Académique Documents
Professionnel Documents
Culture Documents
mice/keyboard are connected directly to the computers peripheral input via a cord and the computers main power powers it, wireless mice/keyboard are becoming extremely popular as they give computer users cordless accessibility to their mice/keyboard and their computer.
RF Transmitter
A radio frequency (RF) transmitter is usually integrated inside the mouse/keyboard. The mouse/keyboard records its movements and buttons that are clicked and then sends this information via radio signals to the receiver.
RF Receiver
The radio frequency (RF) receiver usually connects to the computers peripheral mouse input. It receives these RF signals, decodes them, and then sends these signals directly to the computer as normal. RF receivers usually come in a few styles. The majority come as built in components that connect to the mouse/keyboard input, others come as a separate card that is installed in one of the many expansion slots of computers, and the third type of receiver is a separate unit that is connected to a cable going directly to the computers peripheral input. Since the technology has been mastered, most wireless mice/keyboard have integrated receivers that plug into a computers peripheral input and are very small in size.
RF Frequencies
Bluetooth RF
Another technology that is emerging and is used in wireless mice/keyboard is Bluetooth RF technology. Bluetooth is commonly known to connect computers to peripherals such as keyboards, printers, PDAs, and headsets. Bluetooth is similar to 802.11b and 802.11g in that it uses 2.4 gigahertz frequencies. However, it also uses software called adaptive frequency hopping to choose frequencies that have no or little interference. Sometimes 802.11b and g receive interference from home appliances such as microwave ovens and cordless telephones. Bluetooth also has decent range, usually about 33 feet.
Security
Security is always an issue when sending information over the air. Most mice/keyboard effectively secure information by encrypting data. Other methods include frequency hopping to prevent hacking or eavesdropping.