• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Set-top Box : The Technology Behind

By Abhishek Ghosh December 5, 2012 8:24 am Updated on December 5, 2012

Set-top Box : The Technology Behind

Advertisement

Set-top box or STB in short is a consumer electronics product with which a TV is connected and it offers the user additional usages than direct cable line. Some types of Set-top Box also require a satellite receiver for proper function of the main unit. There are different types of interfaces in these Set-top Box models in order to connect to the television sets and additional Set-top Box recorders.

 

Set-top Box : The Basics

 

As this article on Set-top Box is for the consumers, not really of our niche, we will not to much technical details. We will touch the major important points. There are basically three types of Set-top Box modules:

 

  1. Active : Provides the basic functions. The name active is actually a misnomer.
  2. Passive : Adds the capabilities of the basic Active unit, but that do not themselves provide new features.
  3. Bidirectional : Provides both active and passive functions like all types of recording options.

 

Set-top Box can play media like DVD if they are interactive, the recording of received data varies widely (like satellite , internet etc.) or methods (digital, analog, encrypted or non encrypted). Nowadays there are TV models with integrated DVD drives, or DVB -receiver (s) so Set-top Box selection is an important point. Exotic Set-top Box receives data from weather stations and at least has basic Internet access option. And external advertising filter and home automation controls are usually provided.

Advertisement

---

 

Set-top Box : Connectors

 

Set-top Box
Image : Semi-Shattered image of a Set-top box, adapted from Wikimedia and modified by Dr. Abhishek Ghosh by labeling. Licensed under GNU GPL 2.0.
 

There are different types of interfaces in order to connect to the television sets and Set-top Box. The classic universal method is to use a UHF modulator via a coaxial antenna cable. So there are analog connector and protocol as well as S-video option. Audio inputs and outputs are often through RCA jacks or running plugs. For digital image and data transfer, the industry relies on DVI, FireWire (IEEE 1394), Ethernet, HD-SDI and HDMI. For information on these connectors, please read our specific article on Audio and Video Connectors.

 

Abhishek-Ghosh Tagged With set top box

This Article Has Been Shared 563 Times!

Facebook Twitter Pinterest
Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Orthopaedic Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Set-top Box : The Technology Behind

  • Install WordPress on Ubuntu or Debian PC Guide

    Install WordPress on Ubuntu or Debian PC is actually very easy. Its just running some commands from Terminal and here is full guide with Screen shots to help.

  • Installing OpenPanel on localhost (Ubuntu PC)

    Installing OpenPanel on localhost or actually your Ubuntu PC can be used for installation and management of various web softwares through a control panel.

  • Cloud Computing : Your Concerns and Thoughts of Richard Stallman

    Cloud Computing as terminology raises the eyebrows of some users who are associated with academics and computing for many years. Let us discuss on the topic.

  • Linux : Basics About Unix-like OS

    Linux referred to the usually free, unix-like Operating systems based on the Linux kernel and is GNU GPL based software. Licensing of the Linux kernel is under GNU GPL.

  • Six Steps for Cloud Security

    Learn how to protect security and privacy with our guide six steps for cloud security. Digitization of companies has increased, but often it lacks basic security.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

You can subscribe to our Free Once a Day, Regular Newsletter by clicking the subscribe button below.

Click To Subscribe

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (21K Followers)
  • Twitter (5.3k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Basics of Data Protection on the Internet March 2, 2021
  • What is Standard Software February 28, 2021
  • WordPress Link to text Fragment February 27, 2021
  • How to Protect IP Cameras From Hackers February 25, 2021
  • 6 Sectors That Have Undergone Revamps in Digital Landscape February 24, 2021

 

About This Article

Cite this article as: Abhishek Ghosh, "Set-top Box : The Technology Behind," in The Customize Windows, December 5, 2012, March 3, 2021, https://thecustomizewindows.com/2012/12/set-top-box-the-technology-behind/.

Source:The Customize Windows, JiMA.in

 

This website uses cookies. If you do not want to allow us to use cookies and/or non-personalized Ads, kindly clear browser cookies after closing this webpage.

Read Cookie Policy.

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2021 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy