Wednesday, February 7, 2024

Computer System Organization


A digital computer consists of an interconnected system of processors, memories, and input/output devices. Processors, memories, and input/output are key concepts and will be present at every level, so we will start to study computer architecture by looking at all three in turn.

PROCESSORS

The CPU (Central Processing Unit) is the ‘‘brain’’ of the computer.

A central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions  of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions. The computer industry has used the term “central processing unit” at least since the early 1960s.Traditionally, the term “CPU” refers to a processor, more specifically to its processing unit and control unit (CU), distinguishing these core elements of a computer from external components such as main memory and I/O circuitry.

The CPU is composed of several distinct parts. The control unit is responsible for fetching instructions from the main memory and determining their type. The arithmetic logic unit performs operations such as addition and Boolean AND needed to carry out the instructions.

The CPU also contains a small, high-speed memory used to store temporary results and certain control information. This memory is made up of a number of registers, each of which has a certain size and function. Usually, all the registers have the same size. Each register can hold one number, up to some maximum determined by the size of the register. Registers can be read and written at high speed since they are internal to the CPU. The most important register is the Program Counter (PC), which points to the next instruction to be fetched for execution. ( The name ‘‘program counter’’ is somewhat misleading because it has nothing to do with counting anything, but the term is universally used. Also important is the Instruction Register (IR), which holds the instruction currently being executed. ( Most computers have numerous other registers as well, some of the general-purpose as well as some for specific purposes.

What is the,,bus,,?

In computer architecture, a bus is a communication system that transfers data between components inside a computer, or between computers. This expression covers all related hardware components (wire, optical fiber, etc.) and software, including communication protocols.

Early computer buses were parallel electrical wires with multiple hardware connections, but the term is now used for any physical arrangement that provides the same logical function as a parallel electrical bus. Modern computer buses can use both parallel and bit-serial connections and can be wired in either a multi-drop(electrical parallel) or daisy chain topology, or connected by switched hubs, as in the case of USB.

CPU Organization

  • A system bus is a link that connects every segment of a system to the central storage and carries out the data transfer in them.
  • It is a pathway composed of cables and connectors which is used to carry data between a computer microprocessor and the main memory.
  • It provides a communication path for the data and control signals moving between the major components of the computer system.

The types of system buses are

  • These are the pieces of information that are to be transferred.
  • The data is transferred between peripherals, memory and the CPU. The data bus can be a very busy pathway.
  • It stores information about where the data is to be transferred.
  • The components pass memory addresses to one another over the address bus.
  • These are the set of instructions regarding what to do with the data.
  • It is used to send out signals to coordinate and manage the activities of the motherboard components.

1. Bus Width

  • The size of a bus also known as its width.
  • It determines how much data can be transferred at a time.
  • This refers to the amount of information that can be transferred once.

2. Bus Speed

  • This refers to the no. of bits or bytes the bus can send per unit time.
  • It is also defined by its frequency. Frequency means that the number of data packets sent or received per second. Each time that data is sent or received is called a cycle.

The system bus combines the functions of the three main buses, namely Control Bus, Address Bus, Data Bus. The control bus carries the control, timing and coordination signals to manage the various functions across the system. The address bus is used to specify memory locations for the data being transferred.

The data bus, which is a bidirectional path. It carries the actual data between the processor (CPU), the memory and the peripherals (Input and Output). The system bus architecture varies from system to system and can be specific to a particular computer design. The other common characteristics of system buses are based on the primary role, connecting devices internally or externally, etc.

Internal Bus

  • It is also known as an internal data bus, a memory bus, a system bus or Front-Side-Bus.
  • It connects all the internal components of a computer, such as CPU and memory, to the motherboard.
  • Internal data buses are also referred to as a local bus because they are intended to connect to local devices.
  • This bus is quick and independent of the rest of the computer operations.

External Bus

  • It is also known as an expansion bus.
  • It is made up of the electronic pathways that connect the different external devices, such as a printer, etc.

Cache Function

A CPU cache is a hardware cache used by the central processing unit (CPU) of a computer to reduce the average cost (time or energy) to access data from the main memory. A cache is a smaller, faster memory, closer to a processor core, which stores copies of the data from frequently used main memory locations. Most CPUs have different independent caches, including instruction and data caches, where the data cache is usually organized as a hierarchy of more cache levels (L1, L2, etc.).

All modern (fast) CPUs (with few specialized exceptions) have multiple levels of CPU caches. The first CPUs that used a cache had only one level of cache; unlike later level 1 caches, it was not split into L1d (for data) and L1i (for instructions). Almost all current CPUs with caches have a split L1 cache. They also have L2 caches and, for larger processors, L3 caches as well. The L2 cache is usually not split and acts as a common repository for the already split L1 cache. Every core of a multi-core processor has a dedicated L2 cache and is usually not shared between the cores. The L3 cache, and higher-level caches, are shared between the cores and are not split. An L4 cache is currently uncommon and is generally on dynamic random access memory (DRAM), rather than on static random access memory (SRAM), on a separate die or chip. That was also the case historically with L1, while bigger chips have allowed integration of it and generally all cache levels, with the possible exception of the last level. Each extra level of cache tends to be bigger and be optimized differently.

Other types of caches exist (that are not counted towards the “cache size” of the most important caches mentioned above), such as the translation look aside buffer (TLB) that is part of the memory management unit (MMU) that most CPUs have.

Caches are generally sized in powers of two: 4, 8, 16 etc. KiB or MiB(for larger non-L1) sizes, although the IBM z13has a 96 KiB L1 instruction cache.

Instruction Execution Cycle

  • This is a process of getting the instruction from the memory, decoding it to the machine language and executing it. So, three basic steps of the cycle are:

Fetch the instruction.
Decode it.
Execute.

  • The whole process of fetching the instructions from the memory, decoding it to the machine language and executing it, is termed as an instruction cycle.

PRIMARY MEMORY

The memory is that part of the computer where programs and data are stored. Some computer scientists (especially British ones) use the term store or storage rather than memory, although more and more, the term ‘‘storage’’ is used to refer to disk storage. Without a memory from which the processors can read and write information, there would be no stored-program digital computers.

Bits

The basic unit of memory is the binary digit, called a bit. A bit may contain a 0 or a 1. It is the simplest possible unit. (A device capable of storing only zeros could hardly form the basis of a memory system; at least two values are needed.) People often say that computers use binary arithmetic because it is ‘‘efficient.’’ What they mean (although they rarely realize it) is that digital information can be stored by distinguishing between different values of some continuous physical quantity, such as voltage or current. The more values that must be distinguished, the less separation between adjacent values, and the less reliable the memory. The binary number system requires only two values to be distinguished. Consequently, it is the most reliable method for encoding digital information.

Memory Addresses

In computing, a memory address is a reference to a specific memory location used at various levels by software and hardware. Memory addresses are fixed-length sequences of digits conventionally displayed and manipulated as unsigned integers.Such numerical semantic bases itself upon features of CPU (such as the instruction pointer and incremental address registers), as well upon the use of the memory like an array endorsed by various programming languages.

 

 

Tuesday, February 6, 2024

Cellular Network


Cellular network is an underlying technology for mobile phones, personal communication systems, wireless networking etc. The technology is developed for mobile radio telephone to replace high power transmitter/receiver systems. Cellular networks use lower power, shorter range and more transmitters for data transmission.

Features of Cellular Systems

Wireless Cellular Systems solves the problem of spectral congestion and increases user capacity. The features of cellular systems are as follows −

  • Offer very high capacity in a limited spectrum.

  • Reuse of radio channel in different cells.

  • Enable a fixed number of channels to serve an arbitrarily large number of users by reusing the channel throughout the coverage region.

  • Communication is always between mobile and base station (not directly between mobiles).

  • Each cellular base station is allocated a group of radio channels within a small geographic area called a cell.

  • Neighboring cells are assigned different channel groups.

  • By limiting the coverage area to within the boundary of the cell, the channel groups may be reused to cover different cells.

  • Keep interference levels within tolerable limits.

  • Frequency reuse or frequency planning.

  • Organization of Wireless Cellular Network.

Cellular network is organized into multiple low power transmitters each 100w or less.

Shape of Cells

The coverage area of cellular networks are divided into cells, each cell having its own antenna for transmitting the signals. Each cell has its own frequencies. Data communication in cellular networks is served by its base station transmitter, receiver and its control unit.

The shape of cells can be either square or hexagon −

Square

A square cell has four neighbors at distance d and four at distance Root 2 d

  • Better if all adjacent antennas equidistant
  • Simplifies choosing and switching to new antenna

Hexagon

A hexagon cell shape is highly recommended for its easy coverage and calculations. It offers the following advantages −

  • Provides equidistant antennas
  • Distance from center to vertex equals length of side

Frequency Reuse

Frequency reusing is the concept of using the same radio frequencies within a given area, that are separated by considerable distance, with minimal interference, to establish communication.

Frequency reuse offers the following benefits −

  • Allows communications within cell on a given frequency
  • Limits escaping power to adjacent cells
  • Allows re-use of frequencies in nearby cells
  • Uses same frequency for multiple conversations
  • 10 to 50 frequencies per cell

For example, when N cells are using the same number of frequencies and K be the total number of frequencies used in systems. Then each cell frequency is calculated by using the formulae K/N.

In Advanced Mobile Phone Services (AMPS) when K = 395 and N = 7, then frequencies per cell on an average will be 395/7 = 56. Here, cell frequency is 56.

Advantages of Cellular networks :

● It is flexible enough to use the features and functions of almost all public and private networks.

● It has increased capacity.

● It consumes less power.

● It can be distributed to larger coverage area.

● It reduces interference from other signals.

 

Thursday, February 1, 2024

Characteristics of Wireless Channel


The most important characteristics of wireless channel are −

  • Path loss
  • Fading
  • Interference
  • Doppler shift

In the following sections, we will discuss these channel characteristics one by one.

Path Loss

Path loss can be expressed as the ratio of the power of the transmitted signal to the power of the same signal received by the receiver, on a given path. It is a function of the propagation distance.

  • Estimation of path loss is very important for designing and deploying wireless communication networks

  • Path loss is dependent on a number of factors such as the radio frequency used and the nature of the terrain.

  • The free space propagation model is the simplest path loss model in which there is a direct-path signal between the transmitter and the receiver, with no atmosphere attenuation or multipath components.

In this model, the relationship between the transmitted power Pt and the received power Pr is given by

$$P_{r} = P_{t}G_{t}G_{r}(\frac{\lambda}{4\Pi d})^2$$

Where

  • Gt is the transmitter antenna gain

  • Gr is the receiver antenna gain

  • d is the distance between the transmitter and receiver

  • λ is the wavelength of the signal

Two-way model also called as two path models is widely used path loss model. The free space model described above assumes that there is only one single path from the transmitter to the receiver.

In reality, the signal reaches the receiver through multiple paths. The two path model tries to capture this phenomenon. The model assumes that the signal reaches the receiver through two paths, one a line-of-sight and the other the path through which the reflected wave is received.

According to the two-path model, the received power is given by

$$P_{r} = P_{t}G_{t}G_{r}(\frac{h_{t}h_{r}}{d^2})^2$$

Where

  • pt is the transmitted power

  • Gt represent the antenna gain at the transmitter

  • Gr represent the antenna gain at the receiver

  • d is the distance between the transmitter and receiver

  • ht is the height of the transmitter

  • hr are the height of the receiver

Fading

Fading refers to the fluctuations in signal strength when received at the receiver. Fading can be classified in to two types −

  • Fast fading/small scale fading and
  • Slow fading/large scale fading

Fast fading refers to the rapid fluctuations in the amplitude, phase or multipath delays of the received signal, due to the interference between multiple versions of the same transmitted signal arriving at the receiver at slightly different times.

The time between the reception of the first version of the signal and the last echoed signal is called delay spread. The multipath propagation of the transmitted signal, which causes fast fading, is because of the three propagation mechanisms, namely −

  • Reflection
  • Diffraction
  • Scattering

The multiple signal paths may sometimes add constructively or sometimes destructively at the receiver causing a variation in the power level of the received signal. The received single envelope of a fast fading signal is said to follow a Rayleigh distribution to see if there is no line-of-sight path between the transmitter and the receiver.

Slow Fading

The name Slow Fading itself implies that the signal fades away slowly. The features of slow fading are as given below.

  • Slow fading occurs when objects that partially absorb the transmission lie between the transmitter and receiver.

  • Slow fading is so called because the duration of the fade may last for multiple seconds or minutes.

  • Slow fading may occur when the receiver is inside a building and the radio wave must pass through the walls of a building, or when the receiver is temporarily shielded from the transmitter by a building. The obstructing objects cause a random variation in the received signal power.

  • Slow fading may cause the received signal power to vary, though the distance between the transmitter and receiver remains the same.

  • Slow fading is also referred to as shadow fading since the objects that cause the fade, which may be large buildings or other structures, block the direct transmission path from the transmitter to the receiver.

Interference

Wireless transmissions have to counter interference from a wide variety of sources. Two main forms of interference are −

  • Adjacent channel interference and
  • Co-channel interference.

In Adjacent channel interference case, signals in nearby frequencies have components outside their allocated ranges, and these components may interfere with on-going transmission in the adjacent frequencies. It can be avoided by carefully introducing guard bands between the allocated frequency ranges.

Co-channel interference, sometimes also referred to as narrow band interference, is due to other nearby systems using the same transmission frequency.

Inter-symbol interference is another type of interference, where distortion in the received signal is caused by the temporal spreading and the consequent overlapping of individual pulses in the signal.

Adaptive equalization is a commonly used technique for combating inter symbol interference. It involves gathering the dispersed symbol energy into its original time interval. Complex digital processing algorithms are used in the equalization process.

Wednesday, January 31, 2024

Multiple Access


In any cellular system or cellular technology, it is necessary to have a scheme that enables several multiple users to gain access to it and use it simultaneously. As cellular technology has progressed different multiple access schemes have been used. They form the very core of the way in which the radio technology of the cellular system works.

There are four main multiple access schemes that are used in cellular systems ranging from the very first analogue cellular technologies to those cellular technologies that are being developed for use in the future. The multiple access schemes are known as FDMA, TDMA, CDMA and OFDMA.

Requirements for a multiple access scheme

In any cellular system it is necessary for it to be able have a scheme whereby it can handle multiple users at any given time. There are many ways of doing this, and as cellular technology has advanced, different techniques have been used.

There are a number of requirements that any multiple access scheme must be able to meet:

  • Ability to handle several users without mutual interference.
  • Ability to be able to maximise the spectrum efficiency
  • Must be robust, enabling ease of handover between cells.

FDMA - Frequency Division Multiple Access

FDMA is the most straightforward of the multiple access schemes that have been used. As a subscriber comes onto the system, or swaps from one cell to the next, the network allocates a channel or frequency to each one. In this way the different subscribers are allocated a different slot and access to the network. As different frequencies are used, the system is naturally termed Frequency Division Multiple Access. This scheme was used by all analogue systems.

 

TDMA - Time Division Multiple Access

The second system came about with the transition to digital schemes for cellular technology. Here digital data could be split up in time and sent as bursts when required. As speech was digitised it could be sent in short data bursts, any small delay caused by sending the data in bursts would be short and not noticed. In this way it became possible to organise the system so that a given number of slots were available on a give transmission. Each subscriber would then be allocated a different time slot in which they could transmit or receive data. As different time slots are used for each subscriber to gain access to the system, it is known as time division multiple access. Obviously this only allows a certain number of users access to the system. Beyond this another channel may be used, so systems that use TDMA may also have elements of FDMA operation as well.

CDMA - Code Division Multiple Access

CDMA uses one of the aspects associated with the use of direct sequence spread spectrum. It can be seen from the article in the cellular telecoms area of this site that when extracting the required data from a DSSS signal it was necessary to have the correct spreading or chip code, and all other data from sources using different orthogonal chip codes would be rejected. It is therefore possible to allocate different users different codes, and use this as the means by which different users are given access to the system.

The scheme has been likened to being in a room filled with people all speaking different languages. Even though the noise level is very high, it is still possible to understand someone speaking in your own language. With CDMA different spreading or chip codes are used. When generating a direct sequence spread spectrum, the data to be transmitted is multiplied with spreading or chip code. This widens the spectrum of the signal, but it can only be decided in the receiver if it is again multiplied with the same spreading code. All signals that use different spreading codes are not seen, and are discarded in the process. Thus in the presence of a variety of signals it is possible to receive only the required one.

In this way the base station allocates different codes to different users and when it receives the signal it will use one code to receive the signal from one mobile, and another spreading code to receive the signal from a second mobile. In this way the same frequency channel can be used to serve a number of different mobiles.

OFDMA - Orthogonal Frequency Division Multiple Access

OFDMA is the form of multiple access scheme that is being considered for the fourth generation cellular technologies along with the evolutions for the third generation cellular systems (LTE for UMTS / W-CDMA and UMB for CDMA2000).

As the name implies, OFDMA is based around OFDM. This is a technology that utilises a large number of close spaced carriers.

To utilise OFDM as a multiple access scheme for cellular technology, two different methods are used, one for the uplink and one for the downlink. In the downlink, the mobile receives the whole signal transmitted by the base station and extracts the data destined for the particular mobile. In the uplink, one or more carriers are allocated to each handset dependent upon the data to be transmitted, etc. In this way the cellular network is able to control how the data is to be sent and received.

 

Wireless Application Protocol(WAP)


Wireless Application Protocol or WAP is a programming model or an application environment and set of communication protocols based on the concept of the World Wide Web (WWW), and its hierarchical design is very much similar to TCP/IP protocol stack design. See the most prominent features of Wireless Application Protocol or WAP in Mobile Computing:

  • WAP is a De-Facto standard or a protocol designed for micro-browsers, and it enables the mobile devices to interact, exchange and transmit information over the Internet.
  • WAP is based upon the concept of the World Wide Web (WWW), and the backend functioning also remains similar to WWW, but it uses the markup language Wireless Markup Language (WML) to access the WAP services while WWW uses HTML as a markup language. WML is defined as XML 1.0 application.
  • In 1998, some giant IT companies such as Ericson, Motorola, Nokia and Unwired Planet founded the WAP Forum to standardize the various wireless technologies via protocols.
  • After developing the WAP model, it was accepted as a wireless protocol globally capable of working on multiple wireless technologies such as mobile, printers, pagers, etc.
  • In 2002, by the joint efforts of the various members of the WAP Forum, it was merged with various other forums of the industry and formed an alliance known as Open Mobile Alliance (OMA).
  • WAP was opted as a De-Facto standard because of its ability to create web applications for mobile devices.

Working of Wireless Application Protocol or WAP Model

The following steps define the working of Wireless Application Protocol or WAP Model:

  • The WAP model consists of 3 levels known as Client, Gateway and Origin Server.
  • When a user opens the browser in his/her mobile device and selects a website that he/she wants to view, the mobile device sends the URL encoded request via a network to a WAP gateway using WAP protocol.
  • The request he/she sends via mobile to WAP gateway is called as encoding request.
  • The sent encoding request is translated through WAP gateway and then forwarded in the form of a conventional HTTP URL request over the Internet.
  • When the request reaches a specified Web server, the server processes the request just as it would handle any other request and sends the response back to the mobile device through WAP gateway.
  • Now, the WML file's final response can be seen in the browser of the mobile users.

WAP Protocol Stack

It specifies the different communications and data transmission layers used in the WAP model:

Application Layer: This layer consists of the Wireless Application Environment (WAE), mobile device specifications, and content development programming languages, i.e., WML.

Session Layer: The session layer consists of the Wireless Session Protocol (WSP). It is responsible for fast connection suspension and reconnection.

Transaction Layer: The transaction layer consists of Wireless Transaction Protocol (WTP) and runs on top of UDP (User Datagram Protocol). This layer is a part of TCP/IP and offers transaction support.

Security Layer: It contains Wireless Transaction Layer Security (WTLS) and responsible for data integrity, privacy and authentication during data transmission.

Transport Layer: This layer consists of Wireless Datagram Protocol (WDP). It provides a consistent data format to higher layers of the WAP protocol stack.

Advantages of Wireless Application Protocol (WAP)

Following is a list of some advantages of Wireless Application Protocol or WAP:

  • WAP is a very fast-paced technology.
  • It is an open-source technology and completely free of cost.
  • It can be implemented on multiple platforms.
  • It is independent of network standards.
  • It provides higher controlling options.
  • It is implemented near to Internet model.
  • By using WAP, you can send/receive real-time data.
  • Nowadays, most modern mobile phones and devices support WAP.

Disadvantages of Wireless Application Protocol (WAP)

Following is a list of some disadvantages of Wireless Application Protocol or WAP:

  • The connection speed in WAP is slow, and there is limited availability also.
  • In some areas, the ability to connect to the Internet is very sparse, and in some other areas, Internet access is entirely unavailable.
  • It is less secured.
  • WAP provides a small User interface (UI).

Applications of Wireless Application Protocol (WAP)

The following are some most used applications of Wireless Application Protocol or WAP:

  • WAP facilitates you to access the Internet from your mobile devices.
  • You can play games on mobile devices over wireless devices.
  • It facilitates you to access E-mails over the mobile Internet.
  • Mobile hand-sets can be used to access timesheets and fill expenses claims.
  • Online mobile banking is very popular nowadays.
  • It can also be used in multiple Internet-based services such as geographical location, Weather forecasting, Flight information, Movie & cinema information, Traffic updates etc. All are possible due to WAP technology.

Tuesday, January 30, 2024

How Satellites Work


A satellite is basically a self-contained communications system with the ability to receive signals from Earth and to retransmit those signals back with the use of a transponder—an integrated receiver and transmitter of radio signals. A satellite has to withstand the shock of being accelerated during launch up to the orbital velocity of 28,100 km (17,500 miles) an hour and a hostile space environment where it can be subject to radiation and extreme temperatures for its projected operational life, which can last up to 20 years. In addition, satellites have to be light, as the cost of launching a satellite is quite expensive and based on weight. To meet these challenges, satellites must be small and made of lightweight and durable materials. They must operate at a very high reliability of more than 99.9 percent in the vaccum of space with no prospect of maintenance or repair.

The main components of a satellite consist of the communications system, which includes the antennas and transponders that receive and retransmit signals, the power system, which includes the solar panels that provide power, and the propulsion system, which includes the rockets that propel the satellite. A satellite needs its own propulsion system to get itself to the right orbital location and to make occasional corrections to that position. A satellite in geostationary orbit can deviate up to a degree every year from north to south or east to west of its location because of the gravitational pull of the Moon and Sun. A satellite has thrusters that are fired occasionally to make adjustments in its position. The maintenance of a satellite’s orbital position is called “station keeping,” and the corrections made by using the satellite’s thrusters are called “attitude control.” A satellite’s life span is determined by the amount of fuel it has to power these thrusters. Once the fuel runs out, the satellite eventually drifts into space and out of operation, becoming space debris.

A satellite in orbit has to operate continuously over its entire life span. It needs internal power to be able to operate its electronic systems and communications payload. The main source of power is sunlight, which is harnessed by the satellite’s solar panels. A satellite also has batteries on board to provide power when the Sun is blocked by Earth. The batteries are recharged by the excess current generated by the solar panels when there is sunlight.

Satellites operate in extreme temperatures from −150 °C (−238 °F) to 150 °C (300 °F) and may be subject to radiation in space. Satellite components that can be exposed to radiation are shielded with aluminium and other radiation-resistant material. A satellite’s thermal system protects its sensitive electronic and mechanical components and maintains it in its optimum functioning temperature to ensure its continuous operation. A satellite’s thermal system also protects sensitive satellite components from the extreme changes in temperature by activation of cooling mechanisms when it gets too hot or heating systems when it gets too cold.

The tracking telemetry and control (TT&C) system of a satellite is a two-way communication link between the satellite and TT&C on the ground. This allows a ground station to track a satellite’s position and control the satellite’s propulsion, thermal, and other systems. It can also monitor the temperature, electrical voltages, and other important parameters of a satellite.

Communication satellites range from microsatellites weighing less than 1 kg (2.2 pounds) to large satellites weighing over 6,500 kg (14,000 pounds). Advances in miniaturization and digitalization have substantially increased the capacity of satellites over the years. Early Bird had just one transponder capable of sending just one TV channel. The Boeing 702 series of satellites, in contrast, can have more than 100 transponders, and with the use of digital compression technology each transponder can have up to 16 channels, providing more than 1,600 TV channels through one satellite.

Satellites operate in three different orbits: low Earth Orbit (LEO), medium Earth orbit (MEO), and geostationary or geosynchronous orbit (GEO). LEO satellites are positioned at an altitude between 160 km and 1,600 km (100 and 1,000 miles) above Earth. MEO satellites operate from 10,000 to 20,000 km (6,300 to 12,500 miles) from Earth. (Satellites do not operate between LEO and MEO because of the inhospitable environment for electronic components in that area, which is caused by the Van Allen radiation belt.) GEO satellites are positioned 35,786 km (22,236 miles) above Earth, where they complete one orbit in 24 hours and thus remain fixed over one spot. As mentioned above, it only takes three GEO satellites to provide global coverage, while it takes 20 or more satellites to cover the entire Earth from LEO and 10 or more in MEO. In addition, communicating with satellites in LEO and MEO requires tracking antennas on the ground to ensure seamless connection between satellites.

A signal that is bounced off a GEO satellite takes approximately 0.22 second to travel at the speed of light from Earth to the satellite and back. This delay poses some problems for applications such as voice services and mobile telephony. Therefore, most mobile and voice services usually use LEO or MEO satellites to avoid the signal delays resulting from the inherent latency in GEO satellites. GEO satellites are usually used for broadcasting and data applications because of the larger area on the ground that they can cover.

Launching a satellite into space requires a very powerful multistage rocket to propel it into the right orbit. Satellite launch providers use propietary rockets to launch satellites from sites such as the Kennedy Space Center at Cape Canaveral, Florida, the Baikonur Cosmodrome in Kazakhstan, Kourou in French Guiana, Vandenberg Air Force Base in California, Xichang in China, and Tanegashima Island in Japan.

Satellite communications use the very high-frequency range of 1–50 gigahertz (GHz; 1 gigahertz = 1,000,000,000 hertz) to transmit and receive signals. The frequency ranges or bands are identified by letters: (in order from low to high frequency) L-, S-, C-, X-, Ku-, Ka-, and V-bands. Signals in the lower range (L-, S-, and C-bands) of the satellite frequency spectrum are transmitted with low power, and thus larger antennas are needed to receive these signals. Signals in the higher end (X-, Ku-, Ka-, and V-bands) of this spectrum have more power; therefore, dishes as small as 45 cm (18 inches) in diameter can receive them. This makes the Ku-band and Ka-band spectrum ideal for direct-to-home (DTH) broadcasting, broadband data communications, and mobile telephony and data applications.

The International Telecommunication Union (ITU), a specialized agency of the United Nations, regulates satellite communications. The ITU, which is based in Geneva, Switzerland, receives and approves applications for use of orbital slots for satellites. Every two to four years the ITU convenes the World Radiocommunication Conference, which is responsible for assigning frequencies to various applications in various regions of the world. Each country’s telecommunications regulatory agency enforces these regulations and awards licenses to users of various frequencies. In the United States the regulatory body that governs frequency allocation and licensing is the Federal Communications Commissions.

Satellite Applications

Advances in satellite technology  have given rise to a healthy satellite services sector that provides various services to broadcasters, Internet Service Providers (ISPs), governments, the military, and other sectors. There are three types of communication services that satellites provide: telecommunications, broadcasting, and data communications. Telecommunication services include telephone calls and services provided to telephone companies, as well as wireless, mobile, and cellular network providers.

Broadcasting services include radio and television delivered directly to the consumer and mobile broadcasting services. DTH, or satellite television, services (such as the DirecTV and DISH Network services in the United States) are received directly by households. Cable and network programming is delivered to local stations and affiliates largely via satellite. Satellites also play an important role in delivering programming to cell phones and other mobile devices, such as personal digital assistants and laptops.

Data communications involve the transfer of data from one point to another. Corporations and organizations that require financial and other information to be exchanged between their various locations use satellites to facilitate the transfer of data through the use of very small-aperture terminal (VSAT) networks. With the growth of the Internet, a significant amount of Internet traffic goes through satellites, making ISPs one of the largest customers for satellite services.

Satellite communications technology is often used during natural disasters and emergencies when land-based communication services are down. Mobile satellite equipment can be deployed to disaster areas to provide emergency communication services.

One major technical disadvantage of satellites, particularly those in geostationary orbit, is an inherent delay in transmission. While there are ways to compensate for this delay, it makes some applications that require real-time transmission and feedback, such as voice communications, not ideal for satellites.

Satellites face competition from other media such as fibre optics, cable, and other land-based delivery systems such as microwaves and even power lines. The main advantage of satellites is that they can distribute signals from one point to many locations. As such, satellite technology is ideal for “point-to-multipoint” communications such as broadcasting. Satellite communication does not require massive investments on the ground—making it ideal for underserved and isolated areas with dispersed populations.

Satellites and other delivery mechanisms such as fibre optics, cable, and other terrestrial networks are not mutually exclusive. A combination of various delivery mechanisms may be needed, which has given rise to various hybrid solutions where satellites can be one of the links in the chain in combination with other media. Ground service providers called “teleports” have the capability to receive and transmit signals from satellites and also provide connectivity with other terrestrial networks.

 

Monday, January 29, 2024

WAN


A wide area network (also known as WAN), is a large network of information that is not tied to a single location. WANs can facilitate communication, the sharing of information and much more between devices from around the world through a WAN provider.

WANs can be vital for international businesses, but they are also essential for everyday use, as the internet is considered the largest WAN in the world. Keep reading for more information on WANs, their use, how they differ from other networks and their overall purpose for businesses and people, alike.

What Is a Wide Area Network (WAN)?

As described above, wide area networks are a form of telecommunication networks that can connect devices from multiple locations and across the globe. WANs are the largest and most expansive forms of computer networks available to date.

These networks are often established by service providers that then lease their WAN to businesses, schools, governments or the public. These customers can use the network to relay and store data or communicate with other users, no matter their location, as long as they have access to the established WAN. Access can be granted via different links, such as virtual private networks (VPNs) or lines, wireless networks, cellular networks or internet access.

For international organizations, WANs allow them to carry out their essential daily functions without delay. Employees from anywhere can use a business’s WAN to share data, communicate with coworkers or simply stay connected to the greater data resource center for that organization. Certified Network Professionals help organizations maintain their internal wide area network, as well as other critical IT infrastructure.

What’s the Difference Between Wide Area Network (WAN) and Local Area Network (LAN)?

There are many different forms of area networks, but one of the most common networks outside of WANs is the local area network, or LAN.

Whereas WANs can exist globally, without ties to a physical location through the use of a leased network provider, LANs exist within a limited area. LANs can be used to access a greater WAN (such as the internet), but only within the area where the LAN’s infrastructure can reach.

Two common examples of LANs are ethernet and wireless networks. Wireless LANs are also known as WLANs. Other forms of telecommunication networks include the following:

  • Personal area networks (PAN)
  • Metropolitan area networks (MAN)
  • Cloud or Internet Area Networks(IAN)

What Is the Purpose of a WAN Connection?

If WAN connections didn’t exist, organizations would be isolated to restricted areas or specific geographic regions. LANs would allow organizations to work within their building, but growth to outside areas — either different cities or even different countries — would not be possible because the associated infrastructure would be cost prohibitive for most organizations.

As organizations grow and become international, WANs allow them to communicate between branches, share information and stay connected. When employees travel for work, WANs allow them to access the information they need to do their job. WANs also help organizations share information with customers, as well as partner organizations, such as B2B clients or customers.

However, WANs also provide an essential service to the public. Students at universities might rely on WANs to access library databases or university research. And every day, people rely on WANs to communicate, bank, shop and more.

Advantages of a wide area network (WAN)

Covers large geographical area:

Wan covers a large geographical area of 1000 km or more If your office is in different cities or countries then you can connect your office branches through wan. ISP (Internet service provider) can give you leased lines by which you can connect different branch offices together.

Centralized data:

Your company doesn’t need to buy email, files, and backup servers, they can all reside on head office. All office branches can share the data through the head office server. You can get back up, support, and other useful data from the head office and all data are synchronized with all other office branches.

Get updated files and data:

Software companies work over the live server to exchange updated files. So all the coders and office staff get updated version of files within seconds.

A lot of application to exchange messages:

With IOT (Internet of things) and new LAN technologies, messages are being transmitted fast. A lot of web applications are available like Facebook messenger, WhatsApp, Skype by which you can communicate with friends via text, voice and video chat.

Sharing of software and resources:

Like LAN we can share software applications and other resources like a hard drive, RAM with other users on the internet. In web hosting, we share computer resources among many websites.

Global business:

Now everyone with computer skills can do business on the internet and expand his business globally. There are many types of business like a shopping cart, sale, and purchase of stocks etc.

High bandwidth:

If you get leased lines for your company then it gives high bandwidth than normal broadband connection. You can get a high data transfer rate that can increase your company productivity.

Distribute workload and decrease travel charges:

Another benefit of wide area network is that you can distribute your work to other locations. For example, you have an office in the U.S then you can hire people from any other country and communicate with them easily over WAN. It also reduces your travel charges as you can monitor the activities of your team online.

Disadvantages of a wide area network (WAN)

Security problems:

WAN has more security problem as compare to MAN and LAN. WAN has many technologies combined with each other which can create a security gap.

Needs firewall and antivirus software:

As data transferred on the internet can be accessed and changed by hackers so firewall needs to be enabled in the computer. Some people can also inject a virus into the computer so antivirus software needs to be installed. Other security software also needs to be installed on different points in WAN.

The setup cost is high:

Setting up WAN for the first time in office costs higher money. It may involve purchasing routers, switches, and extra security software.

Troubleshooting problems:

As WAN covers a lot of areas so fixing the problem in it is difficult. Most of WAN wires go into the sea and wires get broken sometimes. It involves a lot of resources to fix lines under the sea. In ISP (Internet service provider) head office many of internet lines, routers are mixed up in rooms and fixing issues on the internet requires a full-time staff.

Server down and disconnection issue:

In some areas, ISP faces problems due to electricity supply or bad lines structure. Customers often face connectivity issues or slow Internet speed issues. The solution to this is to purchase a dedicated line from ISP.

Examples of wide area network (WAN)

Some examples of WAN are below:

  • Internet
  • U.S defense department
  • Most big banks
  • Airline companies
  • Stock brokerages
  • Railway reservations counter
  • Large telecommunications companies like Airtel store IT department
  • Satellite systems
  • Cable companies
  • Network providers

AntiVirus

Antivirus software is designed to find known viruses and oftentimes other malware such as Ransomware, Trojan Horses, worms, spyw...