pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Digital Communication

For most of the last 100 years of the 20th century the connection between the subscriber and their telephone exchange was copper twisted pair buried in the pavement or distributed overhead on poles. Given the enormity of the investment in this local loopinfrastructure it is hardly surprising that it had lasted for so long. However, by the late 1990s the convergence between voice, computer and television applications – and its inexorable move to digital-based technologies – had led to an erosion of demarcations.

For most of the history of fixed line telephony, the bandwidth that copper provided was some 3KHz, limited by analogue techniques and designed to be the cheapest solution that the telecomms operator could get away with. However, the twisted pair is inherently capable of much higher bandwidths and over short distances can carry video or broadband data. New technologies – such as ISDN and ADSL – were developed to enable higher performance to be delivered over the existing infrastructure. Innovation and competition was significantly helped by government action to end incumbent telecomms companies’ monopoly over the local loop.

In addition, the 1990s had seen cable companies investing massively in alternative connections to the home. Not all use the same technology, but the great majority have fibre optic cable to the curbside cabinet and coaxial cable from there to the home. In most cases these cable networks were installed to deliver television to the home and were designed on the basis of broadcast TV services. However, as much of the developed world continues its inexorable move towards broadband, their high bandwidth can be exploited to deliver other forms of digital-based services too.

  • ISDN
  • xDSL Digital Subscriber Line technologies – ADSL, HDSL, VDSL
  • An Overview of ADSL – What It Is and How It Works
  • Glite
  • ADSL2
  • ADSL2+ | ADSL2Plus | ITU G.992.5
  • xDSL Variants
  • ADSL Implimentation
  • Wires-Only ADSL – Asymmetrical Digital Subscriber Line
  • Cable Modems – for cable Internet connections
  • A Description and Explanation of Satellite Broadband and How It Works

Best Laptops for Professional Writers in 2023

If you need a new laptop as a writer, you may find yourself bewildered by all the choices. For one thing, there are so many brands to choose from. … [Read More...]

What You Need to Know About Automation with Chrome

Automation is drastically changing the way we interact with the Internet. One survey found that 76% of businesses use automation to streamline … [Read More...]

9 Steps to Take When Building a Web Scraper in Python

Web scraping is a method for collecting, organizing and analyzing information that is spread over the Internet in a disorganized way. It can … [Read More...]

8 Steps To Streamline Your Business Operations with Virtual Data Rooms

With the increased reliance on networking and cloud computing, businesses generate and store an ever-increasing amount of sensitive information. As a … [Read More...]

Advantages and disadvantages of using Perl in web programming

Web pages are designed using programming codes and a number of technologies as tools to achieve the desired objectives. An example of the above … [Read More...]

Why Cross-Chain Trading Is the Future of Crypto Investing?

The rapid growth and evolution of the cryptocurrency market have opened up exciting opportunities for investors. Within this dynamic landscape, … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Selecting the Perfect Linear Actuator

Linear actuators are very useful power conversion devices. The market is growing rapidly. Internally, a linear actuator consists of an electric … [Read More...]

The Heartbleed: CVE-2014-0160

Lately, there has been a security exposure of CVE-2014-0160 was found out, it has a nickname Heartbleed. It is the type of vulnerability that grants … [Read More...]

New Software and GPS Tools Help Parents Monitor their Children

More parents are using technology to keep their children safe. One survey from Pew Research in 2016 showed that 30% of parents use technology to block … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors