tag:blogger.com,1999:blog-71684193401939681292023-11-16T10:16:57.342-08:00DATA COMMUNICATIONSMANY INFORMATIONS AND DEVELOPMENT OF TECHNOLOGY FOR THE FUTURE ON DATA COMMUNICATIONSATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.comBlogger40125tag:blogger.com,1999:blog-7168419340193968129.post-31158858164151647862010-07-01T04:55:00.000-07:002010-07-01T05:11:11.410-07:00Natural Protective Substances Good for the BodyUse of health products that use chemical substances may often be found or has you use. Side effects on health of using any products that use hazardous chemicals would be detrimental to the future health of our bodies. Many people who have been using anti aging but the expected outcome would not have materialized if the product is to use chemicals that are harmful to human body.<br /><br /><div style="text-align: center;"><a rel="nofollow" href="http://www.bloggerwave.com/Bloggerwave/c/403/19003/0"><img src="http://www.bloggerwave.com:8080/Bloggerwave/uploadImages/719412972_1274113599711_oxis_video.jpg" style="border-style: none;" alt="" /></a><br /></div><br />Clinically proven products like health products from Oxis International course will provide a guarantee will increase your health. Health products from Oxis laboratory has been investigated and proved able to restore the health of the users of health products with the protection of natural substances. One product of this Oxis is LSA, which is lipid-soluble antioxidant compounds with strength up to 40 more quickly to treat chronic inflammatory joint diseases.<br /><br />Use of natural protective substances of the product from Oxis as glutathione, and penny stocks & free radical has been proven effective for the treatment of many people expected. Using these products regularly natural health without side effects is hope for all users of health products, and it can be found in <a rel="nofollow" href="http://www.bloggerwave.com/Bloggerwave/c/403/19003/0">http://www.oxis.com</a>.<br /><br /><a href="http://www.bloggerwave.com/" target="_blank" rel="nofollow"><img style="border-style: none;" src="http://www.bloggerwave.com/Bloggerwave/v/403/19003" /></a>ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-23556587454062091362009-08-31T01:21:00.000-07:002009-08-31T01:48:40.833-07:00Trojan Lurking Skype Users<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4UKG9uhyphenhyphen3Q-huKrA9Kz5BgjV1Ey9pH7PWhofJiVnQrY6NffosCaM4clQKtXD9OXzucWKxTFzkRJFdjAF9WLPqa4fGpF-XIUK-B6uwv8KyGhqXE72PTikjlDKVOZNvNOj8ip77ncByTBKz/s1600-h/skype_logo_online.png"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 142px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4UKG9uhyphenhyphen3Q-huKrA9Kz5BgjV1Ey9pH7PWhofJiVnQrY6NffosCaM4clQKtXD9OXzucWKxTFzkRJFdjAF9WLPqa4fGpF-XIUK-B6uwv8KyGhqXE72PTikjlDKVOZNvNOj8ip77ncByTBKz/s320/skype_logo_online.png" alt="Skype" id="BLOGGER_PHOTO_ID_5376047016567643186" border="0" /></a>Skype users, beware. Security firm Symantec found a Trojan source code to the targeting Skype users. Trojan.Peskyspy is spyware that records voice calls and save them as MP3 files. An infected machine will use the software that handles audio processing in a computer and store the data call as an MP3 file. MP3 file and then sent via Internet to a server that has been determined in which the attacker can then listen to the conversations that have been recorded. Because the call is MP3, the file size was not large and low-load transfer.<br /><br />According to Symantec, the current risk of this trojan threat low. But because this code is freely available, Symantec said that the malware makers could use it as part of a surveillance package. This malware creators have to spend lots of time to listen to hours of audio files Skype to get something that catches their attention. Trojan lurking Skype users intercepted conversation.ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com1tag:blogger.com,1999:blog-7168419340193968129.post-43129555984118290592009-07-30T22:16:00.000-07:002009-08-31T01:12:09.947-07:00WPA Security Encryption can be PenetratedEncryption WPA (Wi-Fi Protected Access) should be tough right? However, Japanese scientists had only takes 60 seconds to penetrate the WPA encryption used in wireless router. Note this time brought down the previous record for 15 minutes. Toshihiro Ohigashi from Hiroshima University and Masakatu Morii of Kobe University will reveal how they do over at a conference in Hiroshima 25 September next. This inroad is not given full control of Wi-Fi connection, but allows the reading and spoofing packets. <br /><br />But the ease of penetrate WPA encryption TKIP (Temporal Key Integrity Protocol) to make that anyone who cares about security should start thinking to move to WPA2 with AES encryption (Advanced Encryption Standard) which is more secure. The attack was carried out on a PC and Wi-Fi Access Point that were located far enough away so that the two devices see each other indirectly. Computer attacks carried out between them by acting as a relay using the correct checksum to trick the network. The good news, until now WPA2 with AES encryption newer remain safe from attacks by hackers.ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-76175072104956526712009-06-30T08:19:00.000-07:002009-06-30T17:30:06.593-07:00High-Speed Data Access with the iPhone 3GS<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBLNMnu_GHuXx4sMpBbAXPDY0jMmOZdqjYB8bwaU_j0nSlVvSrMQ5kwTYx6_Q8nsk592CcLHVh_NcVrJfmYcMy7B74zb2Pjq8x6mop9GlJdvQfnMJFVYOKDZabzIdp1B5MAk9PTYEnhuaz/s1600-h/iphone3g-s.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 200px; height: 234px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBLNMnu_GHuXx4sMpBbAXPDY0jMmOZdqjYB8bwaU_j0nSlVvSrMQ5kwTYx6_Q8nsk592CcLHVh_NcVrJfmYcMy7B74zb2Pjq8x6mop9GlJdvQfnMJFVYOKDZabzIdp1B5MAk9PTYEnhuaz/s320/iphone3g-s.jpg" border="0" alt="Apple iPhone 3GS" id="BLOGGER_PHOTO_ID_5353150956155540050" /></a>iPhone 3GS is a technology development from the previous iphone. 3GS iPhone has a faster performance with the additional new features, iPhone 3GS advantages provided to meet the needs of iphone lover of this Apple product. Smartphone apple that has been updated and is ready to be marketed to the world and many people who have been waiting to have this iphone 3GS.<br /><br />Fans of Apple products for iphone 3GS is enthusiastic about the benefits of that, as in New York about a hundred people who live under the umbrella they wait open shop hours early to get iphone 3GS. The advantage of the iPhone 3GS has a speed that is higher than the previous generation, and 2 times faster than 3G version. High-speed data access through iPhone 3GS satisfying the apple mobile phone users in the exchange of information of various mobile phone networks and internet.ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com3tag:blogger.com,1999:blog-7168419340193968129.post-59806818788678608952009-05-11T23:20:00.000-07:002009-05-11T23:37:17.655-07:00Millimeter Wave Frequencies For Broad BandwidthsMillimeter wave frequencies offer a new frontier for communication. Realizing the overcrowding taking place at RF and microwave frequencies, the United States Federal Commision (FCC) and other regulatory agencies have looked to higher frequencies asn a way to add bandwidth and services. All that is missing is low-cost millimeter wave components to assemble affortable communications infrastructure and user devices to take advantage of the wide open bandwidth. Millimeter wave aim improve broad bandwidths, millimeter wave frequencies are so named for wavelengths of the signal, ranging from about 10 to 1 mm and covering frequencies from about 30 to 300 GHz.<br /><br />The have traditionally seen use on military radar and missile seeker and guidance system. In 2003 the United States Federal Commission (FCC), seeking to open millimeter wave frequencies to commercial communications use, adopted a report and order establishing service rules or non-Federal development of certain portions of the millimeter wave spectrum, notably 71 to 70 GHz, 81 to 86 GHz, 91 to 94 GHz, and 94.1 to 95.0 GHz. Frequencies bands were made available in 1.25 GHz blocks on a non-exclusive basis.<br /><br />Coordination of the spectrum use would be performed by the National Telecommunications and Information Administration (NTIA). The wireless Communication Association International (WCA) filed a petition for the FCC to reconsider certain aspects of the report and order but only for the 70 and 80 GHz bands. Among these considerations, all new 70 and 80 GHz users would have to verify in advance that their systems would not cause harmful interference to any existing link.ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-69970023546345414572009-04-07T05:59:00.000-07:002009-05-12T02:13:35.745-07:00New LSI Chip for Multiple Input Multiple Output (MIMO)NTT DOCOMO has successfully developed a trial Large Scale Integration (LSI) chip that consumes less than 0.04 W of power yet supports <a href="http://adrianrakadima.blogspot.com/2009/05/increase-data-capacity-using-mimo.html">Multiple-Input Multiple-Output</a> (MIMO) signal detection and decoding for downlink transmissions at 100 Mbps, the speed required for forthcoming mobile system known as<a href="http://rakadima.blogspot.com/2008/04/st-dan-nokia-bekerjasama-untuk_26.html"></a><a href="http://rakadima.blogspot.com/2008/04/ntt-docomo-mulai-percobaan-super-3g_26.html"> </a>super 3G<a href="http://rakadima.blogspot.com/2008/04/st-dan-nokia-bekerjasama-untuk_26.html"> </a>or<a href="http://rakadima.blogspot.com/2008/12/long-term-evolution-lte.html"> LTE</a>, approved by <a href="http://adrianrakadima.blogspot.com/2009/04/testing-mimo-from-realease-7-of-3gpp.html">3rd Generation Partnership Project</a> (3GPP). Compared with chips currently used in handsets compatible with the company's High Speed Downlink Packet Access (HSDPA) service. Which have a maximum downlink rate of 75 Mbps, the new chip will enable downlinks that are more than ten times as fast.<br /><br />The new chip <a href="http://rakadima.blogspot.com/2008/10/ofdm-and-ofdma.html">demodulates OFDM</a> signals transmitted in the 20 Mhz bandwidth from two antennas and detect <a href="http://adrianrakadima.blogspot.com/2009/05/increase-data-capacity-using-mimo.html">MIMO</a> signals based on Maximum Likelihood Detection (MLD) technology, which ensure relatively higj quality communication even in bad environments for signal reception. The chip also include error correction decoding, which requires almost the same level of complexity as <a href="http://adrianrakadima.blogspot.com/2009/05/increase-data-capacity-using-mimo.html">MIMO</a> signal detection. In then new chip, which is made with 65 nanometer processing, the circuit have been further optimized, particularly by eliminating redundant circuits for computationally complex processes such as <a href="http://adrianrakadima.blogspot.com/2009/05/increase-data-capacity-using-mimo.html">MIMO</a>-signal detection and error correction detection.ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-72135076906875410352009-03-02T06:22:00.000-08:002009-03-02T06:34:40.240-08:00Be Careful There is Malicious ToolsMalicious tools enable attackers to gain access to a variety of valuable resources such as identities, credentials, hacked hosts, and other goods and services. Some malicious tools and services are designed to counter security measures such as antivirus software to increase the lifespan of a malicious code sample in the wild. The result is a cycle whereby malicious tools must be continuously developed and used to produce other goods and services. The profits from these goods and services may then be reinvested into the development of new malicious tools and services.<br /><br />Tools range from kits that automatically scan and exploit vulnerabilities to botnets. These tools may be used to provide services such as denial-ofservice (DoS) attacks, spamming and phishing campaigns, and finding exploitable websites and servers. They can also be used to generate a number of goods, such as compromised hosts, credentials, personal information, credit card data, and email addresses.<br /><br />Exploits are another effective malicious tool. Exploits constitute vulnerability information and exploit code. They differ from the other categories of attack tools in that they are not automated by nature. When exploits are incorporated into automated tools, they can then be classified as attack tools. The exploits available in the underground economy are typically tailored to specific market demands. Profitable activities in the underground economy (such as identity theft, credit card fraud, spam, and phishing) require a constant supply of resources (such as compromised personal information, credit card numbers, and hosts).<br /><br />Many of these goods and services are produced by attackers who exploit vulnerabilities in Web applications and servers. The market for exploit code and vulnerability information is geared toward attackers and malicious code developers who wish to incorporate fresh exploits into attack toolkits and, therefore,represent a distinct category of their own.ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-7398470898184828082009-02-20T17:37:00.000-08:002009-05-12T03:25:54.636-07:00Service-Driven Networks for Next Generation Technology<a style="" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdsPgrVxV8zr8laEMMZU5EdgeBRauH5LfIGvhyphenhyphenxxL6ei9THlyPh78Du4LtF6q0k3himkoXWy1kMEzV1TA0xWjspKhjXcuNqUGPIpQq_NTsJGfbgLPU1nIZ3aNL-yEO0pyFJh9DpnwZrrJ8/s1600-h/atat.gif"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 217px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdsPgrVxV8zr8laEMMZU5EdgeBRauH5LfIGvhyphenhyphenxxL6ei9THlyPh78Du4LtF6q0k3himkoXWy1kMEzV1TA0xWjspKhjXcuNqUGPIpQq_NTsJGfbgLPU1nIZ3aNL-yEO0pyFJh9DpnwZrrJ8/s320/atat.gif" alt="AT&T Synaptic Hosting Conceptual Network " id="BLOGGER_PHOTO_ID_5305060274042700674" border="0" /></a>AT&T's Synaptic Hosting is the operator's next-generation utility-computing service with managed networking, security, and storage for business. The new service combines technology acquired from applications service provider USinternetworking with five "super IDCs," or internet data centers (IDCs), across the U.S., Europe, and Asia. Customers receive managed servers, LAN, security, storage, designated account support, and enterprise-class service level agreements.<br /><br />One the of first announced customers for the AT&T Synaptic Hosting Service is the U.S. Olympic Committee (USOC), which has powered the teamusa.org Website with AT&T Synaptic Hosting. Given the buildup of Website activity leading up to and during the Beijing Olympic games and the subsequent fall-off in activity in the months following the games' conclusion, the flexibility enabled by the utility computing model was ideal for the USOC.<br /><br /><a href="http://adrianrakadima.blogspot.com/2008/12/global-networks.html">Network</a> operators around the world face tremendous challenges and opportunities as they transform themselves from traditional telcos of the 20th century to the next-generation communications providers of the 21st century. As network services and network traffic migrate from TDM, voice-to-packets, and <a href="http://rakadima.blogspot.com/2008/06/synchronization-of-gsm-base-stations.html">IP</a>, network operators have no choice but to transform themselves or decline and, ultimately, fail in this new and highly competitive environment. As network operators, the network must play a primary role in this telecom industry transition. Clearly, this explains the unveiling of various network operator <a href="http://adrianrakadima.blogspot.com/">NGN</a> initiatives around the world over the past couple of years. At the network level, key requirements for operators to realize this<br /><br />vision of the future include:<br />• End-to-end connection and resource management<br />• Ubiquitous connectivity between networks<br />• IP-aware transport<br />• Increased service awareness in access and metro<br />• Service-aware data, control, and management planes<br />• High availability<br />• Network flexibility<br />• On-demand connection abilities<br /><br />Despite much talk about <a href="http://adrianrakadima.blogspot.com/">NGNs</a>, the industry is still in the early stages of this transformation. We will see a great deal of change over the next decade and beyond. The winning network operators will be those able to successfully embrace today's data/<a href="http://rakadima.blogspot.com/2008/06/synchronization-of-gsm-base-stations.html">IP growth applications</a>, adapt quickly to deliver the as-yet unknown applications that will drive revenue growth in the future, and build the bridge between legacy TDM and packets, as long as TDM continues to exist in the network.ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-46841456067548302102009-01-20T12:44:00.000-08:002009-05-12T04:03:20.786-07:00Samsung Ultra Slim Mobile Phone Music M3510<a style="" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-I0iv_l44iEz1O_xtsd2DcHd-ieb2m5DsliUJRVgHHJuXxZf-BtSE90vHKDIrf3NmKH8KsvNQw9hWPxACdrLHbAQ8zBHiAzzu3irsPPc6D3L3Lh8EwbLJJUkxlkKvmH2u-S9rX4RFZJVS/s1600-h/ID_GT-M3510_featuretop.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 253px; height: 219px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-I0iv_l44iEz1O_xtsd2DcHd-ieb2m5DsliUJRVgHHJuXxZf-BtSE90vHKDIrf3NmKH8KsvNQw9hWPxACdrLHbAQ8zBHiAzzu3irsPPc6D3L3Lh8EwbLJJUkxlkKvmH2u-S9rX4RFZJVS/s320/ID_GT-M3510_featuretop.jpg" alt="Samsung M3510" id="BLOGGER_PHOTO_ID_5293481901610263394" border="0" /></a>M3510-style trim from Samsung with the attention is a Samsung music phone with the first type of bar. At the maximum by premium music features including DNSe. Keyboard shortcuts for the music and sensor control, the phone also features an innovative movement detectors, allowing you swing, touch and play the flip phone to control your music.<br /><br />DNSe ensure more accurate and natural sound again. Calibration voice to imitate the sound of 3-D real that it will automatically adjust the flow of music. Quick access to the camera whenever you need it. The phone has been integrated with 2 megapixel camera with photographs of good quality and can be saved to microSD card.<br /><br />Control your tone easily with the music control buttons on the front of phone. Touch screen with the play or pause your music. Turn upside down the phone to make silent / mute of all votes. Shake the phone to activate the random mode / shuffle, or your music to control the music.ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-91741256723838804672008-12-17T05:54:00.000-08:002009-05-12T04:15:49.807-07:00Long Term Evolution-LTE<div style="text-align: left;"><a href="http://adrianrakadima.blogspot.com/2009/04/testing-mimo-from-realease-7-of-3gpp.html">Long Term Evolution (LTE)</a> is thee project name of new air interface for wireless access being developed by the<a href="http://adrianrakadima.blogspot.com/2009/04/testing-mimo-from-realease-7-of-3gpp.html"> Third Generation Partnership Project (3GPP)</a>.The 3GPP generation system toward an all IP networks optimized for high speed data transmission.<br /><br />these techniques are often loosely referred to as "<a href="http://adrianrakadima.blogspot.com/2009/05/increase-data-capacity-using-mimo.html">MIMO</a>" a term for multiple input multiple output antenna configuration and cosidered essensial for improving bustness and achieving goals for system capacity and single-user and headline peak data rates.<br /><br /><a href="http://adrianrakadima.blogspot.com/2009/04/testing-mimo-from-realease-7-of-3gpp.html">Long Term Evolution (LTE)</a> is linked closely with the concurent System Architecture Evolution (SAE) project to define a simplified system architecture and Evolved Packet Core (EPC). These project provide a framework for increasing capacity, improving spectrum efficiency, improving cell-edge performance and reducing latency for real-time services such as video.<br /><br />The aim to offer a 100 Mbps download and 50 Mbps upload rate for every 20 Mhz of spectrum. Support is intended for even higher rates,to 326.4 Mbps in the downlink using multiple antenna configurations. Rather than further developing current High Speed Packet Access (HSPA) and modulation schemes based on the Wideband Code Domain Multiple Access (W-CDMA) used in third generation UMTS cellular systems today.<br /><br /><a href="http://adrianrakadima.blogspot.com/2009/04/testing-mimo-from-realease-7-of-3gpp.html">Long Term Evolution (LTE)</a> downlink and uplink transmission are based on new air interface specifically <a href="http://rakadima.blogspot.com/2008/10/ofdm-and-ofdma.html">Orthogonal Frequency Division Multiplexing (OFDM)</a> in the downlink and Single <a href="http://rakadima.blogspot.com/2008/10/ofdm-and-ofdma.html">Carrier-Frequency Division Multiple Access</a> (SC-FDMA) in the uplink.<br /><br />The LTE specifications inherit all frequency bands defined for UMTS, which is a list that continues to grow. There are now 11 <a href="http://adrianrakadima.blogspot.com/2009/03/wimax-rf-transport-layer-in-frequency.html">FDD</a> bands covering frequencies from 824 to 2690 Mhz and 8 TDD bands covering 1900to 2620 Mhz.</div>ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-89176605656276999732008-11-25T09:04:00.000-08:002009-05-12T03:59:58.846-07:00RN-Radio NetworkConsists of two components, namely Packet Control Function (PCF) and RadioResources Control (PRC). PCF main function is to establish, maintain and dissolve the relationship with the PDSN. PCF communicate with the PRC to request and set the radio channel for delivering packages to and from MS. PCF also responsible for collecting accounting and forward the information to the PDSN.<br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj71F5YNJhqIrIgUGgK_49TUrT4-SymbBj9YsvDLIir0mZxm59olncjg2kS-jKMwgOtX4ZRhq0cXlu9XExXb-niaIgOOZHnUwa34XkNuLAC2I9mEjjSSwZaYX-CMAVHMjZZoQ3Pm3UmoqMx/s1600-h/CDMA_WLL.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 222px; height: 152px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj71F5YNJhqIrIgUGgK_49TUrT4-SymbBj9YsvDLIir0mZxm59olncjg2kS-jKMwgOtX4ZRhq0cXlu9XExXb-niaIgOOZHnUwa34XkNuLAC2I9mEjjSSwZaYX-CMAVHMjZZoQ3Pm3UmoqMx/s320/CDMA_WLL.gif" alt="Radio Network" id="BLOGGER_PHOTO_ID_5272647413790158610" border="0" /></a><br />PRC supports authentication and authorization MS to get access to the radio. PRC also supports encryption for air interface MS-MSC (<a href="http://adrianrakadima.blogspot.com/2008/11/msc-mobile-switching-center.html">Mobile Switching Center</a>) often called the interface between the BSC with the PSTN and data network (ISDN) through the gateway MSC (G-MSC).<br /><br /><span style="font-weight: bold;">Packet Data Serving Node (PDSN)</span><br />PDSN perform various functions. Its main function to make routing to IP packet networks, or HA. PDSN provide a dynamic IP address and keep the session Point-to-Point Protocol (PPP) to MS. PDSN start authentication, authorization and AAA to the accounting package for the session data. As the replies received PDSN parameters, profile customers that include the type of service and security.<br /><br /><span style="font-weight: bold;">Home Agent(HA)</span><br />HA role in the implementation of the Mobile IP protocol to continue with the package to the PDSN and vice versa. HA provides security by doing MS authentication through Mobile IP registration. HA also maintain relationships with AAA to receive information about customers.<br /><br /><span style="font-weight: bold;">Authentication, Authorization and Accounting (AAA)</span><br />AAA has a role that varies depending on the type of network where AAA connected. If the AAA server is connected to the service provider's network, the function is the main route authentication requests from the PDSN to the Home IP network, and authorize the response from the home IP network to PDSN. AAA also save accounting information from MS and provide the customer profile information and QoS for PDSN.<br /><br />If the AAA server is connected to the home IP network, AAA do authentication and authorization for MS based on a request from the local AAA. If AAA connected to the broker network, he continues between the request and response service provider's home network and the IP network that does not have bilateral relations.<br /><br /><span style="font-weight: bold;">MSC (Mobile Switching Center)</span><br />Often called the interface between the BSC with the public voice (PSTN) and data network (ISDN) through the gateway MSC (G-MSC).<br /><br /><span style="font-weight: bold;">HLR (Home Local Register) </span><br />Work to save all the customer data such as IMSI, location data users, the Shared Secret Data (SSD) for all users, and other specific information for each autentifikasi users Center (AuC) for the storage Major Electronic Serial Number(ESN) for each user registered user.<br /><br /><span style="font-weight: bold;">Router </span><br />Work for packet data to and from the various elements <a href="http://adrianrakadima.blogspot.com/2008/11/advantages-of-cdma-2000-1x.html">CDMA2000 network</a>. Router is responsible to send and receive package internal network or vice versa. To ensure security when related to the application data networks outside, then the required fire wall.ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-38561862580870625032008-10-10T10:47:00.000-07:002009-05-12T09:21:29.915-07:00OFDM and OFDMA<span style="font-size:85%;"><span style="font-family:verdana;">OFDM has been around since the mid 1960s and is now used in a number of non-<a href="http://adrianindo.blogspot.com/">cellular</a> wireless systems such as Digital Video Broadcast (DVB), Digital Audio Broadcast (DAB), Asymmetric Digital Subscriber Line (ADSL) and some of the 802.11 family of Wi-Fi standards. OFDM’s adoption into mobile wireless has been delayed for two main reasons. The first is the sheer processing power which is required to perform the necessary FFT operations. However, the continuing advance of signal processing technology means that this is no longer a reason to avoid OFDM, and it now forms the basis of the LTE downlink. The other reason OFDM has been avoided in mobile systems is the very high peak to average ratio (PAR) signals it creates due to the parallel transmission of many hundreds of closely-spaced subcarriers. For mobile devices this high PAR is problematic for both power amplifier design and battery consumption, and it is this concern which led 3GPP to develop the new SC-FDMA transmission scheme. Multiple access in the LTE downlink is achieved by using an elaboration of pure OFDM called orthogonal frequency division multiple access (OFDMA). This method allows subcarriers to be allocated to different users. This facilitates the trunking of many lower-rate users as well as enabling the use of frequency hopping to mitigate the effects of narrowband fading.</span><br /><br /></span><span style="font-weight: bold;font-family:verdana;font-size:85%;" >SC-FDMA</span><span style="font-size:85%;"><br /><span style="font-family:verdana;">SC-FDMA is a hybrid transmission scheme which combines the low PAR characteristics of single-carrier transmission systems - such as those used for GSM and CDMA - with the long symbol time and flexible frequency allocation of OFDM. The principles behind SC The FDMA signal generation are shown in Figure 1.</span><br /><br /></span><div style="text-align: center;font-family:verdana;"><span style="font-size:85%;"><img src="file:///D:/DOCUME%7E1/DIAADR%7E1/LOCALS%7E1/Temp/moz-screenshot.jpg" alt="" /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCCoPf5Gq26f-CTCP3Psd0IICChxosK9kgbQlKTC873WFNWEhxETRV89Icm5uEWQ-g8IOb_JYdAVa_F0mVWbJa68Rb4EbShqsekPueqFmDV0_Lncibdw6EAhb4iqrF4TOuzwNA1E90Jcg9/s1600-h/scfdma.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCCoPf5Gq26f-CTCP3Psd0IICChxosK9kgbQlKTC873WFNWEhxETRV89Icm5uEWQ-g8IOb_JYdAVa_F0mVWbJa68Rb4EbShqsekPueqFmDV0_Lncibdw6EAhb4iqrF4TOuzwNA1E90Jcg9/s320/scfdma.gif" alt="SC-FDMA signal generation " id="BLOGGER_PHOTO_ID_5255587355447743906" border="0" /></a></span><span style="font-size:85%;">Figure 1. SC-FDMA signal generation<br /><br /></span></div><div style="text-align: center;font-family:verdana;"><div style="text-align: left;"><span style="font-size:85%;">This is taken from Figure 1 of the study phase report for the LTE physical layer 3GPP TR 25.814. On the left hand side of Figure 1 the data symbols are depicted in the time domain. The symbols are converted to the frequency domain using an FFT, and then in the frequency domain they are mapped to the desired location in the overall carrier bandwidth. They must then be converted back to the time domain in order to have the cyclic prefix inserted prior to transmission. An alternative name for SC-FDMA is Discrete Fourier Transform Spread OFDM (DFT-SOFDM). An alternative description is provided in Figure 2 which shows, in frequency and time, how OFDMA and SC-FDMA would each transmit a sequence of 8 QPSK data symbols.<br /></span></div><span style="font-size:85%;"><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5NmCEN1ng1iEsW4kGzmKbzjNaY9H6r47Nwn9k-m3RCeZZxE2YKfsJCdNA-v-SdkUZQlTXyETvJN2tNddhv6-J3SgALCes6HMtvVu7JE9Q-Jt2tiNvluWw26-9dUoM05ARw8MceaAn4Fk9/s1600-h/compa.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5NmCEN1ng1iEsW4kGzmKbzjNaY9H6r47Nwn9k-m3RCeZZxE2YKfsJCdNA-v-SdkUZQlTXyETvJN2tNddhv6-J3SgALCes6HMtvVu7JE9Q-Jt2tiNvluWw26-9dUoM05ARw8MceaAn4Fk9/s320/compa.gif" alt="Comparison of OFDMA and SC-FDMA transmitting a series of QPSK data symbols" id="BLOGGER_PHOTO_ID_5255589002593807778" border="0" /></a></span><span style="font-size:85%;">Figure 2. Comparison of OFDMA and SC-FDMA transmitting a series of QPSK data symbols<br /><br /></span></div><span style="font-size:85%;"><span style="font-family:verdana;">For this simplified example, the number of subcarriers (M) is set to four. For OFDMA, four (M) symbols are taken in parallel, each of them modulating its own subcarrier at the appropriate QPSK phase. Each data symbol occupies 15 kHz for the period of one OFDMA symbol which lasts for 66.7μs. At the start of the next OFDMA symbol, the guard interval containing the cyclic prefix (CP) is inserted. The CP is a copy of the end of a symbol prepended to the start of the symbol. Due to the parallel transmission, the data symbols are the same length as the OFDMA symbols. In the SC-FDMA case, the data symbols are transmitted </span><span style="font-family:verdana;">Figure 1 SC-FDMA signal generation Figure 2 Comparison of OFDMA and SC-FDMA transmitting a series of QPSK data symbols Figure 3 Creating the time-domain waveform of an </span><span style="font-family:verdana;">SC-FDMA symbol sequentially. Since this example involves four subcarriers, four data symbols are transmitted sequentially in one SC-FDMA symbol period. The SC-FDMA symbol period is the same length as the OFDMA symbol at 66.7μs but due to sequential transmission, the data symbols are shorter being 66.7/M μs. A consequence of the higher data rate symbols means more bandwidth is required, so each data symbol occupies 60 kHz of spectrum rather than the 15 kHz for the slower data symbols used for OFDMA. After the four data symbols have been transmitted, the CP is inserted.</span></span><span style="font-size:85%;"><span style="font-family:verdana;"> A time domain representation of the data symbol sequence is first generated. </span></span><span style="font-size:85%;"><span style="font-family:verdana;"> Following this graphical comparison of OFDMA and SC-FDMA, </span><span style="font-family:verdana;">the detail of the SC-FDMA signal generation process is shown in Figures 3. </span><br /><br /></span><div style="text-align: center;font-family:verdana;"><span style="font-size:85%;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfzcsnCd_sz-r4orGfv4GAkVZ54hw5sLJV2PfHOy59zA5VR820E63WpRNNAb8KmoHROjuss9-QnXvvLJhoyVA5avE7cPPXdJeYNqsJxLqf0vRvcgSK6ghTTpDf0dE3rSIupZLMOloTyn2Q/s1600-h/simbol.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfzcsnCd_sz-r4orGfv4GAkVZ54hw5sLJV2PfHOy59zA5VR820E63WpRNNAb8KmoHROjuss9-QnXvvLJhoyVA5avE7cPPXdJeYNqsJxLqf0vRvcgSK6ghTTpDf0dE3rSIupZLMOloTyn2Q/s320/simbol.gif" alt="Creating the time-domain waveform of an SC-FDMA symbol" id="BLOGGER_PHOTO_ID_5255590688372406946" border="0" /></a></span><span style="font-size:85%;">Figure 3. Creating the time-domain waveform of an SC-FDMA symbol.</span><span style="font-size:85%;"><span style="font-family:verdana;"></span></span><br /></div>ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-71562159824120371582008-06-14T23:32:00.001-07:002009-05-12T06:40:10.763-07:00Synchronization of GSM Base Stations<span style="font-weight: bold;">Timing isolation through IP</span><br /><br />When base stations carried just voice traffic, a single T1/E1 connection typically provided enough bandwidth for the backhaul connection The rollout of third-generation (3G) data services,however, has increased the bandwidth needs for the backhaul connection significantly and moving to T3/E3 connections is simply too expensive. Transport networks are rapidly evolving to IP-rich topologies This offers mobile operators the increased backhaul capacity they require for deployment of high-bandwidth data services and the cost advantage of IP transport. However, the move to Ethernet backhaul will eliminate the option for base station clock recovery from the backhaul facility. Operators will need to move to an independent source of synchronization at the base station to meet the UMTS 50 ppb requirement as shown in figure 1.<br /><br /><div style="text-align: center;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs06VoiJmc4v-g9m7HDhoL7du3ET08v0Ss0rn3mZ_VaRvHnCelsd8gLqJ2jtX5G4o4BFZGGRN9Cszfhfyph24aN53-Jgsy5mSP4P1sltIWevLk5Nhe-rF0IxsQ5GDu20fytaPlq4Zv7wAG/s1600-h/fig1.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs06VoiJmc4v-g9m7HDhoL7du3ET08v0Ss0rn3mZ_VaRvHnCelsd8gLqJ2jtX5G4o4BFZGGRN9Cszfhfyph24aN53-Jgsy5mSP4P1sltIWevLk5Nhe-rF0IxsQ5GDu20fytaPlq4Zv7wAG/s400/fig1.gif" alt="The transition to high-capacity IP backhaul drives" id="BLOGGER_PHOTO_ID_5211992697175989938" border="0" /></a><span style="font-size:85%;">Figure 1. The transition to high-capacity IP backhaul drives the need for stand-alone</span><br /><span style="font-size:85%;">embedded clocks in UMTS Node B base stations.</span><br /></div><br />In addition to traditional span line clock recovery where the base station recovers an accurate clock from the T1/E1 backhaul feed, UMTS Node B infrastructure suppliers are introducing high-quality embedded clock options to be ready for IP backhaul. Many of these options mirror <a href="http://adrianrakadima.blogspot.com/2008/11/cdma-2000-1x-ev-do.html">code-division multiple access (CDMA) 2000</a> designs where GPS clocks are embedded into the base stations to provide a time-of-day reference needed for call hand-offs. <a href="http://adrianrakadima.blogspot.com/2008/11/advantages-of-cdma-2000-1x.html">CDMA networks</a> have always relied on embedded GPS-based clocks with precision rubidium or quartz oscillators, making them inherently prepared for the evolution to IP backhaul from a sync quality point of view.<br /><br />Using rubidium-based oscillators is the most robust solution for independent synchronization of UMTS base stations, as rubidium oscillators are proven to meet the 50 ppb requirement over the full service life of the equipment. Quartz oscillators, on the other hand, are subject to higher native aging rates and warm-up/restabilization characteristics that make it difficult to assure compliance to the 50 ppb requirement for more than a few years.<br /><br />This exposes network operators to QoS degradation and potentially high maintenance costs associated with manually calibrating quartz oscillators to bring them back on frequency after only a few years in the field. The danger to the operator is that this type of failure is undetectable until QoS issues reach a critical threshold.<br /><br /><br /><div style="text-align: center;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1sOdcYrrRfVOKPKxD3HPk56_xRfZ1bGDkDg5_n6NOdSYV5vvA4Y9Xz6Vjsficzu-CBnkEccsOy-3OjCORBt8ZrLAIKdMez-hkMPsmG_QaXitMYy9iFxUyyNEF_NfHl9hO-P6ChXIaCgBp/s1600-h/fig2.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1sOdcYrrRfVOKPKxD3HPk56_xRfZ1bGDkDg5_n6NOdSYV5vvA4Y9Xz6Vjsficzu-CBnkEccsOy-3OjCORBt8ZrLAIKdMez-hkMPsmG_QaXitMYy9iFxUyyNEF_NfHl9hO-P6ChXIaCgBp/s400/fig2.gif" alt="Satellite backhaul providers rely on GPS-based " id="BLOGGER_PHOTO_ID_5211992705188081810" border="0" /></a><span style="font-size:85%;">Figure 2. Satellite backhaul providers rely on GPS-based retimers to insert quality<br />synchronization onto the T1/E1 feed to the base station.<br /></span></div><br /><span style="font-weight: bold;">GPS-based timing</span><br />A problem occurs for legacy <a href="http://adrianrakadima.blogspot.com/2008/11/each-bts-coverage-to-specific-area.html">GSM base stations</a> that have relied on recovering synchronization from traditional T1/E1 backhaul lines provided by the incumbent local exchange carrier/public telephone andtelegraph (ILEC/PTTs) to maintain their 50 ppb frequency accuracy requirement. Changing the backhaul to circuit emulation services (CES), such as the satellite transport as shown in Figure 2, requires that a local source of synchronization be placed at the base station to deliver an accurate clock reference since the satellite network cannot support the 50 ppb requirement on its own. There are two ways to achieve this: 1) install an external GPS clock to externally time the base station equipment, or 2) use a GPS-based retimer as shown in Figure 2.<br /><br /><div style="text-align: center;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRAdCW7d8V29BxSOWV8GvzoJGwdVjeXToD4kYa852O9gc1tykk-KObXyGJSqwkqAAmN_M1wT_WBpDJbWQOqMy4SkwYUPyMV_32Qk0mK3zIjpTeG9K67nwYbnvHR8U70Sgf0KOX7qrjNpAX/s1600-h/fig3.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRAdCW7d8V29BxSOWV8GvzoJGwdVjeXToD4kYa852O9gc1tykk-KObXyGJSqwkqAAmN_M1wT_WBpDJbWQOqMy4SkwYUPyMV_32Qk0mK3zIjpTeG9K67nwYbnvHR8U70Sgf0KOX7qrjNpAX/s400/fig3.gif" alt="Circuit emulation and IP encapsulation " id="BLOGGER_PHOTO_ID_5211992709793943026" border="0" /></a><span style="font-size:85%;">Figure 3. Circuit emulation and IP encapsulation introduce instability to network<br />timing signals.<br /></span></div><br />A GPS-based retimer buffers incoming traffic and clocks it back out with PRS level accuracy (Figure 3). A retimer can be transparently introduced to an existing base station as the retimer is placed on the backhaul feed directly before the base station. The timing signal the base station receives is reclocked to be precise and stable, enabling accurate synchronization between base stations. Note that the retimer itself requires access to a PRS-based clock. Typically, this is achieved using an integrated GPS receiver.<br /><br />Such a retimer should implement a cut-through mechanism to preserve communications when the GPS signal is not available, eliminating the retimer as a point of failure. When cut-through is enabled, the base station will revert to the original backhaul timing scheme and its original dropped call rate without the retimer. In this way, retimers can only improve<br /><br />quality, never reduce it. Retimers can result in a dramatic reduction in dropped calls. A five-cell field trial conducted in September 2004 with a major GSM operator resulted in a 25.5% reduction in dropped calls when the backhaul synchronization signal was retimed. The five base stations involved in this test were experiencing relatively high dropped<br /><br />call rates, and synchronization impairments on the backhaul lines were suspected as the root cause Note that these measurements include call hand-offs with base stations not using retimer synchronization feeds. While there was still significant improvement in these cases, the most substantial improvement was realized when both base stations involved in the call hand-off were retimed.<br /><br />THE AUTHOR By Barry Dropping holds a BS in Electrical Engineering Technology from the DeVry Institute.ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-71184717506397166802008-05-02T04:04:00.001-07:002009-03-02T07:11:11.193-08:00Teknologi WiMAX untuk LOS dan NLOSBanyak teknologi yang tersedia untuk wireless broadband tetapi hanya bisa memberikan cakupan jalur tanpa penghalang/line of sight (LOS). Teknologi <a href="http://adrianrakadima.blogspot.com/">WiMAX</a> telah dioptimasi untuk memberikan cakupan jalur transmisi non line of sight (NLOS). Pengembangan teknologi <a href="http://adrianrakadima.blogspot.com/">WiMAX</a> ini memberikan cakupan jalur LOS dan NLOS untuk jarak yang sangat jauh sampai 50 kilometer dengan kondisi LOS dan radius cell sampai 5 miles/8km dengan kondisi NLOS.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpJiiN0X3px4YZeLqrsbAiFts1CQIl6RCsSixx69zjAYy5adULA245GNVMrAiVIkAKgyp3lLmdm11WcMEPFCrdmlJIfgUdF_FISqHapnlF1QIYmZPfT10uX_JEgeOIaHQI3c3N5vr70LvW/s1600-h/fresnelzone.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpJiiN0X3px4YZeLqrsbAiFts1CQIl6RCsSixx69zjAYy5adULA245GNVMrAiVIkAKgyp3lLmdm11WcMEPFCrdmlJIfgUdF_FISqHapnlF1QIYmZPfT10uX_JEgeOIaHQI3c3N5vr70LvW/s400/fresnelzone.jpg" alt="fresnelzone" id="BLOGGER_PHOTO_ID_5195734941267240370" border="0" /></a><p></p><div style="text-align: center;"> Gambar 1. Fresnel Zone<br /><br /></div><b>Propagasi LOS vs NLOS<br /><br /></b>Channel radio dari sistem komunikasi wireless terdapat dua jenis perambatan yaitu LOS dan NLOS. Dalam saluran LOS, signal yang dikirimkan oleh transmitter melalui antena merambat lurus/horizontal ke arah antena penerima/receiver tanpa ada halangan. Saluran LOS pada daerah Fresnel pertama (first Fresnel zone) merupakan daerah bebas halangan dapat dilihat pada Gambar 1.<br /><br />Daerah bebas halangan fresnel tergantung pada frekuensi operasi yang digunakan, lokasi jarak antara pengirim dan penerima. saluran NLOS, sebelum sinyal diterima oleh antena penerima terlebih dahulu mengalami pemantulan, pembiasan dan hamburan oleh penghalang, akibatnya signal mempunyai perbedaan waktu tunda, terjadi atenuasi, polarisasi, dan relatif stabil untuk perambatan langsung.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGm_cULrAmkZkqeCBKawaOPPOLp4MHvos3Q2EXDVg8VdEM9Kk9GG8PcIWqbWakAuJWYMUzYNHHRKUwbZDqaHvhH5IfngfQkYrjWPoSKXSl8PFLkarQ7tsBNlQsnSeY2iE7F9VVubmVY7q6/s1600-h/NLOS.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGm_cULrAmkZkqeCBKawaOPPOLp4MHvos3Q2EXDVg8VdEM9Kk9GG8PcIWqbWakAuJWYMUzYNHHRKUwbZDqaHvhH5IfngfQkYrjWPoSKXSl8PFLkarQ7tsBNlQsnSeY2iE7F9VVubmVY7q6/s400/NLOS.gif" alt="Propagasi NLOS" id="BLOGGER_PHOTO_ID_5211989063450114402" border="0" /></a><p></p><div style="text-align: center;"> Gambar 2. Propagasi NLOS<br /></div><br /><br />Phenomena multipath juga dapat menyebabkan polarisasi signal berubah-ubah. Menggunakan polarisasi seperti pada frekuensi reuse pada pengembangan LOS dapat menyebabkan masalah bila di aplikasikan pada saluran NLOS. Bagaimana sistem radio menggunakan multipath signal untuk memberikan keuntungan, kuncinya yaitu memberikan pelayanan dalam kondisi NLOS.<br /><br />Meningkatkan power/daya untuk penetrasi/menembus halangan (disebut “near line of sight) bukan dengan teknologi NLOS karena cara ini masih berdasarkan pada kekuatan signal saluran langsung tanpa menggunakan energi yang ada pada signal tak langsung.<br /><br />Kondisi cakupan pada LOS dan NLOS diatur oleh karakteristik perambatan pada lingkungan sekitar, rugi-rugi saluran, dan link budget.Membuat NLOS sangat diinginkan untuk dikembangkan, yaitu: Antena yang dibutuhkan tidak harus tinggi dan posisi antena tidak harus LOS.<br /><br />Untuk pengembangan selular, frekuensi re-use sangat kritis untuk digunakan maka dengan teknologi NLOS antena dibuat rendah untuk mengurangi co-channel interferensi antar lokasi cell yang berdekatan. Pada sistem LOS ketinggian antena tidak dapat dikurangi karena akan mempengaruhi direct path dari CPE ke BTS Mengurangi biaya instalasi, tidak diperlukan survey lokasi yang detail dan mudah untuk diterapkan pada lokasi CPE yang sulit dicapai oleh LOS.<br /><br /><br /><br /><br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1IWmznj3iPgjrQZ2FhWYtdoz6n6RUZreQ9_MGzvIxSInu8c25HMQ1GAdhopJI0aBoQColTBD20CFLI5-6-SGUc-cBEc6nOyxFY_Znj_kwbQd9X5ygEaF09hX_iiBAZv2XExIoSQWHwrEr/s1600-h/CPE.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1IWmznj3iPgjrQZ2FhWYtdoz6n6RUZreQ9_MGzvIxSInu8c25HMQ1GAdhopJI0aBoQColTBD20CFLI5-6-SGUc-cBEc6nOyxFY_Znj_kwbQd9X5ygEaF09hX_iiBAZv2XExIoSQWHwrEr/s400/CPE.gif" alt="Lokasi CPE NLOS" id="BLOGGER_PHOTO_ID_5211989884126477842" border="0" /></a><p style="margin-bottom: 0in;" align="center">Gambar 3. Lokasi CPE NLOS</p><p style="margin-bottom: 0in;" align="center"> </p><p style="margin-bottom: 0in;" align="justify">Teknologi NLOS ini diterapkan dalam WiMAX yang memungkinkan CPE digunakan dalam ruangan. Teknologi <a href="http://adrianrakadima.blogspot.com/">WiMAX</a> ini dapat digunakan untuk kondisi LOS dan NLOS, dimana loss yang terjadi akibat penghalang/bangunan dapat dikurangi/dihindari dan cakupan jarak lokasi yang memungkinkan dengan menggunakan daya transmit yang rendah.</p><p style="margin-bottom: 0in;" align="justify"><span style="color: rgb(0, 0, 0);font-size:78%;" >Reference: “</span><span style="color: rgb(0, 0, 0);font-size:78%;" ><span lang="sv-SE"><i>WiMAX’s technology for LOS and NLOS environments</i></span></span><span style="color: rgb(0, 0, 0);font-size:78%;" ><span lang="sv-SE">”, WIMAX forum white paper.</span></span></p><p style="margin-bottom: 0in; text-align: left;"><span style="font-size:78%;"><a href="http://www.wimax.org/"> http://www.wimaxforum.org</a></span></p>ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-64456112198463056262008-05-02T04:01:00.000-07:002009-05-12T03:42:19.257-07:00Jaringan Akses BroadbandJaringan akses merupakan jaringan yang menghubungkan perangkat pemakai akhir/end-user’s ke jaringan inti/core network, konten dan server aplikasi. Jaringan akses ini mencakup jarak pertama (first mile) ke pelanggan dan jarak kedua (second mile), yang memberikan distribusi layanan yang bervariasi. Jarak pertama/first mile menghubungkan pelanggan tetap atau terminal bergerak/mobile terminal ke titik akses pertama yang disebut DSLAM/base stasiun dan memberikan pipa bandwidth ke pelanggan.<br /><br />Medium transmisi untuk akses bergerak/mobile akses ini menggunakan <a href="http://rakadima.blogspot.com/2008/12/long-term-evolution-lte.html">radio interface</a> yang disebut sebagai udara. Untuk akses dengan menggunakan jalur kabel, dipakai kabel tembaga atau serat optik (<a href="http://adrianrakadima.blogspot.com/2008/12/fiber-optic-structure.html">Fiber Optics</a>). Maksimum bandwidth setiap pelanggan bervariasi, tergantung pada berapa banyak pelanggan yang terhubung ke titik akses, jarak antara terminal pelanggan, titik akses, medium pengiriman yang digunakan dan frekuensi yang dipakai.<br /><br />Ketentuan teknologi akses pertama jarak pertama/first mile memberikan bandwidth, distribusi layanan, dan aplikasi untuk setiap pelanggan. Jarak kedua/second mile merupakan jarak beberapa km dari titik akses jarak pertama, yang di hubungkan ke jaringan inti yang disebut sebagai backhoul. Ada beberapa teknologi untuk titik akses, dimana pada jaringan modern, medium transportasi menggunakan protokol ethernet dan fiber optik yang mempunyai kapasitas bandwidth yang besar.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD86CmzU3uUl0GVALkeaLcs6j9iSBiBIU8FO-3vaXeH0oLexkBTHR2ZmitcB4kEeHKTZi1ylVOqymBA6a9bb6w2nS-f7WFQA8rSp1TbcbMwEtA3agJaRyshsa2DhzspURA33y_n-oMLSiF/s1600-h/acess.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD86CmzU3uUl0GVALkeaLcs6j9iSBiBIU8FO-3vaXeH0oLexkBTHR2ZmitcB4kEeHKTZi1ylVOqymBA6a9bb6w2nS-f7WFQA8rSp1TbcbMwEtA3agJaRyshsa2DhzspURA33y_n-oMLSiF/s400/acess.jpg" alt="Wireless Access Broadband" id="BLOGGER_PHOTO_ID_5195734619144693154" border="0" /></a>Teknologi yang diwariskan seperti ATM, <a href="http://rakadima.blogspot.com/2009/02/service-driven-networks-for-next.html">TDM</a>-based SDH dan multi-service yang memberikan platform sebagai teknologi radio tanpa kabel yang menggunakan gelombang mikro (<a href="http://rakadima.blogspot.com/2009/05/millimeter-wave-frequencies-bandwidths.html">Microwave Frequencies</a>) atau widespread. Jaringan harus memiliki standar carrier-grade, dimana jaringan tersebut sangat dipercaya dan mendukung perbedaan quality of service (QOS). Juga dapat mengatasi berbagai tarif seperti volume tarif dan flat rates.ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-63247347298171804002008-04-27T23:34:00.000-07:002008-09-07T07:40:17.278-07:00इतु डान अफ्द्ब मेंदुकुंग इन्तेर्कोनेक्सी दी अफ्रीका<span></span><span style="font-size:85%;"><span style=";font-family:verdana;font-size:85%;" ><span style="" lang="SV">इंटरनेशनल तेलेकोम्मुनिकाशन यूनियन (इतु) डान अफ्रीकन देवेलोप्मेंट बैंक (अफ्द्ब) तेलाह मेनान्दतान्गनी पेर्सेतुजुँ उन्तुक बेकेर्जसमा दलम पेन्येदिआन् इन्तेर्कोनेक्सी सेमुआ कोटा बसर डान केसिल दी अफ्रीका देंगन इन्फ्रास्त्रुक्तुर ब्रॉडबैंड इक्ट डान सीसा कोनेक्सी दिराम्पुन्ग्कन सम्पाई तहूँ २०१२.<span style=""> </span>बगियन दरी केर्जसमा इनी, केगिअतन केदुआ ओर्गानिससी इनी मेरंग्कुल पत्नेर डान पेंकारियन दाना उन्तुक पेन्येदिआन् इन्फ्रास्त्रुक्तुर ब्रॉडबैंड इक्ट दी अफ्रीका.<o:p></o:p></span></span><span style="font-family:verdana;"> </span><span style=";font-family:verdana;font-size:85%;" ><span style="" lang="SV"><o:p></o:p></span></span><span lang="SV" style="font-family:verdana;"><span style="font-size:85%;"><br /><br />सेकेतारिअत अफ्ब्द उन्तुक कोंसेर्सियम इन्फ्रास्त्रुक्तुर अफ्रीका, मेंकारी दाना दी इन्स्तितुसी यांग अक्तिफ दी अफ्रीका। इतु दिसिनी बेर्पेरण सेबगाई पेलाक्सना यांग मेम्बेरिकन पेंगालामंन्य दलम बिदंग तेलेकोमुनिकासी डान मेम्बन्तु दलम बिदंग टेक्निक उन्तुक केबुतुहन पेनिन्ग्कतन इन्फ्रास्त्रुक्तुर. केर्जसमा केदुआ ओर्गानिससी इनी जुगा मेम्प्रोमोसिकन पेंगिन्तेग्रसियन इक्ट देंगन इन्फ्रास्त्रुक्तुर उतम, तेर्मसुक कोमुनिकासी मेंग्गुनाकन फाइबर ओप्तिक सेबगाई मीडिया ट्रांस्मिसी डान जुगा प्रोजेक्ट एनेर्गी.</span></span></span>ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-26392446077021875742008-04-27T23:24:00.000-07:002008-09-07T07:40:17.279-07:00सोनेट (स्य्न्च्रोनौस् ओप्तिकल नेटवर्क्स)<span style="" lang="SV"><span style="font-size:85%;"><span style="font-family:verdana;">सोनेट अदालाह स्तंदर कोमुनिकासी दिगितल यांग बरु उन्तुक सुअतु सिस्टम ट्रांस्मिसी सरत ओप्तिक। ट्रांसपोर्ट सिग्नल लेवल-१ (स्ट्स-१) देंगन फ्रेकुएंसी ५१,८४० म्ब्प्स डान मुल्तिप्लेक्स सोनेट दिबेन्तुक दरी सेजुम्लाह न कलि सिन्यल दसर स्ट्स-१ सेहिंग्गा लेबिः एफ़्फ़िसिएन् दिबंदिन्ग्कन हिरार्की यांग लें. सोनेट जुगा डपट मेनिन्ग्कटकन कपसितास बैंडविड्थ पड़ा सरत ओप्तिक तंपा पेर्लू मेलाकुकन पेनाम्बहन कबेल ओप्तिक. केंदालन ट्राफिक पड़ा सोनेट अकन सेलालू तेर्जगा पड़ा तोपोलोगी रिंग यांग मेंग्गुनाकन वावेलेंघ्त डिविजन मुल्तिप्लेक्सिंग (व्द्म).</span></span></span><h3 class="post-title entry-title"><a href="http://rakadima.blogspot.com/2008/04/sonet-synchronous-optical-network.html"> </a></h3>ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-16474171310372677872008-04-27T23:13:00.000-07:002008-09-07T07:40:17.280-07:00पेंग्गाबुंगन जीपीएस दलम पेरंग्कत बेर्गेरक<p class="MsoNormal" style="margin-left: 0.25in;font-family:verdana;"><span style="font-size:85%;"><span style="font-size:85%;"><span style="" lang="SV"><span><span>लेबिः</span></span> दरी बेबेरापा तहूँ,<span style=""> </span>सात इनी चिपसेट जीपीएस अकन दीन्तेग्रसिकन दलम मोबाइल दिवैस, तेर्मसुक जुगा नैविगेशन देविसस (पंड), हंसेट सेलुलर, मोबाइल पीसी, डान मसीह बन्यक लगी पेरंग्कत लैंन्य (कांसुमेर इलेक्ट्रानिक्स/स).<span style=""> </span>कतेगोरी दरी स तेर्मसुक जुगा उल्त्र मोबाइल डिवाइस (उम्ब), हन्धेल्ड गमेस, पोर्ताबेल मीडिया प्लेयर डान दिगितल कमरा.<span style=""> </span>मेस्किपुं पेनेरिमा एक्स्तेनल जीपीएस तेर्सेडिया उन्तुक स तेतापी वोलुमे उन्तुक अप्लिकसिन्य तेर्बतास.<o:p></o:p></span></span></span></p> <span style="font-size:85%;"><span style=";font-family:verdana;font-size:85%;" ><span style="" lang="SV"><o:p> </o:p></span></span><span lang="SV" style="font-family:verdana;"><span style="font-size:85%;">दुआ पसर तेर्बेसर पड़ा मोबाइल दिवैस अदालाह हंसेट सेलुलर डान पर्सनल नाविगासी दिवैस. पेंजुअलन मोबाइल दिवैस यांग तेलाह दीन्तेग्रसिकन देंगन जीपीएस दिहराप्कन बेर्केम्बंग दरी १८० जुटा उनित दलम तहूँ २००७ सम्पाई ७२० जुटा उनित पड़ा तहूँ २०११.</span></span></span>ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-10398113762913282572008-04-27T02:37:00.002-07:002008-09-07T07:23:41.798-07:00SONET (Synchronous Optical Network)<p class="MsoNormal" style="margin-left: 0.25in;"><span style="" lang="SV"><span style="font-size:85%;"><span style="font-family:verdana;">SONET adalah standar komunikasi digital yang baru untuk suatu sistem transmisi serat optik. Transport signal level-1 (STS-1) dengan frekuensi 51,840 Mbps dan multiplex SONET dibentuk dari sejumlah N kali sinyal dasar STS-1 sehingga lebih effisien dibandingkan hirarki yang lain. SONET juga dapat meningkatkan kapasitas bandwidth pada serat optik tanpa perlu melakukan penambahan kabel optik. Keandalan trafik pada SONET akan selalu terjaga pada topologi ring yang menggunakan wavelenght division multiplexing (WDM).</span></span></span></p>ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-33289583483145969622008-04-27T02:37:00.001-07:002009-05-12T04:28:04.457-07:00Penggabungan GPS dalam Perangkat Bergerak<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhazq1eJB57Tfpw60xmyLABVyBZFBEUrNty3Dk8bO1Vkg4HQpMnMki54C7c8jAVs5smlY6FU85yyu6JlLHSaf-0yXgI0sXCMup15w_UEZxwdPUe9eAMVWvDQzq9P8yI6o7eZYD3jtdGteBy/s1600-h/car-gps-systems.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 195px; height: 195px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhazq1eJB57Tfpw60xmyLABVyBZFBEUrNty3Dk8bO1Vkg4HQpMnMki54C7c8jAVs5smlY6FU85yyu6JlLHSaf-0yXgI0sXCMup15w_UEZxwdPUe9eAMVWvDQzq9P8yI6o7eZYD3jtdGteBy/s320/car-gps-systems.jpg" alt="Car GPS System" id="BLOGGER_PHOTO_ID_5334897597856502002" border="0" /></a>Lebih dari beberapa tahun, saat ini chipset GPS akan diintegrasikan dalam mobile divais, termasuk juga navigation devices (PND), hanset celular, mobile PC, dan masih banyak lagi perangkat lainnya (consumer electronics/CE).<br /><br />Kategori dari CE termasuk juga ultra mobile device (UMB), handheld games, portabel media player dan digital kamera. Meskipun penerima ekstenal GPS tersedia untuk CE tetapi volume untuk aplikasinya terbatas. Dua pasar terbesar pada mobile divais adalah hanset selular dan personal navigasi divais. Penjualan mobile divais yang telah diintegrasikan dengan GPS diharapkan berkembang dari 180 juta unit dalam tahun 2007 sampai 720 juta unit pada tahun 2011.ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-70488419459698222282008-04-27T02:36:00.000-07:002009-05-12T06:48:49.801-07:00ITU dan AfDB mendukung interkoneksi di Afrika<a href="http://rakadima.blogspot.com/2008/04/itu-opens-free-online-resource.html">International Telecommunication Union (ITU) </a>dan African Development Bank (AfDB) telah menandatangani persetujuan untuk bekerjasama dalam penyediaan interkoneksi semua kota besar dan kecil di Afrika dengan infrastruktur broadband ICT dan sisa koneksi dirampungkan sampai tahun 2012. Bagian dari kerjasama ini, kegiatan kedua organisasi ini merangkul patner dan pencarian dana untuk penyediaan infrastruktur broadband ICT di Afrika.<br /><br />Seketariat AfBD untuk konsersium infrastruktur Afrika, mencari dana di institusi yang aktif di Afrika. ITU disini berperan sebagai pelaksana yang memberikan pengalamannya dalam bidang telekomunikasi dan membantu dalam bidang teknik untuk kebutuhan peningkatan infrastruktur. Kerjasama kedua organisasi ini juga mempromosikan pengintegrasian ICT dengan infrastruktur utama, termasuk komunikasi menggunakan fiber optic sebagai media transmisi dan juga project energi.ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-84256254900801515162008-04-27T02:33:00.000-07:002008-09-07T07:40:17.281-07:00Fasilitas terbaru NXP di Francis<p class="MsoNormal" style="margin-left: 0.25in; text-indent: -0.25in;"><span style="" lang="SV"> <span style="font-size:85%;"><span style="font-family:verdana;">NXP semikondutor adalah perusahaan semikonduktor independen yang didirikan oleh Philips, telah membuka tempat baru untuk pusat penelitian dan pengembangan di Caen negara francis. Perusahaan ini menginvestasikan lebih dari €100 M tahun yang lalu, dari dana itu digunakan untuk biaya R&D, bangunan baru, 800 engineer dan peneliti. Dengan investasi ini, digunakan untuk menambah fasilitas di Caen untuk inovasi pengembangan yang dapat dilihat dari produk yang telah dihasilkan oleh NXP. </span><o:p style="font-family: verdana;"></o:p></span></span></p> <p class="MsoNormal" style="margin-left: 0.25in; text-indent: -0.25in;font-family:verdana;"><span style="font-size:85%;"><span style="" lang="SV"><o:p> </o:p><span style=""> </span>Team yang berada di pusat pengembangan teknologi yang baru, empat perusahaan fokus untuk bidang mobile & personal, rumah, multimarket semikonduktor dan identifikasi.<span style=""> </span>Beberapa dari penelitian dan pengembangan, juga termasuk teknologi RF, tuner silikon, teknologi proses system-in-package dan yang lainya yaitu solusi inovasi Near Field Communication (NFC).<o:p></o:p></span></span></p> <p class="MsoNormal" style="margin-left: 0.25in; text-indent: -0.25in;"><span style="" lang="SV"><span style="font-size:85%;"><o:p style="font-family: verdana;"> </o:p><span style="font-family:verdana;">Selain dari kegiatan yang telah ada dipusat fasilitas di Caen, NXP juga bekerjasama dengan institusi penelitian CNRS yang diketahui sebagai institusi untuk pengetesan (IsyTest). Bidang utama dari institusi ini adalah inovasi pengembangan metode percobaan dan juga teknik improvisasi tingkat kualitas NXP untuk meningkatkan solusi sistem yang rumit.</span></span> <o:p></o:p></span></p> <span style="font-size:85%;"><span style=";font-family:verdana;font-size:12;" lang="SV" ><span style="font-size:85%;"></span></span></span>ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-31430439383857789752008-04-27T02:32:00.000-07:002009-05-12T04:20:25.140-07:00IET and JANET menawarkan pendidikan melalui web streamingInstitution of Engineering and Technology (IET) telah bekerjasama dengan JANET, jaringan nasional UK memperbolehkan institusi pendidikan melakukan web streaming untuk penelitian, konferensi, dan pengajaran melalui IET.tv yang merupakan institusi penyedia layanan web streaming. Jaringan JANET, menghubungkan institusi pendidikan dan penelitian, termasuk sekolah, akademi, universitas dan institusi penelian yang besar di UK.<br /><br />JANET juga memberikan koneksi luar lainnya untuk national education and research networks (NREN) melalui jaringan pan-EUROPEAN GEANT dan internet global. Jaringan yang disediakan ini mempunyai kapasitas untuk transfer data real-time, project penelitian dengan bermacam bidang dan juga mempunyai infrastuktur untuk menemukan prediksi data untuk komunitas penelitian.<br /><br />IET pertama berinisatif untuk komunitas akademis, memberikan mereka akses ke teknologi web streaming secara gratis yang merupakan bagian dari amal IET. Untuk chanel penelitian, pemakai dapat melakukan siaran langsung dan permintaan presentasi video dapat di upload ke internet dan didistribusikan untuk seluruh penonton. Tujuh universitas telah menggunakan pelayanan beta trial dan seminar penelitian akan disediakan untuk semua universitas.ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-32241707302641079922008-04-27T02:25:00.000-07:002009-05-12T02:57:40.714-07:00Antena FractalFractal merupakan <a href="http://rakadima.blogspot.com/2008/04/pengertian-antenna.html">antena</a> yang dirancangan dengan bentuk geometri yang komplek dimana bentuk tersebut tersusun dari bentuk geometri yang sama, hanya saja dalam ukuran skala yang berbeda – beda, disebut sebagai ‘self-similar’ atau ‘self-symetric’. Selain bentuk geometri, rancangan tersebut dapat juga berupa pola – pola yang selalu berulang, biasanya hal ini disebut ‘initiator’ or ‘generator’.<br /><br />Struktur matematika yang merupakan suatu bentuk fractal diantaranya adalah Sierpienski’s gasket, Cantor’s comb, von Korch’s snowflake, the Mandelbrot set, the Lorentz attractor, dsb. Fractal juga bisa dideskripsikan pada benda – benda di alam ini seperti awan, gunung, pesisir pantai dan lain – lain, dimana mereka tidak identik dengan bentuk sederhana bangun geometri.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSU_fnjZP8HyLsjGpbEkkOYSEo4PbmeBaJug1d4frQyy_otPjxyWMatxK8oVwGXl3rvFzLuRCJnqUMyGwJKQwKiWz9Lx9H1ra1LJIfuii22SRyJjXoPmNkr6_JYu7s3ib4pwtc1zq1RWAg/s1600-h/fractal.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSU_fnjZP8HyLsjGpbEkkOYSEo4PbmeBaJug1d4frQyy_otPjxyWMatxK8oVwGXl3rvFzLuRCJnqUMyGwJKQwKiWz9Lx9H1ra1LJIfuii22SRyJjXoPmNkr6_JYu7s3ib4pwtc1zq1RWAg/s400/fractal.jpg" alt="Antena Fractal " id="BLOGGER_PHOTO_ID_5195735220440114626" border="0" /></a><br /><a href="http://rakadima.blogspot.com/2008/04/pengertian-antenna.html">Antena</a> fractal memanfaatkan prinsip pengulangan bentuk geometri atau pola – pola tertentu dalam ukuran skala yang berbeda sehigga dapat meradiasikan energi elektromagnetik ke udara, atau juga sebaliknya dapat mengumpulkan energi elektromagnetik di udara.<br /><br /><div style="text-align: center;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEio2bPI0HG-l7FdHiX1aU_Iiz1lBdf6RAYXZFigUQ68bYVZyavLJPTqVO6NHDuvN5fySpwKJah7t7g757oqIvXLXfjCOKq27iQRQ4KjbmN-V67zU-Po1uvImT8INc8Z5PEmKcmS2aHb97qX/s1600-h/fra.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEio2bPI0HG-l7FdHiX1aU_Iiz1lBdf6RAYXZFigUQ68bYVZyavLJPTqVO6NHDuvN5fySpwKJah7t7g757oqIvXLXfjCOKq27iQRQ4KjbmN-V67zU-Po1uvImT8INc8Z5PEmKcmS2aHb97qX/s400/fra.gif" alt="Antena Fractal 4 Band " id="BLOGGER_PHOTO_ID_5193855171520734610" border="0" /></a><span style="font-size:85%;">Antena Fractal 4 Band dengan frekuensi yang berbeda.</span><br /></div>ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com0tag:blogger.com,1999:blog-7168419340193968129.post-37021044238772573552008-04-27T02:24:00.000-07:002009-05-12T02:47:06.872-07:00Pengertian AntennaAntena merupakan benda yang terbuat dari bahan tertentu seperti alumunium, alloy, tembaga dan sebagainya, juga mempunyai bentuk yang berbeda-beda (<a href="http://adrianrakadima.blogspot.com/2008/12/parabolic-dish-antennas.html">parabola</a>, horn, lingkaran, bar, <a href="http://adrianrakadima.blogspot.com/2008/12/yagi-antennas.html">Yagi</a>, <a href="http://adrianrakadima.blogspot.com/2008/12/microstrip-antennas.html">microstrip</a>, <a href="http://rakadima.blogspot.com/2008/04/antena-fractal.html">fractal</a> dsb). Fungsi antena adalah alat untuk meradiasikan atau menerima gelombang radio (IEEE Strandard Definition).<br /><br /><br /><div style="text-align: center;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHVmJ3KjVIYzXZjo88cR2AJeiB-PdwxEwAe76dEY1booSagRhqnlMg0l8M55SAqTRM1y47oZSDZ3FMm1GQgP8ixfxDkWuXlJEFbVXTbKi43FBwy0Acvpg_aJcf-2_DHc_n1tSwtqO8iTDs/s1600-h/80px-Television_Antenna.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHVmJ3KjVIYzXZjo88cR2AJeiB-PdwxEwAe76dEY1booSagRhqnlMg0l8M55SAqTRM1y47oZSDZ3FMm1GQgP8ixfxDkWuXlJEFbVXTbKi43FBwy0Acvpg_aJcf-2_DHc_n1tSwtqO8iTDs/s320/80px-Television_Antenna.jpg" alt="Antena TV" id="BLOGGER_PHOTO_ID_5213462440179176866" border="0" /></a>Antena TV<br /></div><br />Bagian Antena terdiri dari konduktor atau kumparan konduktor yang bertanggung jawab untuk meradiasikan energi elektromagnetik ke udara bebas (sebagai transmitter) dan mengumpulkannya (sebagai penerima) energi elektromagnetik lain dari udara bebas. Proses perubahan energi listrik menjadi elektromagnetik ini terjadi karena adanya perubahan waktu dan arus yang mengalir pada saat membawa informasi dalam sebuah kabel dan melepaskan energi listrik ketika telah mencapai ujung kawat melalui media antena menjadi energi elektromagnetik.ATALAHARIK RAKADIMA HALRIANSYAHhttp://www.blogger.com/profile/08808442348041357455noreply@blogger.com2