This essay 56Kbps Modem has a total of 5208 words and 31 pages.
On September 10, 1996, Rockwell Semiconductor Systems shocked the communications industry with its announcement of a revolutionary new dial up modem technology for communicating across the Public Switched Telephone Network (PSTN) at rates up to 56 Kbps*. Since that time, Rockwell’s 56Kbps technology has been supported and adopted by most of the communications related companies in the world as the way to communicate at rates up to 56Kbps.
Prior to this announcement, the modem communications industry had convinced itself that communications across the PSTN were limited by Shannon’s Theorem to rates below 35Kbps. Although Rockwell published a white paper describing its 56Kbps technology shortly after the public announcement, and submitted its technology for standardization to both the ITU and the ANSI TR30 committees, there have been continual requests for an in-depth discussion of how
the technology works, with particular emphasis on how this technology gets around the so-called Shannon Limit. This paper
attempts to address these issues.
Before describing how Rockwell’s 56Kbps technology works, let me first discuss how a traditional analog voice band modem works.
The voice band telephone channel is a bandpass channel, traditionally thought of as operating from about 300 Hz to 3,000 Hz.
Modem modulations, therefore, had to operate within this band. Early modems used tones (e.g., FSK) which fell within this frequency band for communicating data but the information density was not very high (the number of bits per hertz was significantly less than one).
Quadrature amplitude modulation (QAM) was a significant improvement, offering information densities of multiple bits per hertz.
Figure 1: Approximate frequency response of the filters associated with the codec in the line card.
[ Back to top of page ]
An ordinary telephone call will go through at least two of these filters, causing significant high frequency rolloff, usually 35 dB or more at 4Khz.
QAM operates by modulating a carrier sine wave signal in both amplitude and phase. Each unique combination of amplitude and phase is known as a "symbol". In the general case, a symbol is defined as an information carrying token which is sent from the transmitter to the receiver.
In the early days of modems, these tokens were called "baud" in honor of the French inventor Emile Baudot who, in 1875, invented a 5 bit code for representing the alphabet. Each 5 bits were a token communicating a letter of the alphabet or a control code. Recently, however, the term baud has become corrupted in common usage, with people using baud to mean bits per second. This is a throwback to the early days of modems when a baud carried only one bit (so the baud rate and the bit rate were the same). Thus, 300 bit per second modems became 300 baud modems in techie-talk. The problem is
that after a baud started carrying multiple bits, people were still using baud to mean bits per second. For modem designers, hearing someone describe a modem as a "9600 baud" or a "28.8 baud" modem is like fingernails on a blackboard. To avoid this, the modem cognoscenti began using the term "symbol".
Now, when you modulate a sine wave, the resulting signal is no longer a single frequency sine wave. The resulting signal will be a range of frequencies, related to the signal which is modulated onto the carrier. Assuming random bits, the bandwidth of a modulated QAM signal is equal to the symbol rate. That is, if you send 2400 symbols per second, the bandwidth of the modem signal will be 2400 hz. The V.32 modulation, for example, uses a carrier of 1800 hz and a symbol rate of 2400 symbols per second. The bandwidth of the signal, therefore, is from 600 hz to 3000 hz.
Over time, modem designers began to realize that the telephone network was getting better and that more bandwidth was available. Newer modem modulations began to take advantage of these higher bandwidth channels. The highest V.34 rate, for example, uses a carrier of 1959 hz, and a symbol rate of 3429 symbols per second, giving a bandwidth from about 244 hz to 3674 hz.
QAM, you’ll recall, is a modulation of a signal in both amplitude and phase. And when you talk of amplitude and phase, you immediately think of vectors. It turns out that modem designers use the concept of vectors to visualize the
Topics Related to 56Kbps Modem
Data transmission, Noise, Digital signal processing, Digital audio, Modulation, Modem, Symbol rate, Quadrature amplitude modulation, Signal-to-noise ratio, Baud, Analog-to-digital converter, Bit rate
Essays Related to 56Kbps Modem
Porsche Porsche I have narrowed down my project to just Porsche vehicles. I am not going to talk about the man behind the car to much. I have found several web sites that have criteria about Porsche and their different models and their performance. I will discuss these subjects along with others. The history of Porsche will be discussed. I will also talk about some different models such as the 911 GT3. I will also discuss the GT1 and GT3 race seriesI will also discuss Porches latest press releases. His
Frito-Lay Frito-Lay 1 This paper's intent is to answer the questions found at the end of the case study IT Helps Keep Frito-Lay in the Chips. We plan to identify the key input and output devices used in Frito-Lay's information system. Also, the steps that the IT professionals at Frito-Lay took to create a system that would be easy to use as well as what steps we would take as managers to introduce the employees to the information system that will be discussed. The question of how will Frito-Lay's info
World War II World War II In the early morning hours of September 1, 1939, the German armies marched into Poland. On September 3 the British and French surprised Hitler by declaring war on Germany, but they had no plans for rendering active assistance to the Poles. The Battle of Britain In the summer of 1940, Hitler dominated Europe from the North Cape to the Pyrenees. His one remaining active enemy—Britain, under a new prime minister, Winston Churchill—vowed to continue fighting. Whether it could was quest
The Effect of Viewing Television Violence on Childhood AggressionThe Effect of Viewing Television Violence on Childhood Aggression Abstract There is a great deal of speculation on the effect television plays in childhood aggression. Two contrasting views regarding this issue are violent television increases aggressive behavior and violent television does not increase aggressive behavior. Later research demonstrates there may be other intervening variables causing aggression. These include IQ, social class, parental punishment, parental aggression, hereditary,
Internet History Internet History Starting out as a small military experiment some 35 years ago, the Internet is quickly becoming one of the most popular forms of communication. With a present population of about 40 million users world wide, it seems to have a very promising future. Uncensored and almost impossible to monitor, it's a breeding ground for all sorts of offensive and derogatory information. On the other hand, it is probably the biggest single source of data in the world brought home into your perso
What is a V chipWhat is a V-chip This term has become a buzz word for any discussion evolving telecommunications regulation and television ratings, but not too many reports define the new technology in its fullest form. A basic definition of the V-chip; is a microprocessor that can decipher information sent in the vertical blanking of the NTSC signal, purposefully for the control of violent or controversial subject matter. Yet, the span of the new chip is much greater than any working definition can encompass.
The soaring volume of international finance and increased interdepende The soaring volume of international finance and increased interdependence in recent decades has increased concerns about volatility and threats of a financial crisis. This has led many to investigate and analyze the origins, transmission, effects and policies aimed to impede financial instability. This paper argues that financial liberalization and speculation are the most reflective explanations for instability in financial markets and that financial instability is likely to be transmitted glo
On October 3 1990 the states of the German Democratic Republic East Ge On October 3, 1990, the states of the German Democratic Republic (East Germany) shed their last ties to their Soviet created structure and joined the Federal Republic of Germany (West Germany). The 23rd article of West Germany's 1949 constitution, the Basic Law, had been drafted specifically to allow for such an arrival from the East. But as the 1980s drew to a close, few Germans on either side of the border expected it to be used in their lifetime. Yet, in less than a year the beginning of an
INTRODUCTION INTRODUCTION Human beings have always been fascinated by flight. Cave people carved, sculpted, and painted winged creatures soaring through the sky. Greek mythology tells of the winged horse Pegasus, ancient Persian myths tell of winged bulls that guarded the royal halls, and a 4000 year old Chinese story, from the Annals of The Bamboo Books, describes how the Emperor Shun escaped from captivity by donning the work-clothes of a bird. People struggled for centuries to make human flight a reali
The Bush Administration's Relation With Iraq Prior to Iraq's Invasion The Bush Administration's Relation With Iraq Prior to Iraq's Invasion of Kuwait: Credibility and Misperception Prior to the August 2, 1990 invasion of Kuwait on the part of Iraq, the United States had questionable relations with Iraq dictator, Saddam Hussein, to say the least. In retrospect, which is inherently advantageous as a 20/20 perspective, questions remain unanswered as to whether or not the United States was too appeasing to Saddam Hussein in the years, months, and days leading up to t
Digital photography which is also called digital imaging since it does Digital photography, which is also called ‘digital imaging’ since it does not involve the use of film started in the sixties. The original development of the technology is at NASA when they required that exploration spacecraft, unable to return to earth, to be capable of sending back pictures of their voyages. The digital camera, like the standard film camera, uses a lens to focus the image on a sensor. The usual film camera depends on a film to capture the image but the digital relies on a sen
What HDTV Is What HDTV Is Digital describes electronic technology that generates, stores, and processes data in terms of two states: positive and non-positive. Positive is expressed or represented by the number 1 and non-positive by the number 0 (Lasica). Data that is transmitted or stored with digital technology is expressed as a string of 0's and 1's. Each of these digits is referred too as a bit (and a string of bits that a computer can address individually as a group is a byte). Prior to digital technol
This lesson describes the Usenet culture and customs that have This lesson describes the Usenet culture and customs that have developed over time. It is the people participating in Usenet that make it worth the effort to read and maintain; for Usenet to function properly those people must be able to interact in productive ways. This document is intended as a guide to using the net in ways that will be pleasant and productive for everyone. This lesson is not intended to teach you how to use Usenet. It is a guide on how to use Usenet politely, effectively an
Are you Protected Are you Protected? In this day and age, computers have become a common necessity of everyday life. Anyone who has not joined in this new era of technology will soon be left in the dark ages. Along with the computer advancement has come the Internet, which is an intricate connection of millions of computers around the world. The Internet has become today's form of communication, totally reinventing the mail system, telephones and even business meetings. With these great new advantages come many
Instant global radio or Web radio is the latest manifestation of the I Instant global radio, or Web radio, is the latest manifestation of the Internet’s multimedia successor, the World Wide Web. Improved technology and content are turning Web radio into a mass medium. (Hickman 30) The Web radio concept is mainly underlined by the concept of Webcasting, or broadcasting station content over the Internet. Online users who visit the Web pages of Webcasting stations can find archived and live audio covering news, business, sports, and many different types of music. (Th
Dell New Horizons Dell – New Horizons I Introduction and scope of work............................................................................................. 3 I.1 Introduction................................................................................................................... 3 I.2 Scope of Work.............................................................................................................. 3 II Marketing mix.......................................................................
Key Definitions TermsKey Definitions Terms • The Enterprise – Corporate entities dispersed geographically • Departments – A single organization within a corporate entity • Technology Diffusion - Processes or methods that enable technology to permeate a particular segment of society (Gross and Ryan, 1942). • Technology Acceptance - Defined or measured by the end-users' willingness to embrace and utilize a new technology in preference to an old technology (Davis, 1989) • Technology Adoption - A process that takes plac
Sonys History - Through The Eyes of the Companys Leaders Sony’s History - Through The Eyes of the Company’s Leaders Sony was founded in 1946 by Masaru Ibuka and Akio Morita. The two complemented each other with a unique blend of product innovation and marketing savvy, and formed a company that would eventually grow into a more than $60 billion global organization. In 1950, in post-war Japan, Ibuka and Morita created Sony’s first hardware device, a tape player/recorder called the G-TYPE recorder. Materials were in such high demand that the first tapes
Published Word of Mouth Referable Consumer-Published Word of Mouth: Referable, Consumer- Generated Information on the Internet April 2002 Published Word of Mouth: Referable, Consumer- Generated Information on the Internet Abstract Consumer-to-consumer communication about products and services, often known as “word of mouth” (WOM), is an important source of marketplace information. The Internet is becoming an increasingly active medium for this type of communication. We describe the ways in which word-of-mouth information is communicated
How About A Little Snip SnipHow About A Little Snip, Snip? October 26, 2001 When a couple’s future plans do not include the possibility of children, they may conclude that surgical sterilization is the best option for preventing pregnancy from occurring. Sterilization is also safer, easier, and a more effective method of birth control. Women can permanently end their chance of pregnancy through tubal ligation. The basic principle is to interrupt the fallopian tubes in order to prevent sperm from fertilizing an egg in the u
LYME DISEASE LYME DISEASE Biology 2051 4 April, 2000 The causative organism of Lyme disease is identified primarily by three genomic groups; Borrelia burgdorferi, B. garinii, B. afzelii, all three of the species are classified as spirochaetes that are nuetrophilic fastidious aerobes and are Gram negative(-). The medium used to grow these strains of Borrelia is Barbour-Stoenner-Kelly (BSK) agar and it grows at 33 C. Lyme disease is a tickborne, spirochetal, zoonotic disease that is characterized by distincti
SARSSARS http://www.info.gov.hk/gia/general/200401/08/0108195.htm Inter-departmental efforts to prevent return of SARS ********************************************* A specially convened inter-departmental meeting today (January 8) agreed to redouble cross-sectoral efforts to minimise the risk of the return of SARS in Hong Kong. Chaired by Secretary for Health, Welfare and Food Dr Yeoh Eng-kiong, the meeting noted there had been three confirmed SARS (Severe Acute Respiratory Syndrome) cases since the
Following the progress of an enzyme-controlled reactionFollowing the progress of an enzyme-controlled reaction. Aim: To follow the progress of an enzyme-controlled reaction using starch solution and amylase. Hypothesis: It may be assumed that the longer the starch will be in contact with the enzyme the more starch will be converted into maltose. It can also be expected that the more substrate is digested into the break down product the lower color readings will be obtained with the colorimeter confirming the hypothesis that as time goes by the amyla
GlobalizationGlobalization We live in a time of worldwide change. What happens in one part of the world impacts people on all other sides of the world. People around the world are influenced by common developments. The term Globalization is used to describe this phenomenon. According to Harris, the term is being used in a variety of contexts. In a very broad context, media use it almost daily to refer to a wide variety of political, sociological, eviromental, and economic change. The business world, however,
HACKINGHACKING o Hacking in it self is not a crime. It is otherwise known as unauthorised access. o There are clubs devoted to hacking. In Germany, Holland etc, discuss techniques etc. o Much of hacking is treated as intellectual training. Costs us a lot of expenses to protect our computers. Companies spend millions of pounds protecting themselves. o A lot of hacking done by past employees seeing as they have passwords etc. insiders knowledge. o At one level the motive for the doing is the challenge. o
The impact of the Internet on our daily lifeThe impact of the Internet on our daily life There is a big influence of technique on our daily life. Electronic devices, multimedia and computers are things we have to deal with everyday. Especially the Internet is becoming more and more important for nearly everybody as it is one of the newest and most forward-looking media and surely “the” medium of the future. Therefore we thought that it would be necessary to think about some good and bad aspects of how this medium influences us, what impac
Nikola Tesla Man of LightningNikola Tesla: Man of Lightning Section 1: Introduction Nikola Tesla was born at midnight between July 9 and 10, 1856, in Similjan, a small Croatian village. Tesla’s father, an orthodox priest had insisted Tesla follow in his path. His mother was unschooled yet highly intelligent. Tesla’s brother, Dane, died at the age of twelve which upset Tesla greatly He became unusually preoccupied with the thought of death. (Beckhard 19), causing him to try and measure up to Dane's accomplishments. Tesla s
ISDN VS cABLE MODEMSISDN VS. cABLE MODEMS 1.0 Introduction The Internet is a network of networks that interconnects computers around the world, supporting both business and residential users. In 1994, a multimedia Internet application known as the World Wide Web became popular. The higher bandwidth needs of this application have highlighted the limited Internet access speeds available to residential users. Even at 28.8 Kilobits per second (Kbps)—the fastest residential access commonly available at the time of this
As a technology it is called multimedia As a revolution it is the sumAs a technology, it is called multimedia. As a revolution, it is the sum of many revolutions wrapped into one: A revolution in communication that combines the audio visual power of television, the publishing power of the printing press, and the interactive power of the computer. Multimedia is the convergence of these different professions, once thought independent of one another, coming together to form a new technological approach to the way information and ideas are shared. What will society l
DESIGNING A NETWORKDESIGNING A NETWORK I. STATEMENT & BACKGROUND The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) department. The CIS professors would be using the server for various operations. Assignments, e-mail, and other types of information would be easier for the students to access. Network users are able to share files, printers and other resources; send electronic messages and run programs on other computers. However, certain important issu
BURBANK BOARDSBURBANK BOARDS TABLE OF CONTENTS EXECUTIVE SUMMARY 3 PROBLEM DEFINITION 4 NEW SYSTEM OBJECTIVES 6 NEW SYSTEM CONSTRAINTS 7 NEW SYSTEM PERFORMANCE CRITERIA 8 TEXAS INSTRUMENT - COMPOSER 9 ENTITY-RELATIONSHIP DIAGRAMS 10 ACTIVITY HIERARCHY DIAGRAMS 11 EXECUTIVE SUMMARY Introduction Current System New System · objectives · recommendation · advantages of new system · how it will solve problems · implementation · tools used to document the new system ie.. ERD PROBLEM DEFINITION The main problem at Bu
Running Head Efficient Market TheoryRunning Head: Efficient Market Theory Efficient Market Theory: A Contradiction of Terms Daniel W. L. Wung Baker College Center for Graduate Studies Table of Contents Table of Contents i Abstract 2 Discussion 1-1 References A-1 Abstract According to the Efficient Market Theory, it should be extremely difficult for an investor to develop a “system” that consistently selects stocks that exhibit higher than normal returns over a period of time. It should also not be possible for a company to “cook t
The new Avionics Modernization Program AMP systems installed in the F- The new Avionics Modernization Program (AMP) systems installed in the F-111E and EF-111A have raised their share of questions, so I have decided to continue my series of Everything You Always Wanted To Know handouts to you pilots, navigators, and maintenance technicians on how the cotton-picken' thing works. This informational pamphlet is an overview of the GPS system as a whole, NOT the system- specific hardware that you find in your respective aircraft. I'll cover the basic theory of operat
Voice Communications Using Digital NetworksVoice Communications Using Digital Networks July 21, 1997 TABLE OF CONTENTS EXECUTIVE SUMMARY 1 INTRODUCTION 3 A BRIEF HISTORY OF VOIP 6 VOICE COMPRESSION TECHNOLOGY 10 VOICE DATATRANSMISSION 17 CURRENTLY AVAILABLE SOFTWARE 21 THE VALUE OF VOIP 42 THE FUTURE OF VOIP 45 SUMMARY 50 APPENDIX A 53 APPENDIX B 55 BIBLIOGRAPHY 56 TABLE OF FIGURES 59 Executive Summary The decade of the nineteen nineties is often labeled the information age. Few would argue against the statement timely information avail
TOUCH SCREENTOUCH SCREEN Touch screen: A computer screen designed or modified to recognize the location of a touch on its surface. It incorporates the use of a touch sensitive monitor to control all computer functions. There is no need for a keyboard or any prior computer experience. Every where you look today you see the power of touch at work. Touch Screens are being used in a variety of settings including Education, Medical, Point of Sale, Gaming, Manufacturing, Retail and information Kiosks. From your f
OBSTACLES TO THE INTEGRATION OF THE INTERNETOBSTACLES TO THE INTEGRATION OF THE INTERNET INTO AMERICAN SOCIETY Geography 100 Outline I. Introduction -- Internet usage is rapidly increasing but serious barriers to widespread integration must be overcome before the Internet is fully integrated into the “typical” American lifestyle. II. Brief history: ARPANET to Internet to WWW III. Barriers to widespread Internet use remain to be overcome. A. Internet Complexity B. Economics C. Security Issues IV. Concerns and Hopes Contrary to the marketin
Radio frequency identification RFID technology uses electromagnetic enRadio frequency identification (RFID) technology uses electromagnetic energy (radio) as a medium through which to send information. With RFID technology, one can tag things such as assets, animals, and people so that they may be identified or tracked automatically via a reader, which is frequently connected to a host computer that may contain additional data tied to the object's ID number. The tag contains programmed information about the object to which it is attached. The reader can then query
Virtual Reality - What it is and How it Works Virtual Reality - What it is and How it Works Imagine being able to point into the sky and fly. Or perhaps walk through space and connect molecules together. These are some of the dreams that have come with the invention of virtual reality. With the introduction of computers, numerous applications have been enhanced or created. The newest technology that is being tapped is that of artificial reality, or virtual reality (VR). When Morton Heilig first got a patent for his Sensorama Simulator
DESCRIPTION OF A NETWORK DESCRIPTION OF A NETWORK A network is the linking of two or more computers for the purpose of sharing data, programs and/or physical resources. · Examples: · Data Two people can work independently on the same project at different computers. By being connected to each other, there is no need for swapping floppy copies with the possibility of loss or old revisions creeping into the work flow. · Programs One copy of a program can be purchased and placed on one computer, and others connected may be
This paper is about data security and what is done to try to keep data This paper is about data security and what is done to try to keep data safe, especially on The Internet. The subject was chosen because it is very important in the information age of today. Also a majority of studies right now deal with Internet protocols and computer networking, for this reason I thought this paper would be beneficial to myself. Earlier computer systems based Dos, UNIX, Novell version 3.12, and certain earlier versions of Windows did not incorporate the kinds of security neede
Aids Aids Acquired Immune Deficiency Syndrome (AIDS), suppresses the immune system related to infection with the human immunodeficiency virus (HIV). A person infected with HIV gradually loses immune function along with certain immune cells called CD4 T-lymphocytes or CD4 T-cells, causing the infected person to become vulnerable to pneumonia, fungus infections, and other common ailments. With the loss of immune function, a clinical syndrome (a group of various illnesses that together characterize a d
Needle Exchange Programs Needle Exchange Programs More than a million people in the United States inject drugs, at a cost to society (in health care, lost productivity, accidents, and crime) of more than fifty billion dollars a year. (Holland n.p.). According to the Department of Health and Human Services, there were 216,000 heroin addicts nationwide in 1996, the latest year for which statistics are available.(Wickenheiser n.p.) One third of all AIDS cases are due to injection drug use. For women, sixty-four percent of
TRENDS IN TELECOMMUNICATIONS TRENDS IN TELECOMMUNICATIONS Several trends are occurring in the field of telecommunications that will affect the electronic communication of information over distance. Continued Growth of Photonics (Fiber Optics) The national telecommunications network will continue to grow in service and capacity. A dominant technology providing this increased capacity is light wave systems, or photonics. Photonics is the use of light for the transmission of information. These systems are used as the backbone
Digital technology is not a passing whim but an inescapable technologi Digital technology is not a passing whim, but an inescapable technological advancement. By the year 2006, The Federal Communications Commission (FCC) will have ordered all analog transmitters off the air. Before long, all broadcasters will commence with the employment of a revolutionary technology that will bring crystal-clear images and interactivity to television. However, the traditional set in the home will become obsolete, and consumer interest in its proposed replacement remains untested.
Hackers and Security What are the effects of Data Encryption and Firew Hackers and Security. What are the effects of Data Encryption and Firewalls? Over the last several years, the computer industry has grown to an all time high of technology and knowledge. With the existence of hackers, swift precautions are being taken. The placement of firewalls and the task of data encryption are becoming a necessary fact of business for those with confidential information. And still, this is not enough. Hackers have become so involved with the tasks of cracking firewalls and
Internet Concepts Internet Concepts Introduction to The Internet Millions of computer users access the Internet each day to shop, listen to music, view museum exhibits, manage their investments, follow current events, and send electronic mail to other computer users. Additionally, thousands of people are using the Internet at work and at home to view and download to their local computer files containing graphics, sound, video, and text. The World Wide Web, or WWW, a subset of the Internet, uses computers called
The Effects of Time Delay of Low-Earth-Orbit Satellite Communication The Effects of Time Delay of Low-Earth-Orbit Satellite Communication Nam Bo Department of Electrical and Computer Engineering California State Polytechnic University Pomona, California I. Introduction There are several types of orbits used by satellites in space. The most used orbit type is the geostationary satellite(GEO). It occupies an orbital position 36,000 km above the Earth, and remains in a stationary position about the Earth because it is orbiting at the same speed as the Earth . Th
What is the Mars Pathfinder mission The Mars Pathfinder Mission is the What is the Mars Pathfinder mission? The Mars Pathfinder Mission is the second launch in the Discovery Program, a NASA initiative for planetary missions with a maximum three-year development cycle and a cost cap around $150M (FY92) for development. The Jet Propulsion Laboratory, California Institute of Technology, Pasadena, California, manages the Mars Pathfinder for NASA. The mission is primarily an engineering demonstration of key technologies and concepts for eventual use in future missions
Individual viruses have evolved interesting and unique lifestyles One Individual viruses have evolved interesting and unique lifestyles. One consequence is that battles have been won or lost when a particular virus infected one army but not its opponent. Viruses have wiped out native populations of several continents. Entire countries have been changed geographically, economically, and religiously as a result of virus infections with no known cures. Spongiform Encephalopathies (Bovine, BSE), a somewhat new virus most common in cattle has been closely linked to Ku
Introduction Introduction For many years emergency dispatching for police, fire and emergency medical services was all done manually. Dispatchers were expected to talk on the telephone to the person calling, along with talking on the radio. They had to decide who and/or what units to send and keep track of all the responding units and their needs, keeping everything on just a pad of paper and a header card. The dispatcher also had to keep track of the other units within the system and their calls and needs.