Free Essay

Usb Introduction N History

In:

Submitted By tanjiehao
Words 1017
Pages 5
Introduction Of USB History USB—or Universal Serial Bus—is a protocol for connecting peripherals to a computer. It features a standarized port designed to accommodate many different types of hardware devices. Most modern devices such as digital cameras, printers, scanners, flash drives, cell phones, iPods and other MP3 players use some variation of the USB port in their design.The first USB technology began development in 1994, co-invented by Ajay Bhatt of Intel and the USB-IF (USB Implementers Forum, Inc). The organization is comprised of industry leaders like Intel, Microsoft, Compaq, LSI, Apple and Hewlett-Packard. It supports and adopts comprehensive specifications for all aspects of USB technology.Before USB came into existence, computers used serial and parallel ports to plug devices into computers and transfer data. Individual ports were used for peripherals such as keyboards, mice, joysticks and printers. Expansion cards and custom drivers were often required to connect the devices. Parallel ports transferred data at approximately 100 kilobytes per second, where as serial ports ranged from 115 to more than 450 kilobits per second. Some ports could not run simultaneously.The high volume of incompatibilities and the attempt to use multiple interfaces helped signal the demand for a technology like USB, which could take half a dozen port types and streamline it down to one. Immediate interaction between devices and a host computer without the need to disconnect or restart the computer also enables USB technology to render more efficient operation. Consequently, a single USB port can handle up to 127 devices while offering a collective compatibility.The USB 1.0 debuted in late 1995 and transferred data at a rate of 12 megabits per second. A revised version of this standard, USB 1.1, not only transferred data at a full speed rate of 12 megabits per second, but could also operate at a lower speed of 1.5 megabits per second for lower bandwidth devices. Due to its more efficient operation, USB 1.1 was used more by consumers than its predecessor.In 1998, the iMac G3 was the first consumer computer to discontinue legacy ports (serial and parallel) in favor of USB. This implementation helped to pave the way for a market of solely USB peripherals rather than those using other ports for devices. The combination of the ease of use, self-powering capabilities and technical specifications offered by USB technology and devices helped it to triumph over other port options.With a transfer rate forty times faster at 480 megabits per second, USB 2.0 debuted in 2000 and became an official standard the following year. In addition to this high-speed transfer rate, USB 2.0 was capable of operating at two slower speeds: 12 megabits per second (USB 1.1 full speed) and 1.5 megabits per second (low speed for devices like mice requiring less bandwidth). A USB 2.0 port will function with USB 1.1 devices, although a USB 1.1 port may not have the bandwidth capabilities to properly communicate with a 2.0 device.USB 2.0 offers plug and play capabilities for various multimedia and storage devices. This newer version offered additional user features that did not exist in its previous version. USB 2.0 added support for power sources with USB connectors, a new descriptor for multiple interfaces, as well as the capability for two devices to interact without the need for a different USB host (also referred to as USB On-The-Go) .The year 2000 also introduced the USB flash drive—a rewritable plug-and-play storage device first sold by IBM and Trek Technology. It could initially hold up to 8 megabytes of data. More than a decade later, storage capacities have surpassed 256 gigabytes for a single drive.USB flash drives have been branded with such synonyms as thumb drive, pen drive, jump drive and memory stick. They will endure close to a million data rewrites. Older models had full speed connectivity at 12 megabits per second. While current versions use USB 2.0, their NAND flash technology causes them to operate at less than the high speed of 480 megabits per second, but still 20 times faster than older full speed models.The latest version—USB 3.0 with an approximate “super speed” data transfer rate up to 4.8 gigabits per second—provides backward compatibility with USB 2.0 devices and ports. A USB 3.0 cable or device may be plugged into a USB 2.0 port, but the super speed rate will only work with USB 3.0 cables, devices and ports. USB 3.0 technology will be able to upload and download simultaneously from separate wire lanes of traffic (two wires to transmit, two wires to receive data). This will enhance the speed of reading and writing data. Devices will charge at a faster pace while using energy more resourcefully. USB 3.0 will allow devices like high resolution cameras or audio and external drives that are optimized at higher bandwidths to operate more effectively.Some USB 3.0 consumer products were made available in 2010, however, full implementation of the super speed version is still in the works. Mainstream use may not occur until 2011. Motherboards and peripherals are testing for further universal compatibility. The delay of USB 3.0 may also be due to Intel’s CMOS manufacturing. USB 3.0 Windows drivers are also still in development. Therefore, wide consumer adoption may not occur until it’s well integrated into the major operating systems.Wireless USB evolved from the Universal Series Bus concept in 2007 and 2008. It is a high bandwidth radio technology that transmits data from devices like printers, cameras, flash drives as well as streaming video at a fast connection without the use of cables. Wireless USB operates best within a short range. It can transfer data at approximately 110 megabits per second at 30 feet and 480 megabits per second at 10 feet. Wireless USB works to expand a user’s options for mobile computing while still maintaining the connectivity of the standard 127 devices. | |

Similar Documents

Free Essay

Scanner Instructions

...LS4208 Product Reference Guide LS4208 Product Reference Guide 72E-69413-03 Revision A January 2007 © 2005-2007 by Symbol Technologies, Inc. All rights reserved. No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means, without permission in writing from Symbol. This includes electronic or mechanical means, such as photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to change without notice. The software is provided strictly on an “as is” basis. All software, including firmware, furnished to the user is on a licensed basis. Symbol grants to the user a non-transferable and non-exclusive license to use each software or firmware program delivered hereunder (licensed program). Except as noted below, such license may not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of Symbol. No right to copy a licensed program in whole or in part is granted, except as permitted under copyright law. The user shall not modify, merge, or incorporate any form or portion of a licensed program with other program material, create a derivative work from a licensed program, or use a licensed program in a network without written permission from Symbol. The user agrees to maintain Symbol’s copyright notice on the licensed programs delivered hereunder, and to include the same on any authorized copies it makes, in whole or in part. The user agrees...

Words: 35954 - Pages: 144

Premium Essay

Character Recognition Project Report

...converts it into ASCII or other equivalent machine editable form. It contributes immensely to the advancement of automation process and improving the interface between man and machine in many applications . Character recognition is one of the most interesting and fascinating areas of pattern recognition and artificial intelligence. .Character recognition is getting more and more attention since last decade due to its wide range of application. Conversion of handwritten characters is important for making several important documents related to our history, such as manuscripts, into machine editable form so that it can be easily accessed and preserved. Lots of independent work is going on in Optical Character Recognition that is processing of printed/computer generated document and handwritten and manually created document processing i.e. handwritten character...

Words: 2960 - Pages: 12

Free Essay

Laptop Level-1

...9001:2008 Certified Company LAPTOP Level-1 SERVICE TRAINING - COURSE SYLLABUS Day1 INTRODUCTION 1. What is laptop? 2. History of laptop 3. How work laptop? 4. Advantages of laptop instead of desktop 1. CARD LEVEL SERVICE [Hard Ware] 2. CHIP LEVEL SERVICE [Motherboard] 5. Difference between laptop and desktop LAPTOP MANUFACTURING COMPANIES-Acer /Apple /Compaq /Dell -etc. 6. How to buy a laptop? 7. Operating System review &laptop uses & laptop booting process 8. Guide to purchase of second hand laptop Day2 TOOLS AND TESTING EQUIPMENTS 1. LAPTOP HARDWARE TOOLS  Screw Driver Kit  Laptop Casing Opener  Nose Pliers  Cutter  Electric Screw Driver  Tweezer  Anti Static Wrist Band  PCB Cleaning Brush & etc 2. LAPTOP CHIP LEVEL TOOLS  Micro Soldering Iron  Tip Soldering Iron  Hot Air Blower  Magnifying Lenz with Lamp  Liquid Flux  Dry Flux & etc 3. TESTING EQUIPMENT  1.Anolog Mutimeter  Digittal Mutimeter  Battery Booster  Universal AC adapter  Debug card  SATA to USB convertor  IDE to USB convertor 4. OTHER HARDWARE SPARES  External Monitor  External DVD Drive  Usb Keyboard / Mouse&etc Day3 Day4 Day5 Day6 Day7 Day8 5. ACCESSORIES  Laptop bag  LCD Screen Card  LCD Cleaner & etc 6. ADVANCED TOOLS  BGA Rework Machine  Reballing Kits  Infrared IC Heater  PCB Scanner  Oscilloscope [CRO]  SMD IC Extractor  PTH Desoldering Machine  RCL Meter SMT ELECTRONICS INTRODUCTION RESISTOR CAPACITOR INDUCTOR & TRANSFOEMER LAPTOP PARTS VIEW & KEYBOARD & TOUCH PAD...

Words: 2886 - Pages: 12

Free Essay

The U Watch

...NAME: LINESS KAMOWA TP NUMBER: TP040669 INTAKE CODE: UCFF1601BF SUBJECT: COMMUNICATION SKILLS LECTURER: MISS JENNY TITLE: THE U- SMARTWATCH DUE DATE: 11TH APRIL 2016 THE U SMARTWATCH INTRODUCTION PRODUCT DESCRIPTION TARGET MARKET SUMMARY INTRODUCTION Throughout the years, technology has had a massive transition and is still in the process of production as everyday something new is created with each device having a specific purpose. The idea of a watch has been improved massively over time. From the first waterproof watch which was introduced by Rolex in 1926, the watch today has been greatly revolutionised with so many other added features (Anon, 2016). Today a watch or rather a smartwatch has the capability enhanced beyond timekeeping. Smartwatches are relatively new and still evolving. The U smartwatch is a unique and special kind of smartwatch which is easily differentiated from its competition. It is stylish, beautiful and has amazing features that will leave consumers chasing for it from their nearest retailers. The U smartwatch is different in many ways. It’s arguably the best looking smartwatch on the market, has an amazing user interface, and works with nearly any Android smartphone as well as iOS devices. Using the latest and cutting edge technology, the “U” Smartwatch, was created to make daily and personal tasks easier in the most effective way. ...

Words: 970 - Pages: 4

Free Essay

Spanish Period

...LEAH N. ORDONIO BSN EVOLUTIONS OF DEVICES A device is usually a constructed tool, but may refer more specifically to: Technology Machine Tool Gadget Improvised explosive device (IED) Appliance (disambiguation), a device for a particular task A component of personal computer hardware Peripheral, any device attached to a computer that expands its functionality Electronic component Nuclear device Device file, an interface of a device driver Music Device (heavy metal band) Device (Device album) Device (pop rock band) Device (Eon album), 2006 Here’s a complete history of just how storage memory devices for computers have evolved ever since their inception: Paper data storage Believe it or not, paper has been [and still is] a form of electronic data storage as early as 1725 when Basile Bouchon used punched paper rolls to store instructions for textile looms. This technology was later developed into the wildly successful Jacquard loom. Later during the 19th Century, telegrams could be prerecorded on punched tape and rapidly transmitted using Alexander Bain's automatic telegraph in 1846. In the late 1880s Herman Hollerith invented punched cards which were used in the 1890 census and the completed results were finished months ahead of schedule and far under budget. This technology was widely used for tabulating votes and grading standardized tests. Barcodes made it possible for any object that was to be sold or transported to have some computer readable information...

Words: 1135 - Pages: 5

Premium Essay

Promotions & Advertising Research Paper

...positive effectiveness of promotional products and the opportunities the products will bring to their companies. The decision makers of marketing and promotions with in a business often face the issue of determining how to wisely spend their promotional dollars. Research by Promotional Products Association International (PPAI) states, “Promotional products enhance impressions about both the brand and product, and also contribute to consumer intent to buy”. (Nelson, Kanso & LeBlanc, 2006). PPAI is a trade association within the promotional products industry that provides networking events, lectures and certifications. Since most distributors who begin their career in promotional products have no idea how the industry got started, the history behind promotional products and advertising explains just exactly how these industries...

Words: 4361 - Pages: 18

Premium Essay

Trying to Join Site

...IT1115 Introduction to Information Technology Syllabus Credit hours: 6.0 Contact/Instructional hours: 70 (50 Theory, 20 Lab) IT1115 Introduction to Information Technology Syllabus COURSE SUMMARY COURSE DESCRIPTION This course explores foundational topics related to information technology. Topics examined include computing devices, hardware, software, operating systems, computer networks, security, and computer programming. Logical problem solving, troubleshooting, and maintenance of computer systems are also introduced. MAJOR INSTRUCTIONAL AREAS 1. Computer History and Fundamentals 2. Hardware 3. Operating Systems 4. Basic Networking 5. Basic Security 6. Software 7. Basic Programming 8. Web Technologies 9. Troubleshooting COURSE LEARNING OBJECTIVES By the end of this course, you should be able to: 1. Identify the evolution of computers and different types of computers. 2. Convert numbers between binary, decimal, and hexadecimal number systems. 3. Explain the purpose, functions, and characteristics of a CPU. 4. Describe the physical components of a computer and various input and output devices, including storage and memory. 5. Describe the function of BIOS and the booting process of a computer. 6. Describe basic operating system architecture, its components, and storage management. © ITT Educational Services, Inc. All Rights Reserved. [2] 6/15/15 IT1115 Introduction to Information Technology Syllabus 7. Describe basic types of computer network topologies and connections...

Words: 12527 - Pages: 51

Free Essay

Micro Soft

...INSTITUTION OF CONTINUING EDUCATION (I.C.E) RIVERS STATE COLLEGE OF ARTS AND SCIENCE RUMUOLA, PORT HARCOURT. NAME: JOSHUA JAKES DEPARTMENT: SAFETY AND SECURITY MANAGEMENT COURSE TITLE: HEALTH RELATED PROBLEMS IN WORK PLACES COURSES CODE: KSS 207 Assignment on. Explain 5 ways were by management can promote and Maintain the health of workers JUNE, 2014 Hard disk drive "Hard drive" redirects here. For other uses,. | A 2.5" SATA hard drive | | | Invented by | | A disassembled and labeled 1997 HDD laying atop a mirror.   Overview of how an HDD functions A hard disk drive (HDD)[b] is a data storage device used for storing and retrieving digital information using rapidly rotating disks (platters) coated with magnetic material.[2] An HDD retains its data even when powered off. Data is read in a random-access manner, meaning individual blocks of data can be stored or retrieved in any order rather than sequentially. An HDD consists of one or more rigid ("hard") rapidly rotating disks (platters) with magnetic heads arranged on a moving actuator arm to read and write data to the surfaces. Introduced by IBM in 1956,[3] HDDs became the dominant secondary storage device for general purpose computers by the early 1960s. Continuously improved, HDDs have maintained this position into the modern era of servers and personal computers. More than 200 companies have produced HDD units, though most current units are manufactured by Seagate, Toshiba and Western Digital...

Words: 4503 - Pages: 19

Free Essay

Fsfdfdfd

...Oracle VM VirtualBox R User Manual Version 5.0.0 c 2004-2015 Oracle Corporation http://www.virtualbox.org Contents 1 First steps 1.1 Why is virtualization useful? . . . . . . . . . . . . . . . 1.2 Some terminology . . . . . . . . . . . . . . . . . . . . . 1.3 Features overview . . . . . . . . . . . . . . . . . . . . . 1.4 Supported host operating systems . . . . . . . . . . . . 1.5 Installing VirtualBox and extension packs . . . . . . . . 1.6 Starting VirtualBox . . . . . . . . . . . . . . . . . . . . 1.7 Creating your first virtual machine . . . . . . . . . . . 1.8 Running your virtual machine . . . . . . . . . . . . . . 1.8.1 Starting a new VM for the first time . . . . . . 1.8.2 Capturing and releasing keyboard and mouse 1.8.3 Typing special characters . . . . . . . . . . . . 1.8.4 Changing removable media . . . . . . . . . . . 1.8.5 Resizing the machine’s window . . . . . . . . 1.8.6 Saving the state of the machine . . . . . . . . 1.9 Using VM groups . . . . . . . . . . . . . . . . . . . . . 1.10 Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . 1.10.1 Taking, restoring and deleting snapshots . . . 1.10.2 Snapshot contents . . . . . . . . . . . . . . . . 1.11 Virtual machine configuration . . . . . . . . . . . . . . 1.12 Removing virtual machines . . . . . . . . . . . . . . . . 1.13 Cloning virtual machines . . . . . . . . . . . . . . . . . 1.14 Importing and exporting virtual machines . . . . . . . 1.15 Global Settings . . . . . . . . . . . . . . . . . . . . . ....

Words: 143714 - Pages: 575

Premium Essay

Apple, Inc. Case Analysis

...APPLE, INC. CASE ANALYSIS Written by: Jessica A. Mahfoudi AMBA 640 Dr. Larry Williams University of Maryland University College February 25, 2013 This page is intentionally blank   EXECUTIVE SUMMARY Management Information Systems allow companies to remain competitive in today’s fast-paced world and especially when conducting business on the Internet. Organizations must adapt to technological advances and innovations to keep pace with today’s rapidly changing environment (Baltzan, 2012). Every day there is some type of new technology, new internet site, new software or hardware program that someone is learning how to use. Apple, being a major technology company needs to keep up with these advances to keep their customers happy. This paper focuses on Apple, Inc., its competitive advantage and the challenges Apple faces to stay in the top of consumer reports. Data, information, business intelligence and knowledge are discussed and how they are relevant to the production of Apple products. Knowledge cannot be acquired until data, information and business intelligence are researched. The paper then goes on to discuss Porter’s Five Forces Model and how it is applied to Apple, Inc. and its products. Apple has lowered the threat of substitute products by including a great variety of features on all of their products. Since the original iPhone's release about four years ago, the threat of substitute products or services has greatly decreased...

Words: 4317 - Pages: 18

Free Essay

Monitoring Section

...Chapter1 ------------------------------------------------- Introduction RFID is an acronym for Radio Frequency Identification. In general terms, RFID is a means of identifying a person or object using a radio frequency transmission. In other words RFID is an electronic method of exchanging data over radio frequency waves. The technology can be used to identify, track, sort or detect a wide variety of objects. In this project RFID is used for the Tracking purpose for stolen things. An embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the device or system it controls. Unlike a general-purpose computer, such as a personal computer, an embedded system performs one or a few predefined tasks, usually with very specific requirements. Since the system is dedicated to specific tasks, design engineers can optimize it, reducing the size and cost of the product. Embedded systems are often mass-produced, benefiting from economies of scale. Security over the years has been a source of concern to organizations and companies. This has caused quite a significant amount of capital being budgeted for improvements on security systems, simply because it has been discovered that the access control system mechanism is an important part of an organization. One of the important security systems in building, vehicle security is door access control. The door access control is a physical security that assures the security of a building or vehicle...

Words: 10647 - Pages: 43

Free Essay

Tablet

...Tablet computer iPad (1st generation), a tablet computer A tablet computer, or simply tablet, is a mobile computer, larger than a mobile phone or personal digital assistant, integrated into a flat touch screen and primarily operated by touching the screen and instead of using a physical keyboard it often uses an onscreen virtual keyboard. A tablet computer may be connected to a keyboard with a wireless link or a USB port. Convertible notebook computers have an integrated keyboard that can be hidden by a swivel joint or slide joint, exposing only the screen for touch operation. Hybrids have a detachable keyboard so that the touch screen can be used as a stand-alone tablet. Booklets include dual-touchscreens, and can be used as a notebook by displaying a virtual keyboard in one of them. An early information tablet concept, named the Dynabook, was described by a Xerox scientist Alan C Kay, in his Aug 1972 paper: A Personal Computer for children of all Ages, the paper proposes a touch screen as a possible alternative means of input for the device. The first commercial portable electronic tablets appeared at the end of the 20th century. In 2010, Apple Inc. released the iPad which became the first mobile computer tablet to achieve worldwide commercial success. The iPad used technology similar to Apple's iPhone. Other manufacturers have produced tablets of their own including Samsung, HTC, Motorola, RIM, Sony, Amazon, HP, Microsoft, Google, Asus, Toshiba, and Archos. Tablets use a variety...

Words: 6265 - Pages: 26

Free Essay

Cis 210 Assignment 1

...Vik Shingadia CIS 210 4/19/15 Week 2: Assignment 1 Mark Stone Contents Introduction: 4 The Required Equipments : 4 Maintenance : 6 The Total Cost involved In The Creation The System : 8 Workflow Diagram : 9 Conclusion : 10 References : 11 Introduction: During dinner my sister talked about how she was frustrated with having to manually tack and reorder high demand items. She asked me if I could help her with an automated system, but has a very small budget. These days particularly in the past 10 years, even many smaller businesses have understood that computerized inventory management systems are very useful, accurate and make their jobs much easier than doing the same things manually. Inventory control is important to assure control in businesses that handle transactions revolving around consumer goods. The inventory control system must be able to warn the vendor when one of the items in the store is going to be out of stock soon and make the person who handles this kind of thing reorder (if it is a good system of course), otherwise maybe one day some important items can be out of stock, affecting the business negatively. Simply saying “we don't have that stuff right now”, is somewhat less than fully professional. The Required Equipments : Inventory management technology is a mix of hardware and software designed to add reliability to inventory accounting, reduce incidents of theft and facilitate inventory audits. Individual...

Words: 1570 - Pages: 7

Free Essay

Improving Byzantine Fault Tolerance Using Concurrent Information

...Table of Contents 1) Introduction 2) Related Work 3) Design 4) Implementation 5) Performance Results 5.1) Hardware and Software Configuration 5.2) Experiments and Results 6) Conclusion 1 Introduction Many computational biologists would agree that, had it not been for stable theory, the exploration of symmetric encryption might never have occurred. Given the current status of signed symmetries, systems engineers daringly desire the analysis of gigabit switches, which embodies the significant principles of networking. Further, compellingly enough, indeed, compilers and reinforcement learning have a long history of agreeing in this manner. Contrarily, suffix trees alone can fulfill the need for the producer-consumer problem. Cyberneticists largely study telephony in the place of the deployment of architecture. The usual methods for the visualization of virtual machines do not apply in this area. Nevertheless, this solution is continuously well-received. This is a direct result of the analysis of compilers. Thusly, we see no reason not to use the partition table [1] to improve wireless archetypes. In order to fulfill this purpose, we propose a framework for metamorphic communication (WABBLE), confirming that the Turing machine and forward-error correction are continuously incompatible. The disadvantage of this type of method, however, is that the acclaimed authenticated algorithm for the refinement of spreadsheets [2] runs in W(n) time....

Words: 2744 - Pages: 11

Free Essay

Nabs

...TERM PAPER NAND and NOR Flash Memory -by Shashank Chaudhay 2010EE10480 Abstract- This term paper is an introduction to the flash memory devices both NAND and NOR. This includes - history of flash memory - how it works - NOR flash memory type - NAND flash memory type - differences between them - limitations of flash memory 1. Introduction Two main technologies dominate the non-volatile flash memory market today: NOR and NAND. Flash memory (both NOR and NAND types) was invented by Dr. Fujio Masuoka while working for Toshiba circa 1980. According to Toshiba, the name "flash" was suggested by Dr. Masuoka's colleague, Mr. Shōji Ariizumi, because the erasure process of the memory contents reminded him of the flash of a camera. NOR flash was first introduced in market by Intel in 1988, revolutionizing a market that was then dominated by EPROM and EEPROM devices. NAND flash architecture was introduced in the market by Toshiba in 1989.Most hardware engineers are not familiar with the differences between these two technologies. In fact, they usually refer to NOR architecture as “flash”, unaware of NAND flash technology and its many benefits over NOR. This is mainly due to the fact that most flash devices are used to store and run code (usually small), for which NOR flash is the default choice. Unlike Dynamic Random Access Memory (DRAM), Flash memory is non-volatile. Non-volatile memory retains data even without being powered-on. For example, when a computer...

Words: 3467 - Pages: 14