You are on page 1of 3

backhaul In a hierarchical telecommunications network the backhaul portion of the network comprises the intermediate links between the

core network, or backbone, of the network and the small subnetworks at the "edge" of the entire hierarchical network. For example, while cell phones communicating with a single cell tower constitute a local subnetwork, the connection between the cell tower and the rest of the world begins with a backhaul link to the core of the telephone company's network (via a point of presence).Spread-spectrum telecommunications
This is a technique in which a (telecommunication) signal is transmitted on a bandwidth considerably larger than the frequency content of the original information. Spread-spectrum telecommunications is a signal structuring technique that employs direct sequence, frequency hopping, or a hybrid of these, which can be used for multiple access and/or multiple functions. This technique decreases the potential interference to other receivers while achieving privacy. Spread spectrum generally makes use of a sequential noise-like signal structure to spread the normally narrowband information signal over a relatively wideband (radio) band of frequencies. The receiver correlates the received signals to retrieve the original information signal. Originally there were two motivations: either to resist enemy efforts to jam the communications (anti-jam, or AJ), or to hide the fact that communication was even taking place, sometimes called low probability of intercept (LPI). Frequency-hopping spread spectrum (FHSS), direct-sequence spread spectrum (DSSS), time-hopping spread spectrum (THSS), chirp spread spectrum (CSS), and combinations of these techniques are forms of spread spectrum. Each of these techniques employs A

firewall
Network security barrier. A firewall is a device that guards the entrance to a private network and keeps out unauthorized or unwanted traffic. When people talk about a corporate or enterprise firewall, they normally assume a series of devices guarding all points of entry, thus creating a secure environment "behind" or "inside" the firewall -- as distinct from the untamed and lawless

territory that lies "beyond" or "outside". The integrity of this protective barrier depends on the effective deployment, configuration and capabilities of individual firewall devices.

hub is typically the least expensive, least intelligent, and least complicated of the three. Its job is very simple: anything that comes in one port is sent out to the others. That's it. Every computer connected to the hub "sees" everything that every other computer on the hub sees. The hub itself is blissfully ignorant of the data being transmitted. For years, simple hubs have been quick and easy ways to connect computers in small networks. A switch does essentially what a hub does but more efficiently. By paying attention to the traffic that comes across it, it can "learn" where particular addresses are. For example, if it sees traffic from machine A coming in on port 2, it now knows that machine A is connected to that port and that traffic to machine A needs to only be sent to that port and not any of the others. The net result of using a switch over a hub is that most of the network traffic only goes where it needs to rather than to every port. On busy networks this can make the network significantly faster. "Varying degrees of magic happen inside the device, and therein lies the difference." A router is the smartest and most complicated of the bunch. Routers come in all shapes and sizes from the small four-port broadband routers that are very popular right now to the large industrial strength devices that drive the internet itself. A simple way to think of a router is as a computer that can be programmed to understand, possibly manipulate, and route the data its being asked to handle. For example, broadband routers include the ability to "hide" computers behind a type of firewall which involves slightly modifying the packets of network traffic as they traverse the device. All routers include some kind of user interface for configuring how the router will treat traffic. The really large routers include the equivalent of a full-blown programming language to describe how they should operate as well as the ability to communicate with other routers to describe or determine the best way to get network traffic from point A to point B. A quick note on one other thing that you'll often see mentioned with these devices and that's network speed. Most devices now are capable of both 10mps (10 mega-bits, or million bits, per second) as well as 100mbs and will automatically detect the speed. If the device is labeled with only one speed then it will only be able to communicate with devices that also support that speed. 1000mbs or "gigabit" devices are starting to slowly become more common as well. Similarly many devices now also include 802.11b or 802.11g wireless transmitters that simply act like additional ports to the device. pseudorandom number sequences created using pseudorandom number generators to determine and control the spreading pattern of the signal across the alloted bandwidth. Ultra-wideband (UWB) is another modulation technique that accomplishes the same purpose, based on transmitting short duration pulses. Wireless Ethernet standard IEEE 802.11 uses either FHSS or DSSS in its radio interface.

spectrum
Well, a 'spectrum' is, basically, a range. A prism breaks light into it's color spectrum meaning the RANGE of visible light: red, orange, yellow, green, blue, violet. So if you apply this meaning to the statement "The city's populations represent a wide spectrum of society", it would mean that the populations in a group of city's represent all the different types of people - rich, poor, middle class, workers, slackers, etc....

You might also like