Sei sulla pagina 1di 13

1

* The old model of a single computer serving all of the organization needs, is rapidly being replaced
by one in which a large number of separate but interconnected computers do the Job, these systems
are called Computer Networks.
• Network is defined as “an interconnected collection of autonomous computers”
Two computers are said to be interconnected if they are capable of exchanging information.
* Computers are AUTONOMOUS, in Networking, i.e. no computer can start, stop or control another.
* NEED OF NETWORKING : a) RESOURCE SHARING
b) RELIABILITY
c) COST FACTOR
d) COMMUNICATION MEDIUM
* APPLICATION OF NETWORKS: a) Sharing
b) Access to remote database
c) Communication Medium
* Node (Workstation) refers to the computer attached to a network and are seeking to share resources
of Network
* A computer becomes a workstation of a Network as soon as it is attached to a Network.

* Server : Computer that facilitates the sharing of software and hardware resources (printers, modems
etc) on the network is Server.
* Each Server has a unique name on Network
* Server → a) Non-dedicated Server : (Small Networks)
b) Dedicated Server : (bigger network)
* Network Interface Unit (NIU) : A NETWORK INTERFACE Unit is an interpreter that helps
establish communication between Server and Workstations.
* N.I.U is a device that is attached to each of workstations and the Server, and helps the workstation
establish the all-important connection with network.
It is also called TAP (terminal Access Point)
* Communication channels of network are ‘Connecting Cables’
* T-Evolution of Networking (ARPANET, INTERNET, INTERSPACE)
It started way back in 1969 by development of first network called ARPANET, which
led to the development of Internet
(a) ARPANET : Advanced Re search Project NETwork the goal of this project was to
connect computers at different universities and US defense
The National Science Foundation (NSF net) create a new high capacity network which allowed only
a academic research.
→ Many Private companies built their own networks, which were later interconnected along
ARPANET and NSF net to form Internet
→ The users of ARPANET were also able to play long distance games and socialize with people
who shared their interests. NSFnet allowed only academic research on its network and not any
kind of private business on it.
(b) INTERNET
→ is a world wide network of computer networks that evolved from first network ARPAnet
→ is made up of many networks each run by a different company and interconnected at
peering points.
→ Common use: Users connected to one network to communicate with users on another network
→ Internet is a world wide Networks of Computer networks
→ It connects many smaller networks together and allows all the computers to exchange information with
each other.
→ All the computers on the Internet have to use a common set of rules for communication, known as
Protocols and Internet uses or set of protocols called TCP/IP (Transmission Control Protocol / Internet
Protocol)
→ most computers are not connected directly to Internet. Rather they are connected to smaller networks,
which is turn are connected through GATEWAYS to the Internet BACKBONE
→ A GATEWAY is a device that connects dissimilar networks.
A BACKBONE is central interconnecting structure that connects one or more networks just like the trunk
2
of a tree or spine of human being.
→ The Reason that Internet works at all, is that every computer connected to it users the same set of rules
for communications known as Protocol.
→ The communication protocol used by internet is TCP/IP,the TCP (TRANSMISSION CONTROL
PROTOCOL)is responsible for dividing file/message into packets on source computer.

TCP is responsible also for resembling the received packets at destination or recipient computer
→ The IP (internet protocol) is responsible for handling address of destination computer so that each packet
is routed to its proper destination
→ The future of Internet is said to be Interspace.
INTERSPACE
→ Interspace is a client / server software program that allows multiple to communicate online with Real-
time audio, video and Text chat in dynamic 3d environment
→ Provides the most advanced form of communication available on Internet today.
→ Interspace is a version of what the Internet will become, when users cross- correlate information in
multiple ways from multiple sources.
T - SWITCHING TECHNIQUES
→ One major purpose and use of networks is the sharing or transfer of data and information
→ Switching Techniques are used for Transmitting data across networks

→ Circuit Switching : When a computer places a telephone call, the switching equipment within the
telephone system seeks out a physical cooper path all the way from sender telephone to the receiver’s
telephone. In general, an important property of it is to setup an end path before any data can be send.

→ Message switching : In this form of switching, no physical copper path is established in advance
between sender and receiver. Instead when the sender has a block of data to be sent, it is stored in first
switching office, then forwarded later, one jump at a time.

→ Packet switching : With message switching there is no limit on block size, in contrast packet
switching places a tight upper limit on block size. Here, all the packets of fixed size are stored in main
memory. This improves the performance as the access time (time taken to access a data packet) is reduced,
thus the through put is improved.

TRANSMISSION MEDIA
→ Transmission media or communication channels means ‘Connecting Cables’ or ‘Connecting media’
→ We can group communication media in two categories : guided media and unguided media
→ The guided media include cables
→ The unguided media include waves through air, water & vacuum
* Twisted Pair Cable *
* Co-axial cable *
* OPTICAL FIBER *
* INFRARED *
* RADIO-LINK *
* MICROWAVE – LINK *
* SATELLITE – LINK *

Twisted pair cable: * It is the most common form of wiring in data communication application
* As a VOICE GRADE MEDIUM, it is basis for most internal office telephone wiring
* → It has wires come in pairs
the pairs of wires are twisted around each other

* Problems can occur due to differences in electrical characteristics between paris (eg,
length, resistance, capacitance). Hence LAN applications will tend to use a higher
Quality Cable known as data grade Medium (DGM)
* The twisting of wires reduces CROSS-TALK, which is bleeding of a signal from one
wire to another and which can corrupt signal and cause network errors.
3
* Advantages : → It is simple
→ It is easy to install and maintain
→ It is Physically flexible
→ It has a low weight
→ It can be easily connected
→ It is very inexpensive
* Disadvantages: → Because of high attenuation, it is incapable carrying a signal over
long distances
→ Its low bandwidth capabilities make it unsuitable for broadband
applications
→ It supports maximum data rates 1Mb ps without conditioning and 10
Mbps with conditioning.

COAXIAL CABLE Thicknet (thicker than thinnet upto 500 m Long


Thinnet (thinner than thicknet) 185 m
* Consists of solid wire core surrounded by one or more foil or wire shields,
each separated by some kind of plastic insulator
* The inner core carries the signal and the shields provides the ground
* has high electrical properties & suitable for high speed communication but
less popular than twisted pair
* widely used for Television signal
Advantages
* The data Transmission characteristics of coaxial cables are considerable better than twisted-pair
* The coaxial cables can be used as basic for a shared cable network
* The coaxial cables can be used for BROADBAND TRANSMISSION, i.e Several channels can be
Transmitted simultaneously
* Offer higher bandwidths upto 400 MBPS

DISADVANTAGES
* Expensive compared to twisted pair cables
* The Coaxial cables are not compatible with twisted pair cables

OPTICAL FIBERS
* Consist of thin strands of glass or glass like material
* Carry light from a source at one end of the fiber to a detector
at other end
* Data to be Transmitted is modulated onto the light beam
using frequency modulation Techniques
* The signal can then be picked up at receiving end and demodulated
* The bandwidth of medium is potentially very high

* The FIBRE CABLE consists of three pieces (i) The CORE, i.e. the glass or plastic through which the light
travels
(ii) The Cladding, which is a covering of core that reflects light back to core
(iii) PROTECTIVE COATING, which protects the fiber cable from hostile environment

ADVANTAGES → It is immune to electrical & magnetic interference, i.e. noise in any form because the
information is travelling on a modulated light beam.
→ highly suitable for harsh industrial environments
→ It guarantees secure Transmission and has very high Transmission capacity
→ Can be used for broadband transmission where several channels are handled in parallel

DISADVANTAGES → Installation Problem since fiber optic are quite fragile and may need special care to
make them robust for environment
→ Connecting either two fibres together or a light source to a fiber is difficult process
→ Light can reach the receiver out of phase
4
→ Connection losses are common problems
→ They are the most expensive of all the cables
INFRARED
* Very popular unguided media, uses infrared light to send data
* Use in TV remotes, automotive garage doors, wireless speakers etc
* Infrared Light transmits data through the air and can propagate throughout a room, but cannot penetrate
walls
* Infrared Transmission has become common in PDAs (Personal digital Assistants) e.g, hand held devices
like palm pilots etc
* It is considered to be a secure one.

RADIO-WAVE
* The Transmission making use of radio frequencies is termed as Radio-wave Transmission
* When Certain Radio-Frequencies are allocated to private business for direct voice communication they can
make use of it for private business purpose
* It use continuous sine waves to transmit information (audio, video data)
* Each different radio signal uses a different sine way frequency, and that is how they are all separated
* Radio setup has two pars : TRANSMITTER : It takes some sort of message, encodes it
onto a sine wave and transmits it with radio waves
RECEIVER: It receives radio waves and decodes the message
from sine wave it receives
* Both Trasmitter and Receiver use ANTENNAS to radiate & Capture radio signal

Advantages: → Radio wave transmission offers mobility


→ Cheaper than digging trenches for laying cables & all
→ Offers ease of communication over difficult terrain
→ Offers freedom from Land acquisition rights that are required for laying, repairing the
cables
Disadvantages:→ Radio-wave communication is an insecure communication
→ is susceptible to whether effects like rains, thunder storms etc

MICRO – WAVE
* Micro-wave signals are used to Transmit data without the use of cables
* are similar to radio & Television signals and are used for long distance communication
* Consists of a TRANSMITTER, RECEIVER & THE ATMOSPHERE
* Parabolic antennas are mounted on towers to send a beam to other antennas of kilometers away
* The higer the Tower, the greater the range
* It is Line-of-sight Transmission i.e. passes through atmosphere, originates from dish antenna, travels in
straight line and received by another dish-antenna

ADVANTAGES → Cheaper than digging Trenches for laying cables


→ Offers freedom from land acquisition rights that are required for laying, repairing
the cables
→ Offers ease of communication over difficult terrain
→ Microwave have ability to communicate over oceans

DISADVANTAGES → is an insecure Communication


→ Signals from a single antenna may spilt up & propagate by slightly different paths
to receiving antenna & reducing signal strength
→ is susceptible to whether effects like rains, thunder storms etc
→ Bandwidth allocation is extremely limited in this case
→ Cost of design implementation, and maintenance of microwave links is high
SATELLITE
Radio wave can be classified by frequency & wavelength. When frequency is higher than 3 GHZ, it is
named microwave.
5
→ SATELLITE communication is special case of microwave relay system
→ It use the synchronous satellite to relay the radio signal transmitted from ground station
→ It provides voice, fax, data and video services as well as email, file Transfer, WWW internet applications.
→ The satellites accepts data/ signals transmitted from an earth station, amplify them and retransmit them to
another earth station. Hence data is transmitted to other side of earth in only one step.

ADVANTAGES: → Area coverage through satellite transmission is quite large


→ Laying & maintenance of intercontinental cable is difficult and expensive and it
proves best alternative
→The heavy usage of inter continental traffic makes the satellite commercial
attractive
→ Satellite can cover large areas of Earth.
DISADVANTAGES:→ Technological limitations preventing the development of large, high gain antennas
on satellite platform
→ Over-crowding of available bandwidths due to low antenna gains
→ High investment cost and insurance cost associated with significant probability of
failure
→ High atmospheric losses above 30 GHZ limit carrier frequencies
T-DATA COMMUNICATION TERMINOLOGIES
DATA CHANNEL : A channel is a medium used to carry information or data from one point to another
1. BAUD : It is unit of measurement for the information carrying capacity of a communication channel.
The baud is synonymous with bps, the unit of measuring data transfer rates
2. BITS PER SECOND (bps): Speed at which data Transfer is measured. It is generally used to
measure the speed of information through a high speed phone lines or modems.
bps : bits per second
Bps : Bytes per second
kbps : Kilo bits per second (rate of thousand bits per second)
Kbps : Kilo bytes per second (rate of thousand bytes per second)
mbps : mega bits per second (rate of million bits per second)
Mbps : Mega bytes per second (rate of million bytes per second)
3. DATA-TRANSFER RATES : It represents the amount of data Transferred per second by a
communication channel or storage device. Data rate is measured in bps, Bps or baud
4. BANDWIDTH: → It refers to the difference between highest & lowest frequencies of
Transmission channel
→ It is width of allocated band of frequencies to a channel
→ Amount of Digital information that can be pushed through a channel is
bandwidth.
→ High Bandwidth channels : Broad Band Channels
Low Bandwidth channels : Narrow Band channels
→ It is directly proportional to the amount of data Transmitted or received per
unit time.
T- Types of Networks
→ LOCAL AREA NETWORKS (LANs)
→ WIDE AREA NETWORKS (WANs)
→ METROPOLITAN AREA NETWORK (MANs)
LAN: → Small computer Networks that are confined to a localized area (e.g, an office, a building or a
factory)
→ Key purpose of LAN is to serve its users in resource sharing
→ Hardware & Software resource are shared through LAN
→ SERVER is a computer that just serves the request of doing some tasks, made by other computers
in network
MAN :→ Metropolitan Area Networks are spread over a city
→ for example, cable TV spread over city, is MAN
→ Its purpose is also sharing of hardware and software
WAN: → Networks spread across countries are WAN
6
→ is group of computers that are separated by large distances & tied together
→ It can even be group of LAN spread across several locations and connected together
→ It facilitate fast and efficient exchange of information at lesser costs and higher speeds
→ The LARGEST WAN in existence is INTERNET

LAN WAN
1. Diameter of not more than few 1. Span entire countries
kilometers
2. TOTAL DATA RATE OF at least 2. Data rate less than 1 Mbps (Mega bits
several Mbps per second)
3. Complete ownership by single 3. Owned by multiple organization.
organization
4. very low Error rates 4. Comparatively higher error rates.

T- NETWORK – TOPOLOGIES
The pattern of interconnection of nodes in a network is called TOPOLOGY
→ It would try to minimize installation COST
→ Because the arrangement of furniture, internal walls etc in office is often subject to change, that
may include moving existing nodes & adding new ones, so it should be FLEXIBLE
→ Failure in Network can take two forms, firstly an individual node can malfunction. or when the
network itself fouls to operate. So, topology chosen should be RELIABLE
* Point-to-point Link
→ Each station receives exactly from one transmitter and each transmitter transmits to
exactly one
receiver
→ The transmit & Receive operations can occur over separate wires (for better
performance)
→ It relies upon two function-Transmit & ReceiverSTAR-TOPOLOGY

It consists of central node to which all the other nodes are connected by a single path. It is used in most
existing information networks involving data processing or voice communication

Advantages → Ease of Service : has number of concentration points, hence provide easy access for
service or reconfiguration of network
→ One device per connection: here, failure of single connection involves disconnecting one
node from system, hence system works
→ Centralized control / Problem diagnosis : Since, central node is connected directly to every
other node, hence faults are easily detected and isolated. It is simple mater to disconnect
failing nodes from system.
→ Simple access protocols: It involves only central node, hence access protocols are simple
Disadvantages → LONG CABLE LENGTH
→ DIFFICULT TO EXPAND : The addition of a new node to a star network involves a
connection all the way to central node.
→ Central Node Dependency
If the central node fails, the entire network is rendered inoperable

* (NOTE)
THE STAR TOPOLOGY has found extensive application is areas where intelligence in the network is
concentrated at central nodeBUS(LINEAR TOPOLOGY)
→ This consists of single length of the transmission medium (normally coaxial cable) onto which various
nodes are attached.
→ Is used in Traditional data communication network where the host at one end of bus communication with
7
several terminal attached along its length.
→ The transmission from any station travels the length of the bus, in both directions, and can be received by
all other station
→ Data is transmitted in small blocks, known as packets. Each packed has some data bit plus a header
containing its destination address.
→ A station wanting to transmit some data sends it in packets along the bus.
The destination device, on identifying the address on the packets, copies the data onto it disk
Advantages
→ Short cable length & simple wiring layout : There is a single common data path connecting all nodes, the
linear topology allows a very short cable length to be used. It decreases installation cost.
→ Re silent Architecture: It has an inherent simplicity that makes it very reliable from hardware point of
view. There is single cable through which all the data propagates and to which all the nodes are
connected.
→ Easy to Extend : Additional nodes can be connected to an existing bus network at any point along its
length
DISADVANTAGES
→ FAULT DIAGNOSIS IS DIFFICULT: Control of network is not centralized in any node. This means
that detection of a fault may have to performed from many points in network
→ FAULT ISOLATION IS DIFFICULT: In star topology, a defective node can easily be isolated from
network by removing its connection at centre. If a node is faulty on the bus, it must be rectified at the
point where the node is connected to the network.
→ Repeater configuration : When Bus type network has its backbone extended using repeater,
reconfiguration may be necessary.
→ NODES MUST BE INTELLIGENT: Each node on network is directly connected to central bus. This
means that some way of deciding who can use then network at any given time must be perfumed in each
node.
RING OR CIRCULAR TOPOLOGY
→ Each node is connected to two and only two neighbouring nodes
→ Data travels in only one direction
→ After passing through each node, data returns to the sending node, which removes it

ADVANTAGES → Short cable length


→ No wiring closet space required: since there is only one cable connecting each
node to its immediate neighbours, it is not necessary to allocate space in building for wiring closes.
→ Suitable for optical fibers (Because traffic in one direction)

DISADVANTAGES → NODE FAILURE CAUSES NETWORK FAILURE


→ Diffcult to diagnose faults
→ NETWORK RECONFIGURATION IS DIFFICULT (not possible to shut down a
small section of the ring while keeping the majority of it working normally)

TREE TOPOLOGY

→ Variation of bus topology is Tree topology


→ The shape of Network is that of an invented tree with central root branching and subbraching to
extremities of network
→ Transmission is in same way of Bus topology
→ It is best suited for applications which have a hierarchical how of data and control. It is hybrid topology
→ There is no need to remove packets from medium because when a signal reaches the end of medium, it is
absorbed by terminators

GRAPH TOPOLOGY
→ Nodes are connected in arbitrary fashion
→ A Link may or may not connect two or more nodes. There may be multiple links also
→ If a path can be established in two-nodes via one or more links, it is called a connected graph.
8
T – NETWORK – SECURITY CONCEPT
→ The Networking offers endless possibilities and opportunities to every user of it, along with convince
but there are many risks to network security
PROBLEMS LIKE
a) Physical Security Holes: When individuals gain unauthorized physical access to a computer
hackers do it by guessing passwords of various uses &bb than gaining access to network
system.
b) Software Security Holes: When badly written programmes or ‘privileged’ software are
compromised into doing things that they should not be doing
c) Inconsistent usage Holes: When system administrator assembles combination of hardware &
Software such that the system is seriously flawed from a security point of view

Security Concepts (FIREWALL, COOKIES, HACKERS & CRACKERS, CYBER LAW)

1. FIREWALL: → A system designed to prevent unauthorized access to or from a private network is


called firewall.
→ Can be implemented in both hardware & software
→ Frequently used to prevent unauthorized Internet users from accessing private
networks connected to Internet
→ All messages entering or leaving internet pass through firewall, which examines
each message and blocks those that do not meet the specified security criteria
→ Its Several types are
a) Packet Filter: Looks as each packet entering or leaving network & accepts or rejects it based on
user defined rules. It sis fairly effective & transparent to users but difficult to configure

b) Application gateway: Applies security mechanism to specific applications such as FTP and
Telnet Servers. Very effective.

c) Circuit level gateway: Applies security mechanism when a connection is established. Once the
connection has been made, packets can flow between the hosts without further checking.

d) Proxy Server: Intercepts all messages entering and leaving the network. The proxy server
effectively hides the true network addresses.
2. COOKIES: → A cookie is a message given to a web Browser by a web server
→ The Browser stores the message in a text file. The message is then sent back to
Server each time the browser requests a page from server
→ Its main purpose is to identify users and possibly prepare customized web pages
for them
→ When you enter a Web site using cookies, you may be asked to fill out a form
providing information as your name & interests. This information is packaged into
a cookie and sent to your web browser, which stores it for later use. The next time
you go to same web site, your browser will send the cookie to web server.
COOKIES ARE MESSAGES THAT A WEB SERVER TRANSMITS TO A WEB BROWSER SO
THAT THE WEB SERER CAN KEEP TRACK OF USER’S ACTIVITY ON SPECIFIC WEB
SITE.

→ They are text files that can be deleted any time


→ Cookies cannot be used to spread viruses & they cannot access your hard drive
→ Cookies cannot read your hard drive to find information BUT

Very Important
Any Personal Information that your have given to a web site including credit card information, will
most likely be stored in cookie unless you have turned off the cookie features in browser. In only this
way are cookies a threat to privacy. It will only contain information that you freely provide to a web
site.
9
3. HACKERS AND CRACKERS
→ Hacker is a slang term for computer enthusiast, i.e. a person who enjoys learning programming
languages and computer systems and can often be considered an experts on subject
→ The CRACKERS are the malicious programmers who break into secure systems whereas
HACKERS are most interested in gaining knowledge about computer systems and possibly using
this knowledge for playful pranks.
→ The two turns are often used interchangeably

4. CYBER LAW
→ Cyber Law is a generic tem, which refers to all the legal and regulatory aspects of Internet and
world wide web
→ It is important because it touches almost all aspects of Transactions and activities on and
concerning the Internet, the world wide web and cyber space
→ Cyberspace is being governed by a system of law and regulation called cyberlaw
→ The growth of Electronic Commerce has propelled the need for vibrant and effective regulatory
mechanisms which would further strengthen the legal infra structure.
→ All these regulatory mechanisms & legal infrastructures come within domain of cyber law

T-PROTOCOLS
→ PROTOCOL is a formal description of message formats and the rules that two or more machines
must follow to exchange those messages
→ It defines standardized formats for data packets, Techniques for detecting and correcting errors
and so on
→ We need protocols everytime we want to do something on another comp
*F.T.P (File Transfer Protocol)*
→ One of the original service on internet was designed to allow for Transferring files from one
system to another
→ Files of any type can be Transferred, although you may have to specify whether it is ASCII or
Binary fileAdvantages of FTP: → Very useful to transfer files from one network in organization to
another
→ It is an effective way to get a geographically dispersed group to co-operate on a
project
→ It is a potent & popular way to share information over internet
* TCP/IP (Transmission Control Protocol / Internet Protocol)*
→ It is layered set of protocols (eg protocol for mail)
→ TCP is responsible for making sure that the commands get through to the other end. It keeps track
of what is sent, and retransmits anything that did not get through
→ DATAGRAM is a collection of the data that is sent as single msg
→ If any message is too large for one datagram, TCP will split it upto several datagrams and make
sure that they all arrive correctly
→ TCP acts as library of routines that applications can use when they need reliable network
communications with another computer
→ There are many services that every application needs. So these services are put together into IP. It
is also available to applications that don’t use TCP
* SLIP / PPP *
→ Serial Line IP (SLIP) was the first protocol for relaying IP packets over dial-up-lines. It defines an
encapsulation mechanism. SLIP has been largely supplanted by PPP
→ PPP (Point to Point Protocols) is Internet standard for Transmission of IP Packets over serial
lines. It is currently the best solution for dial-up-Internet connections IPCP: IP
CONTROL PROTOCOL
(FOR TRANSPORTATION OVER PPP)

NCP: NETWORK CONTROL PROTOCOL


10
(FOR TRAFFIC TRANSPORTATION)

LCP:LINK CONTROL PROTOCOL


(FOR LINK ESTABLISHMENT)
→ Direct connection to Internet represent ultimate mode of access. It is too expensive for single user.
A compromise between a direct Internet connection & dial-up-connection is to use SLIP or PPP
→ SLIP / PPP provides the ability to Transport TCP/IP traffic ever serial line (eg Telephone lines)
between two computers
T- WIRELESS/MOBILE COMPUTING
→Wireless refers to method of Transferring information between a computing device, without a
physical connection. It is without use of landline. Eg cellular Telephone, Two way radio, Fixed
wireless, lasser or satellite communications.
→ Mobile describes a computing device, that is not restricted to a desktop. A mobile device may be
PDA, cell phone or web phone, lap top computer etc
→ WIRELESS COMMUNICATION is simply data communication without the use of landlines.
MOBILE COMPUTING MEANS THAT THE COMPUTING DEVICE IS NOT
CONTINUOUSLY CONNECTED TO THE BASE OR CENTRAL NETWORK
Technologies
1. GSM: “GLOBAL SYSTEM FOR MOBILE COMMUNICATION”,
→ GSM USERS simply switch SUBSCRIBER IDENTIFICATION MODULE (SIM)
→ SIM Cards are small removable disks that slip in / out of GSM cell phone
→ It uses Narrowband TDMA (time division multiple Access)
→ it is basis for IDEN (Integrated Digital Enhanced Network)
GSM used Narrowband TDMA, which allows & simultaneous calls on the same radio frequency

2. CDMA: “CODE – DIVISION MULTIPLE ACCESS”

→ It is digital cellular technology that uses spread-spectrum Techniques


→ It does not assign a specific frequency to each user
→ Every channel uses the full available spectrum
→ Each user’s signal is spread over the entire bandwidth by a unique spreading code. At the receiver
end, the same unique code is used to recover the signal
→ It is military Technology first used during World War II
→ It uses a spread-spectrum Technique where data is sent in small pieces over a number of discrete
frequencies available for use.

3. WLL (Wireless in Local loop or Will)

→ Mean to Serve subscribers at homes or offices


→ Telephone provided is as good as wired phone
→ Its voice quality must be high i.e. a subscriber carrying out long conversation must not be irritated
with Quality, can use speaker phone, cordless phones and parallel phones.
→ WLL is a system that connects subscriber to the public switched Telephone network (PSIN) using
radio signals as a substitute for other connecting media.
→ It offer better bandwidth than Traditional Telephone systems
→ It support high Quality data Transmission, signaling services and all the most advanced customer
service features
→ It include the ability to connect with users in remote areas without need for lying new cables
4. 3G and EDGE
→ 3G (Third Generation) mobile communication Technology is a broadband, packet based
Transmission of Text, digitized voice, video and multimedia at data rates up and possibly higher
than 2 Mbps, offering a consistent set of services to mobile computer and phone uses no matter
where they are located in would
11
→ EDGE (ENHANCED DATA rates for GLOBAL EVOLUTION) is radio based high-speed
mobile data standard
5. SMS
→ Short Message Service (SMS) is transmission of short Text messages to and from a mobile phone,
fax machine and /or IP address
→ Must not be longer than fixed no. of alpha-numeric characters
→ Contain No images or graphics
→ SENT MSG is received by Short Message Service Centre (SMSC), which must then get it to
appropriate mobile device
6. E mail

→ Electronic mail (Email) is sending and receiving messages by computer


→ Can send almost any kind of data, as spread sheets, databases, voice and pictures
→ Low cost, speed, Ease of use, waste Reduction Record Maintenance → Advantages
→ Hardware requirement, Hasty medium, Hard to convey emotion → Disadvantages
→ E-mail is so easy to use, it is also easy to send a message that you later regret
7. VOICE MAIL
The voice mail refers to email systems that support audio. Users can leave spoken messages for one
another and listen to messages by executing the appropriate command in Email System
8. CHAT : Only Textual talk, in real time is called CHATTING
→ most fantastic thing on Internet
→YOU TYPE A MESSAGE ON SCREEN, which is received by recipient, then recipient can type a
message in response, received by you !
→ Most of chat sites require you to register with them before you can start chatting
→ On chat Servers, Rooms are defined on the basis of shared interest like parenting, teenagers,
Society etc
9. VIDEO-CONFERENCING
→ People having multimedia PC with Camera and video compress, on hardware, access to internet
over an ordinary telephone line and videophone software can see each other while talking, is
called video confercing
→ A Two-way videophone conversation among multiple participants is called video-conferencing
→ START NETWORKING
USE COMMAND CALL → New Call → Host meeting
T – INTER-NETWORKING Term and Concepts
1. WWW (World wide web)
→ Set of Protocols that allows you to access any document on the Net through naming system based
on URL (Uniform Resource Locator)
→ It specifies a way-the hyper text Transfer protocol (HTTP) – to request and send a document over
the internet
→ WWW is a small part of internet. Internet offers lot many services

http : // www. microsoft.com / frontpage


A HYPERLINK, the cursor changes to hand here. UPON CLIKING, THE
CORRESPONDING
WEB PAGE OPENS UP
→ User Friendly : WWW resources can work easily with most Internet browsers, which are very
user friendly
→ MULTIMEDIA DOCUMENTS: Information on Web, which may be graphics, audio, video,
animations and text is viewed in pages
→ HYPER TEXT & HYPERLINK: dynamic links are called hyper links.
2. TELNET
→ The older Internet utility that lets you log on to remote computer systems
→ If you’ve permitted access, you can work on system, just as you would if you were sitting next to
it
→ It gives character based terminal window on system
→ Use to connect to thousand of catalogs at libraries around the world
12
→ First we have to run the Telnet client and then connect to the desired Telnet site
3. WEB BROWSER AND WEB SERVER
→ World Wide Web (WWW) is based upon clients and Server. A WWW client is called Web
Browser or simply a browser and WWW server is called Web Server or just a Server →
Internet Explorer and Netscape Navigator are two most popular web browser
→ WEB BROWSER is a WWW client that navigates through World Wide Web and display Web
Pages.
→A WEB SERVER is a WWW server that responds to request made by Web browsers
→ A Location on a net Server is called WEB-SIT

OSTMPORTANT
13

Potrebbero piacerti anche