Satellite radio channels - computer network, Computer Networking

Assignment Help:

Satellite Radio Channels

A communication  satellite links two or more  earth  microwave transmitter receiver, know  as ground  stations. The satellite receives transmission on one frequency  band,

Regenerates the signal  a repeater and transmits the signal  on another  frequency. Satellites can provide  transmission rates in the gigabits per second  range. Two  types  of satellites are used in communication  geostationary satellites and low altitude satellites.

Geostationary satellite permanently remain above  the same spot  on earth. This  stationary  presence is achieved by placing he satellite in orbit at 36,000kilometers above earth surface. This  huge distance from ground station through satellite back to ground stations introduces a substantial signal propagation  delay  of 250 milliseconds. Nevertheless  satellite links which  can operate at  the  speeds of hundreds of Mbps are  often  used in telephone  networks  and is  the backbone  of the internet.

Low  altitude  satellites are placed much  closer to earth and do  not remain  permanently above one spot on earth. They rotate around  earth  just as the moon  does.

 To  provide continuous  coverage to an area many  satellites need to be placed orbit. Low  altitude satellite technology may be used  be used for internet access sometimes in the future.

 

 


Related Discussions:- Satellite radio channels - computer network

Create a client and a server - message queues & socket, Lab will require yo...

Lab will require you to create a client and a server that communicate over either message queues, sockets, or a well known fifo. The data passed will be a simple request/response i

Explain systolic array interconnection networks, Systolic Array : This inte...

Systolic Array : This interconnection network is a kind of pipelined array architecture and it's intended for multidimensional flow of data. It is used for applying fixed algorithm

Explain the types of security threats, Q. Explain the types of Security Thr...

Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut

Determine about the address translation, Determine about the Address Transl...

Determine about the Address Translation When a Web site address or URL is typed in the Web browser, as www.bbc.com and not as a series of numbers, it is essential for the serv

Brdging between buildings, BRDGING BETWEEN BUILDINGS:  If two building...

BRDGING BETWEEN BUILDINGS:  If two buildings are placed far from each other, a bridge, a pair of fiber modems and an optical fiber may be used to locate two LANs as given in t

Compare error detection and error correction, Compare Error Detection and E...

Compare Error Detection and Error Correction: The correction of errors is more difficult than the detection. In error detection, checks only any error has happened. In error co

Telnet protocols - transport layer, TELNET Protocols The TCP/ IP proto...

TELNET Protocols The TCP/ IP protocol  suite  includes a simple textual  remote terminal protocols called  TELNET  that allow  a user to log into  a computer across an interne

Transport protocols - udp and tcp, Most real-life applications are built on...

Most real-life applications are built on top of the UDP and TCP transport protocols. UDP, which stands for User Datagram Protocol, provides the capability of delivering individual

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd