Wednesday, December 14, 2011

IMPLEMENTATION

Strengths and Weakness

Strengths of Broadband Internet Access:
1.   Connection speed is up to 100 times faster than dialup connection.  You can download pictures files, software in seconds or minutes instead of hours.  Online gaming is only possible using a broadband internet access.
2.   It does not affect the phone line.  For DSL internet access, you can use the same phone line for both voice/fax and data transmission.  For cable internet access, you are connected to the internet via the cable network.  In either case, your phone line is not occupied while you are connected to the internet.
3.   It is convenient because the internet connection is always on.
4.   You don't need to dial an access number and risk getting a busy signal.
5.   Broadband internet offers unlimited access and you won't be charged based on the connection duration.
6.   Broadband internet not only gives you high speed internet access, it can also provide cheap phone services via VoIP technology.

Weakness of Broadband Internet Access:
1.    High monthly fee compared to dialup internet access.
2.    Higher security risk than dialup connection.  A personal firewall is needed to protect your computer.
3.    Not all phone wires are equipped for DSL service.  May not be available in rural or remote areas.
4.    Not all cable TV networks are equipped for cable internet access.  May not be available in rural or remote areas.

Strength and Weakness of Baseband

Baseband is widely used, it can either be wireless or wired, and its signifisignificant role is for network purpose. It’s used for networking, data transmission, sharing of files and resources and yet its weakness is, it’s only limited for a short range of distance. Another strength is, it only uses a single medium wherein the speed of transmission is faster compared to multi-channels. Another weakness is, if in wireless, for example Bluetooth, it’s a multidimensional data transmission, so the packet or data will not be delivered to a reliable receiver.

Future Development of Baseband

BRISTOL, UK and SANTA CLARA, Calif.—May 9, 2011— NVIDIA announced today that it has agreed to acquire Icera, a leading innovator of top-performing baseband processors for 3G and 4G cellular phones and tablets. 
Icera has more than 550 patents granted or pending worldwide, and its high speed wireless-modem products have been approved by more than 50 carriers across the globe. By combining the companies’ products and technologies, including NVIDIA’s Tegra processor, NVIDIA will enhance its position as a leading player in the growing mobile market.
The acquisition, for $367 million in cash, has been approved by both companies’ boards of directors and is expected to be completed, subject to customary closing conditions, in approximately 30 days. The transaction is expected to be slightly dilutive on an operating basis through the first half of calendar 2012 and accretive on an operating basis in the second half of calendar 2012. This expectation does not take into account significant revenue synergies that the companies anticipate.
Conclusion of Baseband and Broadband
It doesn’t matter if either the topic is about baseband or broadband, what matters is; in telecommunication technology these two are very important especially in the field of networking

TECHNICAL CONTENTS

Hardware Requirement of Broadband
For PC Users:

Pentium 3 or higher, or AMD K6/Athlon/Duron equivalent
At least 256MB RAM
At least 1GB of available hard disk space
CD-ROM or DVD drive
High-powered USB Port or Ethernet Card

For Mac users:

PowerPC-based Macs (Power Mac, eMac, iMac, Mac mini, Powerbook, IBook)
Or Intel-based Macs (Mac Pro, iMac, Mac mini, MacBook, MacBook Pro)
At least 256MB RAM
At least 1GB of available hard disk space
CD-ROM or DVD drive
High-powered USB Port or Ethernet Card


Software Requirement of Broadband
For PC Users:

OS: Windows 98SE, Windows XP, 2000, ME, Vista, 7
Browsers: Internet Explorer v5 and up, Google Chrome, Mozilla Firefox

For Mac Users:

OS: Mac OS 9.x/10.2 (Jaguar)/10.3 (Panther)/10.4 (Tiger)
Browsers: Safari, Mozilla Firefox or Microsoft Internet Explorer v5 and up






Hardware Compatibilities of Baseband
Baseband compatible gadgets are mainly I Phones, Computers, and other cellular phones.
Examples:


Software Compatibilities of Baseband
Software compatibilities also depend on how the hardware or gadget is related to Baseband.

Application Area of Broadband
Broadband Applications has made it easier to access a high speed Internet connection. The most popular systems of Broadband Technologies are DSL and cable modem. Broadband Internet access is also referred as broadband or broadband Internet. 

Through Broadband Applications the data transfer rate could be made faster and higher in an Internet connection. The main tools of a broadband service are DSL and cable modem through which the data transmitting rate becomes faster than other Internet connections like Dial-up Modem, which is much slower. The uploading and downloading time are much lesser in broadband. 

Broadband Applications could be divided into two broad categories: 

Broadband telephony: This is more popularly referred as 'Voice over Internet Protocol', 'VoIP', 'Internet telephony', 'IP Telephony', 'Broadband Phone', or 'Voice over Broadband'. It is the process through the routing of voice conversations over any IP-based network or the Internet is done. They carry voice signals, which are known as protocols, over the IP network called VoIP protocols. 
Broadband radio: Also known as Internet radio, this is a service of audio broadcasting transmission through Internet. In technical term it is known as webcasting as it functions through World Wide Web. 
The Broadband Applications has added a new meaning to the world of entertainment and information.

Baseband Application Area
Baseband are used in a close range data transmission process wherein these transmissions are done using Baseband compatible gadgets. It is more used in IPhones, computers, cellular compatible baseband transmission and Bluetooth wireless data transmission.




Security of Broadband
It’s easy to be confused by all the technical jargon around broadband, especially when it relates to your security. Actually, it’s not so complicated, especially when you know what everything means and you're aware of what measures you can take to protect yourself.
The battle against viruses is very hard to fight, mostly because we can only act on a virus once it's there and we've seen it. A lot of viruses and spyware exhibit the same behavior, and are quite easy to spot, but the most sophisticated are a lot more difficult to identify. A Trojan horse exploit will disguise itself as a useful program, and once it's been allowed, go on to infect a system.
The other issue is the motivation behind them. A lot of malware and viruses are designed by people who like to mess with stuff - there is no direct purpose apart from "because I can". This makes them difficult to protect against because whatever you do, someone will break it just because it's there - you cannot remove the motivation.

Baseband Security

Error Correction

    There are three kinds of error correction schemes used in the baseband protocol: 1/3 rate FEC, 2/3 rate FEC and ARQ scheme.
  • In 1/3 rate FEC every bit is repeated three times for redundancy,
  • In 2/3 rate FEC a generator polynomial is used to encode 10 bit code to a 15 bit code,
  • In the ARQ schemeDM, DH and the data field of DV packets are retransmitted till an acknowledgement is received (or timeout is exceeded). Bluetooth uses fast, unnumbered acknowledgement in which it uses positive and negative acknowledgements by setting appropriate ARQN values. If the timeout value is exceeded, Bluetooth flushes the packet and proceeds with the next.

Bluetooth Security

    At the link layer, security is maintained by authentication of the peers and encryption of the information. For this basic security we need a public address which is unique for each device (BD_ADDR), two secret keys (authentication keys and encryption key) and a random number generator. First a device does the authentication by issuing a challenge and the other device has to then send a response to that challenge which is based on the challenge, it's BD_ADDR and a link key shared between them. After authentication, encryption may be used to communicate.

PROTOCOLS AND NETWORK CONFIGURATION

Protocols of Broadband

Broadband or Broadband Internet Access refers to high speed Internet access, and is one of the most popular of WAN protocols due to its high data transmission rate. Broadband can yield speeds of 256 kbit/s or more. Digital Subscriber Line (DSL) and cable modems are the standard broadband technologies used in a majority of areas. Newer technologies that have evolved include Very High Bitrate DSL (VDSL or VHDSL) and fiber-optic cables. DSL is based on modem technology for Internet access over copper telephone lines. Multiple DSL users are connected to the high-speed network using a Digital Subscriber Line Access Multiplexer (DSLAM). The telephone company employs the DSLAM to effectuate aggregation of data transmission from available DSL lines and then interconnecting them to the ATM network. At the transmission end point, a DSLAM forwards data to a DSL connection after demultiplexing the signals.
The different types of DSL connections (ADSL, HDSL, SDSL, IDSL and VDSL), collectively referred to as xDSL, establish connectivity between the telephone company and office. Digital Subscriber Lines use several modulation technologies: Discrete Multitone Technology (DMT), Simple Line Code (SLC), Carrierless Amplitude Modulation (CAP), Multiple Virtual Line (MVL), and Discrete Wavelet Multitone (DWMT).

Integrated Services Digital Network (ISDN), the basic network system of early WAN protocols, provides digitized phone connectivity and enables high speed transmission of voice, data, video and graphics across standard communication lines at the same time through bearer channels. ISDN can be transmitted through packet switched networks, and other types of networks besides telephone networks. ISDN service comprises two basic types, namely basic Rate Interface (BRI) and Primary Rate Interface (PRI). While BRI contains a total 160 kb/s for use of individual users, PRI offers a total of 1536 kb/s and is designed for users who require more capacity, such as large Enterprises.



Protocol Used in Baseband

ISO 18000-6B UHF Protocol

SO 18000 is a suite of international standards established by the International Organization of Standardization (ISO) to support the development and integration of Radio Frequency Identification (RFID) tags. ISO 18000-6B UHF is an individual standard within this suite designed to support a given communication protocol.

Identification

RFID tags are used in supply chain management and logistics applications where companies tag shipments with RFID tags for identification. Using an RFID reader, distribution personnel or systems can identify the shipment and route it as applicable. To function, both the RFID tag and the RFID reader must operate to the same communications protocol. ISO 18000-6B UHF protocol is one such communications protocol.

Function

The ISO 18000-6B UHF communication protocol is defined by three unique characteristics: air interface, which identifies the modulation of the reader signal, medium access control, which controls the flow of information between the tag and the reader, and data definition, which identifies the type of data associated with a tag.

Significance

There are many RFID tags and associated communications protocols and many different readers. If the readers and the associated tags don't use the same protocol, this will significantly impede the transfer of goods throughout the distribution system. For this reason, companies must communicate and coordinate up and down the supply chain to ensure compatibility.




Network Topology of Baseband



Baseband Coaxial Cable

         Baseband - digital signaling, bidirectional propagation


         Ethernet with baseband - basis for IEEE 802.3

         trade-of - data rate, cable length, number of taps

         repeaters to extend network - different from ring’s repeaters, transparent to network stations



Network Architecture of Broadband



Network Algorithms of Broadband


The standard algorithm for computing the soft-inverse of a finite-state machine [i.e., the soft-in/soft-out (SISO) module] is the forward-backward algorithm. These forward and backward recursions can be computed in parallel, yielding an architecture with latency ��(N), where N is the block size. We demonstrate that the standard SISO computation may be formulated using a combination of prefix and suffix operations. Based on well-known tree-structures for fast parallel prefix computations in the very large scale integration (VLSI) literature (e.g., tree adders), we propose a tree-structured SISO that has latency ��(log2N). The decrease in latency comes primarily at a cost of area with, in some cases, only a marginal increase in computation. We discuss how this structure could be used to design a very high throughput turbo decoder or, more generally, an iterative detector. Various sub windowing and tiling schemes are also considered to further improve latency.

Baseband Network Architecture


- A dual-processor architecture is needed to handle all the features in 3G/3.5G handsets.

In a data-flow example, voice and multimedia data is received on the antenna connected to the baseband processor and this data is then packetized and sent to the application processor. The application processor either stores the multimedia content in a file system or displays/plays it in real time. The interconnect bandwidth between the baseband and application processors can become a bottleneck in next generation 3G/3.5G wireless mobile handsets.

Baseband Network Algorithm





Digital transmission is the sending of information over a physical communications media in the form of digital signals. Analogue signals must therefore be digitized first before being transmitted.

This transformation of binary information into a two-state signal is done by the DCE, also known as the base band decoder, which is the origin of the name base band transmission to designate digital transmission.

HISTORY AND CURRENT TECHNOLOGY

Brief History of Broadband
The history of broadband is the history of the Internet, which went from an experiment to a trillion-dollar, worldwide industry in 30 years. The Internet preceded broadband by a few years, starting in the 1950s as a US Defense Department project to enable university computer systems to communicate with one another for national security purposes. As human nature would have it, the university computer people began using the project to communicate with other people.
By 1983, the Internet was being accessed by dial-up modems over ordinary telephone lines. Mushrooming expansion of Internet users worldwide led Internet Service Providers (ISPs) to develop faster rates of data transmission, and broadband was introduced in 2000. It soon led ISPs to compete for customers, bringing the price of broadband service down and making it the most popular form of Internet access.
Broadband is 10 times faster than dial-up, making more applications available, such as downloading movies and music, digital photo processing, interactive games, and of course, numerous business opportunities. A glimpse at some Internet milestones shows the progress broadband has brought: 1979, first e-mail service (text and numbers, no graphics); 1981, text-only bulletin boards; 1985, America Online launched; 1990, DSL (digital subscriber line) prototype invented, video transmission envisioned; 1992, computer bulletin boards; 1993, commercial Internet begins, first ISPs introduced, Berniers-Lee invents World Wide Web; 2001, cable companies have two-thirds of all broadband subscribers in U.S.; 2003, 18 million U.S. households have broadband; 2006, Facebook and YouTube introduced; 2007, millions of UK households have broadband.

Brief History of Baseband
Apple provides updates to the operating system for the iPhone, iPad and iPod Touch system through iTunes, similar to the way that other iPods are updated, and touts this as an advantage compared to other mobile phones and devices. Securitypatches, as well as new and improved features, are released in this fashion.
With the June 6, 2011 announcement of iOS version 5.0, a USB connection to iTunes is no longer needed to activate iOS devices; data synchronization happens automatically and wirelessly through Apple's new iCloud service. Apple claims that there are over 200 new features in iOS 5, including revamped notifications, a proprietary messaging app across all iOS devices and full Twitter integration are among the reported 200 new features.

Sunday, December 4, 2011

OBJECTIVES

* To provide information about Baseband and Broadband Technology.

* To compare Baseband and Broadband Technology.

* To differentiate the two technologies.

REFERENCE










INTRODUCTION

The term "NETWORKING" has a big and significant role in Telecommunications Technology nowadays, even before. Without networking, there will be no sharing of resources and information.

Our report is all about BASEBAND and BROADBAND.

Baseband is an adjective that describes signals and systems whose range of frequencies is measured from close to 0 hertz to a cut-off frequency, a maximum bandwidth or highest signal frequency; it is sometimes used as a noun for a band of frequencies starting close to zero.

On the other hand, Broadband refers to a signaling method that includes or handles a relatively wide range (or band) of frequencies. It is also a service that provides a connection to the Internet at a bit-rate higher than that supported by some other service, such as a 56 kbit/s modem.