Over-the-Air (OTA)

over the air feature image. internet of things networking

Over-the-air (OTA) refers to the wireless transmission of information. It is most commonly used for sending information to Internet-of-things (IoT) devices and for facilitating TV and radio broadcasts.

In this definition...

What is OTA used for?

OTA connections serve a few key purposes.

Mobile devices

OTA updates from original equipment manufacturers (OEM) deliver new software, firmware and other data directly to mobile devices, namely smartphones. An OTA update is also used to initialize and configure subscriber identification module (SIM) cards in new devices.

TV and radio signals

OTA is also used to send and receive radio and television broadcasts. These transmissions are digital broadcast signals that are typically picked up by antennas, as opposed to channels offered by cable providers sent via fiber-optics or DSL.

Other IoT devices

As more types of devices are created that are able to connect to the internet and other sources of data transmission, OTA use is expanding to serve updates to these devices as well. Some common examples are smart home devices and autonomous vehicles.

How OTA works

OTA connections are able to access services that transmit information to devices, including wireless access protocols (WAP) and multimedia message services (MMS).

Updates for software and firmware can be either automatic or manual, typically depending on the user’s preference. OEMs can push out these updates using two methods.

The first is edge-to-cloud, in which a microcontroller receives updates from a remote server. The second is gateway-to-cloud which uses an internet-connected gateway to receive updates from a remote server.

OTA architecture

OTA uses a client-server architecture. This process starts with back-end systems that send out requests. OTA gateways process these requests to make them readable by a device. A Short Message Service Centre (SMSC) then sends the processed requests over a wireless network to the device. Finally, the device receives and executes that request.

 

Related links

Kyle Guercio
Kyle Guercio
Kyle Guercio has worked in content creation for six years contributing blog posts, featured news articles, press releases, white papers and more for a wide variety of subjects in the technology space.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...