in North America exist to provide simple, (usually)
short range communication for individuals and small
groups, without the overhead of licensing.
Similar services exist in other parts of the world. These
radio services involve the use of handheld units.
Free radio stations, sometimes called pirate radio or
"clandestine" stations, are unauthorized, unlicensed, illegal
broadcasting stations.
These are often low power transmitters operated on
sporadic schedules by hobbyists, community activists, or
political and cultural dissidents.
Some pirate stations operating offshore in parts of Europe and the
United Kingdom more closely resembled legal stations, maintaining regular
schedules, using high power, and selling commercial advertising time.
85. The Radio Portal
10. Radio control(RC)
Radio remote controls use radio waves to
transmit control data to a remote object as in
some early forms of guided missile, some early
TV remotes and a range of model boats, cars and
airplanes.
Large industrial remote-controlled equipment
such as cranes and switching locomotives now
usually use digital radio techniques to ensure
safety and reliability.
In Madison Square Garden, at the Electrical
Exhibition of 1898, Nikola Tesla successfully
demonstrated a radio-controlled boat.
He was awarded U.S. patent No. 613,809 for a
"Method of and Apparatus for Controlling
Mechanism of Moving Vessels or Vehicles.
SYMA DragonFly Radio Remote
Control Helicopter!
86. The Radio Portal
The electromagnetic spectrum
Radio waves are a form of electromagnetic radiation
that are created when a charged object, such as an
electron, accelerates with a frequency that lies in the
radio frequency (RF) portion of the electromagnetic
spectrum.
In radio, this acceleration is caused by an alternating
current in an antenna.
87. The Radio Portal
Radio frequencies occupy the range from a few tens of hertz to three
hundred gigahertz, although commercially important uses of radio use
only a small part of this spectrum.
Other types of electromagnetic radiation, with frequencies above the RF
range, are microwave, infrared, visible light, ultraviolet, X-rays and
gamma rays.
Since the energy of an individual photon of radio frequency is too low
to remove an electron from an atom, radio waves are classified as non-
ionizing radiation.
ELECTROMAGNETIC SPESTRUM OR EM
SPECTRUM