Cordless phone technology: a brief history
Cordless Phones – as the term suggests – is a phone sans any cord. Instead the handset communicates with a base unit using wireless technology. That is, through radio signals instead of electronic pulses in a traditional phone. And as long as the base unit could receive signals from the handset, the user is free to roam a few hundred meters without being tethered to any wire.
Even though a cordless phone uses wireless technology to communicate between the handset and the base unit, it is not quite the same as a wireless phone. A cordless phone handset must to be periodically placed back on the base unit for recharging, which is simultaneously linked physically to the incoming phone wire and an electric supply. In case of a power failure, the cordless phones may be rendered inoperative and hence the user may have to rely on specifically designed battery backups for temporary restoration of service.
Cordless phones first hit the market in the early 70s as the direct fallout of the then new wireless technology. The first of the models had long extendable antennas replacing the conventional cords and it used the same two-way radio technology as used in baby monitors or walkie-talkies for communication.
Soon the FCC allotted a bandwidth just above the AM frequency for cordless communication, but the quality of communication was poorer, often marred by electrical interference or faulty reception. Also, they did not have had any battery backup to meet accidental power failures.
But, over the years, wireless technology has improved dramatically and today’s models are almost free from all the technical issues its predecessors had. In today’s models, a strong transmission signal (900 MHz to 2.4 GHz) and an enhanced antenna and receiver system ensures that the user can have a crystal clear sound sans any interference.
Rechargeable batteries in the base unit could provide hours of uninterrupted backup power in case of a power failure (even though most phones can lose power without any warning), while different channels within the same bandwidth – which can be selected by the user – offers a new level of wireless communication experience to the user, in terms of precision and clarity.
Further, in the earlier models, it was technically possible to eavesdrop on an ongoing communication using scanners tuned to the same frequency. But the current models comes with enhanced security measures that uses techniques such as electronic scrambling or detuning to avoid unscrupulous ears. In other words, they are almost immune to electronic hacking, especially the latest DSS ones.
All of the latest cordless models offer additional features such as silent signaling, camera, encryption technology for better security, amplifier, caller id, intercom, memory, paging, dual-line capability, and self answering system, but the availability of these facilities varies with models, make and price tag.
If you are ready to shell out some more money, you can have all the cutting edge facilities available in your cordless phone. But this is for those who think that cordless phones are much more than for simple talking!
http://www.cctvspecialty.com/ CCTV Specialty specializes in the supply and distribution of http://www.cctvspecialty.com/ CCTV Cameras. Your Article Search Directory : Find in Articles
Recent articles in this category:
- Free Internet Security Software from Google
Selecting the internet security software for your computer can be a daunting task for most home user - Home Key Logger - Track Computer Activity
What goes through your mind when you think about a home key logger? Do you think about a rogue progr - Computers and Electronics Have Changed The Way We Live
You push the on button and your monitor screen springs to life. Next, you use your mouse to bring up - What PacketShaper Can Do For You?
What is PacketShaper?It is an application-intelligent traffic management system which delivers predi - Key Logger Software for Your Computer
One thing that many of us are concerned about is the safety of our children and what happens when th - Keep Your PC Healthy With Computer Tips & Tricks
Everybody just has to have a computer these days. Life without a computer is unimaginable. I am sure - Your Children And The Internet - 5 Tips To Keep Your Children Safe While They Are Online
If your children are on the Internet you may be concerned about their safety. We hear stories regula - Gibberish Spam Email - Why Do Spammers Send It?
We have all seen many spam emails that just make no sense. They contain pure gibberish in the subjec - Antivirus - What is a Computer Virus?
Before understanding what a computer virus is, it is necessary to understand what a virus in when it - How to Recover External Hard Drive?
You can store your computer data in several different ways. Data can be stored on removable disks,
Most viewed articles in this category:
- Experience the new Microsoft Zune and Future Technology with Bill Gates at CES Keynote
After the demonstration of Windows Vista by Bill Gates at the CES keynote, Robbie Bach, President of - Internet Connection Sharing in Windows XP
This articles explains in detail how to set up a small network at home so you can share your Interne - Nortel VPN Client Overview
The Nortel VPN Client creates the secure connection for VPN users into a private network. Once you l - Computer Phobias
Years ago around the end of January I would develop Chinophobia (fear of snow). Maybe it was becaus - CCTV: the story continues
CCTV – Closed Circuit Television – for some time at least has been used by various gover - iPod Stuff: How To Set Your iPod's Alarm Clock
The good thing about the iPod alarm clock feature is that you can wake up with the tune of your favo - Why Someone Stole My Mobile Phone
Not so long ago my mobile phone was stolen. I kept asking why I was the one who got targeted, especi - Computer hardware simplified
Computer Hardware is a comprehensive term which refers to all the physical parts of a computer inclu - Office printers: introduction to technology and types
With every bit of information transfer and manipulation going digital these days, almost the entire - A to Z of Mac Parts
The Mac OS: Mac OS runs smoothly. That's what I noticed first off. There's very little waiting, very