SlideShare a Scribd company logo
Group Name
GROUP MEMBERS


Muhammad Waqar
 Muhammad Bilal
 Raheel Hassan

01-133112-058
01-133112-038
01-133112-050
Computer Fundamental
Presentation Title:

MODEM
INDEX








Introduction to Modem
History
What is Modem.?
Types of Modem
Functions of the Modem
Modem purpose
Modem Security
INTRODUCTION


A modem (modulator-demodulator) is a device that
modulates an analog carrier signal to encode digital
information, and also demodulates such a carrier signal
to decode the transmitted information.
 The goal is to produce a signal that can be transmitted
easily and decoded to reproduce the original digital
data.
 Modems can be used over any means of transmitting
analog signals, from light emitting diodes to radio.


Modems are generally classified by the amount of data
they can send in a given unit of time, usually expressed
in bits per second (bit/s, or bps).
 The most familiar example is a voice band modem that
turns the digital data of a personal computer into
modulated electrical signals in the voice frequency
range of a telephone channel.
 These signals can be transmitted over telephone lines
and demodulated by another modem at the receiver
side to recover the digital data.






Modems are generally
classified by the amount of
data they can send in a
given unit of time, usually
expressed in bits per
second (bit/s, or bps).
The most familiar example
is a voice band modem
that turns the digital data
of a personal computer
into modulated electrical
signals in the voice
frequency range of a
telephone channel.
These signals can be
transmitted over telephone
lines and demodulated by
another modem at the
receiver side to recover
the digital data.
History






IN 1920 used as
multiplex equipment
In 1958 used in airdefense system
In 1960 the name
Data-Phone was
introduced
In 1962 The famous
Bell 103A dataset
standard was also
introduced by AT&T
WHAT IS MODEM.?
Modem, short for modulator-demodulator is an
electronic device that converts a computer’s digital
signals into specific frequencies to travel over
telephone or cable television lines. At the
destination, the receiving modem demodulates the
frequencies back into digital data. Computers use
modems to communicate with one another over a
network.
TYPES OF MODEMS
External vs. Internal Modems




External Modem: This is a modem separated
from the system unit in the computer case. It is
connected to the serial port of the computer by
means of a cable. It is connected to the telephone
wall jack by another cable.
Internal Modem: An internal modem is a circuit
board (a modem card) that can be added to the
system unit of the computer. It takes one of the
expansion slots.
Standard vs. Intelligent Modems
Standard Modems: Most modems
used today are called standard
modems. These modems are usually
operated by commands entered from a
microcomputer keyboard.
 Intelligent
Modems:
Intelligent
modems are also called advanced
modems. These modems can accept
new instructions and then respond to
the commands while transmitting data
and information.

Short-Haul and Wireless Modems
Short-Haul Modems: Short- haul
modems are devices that transmit
signals down the cable through any
COM1 port.
 Wireless Modems: Wireless modems
transmit the data signals through the
air instead of by using a cable. They
sometimes are called a radiofrequency
modem. oving.

What is Modems purpose ?
The word modem is an acronym for Modulator-Demodulator.
Basically, a modem is used for transmitting and receiving data
over a communication channel, such as twisted-pair telephone
lines, coaxial cables, and optical fibers. Currently the purpose of
a modem is to convert a computer’s data stream to analog
format so that it can be transmitted over the analog telephone
line.
At the source, modulation techniques are used to convert digital
data (0’s and 1’s) into analog form for transmission across the
channel. At the destination, the received analog signal is
converted to digital data via demodulation. This is a simplified
explanation of how a modem works, and there are other issues
that
require
attention;
such
as
channel
impairments, encryption, error detection/correction, data
compression, modulation, handshake negotiation, and echo
cancellation. These features will be discussed a bit later.
FUNCTION OF MODEMS
1.
2.
3.

Error Correction
Compressing the Data
Flow Control
ADVANTAGES
Modem Security
Modem security can be an issue for some
people, especially if they leave their modems on
for a continuous connection to the Internet.
However, many modems have built-in security
software to protect your home computer from
invasion. Using a router will enhance your
security, as will shifting to a less popular but highly
secure operating system like Linux.
REFERENCES









http://en.wikipedia.org/wiki/Modem
http://www.tahirmehmood.com/wp
content/uploads/2011/01/dslsetup.png
http://www.wisegeek.com/what-is-a-modem.htm
http://e99ie.tripod.com/ADSL_Tutorial/purpose.htm
http://amylouisewebber.files.wordpress.com/2012/02/thankyo
u2.jpg
http://home.olemiss.edu/~misbook/cs11.htm
http://www.scribd.com/doc/27121008/Functions-and-Typesof-Modems
http://www.ustudy.in/node/5016
Modem presentation
Modem presentation

More Related Content

What's hot

Data communication
Data communicationData communication
Data communication
Burhan Ahmed
 
Network topology
Network topologyNetwork topology
Network topology
Shubham Agrawal
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
OECLIB Odisha Electronics Control Library
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
Naveen Kumar
 
seminar report on wireless communication ppt
seminar report on wireless communication pptseminar report on wireless communication ppt
seminar report on wireless communication ppt
pradnya kadam
 
Router switch and hub
Router switch and hubRouter switch and hub
Router switch and hub
Usama Mudassar
 
wired and wireless networks
wired and wireless networkswired and wireless networks
wired and wireless networks
Kavitha Ravi
 
Network ppt
Network pptNetwork ppt
Network ppt
hlalu861
 
Computer networking ppt
Computer networking pptComputer networking ppt
Computer networking ppt
Jitender Kumar
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
Tatheer Fatima
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
Rajesh Sadhukha
 
Types of network
Types of networkTypes of network
Types of networkishjari
 
Wireless communication
Wireless communicationWireless communication
Wireless communicationDarshan Maru
 
Communication media
Communication mediaCommunication media
Communication media
lijomoljose
 
Network cable
Network cableNetwork cable
Network cable
Online
 
Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.
Clinton Dsouza
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
kirbadh
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
sabari Giri
 

What's hot (20)

Data communication
Data communicationData communication
Data communication
 
Network topology
Network topologyNetwork topology
Network topology
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
seminar report on wireless communication ppt
seminar report on wireless communication pptseminar report on wireless communication ppt
seminar report on wireless communication ppt
 
Router switch and hub
Router switch and hubRouter switch and hub
Router switch and hub
 
wired and wireless networks
wired and wireless networkswired and wireless networks
wired and wireless networks
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Modem
ModemModem
Modem
 
Computer networking ppt
Computer networking pptComputer networking ppt
Computer networking ppt
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Types of network
Types of networkTypes of network
Types of network
 
Dsl
DslDsl
Dsl
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Communication media
Communication mediaCommunication media
Communication media
 
Network cable
Network cableNetwork cable
Network cable
 
Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
 

Similar to Modem presentation

Communication over modem by anam younas
Communication over modem by anam younasCommunication over modem by anam younas
Communication over modem by anam younas
AnamYounas1
 
Chapter 3
Chapter 3Chapter 3
Chapter 3asguna
 
Overview of Modem
Overview of Modem Overview of Modem
Overview of Modem Kishan Patel
 
Communication System Devices
Communication System DevicesCommunication System Devices
Communication System DevicesJason Hando
 
What Is Modem presentation by Ravi namboori
What Is Modem presentation by Ravi nambooriWhat Is Modem presentation by Ravi namboori
What Is Modem presentation by Ravi namboori
Ravi namboori
 
Presentation on Modem working procedures
 Presentation on Modem working procedures Presentation on Modem working procedures
Presentation on Modem working procedures
Asaduzzaman Kanok
 
MODEM INTERNAL AND EXTERNAL
MODEM INTERNAL AND EXTERNAL MODEM INTERNAL AND EXTERNAL
MODEM INTERNAL AND EXTERNAL
Vishal Gohel
 
Modulation demodulation assignment
Modulation demodulation assignmentModulation demodulation assignment
Modulation demodulation assignment
SBEntertainments
 
Cibm worhop 2 chapter seven
Cibm   worhop 2 chapter sevenCibm   worhop 2 chapter seven
Cibm worhop 2 chapter sevenShaheen Khan
 
Types of Computer Modem
Types of Computer ModemTypes of Computer Modem
Types of Computer Modem
DivyaKS12
 
Lesson 7 data communication
Lesson 7 data communicationLesson 7 data communication
Lesson 7 data communicationkenjiecueto
 
BSNL Industrial Training
BSNL Industrial Training BSNL Industrial Training
BSNL Industrial Training
Moulik .
 
Wireless electronic notice board using gsm technolgy
Wireless electronic notice board using gsm technolgyWireless electronic notice board using gsm technolgy
Wireless electronic notice board using gsm technolgydhanshri_deshmukh
 
Data communication (simple explanation)
Data communication (simple explanation)Data communication (simple explanation)
Data communication (simple explanation)
Twist Akid Sultan
 
Software Modem Working Mechanism
Software Modem Working MechanismSoftware Modem Working Mechanism
Software Modem Working Mechanism
Kalaiyarasank4
 
Data communication by Phone Lines
Data communication by Phone LinesData communication by Phone Lines
Data communication by Phone LinesMuhammad Ahtsham
 
Gsm based wireless notice board Rajneesh
Gsm based wireless notice board RajneeshGsm based wireless notice board Rajneesh
Gsm based wireless notice board Rajneesh
RAJNEESH KUMAR SALGOTRA
 

Similar to Modem presentation (20)

Presentation
PresentationPresentation
Presentation
 
Communication over modem by anam younas
Communication over modem by anam younasCommunication over modem by anam younas
Communication over modem by anam younas
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Overview of Modem
Overview of Modem Overview of Modem
Overview of Modem
 
Communication System Devices
Communication System DevicesCommunication System Devices
Communication System Devices
 
What Is Modem presentation by Ravi namboori
What Is Modem presentation by Ravi nambooriWhat Is Modem presentation by Ravi namboori
What Is Modem presentation by Ravi namboori
 
Presentation on Modem working procedures
 Presentation on Modem working procedures Presentation on Modem working procedures
Presentation on Modem working procedures
 
MODEM INTERNAL AND EXTERNAL
MODEM INTERNAL AND EXTERNAL MODEM INTERNAL AND EXTERNAL
MODEM INTERNAL AND EXTERNAL
 
Modulation demodulation assignment
Modulation demodulation assignmentModulation demodulation assignment
Modulation demodulation assignment
 
modems-181228171523.pdf
modems-181228171523.pdfmodems-181228171523.pdf
modems-181228171523.pdf
 
Cibm worhop 2 chapter seven
Cibm   worhop 2 chapter sevenCibm   worhop 2 chapter seven
Cibm worhop 2 chapter seven
 
Types of Computer Modem
Types of Computer ModemTypes of Computer Modem
Types of Computer Modem
 
Lesson 7 data communication
Lesson 7 data communicationLesson 7 data communication
Lesson 7 data communication
 
BSNL Industrial Training
BSNL Industrial Training BSNL Industrial Training
BSNL Industrial Training
 
Modem
ModemModem
Modem
 
Wireless electronic notice board using gsm technolgy
Wireless electronic notice board using gsm technolgyWireless electronic notice board using gsm technolgy
Wireless electronic notice board using gsm technolgy
 
Data communication (simple explanation)
Data communication (simple explanation)Data communication (simple explanation)
Data communication (simple explanation)
 
Software Modem Working Mechanism
Software Modem Working MechanismSoftware Modem Working Mechanism
Software Modem Working Mechanism
 
Data communication by Phone Lines
Data communication by Phone LinesData communication by Phone Lines
Data communication by Phone Lines
 
Gsm based wireless notice board Rajneesh
Gsm based wireless notice board RajneeshGsm based wireless notice board Rajneesh
Gsm based wireless notice board Rajneesh
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Modem presentation

  • 1.
  • 3. GROUP MEMBERS  Muhammad Waqar  Muhammad Bilal  Raheel Hassan 01-133112-058 01-133112-038 01-133112-050
  • 5. INDEX        Introduction to Modem History What is Modem.? Types of Modem Functions of the Modem Modem purpose Modem Security
  • 6. INTRODUCTION  A modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information.  The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data.  Modems can be used over any means of transmitting analog signals, from light emitting diodes to radio.
  • 7.  Modems are generally classified by the amount of data they can send in a given unit of time, usually expressed in bits per second (bit/s, or bps).  The most familiar example is a voice band modem that turns the digital data of a personal computer into modulated electrical signals in the voice frequency range of a telephone channel.  These signals can be transmitted over telephone lines and demodulated by another modem at the receiver side to recover the digital data.
  • 8.    Modems are generally classified by the amount of data they can send in a given unit of time, usually expressed in bits per second (bit/s, or bps). The most familiar example is a voice band modem that turns the digital data of a personal computer into modulated electrical signals in the voice frequency range of a telephone channel. These signals can be transmitted over telephone lines and demodulated by another modem at the receiver side to recover the digital data.
  • 9.
  • 10. History     IN 1920 used as multiplex equipment In 1958 used in airdefense system In 1960 the name Data-Phone was introduced In 1962 The famous Bell 103A dataset standard was also introduced by AT&T
  • 11. WHAT IS MODEM.? Modem, short for modulator-demodulator is an electronic device that converts a computer’s digital signals into specific frequencies to travel over telephone or cable television lines. At the destination, the receiving modem demodulates the frequencies back into digital data. Computers use modems to communicate with one another over a network.
  • 12. TYPES OF MODEMS External vs. Internal Modems   External Modem: This is a modem separated from the system unit in the computer case. It is connected to the serial port of the computer by means of a cable. It is connected to the telephone wall jack by another cable. Internal Modem: An internal modem is a circuit board (a modem card) that can be added to the system unit of the computer. It takes one of the expansion slots.
  • 13. Standard vs. Intelligent Modems Standard Modems: Most modems used today are called standard modems. These modems are usually operated by commands entered from a microcomputer keyboard.  Intelligent Modems: Intelligent modems are also called advanced modems. These modems can accept new instructions and then respond to the commands while transmitting data and information. 
  • 14. Short-Haul and Wireless Modems Short-Haul Modems: Short- haul modems are devices that transmit signals down the cable through any COM1 port.  Wireless Modems: Wireless modems transmit the data signals through the air instead of by using a cable. They sometimes are called a radiofrequency modem. oving. 
  • 15.
  • 16. What is Modems purpose ? The word modem is an acronym for Modulator-Demodulator. Basically, a modem is used for transmitting and receiving data over a communication channel, such as twisted-pair telephone lines, coaxial cables, and optical fibers. Currently the purpose of a modem is to convert a computer’s data stream to analog format so that it can be transmitted over the analog telephone line. At the source, modulation techniques are used to convert digital data (0’s and 1’s) into analog form for transmission across the channel. At the destination, the received analog signal is converted to digital data via demodulation. This is a simplified explanation of how a modem works, and there are other issues that require attention; such as channel impairments, encryption, error detection/correction, data compression, modulation, handshake negotiation, and echo cancellation. These features will be discussed a bit later.
  • 17. FUNCTION OF MODEMS 1. 2. 3. Error Correction Compressing the Data Flow Control
  • 19. Modem Security Modem security can be an issue for some people, especially if they leave their modems on for a continuous connection to the Internet. However, many modems have built-in security software to protect your home computer from invasion. Using a router will enhance your security, as will shifting to a less popular but highly secure operating system like Linux.