Wednesday, May 03, 2006

Lets get Technical!


How do stingrays kill?
by Julia Layton


Stingray
World-famous "Crocodile Hunter" Steve Irwin, known for seeking out and handling some of the most dangerous animals in existence, died on Monday, September 4, in a shocking accident with a stingray. Stingrays are considered by most experts to be docile creatures, only attacking in self-defense. Most stingray-related injuries to humans occur to the ankles and lower legs, when someone accidentally steps on a ray buried in the sand and the frightened fish flips up its dangerous tail. In the early stages of examining the Steve Irwin accident, some experts have hypothesized that the combined positions of Irwin (above the fish) and his cameraman (in front of the fish) could have made the stingray feel trapped and triggered a defensive attack; others point out that completely unprovoked stingray attacks are not unheard of.

Whatever the cause of the attack, Irwin was very unlucky. Stingray-related fatalities (in humans) are extremely rare, partly because a stingray's venom, while extraordinarily painful, isn't usually deadly -- unless the initial strike is to the chest or abdominal area, as it was in Irwin's case.

Some news agencies have reported that the encounter was with an Australian bull ray, estimated to weigh about 220 pounds (100 kg). Irwin was snorkeling in about 6 feet (2 meters) of water, filming a new documentary titled "Ocean's Deadliest" off the coast of Australia. While Irwin was swimming with one of the larger species of rays out there -- Australian bull rays can be up to 4 feet (1.2 meters) wide and 8 feet (2.4 meters) long -- all stingrays use the same attack mechanism regardless of size. The mechanism is called a sting, up to 8 inches (20 cm) long in a bull ray, located near the base of the tail. The sting contains a sharp spine with serrated edges, or barbs, that face the body of the fish. There is a venom gland at the base of the spine and a membrane-like sheath that covers the entire sting mechanism.


Photo courtesy NOAA's National Marine Fisheries Service
Australian bull ray, a.k.a. southern eagle ray, Myliobatis australis

When a stingray attacks, it needs to be facing its victim, because all it does is flip its long tail upward over its body so it strikes whatever is in front of it. The ray doesn't have direct control over the sting mechanism, only over the tail. In most cases, when the sting enters a person's body, the pressure causes the protective sheath to tear. When the sheath tears, the sharp, serrated edges of the spine sink in and venom flows into the wound.

A stingray's venom is not necessarily fatal, but it hurts a lot. It's composed of the enzymes 5-nucleotidase and phosphodiesterase and the neurotransmitter serotonin. Serotonin causes smooth muscle to severely contract, and it is this component that makes the venom so painful. The enzymes cause tissue and cell death. If the venom is introduced into an area like the ankle, it can usually be treated. Heat breaks down stingray venom and limits the amount of damage it can do. If not treated quickly enough, amputation might be necessary. But if the venom enters the abdomen or chest cavity, the resulting tissue death can be fatal because of the major organs located in the vicinity. If the spike enters the heart, as is reported to be the case in Steve Irwin's accident, the results are fatal.

While a stingray's venom can do serious damage, the most destructive part of the sting mechanism can actually be the barbs on the spine. The sharp tip of the sting enters a person pretty smoothly, but its exit is roughly equivalent to backing up over those "severe tire damage" blades. Remember that the points of the barbs are facing the stingray. Even if venom weren't involved at all, pulling the spike out of a human's chest or abdomen could be enough to cause death from the massive tearing of tissue that results.








How WiFi Works
by Marshall Brain and Tracy V. Wilson



If you've been in an airport, coffee shop, library or hotel recently, chances are you've been right in the middle of a wireless network. Many people also use wireless networking, also called WiFi or 802.11 networking, to connect their computers at home, and an increasing number of cities use the technology to provide free or low-cost Internet access to residents. In the near future, wireless networking may become so widespread that you can access the Internet just about anywhere at any time, without using wires.

WiFi & You
WiFi has quickly become part of the everyday life of many. How about you? How has WiFi changed the way you live?

Let us know.
WiFi has a lot of advantages. Wireless networks are easy to set up and inexpensive. They're also unobtrusive - unless you're on the lookout for a place to use your laptop, you may not even notice when you're in a hotspot. In this article, we'll look at the technology that allows information to travel over the air. We'll also review what it takes to create a wireless network in your home.


One wireless router can allow multiple devices to connect to the Internet.

We'll start with a few WiFi basics. A wireless network uses radio waves, just like cell phones, televisions and radios do. In fact, communication across a wireless network is a lot like two-way radio communication. Here's what happens:

  1. A computer's wireless adapter translates data into a radio signal and transmits it using an antenna.
  2. A wireless router receives the signal and decodes it. It sends the information to the Internet using a physical, wired Ethernet connection.
The process also works in reverse, with the router receiving information from the Internet, translating it into a radio signal and sending it to the computer's wireless adapter.


USB wireless adapter photo courtesy HowStuffWorks Shopper and PC wireless card photo courtesy HowStuffWorks Shopper
Wireless adapters can plug into a computer's PC card slot or USB port.

The radios used for WiFi communication are very similar to the radios used for walkie-talkies, cell phones and other devices. They can transmit and receive radio waves, and they can convert 1s and 0s into radio waves and convert the radio waves back into 1s and 0s. But WiFi radios have a few notable differences from other radios:

  • They transmit at frequencies of 2.4 GHz or 5GHz. This frequency is considerably higher than the frequencies used for cell phones, walkie-talkies and televisions. The higher frequency allows the signal to carry more data.
  • They use 802.11 networking standards, which come in several flavors:
    • 802.11b was the first version to reach the marketplace. It's the slowest and least expensive standard, and it's becoming less common as faster standards become less expensive. 802.11b transmits in the 2.4 GHz frequency band of the radio spectrum. It can handle up to 11 megabits of data per second, and it uses complimentary code keying (CCK) coding.
    • 802.11g also transmits at 2.4 GHz, but it's a lot faster than 802.11b - it can handle up to 54 megabits of data per second. 802.11g is faster because it uses orthogonal frequency-division multiplexing (OFDM), a more efficient coding technique.
    • 802.11a transmits at 5GHz and can move up to 54 megabits of data per second. It also and uses OFDM coding. Newer standards, like 802.11n, can be even faster than 802.11g. However, the 802.11n standard isn't yet final.
  • WiFi radios can transmit on any of three frequency bands. Or, they can "frequency hop" rapidly between the different bands. Frequency hopping helps reduce interference and lets multiple devices use the same wireless connection simultaneously.

What's In a Name?
You may be wondering why people refer to WiFi as 802.11 networking. The 802.11 designation comes from the Institute of Electrical and Electronics Engineers (IEEE). The IEEE sets standards for a range of technological protocols, and it uses a numbering system to classify these standards.

As long as they all have wireless adapters, several devices can use one router to connect to the Internet. This connection is convenient and virtually invisible, and it's fairly reliable. If the router fails or if too many people try to use high-bandwidth applications at the same time, however, users can experience interference or lose their connections.

Next, we'll look at how to create a wireless network in your home.

Building a Wireless Network
If you want to take advantage of public WiFi hotspots or start a wireless network in your home, the first thing you'll need to do is make sure your computer has the right wireless gear. Most new laptops and many new desktop computers come with built-in wireless transmitters. If your laptop doesn't, you can buy a wireless adapter that plugs into the PC card slot or USB port. Desktop computers can use USB adapters, or you can buy an adapter that plugs into the PCI slot inside the computer's case. Many of these adapters can use more than one 802.11 standard.

WiFi & You
WiFi has quickly become part of the everyday life of many. How about you? How has WiFi changed the way you live?

Let us know.
Once you've installed your wireless adapter and the drivers that allow it to operate, your computer should be able to automatically discover existing networks. This means that when you turn your computer on in a WiFi hotspot, the computer will inform you that the network exists and ask whether you want to connect to it. If you have an older computer, you may need to use a software program to detect and connect to a wireless network.


Photo courtesy HowStuffWorks Shopper
A wireless router uses an antenna to send signals to wireless devices and a wire to send signals to the Internet.

Being able to connect to the Internet in public hotspots is extremely convenient. Wireless home networks are convenient as well. They allow you to easily connect multiple computers and to move them from place to place without disconnecting and reconnecting wires.

If you already have several computers networked in your home, you can create a wireless network with a wireless access point. If you have several computers that are not networked, or if you want to replace your Ethernet network, you'll need a wireless router. This is a single unit that contains:

  1. A port to connect to your cable or DSL modem
  2. A router
  3. An Ethernet hub (ethernet.htm)
  4. A firewall
  5. A wireless access point
A wireless router allows you to use wireless signals or Ethernet cables to connect your computers to one another, to a printer and to the Internet. Most routers provide coverage for about 100 feet (30.5 meters) in all directions, although walls and doors can block the signal. If your home is very large, you can buy inexpensive range extenders or repeaters to increase your router's range.

As with wireless adapters, many routers can use more than one 802.11 standard. 802.11b routers are slightly less expensive, but they're slower than 802.11a or 802.11g routers. Most people select the 802.11g option for its speed and reliability.

Once you plug in your router, it should start working at its default settings. Most routers let you use a Web interface to change your settings. You can select:

  • The name of the network, known as its service set identifier (SSID) -- The default setting is usually the manufacturer's name.
  • The channel that the router uses -- Most routers use channel 6 by default. If you live in an apartment and your neighbors are also using channel 6, you may experience interference. Switching to a different channel should eliminate the problem.
  • Your router's security options -- Many routers use a standard, publicly-available sign-on, so it's a good idea to set your own username and password.
Security is an important part of a home wireless network, as well as public WiFi hotspots. If you set your router to create an open hotspot, anyone who has a wireless card will be able to use your signal. Most people would rather keep strangers out of their network, though. Doing so requires you to take a few security precautions.

To keep your network private, you can use one of the following methods:

  • Wired Equivalency Privacy (WEP) uses 64-bit or 128-bit encryption. 128-bit encryption is the more secure option. Anyone who wants to use a WEP-enabled network has to know the WEP key, which is usually a numerical password.

  • >WiFi Protected Access (WPA) is a step up from WEP and is now part of the 802.11i wireless network security protocol. It uses temporal key integrity protocol encryption. As with WEP, WPA security involves signing on with a password. Most public hotspots are either open or use WPA or 128-bit WEP technology.

  • Media Access Control (MAC) address filtering is a little different from WEP or WPA. It doesn't use a password to authenticate users - it uses a computer's physical hardware. Each computer has its own unique MAC address. MAC address filtering allows only machines with specific MAC addresses to access the network. You must specify which addresses are allowed when you set up your router. This method is very secure, but if you buy a new computer or if visitors to your home want to use your network, you'll need to add the new machines' MAC addresses to the list of approved addresses.
Wireless networks are easy and inexpensive to set up, and most routers' Web interfaces are virtually self-explanatory. For more information on setting up and using a wireless network, check out the links on the next page.


How BitTorrent Works
by Carmen Carmack

BitTorrent is a protocol that enables fast downloading of large files using minimum Internet bandwidth. It costs nothing to use and includes no spyware or pop-up advertising.

Unlike other download methods, BitTorrent maximizes transfer speed by gathering pieces of the file you want and downloading these pieces simultaneously from people who already have them. This process makes popular and very large files, such as videos and television programs, download much faster than is possible with other protocols.

In this article, we'll examine how BitTorrent works and how it is different from other file-distribution methods. In addition, you'll learn how to use BitTorrent and what the future might hold for this innovative approach to serving files over the Internet.

BitTorrent Speak
Like most Internet phenomena, BitTorrent has its own jargon. Some of the more common terms related to BitTorrent include:
  • Leeches - People who download files but do not share files on their own computer with others
  • Seed or seeder - A computer with a complete copy of a BitTorrent file (At least one seed computer is necessary for a BitTorrent download to operate.)
  • Swarm - A group of computers simultaneously sending (uploading) or receiving (downloading) the same file
  • .torrent - A pointer file that directs your computer to the file you want to download
  • Tracker - A server that manages the BitTorrent file-transfer process

Is P2P theft?
How do you think downloading & sharing mp3s and digital videos should work? Should people who are exchanging media via P2P networks be prosecuted? What do you think?

Traditional Client-Server Downloading
To understand how BitTorrent works and why it is different from other file-serving methods, let's examine what happens when you download a file from a Web site. It works something like this:

  • You open a Web page and click a link to download a file to your computer.
  • The Web browser software on your computer (the client) tells the server (a central computer that holds the Web page and the file you want to download) to transfer a copy of the file to your computer.
  • The transfer is handled by a protocol (a set of rules), such as FTP (File Transfer Protocol) or HTTP (HyperText Transfer Protocol).


Client-server download process

The transfer speed is affected by a number of variables, including the type of protocol, the amount of traffic on the server and the number of other computers that are downloading the file. If the file is both large and popular, the demands on the server are great, and the download will be slow.

For more information about Web servers and the traditional client-server download, see How Web Servers Work.

Peer-To-Peer File Sharing
Another file-transfer method that you may have heard about is called peer-to-peer file sharing. In this process, you use a software program (rather than your Web browser) to locate computers that have the file you want. Because these are ordinary computers like yours, as opposed to servers, they are called peers. The process works like this:

  • You run peer-to-peer file-sharing software (for example, a Gnutella program) on your computer and send out a request for the file you want to download.
  • To locate the file, the software queries other computers that are connected to the Internet and running the file-sharing software.
  • When the software finds a computer that has the file you want on its hard drive, the download begins.
  • Others using the file-sharing software can obtain files they want from your computer's hard drive.


Gnutella's peer-to-peer download process

The file-transfer load is distributed between the computers exchanging files, but file searches and transfers from your computer to others can cause bottlenecks. Some people download files and immediately disconnect without allowing others to obtain files from their system, which is called leeching. This limits the number of computers the software can search for the requested file.

For more information about file sharing and the peer-to-peer download, see How Gnutella Works and How Kazaa Works.

What BitTorrent Does
Unlike some other peer-to-peer downloading methods, BitTorrent is a protocol that offloads some of the file tracking work to a central server (called a tracker). Another difference is that it uses a principal called tit-for-tat. This means that in order to receive files, you have to give them. This solves the problem of leeching -- one of developer Bram Cohen's primary goals. With BitTorrent, the more files you share with others, the faster your downloads are. Finally, to make better use of available Internet bandwidth (the pipeline for data transmission), BitTorrent downloads different pieces of the file you want simultaneously from multiple computers.

Here's how it works:


BitTorrent's peer-to-peer download process

  • You open a Web page and click on a link for the file you want.
  • BitTorrent client software communicates with a tracker to find other computers running BitTorrent that have the complete file (seed computers) and those with a portion of the file (peers that are usually in the process of downloading the file).
  • The tracker identifies the swarm, which is the connected computers that have all of or a portion of the file and are in the process of sending or receiving it.
  • The tracker helps the client software trade pieces of the file you want with other computers in the swarm. Your computer receives multiple pieces of the file simultaneously.
  • If you continue to run the BitTorrent client software after your download is complete, others can receive .torrent files from your computer; your future download rates improve because you are ranked higher in the "tit-for-tat" system.

Downloading pieces of the file at the same time helps solve a common problem with other peer-to-peer download methods: Peers upload at a much slower rate than they download. By downloading multiple pieces at the same time, the overall speed is greatly improved. The more computers involved in the swarm, the faster the file transfer occurs because there are more sources of each piece of the file. For this reason, BitTorrent is especially useful for large, popular files.

Downloading Files with BitTorrent
To use BitTorrent for file downloads, you need to install the BitTorrent client software. You may also need to tweak your firewall and network router (if you use these) to accept BitTorrent files. We'll give you all the details to get started. But first, here's a synopsis of the steps:

  1. Download and install the BitTorrent client software.
  2. Check and configure firewall and/or router for BitTorrent (if applicable).
  3. Find files to download.
  4. Download and open the .torrent pointer file.
  5. Let BitTorrent give and receive pieces of the file.
  6. Stay connected after the download completes to share your .torrent files with others.

Distributing with BitTorrent
If you have a large file you want to serve, BitTorrent can help you make the best use of your available bandwidth. To make a file available as a .torrent file, you need access to a tracker and to a Web server. In addition, you'll need to download and install the software that creates the .torrent file from www.bittorrent.com. You can find detailed instructions for distributing files with BitTorrent on the official BitTorrent Web site.

Download the BitTorrent Client Software
BitTorrent is open-source software, which means the program is available to you and to software developers for free (see What does "open source" mean?). Therefore, some developers have created their own versions of BitTorrent software, and you can choose from a number of client programs. (Note: This article assumes you are using the official version. If you want to experiment with different clients, see Brian's BitTorrent FAQ and Guide for a list.)

To start off, go to BitTorrent.com and click the link for the client software that matches your operating system. After you download the client software, double-click on the desktop icon to install it. The installation program is quick, and it displays this window when it is complete:


You'll also see Bram Cohen's Web page, where you can send donations to support development of BitTorrent. Mr. Cohen develops and distributes BitTorrent as open-source software at no cost to users or other developers.

Check and Configure Firewall

Is It Legal?
BitTorrent is perfectly legal to use. However, it is illegal to download copyrighted materials in most countries. So if the file you're downloading is copyrighted, then what you're doing is not legal. See the Legal Ramifications section to learn more.
If you have a firewall installed on your computer, you will obtain faster download rates if you configure it to have an open pathway for BitTorrent file transfers. A firewall protects your system from intruders by disallowing unauthorized access to your computer's ports. A port is a way for Internet communications to travel into and out of your computer. Ports are numbered, and each communication type has a standard port number. See How Web Servers Work: Ports to learn more.

BitTorrent also uses specific port numbers, normally ports 6881 through 6889. Because firewalls block these ports by default, you'll need to configure your firewall to accept this incoming traffic in order to receive .torrent files. You may also have to enable port forwarding of your computer's IP address for ports 6881 through 6889 so that other BitTorrent computers can find you. Because every product is unique, check the documentation or product Web site for your firewall/router for specific instructions on how to accomplish these tasks. You can also check out PortForward.com for help.

Find, Download and Open Torrent Files
After you set up your computer, you're ready to download .torrent files. You can search for the term ".torrent" using an Internet search engine to find sites that offer BitTorrent files. There are also a number of sites dedicated to BitTorrent file searching. These include isoHunt and TorrentSpy. Other sites that offer BitTorrent files directly include bt.etree.org for shareable music, Legal Torrents for music, videos and books, and BT on EFnet for recent television shows.

When you find the file you want, right-click the .torrent link, choose "save target as" and save the file in a convenient place on your computer, such as the Windows desktop. The .torrent file, which is a pointer to the actual file you want, will download quickly. Next, double-click the .torrent file you saved to your computer. The BitTorrent client software displays and starts the download process:


As we mentioned before, the more computers in the sending/receiving swarm, the quicker the download process. If you are downloading a file with only a few other computers in the swarm, the transfer speed will be relatively slow.

After the download is complete, leave the BitTorrent client software open so that other peers can download .torrent files from your computer.*


Peers using BitTorrent can download only .torrent files from your computer. Once you have a complete copy of a file, your computer becomes a potential seed for that file -- as long as you're still running the software. Sharing what you have causes speedier BitTorrent downloads for you in the future. You can leave the client software running for a few hours or overnight.* Simply close the software when you're done.

*Note: Does your ISP charge for uploads? It's rare, but it's possible. Before leaving the BitTorrent client software open overnight, be sure your ISP doesn't charge for uploads -- otherwise, moving up in the tit-for-tat hierarchy could end up costing you an arm and a leg.

Legal Ramifications
Similar to other peer-to-peer software, BitTorrent can be used to download copyrighted material. Because BitTorrent handles large files remarkably well, it is especially popular for downloading video files. The Motion Picture Association of America has filed countless lawsuits, causing at least many high-traffic .torrent download sites to shut down.

BitTorrent itself is perfectly legal to use. When you select a file to download, however, it is your responsibility to make sure the file not copyrighted. BitTorrent downloads are not anonymous; information about your computer's IP address and the files you download can be traced back to you.

Despite its improper use by distributors of copyrighted material, the BitTorrent program itself both legal and innovative. With additions such as tit-for-tat and an open-source philosophy, BitTorrent will likely build a legacy of its own while serving as a bridge to the next generation of file-serving software.




How HDTV Works

by Tracy V. Wilson
When the first high-definition television (HDTV) sets hit the market in 1998, movie buffs, sports fans and tech aficionados got pretty excited, and for good reason. Ads for the sets hinted at a television paradise with superior resolution and digital surround sound. With HDTV, you could also play movies in their original widescreen format without the letterbox "black bars" that some people find annoying.

But for a lot of people, HDTV hasn't delivered a ready-made source for transcendent experiences in front of the tube. Instead, people have gone shopping for a TV and found themselves surrounded by confusing abbreviations and too many choices. Some have even hooked up their new HDTV sets only to discover that the picture doesn't look good.


Photo courtesy HowStuffWorks Shopper
HDTVs don't have to be enormous. This 26-inch set is HDTV ready.

Fortunately, a few basic facts easily dispel all of this confusion. In this article, we'll explain the acronyms and resolution levels and give you the facts on the United States transition to all-digital television. We'll also tell you exactly what you need to know if you're thinking about upgrading to HDTV.

Analog, Digital and HD
For years, watching TV has involved analog signals and cathode ray tube (CRT) sets. The signal is made of continually varying radio waves that the TV translates into a picture and sound. An analog signal can reach a person's TV over the air, through a cable or via satellite. Digital signals, like the ones from DVD playersDVD players, are converted to analog when played on traditional TVs. (You can read about how the TV interprets the signal in How Television Works.)

This system has worked pretty well for a long time, but it has some limitations:

  • Conventional CRT sets display around 480 visible lines of pixels. Broadcasters have been sending signals that work well with this resolution for years, and they can't fit enough resolution to fill a huge television into the analog signal.

  • Analog pictures are interlaced - a CRT's electron gun paints only half the lines for each pass down the screen. On some TVs, interlacing makes the picture flicker.

  • Converting video to analog format lowers its quality.


Photo courtesy HowStuffWorks Shopper
Analog TVs like this one can't use a digital signal without a set-top converter.

United States broadcasting is currently changing to digital television (DTV). A digital signal transmits the information for video and sound as ones and zeros instead of as a wave. For over-the-air broadcasting, DTV will generally use the UHF portion of the radio spectrum with a 6 MHz bandwidth, just like analog TV signals do.

DTV has several advantages:

  • The picture, even when displayed on a small TV, is better quality.
  • A digital signal can support a higher resolution, so the picture will still look good when shown on a larger TV screen.
  • The video can be progressive rather than interlaced - the screen shows the entire picture for every frame instead of every other line of pixels.
  • TV stations can broadcast several signals using the same bandwidth. This is called multicasting.
  • If broadcasters choose to, they can include interactive content or additional information with the DTV signal.
  • It can support high-definition (HDTV) broadcasts.

DTV also has one really big disadvantage: Analog TVs can't decode and display digital signals. When analog broadcasting ends, you'll only be able to watch TV on your trusty old set if you have cable or satellite service transmitting analog signals or if you have a set-top digital converter.

This brings us to the first big misconception about HDTV. Some people believe that the United States is switching to HDTV, that all they'll need for HDTV is a new TV and that they'll automatically have HDTV when analog service ends. Unfortunately, none of this is true.

HDTV is just one part of the DTV transition. We'll look at HDTV in more detail, including what makes it different from DTV, in the next section.

Important DTV Dates
  • July 1, 2006: All new 25" or larger sets must have DTV tuners or be DTV-ready
  • March 1, 2007: All new 13" or larger sets must have DTV tuners or be DTV-ready
  • February 17, 2009: Proposed shutoff date for over-the-air analog broadcasts

DTV vs. HDTV
The Advanced Television Standards Committee (ATSC) has set voluntary standards for digital television. These standards include how sound and video are encoded and transmitted. They also provide guidelines for different levels of quality. All of the digital standards are better in quality than analog signals. HDTV standards are the top tier of all the digital signals.


Standard vs. high-definition aspect ratio

The ATSC has created 18 commonly used digital broadcast formats for video. The lowest quality digital format is about the same as the highest quality an analog TV can display. The 18 formats cover differences in:

  • Aspect ratio - Standard television has a 4:3 aspect ratio - it is four units wide by three units high. HDTV has a 16:9 aspect ratio, more like a movie screen.
  • Resolution - The lowest standard resolution (SDTV) will be about the same as analog TV and will go up to 704 x 480 pixels. The highest HDTV resolution is 1920 x 1080 pixels. HDTV can display about ten times as many pixels as an analog TV set.
  • Frame rate - A set's frame rate describes how many times it creates a complete picture on the screen every second. DTV frame rates usually end in "i" or "p" to denote whether they are interlaced or progressive. DTV frame rates range from 24p (24 frames per second, progressive) to 60p (60 frames per second, progressive).
Many of these standards have exactly the same aspect ratio and resolution - their frame rates differentiate them from one another. When you hear someone mention a "1080i" HDTV set, they're talking about one that has a native resolution of 1920 x 1080 pixels and can display 60 frames per second, interlaced.


The 18 Primary DTV Standards

Broadcasters get to decide which of these formats they will use and whether they will broadcast in high definition - many are already using digital and high-definition signals. Electronics manufacturers get to decide which aspect ratios and resolutions their TVs will use. Consumers get to decide which resolutions are most important to them and buy their new equipment based on that.

Until the analog shutoff date, broadcasters will have two available channels to send their signal - a channel for analog, and a "virtual" channel for digital. Right now, people can watch an over-the-air digital signal only if they are tuned in to the broadcaster's virtual digital channel. After analog broadcasting ends, the only signals people will receive over the air will be digital.

However, even though a digital signal is better quality than an analog signal, it isn't necessarily high definition. HDTV is simply the highest of all the DTV standards. But whether you see a high-definition picture and hear the accompanying Dolby Digital� sound depends on two things. First, the station has to be broadcasting a high-definition signal. Second, you have to have the right equipment to receive and view it. We'll look at how to get an HDTV set and signal next.

MPEG-2
DTV usually uses MPEG-2 encoding, the industry standard for most DVDs, to compress the signal to a reasonable size. MPEG-2 compression reduces the size of the data by a factor of about 55:1, and it discards a lot of the visual information the human eye would not notice was missing.

What to Buy

EDTV
As you're shopping, you'll probably see some enhanced definition TV (EDTV) sets. EDTV isn't one of the digital broadcast formats - it's a description of the level of picture quality the set can produce. An EDTV set can produce better quality than SDTV, but it's not an HDTV set. Most EDTV sets are flat-panel LCD or plasma sets.
The DTV transition is a big deal, but it's not the first change to the TV signal. In 1946, the National Television System Committee (NTSC) began setting standards for American broadcasting. In 1953, NTSC standards changed to allow color television, and in 1984, they changed to allow stereo sound.

Those changes were different from the DTV switch because they were backwards compatible - you could watch the new signal on your trusty old TV. With DTV, you'll need some new gear, and the gear you choose will affect whether you can receive and view high-definition video. You can learn about buying a DTV set in How Digital Television Works - here, we'll focus on HDTV.

When you start shopping, keep in mind that HDTV requires three parts:

  • A source, such as a local, cable or satellite HDTV station
  • A way to receive the signal, like an antenna, cable or satellite service
  • An HDTV set


Photo courtesy HowStuffWorks Shopper
If you purchase an HDTV-ready set, you'll need a receiver before you can watch high-definition broadcasts.

Most people start with the set. You can choose:

  • An integrated HDTV, which has a digital tuner, also known as an ATSC tuner, built in. If a station near you is broadcasting in HDTV, you can attach an antenna to an integrated set and watch the station in high definition.

  • An HDTV-ready set, also called an HDTV monitor, which does not have an HDTV tuner. HDTV-ready sets often have NTSC tuners, so you can still watch analog TV with them. This is the option for you if you want to have HDTV capabilities later on but aren't ready for the financial commitment now. Your picture quality will still be better than on your old TV, but it won't be high definition until you get an HDTV receiver.

Why go HD?
Why are you shopping for an HDTV? Which one are you leaning towards?

Tell us.

Designing and building an HDTV that could display all of the ATSC formats would be virtually impossible. For this reason, HDTVs have one or two native resolutions. When the TV receives a signal, it will scale the signal to match its native resolution and de-interlace the signal if necessary. A good rule of thumb is to choose a set that has a native resolution matching the signals you plan to use most often. Film fans will generally want displays with the highest possible resolution. Sports fans will generally want displays with the highest possible progressive frame rate.


Photo courtesy HowStuffWorks Shopper
An 84-inch HDTV ready plasma TV

If you receive a signal that has a significantly lower resolution than your screen can display, all the extra pixels won't help it look better. This is why some people who have bought HDTVs have been dismayed at the quality of the picture - the existing analog signal just doesn't have enough detail to look good on a high-definition set. As broadcasters change to a digital signal, this problem will improve substantially.

When you've found an HDTV with a screen size, aspect ratio and native resolution you want, you'll need to make sure the equipment you already own will work with it. If you already have a DVD player, a DVR, game consoles or other equipment, make sure that they can connect to the TV directly or through an audio/visual receiver. Many HDTVs have High-Definition Multimedia Interface (HDMI) connections, which can transmit audio/visual signals to the TV without compression. In some cases, you can use adapters to make your equipment compatible with your set.

Once you've picked up your set and installed it in your home, you'll need to get a signal. To get a signal, you can use:


Photo courtesy HowStuffWorks Shopper
With an antenna, you can get digital television for free. This Zenith model works best for UHF analog and DTV signals.

  • An antenna - Depending on your location relative to the stations you want to watch, a set of rabbit ears might do, but you might need a rooftop or attic antenna. You can buy an antenna that's specially made for digital signals, but any reliable VHF/UHF antenna will work.

  • Cable - Keep in mind that digital cable is not the same as HDTV. You'll need to check with your provider to determine which packages include HDTV stations. You'll also either need a set-top cable box or a CableCARD™ to allow your television to receive and decode the cable signal.

  • Satellite service - As with cable, check with your provider to determine which plans and stations use HDTV signals. You may need a different satellite dish and tuner to receive HDTV signals via satellite.

To learn more about TVs, HDTVs and digital broadcasting, check out the links on the next page.

CableCARD™
Sets marked "digital cable ready" or "plug-and-play" are equipped to use a CableCARD™. A CableCARD is a PCMCIA type II card, or PC card, that takes the place of a set-top cable box. It encrypts and decrypts cable signals and may reduce cable theft.

Your cable company will install the card, and you'll pay a small monthly rental fee, which can cost less than a cable box rental. You'll also have one less remote control to deal with. However, current CableCARDs allow one-way communication only. If you choose to use one, you will not be able to access interactive menus or buy video-on-demand or Pay-per-View programming. If you use any of these services, you should wait until the next generation of CableCARDs comes out. Check out Ars Technica for more information on CableCARD technology.










How Internet Search Engines Work
by Curt Franklin


The good news about the Internet and its most visible component, the World Wide Web, is that there are hundreds of millions of pages available, waiting to present information on an amazing variety of topics. The bad news about the Internet is that there are hundreds of millions of pages available, most of them titled according to the whim of their author, almost all of them sitting on servers with cryptic names. When you need to know about a particular subject, how do you know which pages to read? If you're like most people, you visit an Internet search engine.

Internet search engines are special sites on the Web that are designed to help people find information stored on other sites. There are differences in the ways various search engines work, but they all perform three basic tasks:

  • They search the Internet -- or select pieces of the Internet -- based on important words.
  • They keep an index of the words they find, and where they find them.
  • They allow users to look for words or combinations of words found in that index.

Early search engines held an index of a few hundred thousand pages and documents, and received maybe one or two thousand inquiries each day. Today, a top search engine will index hundreds of millions of pages, and respond to tens of millions of queries per day. In this article, we'll tell you how these major tasks are performed, and how Internet search engines put the pieces together in order to let you find the information you need on the Web.

Looking at the Web

Searches Per Day:
Top 5 Engines
  • Google - 250 million
  • Overture - 167 million
  • Inktomi - 80 million
  • LookSmart - 45 million
  • FindWhat - 33 million
*Source: SearchEngineWatch.com, Feb. 2003
When most people talk about Internet search engines, they really mean World Wide Web search engines. Before the Web became the most visible part of the Internet, there were already search engines in place to help people find information on the Net. Programs with names like "gopher" and "Archie" kept indexes of files stored on servers connected to the Internet, and dramatically reduced the amount of time required to find programs and documents. In the late 1980s, getting serious value from the Internet meant knowing how to use gopher, Archie, Veronica and the rest.

Today, most Internet users limit their searches to the Web, so we'll limit this article to search engines that focus on the contents of Web pages.

An Itsy-Bitsy Beginning
Before a search engine can tell you where a file or document is, it must be found. To find information on the hundreds of millions of Web pages that exist, a search engine employs special software robots, called spiders, to build lists of the words found on Web sites. When a spider is building its lists, the process is called Web crawling. (There are some disadvantages to calling part of the Internet the World Wide Web -- a large set of arachnid-centric names for tools is one of them.) In order to build and maintain a useful list of words, a search engine's spiders have to look at a lot of pages.

How does any spider start its travels over the Web? The usual starting points are lists of heavily used servers and very popular pages. The spider will begin with a popular site, indexing the words on its pages and following every link found within the site. In this way, the spidering system quickly begins to travel, spreading out across the most widely used portions of the Web.


"Spiders" take a Web page's content and create key search words that enable online users to find pages they're looking for.

Google.com began as an academic search engine. In the paper that describes how the system was built, Sergey Brin and Lawrence Page give an example of how quickly their spiders can work. They built their initial system to use multiple spiders, usually three at one time. Each spider could keep about 300 connections to Web pages open at a time. At its peak performance, using four spiders, their system could crawl over 100 pages per second, generating around 600 kilobytes of data each second.

Keeping everything running quickly meant building a system to feed necessary information to the spiders. The early Google system had a server dedicated to providing URLs to the spiders. Rather than depending on an Internet service provider for the domain name server (DNS) that translates a server's name into an address, Google had its own DNS, in order to keep delays to a minimum.

When the Google spider looked at an HTML page, it took note of two things:

  • The words within the page
  • Where the words were found

Words occurring in the title, subtitles, meta tags and other positions of relative importance were noted for special consideration during a subsequent user search. The Google spider was built to index every significant word on a page, leaving out the articles "a," "an" and "the." Other spiders take different approaches.

These different approaches usually attempt to make the spider operate faster, allow users to search more efficiently, or both. For example, some spiders will keep track of the words in the title, sub-headings and links, along with the 100 most frequently used words on the page and each word in the first 20 lines of text. Lycos is said to use this approach to spidering the Web.

Other systems, such as AltaVista, go in the other direction, indexing every single word on a page, including "a," "an," "the" and other "insignificant" words. The push to completeness in this approach is matched by other systems in the attention given to the unseen portion of the Web page, the meta tags.

Meta Tags
Meta tags allow the owner of a page to specify key words and concepts under which the page will be indexed. This can be helpful, especially in cases in which the words on the page might have double or triple meanings -- the meta tags can guide the search engine in choosing which of the several possible meanings for these words is correct. There is, however, a danger in over-reliance on meta tags, because a careless or unscrupulous page owner might add meta tags that fit very popular topics but have nothing to do with the actual contents of the page. To protect against this, spiders will correlate meta tags with page content, rejecting the meta tags that don't match the words on the page.

All of this assumes that the owner of a page actually wants it to be included in the results of a search engine's activities. Many times, the page's owner doesn't want it showing up on a major search engine, or doesn't want the activity of a spider accessing the page. Consider, for example, a game that builds new, active pages each time sections of the page are displayed or new links are followed. If a Web spider accesses one of these pages, and begins following all of the links for new pages, the game could mistake the activity for a high-speed human player and spin out of control. To avoid situations like this, the robot exclusion protocol was developed. This protocol, implemented in the meta-tag section at the beginning of a Web page, tells a spider to leave the page alone -- to neither index the words on the page nor try to follow its links.

Building the Index
Once the spiders have completed the task of finding information on Web pages (and we should note that this is a task that is never actually completed -- the constantly changing nature of the Web means that the spiders are always crawling), the search engine must store the information in a way that makes it useful. There are two key components involved in making the gathered data accessible to users:

  • The information stored with the data
  • The method by which the information is indexed

In the simplest case, a search engine could just store the word and the URL where it was found. In reality, this would make for an engine of limited use, since there would be no way of telling whether the word was used in an important or a trivial way on the page, whether the word was used once or many times or whether the page contained links to other pages containing the word. In other words, there would be no way of building the ranking list that tries to present the most useful pages at the top of the list of search results.

To make for more useful results, most search engines store more than just the word and URL. An engine might store the number of times that the word appears on a page. The engine might assign a weight to each entry, with increasing values assigned to words as they appear near the top of the document, in sub-headings, in links, in the meta tags or in the title of the page. Each commercial search engine has a different formula for assigning weight to the words in its index. This is one of the reasons that a search for the same word on different search engines will produce different lists, with the pages presented in different orders.

Regardless of the precise combination of additional pieces of information stored by a search engine, the data will be encoded to save storage space. For example, the original Google paper describes using 2 bytes, of 8 bits each, to store information on weighting -- whether the word was capitalized, its font size, position, and other information to help in ranking the hit. Each factor might take up 2 or 3 bits within the 2-byte grouping (8 bits = 1 byte). As a result, a great deal of information can be stored in a very compact form. After the information is compacted, it's ready for indexing.

An index has a single purpose: It allows information to be found as quickly as possible. There are quite a few ways for an index to be built, but one of the most effective ways is to build a hash table. In hashing, a formula is applied to attach a numerical value to each word. The formula is designed to evenly distribute the entries across a predetermined number of divisions. This numerical distribution is different from the distribution of words across the alphabet, and that is the key to a hash table's effectiveness.

In English, there are some letters that begin many words, while others begin fewer. You'll find, for example, that the "M" section of the dictionary is much thicker than the "X" section. This inequity means that finding a word beginning with a very "popular" letter could take much longer than finding a word that begins with a less popular one. Hashing evens out the difference, and reduces the average time it takes to find an entry. It also separates the index from the actual entry. The hash table contains the hashed number along with a pointer to the actual data, which can be sorted in whichever way allows it to be stored most efficiently. The combination of efficient indexing and effective storage makes it possible to get results quickly, even when the user creates a complicated search.

Building a Search
Searching through an index involves a user building a query and submitting it through the search engine. The query can be quite simple, a single word at minimum. Building a more complex query requires the use of Boolean operators that allow you to refine and extend the terms of the search.

The Boolean operators most often seen are:

  • AND - All the terms joined by "AND" must appear in the pages or documents. Some search engines substitute the operator "+" for the word AND.
  • OR - At least one of the terms joined by "OR" must appear in the pages or documents.
  • NOT - The term or terms following "NOT" must not appear in the pages or documents. Some search engines substitute the operator "-" for the word NOT.
  • FOLLOWED BY - One of the terms must be directly followed by the other.
  • NEAR - One of the terms must be within a specified number of words of the other.
  • Quotation Marks - The words between the quotation marks are treated as a phrase, and that phrase must be found within the document or file.

Searching for Sport
Search engines have become such an integral part of our lives that at least one organized game has evolved around this tool. In Googlewhacking, you type two words into the Google search engine in the hopes of receiving exactly one result -- a single Web page on which both of those words appear. This is a pure whack.

It's quite a difficult task -- you need to choose two completely unrelated words or else you'll get a whole lot more than one result, but with many completely unrelated words you get zero results.

If you achieve a pure whack, you can submit it to www.googlewhack.com, where it is posted in The Whack Stack (along with your name, or whatever you want to call yourself) for all to see. One pure whack currently in The Whack Stack is "ambidextrous scallywags."

Future Search
The searches defined by Boolean operators are literal searches -- the engine looks for the words or phrases exactly as they are entered. This can be a problem when the entered words have multiple meanings. "Bed," for example, can be a place to sleep, a place where flowers are planted, the storage space of a truck or a place where fish lay their eggs. If you're interested in only one of these meanings, you might not want to see pages featuring all of the others. You can build a literal search that tries to eliminate unwanted meanings, but it's nice if the search engine itself can help out.

One of the areas of search engine research is concept-based searching. Some of this research involves using statistical analysis on pages containing the words or phrases you search for, in order to find other pages you might be interested in. Obviously, the information stored about each page is greater for a concept-based search engine, and far more processing is required for each search. Still, many groups are working to improve both results and performance of this type of search engine. Others have moved on to another area of research, called natural-language queries.

The idea behind natural-language queries is that you can type a question in the same way you would ask it to a human sitting beside you -- no need to keep track of Boolean operators or complex query structures. The most popular natural language query site today is AskJeeves.com, which parses the query for keywords that it then applies to the index of sites it has built. It only works with simple queries; but competition is heavy to develop a natural-language query engine that can accept a query of great complexity.



How RFIDs Work
by Kevin Bonsor

Long checkout lines at the grocery store are one of the biggest complaints about the shopping experience. Soon, these lines could disappear when the ubiquitous Universal Product Code (UPC) bar code is replaced by smart labels, also called radio frequency identification (RFID) tags. RFID tags are intelligent bar codes that can talk to a networked system to track every product that you put in your shopping cart.


Photo courtesy Motorola
Smart labels like Motorola's BiStatix tags will enable manufacturers to track their products at all times.

Imagine going to the grocery store, filling up your cart and walking right out the door. No longer will you have to wait as someone rings up each item in your cart one at at time. Instead, these RFID tags will communicate with an electronic reader that will detect every item in the cart and ring each up almost instantly. The reader will be connected to a large network that will send information on your products to the retailer and product manufacturers. Your bank will then be notified and the amount of the bill will be deducted from your account. No lines, no waiting.

RFID tags, a technology once limited to tracking cattle, will soon be tracking trillions of consumer products worldwide. Manufacturers will know the location of each product they make from the time it's made until it's used and tossed in the recycle bin or trash can. In this article, you'll learn about the types of RFID tags in development and how these smart labels will be tracked through the entire supply chain.

Reinventing the Bar Code


Barcodes, like this one found on a soda can, are found on almost everything we buy.
Almost everything that you buy from retailers has a UPC bar code printed on it. These bar codes help manufacturers and retailers keep track of inventory. They also give valuable information about the quantity of products being bought and, to some extent, by whom the products are being bought. These codes serve as product fingerprints made of machine-readable parallel bars that store binary code.

Created in the early 1970s to speed up the check out process, bar codes have a few disadvantages:

  • In order to keep up with inventories, companies must scan each bar code on every box of a particular product.
  • Going through the checkout line involves the same process of scanning each bar code on each item.
  • Bar code is a read-only technology, meaning that it cannot send out any information.
Let's look at two types of smart labels that have read and write capabilities, which means that the data stored on these labels can be changed, updated and locked.

Inductively Coupled RFID Tags

Bar Code History
At 8:01 a.m. on June 26, 1974, a customer at Marsh's supermarket in Troy, OH, made the first purchase of a product with a bar code, a 10-pack of Wrigley's Juicy Fruit Gum. This began a new era in retail that sped up check-outs and gave companies a more efficient method for inventory control. That pack of gum took its place in American history and is currently on display at the Smithsonian Institute's National Museum of American History.

That historical purchase was the culmination of nearly 30 years of research and development. The first system for automatic product coding was patented by Bernard Silver and Norman Woodland, both graduate students at the Drexel Institute of Technology (now Drexel University). They used a pattern of ink that glowed under ultraviolet light. This system was too expensive and the ink wasn't too stable. The system we use today was unveiled by IBM in 1973, and uses readers designed by NCR.

This type of RFID tag has been used for years to track everything from cows and railroad cars to airline baggage and highway tolls. There are three parts to a typical inductively coupled RFID tag:

  • Silicon microprocessor - These chips vary in size depending on their purpose
  • Metal coil - Made of copper or aluminum wire that is wound into a circular pattern on the transponder, this coil acts as the tag's antenna. The tag transmits signals to the reader, with read distance determined by the size of the coil antenna. These coil antennas can operate at 13.56 MHz.
  • Encapsulating material - glass or polymer material that wraps around the chip and coil

Inductive RFID tags are powered by the magnetic field generated by the reader. The tag's antenna picks up the magnetic energy, and the tag communicates with the reader. The tag then modulates the magnetic field in order to retrieve and transmit data back to the reader. Data is transmitted back to the reader, which directs it to the host computer.

RFID tags are very expensive on a per-unit basis, costing anywhere from $1 for passive button tags to $200 for battery-powered, read-write tags. The high cost for these tags is due to the silicon, the coil antenna and the process that is needed to wind the coil around the surface of the tag.

Capacitively Coupled RFID Tags
Capacitively coupled RFID tags have been created in an attempt to lower the cost of radio-tag systems. These tags do away with the metal coil and use a small amount of silicon to perform that same function as a inductively coupled tag. A capacitively coupled tag also has three parts:

  • Silicon microprocessor - Motorola's BiStatix RFID tags use a silicon chip that is only 3 mm2. These tags can store 96 bits of information, which would allow for trillions of unique numbers that can be assigned to products.
  • Conductive carbon ink - This special ink acts as the tag's antenna. It is applied to the paper substrate through conventional printing means. (For more information, read How Printable Computers Will Work.)
  • Paper - The silicon chip is attached to printed carbon-ink electrodes on the back of a paper label, creating a low-cost, disposable tag that can be integrated on conventional product labels.

By using conductive ink instead of metal coils, the price of capacitively coupled tags are as low as 50 cents. These tags are also more flexible than the inductively coupled tag. Capacitively coupled tags, like the ones made by Motorola, can be bent, torn or crumpled, and can still relay data to the tag reader. In contrast to the magnetic energy that powers the inductively coupled tag, capacitively coupled tags are powered by electric fields generated by the reader.

The disadvantage to this kind of tag is that it has a very limited range. The range of Motorola's BiStatix tags is limited to just about 1 cm (.39 inch). Making the tag cover a larger area of the product packaging will increase the range, but not to the extent that would be ideal for the system that retailers would want. In order for a global system of trillions of talking tags to work, the range needs to be boosted to several feet or more. Intermec has developed RFID tags that meet these needs, but that are too expensive to be cost-effective.

Researchers at several companies are looking for ways to create a tag with a range of several feet, but that costs about the same as bar code technology. In order for retailers to implement a widespread RFID tag system, the cost of the tags will have to get down to one penny (1 cent) per tag. In the next section, you will learn how these tags will be used to create a global system of tags that link to the Internet.

Talking Tags
When scientists are able to increase the range and lower the price of RFID tags, it will lead to a ubiquitous network of smart packages that track every phase of the supply chain. Store shelves will be full of smart-labeled products that can be tracked from purchase to trash can. The shelves themselves will communicate wirelessly with the network. The tags will be just one component of this large product-tracking network to collect data.


The other two pieces to this network will be the readers that communicate directly with these smart labels and the Internet, which will serve as the communications lines for the network. Readers could soon be everywhere, including home appliances and gadgets. In fact, readers could be built directly into the walls during a building's construction becoming a seamless, unseen part of our surroundings.

Let's look at a real-world scenario of how this system might work:

  • On a typical trip to the grocery store, one of the items on your shopping list is milk. The milk containers will have a smart label that stores the milk's expiration date and price. When you pick up the milk from the shelf, the shelf may display that milk container's specific expiration date or the information could be wirelessly sent to your personal digital assistant or cell phone.
  • The milk and all of the other items you've picked up at the store are automatically tallied as you walk through the doors that have an embedded tag reader. The information from the purchases you've made are sent to your bank, which deducts the amount of the bill from your account. Product manufacturers know that you've bought their product and the store's computers know exactly how many of each product that need to be reordered.
  • Once you get home, you put your milk in the refrigerator, which is also equipped with a tag reader. This smart refrigerator is capable of tracking all of your groceries stored in it. It can track the foods you use, how often you restock your refrigerator and can let you know when that milk and other foods spoil.
  • Products are also tracked when they are thrown into a trash can or recycle bin. At this point, your refrigerator could add milk to your grocery list, or you could program it to order these items automatically.
In order for this system to work, each product will have to be given a unique product number. MIT's Auto-ID Center, created a couple of years ago, is working on an Electronic Product Code (EPC) identifier that could replace the UPC. Every smart label could contain 96 bits of information, including the product manufacturer, product name and a 40-bit serial number. Using this system, a smart label would communicate with a network, called the Object Naming Service. This database would retrieve information about a product and then direct information to the manufacturer's computers.

The information stored on the smart labels would be written in a Product Markup Language (PML), which is based on the eXtensible Markup Language (XML). PML would allow all computers to communicate with any computer system in a similar way that Web servers read Hyper Text Markup Language (HTML), the common language used to create Web pages.

Researchers believe that smart labels could be on your favorite consumer products very soon. Once the technical challenges are overcome, the only obstacle might be the public's reaction to a network system that can track every thing that they buy and keep in their kitchen cabinets














How BIOS Works

by Jeff Tyson


One of the most common uses of Flash memory is for the basic input/output system of your computer, commonly known as the BIOS (pronounced "bye-ose"). On virtually every computer available, the BIOS makes sure all the other chips, hard drives, ports and CPU function together.

Every desktop and laptop computer in common use today contains a microprocessor as its central processing unit. The microprocessor is the hardware component. To get its work done, the microprocessor executes a set of instructions known as software (see How Microprocessors Work for details). You are probably very familiar with two different types of software:

  • The operating system - The operating system provides a set of services for the applications running on your computer, and it also provides the fundamental user interface for your computer. Windows 98 and Linux are examples of operating systems. (See How Operating Systems Work for lots of details.)
  • The applications - Applications are pieces of software that are programmed to perform specific tasks. On your computer right now you probably have a browser application, a word processing application, an e-mail application and so on. You can also buy new applications and install them.
It turns out that the BIOS is the third type of software your computer needs to operate successfully. In this article, you'll learn all about BIOS -- what it does, how to configure it and what to do if your BIOS needs updating.

What BIOS Does
The BIOS software has a number of different roles, but its most important role is to load the operating system. When you turn on your computer and the microprocessor tries to execute its first instruction, it has to get that instruction from somewhere. It cannot get it from the operating system because the operating system is located on a hard disk, and the microprocessor cannot get to it without some instructions that tell it how. The BIOS provides those instructions. Some of the other common tasks that the BIOS performs include:

  • A power-on self-test (POST) for all of the different hardware components in the system to make sure everything is working properly

  • Activating other BIOS chips on different cards installed in the computer - For example, SCSI and graphics cards often have their own BIOS chips.

  • Providing a set of low-level routines that the operating system uses to interface to different hardware devices - It is these routines that give the BIOS its name. They manage things like the keyboard, the screen, and the serial and parallel ports, especially when the computer is booting.

  • Managing a collection of settings for the hard disks, clock, etc.
The BIOS is special software that interfaces the major hardware components of your computer with the operating system. It is usually stored on a Flash memory chip on the motherboard, but sometimes the chip is another type of ROM.


BIOS uses Flash memory, a type of ROM.

When you turn on your computer, the BIOS does several things. This is its usual sequence:

  1. Check the CMOS Setup for custom settings
  2. Load the interrupt handlers and device drivers
  3. Initialize registers and power management
  4. Perform the power-on self-test (POST)
  5. Display system settings
  6. Determine which devices are bootable
  7. Initiate the bootstrap sequence
The first thing the BIOS does is check the information stored in a tiny (64 bytes) amount of RAM located on a complementary metal oxide semiconductor (CMOS) chip. The CMOS Setup provides detailed information particular to your system and can be altered as your system changes. The BIOS uses this information to modify or supplement its default programming as needed. We will talk more about these settings later.

Interrupt handlers are small pieces of software that act as translators between the hardware components and the operating system. For example, when you press a key on your keyboard, the signal is sent to the keyboard interrupt handler, which tells the CPU what it is and passes it on to the operating system. The device drivers are other pieces of software that identify the base hardware components such as keyboard, mouse, hard drive and floppy drive. Since the BIOS is constantly intercepting signals to and from the hardware, it is usually copied, or shadowed, into RAM to run faster.

Booting the Computer
Whenever you turn on your computer, the first thing you see is the BIOS software doing its thing. On many machines, the BIOS displays text describing things like the amount of memory installed in your computer, the type of hard disk and so on. It turns out that, during this boot sequence, the BIOS is doing a remarkable amount of work to get your computer ready to run. This section briefly describes some of those activities for a typical PC.

After checking the CMOS Setup and loading the interrupt handlers, the BIOS determines whether the video card is operational. Most video cards have a miniature BIOS of their own that initializes the memory and graphics processor on the card. If they do not, there is usually video driver information on another ROM on the motherboard that the BIOS can load.

Next, the BIOS checks to see if this is a cold boot or a reboot. It does this by checking the value at memory address 0000:0472. A value of 1234h indicates a reboot, and the BIOS skips the rest of POST. Anything else is considered a cold boot.

If it is a cold boot, the BIOS verifies RAM by performing a read/write test of each memory address. It checks the PS/2 ports or USB ports for a keyboard and a mouse. It looks for a peripheral component interconnect (PCI) bus and, if it finds one, checks all the PCI cards. If the BIOS finds any errors during the POST, it will notify you by a series of beeps or a text message displayed on the screen. An error at this point is almost always a hardware problem.

The BIOS then displays some details about your system. This typically includes information about:

Any special drivers, such as the ones for small computer system interface (SCSI) adapters, are loaded from the adapter, and the BIOS displays the information. The BIOS then looks at the sequence of storage devices identified as boot devices in the CMOS Setup. "Boot" is short for "bootstrap," as in the old phrase, "Lift yourself up by your bootstraps." Boot refers to the process of launching the operating system. The BIOS will try to initiate the boot sequence from the first device. If the BIOS does not find a device, it will try the next device in the list. If it does not find the proper files on a device, the startup process will halt. If you have ever left a floppy disk in the drive when you restarted your computer, you have probably seen this message.


This is the message you get if a floppy disk is in the drive when you restart your computer.

The BIOS has tried to boot the computer off of the floppy disk left in the drive. Since it did not find the correct system files, it could not continue. Of course, this is an easy fix. Simply pop out the disk and press a key to continue.

Configuring BIOS
In the previous list, you saw that the BIOS checks the CMOS Setup for custom settings. Here's what you do to change those settings.

To enter the CMOS Setup, you must press a certain key or combination of keys during the initial startup sequence. Most systems use "Esc," "Del," "F1," "F2," "Ctrl-Esc" or "Ctrl-Alt-Esc" to enter setup. There is usually a line of text at the bottom of the display that tells you "Press ___ to Enter Setup."

Once you have entered setup, you will see a set of text screens with a number of options. Some of these are standard, while others vary according to the BIOS manufacturer. Common options include:

  • System Time/Date - Set the system time and date
  • Boot Sequence - The order that BIOS will try to load the operating system
  • Plug and Play - A standard for auto-detecting connected devices; should be set to "Yes" if your computer and operating system both support it
  • Mouse/Keyboard - "Enable Num Lock," "Enable the Keyboard," "Auto-Detect Mouse"...
  • Drive Configuration - Configure hard drives, CD-ROM and floppy drives
  • Memory - Direct the BIOS to shadow to a specific memory address
  • Security - Set a password for accessing the computer
  • Power Management - Select whether to use power management, as well as set the amount of time for standby and suspend
  • Exit - Save your changes, discard your changes or restore default settings


CMOS Setup

Be very careful when making changes to setup. Incorrect settings may keep your computer from booting. When you are finished with your changes, you should choose "Save Changes" and exit. The BIOS will then restart your computer so that the new settings take effect.

The BIOS uses CMOS technology to save any changes made to the computer's settings. With this technology, a small lithium or Ni-Cad battery can supply enough power to keep the data for years. In fact, some of the newer chips have a 10-year, tiny lithium battery built right into the CMOS chip!

Updating Your BIOS
Occasionally, a computer will need to have its BIOS updated. This is especially true of older machines. As new devices and standards arise, the BIOS needs to change in order to understand the new hardware. Since the BIOS is stored in some form of ROM, changing it is a bit harder than upgrading most other types of software.

To change the BIOS itself, you'll probably need a special program from the computer or BIOS manufacturer. Look at the BIOS revision and date information displayed on system startup or check with your computer manufacturer to find out what type of BIOS you have. Then go to the BIOS manufacturer's Web site to see if an upgrade is available. Download the upgrade and the utility program needed to install it. Sometimes the utility and update are combined in a single file to download. Copy the program, along with the BIOS update, onto a floppy disk. Restart your computer with the floppy disk in the drive, and the program erases the old BIOS and writes the new one. You can find a BIOS Wizard that will check your BIOS at BIOS Upgrades.

Major BIOS manufacturers include:

As with changes to the CMOS Setup, be careful when upgrading your BIOS. Make sure you are upgrading to a version that is compatible with your computer system. Otherwise, you could corrupt the BIOS, which means you won't be able to boot your computer. If in doubt, check with your computer manufacturer to be sure you need to upgrade.



How Floppy Disk Drives Work

by Gary Brown


If you have spent any time at all working with a computer, then chances are good that you have used a floppy disk at some point. The floppy disk drive (FDD) was the primary means of adding data to a computer until the CD-ROM drive became popular. In fact, FDDs have been an key component of most personal computers for more than 20 years.

Basically, a floppy disk drive reads and writes data to a small, circular piece of metal-coated plastic similar to audio cassette tape. In this article, you will learn more about what is inside a floppy disk drive and how it works. You will also find out some cool facts about FDDs.

History of the Floppy Disk Drive
The floppy disk drive (FDD) was invented at IBM by Alan Shugart in 1967. The first floppy drives used an 8-inch disk (later called a "diskette" as it got smaller), which evolved into the 5.25-inch disk that was used on the first IBM Personal Computer in August 1981. The 5.25-inch disk held 360 kilobytes compared to the 1.44 megabyte capacity of today's 3.5-inch diskette.

The 5.25-inch disks were dubbed "floppy" because the diskette packaging was a very flexible plastic envelope, unlike the rigid case used to hold today's 3.5-inch diskettes.

By the mid-1980s, the improved designs of the read/write heads, along with improvements in the magnetic recording media, led to the less-flexible, 3.5-inch, 1.44-megabyte (MB) capacity FDD in use today. For a few years, computers had both FDD sizes (3.5-inch and 5.25-inch). But by the mid-1990s, the 5.25-inch version had fallen out of popularity, partly because the diskette's recording surface could easily become contaminated by fingerprints through the open access area.

Parts of a Floppy Disk Drive

Floppy Disk Drive Terminology
  • Floppy disk - Also called diskette. The common size is 3.5 inches.
  • Floppy disk drive - The electromechanical device that reads and writes floppy disks.
  • Track - Concentric ring of data on a side of a disk.
  • Sector - A subset of a track, similar to wedge or a slice of pie.
The Disk
A floppy disk is a lot like a cassette tape:

  • Both use a thin plastic base material coated with iron oxide. This oxide is a ferromagnetic material, meaning that if you expose it to a magnetic field it is permanently magnetized by the field.
  • Both can record information instantly.
  • Both can be erased and reused many times.
  • Both are very inexpensive and easy to use.
If you have ever used an audio cassette, you know that it has one big disadvantage -- it is a sequential device. The tape has a beginning and an end, and to move the tape to another song later in the sequence of songs on the tape you have to use the fast forward and rewind buttons to find the start of the song, since the tape heads are stationary. For a long audio cassette tape it can take a minute or two to rewind the whole tape, making it hard to find a song in the middle of the tape.

A floppy disk, like a cassette tape, is made from a thin piece of plastic coated with a magnetic material on both sides. However, it is shaped like a disk rather than a long thin ribbon. The tracks are arranged in concentric rings so that the software can jump from "file 1" to "file 19" without having to fast forward through files 2-18. The diskette spins like a record and the heads move to the correct track, providing what is known as direct access storage.


In the illustration above, you can see how the disk is divided into tracks (brown) and sectors (yellow).

The Drive
The major parts of a FDD include:

  • Read/Write Heads: Located on both sides of a diskette, they move together on the same assembly. The heads are not directly opposite each other in an effort to prevent interaction between write operations on each of the two media surfaces. The same head is used for reading and writing, while a second, wider head is used for erasing a track just prior to it being written. This allows the data to be written on a wider "clean slate," without interfering with the analog data on an adjacent track.

  • Drive Motor: A very small spindle motor engages the metal hub at the center of the diskette, spinning it at either 300 or 360 rotations per minute (RPM).

  • Stepper Motor: This motor makes a precise number of stepped revolutions to move the read/write head assembly to the proper track position. The read/write head assembly is fastened to the stepper motor shaft.

  • Mechanical Frame: A system of levers that opens the little protective window on the diskette to allow the read/write heads to touch the dual-sided diskette media. An external button allows the diskette to be ejected, at which point the spring-loaded protective window on the diskette closes.

  • Circuit Board: Contains all of the electronics to handle the data read from or written to the diskette. It also controls the stepper-motor control circuits used to move the read/write heads to each track, as well as the movement of the read/write heads toward the diskette surface.

The read/write heads do not touch the diskette media when the heads are traveling between tracks. Electronic optics check for the presence of an opening in the lower corner of a 3.5-inch diskette (or a notch in the side of a 5.25-inch diskette) to see if the user wants to prevent data from being written on it.


Click on the picture to see a brief video of a diskette being inserted. Look for the silver, sliding door opening up and the read/write heads being lowered to the diskette surface.


Read/write heads for each side of the diskette

Writing Data on a Floppy Disk
The following is an overview of how a floppy disk drive writes data to a floppy disk. Reading data is very similar. Here's what happens:

  1. The computer program passes an instruction to the computer hardware to write a data file on a floppy disk, which is very similar to a single platter in a hard disk drive except that it is spinning much slower, with far less capacity and slower access time.

  2. The computer hardware and the floppy-disk-drive controller start the motor in the diskette drive to spin the floppy disk.

    The disk has many concentric tracks on each side. Each track is divided into smaller segments called sectors, like slices of a pie.

  3. A second motor, called a stepper motor, rotates a worm-gear shaft (a miniature version of the worm gear in a bench-top vise) in minute increments that match the spacing between tracks.

    The time it takes to get to the correct track is called "access time." This stepping action (partial revolutions) of the stepper motor moves the read/write heads like the jaws of a bench-top vise. The floppy-disk-drive electronics know how many steps the motor has to turn to move the read/write heads to the correct track.

  4. The read/write heads stop at the track. The read head checks the prewritten address on the formatted diskette to be sure it is using the correct side of the diskette and is at the proper track. This operation is very similar to the way a record player automatically goes to a certain groove on a vinyl record.

  5. Before the data from the program is written to the diskette, an erase coil (on the same read/write head assembly) is energized to "clear" a wide, "clean slate" sector prior to writing the sector data with the write head. The erased sector is wider than the written sector -- this way, no signals from sectors in adjacent tracks will interfere with the sector in the track being written.

  6. The energized write head puts data on the diskette by magnetizing minute, iron, bar-magnet particles embedded in the diskette surface, very similar to the technology used in the mag stripe on the back of a credit card. The magnetized particles have their north and south poles oriented in such a way that their pattern may be detected and read on a subsequent read operation.

  7. The diskette stops spinning. The floppy disk drive waits for the next command.
On a typical floppy disk drive, the small indicator light stays on during all of the above operations.

Floppy Disk Drive Facts
Here are some interesting things to note about FDDs:

  • Two floppy disks do not get corrupted if they are stored together, due to the low level of magnetism in each one.

  • In your PC, there is a twist in the FDD data-ribbon cable -- this twist tells the computer whether the drive is an A-drive or a B-drive.

  • Like many household appliances, there are really no serviceable parts in today's FDDs. This is because the cost of a new drive is considerably less than the hourly rate typically charged to disassemble and repair a drive.

  • If you wish to redisplay the data on a diskette drive after changing a diskette, you can simply tap the F5 key (in most Windows applications).

  • In the corner of every 3.5-inch diskette, there is a small slider. If you uncover the hole by moving the slider, you have protected the data on the diskette from being written over or erased.

  • Floppy disks, while rarely used to distribute software (as in the past), are still used in these applications:
    • in some Sony digital cameras
    • for software recovery after a system crash or a virus attack
    • when data from one computer is needed on a second computer and the two computers are not networked
    • in bootable diskettes used for updating the BIOS on a personal computer
    • in high-density form, used in the popular Zip drive

EMAILS

by Marshall Brain


Every day, the citizens of the Internet send each other billions of e-mail messages. If you are online a lot, you yourself may send a dozen or more e-mails each day without even thinking about it. Obviously, e-mail has become an extremely popular communication tool.

Have you ever wondered how e-mail gets from your desktop to a friend halfway around the world? What is a POP3 server, and how does it hold your mail? The answers may surprise you, because it turns out that e-mail is an incredibly simple system at its core. In this article, we'll take an in-depth look at e-mail and how it works.

An E-mail Message
According to Darwin Magazine: Prime Movers, the first e-mail message was sent in 1971 by an engineer named Ray Tomlinson. Prior to this, you could only send messages to users on a single machine. Tomlinson's breakthrough was the ability to send messages to other machines on the Internet, using the @ sign to designate the receiving machine.

An e-mail message has always been nothing more than a simple text message -- a piece of text sent to a recipient. In the beginning and even today, e-mail messages tend to be short pieces of text, although the ability to add attachments now makes many e-mail messages quite long. Even with attachments, however, e-mail messages continue to be text messages -- we'll see why when we get to the section on attachments.

E-mail Clients
You have probably already received several e-mail messages today. To look at them, you use some sort of e-mail client. Many people use well-known stand-alone clients like Microsoft Outlook, Outlook Express, Eudora or Pegasus. People who subscribe to free e-mail services like Hotmail or Yahoo use an e-mail client that appears in a Web page. If you are an AOL customer, you use AOL's e-mail reader. No matter which type of client you are using, it generally does four things:

  • It shows you a list of all of the messages in your mailbox by displaying the message headers. The header shows you who sent the mail, the subject of the mail and may also show the time and date of the message and the message size.
  • It lets you select a message header and read the body of the e-mail message.
  • It lets you create new messages and send them. You type in the e-mail address of the recipient and the subject for the message, and then type the body of the message.
  • Most e-mail clients also let you add attachments to messages you send and save the attachments from messages you receive.
Sophisticated e-mail clients may have all sorts of bells and whistles, but at the core, this is all that an e-mail client does.

A Simple E-mail Server
Given that you have an e-mail client on your machine, you are ready to send and receive e-mail. All that you need is an e-mail server for the client to connect to. Let's imagine what the simplest possible e-mail server would look like in order to get a basic understanding of the process. Then we will look at the real thing.

If you have read How Web Servers Work, then you know that machines on the Internet can run software applications that act as servers. There are Web servers, FTP servers, telnet servers and e-mail servers running on millions of machines on the Internet right now. These applications run all the time on the server machine and they listen to specific ports, waiting for people or programs to attach to the port (see How Web Servers Work for details). The simplest possible e-mail server would work something like this:

  • It would have a list of e-mail accounts, with one account for each person who can receive e-mail on the server. My account name might be mbrain, John Smith's might be jsmith, and so on.

  • It would have a text file for each account in the list. So the server would have a text file in its directory named MBRAIN.TXT, another named JSMITH.TXT, and so on.

  • If someone wanted to send me a message, the person would compose a text message ("Marshall, Can we have lunch Monday? John") in an e-mail client, and indicate that the message should go to mbrain. When the person presses the Send button, the e-mail client would connect to the e-mail server and pass to the server the name of the recipient (mbrain), the name of the sender (jsmith) and the body of the message.

  • The server would format those pieces of information and append them to the bottom of the MBRAIN.TXT file. The entry in the file might look like this:
      From: jsmith
      To: mbrain
      Marshall,
      Can we have lunch Monday?
      John
There are several other pieces of information that the server might save into the file, like the time and date of receipt and a subject line; but overall, you can see that this is an extremely simple process.

As other people sent mail to mbrain, the server would simply append those messages to the bottom of the file in the order that they arrived. The text file would accumulate a series of five or 10 messages, and eventually I would log in to read them. When I wanted to look at my e-mail, my e-mail client would connect to the server machine. In the simplest possible system, it would:

  1. Ask the server to send a copy of the MBRAIN.TXT file
  2. Ask the server to erase and reset the MBRAIN.TXT file
  3. Save the MBRAIN.TXT file on my local machine
  4. Parse the file into the separate messages (using the word "From:" as the separator)
  5. Show me all of the message headers in a list
When I double-clicked on a message header, it would find that message in the text file and show me its body.

You have to admit that this is a very simple system. Surprisingly, the real e-mail system that you use every day is not much more complicated than this.

The Real E-mail System
For the vast majority of people right now, the real e-mail system consists of two different servers running on a server machine. One is called the SMTP server, where SMTP stands for Simple Mail Transfer Protocol. The SMTP server handles outgoing mail. The other is either a POP3 server or an IMAP server, both of which handle incoming mail. POP stands for Post Office Protocol, and IMAP stands for Internet Mail Access Protocol. A typical e-mail server looks like this:


The SMTP server listens on well-known port number 25, POP3 listens on port 110 and IMAP uses port 143 (see How Web Servers Work for details on ports).

The SMTP Server
Whenever you send a piece of e-mail, your e-mail client interacts with the SMTP server to handle the sending. The SMTP server on your host may have conversations with other SMTP servers to actually deliver the e-mail.


Let's assume that I want to send a piece of e-mail. My e-mail ID is brain, and I have my account on howstuffworks.com. I want to send e-mail to jsmith@mindspring.com. I am using a stand-alone e-mail client like Outlook Express.

When I set up my account at howstuffworks, I told Outlook Express the name of the mail server -- mail.howstuffworks.com. When I compose a message and press the Send button, here is what happens:

  1. Outlook Express connects to the SMTP server at mail.howstuffworks.com using port 25.

  2. Outlook Express has a conversation with the SMTP server, telling the SMTP server the address of the sender and the address of the recipient, as well as the body of the message.

  3. The SMTP server takes the "to" address (jsmith@mindspring.com) and breaks it into two parts:
    • The recipient name (jsmith)
    • The domain name (mindspring.com)

    If the "to" address had been another user at howstuffworks.com, the SMTP server would simply hand the message to the POP3 server for howstuffworks.com (using a little program called the delivery agent). Since the recipient is at another domain, SMTP needs to communicate with that domain.

  4. The SMTP server has a conversation with a Domain Name Server, or DNS (see How Web Servers Work for details). It says, "Can you give me the IP address of the SMTP server for mindspring.com?" The DNS replies with the one or more IP addresses for the SMTP server(s) that Mindspring operates.

  5. The SMTP server at howstuffworks.com connects with the SMTP server at Mindspring using port 25. It has the same simple text conversation that my e-mail client had with the SMTP server for HowStuffWorks, and gives the message to the Mindspring server. The Mindspring server recognizes that the domain name for jsmith is at Mindspring, so it hands the message to Mindspring's POP3 server, which puts the message in jsmith's mailbox.
If, for some reason, the SMTP server at HowStuffWorks cannot connect with the SMTP server at Mindspring, then the message goes into a queue. The SMTP server on most machines uses a program called sendmail to do the actual sending, so this queue is called the sendmail queue. Sendmail will periodically try to resend the messages in its queue. For example, it might retry every 15 minutes. After four hours, it will usually send you a piece of mail that tells you there is some sort of problem. After five days, most sendmail configurations give up and return the mail to you undelivered.

The actual conversation that an e-mail client has with an SMTP server is incredibly simple and human readable. It is specified in public documents called Requests For Comments (RFC), and a typical conversation looks something like this:

    helo test
    250 mx1.mindspring.com Hello abc.sample.com
    [220.57.69.37], pleased to meet you
    mail from: test@sample.com
    250 2.1.0 test@sample.com... Sender ok
    rcpt to: jsmith@mindspring.com
    250 2.1.5 jsmith... Recipient ok
    data
    354 Enter mail, end with "." on a line by itself
    from: test@sample.com
    to:jsmith@mindspring.com
    subject: testing
    John, I am testing...
    .

    250 2.0.0 e1NMajH24604 Message accepted
    for delivery
    quit
    221 2.0.0 mx1.mindspring.com closing connection
    Connection closed by foreign host.
What the e-mail client says is in blue, and what the SMTP server replies is in green. The e-mail client introduces itself, indicates the "from" and "to" addresses, delivers the body of the message and then quits. You can, in fact, telnet to a mail server machine at port 25 and have one of these dialogs yourself -- this is how people "spoof" e-mail.

You can see that the SMTP server understands very simple text commands like HELO, MAIL, RCPT and DATA. The most common commands are:

  • HELO - introduce yourself
  • EHLO - introduce yourself and request extended mode
  • MAIL FROM: - specify the sender
  • RCPT TO: - specify the recipient
  • DATA - specify the body of the message (To:, From: and Subject: should be the first three lines.)
  • RSET - reset
  • QUIT - quit the session
  • HELP - get help on commands
  • VRFY - verify an address
  • EXPN - expand an address
  • VERB - verbose

The POP3 Server
In the simplest implementations of POP3, the server really does maintain a collection of text files -- one for each e-mail account. When a message arrives, the POP3 server simply appends it to the bottom of the recipient's file!

When you check your e-mail, your e-mail client connects to the POP3 server using port 110. The POP3 server requires an account name and a password. Once you have logged in, the POP3 server opens your text file and allows you to access it. Like the SMTP server, the POP3 server understands a very simple set of text commands. Here are the most common commands:

  • USER - enter your user ID
  • PASS - enter your password
  • QUIT - quit the POP3 server
  • LIST - list the messages and their size
  • RETR - retrieve a message, pass it a message number
  • DELE - delete a message, pass it a message number
  • TOP - show the top x lines of a message, pass it a message number and the number of lines
Your e-mail client connects to the POP3 server and issues a series of commands to bring copies of your e-mail messages to your local machine. Generally, it will then delete the messages from the server (unless you've told the e-mail client not to).

You can see that the POP3 server simply acts as an interface between the e-mail client and the text file containing your messages. And again, you can see that the POP3 server is extremely simple! You can connect to it through telnet at port 110 and issue the commands yourself if you would like to (see How Web Servers Work for details on telnetting to servers).

The IMAP Server
As you can see, the POP3 protocol is very simple. It allows you to have a collection of messages stored in a text file on the server. Your e-mail client (e.g. Outlook Express) can connect to your POP3 e-mail server and download the messages from the POP3 text file onto your PC. That is about all that you can do with POP3.

Many users want to do far more than that with their e-mail, and they want their e-mail to remain on the server. The main reason for keeping your e-mail on the server is to allow users to connect from a variety of machines. With POP3, once you download your e-mail it is stuck on the machine to which you downloaded it. If you want to read your e-mail both on your desktop machine and your laptop (depending on whether you are working in the office or on the road), POP3 makes life difficult.

IMAP (Internet Mail Access Protocol) is a more advanced protocol that solves these problems. With IMAP, your mail stays on the e-mail server. You can organize your mail into folders, and all the folders live on the server as well. When you search your e-mail, the search occurs on the server machine, rather than on your machine. This approach makes it extremely easy for you to access your e-mail from any machine, and regardless of which machine you use, you have access to all of your mail in all of your folders.

Your e-mail client connects to the IMAP server using port 143. The e-mail client then issues a set of text commands that allow it to do things like list all the folders on the server, list all the message headers in a folder, get a specific e-mail message from the server, delete messages on the server or search through all of the e-mails on the server.

One problem that can arise with IMAP involves this simple question: “If all of my e-mail is stored on the server, then how can I read my mail if I am not connected to the Internet?” To solve this problem, most e-mail clients have some way to cache e-mail on the local machine. For example, the client will download all the messages and store their complete contents on the local machine (just like it would if it were talking to a POP3 server). The messages still exist on the IMAP server, but you now have copies on your machine. This allows you to read and reply to e-mail even if you have no connection to the Internet. The next time you establish a connection, you download all the new messages you received while disconnected and send all the mail that you wrote while disconnected.

Attachments
Your e-mail client allows you to add attachments to e-mail messages you send, and also lets you save attachments from messages that you receive. Attachments might include word processing documents, spreadsheets, sound files, snapshots and pieces of software. Usually, an attachment is not text (if it were, you would simply include it in the body of the message). Since e-mail messages can contain only text information, and attachments are not text, there is a problem that needs to be solved.

In the early days of e-mail, you solved this problem by hand, using a program called uuencode. The uuencode program assumes that the file contains binary information. It extracts 3 bytes from the binary file and converts them to four text characters (that is, it takes 6 bits at a time, adds 32 to the value of the 6 bits and creates a text character -- see How Bits and Bytes Work to learn more about ASCII characters). What uuencode produces, therefore, is an encoded version of the original binary file that contains only text characters. In the early days of e-mail, you would run uuencode yourself and paste the uuencoded file into your e-mail message.

Here is typical output from the uuencode program:

    begin 644 reports
    M9W)E<" B<&P_(B O=F%R+VQO9R]H='1P9"]W96(V-C1F- BYA8V-E<"!^+W=E8G-I=&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;4O8V=I+6)I;B ]W:&5R92UD871A+V1A=&$@=VAE<@/B!L;V=S+20Q"GXO=&]T86P@/B!T;W1A;"T D,0IA End
The recipient would then save the uuencoded portion of the message to a file and run uudecode on it to translate it back to binary. The word "reports" in the first line tells uudecode what to name the output file.

Modern e-mail clients are doing exactly the same thing, but they run uuencode and uudecode for you automatically. If you look at a raw e-mail file that contains attachments, you'll find that the attachment is represented in the same uuencoded text format shown above!

Considering its tremendous impact on society, having forever changed the way we communicate, today's e-mail system is one of the simplest things ever devised! There are parts of the system, like the routing rules in sendmail, that get complicated, but the basic system is incredibly straightforward.

The next time you send an e-mail, you'll know exactly how it's getting to its destination.


CABEL MODEM


For millions of people, television brings news, entertainment and educational programs into their homes. Many people get their TV signal from cable television (CATV) because cable TV provides a clearer picture and more channels. (See How Cable TV Works for details.)

Many people who have cable TV can now get a high-speed connection to the Internet from their cable provider. Cable modems compete with technologies like asymmetrical digital subscriber lines (ADSL). If you have ever wondered what the differences between DSL and cable modems are, or if you have ever wondered how a computer network can share a cable with dozens of television channels, then read on. In this article, we'll look at how a cable modem works and see how 100 cable television channels and any Web site out there can flow over a single coaxial cable into your home.

Extra Space
You might think that a television channel would take up quite a bit of electrical "space," or bandwidth, on a cable. In reality, each television signal is given a 6-megahertz (MHz, millions of cycles per second) channel on the cable. The coaxial cable used to carry cable television can carry hundreds of megahertz of signals -- all the channels you could want to watch and more. (For more information, see How Television Works.)

In a cable TV system, signals from the various channels are each given a 6-MHz slice of the cable's available bandwidth and then sent down the cable to your house. In some systems, coaxial cable is the only medium used for distributing signals. In other systems, fiber-optic cable goes from the cable company to different neighborhoods or areas. Then the fiber is terminated and the signals move onto coaxial cable for distribution to individual houses.


Streams
When a cable company offers Internet access over the cable, Internet information can use the same cables because the cable modem system puts downstream data -- data sent from the Internet to an individual computer -- into a 6-MHz channel. On the cable, the data looks just like a TV channel. So Internet downstream data takes up the same amount of cable space as any single channel of programming. Upstream data -- information sent from an individual back to the Internet -- requires even less of the cable's bandwidth, just 2 MHz, since the assumption is that most people download far more information than they upload.

Putting both upstream and downstream data on the cable television system requires two types of equipment: a cable modem on the customer end and a cable modem termination system (CMTS) at the cable provider's end. Between these two types of equipment, all the computer networking, security and management of Internet access over cable television is put into place.

Inside the Cable Modem
Cable modems can be either internal or external to the computer. In some cases, the cable modem can be part of a set-top cable box, requiring that only a keyboard and mouse be added for Internet access. In fact, if your cable system has upgraded to digital cable, the new set-top box the cable company provides will be capable of connecting to the Internet, whether or not you receive Internet access through your CATV connection. Regardless of their outward appearance, all cable modems contain certain key components:

  • A tuner
  • A demodulator
  • A modulator
  • A media access control (MAC) device
  • A microprocessor


Inside the Cable Modem: Tuner
The tuner connects to the cable outlet, sometimes with the addition of a splitter that separates the Internet data channel from normal CATV programming. Since the Internet data comes through an otherwise unused cable channel, the tuner simply receives the modulated digital signal and passes it to the demodulator.

In some cases, the tuner will contain a diplexer, which allows the tuner to make use of one set of frequencies (generally between 42 and 850 MHz) for downstream traffic, and another set of frequencies (between 5 and 42 MHz) for the upstream data. Other systems, most often those with more limited capacity for channels, will use the cable modem tuner for downstream data and a dial-up telephone modem for upstream traffic. In either case, after the tuner receives a signal, it is passed to the demodulator.


Inside the Cable Modem: Demodulator
The most common demodulators have four functions. A quadrature amplitude modulation (QAM) demodulator takes a radio-frequency signal that has had information encoded in it by varying both the amplitude and phase of the wave, and turns it into a simple signal that can be processed by the analog-to-digital (A/D) converter. The A/D converter takes the signal, which varies in voltage, and turns it into a series of digital 1s and 0s. An error correction module then checks the received information against a known standard, so that problems in transmission can be found and fixed. In most cases, the network frames, or groups of data, are in MPEG format, so an MPEG synchronizer is used to make sure the data groups stay in line and in order.


Inside the Cable Modem: Modulator
In cable modems that use the cable system for upstream traffic, a modulator is used to convert the digital computer network data into radio-frequency signals for transmission. This component is sometimes called a burst modulator, because of the irregular nature of most traffic between a user and the Internet, and consists of three parts:

  • A section to insert information used for error correction on the receiving end
  • A QAM modulator
  • A digital-to-analog (D/A) converter


Inside the Cable Modem: MAC
The MAC sits between the upstream and downstream portions of the cable modem, and acts as the interface between the hardware and software portions of the various network protocols. All computer network devices have MACs, but in the case of a cable modem the tasks are more complex than those of a normal network interface card. For this reason, in most cases, some of the MAC functions will be assigned to a central processing unit (CPU) -- either the CPU in the cable modem or the CPU of the user's system.


Microprocessor
The microprocessor's job depends somewhat on whether the cable modem is designed to be part of a larger computer system or to provide Internet access with no additional computer support. In situations calling for an attached computer, the internal microprocessor still picks up much of the MAC function from the dedicated MAC module. In systems where the cable modem is the sole unit required for Internet access, the microprocessor picks up MAC slack and much more. In either case, Motorola's PowerPC processor is one of the common choices for system designers.


Cable Modem Termination System
At the cable provider's head-end, the CMTS provides many of the same functions provided by the DSLAM in a DSL system. The CMTS takes the traffic coming in from a group of customers on a single channel and routes it to an Internet service provider (ISP) for connection to the Internet. At the head-end, the cable providers will have, or lease space for a third-party ISP to have, servers for accounting and logging, Dynamic Host Configuration Protocol (DHCP) for assigning and administering the IP addresses of all the cable system's users, and control servers for a protocol called CableLabs Certified Cable Modems -- formerly Data Over Cable Service Interface Specifications (DOCSIS), the major standard used by U.S. cable systems in providing Internet access to users.


The downstream information flows to all connected users, just like in an Ethernet network -- it's up to the individual network connection to decide whether a particular block of data is intended for it or not. On the upstream side, information is sent from the user to the CMTS -- other users don't see that data at all. The narrower upstream bandwidth is divided into slices of time, measured in milliseconds, in which users can transmit one "burst" at a time to the Internet. The division by time works well for the very short commands, queries and addresses that form the bulk of most users' traffic back to the Internet.

A CMTS will enable as many as 1,000 users to connect to the Internet through a single 6-MHz channel. Since a single channel is capable of 30 to 40 megabits per second (Mbps) of total throughput, this means that users may see far better performance than is available with standard dial-up modems. The single channel aspect, though, can also lead to one of the issues some users experience with cable modems.

Pros and Cons
If you are one of the first users to connect to the Internet through a particular cable channel, then you may have nearly the entire bandwidth of the channel available for your use. As new users, especially heavy-access users, are connected to the channel, you will have to share that bandwidth, and may see your performance degrade as a result. It is possible that, in times of heavy usage with many connected users, performance will be far below the theoretical maximums. The good news is that this particular performance issue can be resolved by the cable company adding a new channel and splitting the base of users.

Another benefit of the cable modem for Internet access is that, unlike ADSL, its performance doesn't depend on distance from the central cable office. A digital CATV system is designed to provide digital signals at a particular quality to customer households. On the upstream side, the burst modulator in cable modems is programmed with the distance from the head-end, and provides the proper signal strength for accurate transmission.


****************************************************
DSL MODEM


How DSL Works
by Curt Franklin
When you connect to the Internet, you might connect through a regular modem, through a local-area network connection in your office, through a cable modem or through a digital subscriber line (DSL) connection. DSL is a very high-speed connection that uses the same wires as a regular telephone line.


Here are some advantages of DSL:

  • You can leave your Internet connection open and still use the phone line for voice calls.
  • The speed is much higher than a regular modem
  • DSL doesn't necessarily require new wiring; it can use the phone line you already have.
  • The company that offers DSL will usually provide the modem as part of the installation.
But there are disadvantages:
  • A DSL connection works better when you are closer to the provider's central office.
  • The connection is faster for receiving data than it is for sending data over the Internet.
  • The service is not available everywhere.
In this article, we explain how a DSL connection manages to squeeze more information through a standard phone line -- and lets you make regular telephone calls even when you're online.

Telephone Lines
If you have read How Telephones Work, then you know that a standard telephone installation in the United States consists of a pair of copper wires that the phone company installs in your home. The copper wires have lots of room for carrying more than your phone conversations -- they are capable of handling a much greater bandwidth, or range of frequencies, than that demanded for voice. DSL exploits this "extra capacity" to carry information on the wire without disturbing the line's ability to carry conversations. The entire plan is based on matching particular frequencies to specific tasks.

To understand DSL, you first need to know a couple of things about a normal telephone line -- the kind that telephone professionals call POTS, for Plain Old Telephone Service. One of the ways that POTS makes the most of the telephone company's wires and equipment is by limiting the frequencies that the switches, telephones and other equipment will carry. Human voices, speaking in normal conversational tones, can be carried in a frequency range of 0 to 3,400 Hertz (cycles per second -- see How Telephones Work for a great demonstration of this). This range of frequencies is tiny. For example, compare this to the range of most stereo speakers, which cover from roughly 20 Hertz to 20,000 Hertz. And the wires themselves have the potential to handle frequencies up to several million Hertz in most cases.

The use of such a small portion of the wire's total bandwidth is historical -- remember that the telephone system has been in place, using a pair of copper wires to each home, for about a century. By limiting the frequencies carried over the lines, the telephone system can pack lots of wires into a very small space without worrying about interference between lines. Modern equipment that sends digital rather than analog data can safely use much more of the telephone line's capacity. DSL does just that.

Asymmetrical DSL
Most homes and small business users are connected to an asymmetric DSL (ADSL) line. ADSL divides up the available frequencies in a line on the assumption that most Internet users look at, or download, much more information than they send, or upload. Under this assumption, if the connection speed from the Internet to the user is three to four times faster than the connection from the user back to the Internet, then the user will see the most benefit (most of the time).

Other types of DSL include:

  • Very high bit-rate DSL (VDSL) - This is a fast connection, but works only over a short distance.

  • Symmetric DSL (SDSL) - This connection, used mainly by small businesses, doesn't allow you to use the phone at the same time, but the speed of receiving and sending data is the same.

  • Rate-adaptive DSL (RADSL) - This is a variation of ADSL, but the modem can adjust the speed of the connection depending on the length and quality of the line.

Distance Limitations
Precisely how much benefit you see will greatly depend on how far you are from the central office of the company providing the ADSL service. ADSL is a distance-sensitive technology: As the connection's length increases, the signal quality decreases and the connection speed goes down. The limit for ADSL service is 18,000 feet (5,460 meters), though for speed and quality of service reasons many ADSL providers place a lower limit on the distances for the service. At the extremes of the distance limits, ADSL customers may see speeds far below the promised maximums, while customers nearer the central office have faster connections and may see extremely high speeds in the future. ADSL technology can provide maximum downstream (Internet to customer) speeds of up to 8 megabits per second (Mbps) at a distance of about 6,000 feet (1,820 meters), and upstream speeds of up to 640 kilobits per second (Kbps). In practice, the best speeds widely offered today are 1.5 Mbps downstream, with upstream speeds varying between 64 and 640 Kbps.

You might wonder, if distance is a limitation for DSL, why it's not also a limitation for voice telephone calls. The answer lies in small amplifiers called loading coils that the telephone company uses to boost voice signals. Unfortunately, these loading coils are incompatible with ADSL signals, so a voice coil in the loop between your telephone and the telephone company's central office will disqualify you from receiving ADSL. Other factors that might disqualify you from receiving ADSL include:

  • Bridge taps - These are extensions, between you and the central office, that extend service to other customers. While you wouldn't notice these bridge taps in normal phone service, they may take the total length of the circuit beyond the distance limits of the service provider.
  • Fiber-optic cables - ADSL signals can't pass through the conversion from analog to digital and back to analog that occurs if a portion of your telephone circuit comes through fiber-optic cables.
  • Distance - Even if you know where your central office is (don't be surprised if you don't -- the telephone companies don't advertise their locations), looking at a map is no indication of the distance a signal must travel between your house and the office.

Next, we'll look at how the signal is split and what equipment DSL uses.

Want the best DSL router?
For expert reviews of the best new DSL routers, check out our partner site Consumer Guide Products.

Splitting the Signal and DSL Equipment
The CAP System
There are two competing and incompatible standards for ADSL. The official ANSI standard for ADSL is a system called discrete multitone, or DMT. According to equipment manufacturers, most of the ADSL equipment installed today uses DMT. An earlier and more easily implemented standard was the carrierless amplitude/phase (CAP) system, which was used on many of the early installations of ADSL.


CAP operates by dividing the signals on the telephone line into three distinct bands: Voice conversations are carried in the 0 to 4 KHz (kilohertz) band, as they are in all POTS circuits. The upstream channel (from the user back to the server) is carried in a band between 25 and 160 KHz. The downstream channel (from the server to the user) begins at 240 KHz and goes up to a point that varies depending on a number of conditions (line length, line noise, number of users in a particular telephone company switch) but has a maximum of about 1.5 MHz (megahertz). This system, with the three channels widely separated, minimizes the possibility of interference between the channels on one line, or between the signals on different lines.

The DMT System
DMT also divides signals into separate channels, but doesn't use two fairly broad channels for upstream and downstream data. Instead, DMT divides the data into 247 separate channels, each 4 KHz wide.


One way to think about it is to imagine that the phone company divides your copper line into 247 different 4-KHz lines and then attaches a modem to each one. You get the equivalent of 247 modems connected to your computer at once! Each channel is monitored and, if the quality is too impaired, the signal is shifted to another channel. This system constantly shifts signals between different channels, searching for the best channels for transmission and reception. In addition, some of the lower channels (those starting at about 8 KHz), are used as bidirectional channels, for upstream and downstream information. Monitoring and sorting out the information on the bidirectional channels, and keeping up with the quality of all 247 channels, makes DMT more complex to implement than CAP, but gives it more flexibility on lines of differing quality.

Filters
CAP and DMT are similar in one way that you can see as a DSL user.


If you have ADSL installed, you were almost certainly given small filters to attach to the outlets that don't provide the signal to your ADSL modem. These filters are low-pass filters -- simple filters that block all signals above a certain frequency. Since all voice conversations take place below 4 KHz, the low-pass (LP) filters are built to block everything above 4 KHz, preventing the data signals from interfering with standard telephone calls.

ADSL uses two pieces of equipment, one on the customer end and one at the Internet service provider, telephone company or other provider of DSL services. At the customer's location there is a DSL transceiver, which may also provide other services. The DSL service provider has a DSL Access Multiplexer (DSLAM) to receive customer connections.


The Transceiver
Most residential customers call their DSL transceiver a "DSL modem." The engineers at the telephone company or ISP call it an ATU-R. Regardless of what it's called, it's the point where data from the user's computer or network is connected to the DSL line.


Photo courtesy Allied Telesyn
DSL modem

The transceiver can connect to a customer's equipment in several ways, though most residential installation uses USB or 10 base-T Ethernet connections. While most of the ADSL transceivers sold by ISPs and telephone companies are simply transceivers, the devices used by businesses may combine network routers, network switches or other networking equipment in the same platform.

The DSLAM
The DSLAM at the access provider is the equipment that really allows DSL to happen. A DSLAM takes connections from many customers and aggregates them onto a single, high-capacity connection to the Internet. DSLAMs are generally flexible and able to support multiple types of DSL in a single central office, and different varieties of protocol and modulation -- both CAP and DMT, for example -- in the same type of DSL. In addition, the DSLAM may provide additional functions including routing or dynamic IP address assignment for the customers.

The DSLAM provides one of the main differences between user service through ADSL and through cable modems. Because cable-modem users generally share a network loop that runs through a neighborhood, adding users means lowering performance in many instances. ADSL provides a dedicated connection from each user back to the DSLAM, meaning that users won't see a performance decrease as new users are added -- until the total number of users begins to saturate the single, high-speed connection to the Internet. At that point, an upgrade by the service provider can provide additional performance for all the users connected to the DSLAM.

For information on ADSL rates and availability in the United States, go to Broadband Reports. This site can provide information on ADSL service companies in your area, the rates they charge, and customer satisfaction, as well as estimating how far you are from the nearest central office.

************************************************************************************

How USB Ports Work(by Marshall Brain)

Just about any computer that you buy today comes with one or more Universal Serial Bus connectors on the back. These USB connectors let you attach everything from mice to printers to your computer quickly and easily. The operating system supports USB as well, so the installation of the device drivers is quick and easy, too. Compared to other ways of connecting devices to your computer (including parallel ports, serial ports and special cards that you install inside the computer's case), USB devices are incredibly simple!

In this article, we will look at USB ports from both a user and a technical standpoint. You will learn why the USB system is so flexible and how it is able to support so many devices so easily -- it's truly an amazing system!

What is USB?
Anyone who has been around computers for more than two or three years knows the problem that the Universal Serial Bus is trying to solve -- in the past, connecting devices to computers has been a real headache!

  • Printers connected to parallel printer ports, and most computers only came with one. Things like Zip drives, which need a high-speed connection into the computer, would use the parallel port as well, often with limited success and not much speed.
  • Modems used the serial port, but so did some printers and a variety of odd things like Palm Pilots and digital cameras. Most computers have at most two serial ports, and they are very slow in most cases.

  • Devices that needed faster connections came with their own cards, which had to fit in a card slot inside the computer's case. Unfortunately, the number of card slots is limited and you needed a Ph.D. to install the software for some of the cards.

The goal of USB is to end all of these headaches. The Universal Serial Bus gives you a single, standardized, easy-to-use way to connect up to 127 devices to a computer.

Just about every peripheral made now comes in a USB version. A sample list of USB devices that you can buy today includes:

USB Connections
Connecting a USB device to a computer is simple -- you find the USB connector on the back of your machine and plug the USB connector into it.


The rectangular socket is a typical USB socket on the back of a PC.


A typical USB connector, called an "A" connection

If it is a new device, the operating system auto-detects it and asks for the driver disk. If the device has already been installed, the computer activates it and starts talking to it. USB devices can be connected and disconnected at any time.

Many USB devices come with their own built-in cable, and the cable has an "A" connection on it. If not, then the device has a socket on it that accepts a USB "B" connector.


A typical "B" connection

The USB standard uses "A" and "B" connectors to avoid confusion:

  • "A" connectors head "upstream" toward the computer.
  • "B" connectors head "downstream" and connect to individual devices.
By using different connectors on the upstream and downstream end, it is impossible to ever get confused -- if you connect any USB cable's "B" connector into a device, you know that it will work. Similarly, you can plug any "A" connector into any "A" socket and know that it will work.

Running Out of Ports?
Most computers that you buy today come with one or two USB sockets. With so many USB devices on the market today, you easily run out of sockets very quickly. For example, on the computer that I am typing on right now, I have a USB printer, a USB scanner, a USB Webcam and a USB network connection. My computer has only one USB connector on it, so the obvious question is, "How do you hook up all the devices?"

The easy solution to the problem is to buy an inexpensive USB hub. The USB standard supports up to 127 devices, and USB hubs are a part of the standard.



A typical USB four-port hub accepts 4 "A" connections.

A hub typically has four new ports, but may have many more. You plug the hub into your computer, and then plug your devices (or other hubs) into the hub. By chaining hubs together, you can build up dozens of available USB ports on a single computer.

Hubs can be powered or unpowered. As you will see on the next page, the USB standard allows for devices to draw their power from their USB connection. Obviously, a high-power device like a printer or scanner will have its own power supply, but low-power devices like mice and digital cameras get their power from the bus in order to simplify them. The power (up to 500 milliamps at 5 volts) comes from the computer. If you have lots of self-powered devices (like printers and scanners), then your hub does not need to be powered -- none of the devices connecting to the hub needs additional power, so the computer can handle it. If you have lots of unpowered devices like mice and cameras, you probably need a powered hub. The hub has its own transformer and it supplies power to the bus so that the devices do not overload the computer's supply.

USB Features
The Universal Serial Bus has the following features:

  • The computer acts as the host.

  • Up to 127 devices can connect to the host, either directly or by way of USB hubs.

  • Individual USB cables can run as long as 5 meters; with hubs, devices can be up to 30 meters (six cables' worth) away from the host.

  • With USB 2.,the bus has a maximum data rate of 480 megabits per second.

  • A USB cable has two wires for power (+5 volts and ground) and a twisted pair of wires to carry the data.

  • On the power wires, the computer can supply up to 500 milliamps of power at 5 volts.

  • Low-power devices (such as mice) can draw their power directly from the bus. High-power devices (such as printers) have their own power supplies and draw minimal power from the bus. Hubs can have their own power supplies to provide power to devices connected to the hub.

  • USB devices are hot-swappable, meaning you can plug them into the bus and unplug them any time.

  • Many USB devices can be put to sleep by the host computer when the computer enters a power-saving mode.
The devices connected to a USB port rely on the USB cable to carry power and data.


Inside a USB cable: There are two wires for power -- +5 volts (red) and ground (brown) -- and a twisted pair (yellow and blue) of wires to carry the data. The cable is also shielded.

The USB Process
When the host powers up, it queries all of the devices connected to the bus and assigns each one an address. This process is called enumeration -- devices are also enumerated when they connect to the bus. The host also finds out from each device what type of data transfer it wishes to perform:

  • Interrupt - A device like a mouse or a keyboard, which will be sending very little data, would choose the interrupt mode.

  • Bulk - A device like a printer, which receives data in one big packet, uses the bulk transfer mode. A block of data is sent to the printer (in 64-byte chunks) and verified to make sure it is correct.

  • Isochronous - A streaming device (such as speakers) uses the isochronous mode. Data streams between the device and the host in real-time, and there is no error correction.
The host can also send commands or query parameters with control packets.

As devices are enumerated, the host is keeping track of the total bandwidth that all of the isochronous and interrupt devices are requesting. They can consume up to 90 percent of the 480 Mbps of bandwidth that is available. After 90 percent is used up, the host denies access to any other isochronous or interrupt devices. Control packets and packets for bulk transfers use any bandwidth left over (at least 10 percent).

The Universal Serial Bus divides the available bandwidth into frames, and the host controls the frames. Frames contain 1,500 bytes, and a new frame starts every millisecond. During a frame, isochronous and interrupt devices get a slot so they are guaranteed the bandwidth they need. Bulk and control transfers use whatever space is left. The technical links at the end of the article contain lots of detail if you would like to learn more.

USB 2.0
The standard for USB version 2.0 was released in April 2000 and serves as an upgrade for USB 1.1.

USB 2.0 (High-speed USB) provides additional bandwidth for multimedia and storage applications and has a data transmission speed 40 times faster than USB 1.1. To allow a smooth transition for both consumers and manufacturers, USB 2.0 has full forward and backward compatibility with original USB devices and works with cables and connectors made for original USB, too.

Supporting three speed modes (1.5, 12 and 480 megabits per second), USB 2.0 supports low-bandwidth devices such as keyboards and mice, as well as high-bandwidth ones like high-resolution Webcams, scanners, printers and high-capacity storage systems. The deployment of USB 2.0 has allowed PC industry leaders to forge ahead with the development of next-generation PC peripherals to complement existing high-performance PCs. The transmission speed of USB 2.0 also facilitates the development of next-generation PCs and applications. In addition to improving functionality and encouraging innovation, USB 2.0 increases the productivity of user applications and allows the user to run multiple PC applications at once or several high-performance peripherals simultaneously.

************************************************************************************



1 Comments:

At 3:19 AM, Anonymous Anonymous said...

Создание сайта будь то сайт – визитка, корпоративный сайт, [url=https://webprospekt24.ru/prodvizhenie-sajtov-obninsk]продвижение услуг[/url], интернет магазин или мощный портал проходит в несколько этапов.
Статьи о продвижении сайтов. Каким должен быть современный сайт.

 

Post a Comment

<< Home