0% found this document useful (0 votes)
2 views

Networks

The document provides an overview of network operating systems, detailing the structure and types of computer networks, including LANs, WANs, and MANs, along with their features. It discusses the OSI layer model, TCP/IP protocols, and various networking topologies and physical media used in networking. Additionally, it highlights the advantages and disadvantages of networks, as well as key protocols such as HTTP, FTP, and PPP.

Uploaded by

kushalakale
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Networks

The document provides an overview of network operating systems, detailing the structure and types of computer networks, including LANs, WANs, and MANs, along with their features. It discusses the OSI layer model, TCP/IP protocols, and various networking topologies and physical media used in networking. Additionally, it highlights the advantages and disadvantages of networks, as well as key protocols such as HTTP, FTP, and PPP.

Uploaded by

kushalakale
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

FUNDAMENTALS OF NETWORK OPERATING SYSTEMS

COMPUTER NETWORKS:
Network:
“Interconnected connection of autonomous computers is called as network”.
(or)
“It is a collection of computers and terminal devices connected together by a
communication system”
Goals and Advantages:
 Data can be exchanged: By connecting the computers together, we can share
the data from different sources.
 Sharing of resources: We can share the resources like printer, scanner and
other external devices.
 Provides backup: If one system is corrupted, the information in that system will
not be available. In such cases, we can get the backup of the same information
from other systems.
 Provides flexible environment:
By connecting systems together, we can have a flexible environment and we
can work from home.
Disadvantages are:
 It is Expensive to install
 If file server fails network fails
 Cable used may have breakage and disturb the network
ARPANET
 Advanced Research Projects Agency Network (ARPANET) of the U.S. Department
of Defense.
 The ARPANET was designed in the 1960s so as to develop new bombproof,
distributed packet-switching network technology. It got its name from the
provider of the funds, the Advanced Research Projects Agency (ARPA).

 During the 1970s, the ARPANET grew to connect research institutes and
laboratories supported by the Department of Defense in various parts of the USA.
Many of these were university laboratories studying data processing and
computer networks, which developed the TCP/IP network and its applications for
the Internet. Finally in 1990, with everyone having gone over to using the newer,

networking concepts 1
faster Internet backbone network, the original ARPANET with its network address
10.0.0.0 was shut down.

OSI LAYER MODEL

The physical Layer-

The physical layer is concerned with transmitting raw bits over a communication
channel.

The Data link-

The main task of the link layer is to take a raw transmission facility and transform it
into a line that appears free of undetected transmission errors to the network layer.

The Network Layer-

The network layer, acts to route the communications through the various
communication resources to the other end

The Transport Layer-

networking concepts 2
The basic function of the transport layer is to accept data from the session layer,
split it up into smaller units if need be,

The Session Layer-

The session Layer must manage and synchronize conversations between two
different applications. Session can allow traffic to go in both direction at the same
time, or in only one direction at a time.

The presentation Layer-

Makes sure that the information is delivered in a form that the receiving system can
understand and use.

The Application Layer-

The top of the model is the application layer, layer 7, which provides for the
manipulation of information in various ways.

TCP/IP
 TCP (Transmission Control Protocol) and IP (Internet Protocol) are two different
procedures that are often linked together.
 The linking of several protocols is common since the functions of different protocols
can be complementary so that together they carry out some complete task.
 The combination of several protocols to carry out a particular task is often called a
"stack" because it has layers of operations.
 the term "TCP/IP" is normally used to refer to a whole suite of protocols, each with
different functions. This suite of protocols is what carries out the basic operations of
the Web.
 TCP/IP is also used on many local area networks.
 When information is sent over the Internet, it is generally broken up into smaller
pieces or "packets". The use of packets facilitates speedy transmission since different
parts of a message can be sent by different routes and then reassembled at the
destination. It is also a safety measure to minimize the chances of losing information
in the transmission process.
 TCP is the means for creating the packets, putting them back together in the correct
order at the end, and checking to make sure that no packets got lost in transmission.
If necessary, TCP will request that a packet be resent.
HTTP

networking concepts 3
 Web pages are constructed according to a standard method called Hypertext Markup
Language (HTML).

 An HTML page is transmitted over the Web in a standard way and format
known as Hypertext Transfer Protocol (HTTP). This protocol uses TCP/IP to
manage the Web transmission.

 A related protocol is "Hypertext Transfer Protocol over Secure Socket Layer"


(HTTPS), first introduced by Netscape. It provides for the transmission in
encrypted form to provide security for sensitive data.

 A Web page using this protocol will have https: at the front of its URL.

FTP
 File Transfer Protocol (FTP) lives up to its name and provides a method for copying
files over a network from one computer to another.

 It provides for some simple file management on the contents of a remote


computer.
 It is an old protocol and is used less than it was before the World Wide Web came
along.
 Its primary use is uploading files to a Web site.
 It can also be used for downloading from the Web but, more often than not,
downloading is done via HTTP.
 Sites that have a lot of downloading (software sites, for example) will often have an
FTP server to handle the traffic.
 If FTP is involved, the URL will have ftp: at the front.

Slip

 The Serial Line Internet Protocol (also SLIP) is an encapsulation of the Internet
Protocol designed to work overserial ports and modem connections. It is
documented in RFC 1055.
 On personal computers, SLIP has been largely replaced by the Point-to-Point
Protocol (PPP), which is better engineered, has more features and does not
require its IP address configuration to be set before it is established.
On microcontrollers, however, SLIP is still the preferred way of encapsulating IP
packets due to its very small overhead.

networking concepts 4
PPP (Point-to-Point Protocol):

 PPP is a protocol for communication between two computers using a serial


interface, typically a personal computer connected by phone line to a server.

 PPP uses the Internet protocol (IP). It is sometimes considered a member of the
TCP/IP suite of protocols.
 Relative to the Open Systems Interconnection (OSI) reference model.
 PPP provides layer 2 (data-link layer) service.
 Essentially, it packages your computer's TCP/IP packets and forwards them to the
server where they can actually be put on the Internet.
INTERNET
 Internet is a global connection of systems around the globe.
 Internet can be defined as Network of Networks

Elementary Terminology of Networks.

Nodes:
The computers that are attached to a network and are seeking to share the resources
of the Network.

Servers
Server is a centralized system that stores entire organization database.

There are two types of servers


a)Non-dedicated servers
 In the work station all the systems works as Servers as well clients.
 Each system behaves like a client as well server.
 Any system can access data from any other system in the Network.
 The networks using such servers are called as PEER to PEER networks.
a) Dedicated servers
 Dedicated servers are completely dedicated to serve to the clients.
 Entire organization data stored in servers.
 Number of servers is depending on the size of the organization.
Types of networks:

Computer networks are often classified by size distance covered or structure.


They are commonly classified as,

 Local Area Network {LAN}


 Wide Area Network {WAN}

networking concepts 5
 Metropolitan Area Network {MAN}

Local Area Network:

 A network is any collection of independent computers that exchange


information with each other over a shared communication medium.
 Local Area Networks or LANs are usually confined to a limited geographic area,
such as a single building or a college campus.
 LANs can be small, linking as few as three computers, but can often link
hundreds of computers used by thousands of people.
 The development of standard networking protocols and media has resulted in
worldwide proliferation of LANs throughout business and educational
organizations.

Features:
 Transmission rate are higher than WAN as it is small and distance is
small.
 Transmission error are less
 LAN is owned by single organization
 Cost of transmission is negligible

Wide Area Network:

 Wide area networking combines multiple LANs that are geographically


separate.
 This is accomplished by connecting the several LANs with dedicated leased
lines such as a T1 or a T3, by dial-up phone lines (both synchronous and
asynchronous), by satellite links and by data packet carrier services.
 WANs can be as simple as a modem and a remote access server for employees
to dial into, or it can be as complex as hundreds of branch offices globally
linked.
 Special routing protocols and filters minimize the expense of sending data
over vast distances.

Features:

 Data transmission rate is less


 Transmission errors are more
 Not owned by a single organization as it covers a large area
 Different types of transmission media is used

networking concepts 6
 Communication cost is more because it makes use of telephone lines,
leased lines and satellite communication.

Metropolitan Area Network:

 Metropolitan Area Networks or MANs are large computer networks usually


spanning a campus or a city.
 They typically use wireless infrastructure or optical fiber connections to link
their sites.
 MAN links between LANs have been built without cables using either
microwave, radio, or infra-red free-space optical communication links.

Features:

 MAN can support both data and voice


 A MAN can include one or more LANs as well as telecommunication
equipment such as microwaves and satellite relay station.
 Data transmission rate is much higher compared to WAN.
Difference between LAN and WAN

Sl.NO LAN WAN


1 Local Area Network Wide Area Network
2 LAN (Local Area Network) is a WAN (Wide Area Network) is a computer
computer network covering a network that covers a broad area (e.g.,
small geographic area, like a any network whose communications
home, office, school, or group of links cross metropolitan, regional, or
buildings. national boundaries over a long
distance).
3 High speed (1000 mbps) Less speed (150 mbps)
4 Error rate is low Error rate is high
5

Topologies:

Network means systems are connected together. That interconnection may be


of different types.
“Actual appearance of the network is called as topology”.
OR

networking concepts 7
“The geometrical arrangement of computer resources, remote devices and
communication facilities
is defined as topology”

Linear bus topology:

In this topology, all the nodes are connected to a common straight cable.
All the nodes
{computers} share the common bus. This topology is reliable because
failure of any system does
not affect the bus.

The network looks like this

Star network:
In this network, each computer is connected directly to the central computer.
All the communications between computers have to pass through the central
computer.

The network looks like this,

Ring network:
In a ring network, all the computers are connected to a common cable,
the cable starts and ends at the network server. The communications are always in
one direction and data transfers through each computer in the ring. The

networking concepts 8
disadvantage of this network is when a computer fails; the entire system halts until
the system gets ready.
The network looks like this,

Mesh topology of fully interconnected:


In this type of network, each computer have connections with all other
computers in the
mesh. Problem with this network is each computer requires a physical
connection to a computer.

The network looks like this,

A tree topology (a.k.a. hierarchical topology) can be viewed as a collection of star


networks arranged in a hierarchy. This tree has individual peripheral nodes (i.e.
leaves) which are required to transmit to and receive from one other node only and
are not required to act as repeaters or regenerators. Unlike the star network, the
function of the central node may be distributed.

As in the conventional star network, individual nodes may thus still be isolated from
the network by a single-point failure of a transmission path to the node. If a link
connecting a leaf fails, that leaf is isolated; if a connection to a non-leaf node fails, an
entire section of the network becomes isolated from the rest.

In order to alleviate the amount of network traffic that comes from broadcasting
everything everywhere, more advanced central nodes were developed that would
keep track of the identities of different systems connected to the network. These

networking concepts 9
network switches will "learn" the layout of the network by first broadcasting data
packets everywhere, then observing where response packets come from.

The Graph Topology

In this topology, the nodes are connected in an arbitrary fashion.A link may or may
not connect two or more nodes. There may be multiple links also. It is not necssary
that all nodes are connected. If a path can be established in two nodes via one or
more links, it is called a connected graph.

Different Physical Media used in Networking


Some of the types of cables used in networks are:
 Unshielded Twisted pair (UTP) cable
 Shielded twisted pair (STP) cable
 Coaxial cable
 Fiber Optic cable

1.Twisted pair (UTP and STP) cable: Twisted pair is of two types shielded and
unshielded.
Unshielded is most popularly used. The UTP cable has four pairs of wires
inside which are twisted with each other. UTP is categorized into five types ie
category1 (cat 1) to category 5(cat 5).RJ-45 connector is most popular connector in
UTP. A disadvantage of UTP is that it may be easily affected by radio or television
signals. Shielded cables are suitable for electrical environments. In networks
more often used for Token ring topology

2. Coaxial cable: This type of cable has a single copper conductor at its center
covered by a plastic layer, which provides insulation between the center
conductor and a braided metal shield. This covering helps to block any outer
disturbance to the signal.

networking concepts 10
3.Fiber Optic cable: Fiber optic cabling consists of a center glass core
surrounded by
several layers of protective materials. It transmits light rather than electronic
signals.

4.Wireless: Some networks are connected wireless. Wireless networks use


high
frequency radio signals, infrared light beams, or lasers. Each workstation at
network
has some sort of transceiver or antenna to send and receive the data.
Satellite Microwave
 Satellite communication use the synchronous satellite to relay the radio signal
transmitted from ground station.
 In this, the earth station consists of a satellite dish that functions as an antenna
and communication equipment to transmit and receive data from satellites
passing overhead.
 A number of communication satellites have been placed in stationary orbits
about 22,300 miles above the earth’s surface.
 These satellites act as relay stations for communication signals. The satellites
accept data/signals transmitted from earth station, amplify them, and
retransmit them to another earth station. Using such a setup, data can be
transmitted to other side of the earth in only one step.
Other unguided Media

Infrared
 Infrared technology allows computing devices to communicate via short-range
wireless signals. With infrared, computers can transfer files and other digital
data bidirectional.
 The infrared transmission technology used in computers is similar to that used
in consumer product remote control units.
 Infrared communications is archived by the use of
transmitters/receivers(transceivers)that modulate noncoherent infrared light.
Transceivers must be within the line of sight of each other either directly or via
reflection from a light-colored surface
Laser
 Laser transmission requires direct line – of –sight. it is a unidirectional like
microwave

networking concepts 11
 The laser transmission requires the use of a laser transmitter and a photo-
sensitive receiver at each end.
 The laser transmission is point to point transmission, typically between
buildings.
 The laser transmission is affected by weather.

Transmission/switching techniques:

Information may switch the paths as it travels through various communication


channels. There are three typical switching techniques available for digital
data traffic.

Circuit Switching:
 Circuit switching is a connection technique that directly connects the sender
and receiver in an unbroken path.
 A dedicated path is activated between both ends when the communication
starts and deactivated as soon as the communication is ended.
 The computer that wants to transfer data will ask for a connection to
thedestination device before it starts communicating, as the destination
device agrees then a dedicated path is allotted to them.

Message Switching:
 In this, there is no need to establish a dedicated path between sender and
receiver.
 The sender with a destination address through the network sends a message.
Each and every system in that network receives the entire message, stores it
briefly and then transmits to next system. This is carried until it reaches the
destination. This type of network is sometimes called as store-and-forward
network.

Packet switching:
 Packet switching is a combination of both message and circuit switching. It
adopts advantages of both techniques and tries to demolish the
disadvantages.

 A message is broken into small parts, called packets. Each packet is tagged with
source and destination addresses. Packets take different possible paths
through the network to reach thedestination. To avoid the problem in
disorder of packets sequence number is also appended to the packet.

Communication modes:

networking concepts 12
Depending on type of media used, modes of communication is
divided as Simple, half-duple and full duplex.
Simplex:
On simplex channel, only one interface is a transmitter and every other
interface is a receiver. So in this the transmitter cannot receive information
and the receiver cannot transmitted: television, radio
Half-Duplex:
On half duplex channel each interface acts as both transmitter and
receiver but only one interface can transmit data at a time. Ex: walkie-
talkie
Full-Duplex:
A full duplex channel has two ends, each serving as both transmitter and
receiver. I.e. in this, both can transmit and receive data at the same time.

Network Devices :
Modem
The device which is used to convert data from digital to analog and vice versa is
called modem. It transforms a digital bit stream into an analog signal(modulator) and
vice versa (demodulator) .

Ethernet Card
The computers that are part of Ethernet have to install a special card known as
Ethernet card. An Ethernet card contains connections for either coaxial or twisted
pair cables. If it is designed for coaxial cable, the connection is BNC. If it is designed
for twisted pair, the connection is RJ-45 connection. Ethernet cards are purchased
separately from a computer, but now-a-days many computers include an option for a
pre-installed Ethernet card.

RJ45 Connector
Network devices require connectors for linking. Connectors are of two types-
male(the plug) and female(the receptable). Each wire in a cable is attached to one
conductor (or pin) in the connector. RJ45 Connector is one such most frequently
used plug having eight conductors, one for each wire of four twisted pairs.
Hub
A hub is a hardware device used to connect several computers together. Hubs can be
either passive or active. Passive hubs allow the signal to pass from one computer to
another without any change. Active hubs electrically amplify the signal as it moves
from one connected device to another.
Switch

networking concepts 13
Switches increase network performance by decreasing the amount of extraneous
traffic on individual network segments attached to the switch. They also filter packets
a bit like a router does.

When a packet arrives, the header is checked to determine which segment the
packet is destined for, and then its forwarded to that segment.If the packet is
destined for the same segment that it arrives on, thepacket is dropped and not
retransmitted. This prevents the packet being"broadcasted" onto unnecessary
segments, reducing the traffic.

Nodes which inter-communicate frequently should be placed on the same segment.


Switches work at the MAC layer level.

Network Repeater

 A repeater connects two segments of your network cable. It retimes and


regenerates the signals to proper amplitudes and sends them to the other
segments. When talking about, ethernet topology, you are probably talking
about using a hub as a repeater.
 Repeaters require a small amount of time to regenerate the signal.
 This can cause a propagation delay which can affect network communication
when there are several repeaters in a row.
 Many network architectures limit the number of repeaters that can be used in
a row.
 Repeaters work only at the physical layer of the OSI network model.

Bridge

 A bridge reads the outermost section of data on the data packet, to tell where
the message is going.
 It reduces the traffic on other network segments, since it does not send all
packets. Bridges can be programmed to reject packets from particular
networks.
 Bridging occurs at the data link layer of the OSI model, which means the bridge
cannot read IP addresses, but only the outermost hardware address of the
packet.
 In our case the bridge can read the Ethernet data which gives the hardware
address of the destination address, not the IP address.
 Bridges forward all broadcast messages. Only a special bridge called a
translation bridge will allow two networks of different architectures to be
connected.

networking concepts 14
 Bridges do not normally allow connection of networks with different
architectures. The hardware address is also called the MAC (media access
control) address.

Network Router

 A router is used to route data packets between two networks.


 It reads the information in each packet to tell where it is going.
 If it is destined for an immediate network it has access to, it will strip the outer
packet, readdress the packet to the proper ethernet address, and transmit it
on that network.
 If it is destined for another network and must be sent to another router, it will
re-package the outer packet to be received by the next router and send it to
the next router.
 Routing occurs at the network layer of the OSI model. They can connect
networks with different architectures such as Token Ring and Ethernet.
 Although they can transform information at the data link level, routers cannot
transform information from one data format such as TCP/IP to another such as
IPX/SPX.
 Routers do not send broadcast packets or corrupted packets. If the routing
table does not indicate the proper address of a packet, the packet is discarded.

Gateway
 A network gateway is an internetworking system capable of joining
together two networks that use different base protocols.
 A network gateway can be implemented completely in software,
completely in hardware, or as a combination of both.
 Depending on the types of protocols they support, network gateways
can operate at any level of the OSI model.

 Because a network gateway, by definition, appears at the edge of a


network, related capabilities like firewalls tend to be integrated with it.

 On home networks, a broadband routertypically serves as the network


gateway although ordinary computers can also be configured to perform
equivalent functions.
Wireless VS Mobile computing
Wireless technology
 Traditional computers or other non-mobile devices can access wireless
networks.

networking concepts 15
 One very common example is the use of a localized browser product in a local
area network (LAN), where the router takes what used to be a cabled
interaction and makes it wireless.
 Other kinds of wireless networks called wide area networks (WAN) can even
use components of 3G or 4G wireless systems made specifically for mobile
devices, but that doesn’t mean that the devices on these networks are mobile.
 wireless system provides a fixed or portable endpoint with access to a
distributed network

Mobile Technology:
 Mobile technology is a word that is commonly used to describe portable
devices.
 A mobile device is one that is made to be taken anywhere. Therefore, it needs
an internal battery for power, and must be connected to a modern mobile
network that can help it to send and receive data without attaching to a
hardware infrastructure.
 Mobile and wireless systems really accomplish two very different things
 a mobile system offers all of the resources of that distributed network to
something that can go anywhere, barring any issues with local reception or
technical area coverage.
GSM
 GSM stands for Global System for Mobile Communication and is an open,
digital cellular technology used for transmitting mobile voice and data services.
 The GSM makes use of narrowband Time Division Multiple Access
(TDMA) technique for transmitting signals.
 The GSM was developed using digital technology. It has an ability to carry 64
kbps to 120 Mbps of data rates.
 Presently GSM supports more than one billion mobile subscribers in more than
210 countries throughout the world.
 The GSM provides basic to advanced voice and data services including Roaming
service. Roaming is the ability to use your GSM phone number in another GSM
network.

SIM Card

 A Subscriber Identity Module (SIM) card is a portable memory chip used mostly
in cell phones that operate on the Global System for Mobile Communications
(GSM) network.
 Each card has a unique number printed on the microchip, which the carrier
needs to activate it. In most cases, the phone's owner can go either to the

networking concepts 16
carrier's website and enter this number in the appropriate tool or call the
service provider directly from another phone to get it turned on.
 SIM cards are tied to a particular carrier and can only be used with a service
plan from that carrier.
 These cards hold the personal information of the account holder, including his
or her phone number, address book, text messages, and other data.

CDMA
 CDMA or Code Division Multiple Access is a form of access scheme that has
been widely used within 3G cellular telecommunications systems as well as
being used in a number of other technologies as well.

 CDMA technology gave some significant advantages when compared to the


technologies used for previous in terms of overall performance and specifically
in terms of spectrum efficiency.
 CDMA uses spread spectrum technology with the use of different codes to
separate between different stations or users rather than different frequencies
of time slots as in the case of previous access technologies.
 In this way, CDMA is different to the previous schemes used to provide
different cellular users with access to the radio network.
WLL

 Wireless in Local Loop (WiLL), on the other hand, is meant to serve subscribers
at homes or offices.
 The telephone provided must be atleast as good as wired phone. Its voice
quality must be high -- a subscriber carrying out long conversation must not be
irritated with quality; one must be able to use speakerphones, cordless phones
and parallel phones. The telephone must support fax and modem
communications and should be connectable to a Public Call Office.
 Ability to provide atleast medium rate Internet access is a must. Further, the
traffic supported should be reasonably high � at least as high as 0.1E per
subscriber.
 Besides, ability to support a large number of subscribers in an urban area
(large teledensity) with a limited frequency spectrum is required.
 Finally, for the systems to be of use in developing countries, the cost of
providing this wireless access should be less than that required for wired
telephone. Air-time charges are totally unacceptable.

GPRS

networking concepts 17
 General Packet Radio Service (GPRS) is a packet-data technology that allows
GSM operators to launch wireless data services, such as e-mail and Internet
access.
 As a result, GPRS provides operators with the ability to use data to drive
additional revenue.
 GPRS is often called a 2.5G technology because it is a GSM operator's first step
toward third generation (3G) and a first step in wireless data services.

 GPRS allows GSM operators to accommodate additional voice traffic without


the expense of acquiring additional spectrum.

 GPRS supports peak download data rates of up to 115 kbps, with average
speeds of 40 to 50 kbps, which is comparable to other 2.5G technologies,
 GPRS is the most widely supported packet-data wireless technology in the
world.
 Like GSM, GPRS supports international roaming so customers can access data
services whether they are at home or abroad.
 When users travel to areas that have not yet been upgraded to GPRS, they still
can access many data services via circuit-switched GSM.
1G
 First generation refers to the analog “brick phones” and “bag phones” as they
were first introduced for mobile cellular technology.
 Cell phones began with 1G and signify first generation wireless analog
technology standards that originated in the 1980s.
 1G was replaced by 2G wireless digital standards.
2G
 2G signifies second generation wireless digital technology.
 Fully digital 2G networks have replaced analog 1G, which originated in the
1980s.
 2G networks first commercially began on the Global System for Mobil
Communications, or GSM, standard. 2G on GSM standards was first used in
commercial practice in 1991 by Radiolinja, a Finnish GSM operator that was
founded on September 19, 1988.
 Radiolinja is now part of Elisa, which was known in the 1990s as the Helsinki
Telephone Company.
 In addition to the GSM protocol, 2G also utilizes various other digital protocols,
including CDMA, TDMA, iDEN and PDC. GSM is based on TDMA.
2.5 g
 2.5G wireless technology is a stepping stone that bridged 2G to 3G wireless
technology and is sometimes used to describe those evolved technologies that
were first considered as being 2G.

networking concepts 18
 While 2G and 3G have been officially defined as wireless standards by the
International Telecommunication Union (ITU), 2.5G has not been defined and was
created only for the purposes of marketing.

3G
 3G is the third generation of mobile phone standards and technology.
 3G supersedes 2G technology and precedes 4G technology.
 Current 3G systems have been established through ITU’s project on
International Mobile Telecommunications 2000 (IMT-2000).

 3G technologies have enabled faster data transmission speeds, greater


network capacity and more advanced network services.

4G
 4G is the term used to refer to the fourth generation of mobile wireless
services that has been defined by the ITU and its Radio communication Sector
(ITU-R) and established as an agreed upon and globally accepted definition in
IMT-Advanced.

5G
 5G Technology stands for 5th Generation Mobile technology.
 5G mobile technology has changed the means to use cell phones within very
high bandwidth. User never experienced ever before such a high value
technology.
 Nowadays mobile users have much awareness of the cell phone (mobile)
technology.
 The 5G technologies include all type of advanced features which makes 5G
mobile technology most powerful and in huge demand in near future.
5G Technology offers
 5G technology going to be a new mobile revolution in mobile market.
 Through 5G technology now you can use worldwide cellular phones and this
technology also strike the china mobile market and a user being proficient to
get access to Germany phone as a local phone.
 With the coming out of cell phone alike to PDA now your whole office in your
finger tips or in your phone.
 5G technology has extraordinary data capabilities and has ability to tie
together unrestricted call volumes and infinite data broadcast within latest
mobile operating system.
 5G technology has a bright future because it can handle best technologies and
offer priceless handset to their customers.

networking concepts 19
 5G Technologies have an extraordinary capability to support Software and
Consultancy.
 The Router and switch technology used in 5G network providing high
connectivity.
 The 5G technology distributes internet access to nodes within the building and
can be deployed with union of wired or wireless network connections.

Features of 5G Technology
 5G technology offer high resolution for crazy cell phone user and bi-directional
large bandwidth shaping.
 The advanced billing interfaces of 5G technology makes it more attractive and
effective.
 5G technology also providing subscriber supervision tools for fast action.
 The high quality services of 5G technology based on Policy to avoid error.
 5G technology is providing large broadcasting of data in Gigabit which
supporting almost 65,000 connections.
 5G technology offer transporter class gateway with unparalleled consistency.
 The traffic statistics by 5G technology makes it more accurate.
 Through remote management offered by 5G technology a user can get better
and fast solution.
 The remote diagnostics also a great feature of 5G technology.
 The 5G technology is providing up to 25 Mbps connectivity speed.
 The 5G technology also support virtual private network.
 The new 5G technology will take all delivery service out of business prospect
 The uploading and downloading speed of 5G technology touching the peak.
 The 5G technology network offering enhanced and available connectivity just
about the world
Applications in Network
WI-FI
 Wi-Fi, or Wireless Fidelity, is a wireless local area network (WLAN) technology
based on the Institute of Electrical and Electronics Engineers
 Wi-Fi signals have a range of about 200 to 300 feet, while cellular GSM signals
can travel for several miles.
 Wi-Fi also uses unlicensed spectrum, so unlike GSM, it has no inherent
protection from interference.
 Wi-Fi is used for a variety of applications. One of the most common is home
and business Wireless Local Area Networks (WLANs).

WIFI Hotspots

networking concepts 20
 A hotspot is a physical location that offers Internet access over a wireless local
area network (WLAN) through the use of a router connected to a link to
an Internet service provider.
 Hotspots typically use Wi-Fi technology.
 Hotspots may be found in coffee shops and various other public
establishments in many developed urban areas throughout the world.
 A hotspot is differentiated from a wireless access point, which is the hardware
device used to provide the wireless network service.
WI Max

 WiMAX is a unique technology being deployed by BSNL for the first time in
India.
 This technology provides fixed as well as fully mobile high speed broadband
connectivity alongwith roaming feature.
 It provides users a thrilling Internet browsing experience.

NetworK Security
 Network Security is an organization’s strategy and provisions for ensuring the
security of its assets and of all network traffic.
 Network security is manifested in an implementation of security policy,
hardware, and software
 Network security involves the authorization of access to data in a network,
which is controlled by the network administrator.
 Users choose or are assigned an ID and password or other authenticating
information that allows them access to information and programs within their
authority.
 Network security covers a variety of computer networks, both public and
private, that are used in everyday jobs conducting transactions and
communications among businesses, government agencies and individuals.
 Networks can be private, such as within a company, and others which might be
open to public access.
 Network security is involved in organizations, enterprises, and other types of
institutions.
 It does as its title explains: It secures the network, as well as protecting and
overseeing operations being done.
 The most common and simple way of protecting a network resource is by
assigning it a unique name and a corresponding password.
PROTECTION Methods
Cookies

networking concepts 21
 Cookiesis a small piece of data sent from a website and stored in a user's web
browser while the user is browsing that website.
 Every time the user loads the website, the browser sends the cookie back to
the server to notify the website of the user's previous activity.
 Cookies were designed to be a reliable mechanism for websites to
remember statefulinformation or to record the user's browsing activity .
Cyber Law
 Cyber law is a term used to describe the legal issues related to use of
communications technology, particularly “cyberspace”, i.e. the Internet
VIRUSES
 Virus is a computer program that is designed to replicate itself by copying itself
into the other programs stored in a computer.
Types of Viruses
 File viruses either infect executables in various ways or create file doubles,
or use file system specific features.
 Boot viruses either save themselves in disk boot sector, or to the Master
Boot Record, or change the pointer to an active boot sector.
 Macro viruses infect document files, electronic spreadsheets and
databases of several popular software packages.
 Network viruses use protocols and commands of computer network or
email to spread themselves.
Virus Prevention
 Install quality antivirus
 Install real-time anti-spyware protection
 Perform daily scans
 Don't click on email links or attachments
 Use a hardware-based firewall
 Deploy DNS protection

networking concepts 22

You might also like