The document discusses computer networks and networking concepts. It defines a computer network as a collection of interconnected computers and devices that can communicate with each other. It describes different types of networks like intranet, interspace and internet. It also explains networking concepts such as switching techniques, bandwidth, data transfer rate, transmission media and wireless communication.
Important terms in understanding internet programmingshahajahankhan123
The document discusses important terms related to internet programming and networking. It defines how data is transmitted between computers using binary digits and electrical or light signals. It then explains characteristics of signal transmission such as amplitude, frequency, phase, and bandwidth. The document defines what a computer network is and different types of networks including local area networks (LANs). It describes common LAN topologies like bus, ring, and star and advantages and disadvantages of LANs.
NetSim Webinar on Cognitive Radio NetworksSANJAY ANAND
Why use a Network Simulator for research ?
Introduction to NetSim
Cognitive Radio Basics
Designing Cognitive Radio networks using NetSim
Modifying Cognitive Radio source C code in NetSim
How to develop custom metrics?
Q & A
LAN technologies allow computers to communicate over a shared medium. They use hardware addressing and MAC addresses to allow direct communication between any two hosts. Network interface cards connect computers to the physical network and use MAC addresses to identify devices. Common LAN technologies include Ethernet, Fast Ethernet, Gigabit Ethernet, and Wi-Fi, which use CSMA/CD protocols and packet framing to share the transmission medium.
The document proposes an architecture for establishing a distributed IP-PBX communication system using multiple voice registers on different platforms and integrating both packet-switched and circuit-switched networks. It provides background on telecommunication technologies and protocols as well as an example case study of implementing the proposed architecture for a nationwide organization with distributed regional offices connected over an IP network. The case study demonstrates configuration of an Asterisk server and Cisco routers to enable voice communication between the regional branches using both the IP network and public switched telephone network.
The document provides an overview of the history and architecture of GSM cellular networks. It discusses the evolution from analog 1G networks to digital 2G and 2.5G networks. The key components of GSM architecture include the BTS, BSC, MSC, HLR, VLR, and AuC. GSM uses TDMA and FDMA to allow multiple users to share the frequency spectrum. It also relies on the SS7 protocol for signaling communication between network components to enable features like roaming.
The document provides an overview of the history and architecture of GSM cellular networks. It discusses the evolution from analog 1G networks to digital 2G and 2.5G networks. The key components of GSM architecture include the BTS, BSC, MSC, HLR, VLR, and AuC. GSM uses TDMA and FDMA to allow multiple users to share the frequency spectrum. It also relies on the SS7 protocol for signaling communication between network components to enable features like roaming.
Network and network types6.pdf got from cbse siteomkhedekxr
A computer network connects computers and devices to allow communication and sharing of resources. There are different types of network topologies that determine how the nodes are arranged and connected, such as bus, star, ring, mesh, and tree topologies. Common network devices include network interface cards, hubs, switches, routers, and wireless access points which help facilitate communication between nodes on the network.
The document summarizes the history and development of Ethernet and TCP/IP networking protocols. It describes how ARPANET originally used packet switching in the 1960s, the development of TCP and IP in the 1970s, and how Ethernet was implemented as a standard for local area networks. It also provides an overview of how IP, TCP and common applications like HTTP operate and interconnect across network layers.
Important terms in understanding internet programmingshahajahankhan123
The document discusses important terms related to internet programming and networking. It defines how data is transmitted between computers using binary digits and electrical or light signals. It then explains characteristics of signal transmission such as amplitude, frequency, phase, and bandwidth. The document defines what a computer network is and different types of networks including local area networks (LANs). It describes common LAN topologies like bus, ring, and star and advantages and disadvantages of LANs.
NetSim Webinar on Cognitive Radio NetworksSANJAY ANAND
Why use a Network Simulator for research ?
Introduction to NetSim
Cognitive Radio Basics
Designing Cognitive Radio networks using NetSim
Modifying Cognitive Radio source C code in NetSim
How to develop custom metrics?
Q & A
LAN technologies allow computers to communicate over a shared medium. They use hardware addressing and MAC addresses to allow direct communication between any two hosts. Network interface cards connect computers to the physical network and use MAC addresses to identify devices. Common LAN technologies include Ethernet, Fast Ethernet, Gigabit Ethernet, and Wi-Fi, which use CSMA/CD protocols and packet framing to share the transmission medium.
The document proposes an architecture for establishing a distributed IP-PBX communication system using multiple voice registers on different platforms and integrating both packet-switched and circuit-switched networks. It provides background on telecommunication technologies and protocols as well as an example case study of implementing the proposed architecture for a nationwide organization with distributed regional offices connected over an IP network. The case study demonstrates configuration of an Asterisk server and Cisco routers to enable voice communication between the regional branches using both the IP network and public switched telephone network.
The document provides an overview of the history and architecture of GSM cellular networks. It discusses the evolution from analog 1G networks to digital 2G and 2.5G networks. The key components of GSM architecture include the BTS, BSC, MSC, HLR, VLR, and AuC. GSM uses TDMA and FDMA to allow multiple users to share the frequency spectrum. It also relies on the SS7 protocol for signaling communication between network components to enable features like roaming.
The document provides an overview of the history and architecture of GSM cellular networks. It discusses the evolution from analog 1G networks to digital 2G and 2.5G networks. The key components of GSM architecture include the BTS, BSC, MSC, HLR, VLR, and AuC. GSM uses TDMA and FDMA to allow multiple users to share the frequency spectrum. It also relies on the SS7 protocol for signaling communication between network components to enable features like roaming.
Network and network types6.pdf got from cbse siteomkhedekxr
A computer network connects computers and devices to allow communication and sharing of resources. There are different types of network topologies that determine how the nodes are arranged and connected, such as bus, star, ring, mesh, and tree topologies. Common network devices include network interface cards, hubs, switches, routers, and wireless access points which help facilitate communication between nodes on the network.
The document summarizes the history and development of Ethernet and TCP/IP networking protocols. It describes how ARPANET originally used packet switching in the 1960s, the development of TCP and IP in the 1970s, and how Ethernet was implemented as a standard for local area networks. It also provides an overview of how IP, TCP and common applications like HTTP operate and interconnect across network layers.
Packet switching is a data transmission technique that divides data into small packets before transmission. Each packet contains a header with source and destination addresses, a payload with the original data, and a trailer with a checksum. Packets are transmitted hop-by-hop through a packet switched network and reassembled at the destination. X.25 was an early protocol for packet switched networks that established virtual circuits to provide reliable connections over unreliable transmission links. It defined physical, link, and packet layer protocols to assemble and transmit packets through public data networks. Frame Relay and ATM are later protocols that also use virtual circuits to transmit packets through packet switched networks.
Packet switching is a data transmission technique where data is divided into small packets before being transmitted over a network. Each packet contains a header with addressing information and the data. Packet switching networks allow for efficient use of bandwidth and transmission of data from many sources simultaneously. The X.25 protocol was an early standard that used packet switching and virtual circuits to transmit data reliably over public packet switched networks. It defined protocols for call setup, data transfer, and flow control between network nodes.
This document provides an overview of 3G and mobile data networks. It begins with an agenda that covers mobile network overviews, 2.5G data networks like GPRS, phases of 3G deployment focusing on areas like IP RAN and QoS, case studies, and WLAN integration. It then provides explanations of 2G mobile networks including GSM and CDMA network architecture and protocols. Finally, it discusses GPRS as an example of a 2.5G data network, covering its architecture and protocols for providing a packet-switched core overlay on existing GSM networks.
Vehicular Ad hoc Networks -VANET as a sub
class of Mobile Ad hoc Networks -MANET provides a
wireless communication among vehicles and vehicle to road
side equipment. VANET allows vehicles to form a selforganized network without the need for permanent
infrastructure. With high number of nodes and mobility,
ensuring the Quality of Service- QoS in VANET is a
challenging task. QoS is essential to improve the
communication efficiency in vehicular networks. Thus a
study of QoS in VANET is useful as a fundamental for
constructing an effective vehicular network. In this paper,
we propose Network coding Technique to improve
Bandwidth utilization on VANET. When two sources are
involved in broadcasting in the same area and at same time
, the relay will make use of Network coding to reduce the
Bandwidth consumption. While receiving the packet, a
relay has to decide whether to send the packet directly to
reduce the delay or use Network coding for effective
Bandwidth utilization. In order to make trade off, we
introduce two kind of protocols named Buffer Size Control
Scheme -BSCS and Time Control Scheme -TCS. By this
two protocols, we aim to reduce the delay that is
experienced by each packet and achieving better
bandwidth utilization.
Bluetooth is a wireless technology named after the 10th-century Danish king Harald Bluetooth. It allows for short-range wireless connections between devices like headsets, computers, and cell phones. Bluetooth devices operate on a shared frequency hopping spread spectrum that allows multiple devices to operate within range without interference. Devices can operate in a piconet, where one device acts as the master that controls communication, or scatternets, where devices participate in multiple overlapping piconets. Bluetooth provides security features like authentication and encryption to securely transmit data between connected devices.
King Harald Bluetooth unified warring Viking tribes in the 10th century. In the 21st century, a wireless Bluetooth network is named after him. Bluetooth allows for personal ad-hoc networks, cable replacement, and landline data/voice access through access points. It operates in the unlicensed 2.4GHz band using frequency hopping and supports data rates up to 1Mbps.
The document discusses the history and applications of computer networks. It describes how computers can be connected together to share resources and information. Key aspects covered include common network uses like resource sharing, information sharing, communication and e-commerce. The client-server model and examples like web browsers and email clients are also summarized.
The document discusses key aspects of IEEE 802.11 wireless networks including:
1) IEEE 802.11 standards such as 802.11b, 802.11g, and 802.11n which specify protocols for wireless LANs and have varying maximum bandwidths and modulation techniques.
2) Wireless network components like access points, bridges, and clients that connect devices to the network.
3) Network configuration settings including channel, fragmentation threshold, network type (infrastructure vs. ad-hoc), SSID, and authentication that determine how the network operates.
Bluetooth is a wireless technology standard that allows for data exchange over short distances between fixed and mobile devices. It works by creating personal area networks (PANs) using radio wave transmissions. Bluetooth was invented in 1994 by Ericsson and later developed by the Bluetooth Special Interest Group. It allows for wireless connections between devices like phones, headphones, speakers and more. Devices must have transceivers, MAC addresses, PIN numbers, and participate in a piconet to connect via Bluetooth using the FHSS protocol which hops between frequencies.
This document provides an overview of the CIS 3360: Security in Computing course being taught by Cliff Zou in Spring 2012. The objectives of the course are to obtain basic knowledge of computer networking, the Internet, network applications and protocols like TCP/IP. It introduces some key concepts like the layered Internet protocol stack, packet switching, and the hierarchical structure of the Internet as a network of networks consisting of end systems, routers, and communication links. Example applications and protocols for each layer are also discussed at a high level.
preKnowledge-InternetNetworking Android's mobile operating system is based on...jeronimored
This document provides an overview of the objectives and topics to be covered in the CIS 3360: Security in Computing course. The objectives include obtaining basic knowledge of computer networking, the Internet, network protocols like TCP/IP, and assigned reading materials. The lecture materials will cover topics like a brief history of the Internet, components and applications of the Internet, the hierarchical structure of networks, protocols like TCP and IP, and addressing processes using ports and IP addresses.
Speaker: Michael Iedema
"OpenBTS implements a complete GSM stack for voice and SMS. It also supports GPRS and UMTS 3G data standards. With an off-the-shelf server and SDR (software defined radio), it is now possible to build real mobile networks. These networks can be used to support true fixed-mobile convergence, bring coverage to remote areas or just experiment and innovate within the cellular network itself. Because OpenBTS converts all cellular signalling and media directly to SIP and RTP, the development environment should be familiar!"
ElastixWorld
Santiago de Chile
October 2014
Fibre Channel is a high-speed network technology primarily used for storage networking. It provides serial data transfer at speeds of 1-8Gbps. Fibre Channel includes the advantages of both channels (speed and reliability) and networks (scalability). It supports various topologies including point-to-point, arbitrated loop (FC-AL), and switched fabric. The switched fabric topology uses 24-bit addressing and can scale to connect over 16 million devices across multiple switches. Fibre Channel operates at seven layers, with the physical layer defining cable types and speeds, and upper layers defining protocols encapsulated for transport.
The document provides an overview of Janet Abbate's book "Inventing the Internet" which explores the history of the development of the Internet from 1959 to 1994. The book examines the social and cultural factors influencing the Internet's evolution from ARPANET to a global network. It analyzes how the Internet was shaped by collaboration and conflict between various players including government, military, computer scientists, and businesses. The author traces the technological development of the Internet and links it to organizational, social, and cultural changes during that period.
This document discusses communication networks. It defines communication as the exchange of information across space and time using various methods. Modern communication systems allow instantaneous contact and information exchange. Key inventions like the electric battery, telegraph, telephone, radio, satellites and internet have advanced communication. Communication networks can be classified as wired or wireless. Wired networks use cables and have advantages of low cost, swift transfer and security. Wireless networks use radio waves or satellites to span distances without cables. Common wireless protocols include LEACH and SPIN, which aim to efficiently transmit sensor data in wireless sensor networks.
The document discusses several key topics related to radio frequency (RF) fundamentals and wireless networking:
- It describes common sources of RF signal loss or attenuation over wireless connections, including impedance over wires and free space path loss over air. It also discusses multipath interference and fading effects.
- It provides information on wireless channel configurations for 2.4GHz and 5GHz bands, including discussions of overlapping vs non-overlapping channels and channel bonding techniques.
- It explains wireless networking standards including the improvements of 802.11n (MIMO, channel bonding) and 802.11ac (wider channels, more spatial streams, multi-user MIMO) over previous standards, and their effects on
- Bluetooth allows for connection of peripheral devices like headsets and joysticks through short-range wireless communication. It uses frequency-hopping spread spectrum in the 2.4GHz band for robust connectivity.
- Bluetooth devices can operate in a piconet with one master device and up to seven slave devices. Multiple piconets can interconnect to form a scatternet, allowing many devices to communicate in an area.
- The Bluetooth protocol stack includes layers for radio transmission, baseband control, link management, logical link/multiplexing, service discovery, and adoption of protocols like TCP/IP, OBEX, and telephony control.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
More Related Content
Similar to 010.1 NETWORKING 2020-21 PART 1 (1).pdf
Packet switching is a data transmission technique that divides data into small packets before transmission. Each packet contains a header with source and destination addresses, a payload with the original data, and a trailer with a checksum. Packets are transmitted hop-by-hop through a packet switched network and reassembled at the destination. X.25 was an early protocol for packet switched networks that established virtual circuits to provide reliable connections over unreliable transmission links. It defined physical, link, and packet layer protocols to assemble and transmit packets through public data networks. Frame Relay and ATM are later protocols that also use virtual circuits to transmit packets through packet switched networks.
Packet switching is a data transmission technique where data is divided into small packets before being transmitted over a network. Each packet contains a header with addressing information and the data. Packet switching networks allow for efficient use of bandwidth and transmission of data from many sources simultaneously. The X.25 protocol was an early standard that used packet switching and virtual circuits to transmit data reliably over public packet switched networks. It defined protocols for call setup, data transfer, and flow control between network nodes.
This document provides an overview of 3G and mobile data networks. It begins with an agenda that covers mobile network overviews, 2.5G data networks like GPRS, phases of 3G deployment focusing on areas like IP RAN and QoS, case studies, and WLAN integration. It then provides explanations of 2G mobile networks including GSM and CDMA network architecture and protocols. Finally, it discusses GPRS as an example of a 2.5G data network, covering its architecture and protocols for providing a packet-switched core overlay on existing GSM networks.
Vehicular Ad hoc Networks -VANET as a sub
class of Mobile Ad hoc Networks -MANET provides a
wireless communication among vehicles and vehicle to road
side equipment. VANET allows vehicles to form a selforganized network without the need for permanent
infrastructure. With high number of nodes and mobility,
ensuring the Quality of Service- QoS in VANET is a
challenging task. QoS is essential to improve the
communication efficiency in vehicular networks. Thus a
study of QoS in VANET is useful as a fundamental for
constructing an effective vehicular network. In this paper,
we propose Network coding Technique to improve
Bandwidth utilization on VANET. When two sources are
involved in broadcasting in the same area and at same time
, the relay will make use of Network coding to reduce the
Bandwidth consumption. While receiving the packet, a
relay has to decide whether to send the packet directly to
reduce the delay or use Network coding for effective
Bandwidth utilization. In order to make trade off, we
introduce two kind of protocols named Buffer Size Control
Scheme -BSCS and Time Control Scheme -TCS. By this
two protocols, we aim to reduce the delay that is
experienced by each packet and achieving better
bandwidth utilization.
Bluetooth is a wireless technology named after the 10th-century Danish king Harald Bluetooth. It allows for short-range wireless connections between devices like headsets, computers, and cell phones. Bluetooth devices operate on a shared frequency hopping spread spectrum that allows multiple devices to operate within range without interference. Devices can operate in a piconet, where one device acts as the master that controls communication, or scatternets, where devices participate in multiple overlapping piconets. Bluetooth provides security features like authentication and encryption to securely transmit data between connected devices.
King Harald Bluetooth unified warring Viking tribes in the 10th century. In the 21st century, a wireless Bluetooth network is named after him. Bluetooth allows for personal ad-hoc networks, cable replacement, and landline data/voice access through access points. It operates in the unlicensed 2.4GHz band using frequency hopping and supports data rates up to 1Mbps.
The document discusses the history and applications of computer networks. It describes how computers can be connected together to share resources and information. Key aspects covered include common network uses like resource sharing, information sharing, communication and e-commerce. The client-server model and examples like web browsers and email clients are also summarized.
The document discusses key aspects of IEEE 802.11 wireless networks including:
1) IEEE 802.11 standards such as 802.11b, 802.11g, and 802.11n which specify protocols for wireless LANs and have varying maximum bandwidths and modulation techniques.
2) Wireless network components like access points, bridges, and clients that connect devices to the network.
3) Network configuration settings including channel, fragmentation threshold, network type (infrastructure vs. ad-hoc), SSID, and authentication that determine how the network operates.
Bluetooth is a wireless technology standard that allows for data exchange over short distances between fixed and mobile devices. It works by creating personal area networks (PANs) using radio wave transmissions. Bluetooth was invented in 1994 by Ericsson and later developed by the Bluetooth Special Interest Group. It allows for wireless connections between devices like phones, headphones, speakers and more. Devices must have transceivers, MAC addresses, PIN numbers, and participate in a piconet to connect via Bluetooth using the FHSS protocol which hops between frequencies.
This document provides an overview of the CIS 3360: Security in Computing course being taught by Cliff Zou in Spring 2012. The objectives of the course are to obtain basic knowledge of computer networking, the Internet, network applications and protocols like TCP/IP. It introduces some key concepts like the layered Internet protocol stack, packet switching, and the hierarchical structure of the Internet as a network of networks consisting of end systems, routers, and communication links. Example applications and protocols for each layer are also discussed at a high level.
preKnowledge-InternetNetworking Android's mobile operating system is based on...jeronimored
This document provides an overview of the objectives and topics to be covered in the CIS 3360: Security in Computing course. The objectives include obtaining basic knowledge of computer networking, the Internet, network protocols like TCP/IP, and assigned reading materials. The lecture materials will cover topics like a brief history of the Internet, components and applications of the Internet, the hierarchical structure of networks, protocols like TCP and IP, and addressing processes using ports and IP addresses.
Speaker: Michael Iedema
"OpenBTS implements a complete GSM stack for voice and SMS. It also supports GPRS and UMTS 3G data standards. With an off-the-shelf server and SDR (software defined radio), it is now possible to build real mobile networks. These networks can be used to support true fixed-mobile convergence, bring coverage to remote areas or just experiment and innovate within the cellular network itself. Because OpenBTS converts all cellular signalling and media directly to SIP and RTP, the development environment should be familiar!"
ElastixWorld
Santiago de Chile
October 2014
Fibre Channel is a high-speed network technology primarily used for storage networking. It provides serial data transfer at speeds of 1-8Gbps. Fibre Channel includes the advantages of both channels (speed and reliability) and networks (scalability). It supports various topologies including point-to-point, arbitrated loop (FC-AL), and switched fabric. The switched fabric topology uses 24-bit addressing and can scale to connect over 16 million devices across multiple switches. Fibre Channel operates at seven layers, with the physical layer defining cable types and speeds, and upper layers defining protocols encapsulated for transport.
The document provides an overview of Janet Abbate's book "Inventing the Internet" which explores the history of the development of the Internet from 1959 to 1994. The book examines the social and cultural factors influencing the Internet's evolution from ARPANET to a global network. It analyzes how the Internet was shaped by collaboration and conflict between various players including government, military, computer scientists, and businesses. The author traces the technological development of the Internet and links it to organizational, social, and cultural changes during that period.
This document discusses communication networks. It defines communication as the exchange of information across space and time using various methods. Modern communication systems allow instantaneous contact and information exchange. Key inventions like the electric battery, telegraph, telephone, radio, satellites and internet have advanced communication. Communication networks can be classified as wired or wireless. Wired networks use cables and have advantages of low cost, swift transfer and security. Wireless networks use radio waves or satellites to span distances without cables. Common wireless protocols include LEACH and SPIN, which aim to efficiently transmit sensor data in wireless sensor networks.
The document discusses several key topics related to radio frequency (RF) fundamentals and wireless networking:
- It describes common sources of RF signal loss or attenuation over wireless connections, including impedance over wires and free space path loss over air. It also discusses multipath interference and fading effects.
- It provides information on wireless channel configurations for 2.4GHz and 5GHz bands, including discussions of overlapping vs non-overlapping channels and channel bonding techniques.
- It explains wireless networking standards including the improvements of 802.11n (MIMO, channel bonding) and 802.11ac (wider channels, more spatial streams, multi-user MIMO) over previous standards, and their effects on
- Bluetooth allows for connection of peripheral devices like headsets and joysticks through short-range wireless communication. It uses frequency-hopping spread spectrum in the 2.4GHz band for robust connectivity.
- Bluetooth devices can operate in a piconet with one master device and up to seven slave devices. Multiple piconets can interconnect to form a scatternet, allowing many devices to communicate in an area.
- The Bluetooth protocol stack includes layers for radio transmission, baseband control, link management, logical link/multiplexing, service discovery, and adoption of protocols like TCP/IP, OBEX, and telephony control.
Similar to 010.1 NETWORKING 2020-21 PART 1 (1).pdf (20)
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
1. VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
2. A computer network is a collection of interconnected
computers and other devices which are able to
communicate with each other. Also defined as - collection
of hardware components and computers interconnected
by communication channels that allow sharing of
resources and information. Where at least one process in
one device is able to send/receive data to/from at least
one process residing in a remote device, then the two
devices are said to be in a network
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
3. 1. Resource Sharing
2. Cost Saving
3. Collaborative user interaction
4. Time savings
5. Increased storage
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
4. If network are badly managed, services can
become unusable and productivity fails
If software and files held centrally, it may be
impossible to carry out any work if the central
server fails.
File security is more important especially if
connected to WAN e.g. protection from viruses
To handle network of organization you may
need specialist staff to run the network
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
5. 1969 - First network came into existence
ARPANET – Advanced Research Project
Agency Network
MID 80’S - NSFNET (National Science
Foundation Network)
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
6. INTERNET IS THE NETWORK OF NETWORKS.
1969
ARPANET
1980
NSFnet
1990
INTERNET
to connect computers
at u.s. defense and
different universities.
a high capacity
network to be used
strictly for academic
and engineering
research.
the internetworking of
ARPANET, NSFnet and
other private networks
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
7. a global computer network providing a variety of
information and communication facilities,
consisting of interconnected networks using
standardized communication protocols
Network of Networks
Popularly known as “NET”
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
8. Intranet is a local or restricted communications
network, especially a private network created
using World Wide Web softwares.
It is managed by any person/ organization
Intranet user can avail services of Internet
whereas Internet user cannot access intranet
directly.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
9. Interspace is a client/server software program
that allows multiple users to communicate
online with real time audio, video and text chat
in dynamic 3D environment.
Online video conferencing is an example of
Interspace.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
10. Switching techniques are used for transferring
data across network.
In large network, there might be multiple path
linking the sender and receiver. Information
may be switched as it travels through various
communication channel.
Three types of Switching techniques
1. Circuit Switching
2. Packet Switching
3. Message Switching
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
11. First the complete physical connection between two
computers is established and then the data are
transmitted from the source computer to the destination
When a call is placed the switching equipment within
the system seeks out a physical copper path all the way
from the sender to the receiver.
It is must to setup an end-to-end connection between
computers before any data can be sent.
The circuit is terminated when the connection is closed.
In circuit switching, resources remain allocated during
the full length of a communication, after a circuit is
established and until the circuit is terminated and the
allocated resources are freed
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
12. Packet switching introduces the idea of cutting data i.e.
at the source entire message is broken in smaller
pieces called packets which are transmitted over a
network without any resource being allocated.
Then each packet is transmitted and each packet may
follow any rout available and at destination packets
may reach in random order.
At the destination when all packets are received they
are merged to form the original message.
In packet switching all the packets of fixed size are
stored in main memory.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
13. In message Switching, data is first stored by one node
then forward to another node to transfer the data to
another system.
In message Switching, data is first stored, then
forwarded to the next node
In Message Switching there is no upper bound on size
of packet whereas in Packet Switching each packet is of
fixed size.
In Packet Switching data packets are stored in main
memory whereas in Message Switching Message is
stored in Hark disk which makes it reducing the access
time
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
15. Physical medium like cables over which information is
exchanged is called channel. Transmission channel
may be analog or digital. As the name suggests, analog
channels transmit data using analog signals while
digital channels transmit data using digital signals
In popular network terminology, path over which data
is sent or received is called data channel. This data
channel may be a tangible medium like copper wire
cables or broadcast medium like radio waves.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
16. Data transfer rates that can be supported by a network
is called its bandwidth.
Bandwidth can be used in two different context with
two different measuring values:
• BANDWIDTH IN HERTZ: is the range of frequencies
contained in a composite signal or the range of
frequencies a channel can pass. It is measured as
Hz (Hertz), KHz(Kilo), MHz(Mega)
• BANDWITDH IN BITS PER SECOND: number of bits
per second that a channel, link, or network can transmit. It
is measures as bps, Kbps, Mbps, etc.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
17. It defines the number of data elements (bits) sent in 1
second.The unit is bps (bits per second)
Kbps (Kilo bits per second)
Mbps (Mega bits per second)
Gbps (Giga bits per second)
Tbps (Tera bits per second)
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
18. Transmission media is a communication channel that
carries the information from the sender to the receiver.
It is of 2 type:
• Wired media
Twisted Pair Cable
Co-axial Cable
Fiber-Optical Cable
• Wireless Media
Radio waves
Microwaves
Infrared
Satellite
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
19. used for creating small computer network. It contains
four twisted pair covered in an outer shield. These pair
are color coded. An RJ-45 is used to connect this cable
to a computer. It is available in various forms such as
CAT1, CAT2, CAT3, CAT4, CAT5, CAT6.
Also known as Ethernet Cable
It is of 2 types:
• UTP (Unshielded Twisted Pair)
• STP(Shielded Twisted Pair)
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
20. Coaxial cable is a type of copper cable specially built
with a metal shield and other components engineered
to block signal interference. It is primarily used
by cable TV companies to connect their satellite
antenna facilities to customer homes and businesses.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
21. are long, thin strands of glass about thickness of human
hair. It is used to transmit data through light signals
over long distances. It is capable of transmitting
messages modulated onto light waves.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
22. Twisted Pair
Cable
Coaxial Cable Optical fiber
cable
Data Transfer
Rate
10Mbps-10Gbps 100Mbps >100Gbps
Data Transfer
Range
100 m 185-500m -
Interference
susceptibility
More Less than
Ethernet cable
NIL
Cost Least cost More than
Ethernet
Very Expensive
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
23. Electromagnetic waves are used for wireless
communication over computer network. Based on their
frequencies, electromagnetic waves are categorized into
various categories.
These categories are in increasing order of their
frequencies –
Radio Waves < Microwaves < Infra radiation < visible
light < ultraviolet radiation < x-rays < gamma rays
Out of these only radio waves, microwaves and infrared
rays are used for wireless communication
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
24. Are high frequency waves that can be used to transmit
data wirelessly over long distance
Travels in straight lines and cannot penetrate any solid
object, therefore for long distance microwave
communication high towers are built and microwave
antennas are put on their top.
It consists of transmitter, receiver and atmosphere
Used to transmit signals such as mobile phone calls
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
25. Radio waves are used to transmit television and radio
programs. Wi-Fi / Bluetooth has become a common
word today also used radio wave to transmit data
among connected device.
It is Omni-directional and can penetrate solid objects.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
26. Used for short range communication approx. 5-10m
Used in cordless mouse, remote controlled devices
They do not pass through solid object
One advantage of this is that infrared system in one
room of building will not interfere with a similar system
in adjacent room.
It is a line of sight transmission, so information passed
to one device is not leaked to another device.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
27. Used for very long distance wireless communication.
Transmission from earth to a satellite is uplink
(frequency range 1.6GHz to 30.0 GHz) and transmission
from satellite to earth is known as downlink(frequency
range 1.5GHz to 20.0GHz)
It covers large area of earth
Expensive
Require legal permissions.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
29. Modem is short for "Modulator-Demodulator.“
It is a hardware component that allows a computer or
another device, such as a router or switch, to connect to
the Internet.
As we know phone lines work on analog signal while
computer works on digital signal, So the role of Modem
is to convert Digital signal to Analog so that it can be
carried by telephone lines and other side it again
convert analog signal to digital form
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
30. The "RJ" in RJ45 stands for "registered jack,“
Registered Jack 45 (RJ45) is a standard type of
physical connector for network cables.
RJ45 connectors are most commonly seen with
Ethernet cables and networks. Modern Ethernet cables
feature small plastic plugs on each end that are
inserted into the RJ45 jacks of Ethernet devices
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
31. It is also known as NIC (Network Interface Card)
Is a device that is attached to each of the workstations
and the server and helps the workstations establish all
– important connection with the network.
It contain RJ-45 slot to connect Ethernet cable with RJ-
45 connector.
Each NIC attached to workstation has a unique number
identifying it, known as MAC Address.
Also known as Network Interface Unit.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
32. A device that works like a bridge but can handle
different protocols is known as router. For example
router can link Ethernet and mainframe. It is
responsible for forwarding data from one network to
different network.
The main purpose of router is to sorting and
distribution of the data packets to their destination
based on their IP Address.
Router uses Logical Address whereas Bridge uses
Physical Address
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
33. is an electronic device that connect several nodes to
form a network and redirect the received information to
all the connected nodes in a broadcast mode.
Hub is basically used in network to increase the
number computer allows them to communicate with
each other.
It is a dumb device i.e. it forward the message to every
node connected and create huge network traffic.
Hubs can be either Passive or Active
• Active Hub : they amplify the signals as it moves
from one connected device to another like
Repeaters.
• Passive Hub: allows signals to pass from one device
to another without any change.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
34. It is known as Intelligent HUB
Is an intelligent device that connect several nodes to
form a network and redirect the received information
only to the intended node(s)
Switch stores MAC table, and when any node transmit
the data to any node, Switch filters the desired MAC
Address of that node and send the data to that node
only.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
35. is a device used to connect different type of networks
and perform the necessary translation so that the
connected networks can communicate properly.
Gateway helps to connect different type of network i.e.
following different protocols.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
36. Similar to Ethernet card, but it allows our computer to
connect with other device without wire i.e. for wireless
connectivity.
It may be internal or external with built-in wireless
radio and antenna. The most common Wi-Fi card used
in desktop computer are PCI-Express Wi-Fi card made
it fit the PCI-Express card slots on the motherboard.
It allow to connect our device to hotspot available.
Advantage is that it allows computer to become part of
network without being physically connected through
wire and can be placed anywhere.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
37. The way in which the computers/devices are physically
interconnected to form a network is called a Topology.
It can be defined as the arrangement or structure of
network.
Types of Topologies:
• Bus
• Star
• Tree
• Ring
• Mesh
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
38. In bus topology all the nodes are connected to a main
cable called backbone.
If any node has to send some information to any other
node, it sends the signal to the backbone. The signal
travels through the entire length of the backbone and is
received by the node for which it is intended.
A small device called terminator is attached at each
end of the backbone. When the signal reaches the end
of backbone, it is absorbed by the terminator and the
backbone gets free to carry another signal.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
39. It is easy to install.
It requires less cable length and hence it is cost
effective.
Failure of a node does not affect the network
In case of cable (backbone) or terminator fault, the
entire network breaks down.
Fault diagnosis is difficult.
At a time only one node can transmit data.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
40. In star topology each node is directly connected to a
hub/switch.
If any node has to send some information to any other
node, it sends the signal to the hub/switch. This signal
is then broadcast (in case of a hub) to all the nodes but
is accepted by the intended node(s).
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
41. It is easy to install
It is easy to diagnose the fault in Star topology.
It is easy to expand depending on the specifications of
central hub/switch
Failure of hub/switch leads to failure of entire network
It requires more cable length as compared to bus
topology.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
42. Tree topology is a combination of bus and star
topologies.
It is used to combine multiple star topology networks.
All the stars are connected together like a bus.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
43. It offers easy way of network expansion
Even if one network (star) fails, the other networks
remain connected and working.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
45. Network of communicating devices(computer, phone,
MP3 etc.)
Cover area of few meters radius
When we transfer songs from one cell phone to another
we setup a PAN of two phones
Can be setup using guided or unguided media
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
46. Network of computing/communication devices in a
room, building or campus
Cover area of few kilometer radius(approx. 1 – 10 KM)
Can be setup using wired or wireless media
Managed by single person or organization
Ethernet cable or Wi-Fi is used to establish LAN
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
47. Network of computing/communicating devices
within a city.
Cover an area of few kilometers to few hundred
kilometers radius
Network of schools, banks, government offices
within a city are example of MAN.
It is typically formed by interconnected number of
LANs
Owned by organization or government.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
48. Network of computing/communication devices
crossing the limits of city, country, or continent.
Cover area of over hundreds of kilometer radius
Network of ATMs, BANKs, National or International
organization offices spread over a country,
continent are example of WAN.
It is usually formed by interconnecting LANs,
MANs or may be other WANs.
Best example of WAN is internet
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
49. Refers to SET OF RULES
In Network there are variety of computer connected to
each other and data in many ways.
For interaction among these, some rules are applied
like how and when a device can send and receive data,
how to send the data packet and how to receive etc.
There are many protocols used like:
• TCP/IP
• FTP
• PPP
• HTTP
• SMTP
• POP3
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
50. Stands for Transmission Control Protocol and Internet
Protocol
TCP is connection oriented protocol i.e. first the
connection between sender and receiver is established
through process called handshake (RTS,CTS, ACK etc.)
TCP divides the large packets to transmit into smaller
data packets called datagrams.
At the receiving end it also reassemble the packet for
form original message.
IP (INTERNET PROTOCOL) : responsible for
providing address of each computer and performing
routing. Each packet is assigned with destination IP
address.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
51. Stands for File Transfer Protocol
It allows transferring of files from one system to
another like uploading of file from local machine to
web server using FTP Client like FileZilla etc.
FTP offers these advantages:
• Useful to transfer files from one network to another
• It is an effective way to get geographically dispersed
group to co-operate on a project.
• It is popular way to update web sites.
It is not just name of protocol, but also name of program
or command by typing ftp followed by another site and
press enter.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
52. Stands for Point-to-Point Protocol
Point - to - Point Protocol (PPP) is a communication
protocol of the data link layer that is used to transmit
multiprotocol data between two directly connected
(point-to-point) computers.
It is a byte - oriented protocol that is widely used in
broadband communications having heavy loads and
high speeds.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
53. Stands for Hypertext Transfer Protocol
Used to transfer all files and other data(resources) from
one computer to another on the world wide web.
Client(Browser) send request to Web Server using
HTTP protocol and Server respond back to Client using
HTTP i.e. Client and server over web communicate
using HTTP protocol.
HTTP is stateless protocol, various technique applied to
make HTTP as State full like Cookies.
See the format of URL:
• http://www.google.com
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
54. Stands for Simple Mail Transfer Protocol
SMTP is a set of communication guidelines that allow
software to transmit an electronic mail over the internet
is called Simple Mail Transfer Protocol.
It is a program used for sending messages to other
computer users based on e-mail addresses
Port 25 (non-encrypted, unsecure)
Port 465 (encrypted, secure)
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
55. Stands for Post Office Protocol (Version-3.0)
POP3 is a client/server protocol in which e-mail is
received and held for you by your Internet server.
Periodically, you (or your client e-mail receiver) check
your mail-box on the server and download any mail,
probably using POP3.
It also allows to download the received messages on
local machine using tool like Outlook so that user can
read them even when they are not connected to the
Internet.
Port 110, default POP3 used for unsecured email
communication
Port 995 – the encrypted port used for secured
communication using POP3
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
56. Voice over Internet Protocol
It is a protocol that enables voice communication over
the Internet through the compression of voice into data
packets that can be efficiently transmitted over data
network and then convert back into voice at receiving
end.
It uses packet switching (store and forward)
It is an alternate to traditional telephone network.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
57. Remote login is a network application that permits a
user sitting at a different location to work on a specific
program on another program.
The user need ID of that computer generated by
remote login application.
It is done only when both PC are connected to Internet.
Mainly used by customer support system to do some
installation, setting on client computer.
The main programs are:
• Telnet
• AnyDesk
• Team Viewer
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
58. Telnet is one of the earliest remote login protocols on
the Internet.
Telnet is a user command and an
underlying TCP/IP protocol for accessing remote
computers.
Through Telnet, an administrator or another user
can access someone else's computer remotely. On the
Web, HTTP and FTP protocols allow you to request
specific files from remote computers, but not to actually
be logged on as a user of that computer.
With Telnet, you log on as a regular user with whatever
privileges you may have been granted to the
specific application and data on that computer.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
59. Mobile communication
protocols use multiplexing to
send information.
Multiplexing is a method to
combine multiple digital or
analog signals into one signal
over the data channel.
This ensures optimum
utilization of expensive
resource and time. At the
destination these signals are
de-multiplexed to recover
individual signals.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
60. GSM
• (Global System for Mobile Communication)
CDMA
• Code Division Multiple Access
WLL
• Wireless Local Loop
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
61. It is one of the most widely used digital wireless
telephony system.
It was developed in Europe in 1980s
Now it is an international standard in Europe, Australia,
Asia and Africa.
Any GSM handset with a SIM card can be used in any
country that uses this standard. Every SIM card ha a
unique identification number.
GSM uses TDMA (Time Division Multiple Access) to
support upto eight calls simultaneously. It also uses
encryption to make the data more secure.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
62. It stands for General Packet Radio Services.
It is a packet based wireless communication
technology that charges users based on the volume of
data the send rather than the time duration for which
they are using the service.
GPRS is the mobile communication protocol used by
second (2G) and third generation(3G) of mobile
telephony). Its speed upto 56kbps to 114kbps, however
the actual speed may vary depending on network
traffic.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
63. It is wireless local telephone service that can be
provided in homes or offices.
The subscribers connect to their local exchange
instead of the central exchange wirelessly.
A data is transferred over very short range, it is more
secure than wired network.
WLL system consists of user handset and a base station.
The base station is connected to the central exchange
as well as antenna.
The antenna transmits to and receives call from users
through microwave links
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
64. It was first used by the British military during world war
II.
After the war its use spread to civilian areas due to high
service quality.
As each user gets the entire spectrum all the time,
voice quality is very high.
CDMA phones were not using the SIM card, it comes
with built in technology.
In India CDMA technology was used by Tata Docomo
and Reliance, but now its services are stopped and only
GSM network is working.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
65. The popular network nowadays is Mobile phone
Network. It is cellular based network which gave
mobile phone name “cell phone”. Popular mobile
technologies:
1G
2G
3G
4G
5G
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
66. Used for voice calls as analog signal
No data was transmitted
Technology used as AMPS (Advanced Mobile Phone
System)
An AMP was a voice-only network operating on
800MHz.
Speed upto 2.4 kbps
Poor voice quality
Large phone with limited battery life
No data security
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
67. In this generation, few features like simple text
messaging were added.
New services such as text messaging, packet data(for
MMS and internet access), called ID and also
introduced SIM (Subscriber Identify Module) card.
Data transfer rate upto 64kbps
Disadvantage was low network range, slow data rates.
To overcome these two problems two new network –
CDMA and EDGE (Enhanced Data Rate for GSM
evolution) were introduced.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
68. In this generation Web browsing, email, video
conferencing, video downloading, picture sharing and
other smartphone technologies were introduced.
Devices are called smartphones
Fast communication, data speed between 144kbps to
2Mbps
High quality voice transmission
Supported multimedia(playing music, viewing videos,
video calls etc)
Mobile TC, Mobile internet
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
69. The speed of this generation is from 100 Mbps to
1Gbps
Based on LTE-Advanced (Long Term Evolution)
Voice as VoIP (Voice over Internet Protocol (VoLTE)
Better Video calling than 3G,Video conferencing etc.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
70. It is yet to be implemented in India which promises
superfast data transfer rate upto 20Gbps along with
energy saving.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
71. Brain of Smartphone
Mobile processor receives commands, makes instant
calculations, plays audio/video, stores information and
sends signals throughout the device.
Mobile processor has majorly two sub-processor:
• Communication Processing Unit
• Application Processing Unit
Popular Mobile processors are:
• Qualcomm Snapdragon 865
• Apple A13 Bionic
• Samsung Exynos 990 etc.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
72. It is responsible for making and receiving phone calls
on a mobile handset. It works with 2 subunits:-
• RF Transceiver
• Audio Subsystem
RF Transceiver : responsible for connecting SIM card
to base station through radio signals. Its uses networks
like 3G/4G/LTE etc.
Audio subsystem : responsible for converting the
voice signals(analog) to digital signals.The audio
subsystem receives voice input through in-built mic
and can produce audio output and send it to in-built
speaker.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
73. It is responsible for performing operations like making
calculations, playing music, internet surfing, playing
videos, connecting to other device, chat, screenshot,
making videos, saving data etc.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
74. Popular Chat protocols are:
• IRC
• XMPP
IRC ( Internet Relay Chat ) : IRC (Instant Relay Chat) is a chat
protocol that has been around since 1988. It is a simple
protocol and is quick to parse on the server side, requiring
little resources. IRC does not require any user
authentication, only that the connecting username must be
unique in a channel.
XMPP (Extensible Messaging and Presence Protocol): it is
based on XML. It requires each user must have registered
unique IDs. WhatsApp, Facebook, Google Talk chat is using
this protocol. Its features are User Identity, Multiple logins,
Persistent message, Popularity, Personal Message
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
75. The H.323 protocol is one of the most widely
deployed protocols in video conferencing.
Video conferencing is a technology by means of
which two or more parties situated in different
geographical locations can watch and converse with
each other by means of two-way transmission of video
and audio data in near real-time.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
76. WIRELESS FIDELITY : protocols allows devices to
connect to the internet without a direct line from your
Device to ISP (Internet Service provider). Its maximum
coverage area is 100 meters. Transmission speed upto
54 mbps. It is mostly used in LAN Application. It uses
Radio wave spectrum
Wi-Fi HOTSPOT : a hotspot is a venue that offers Wi-
Fi access. We can share out internet through Wi-Fi
hotspot. We can set Hotspot with or without password.
With mobile we can connect upto 10 devices with
hotspot (However it depends upto type of device)
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
77. Stands for wireless inter-operability for
Microwave access.
Wi-Max is used in MAN Applications
Wi-Max network range to max 90kms
Wi-Max transmission speed can be upto
70mbps
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com