How LTE Modems Make or Break a Smartphone
If you've ever gone through prolonged Web abstinence and found it debilitating, you should appreciate what modems do for one's well-being.
Modems (modulator/demodulators) are the cellphone devices that keep us connected to cyberspace. In advanced smartphones, LTE modems are required. Without modems, smartphones would be little more than personal information managers or personal digital assistants (PDAs) and I can recall almost total dependence on mine in the early ‘90s. And unconnected from the Internet, you could play only relatively simple games (e.g., Bejeweled?). Think of when you’re on an airplane without connectivity. In airplane mode, you’ll have no access to the Web or email, which also means no Facebook, no Instagram, no Periscope, and no Skype or Facetime. Prolonged Web abstinence can be debilitating for some, so they should appreciate what modems do for one’s well-being.
Smartphones consist of two main components: Modems and application processors. As mentioned, modems are your access to the outside world while application processors are basically CPUs that provide computation, video, graphics and sound associated with gaming, productivity and processing your outside world data. The measured performance of each of the two main components provides measures to assess the performance value of a smartphone. Of course, there are other concerns in purchasing a smartphone, like appearance, screen size, weight and even snob appeal.
To read the full article, click here
Related Semiconductor IP
- High bit rate Turbo Decoder core for 3GPP LTE/ LTE A
- LTE Turbo Decoder
- Complete FEC Encoder Solution compliant to LTE/ LTE A Specification
- LTE Rx Bit Chain
- LTE Turbo decoder
Related Blogs
- The Hidden Threat in Analog IC Migration: Why Electromigration rules can make or break your next tapeout
- How Innosilicon makes Fantasy a reality
- Qualcomm LTE Modem Competitors? Samsung, Intel, Mediatek, Spreadtrum, Leadcore... or simply CEVA!
- UFS or NVMe in Smartphone? See Apple's answer!
Latest Blogs
- ML-KEM explained: Quantum-safe Key Exchange for secure embedded Hardware
- Rivos Collaborates to Complete Secure Provisioning of Integrated OpenTitan Root of Trust During SoC Production
- From GPUs to Memory Pools: Why AI Needs Compute Express Link (CXL)
- Verification of UALink (UAL) and Ultra Ethernet (UEC) Protocols for Scalable HPC/AI Networks using Synopsys VIP
- Enhancing PCIe6.0 Performance: Flit Sequence Numbers and Selective NAK Explained
