Wednesday, December 14, 2011

TECHNICAL CONTENTS

Hardware Requirement of Broadband
For PC Users:

Pentium 3 or higher, or AMD K6/Athlon/Duron equivalent
At least 256MB RAM
At least 1GB of available hard disk space
CD-ROM or DVD drive
High-powered USB Port or Ethernet Card

For Mac users:

PowerPC-based Macs (Power Mac, eMac, iMac, Mac mini, Powerbook, IBook)
Or Intel-based Macs (Mac Pro, iMac, Mac mini, MacBook, MacBook Pro)
At least 256MB RAM
At least 1GB of available hard disk space
CD-ROM or DVD drive
High-powered USB Port or Ethernet Card


Software Requirement of Broadband
For PC Users:

OS: Windows 98SE, Windows XP, 2000, ME, Vista, 7
Browsers: Internet Explorer v5 and up, Google Chrome, Mozilla Firefox

For Mac Users:

OS: Mac OS 9.x/10.2 (Jaguar)/10.3 (Panther)/10.4 (Tiger)
Browsers: Safari, Mozilla Firefox or Microsoft Internet Explorer v5 and up






Hardware Compatibilities of Baseband
Baseband compatible gadgets are mainly I Phones, Computers, and other cellular phones.
Examples:


Software Compatibilities of Baseband
Software compatibilities also depend on how the hardware or gadget is related to Baseband.

Application Area of Broadband
Broadband Applications has made it easier to access a high speed Internet connection. The most popular systems of Broadband Technologies are DSL and cable modem. Broadband Internet access is also referred as broadband or broadband Internet. 

Through Broadband Applications the data transfer rate could be made faster and higher in an Internet connection. The main tools of a broadband service are DSL and cable modem through which the data transmitting rate becomes faster than other Internet connections like Dial-up Modem, which is much slower. The uploading and downloading time are much lesser in broadband. 

Broadband Applications could be divided into two broad categories: 

Broadband telephony: This is more popularly referred as 'Voice over Internet Protocol', 'VoIP', 'Internet telephony', 'IP Telephony', 'Broadband Phone', or 'Voice over Broadband'. It is the process through the routing of voice conversations over any IP-based network or the Internet is done. They carry voice signals, which are known as protocols, over the IP network called VoIP protocols. 
Broadband radio: Also known as Internet radio, this is a service of audio broadcasting transmission through Internet. In technical term it is known as webcasting as it functions through World Wide Web. 
The Broadband Applications has added a new meaning to the world of entertainment and information.

Baseband Application Area
Baseband are used in a close range data transmission process wherein these transmissions are done using Baseband compatible gadgets. It is more used in IPhones, computers, cellular compatible baseband transmission and Bluetooth wireless data transmission.




Security of Broadband
It’s easy to be confused by all the technical jargon around broadband, especially when it relates to your security. Actually, it’s not so complicated, especially when you know what everything means and you're aware of what measures you can take to protect yourself.
The battle against viruses is very hard to fight, mostly because we can only act on a virus once it's there and we've seen it. A lot of viruses and spyware exhibit the same behavior, and are quite easy to spot, but the most sophisticated are a lot more difficult to identify. A Trojan horse exploit will disguise itself as a useful program, and once it's been allowed, go on to infect a system.
The other issue is the motivation behind them. A lot of malware and viruses are designed by people who like to mess with stuff - there is no direct purpose apart from "because I can". This makes them difficult to protect against because whatever you do, someone will break it just because it's there - you cannot remove the motivation.

Baseband Security

Error Correction

    There are three kinds of error correction schemes used in the baseband protocol: 1/3 rate FEC, 2/3 rate FEC and ARQ scheme.
  • In 1/3 rate FEC every bit is repeated three times for redundancy,
  • In 2/3 rate FEC a generator polynomial is used to encode 10 bit code to a 15 bit code,
  • In the ARQ schemeDM, DH and the data field of DV packets are retransmitted till an acknowledgement is received (or timeout is exceeded). Bluetooth uses fast, unnumbered acknowledgement in which it uses positive and negative acknowledgements by setting appropriate ARQN values. If the timeout value is exceeded, Bluetooth flushes the packet and proceeds with the next.

Bluetooth Security

    At the link layer, security is maintained by authentication of the peers and encryption of the information. For this basic security we need a public address which is unique for each device (BD_ADDR), two secret keys (authentication keys and encryption key) and a random number generator. First a device does the authentication by issuing a challenge and the other device has to then send a response to that challenge which is based on the challenge, it's BD_ADDR and a link key shared between them. After authentication, encryption may be used to communicate.

No comments:

Post a Comment