Full Speed

[ June 28, 2006 ]

HSDPA vs. UMTS

With all of the new cellular standards and acronyms, I have been in the dark about a couple of things. Specifically, HSDPA and UMTS. If you don’t know what these are and don’t care to learn about them, you will probably want to stop reading now. :) I know that these are both high(er) speed wireless communications protocols. That was the easy part. I also know that they are both faster than EDGE, a protocol that I have frequently used with cellphones in times of broadband outage.

Now this question isn’t something that I have been really racking my brain on. It’s just been a curiousity lingering in the back of my mind that surfaces whenever I read about the fancy new phones that are becoming available. It seemed to me that the two acronyms were often loosely interchanged. And without digging around to find the differences, I was beginning to think that they were the same thing.

Finally, I posed a question to a couple of fellow Engadget Mobile readers tonight. And as I typically do, I hammered it out and clicked submit before even thinking about doing a tiny bit of research.

So, within five minutes, I found myself on Wikipedia reading about all of the gory details of HSDPA, or High-Speed Downlink Packet Access. I found that I already knew some of this information, such as the fact that the protocol supports downlink speeds of up to 14.4 Mbit/s. (Wow!)

The real benefit for me from the Wikipedia article on HSDPA was mostly in the first paragraph:

HSDPA provides a smooth evolutionary path for Universal Mobile Telecommunications System (UMTS) networks allowing for higher data capacity. It is an evolution of the W-CDMA standard, designed to increase the available data rate by a factor of 5 or more. HSDPA defines a new W-CDMA channel, the high-speed downlink shared channel (HS-DSCH) that operates in a different way from existing W-CDMA channels, but is only used for downlink communication to the mobile.
Whew! In addition to the above, the UMTS page on Wikipedia says that UMTS “uses W-CDMA as the underlying standard.” Ok, so I’m seeing this as a progression: WCDMA→UMTS→HSDPA. The newer standards are evolutions of the older standards, using and expanding upon previous protocols. Elsewhere, I confirmed the following:
HSDPA is compatible with EDGE and is fully backwards compatible with WCDMA, and enterprise and rich multimedia applications developed for WCDMA will work with HSDPA. Most UMTS vendors support HSDPA.
So here are my conclusions:
  1. HSDPA and USDPA devices should work on WCDMA networks and will possibly work on UMTS networks.
  2. HSDPA devices should work on a UMTS network, but the reverse is not true.
  3. HSDPA is blazing fast
  4. As with most other wireless systems here in the US, we use different frequencies than other parts of the world. Don’t count on your shiny new phone to work with one of these 3G protocols both at home and in other parts of the world.
  5. If given a choice, pick an HSDPA device.
These conclusions may be a bit off, but I feel that my questions have been answered. I didn’t get into EV-DO, as that is a protocol that isn’t offered by the GSM providers here and thus isn’t an option for me. Cingular is said to be planning to offer the Samsung SGH-ZX20 in the near future. That is looking like a winning option for early adopters and bandwidth freaks.

11:30 PM :: #

[ November 2, 2005 ]

[ August 22, 2005 ]

SSHKeychain

A while back, I posted a link to SSHKeychain, an OS X tool that acts as a user-friendly graphical interface to the ssh agent. I didn’t begin to use this tool until a few weeks ago. It had been on my short list of new software that I needed to try, but I kept putting it off.

Well, I finally tried it, and I really like it! It just doesn’t get any easier than this. This is such a simple piece of software, but I don’t know how I have lived without it for so long.

First of all, the idea behind the ssh agent is to save time. The agent caches your public keys and uses them to log you in to servers. These keys are normally stored on your hard drive in an encrypted format. When loading them into the agent, they are first decrypted.

In order to use public key ssh authentication without an agent, you would have to type in the key password and then wait for the key to be decrypted before any authentication could take place. Or you could store unencrypted keys on your hard drive, but that’s not something that I want to do on a laptop. So the agent really makes a lot of sense, even if it’s just to save those few keystrokes each time I connect.

But this tool goes a bit further than an ordinary agent. It automatically adds your ssh private keys to the agent when you need them. Automatically. Even if your keys aren’t in the agent when you type your ssh command, they are added when you first use them. With other agents, you have to be sure that you manually load the keys before you ssh. This tool eliminates the need to even think about loading the keys.

Your key passwords are stored in your keychain, the standard OS X password store. This means that you truly have single signon. Log in to your Mac, and you are logged in to all of your servers, too.

And it is integrated so well that I don’t ever notice its presence. In fact, other than typing my password once to unlock my keychain after logging in to my iBook, the only thing I notice is that I don’t have to type passwords to log in to my servers any more. I have not clicked on the SSHKeychain icon on the menu bar once since I first installed it.

But best of all, it is completely free. And the source is available. It is actually donationware, so if you like, be sure to let the author know.

The tool also has support for tunnels, but as of this writing, I have not used that part yet. I am a huge fan of ssh tunnels, so I am sure that I will have more to say about this part soon.

8:42 PM :: #
© 2014 Scott Johnson (info)
• •