Skip to main content

How does Global Positioning System work?

The U.S. military developed and implemented GPS satellite network as a military radio-navigation system to figure out the exact position on the earth.
It’s made up of three parts: satellites, ground stations, and receivers.
GPS is  a constellation of 27 Earth-orbiting satellites (24 in operation and three extras in case one fails). Each satellite is built to last about 10 years. Each one transmits information about its position and the current time at regular intervals.These satellites make two complete rotations around the globe everyday such that at any point of time atleast four satellites are visible to the receiver.
The basis of GPS is "trilateration".Trilateration is a method of determining the relative positions of objects using the geometry of triangles.In order to make this simple calculation, the GPS receiver has to know the location of at least three satellites and the distance between our receiver and each of those satellites.
The signals, moving at the speed of light, arrive at a GPS receiver at slightly different times because some satellites are further away than others.Distance to a satellite is determined by measuring how long a radio signal takes to reach us from that satellite.
To make the measurement we assume that both the satellite and our receiver are generating the same pseudo-random codes at exactly the same time.By comparing how late the satellite's pseudo-random code appears compared to our receiver's code, we determine how long it took to reach us.
Multiply that travel time by the speed of light and we've got distance.When the receiver estimates the distance to at least four GPS satellites, it can calculate its position in three dimensions.


Comments

Popular posts from this blog

Fatal exception errors and how to fix them

              'A fatal exception XY has occured at xxxx:xxxxxxxx' What is it? A fatal exception error is an error that causes a program to abort,returning the user to the operating system.When program encounters an exception that is invalid or unknown,fatal exception error(fatal 0E) is thrown.It mainly occurs during the computer's booting process,shutdown process or while trying to launch a program in windows.The processor exception(XY value) ranges from  00 to 0F. xxxx:xxxxxxxx represents the 32-bit address where the actual exception has occured. 00-Divide fault 02-NMI interrupt 04-overflow trap 05-bounds check fault 07-coprocesser not available 08-double fault 09-coprocesser segment overrun 0A-invalid task state segment 0B-Not present fault 0C-stack fault 0D-general protection fault 0E-page fault 10-coprocessor error fault 11-Alignment check fault When it occurs? Attempting an illegal instruction or operation accessing junk or non-working secti

Everyday Cloud !!

Cloud Computing - delivering hosted services over the Internet. Cloud computing is getting IT services, such as email, customer relationship management or web conferencing, over the internet.Instead of buying hardware and software up front, you pay a monthly charge based on the number of users.In simple words,when you  type a query into Google, the computer does nothing with regards to answer, it's just a messenger. The words you type are sent over the Net to one of Google's numerous clustered PCs, which find  your results and send them promptly back to you. The real work in finding your answers might be done by a computer sitting in California, Dublin, Tokyo, or Beijing!!Preparing documents over the Net is a newer example of cloud computing. Simply log on to a web-based service such as Google Documents and you can create a document, spreadsheet or presentation. Instead of typing your words into a program like Microsoft Word or OpenOffice, running on your computer, you're

WHAT ARE SIM CARDS USED FOR

A SIM - short for Subscriber Identity Module - is a piece of plastic that slots into your  mobile phone.It acts as your unique ID and helps you  connect to, make calls over  a particular mobile phone network.Most SIM cards have a capacity between 32 to 128 KB.They store contacts and messages which can be transferred easily from one mobile to another. SIM also stores the ‘key’ needed to decrypt data that is encrypted when voice is trransfered from a phone to another.A unique ID called the IMSI (International Mobile Subscriber Identity)  is used to connect someone calling your mobile number to your phone. GSM phones are the ones that utilize SIM cards .The most important bits of data include the IMSI (International Mobile Subscriber Identity) and the authentication key that validates the IMSI. This authentication key is provided by the carrier SIM authentication goes like this: On startup, the phone obtains the IMSI from the SIM card and relays it to the network,known as“request for