SlideShare uma empresa Scribd logo
1 de 26
Heather Buettner TED 111
DECT Digital Enhanced Cordless Telecommunications
Background Information and History
Background and History What is DECT? Digital Enhanced Cordless Telecommunications DECT is a standard for digital wireless telephone technology DECT History developed January 1988 by the ETSI ETSI (European Telecommunications Standards Institute) developed DECT by combining CT2 and CT3
Background and History DECT was first known as Digital European Cordless Telecommunications DECT changed to its current name to reflect global acceptance The first DECT was the Siemens Gigaset 900 telephone in 1992 First ETSI standards of DECT were ETS 300 175 and 300 176
Functionality
Functionality How Does DECT Function? It is high speed quality, low power technology Low risk of radio interference Uses time division multiple access (TDMA) to transmit the radio signals to DECT phones DECT phones work from a base station with a handset
Functionality 5 Major Applications of DECT 1) Cordless Private Branch Exchange (PBX) 2) Wireless Local Loop (WLL) 3) Cordless Terminal Mobility 4) Home Cordless Phones 5) GSM/ DECT internetworking
Usage In Society
Usage in Society Used for residential and business purposes DECT is used in many countries such as the U.S., Italy, and the U.K. In 2002 Bluetooth was created Bluetooth uses short range wireless data applications
Usage in Society DECT Solutions
Usage in Society Home Solutions Residential areas are the largest application area
Usage in Society Fax, PC, telephones, as well as PC and telephone wireless devices are connected by a fixed access unit PTSN- Public Switched Telephone Network PSTN access allows 6-10 handsets t be used externally and for intercom access
Usage in Society Office Solutions DECT capacity is high and supports more than 10.000 Erlang per floor square kilometer
Usage in Society Office Solutions Main application area for DECT is seamless handover No separate base station controller DECT is cost efficient
Usage in Society Enterprise Solutions Typical data services are paging, group calls, automatic alarms, and many others DECT provides laptop PC wireless access to LAN Provides cordless solutions for System Integrators
Usage in Society Public Solutions DECT provides high capacity WLL services
Usage in Society Public Solutions WLL supports voice telephony, ISDN, and internet user data This provides user access data up to a few hundred of kbps (kilobit per second)
Usage in Society Industrial Solutions DECT applications provide supervision and control needs in a variety of ways Authenticating- base station and handset handshake using specific rules and calculations Encryption- the digital data is encrypted and then is decrypted when it is received by the intended receiver
Future Outlook
Future Outlook The digital cordless telephone market is moving to new countries Use of DECT modules in security systems are replacing wired systems in buildings DECT security system applications will be used for homes DECT use for data/ multimedia on the web
References
References DECT Forum http://www.dect.org/content.aspx?id=18 Digital Enhanced Cordless Communications http://en.wikipedia.org/wiki/Digital_Enhanced_Cordless_Telecommunications
References What is DECT? http://www.dectweb.com/Introductions/answers.htm What is a DECT phone? http://wisegeek.com/what-is-a-dect-phone.htm
References DECT Security http://uswww03.gnnetcom.com/jabra/cc_stream/white/DECT_Security.pdf
Thank You!

Mais conteúdo relacionado

Mais procurados

Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communicationMaulik Togadiya
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile CommunicationNoushad Hasan
 
Chap 4 (large scale propagation)
Chap 4 (large scale propagation)Chap 4 (large scale propagation)
Chap 4 (large scale propagation)asadkhan1327
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computingZituSahu
 
LTE Architecture
LTE ArchitectureLTE Architecture
LTE ArchitectureManje Gowda
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)Ankur Kumar
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Evolution of mobile radio communication
Evolution of mobile radio communicationEvolution of mobile radio communication
Evolution of mobile radio communicationjadhavmanoj01
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationSahar Foroughi
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Miles Kevin Galario
 

Mais procurados (20)

HiperLAN.ppt
HiperLAN.pptHiperLAN.ppt
HiperLAN.ppt
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile Communication
 
Chap 4 (large scale propagation)
Chap 4 (large scale propagation)Chap 4 (large scale propagation)
Chap 4 (large scale propagation)
 
Power control in 3 g
Power control in 3 gPower control in 3 g
Power control in 3 g
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
LTE Architecture
LTE ArchitectureLTE Architecture
LTE Architecture
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
 
Propagation Models
Propagation ModelsPropagation Models
Propagation Models
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Handover in Telecom
Handover in TelecomHandover in Telecom
Handover in Telecom
 
X.25
X.25X.25
X.25
 
Evolution of mobile radio communication
Evolution of mobile radio communicationEvolution of mobile radio communication
Evolution of mobile radio communication
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless Communication
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)
 
Gsm channels concept
Gsm channels conceptGsm channels concept
Gsm channels concept
 

Semelhante a Dect

Evolution from 1_g_to_5g
Evolution from 1_g_to_5gEvolution from 1_g_to_5g
Evolution from 1_g_to_5gDIKSHA_LAHRANI
 
Bluetooth & cdma technology
Bluetooth & cdma technologyBluetooth & cdma technology
Bluetooth & cdma technologybalpreetdhillon
 
Tw Telecom Corporate Overview 0708
Tw Telecom Corporate Overview 0708Tw Telecom Corporate Overview 0708
Tw Telecom Corporate Overview 0708ceverson
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techcheqala5626
 
ISDN VSAT Ethernet and other recent technologies in networking
ISDN VSAT Ethernet and other recent technologies in networkingISDN VSAT Ethernet and other recent technologies in networking
ISDN VSAT Ethernet and other recent technologies in networkingAbdulmughni Ansari
 
Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici -...
 	 Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici -... 	 Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici -...
Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici -...tecnoimprese
 
What Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdfWhat Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdfAntenna Manufacturer Coco
 
4g technology Ganesh Deshmukh
4g technology Ganesh Deshmukh4g technology Ganesh Deshmukh
4g technology Ganesh DeshmukhGanesh Deshmukh
 
Mobile Computing.pdf
Mobile Computing.pdfMobile Computing.pdf
Mobile Computing.pdfYASINMOLLAH2
 
Genaration of technology
Genaration of technologyGenaration of technology
Genaration of technologyTanvir Taj
 
Pros and cons_of_p25_vs_tetra
Pros and cons_of_p25_vs_tetraPros and cons_of_p25_vs_tetra
Pros and cons_of_p25_vs_tetraVasco Macaringue
 
Pros and cons_of_p25_vs_tetra
Pros and cons_of_p25_vs_tetraPros and cons_of_p25_vs_tetra
Pros and cons_of_p25_vs_tetraWahli Nurdin
 
WC and LTE 4G module 1- 2019 by Prof. Suresha V
WC and LTE 4G  module 1- 2019 by Prof. Suresha VWC and LTE 4G  module 1- 2019 by Prof. Suresha V
WC and LTE 4G module 1- 2019 by Prof. Suresha VSURESHA V
 
PTCL Corporate product portfolio
PTCL Corporate product portfolioPTCL Corporate product portfolio
PTCL Corporate product portfolioMohammad Farooq
 

Semelhante a Dect (20)

Evolution from 1_g_to_5g
Evolution from 1_g_to_5gEvolution from 1_g_to_5g
Evolution from 1_g_to_5g
 
Bluetooth & cdma technology
Bluetooth & cdma technologyBluetooth & cdma technology
Bluetooth & cdma technology
 
Tw Telecom Corporate Overview 0708
Tw Telecom Corporate Overview 0708Tw Telecom Corporate Overview 0708
Tw Telecom Corporate Overview 0708
 
TELECOMMUNICATION SYSTEMS
TELECOMMUNICATION SYSTEMS TELECOMMUNICATION SYSTEMS
TELECOMMUNICATION SYSTEMS
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
 
ISDN VSAT Ethernet and other recent technologies in networking
ISDN VSAT Ethernet and other recent technologies in networkingISDN VSAT Ethernet and other recent technologies in networking
ISDN VSAT Ethernet and other recent technologies in networking
 
Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici -...
 	 Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici -... 	 Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici -...
Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici -...
 
Shteinfinance
ShteinfinanceShteinfinance
Shteinfinance
 
BLUETOOTH.ppt
BLUETOOTH.pptBLUETOOTH.ppt
BLUETOOTH.ppt
 
What Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdfWhat Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdf
 
ADVANCED TELECOM BSNL
ADVANCED TELECOM BSNLADVANCED TELECOM BSNL
ADVANCED TELECOM BSNL
 
4g technology Ganesh Deshmukh
4g technology Ganesh Deshmukh4g technology Ganesh Deshmukh
4g technology Ganesh Deshmukh
 
Mobile Computing.pdf
Mobile Computing.pdfMobile Computing.pdf
Mobile Computing.pdf
 
Genaration of technology
Genaration of technologyGenaration of technology
Genaration of technology
 
4G
4G4G
4G
 
1 2 3 4 5 g
1 2 3 4 5 g1 2 3 4 5 g
1 2 3 4 5 g
 
Pros and cons_of_p25_vs_tetra
Pros and cons_of_p25_vs_tetraPros and cons_of_p25_vs_tetra
Pros and cons_of_p25_vs_tetra
 
Pros and cons_of_p25_vs_tetra
Pros and cons_of_p25_vs_tetraPros and cons_of_p25_vs_tetra
Pros and cons_of_p25_vs_tetra
 
WC and LTE 4G module 1- 2019 by Prof. Suresha V
WC and LTE 4G  module 1- 2019 by Prof. Suresha VWC and LTE 4G  module 1- 2019 by Prof. Suresha V
WC and LTE 4G module 1- 2019 by Prof. Suresha V
 
PTCL Corporate product portfolio
PTCL Corporate product portfolioPTCL Corporate product portfolio
PTCL Corporate product portfolio
 

Dect

  • 2. DECT Digital Enhanced Cordless Telecommunications
  • 4. Background and History What is DECT? Digital Enhanced Cordless Telecommunications DECT is a standard for digital wireless telephone technology DECT History developed January 1988 by the ETSI ETSI (European Telecommunications Standards Institute) developed DECT by combining CT2 and CT3
  • 5. Background and History DECT was first known as Digital European Cordless Telecommunications DECT changed to its current name to reflect global acceptance The first DECT was the Siemens Gigaset 900 telephone in 1992 First ETSI standards of DECT were ETS 300 175 and 300 176
  • 7. Functionality How Does DECT Function? It is high speed quality, low power technology Low risk of radio interference Uses time division multiple access (TDMA) to transmit the radio signals to DECT phones DECT phones work from a base station with a handset
  • 8. Functionality 5 Major Applications of DECT 1) Cordless Private Branch Exchange (PBX) 2) Wireless Local Loop (WLL) 3) Cordless Terminal Mobility 4) Home Cordless Phones 5) GSM/ DECT internetworking
  • 10. Usage in Society Used for residential and business purposes DECT is used in many countries such as the U.S., Italy, and the U.K. In 2002 Bluetooth was created Bluetooth uses short range wireless data applications
  • 11. Usage in Society DECT Solutions
  • 12. Usage in Society Home Solutions Residential areas are the largest application area
  • 13. Usage in Society Fax, PC, telephones, as well as PC and telephone wireless devices are connected by a fixed access unit PTSN- Public Switched Telephone Network PSTN access allows 6-10 handsets t be used externally and for intercom access
  • 14. Usage in Society Office Solutions DECT capacity is high and supports more than 10.000 Erlang per floor square kilometer
  • 15. Usage in Society Office Solutions Main application area for DECT is seamless handover No separate base station controller DECT is cost efficient
  • 16. Usage in Society Enterprise Solutions Typical data services are paging, group calls, automatic alarms, and many others DECT provides laptop PC wireless access to LAN Provides cordless solutions for System Integrators
  • 17. Usage in Society Public Solutions DECT provides high capacity WLL services
  • 18. Usage in Society Public Solutions WLL supports voice telephony, ISDN, and internet user data This provides user access data up to a few hundred of kbps (kilobit per second)
  • 19. Usage in Society Industrial Solutions DECT applications provide supervision and control needs in a variety of ways Authenticating- base station and handset handshake using specific rules and calculations Encryption- the digital data is encrypted and then is decrypted when it is received by the intended receiver
  • 21. Future Outlook The digital cordless telephone market is moving to new countries Use of DECT modules in security systems are replacing wired systems in buildings DECT security system applications will be used for homes DECT use for data/ multimedia on the web
  • 23. References DECT Forum http://www.dect.org/content.aspx?id=18 Digital Enhanced Cordless Communications http://en.wikipedia.org/wiki/Digital_Enhanced_Cordless_Telecommunications
  • 24. References What is DECT? http://www.dectweb.com/Introductions/answers.htm What is a DECT phone? http://wisegeek.com/what-is-a-dect-phone.htm
  • 25. References DECT Security http://uswww03.gnnetcom.com/jabra/cc_stream/white/DECT_Security.pdf