cable modem
Recently Published Documents


TOTAL DOCUMENTS

105
(FIVE YEARS 2)

H-INDEX

9
(FIVE YEARS 0)

2021 ◽  
Author(s):  
Shahab Ardalan

A 1.2 V, 8 bit, 100 MSample/Sec Pipeline Analog-to-Digital Converter is designed in 0.18-μm standard CMOS technology. An emphasis was placed on observing the low voltage and low power design. The architecture of this ADC is 1 bit/stage pipelined configuration. With above specifications the designed ADC can be applicable for DVI flat-panel display; Giga bit Ethernet on copper, RGB to LCD converter and cable modem. This designed ADC can achieve SNDR 56dB in 100 MHz sampling frequency with 8 bit resolution. Total power dissipation is 40.6mW and INL is around 1 LSB and the maximum swing of the input is 1 Volt peak to peak which is almost rail-to-rail situation. The core area of the ADC excluding pads is around 0.25mm 2 .


2021 ◽  
Author(s):  
Shahab Ardalan

A 1.2 V, 8 bit, 100 MSample/Sec Pipeline Analog-to-Digital Converter is designed in 0.18-μm standard CMOS technology. An emphasis was placed on observing the low voltage and low power design. The architecture of this ADC is 1 bit/stage pipelined configuration. With above specifications the designed ADC can be applicable for DVI flat-panel display; Giga bit Ethernet on copper, RGB to LCD converter and cable modem. This designed ADC can achieve SNDR 56dB in 100 MHz sampling frequency with 8 bit resolution. Total power dissipation is 40.6mW and INL is around 1 LSB and the maximum swing of the input is 1 Volt peak to peak which is almost rail-to-rail situation. The core area of the ADC excluding pads is around 0.25mm 2 .


2019 ◽  
Vol 10 (1) ◽  
pp. 62
Author(s):  
Imelda Uli Vistalina Simanjuntak ◽  
Rini Kusumawardani ◽  
Setiyo Budiyanto

camera merupakan solusi terbaru sistem security dan tidak hanya terbatas ruangan, namun IP camera merupakan solusi jangka panjang yang sangat bermanfaat. IP camera sangat fleksibel. IP camera dengan fitur lainnya seperti pemilihan kamera dan fitur navigasi pada size video, kecepatan streaming. IP camera adalah CCTV (Closed Circuit Television) kamera yang menggunakan Internet Protocol untuk mengirimkan data gambar dan sinyal kendali atas Fast Ethernet Link. Dengan demikian IP camera juga sering disebut sebagai kamera jaringan. Yang mana IP camera ini biasanya juga memerlukan ADSL/DSL modem, cable modem, switch atau hub, agar bekerja dan berungsi dengan baik pada jaringan LAN atau Internet. Namun pada jaman yang semakin canggih ini, IP camera terus berkembang dengan selalu menciptakan teknologi terbaru, yakni salah satunya dengan didukung sistem cloud P2P. Peer to peer (P2P) digunakan untuk saling membagikan file data yang sudah tersimpan dalam suatu server. Pada sebuah smartphone dengan sebuah IP camera dihubungkan hingga koneksi terjalin antara IP camera dengan smartphone yang merupakan peer to peer networking. Sistem ini berguna untuk melihat-lihat gambar atau video dan mengendalikan dalam jarak jauh menggunakan smartphone. Hal ini juga mewakili arsitektur untuk meningkatkan pengawasan video menggunakan smartphone. Sistem ini memungkinkan komposisi dinamis aplikasi yang meningkatkan fleksibilitas keseluruhan sistem. Sistem surveillans video ini memenuhi semua kebutuhan dinamika yang memungkinkan penggunaan sistem kepada pengguna yang berbeda, sistem ini memberikan pengawasan yang lebih baik dengan memilih akses langsung untuk video dari lokasi yang berbeda.


Author(s):  
Poranattawut Tungsakul ◽  
Kraisin Songwatana ◽  
Phichet Moungnuol
Keyword(s):  

2016 ◽  
Author(s):  
Mark Lemley

In this paper, we address the question of "open access" and itsrelationship to the architecture of the Internet. It is our view that theextraordinary growth and innovation of the Internet depends crucially uponthis architecture. Changes in this architecture should be viewed withskepticism, as they may in turn threaten this innovation and growth. Manycable companies have recently adopted or threatened a policy of bundlinghigh-speed cable modem service with ISP service. This bundling threatens tocompromise an important architectural principle of the Internet: theInternet's "End-to-End" design. In our view, this change could haveprofound implications for the future of growth and innovation on the net.The FCC's analysis of the cable modem industry to date has not consideredthese principles of the Internet's design. It therefore does not adequatelyevaluate the potential threat that bundling presents to open access to theInternet. Neither does the FCC's approach properly account for its role increating the conditions that made the Internet possible. Under the bannerof "no regulation," the FCC threatens to permit this network to calcify asearlier telecommunications networks did. Further, and ironically, the FCC'ssupposed "hands off" approach will ultimately lead to more rather than lessregulation. We do not yet know enough about the relationship between thesearchitectural principles and the innovation of the Internet. But we shouldknow enough to be skeptical of changes in its design. The strongpresumption should be in favor of preserving the architectural featuresthat have produced this extraordinary innovation. The FCC's presumptionshould be against approving mergers or policies that threaten these designprinciples, without a clear showing that the threat would not undermine theInternet's innovation.


Author(s):  
Kannan Balasubramanian

The wireless metropolitan area networks (WMANs) based on the 802.16 technology have recently gained a lot of interest among vendors and ISPs as the possible next development in wireless IP offering and a possible solution for the last mile Access problem. With the theoretical speed of up to 75 Mbps and with a range of several miles, 802.16 broadband wireless offers an alternative to cable modem and DSL, possibly displacing these technologies in the future. We discuss implementing security in wireless MANs with the PKM protocol that is used in 802.16 for key management and security associations management. Since device certificates are defined by the IEEE 802.16 standard, we briefly cover the issue of certificates and certificate hierarchies.


Sign in / Sign up

Export Citation Format

Share Document