A ‘Baseband’ Network is one in which the cable or other network medium can carry only a single signal at any one time.
A ‘Broadband’ network on the other hand can carry multiple signals simultaneously, (using a discrete part of the cables bandwidth for each signal.)
As an example of broadband network, consider the cable television service that you probably have in your home. Although only one cable runs at your TV, it supplies you with dozens of channels of programming at the same time.
This presentation is about the introduction to network switch layer technology. A network switch is a device tha is used to connect different segments over the network.This ppt includes introduction to switch,types of switches or layer specification,advantages and disadvantages of switch..
I hope it will be very helpful for the engineering students and the others who are interested to search in deep about network switch.
This presentation is about the introduction to network switch layer technology. A network switch is a device tha is used to connect different segments over the network.This ppt includes introduction to switch,types of switches or layer specification,advantages and disadvantages of switch..
I hope it will be very helpful for the engineering students and the others who are interested to search in deep about network switch.
A complete power point presentation to know how Public Switching Telephone Network works. Useful for those in the working field or for the ones who want to know more or submitting any project report..
These slides cover a topic on ISDN (Integrated Services Digital Network) in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
These slides cover a topic on Introduction to switching & circuit switching in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
A complete power point presentation to know how Public Switching Telephone Network works. Useful for those in the working field or for the ones who want to know more or submitting any project report..
These slides cover a topic on ISDN (Integrated Services Digital Network) in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
These slides cover a topic on Introduction to switching & circuit switching in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
A computer network is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.
Components of computer network
Network benefits
Disadvantages of computer network
Classification by their geographical area
Network classification by their component role
Types of servers
In this topic you will see:
Radio Wave System
History
Characteristics
Specifications
Advantages and Disadvantages
Three Devices (Mobile Device, Wi-Fi Device, GPS Device etc.)
Wimax technology has reshaped the framework of broadband wireless internet
service. It provides the internet service to unconnected or detached areas such as east South
Africa, rural areas of America and Asia region. Full duplex helpers employed with one of
the relay stations selection and indexing method that is Randomized Distributed Space Time
are used to expand the coverage area of primary Wimax station. The basic problem was
identified at cell edge due to weather conditions (rain, fog), insertion of destruction because
of multiple paths in the same communication channel and due to interference created by
other users in that communication. It is impractical task for the receiver station to decode
the transmitted signal successfully at the cell edges, which increases the high packet loss and
retransmissions. But Wimax is a outstanding technology which is used for improving the
quality of internet service and also it offers various services like Voice over Internet
Protocol, Video conferencing and Multimedia broadcast etc where a little delay in packet
transmission can cause a big loss in the communication. Even setup and initialization of
another Wimax station nearer to each other is not a good alternate, where any mobile
station can easily handover to another base station if it gets a strong signal from other one.
But in rural areas, for few numbers of customers, installation of base station nearer to each
other is costlier task. In this review article, we present a scheme using R-DSTC technique to
choose and select helpers (relay nodes) randomly to expand the coverage area and help to
mobile station as a helper to provide secure communication with base station. In this work,
we use full duplex helpers for better utilization of bandwidth.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
The IP addresses used to identify systems on a TCP/IP network. The IP address is an absolute identifier of both the individual machine and the network on which it resides.
Every IP datagram packet transmitted over a TCP/IP network contains the IP addresses of the source system that generated it and the destination system for which it’s intended in its IP header.
Simple Network Management Protocol by vikas jagtapVikas Jagtap
NETWORK MANAGEMENT can be defined as monitoring, testing, configuring and trouble shooting network components to meet a set of requirements defined by an organization.
Set of requirements include the smooth, efficient operation of the network that provides the predefined quality of service for users
Knowledge discovery is a new field that combines several techniques from computer science and Artificial Intelligence.
Search for relations and global patterns in large databases.
It is defined as a non-trivial extract of implicit, unknown, and potential user information from databases.
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtapVikas Jagtap
The data that indicates the earth location (latitude & longitude, or height & depth ) of these rendered objects is known as spatial data.
When the map is rendered, objects of this spatial data are used to project the location of the objects on 2-Dimentional piece of paper.
The spatial data management systems are designed to make the storage, retrieval, & manipulation of spatial data (i.e points, lines and polygons) easier and natural to users, such as GIS.
While typical databases can understand various numeric and character types of data, additional functionality needs to be added for databases to process spatial data types.
These are typically called geometry or feature.
Overview of Object-Oriented Concepts Characteristics by vikas jagtapVikas Jagtap
Object-oriented data base systems are proposed as alternative to relational systems and are aimed at application domains where complex objects play a central role.
The approach is heavily influenced by object-oriented programming languages and can be understood as an attempt to add DBMS functionality to a programming language environment
This ppt show how your age has being going from childhood to old age .what old man want to say to his child .
how parents play a vital role where there children are kids
Dubai is the most populous city and emirate in the United Arab Emirates, and the second largest emirate by territorial size after the capital, Abu Dhabi.
Area: 4,114 km²
Founded: June 9, 1833
Local time: Sunday 2:41 pm
Weather: 28°C, Wind W at 27 km/h, 48% Humidity
Population: 2.106 million (2013)
GDP per capita: 16,350.00 USD (2005)
Gross domestic product: 82.11 billion USD (2008)
Java applications cannot directly communicate with a database to submit data and retrieve the results of queries.
This is because a database can interpret only SQL statements and not Java language statements.
For this reason, you need a mechanism to translate Java statements into SQL statements.
The JDBC architecture provides the mechanism for this kind of translation.
The JDBC architecture can be classified into two layers :
JDBC application layer.
JDBC driver layer.
JDBC application layer : Signifies a Java application that uses the JDBC API to interact with the JDBC drivers. A JDBC driver is software that a Java application uses to access a database. The JDBC driver manager of JDBC API connects the Java application to the driver.
JDBC driver layer : Acts as an interface between a Java applications and a database. This layer contains a driver , such as a SQL server driver or an Oracle driver , which enables connectivity to a database.
A driver sends the request of a Java application to the database. After processing the request, the database sends the response back to the driver. The driver translates and sends the response to the JDBC API. The JDBC API forwards it to the Java application.
JSP technology has facilitated the segregation of the work of a Web designer and a Web developer.
A Web designer can design and formulate the layout for the Web page by using HTML.
On the other hand, a Web developer working independently can use java code and other JSP specific tags to code the business logic.
The simultaneous construction of the static and dynamic content facilitates development of quality applications with increased productivity.
Server side programs can be written using different server-side technologies , such as Common Gateway Interface (CGI) , Active Server Pages (ASP) and Servlets.
CGI scripts are written in C , C++ or perl programming languages .
In case of an application server using CGI script to process client request , the server creates a separate instance of the CGI script to process the request.
As a result, the efficiency of the server is affected when there is large number of concurrent requests.
“Bluetooth wireless technology is an open specification for a low-cost, low-power, short-range radio technology for ad-hoc wireless communication of voice and data anywhere in the world.”
An Introduction to BLUETOOTH TECHNOLOGYVikas Jagtap
“Bluetooth wireless technology is an open specification for a low-cost, low-power, short-range radio technology for ad-hoc wireless communication of voice and data anywhere in the world.”
THREATS are possible attacks.
It includes
The spread of computer viruses
Infiltration and theft of data from external hackers
Engineered network overloads triggered by malicious mass e-mailing
Misuse of computer resources and confidential information by employees
Unauthorized financial transactions and other kinds of computer fraud conducted in the company's name
Electronic inspection of corporate computer data by outside parties
Damage from failure, fire, or natural disasters
The DNS name space is based on a domains, which exist in a hierarchical structure much like the directory tree in a file system.
A domain is the equivalent of a directory, in that it can contain either subdomains (subdirectories) or hosts (files), forming a structure called DNS tree.
The DNS name space function in the same way : administrators are assigned domain names and are then responsible for specifying host names to systems within that domain.
The result is that every computer on the Internet is uniquely identifiable by a DNS, name that consists of host name plus the names of all its parent domains, stretching up to the root of the DNS tree, separated by periods.
Each of the names between the periods can be up to 63 characters long, with a total length of 255 characters for a complete DNS name.
Domain and host names are not case sensitive, and can take any value except the null value.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
2. 2
Broad Band Network
A ‘Baseband’ Network is one in which the cable or
other network medium can carry only a single signal
at any one time.
A ‘Broadband’ network on the other hand can carry
multiple signals simultaneously, (using a discrete part
of the cables bandwidth for each signal.)
As an example of broadband network, consider the
cable television service that you probably have in
your home. Although only one cable runs at your TV,
it supplies you with dozens of channels of
programming at the same time.
3. 3
Data Transmission Services
We saw that there are many different types of data
transmission media, which may be used for transmission
of data form one point to another.
Organizations may afford to lay their own
communication channels in a small geographical area,
such as within a building or a campus. However, it
becomes impractical for organizations to do so in larger
geographical area, such as between two cities or two
countries. It also impractical for them to set their own
satellite in orbit.
4. 4
Data Transmission Services
Therefore organizations hire the services of data
transmission service providers (also known as ‘carriers’)
for their data communications needs.
VSNL( Videsh Sanchar Niger Limited), BSNL (Bharat
Sanchar Nigam Limited), MTNL (Mahanagar Telephone
Nigam Limited) & a few such common carriers in India.
The various types of services offered by common carriers are
1. Dial-Up line
2. Leased- Line
3. ISDN ( Integrated Service Digital Network)
5. 5
1. Dial – UP Line
This is service, which operates in a manner similar to a
telephone call i.e. a user of a computer willing to
communicate with a remote computer first makes a
connection request by dialing up the remote
computer.
A circuit is established between two computer via the
telephone company’s switching system.
The modem attached to the user’s computer then
send and receive data over telephone lines.
6. 6
2. Leased Line
Leased Line is a special telephone line, which
directly & permanently connects two computers. It
can be used for both voice & data transmission.
7. 7
The ISDN is a telephonic system, which provides digital
(not analog) telephone & data services. It carries data at
much higher transmission rates.
ISDN is a digital point-to-point telephone system that has
been around for many years. It is an alternative technology
for home users who require high-bandwidth N/W
connections for links between business networks.
ISDN is a digital service that can provide a good deal more
bandwidth than standard telephone service, but unlike a
leased line, it is not permanent.
8. 8
The ISDN devices dial a number to establish a connection,
so that users can connect to different sites as needed. For
this reason, ISDN is known as a circuit-switching service,
because it creates a temporary point-to-point circuit
between two sites.
More over, with the ISDN, no modem is necessary because
it supports digital transmission of all types of data.
9. 9
Broadband ISDN
Based on the transmission & switching capabilities the
ISDNs are currently of two types –
1) Narrowband ISDN
2) Broadband ISDN
‘Narrowband ISDN’ is based on 64 Kbps bit-stream that
are combined into higher capacity ‘trunks’ using time-
division multiplexing. For e.g. 32 64 – Kbps channels
can be combined into one 2 Mbps channel.
The narrowband ISDN, however cannot support the
requirements of several types of data services, especially
those needed for multimedia applications.
10. 10
For e.g. – the bandwidth required for full definition digital
video is in the 100 Mbps range.
To handle this sort of traffic as well as bursts of data traffic
from computer ‘broadband ISDN’ (B-ISDN) was
introduced
B-ISDN is based on optical fibers & asynchronous time-
division multiplexing.
The advantage of asynchronous time-division multiplexing
over conventional time-division multiplexing is that it
allows the total bandwidth available to be divided between
different activities in a much more flexible way.
11. 11
Before proceeding we have to go through following terms –
1) Congestion
2) Queuing theory
3) Traffic Management
4) ATM Traffic Management
1) Congestion : -
“Congestion occurs when the number of packets being
transmitted through a network begins to approach the
packet-handling capacity of the network. The objective of
congestion control is to maintain the number of packets
within the network below the level at which performance
falls off dramatically.”
12. 12
The network implements congestion control techniques in
such a way as to protect the network from congestion
while meeting the traffic contracts.
2) Queuing theory : -
A data network or internet is a queues. At each node
there is a queue of packets for each outgoing channel. If
the rate at which packets arrive and queue up exceeds
the rate at which packets can be transmitted, the queue
size grows without bound and the delay experienced by a
packet goes to infinity.
This growth in queue length means that the delay
experienced by a packet at each node increases.
13. 13
3. Traffic Management
Congestion control is concerned with efficient use of a
network at high load. When a node is saturated and must
discard packets, it can apply some simple rule, such as
discard the most recent arrival.
Congestion control technique –
1) Fairness – As congestion develops, flows of packets
between source and destination will experience increased
delays and, with high congestion, packet losses.
A node can maintain a separate queue for each logical
connection or for each source-destination pair. If all of the
queue buffers are of equal length, then the queues with
the highest traffic load will suffer discards more often,
allowing lower-traffic connections a fair share of the
capacity.
14. 14
2) Quality of Service – Some applications, such as audio
and video, are delay sensitive but loss insensitive. Others,
such as file transfer & e-mail, are delay insensitive but
loss sensitive. Still others, such as interactive graphics or
interactive computing applications, are delay sensitive and
loss sensitive.
A node might transmit higher-priority packets ahead of
lower-priority packets in the same queue. Or a node might
maintain different queues for different QoS levels and give
preferential treatment to the higher levels.
3) Reservations -
One way to avoid congestion and also to provide assured
service to applications is to use a reservation scheme.
15. 15
4. ATM Traffic Management
Because of their high speed and small size, ATM networks
present difficulties in effectively controlling congestion not
found in other types of data network.
ATM Forum have defined a range of traffic management
functions to maintain the quality of service (QoS) of ATM
connections.
ATM traffic management function refers to the set of
actions taken by the network to avoid congestion
conditions or to minimize congestion effects.
16. 16
Following are the techniques for traffic management –
Resource management using virtual paths
Connection admission control
Usage parameter control
Selective cell discard
Traffic shaping
1) Resource management using virtual paths -
The essential concept behind network resource
management is to allocate network resources in such a
way as to separate traffic flows according to service
characteristics.
17. 17
2) Connection admission control -
Connection admission control is the first line of defense
for the network in protecting itself from excessive loads.
By accepting the connection, the network forms a traffic
contract with the user. Once the connection is accepted,
the network continues to provide the agreed QoS as long
as the user complies (fulfill) with the traffic contract.
3) Usage Parameter Control –
Once a connection has been accepted admission control
function, the usage parameter control (UPC) function of
the network monitors the connection to determine
whether traffic conforms to the traffic contract.
The main purpose of Usage parameter control is to
protect network resources from an overload.
18. 18
4) Selective Cell Discard -
Selective cell discard comes into play when the network,
at some point beyond the UPC function, discard cells.
The objective is to discard lower –priority cells during
congestion to protect the performance for higer-priority
cells.
5) Traffic Shaping –
Traffic shaping is used to smooth out a traffic flow and
reduce cell clumping. This can result in a fairer allocation
of resources and a reduced average delay time.
19. 19
Communication Satellite –
In the 1950s and early 1960s, people tried to set up
communication systems by bouncing signals off
metallized weather balloons. Unfortunately, the received
signals were too weak to be of any practical use.
The US Navy noticed a kind of permanent weather
balloon in the sky – the moon – and built an operational
system for ship-to-shore communication by bouncing
signals off it.
The key difference between an artificial satellite and a
real one is that the artificial one can amplify the signals
before sending them back, turning a strange curiosity
into a powerful communication system.
20. 20
A Communication satellite can be thought of as a big
microwave repeater in the sky. It contains several
transponders, each of which listens to some portion of the
spectrum, amplifies the incoming signal, and then
rebroadcast it at another frequency to avoid interference
with incoming signal.
Geostationary Satellite –
Communication satellite can be grouped into categories
according to the height at which they orbit. The easiest
type to understand are known as geosynchronous or
geostationary satellite.
The name arises because a geosynchronous satellite is
placed in an orbit that is exactly synchronized with the
rotation of the earth..
21. 21
A new development in the communication satellite world is
the development of low-cost micro stations, sometimes
called VSATs ( Very Small Aperture Terminals).
These tiny terminals have 1-meter or smaller antennas and
can put out about 1 watt of power.
Direct Broadcast satellite television uses this technology
for one-way transmission.
In many VSAT systems, the micro stations do not have
enough power to communicate directly with one another
(via satellite, of course). Instead a special ground station,
the hub, with a large, high-gain antenna is needed to relay
traffic between VSATs as shown in following fig. -
23. 23
In this mode of operation, either the sender or the receiver
has a large antenna and a powerful amplifier.
VSAT has great potential in rural areas. Stringing
telephone lines to thousands of small villages is far
beyond the budgets of most third world governments, but
installing 1-meter VSAT dishes powered by solar cells is
often feasible. VSAT provide the technology that will wire
the world.
Satellite also have the property that the cost of
transmitting a message is independent of the distance
traversed. A call across the ocean costs no more to
service than a call across the street. Satellite also have
excellent error rates and can be deployed almost instantly,
a major consideration for military communication.