Course 2231 Wireless Fundamentals – Free Preview

TCO Certified Wireless Analyst
Course 2231 Wireless Fundamentals
Lesson 1 Introduction and Radio Fundmentals

Enjoy this free sample video from CWA.

Course 2231 Wireless Fundamentals

Radio fundamentals • Spectrum • Digital radio • Modems and Modulation • Propagation, Penetration and Fading

Wireless Fundamentals is the first course in the CWA Certification Package. We begin with the basics: what radio is, how it’s organized and how and it’s used to communicate information.

We begin by understanding what radio actually is, and why we use it for communications. We’ll understand how radio frequencies are in the Gigahertz range, used within frequency bands measured in the Megahertz wide.

Then we will look at the spectrum, i.e. standardized bands of frequencies, how they are allocated and the need for licenses. You will learn which bands are used for what, from cordless phones to WiFi and cellular, including the new 700-MHz bands.

Next, we’ll understand how information is represented using radio. The first stop is a quick review of old-fashioned analog radio and TV, followed by what most systems use today: digital. We’ll spend some time understanding digital, how 1s and 0s are communicated by modems and familiarize you with jargon and buzzwords like QAM and QPSK.

We’ll finish off with radio transmission issues, including propagation, penetration and fading.

Course Lessons
1. Radio Fundamentals
2. Wireless Spectrum and Radio Bands
3. Analog Radio
4. Digital Radio: How Modems Work
5. Propagation, Penetration and Fading

Click here to watch the video :

Course 2231 Wireless Fundamentals

This is just a small sample of the vast online telecommunication training and certification available through Teracom Training.

get more info

Digitally-Signed Email: Authentication and Digital Signatures

E-mail was one of the first “killer apps” on the Internet, and has been a major contributor to increases in productivity over the past ten years. Of course, along with email came the scourge of spam. Criminals infect computers with trojan horse programs, creating collections of machines they control remotely to send millions of unsolicited offers for fake watches, pirated software, phony medications and ecard invitations to infect your computer.

As spam reaches 30, 40 or even 100 unwanted messages per day on a targeted account, it is becoming essential to automatically separate legitimate messages from spam. One tool available to senders of legitimate emails to aid the recipient in this process is to digitally sign their messages, allowing the recipient to establish a level of comfort that the message actually came from the indicated sender.

Continue reading “Digitally-Signed Email: Authentication and Digital Signatures”

The IP-PSTN

The Packet-Switched Telecommunications Network

Over the past fifty years, several attempts have been made to develop converged networks: networks with “dial tone” that supports all communications: speech, music, text, graphics, images and video. For a number of reasons, convergence strategies employing ISDN and ATM were unsuccessful and did not gain critical mass. This time, it appears that packet-switched network service using IP will gain enough momentum to become the new kind of plain ordinary telecommunications service.

Continue reading “The IP-PSTN”