Telnet and SSH configuration on ubuntu and windows. this presentation show how we can configure telnet and ssh on windows and linux and what additional software we will have to required.
Telnet and SSH configuration on ubuntu and windows. this presentation show how we can configure telnet and ssh on windows and linux and what additional software we will have to required.
Bluetooth based-chatting-system-using-android-docxshanofa sanu
We provide project guidance for final year MTech, BTech, MSc, MCA, ME, BE, BSc, BCA & Diploma students in Electronics, Computer Science, Information Technology, Instrumentation, Electrical & Electronics, Power electronics, Mechanical, Automobile etc. We provide live project assistance and will make the students involve throughout the project. We specialize in Matlab, VLSI, CST, JAVA, .NET, ANDROID, PHP, NS2, EMBEDDED, ARDUINO, ARM, DSP, etc based areas. We research in Image processing, Signal Processing, Wireless communication, Cloud computing, Data mining, Networking, Artificial Intelligence and several other areas. We provide complete support in project completion, documentation and other works related to project.Success is a lousy teacher. It seduces smart people into thinking they can't lose.we have better knowledge in this field and updated with new innovative technologies.
Call me at: 9037291113.
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network. FTP is built on a client-server model architecture using separate control and data connections between the client and the server.
MQTT - MQ Telemetry Transport for Message QueueingPeter R. Egli
Description of message queueing (MQ) protocol for the transport of telemetry data (MQTT - MQ Telemetry Transport).
MQTT is a protocol designed to fit the needs of Internet of Things scenarios. It is lightweight and efficient, but still affords all the features required for reliable messaging between wireless sensor / actor nodes and applications. MQTT decouples producer and consumer of data (sensors, actors and applications) through message brokers with publish / subscribe message queues called topics. MQTT supports different levels of quality of service thus providing the flexibility to adapt to the different needs of applications.
Further features like will and retain messages make MQTT well suited for sensor network scenarios as well as for lightweight enterprise messaging applications.
Open source implementations like Eclipse paho provide ample code for integrating MQTT in your own applications.
Bluetooth based-chatting-system-using-android-docxshanofa sanu
We provide project guidance for final year MTech, BTech, MSc, MCA, ME, BE, BSc, BCA & Diploma students in Electronics, Computer Science, Information Technology, Instrumentation, Electrical & Electronics, Power electronics, Mechanical, Automobile etc. We provide live project assistance and will make the students involve throughout the project. We specialize in Matlab, VLSI, CST, JAVA, .NET, ANDROID, PHP, NS2, EMBEDDED, ARDUINO, ARM, DSP, etc based areas. We research in Image processing, Signal Processing, Wireless communication, Cloud computing, Data mining, Networking, Artificial Intelligence and several other areas. We provide complete support in project completion, documentation and other works related to project.Success is a lousy teacher. It seduces smart people into thinking they can't lose.we have better knowledge in this field and updated with new innovative technologies.
Call me at: 9037291113.
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network. FTP is built on a client-server model architecture using separate control and data connections between the client and the server.
MQTT - MQ Telemetry Transport for Message QueueingPeter R. Egli
Description of message queueing (MQ) protocol for the transport of telemetry data (MQTT - MQ Telemetry Transport).
MQTT is a protocol designed to fit the needs of Internet of Things scenarios. It is lightweight and efficient, but still affords all the features required for reliable messaging between wireless sensor / actor nodes and applications. MQTT decouples producer and consumer of data (sensors, actors and applications) through message brokers with publish / subscribe message queues called topics. MQTT supports different levels of quality of service thus providing the flexibility to adapt to the different needs of applications.
Further features like will and retain messages make MQTT well suited for sensor network scenarios as well as for lightweight enterprise messaging applications.
Open source implementations like Eclipse paho provide ample code for integrating MQTT in your own applications.
Wireless phone standards have a life of their own. You can tell, because they are spoken of reverently in terms of generations. There's Great-Granddad, whose pioneering story pre-dates cellular; Grandma and Grandpa 1G, or analog cellular, Mom and Dad 2G, or digital cellular; 3G wireless, 4G, 5G and so on. This is a survey report PPT on these technology.
Learn to identify parts of a computer, hardware and software, operate the mouse and keyboard and become familiar with the MS Windows X/P Operating System.
To Download this PPT click on the link below:-
http://www29.zippyshare.com/v/14569917/file.html
Networking
Computer network
Types of network
Personal Area Networks (PANs)
Local Area Networks (LANs)
Metropolitan Area Networks (MANs)
Wide Area Networks (WANs)
Classification of Network Architecture
Client-server architecture
Peer-to-peer architecture
Hybrid architecture
Network topology
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Tree Topology
Hybrid Topology
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...CSCJournals
To provide seamless internet connectivity anywhere at any time to the mobile users, there is a strong demand for the integration of wireless access networks for all-IP based Next Generation Networks (NGN). The Wireless Local Area Network (WLAN) is capable of providing high data rate at low cost. However, its services are limited to a small geographical area. Universal Mobile Telecommunications System (UMTS) networks provide global coverage, however, cost is high and the provided data rate do not fulfill the requirements of bandwidth intensive applications. By integrating these two promising technologies; UMTS and WLAN several benefits can be achieved, i.e., load balancing, extension of coverage area, better Quality of Service (QoS), improved security features, etc. Therefore, the integration of these two technologies can provide ubiquitous connectivity and high data rate at low cost to wireless clients. In this paper different integration mechanisms of UMTS and WLAN are investigated. More precisely, an integrated mechanism for the integration of UMTS and WLAN based on two different variations of tight coupling, i.e., interconnecting WLAN with Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN) is designed and analyzed. The simulated results reveal that the GGSN-WLAN integration performance is better than the SGSN-WLAN integration for all the applied applications and measurement parameters.
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
Digital Disruption is all around us. Mobile is overtaking desktop, Social Media is beating search, Messaging Application are challenging e-mails and everything around us is becoming connected. Mobile devices especially the smart phones are fueling the culture of “Anytime, Anywhere, And Anything’’. Smartphone is not only ubiquitous but also the primary computing device for many .These paradigm shifts are fueled by the explosive growth of smart phones which has touched a volume of 1.6 billion units globally. Smartphone growth has also triggered the explosive growth of mobile applications and cloud computing .Together, Mobile cloud computing is now a potential technology for mobile services .MCC overcomes obstacles related to battery life, storage capacity and low bandwidth. Current smart phones uses 2x2 MIMO which gives a speed 300Mbps, by using massive MIMO technology speed can be enhanced up to 1Gbps. This paper gives a BER (Bit Error Ratio) analysis to prove that by increasing number of transmitting and receiving antennas the performance can be enhanced.
International Journal of Computer Science, Engineering and Information Techno...ijcseit
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information Technology. The Journal looks for significant contributions to all major fields of the Computer Science and Information Technology in theoretical and practical aspects. The aim of the Journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
96% market share of existing Smart Grid network installations is wireless mesh networks [1]. The paper starts by justifying the selection of WMNs as opposed to any other communication technology based on quantifying the bandwidth/latency/QoS constraints of a number of Smart Grid applications. The main objective of this paper, however, is to discuss some optimization techniques that found in the literature and can be implemented to overcome some of the challenges currently being faced by WMNs deployment in Smart Grid’s NANs. Hybrid WMN (HWMN) is proposed as an optimization on the topology level to leverage WMNs convergence. Distributed Autonomous Data Routing DADR, multigate and diversity routing are optimizations on the protocol level to minimize the down time of WMNs. Cognitive Radio is investigated as an optimization on the physical level. The paper also explores the feasibility of using Wireless Software Defined Networks WSDN to improve the overall visibility and manageability of WMNs
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Study on Infrastructure Developments of Mobile Generationsijtsrd
Nowadays, as Mobile communication systems have been developing in various ways, people can get better communications and mobility. A long way in a remarkably short time has been achieved in the history of wireless. The first generation 1G has fulfilled the basic mobile voice while the second generation 2G has introduced capacity and coverage. This is followed by the third generation 3G , which has requested data at higher speeds to open the gates for truly "mobile broadband" experience. Furthermore, the fourth generation will be realized as the next generation. 4G provides access to a wide range of telecommunication services, including advanced mobile services, supported by mobile and fixed networks, which are increasingly packet based. This paper explains about the required components of infrastructure in mobile generations from 1G to 4G and also describes the performance of each portion in evolutions of 1G to 4G infrastructure. And then, people can study the introduction of the infrastructure requirements of 5G network technology. Aye Myat Myat Myo | Zar Chi Soe "Study on Infrastructure Developments of Mobile Generations" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26570.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/26570/study-on-infrastructure-developments-of-mobile-generations/aye-myat-myat-myo
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
Several researches are focused on the QoS (Quality of Service) and Energy consumption in wireless Multimedia Sensor Networks. Those research projects invest in theory and practice in order to extend the spectrum of use of norms, standards and technologies which are emerged in wireless communications.
The performance of these technologies is strongly related to domains of use and limitations of their characteristics. In this paper, we give a comparison of ZigBee technology, most widely used in sensor networks, and UWB (Ultra Wide Band) which presents itself as competitor that present in these work better results for audiovisual applications with medium-range and high throughput.
Similar to Computer Wireless Network Pdf - course material 2013 (20)
INTRODUCTION
WHAT IS OSI?
OSI MODEL
TYPES OF LAYERS
PHYSICAL LAYER
DATA LINK LAYER
NETWORK LAYER
TRANSPORT LAYER
SESSION LAYER
PRESENTATION LAYER
APPLICATION LAYER
What is a network?
Need for networking
Components of Network
Types of Network
Evolution of Networking
Communication media
Data Communication Terminologies
Switching Techniques
Digital and Analog Transmission
Network Topology
Network Devices
Communication Protocols
Wireless/Mobile Computing
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2024.06.01 Introducing a competency framework for languag learning materials ...
Computer Wireless Network Pdf - course material 2013
1. Computer Network 2 2013
Lecture #1 Introduction to Wireless Networking
1. Define Wireless Network
Wireless network is an interconnection of many systems capable of providing
service to mobile users within a particular geographic region (country or
continent)
In wireless network, data are carried by Electrical Wave (e.g., radio wave)
from one node to another.
There is No Physical Cable/Wire connecting one computer to another
2. What are the components required for Wireless Networking?
Base station
Mobile Switching Center (MSC)
PSTN (Public Telecommunication Switching Network)
3. What are the advantages of wireless networking?
Mobility
Installation speed and cost
Reach of network
Flexibility/scalability
4. What are the disadvantages of wireless networking?
Speed
Security
5. What is the hardware required for Wireless networking?
Wireless NIC (Wireless Network Interface Card)
Wireless Access Point (WAP)
Universal Access Point (UAP)
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 1
2. Computer Network 2 2013
Example of Wireless Devices
4. What are the types of wireless networking mode?
a. Ad-hoc Mode
b. Infrastructure Mode
5. What is Ad-hoc Mode?
Each wireless node can communicate directly with each of the other nodes
in the network (without Wireless Access Point)
Mesh network topology
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 2
3. Computer Network 2 2013
IBSS (Independent Basic Service Set): a group of nodes communicating
in ad-hoc mode
6. What is Infrastructure Mode?
All wireless node communicate to one another via Wireless Access Point
Star network topology
BSS (Basic Service Set): a group of nodes communicating in
infrastructure mode.
An BSS has one wireless access point
EBSS (Extended Basic Service Set): two or more BSS that can
communicate to one another
An EBSS contains two or more wireless access points
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 3
4. 7. What are the types of Wireless Security?
Computer Network 2 2013
There are three basic wireless security methods available
SSID (Service Set Identification)
MAC Address Filtering
Encryption
8. What are factors affecting the Speed of the wireless network?
The wireless network technology Standard
The Distance between sender and receiver,
Interference from other wireless devices or electronic devices
The Presence of Solid Object (especially metal object, electronic
appliance) between the sender and receiver
8. What are factors affecting the Range of the wireless network?
The wireless network technology Standard
Interference from other wireless devices or electronic devices
The Presence of Solid Object (especially metal object, electronic
appliance) between the sender and receiver
9. How can we increase the range of the wireless network?
Using “signal booster”
Using Wireless Access Point
Using MULTIPLE Wireless Access Points
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 4
5. Computer Network 2 2013
10. List out the Generation of Mobile Wireless Services.
First Generation (1G)
Mobile voice services
Second Generation (2G)
Primarily voice, some low-speed data
Generation 2½ (2.5G)
Higher data rates than 2G
A bridge to 3G
Third Generation (3G)
Seamless integration of voice and data
High data rates, full support for packet switched data
11. Draw the black diagram of Cellular System
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 5
6. Computer Network 2 2013
Lecture #2 Fundamentals of Cellular Communication
1. Evolution of Cellular Communication
1893
-
Radio communication was invented by Nokola Tesla and Marconi
1940
-
First walkie-talkie was used by the US military
1947
-
John Bardeen and Walter Brattain invented the transistor
1979
-
First Cellular Phone service was launched by the Nordic Mobile
Telephone (in Finland, Sweden, Norway, Denmark).
2. Cellular System Generation
1G
Voice oriented systems based on Advanced Mobile Phone Systems
Analog technology
2G
Cordless System
Voice oriented systems based on Global System for Mobile (GSM)
Digital technology
US Time Division Multiple Access
(US-TDMA)
3G
Voice oriented systems integrate with General
data Services
Packet
Radio
Service
(GPRS) and Code Division Multiple
Access (CDMA)
4G
Based on Internet protocol networks
and will provide voice, data and
multimedia service to subscribers
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 1
7. 3. What is frequency reuse?
Computer Network 2 2013
It is a method used by service providers to improve the efficiency of a cellular
network and to serve millions of subscribers using a limited radio spectrum
4. Define Network Cell
Basic geographical unit of a cellular network;
It is the area around an antenna where a specific frequency range is used;
It is represented graphically as a hexagonal shape, but in reality it is irregular in
shape
When a subscriber moves to another cell, the antenna of the new cell takes over
the signal transmission
In heavy traffic zones cells are smaller, while in isolated zones cells are larger
5. What is Cluster?
A cluster is a group of adjacent cells, usually 7 cells
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 2
8. 5. What are the types of cells?
Computer Network 2 2013
Macro Cell
Micro Cell
Pico Cell
6. Define Macro Cell
Their coverage is large (approx. 6 miles in diameter);
It is used in remote areas,
High-power transmitters and receivers are used
7. Define Micro Cell
Their coverage is small (half a mile in diameter)
It is used in urban zones;
Low-powered transmitters and receivers are used
8. Define Pico Cell
It covers areas such as building or a tunnel
9. What is meant by Handover?
Moving a call from one zone to another zone due to subscriber’s mobility
10. What is meant by Roaming?
Allowing the subscriber to send/receive calls outside the service provider’s coverage
a re a
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 3
9. Computer Network 2 2013
11. What are the services provided by Cellular Networking?
voice communication
Short Messaging Service (SMS)
Multimedia Messaging Service (MMS)
Global Positioning System (GPS)
Wireless Application Protocol (WAP) – to access the Internet
12. Draw the diagram of Cellular Network Components
BTS -
Base Transceiver Station
BSC -
Basic Station Controller
MSC -
Mobile Switching Center
MSU -
Mobile Subscriber Unit
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 4
10. 13. What are the components of Cell Phone?
Computer Network 2 2013
Radio Transceiver – low power radio transmitter and receiver
Antenna, usually located inside the phone
Control Circuitry – formats the data sent to and from the BTS; controls signal
transmission and reception
Man-Machine Interface – consists from a keypad and a display; is managed by
the control circuitry
Subscriber Identity Module (SIM) – integrated circuit card that stores the
identity information of subscriber
Battery - the power unit of the phone
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 5
11. Computer Network 2 2013
Lecture #3 Wireless Application Protocol (WAP Technology)
1. Define WAP
WAP is a Wireless Application Protocol.
2. Define Protocol
Protocol is a set of rules in network
3. Give a brief discussion about WAP
WAP stands for Wireless Application Protocol
WAP is an Application Layer Communication Protocol
WAP is used to Access Services and getting Information
WAP is Inherited from Internet standards
WAP is for Handheld devices such as Mobile Phones, PDA
WAP is a protocol designed for Micro Browsers
WAP enables the creating of Web Applications for Mobile Devices.
WAP uses the Mark-Up Language WML (not HTML)
WML is defined as an XML 1.0 application
4. Define Micro Web Browser
A Micro Browser is a small piece of software that makes minimal demands on
hardware, memory and CPU. It can display information written in a restricted
mark-up language called WML.
The Micro Browser can also interpret a reduced version of JavaScript called
WMLScript.
To fit into a small wireless terminal, WAP uses a Micro Browser.
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 1
12. 5. What is the Expansion of WML?
Computer Network 2 2013
Wireless Markup Language
6. The home page of WML is known as Decks
7. The Decks are constructed as Cards
8. What are the limitations of WAP?
a. Low bandwidth network
b. High Latency network
c. Limited connection stability
d. Small display size
e. Limited input facility
f. Limited memory
g. Limited processing power
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 2
13. Computer Network 2 2013
9. Draw the architecture of WAP Technology
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 3
14. Lecture #4 I – Mode Technology
Computer Network 2 2013
1. Define i-mode and give brief introduction about i-mode service
i-mode is a wireless multimedia service popular in Japan
It provides a Multimedia and Messaging service for Mobile Phones.
Developed by NTT Docomo
i-mode was launched in Japan on 22 February 1999
i-mode users have access to various services such as e-mail, sports results,
weather forecast, games, financial services, ticket booking and
internet
browsing.
45 million subscribers in Japan, 4 million worldwide
i-mode enabled handsets are needed for accessing this service
Limited availability: only for customers of Japanese mobile phone provider NTT
DoCoMo.
i-mode was developed as an inexpensive method of packet switched high-speed
communication.
2. What are the services provided by I –Mode?
I-mode provides 6 types of services
1. E-Mail
2. Transaction
3. Information
4. Database
5. Entertainment
6. Internet Web Browsing
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 1
15. Computer Network 2 2013
3. Explain in details of the services provided by i-mode?
E- Mail:
I-mode user can send and receive mails from another i-mode enabled phone,
PDA or a computer
Transaction Service:
Transaction services include banking, ticket reservation, airline information and
credit card information.
Information Service:
Examples of information service include news updates, whether information
sports news and stock quotes
Database service:
The database service provides contents such as telephone directory search,
restaurant guide, and Dictionary service.
Entertainment:
Entertainment service include network game character download, horoscope
Internet web browsing:
Internet web browsing enables users to browse contents on the internet
4. What are the components needed for i-mode service?
There are four main components that are required for i-Mode service.
1. A cellular phone capable of voice and packet communication and with a
browser installed
2. A packet network
3. An i-mode server
4. Information providers
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 2
16. 5. Draw the architecture of i-mode
Computer Network 2 2013
The PDC-P (Personal Digital Cellular Packet) network transports data between
i-mode phone and i-mode server.
i-mode phone sends data to the base station which forwards them to PPM(Packet
processing module)
PPM routes the packets to the M-PG (Message Packet) gateway.
Connection between i-mode server and internet are made using TCP/IP
I - mode server: it act as a proxy between the packet network and the internet.
Content providers:
1. Official content providers
2. Unofficial content providers
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 3
17. Computer Network 2 2013
MPG (Mobile Packet Gateway) handles the protocol conversion between the
two protocol platforms.
6. What are the technologies used in I – mode
1. Packet Switched Network
2. Compact Hyper Text Markup Language (CHTML)
7. Mention some I – mode phones released in UK
The first nine i-mode handsets released in the UK are:
1. NEC343i
2. NEC41i
3. Samsung s500i
4. Samsung Z320i
5. Samsung S400i
6. Sony EricssonK610im
7. MotorolaSLVRL7 i-mode
8. Motorola SLVRL6 i-mode
9. NokiaN95i
8. What is the difference between WAP and I – mode
WAP
I - mode
Circuit Switch method
Packet Switch method
use text and no images
Use images, animated images and color
users are charged for the connection
users are not charged for the connection
time
time
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 4
18. Computer Network 2 2013
Lecture #5 Speech and Channel Coding Techniques
1. Define Bandwidth
It is the range of frequencies that is available for the transmission of data.
2. Define Frequency
It is the rate (cycles/sec or HZ) at which the signals repeat.
3. What is the use of Speech Coding?
Speech Coding is used to save the bandwidth and improve bandwidth efficiency
4. What are the methods followed in Speech Coding?
Wave Form Coding
Time Domain Waveform Coding
Frequency Domain Waveform Coding
Source Coding
Hybrid Coding
5. What are the attributes of Speech Coding?
Transmission Bit Rate
Delay
Complexity
Quality
6. Define Channel
A channel is a portion of the communications medium allocated to the sender
and receiver for conveying information between them.
7. What is the use of Channel Coding?
It is used to improve the signal quality and reduce the Bit - Error – Rate (BER)
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 1
19. Computer Network 2 2013
8. What are the classifications of Channel Coding?
Automatic Repeat Request (ARQ)
Forward Error Correction (FEC)
9. What is the process of ARQ?
In this, the transmission errors are detected by the receiver but not corrected.
10.What is the process of FEC?
In this, the transmission errors are detected by the receiver and also corrected
11.What are the common Error Correction Codes used now a days?
Reed Solomon (RS)
Viterbi (V)
Reed Solomon Viterbi (RSV)
12. What are the Schemes used in Channel Coding?
RS Codes
Convolutional Codes
Turbo Codes
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 2
20. Computer Network 2 2013
Lecture #6 Mobility Management in Wireless Network
1. What are the categories of Mobility?
Radio Mobility
-
Network Mobility -
deals with the signal handoff / handover process
deals with the mobile location management
2. Define PLMN (Public Land Mobile Network)
It is an integrated service digital cellular network providing wireless access for
mobile subscribers to other network services.
3. What are the functions of Mobility Management System?
Automatic Roaming
Authentication
Intersystem Handoff
4. What are the types of Mobile Registration?
1. Distance based registration
2. Geographic based registration
3. Parameter change registration
4. Periodic based registration
5. Power-down based registration
6. Power-up based registration
7. Timer based registration
5. What is meant by handoff / handover signal?
As the mobile moves from one cell area to another, an active cell must undergo a
switch from one channel to another. This process is called as handover process.
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 1
21. Computer Network 2 2013
6. What are the techniques used in handoff process?
Mobile controlled Handoff (MCHO)
Network Controlled Handoff (NCHO)
Mobile Assisted Handoff (MAHO)
7. What are the types available in handoff technique?
1. Hard Handoff
a. Inter Frequency
b. Intra Frequency
2. Soft Handoff
3. Softer Handoff
8. Mention some handoff Algorithms
RSS (Radio Station Subsystem) Type
RSS plus Threshold Type
RSS plus Handoff Margin Type
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 2
22. Computer Network 2 2013
Lecture #7 Wireless Wide Area Network (WWAN) & GSM
1. What are the three subsystems used in WWAN?
Radio Station Subsystem (RSS)
Networking and Switching Subsystem (NSS)
Operational and Maintenance Subsystem (OMS)
2. Draw the model of WWAN
WWAN
RS S
USER EQUIPMENT
NSS
EXTERNAL NETWORK
OMS
SERVICE PROVIDER
USER
3. What is the Expansion of the followings that are used in WWAN?
1. IMSI -
International Mobile Subscriber Identity
2. TMSI -
Temporary Mobile Subscriber Identity
3. IMEI -
International Mobile Subscriber Identity
4. SIM -
Subscriber Identity Module
5. GSM -
Global System for Mobile Communication
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 1
23. Computer Network 2 2013
4. Mention the two types of channels in GSM
1. Physical Channel
2. Logical Channel
a. Traffic Channel
b. Control Channel
c. Cell Broadcast Channel
5. What are the three types of services provided by GSM?
Bearer Services
Tele Services
Supplementary Services
6. What are the enhanced services provided by GSM?
GPRS
-
General Packet Radio Service
UMTS
-
Universal Mobile Telecommunication Service
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 2
24. Lecture #8 Bluetooth Technology
Computer Network 2 2013
1. What is Bluetooth?
Bluetooth is the wireless technology that connects and transmits voice and data to
mobile phones, computers and other devices and it work without cable
2. Why the technology is called Bluetooth?
The name of Bluetooth was getting from 10th century Danish King Harald Blatand
who unified Denmark and Norway
3. What is the Expansion of the followings that are used in WWAN?
1. IMSI -
International Mobile Subscriber Identity
2. TMSI -
Temporary Mobile Subscriber Identity
3. IMEI -
International Mobile Subscriber Identity
4. SIM -
Subscriber Identity Module
5. GSM -
Global System for Mobile Communication
4. What is the history of Bluetooth?
In 1994, Ericcson a Swedish company created the Bluetooth Technology
In 1998, five major companies IBM, Intel, Nokia, Toshiba and Ericsson worked
together to connect their product using Bluetooth Special Interest Group (SIG).
5. What are the types of Bluetooth?
Bluetooth Dongle
Bluetooth Headset
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 1
25. 6. What is Bluetooth Dongle?
Computer Network 2 2013
Installing a Bluetooth dongle is easy; simply insert the CD that came with it, follow
the on screen prompts and then plug the dongle into a free USB port.
7. What is Bluetooth Headset?
Bluetooth headsets are mainly used with compatible cell phones, place the headset
on your ear and roam freely while talking to colleagues, friends and family.
8. Where we can use the Bluetooth technology?
We can use the Bluetooth in
Cars:
• Mobile Phones
• GPS navigation
Home:
• Remote Controls
• Game controllers
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 2
26. Medical and Health Devices:
Computer Network 2 2013
• Stethoscopes
• Glucose Monitors
9. What are the advantages of Bluetooth?
Wireless
Bluetooth works without cable, it works with wireless.
Low energy consumption
Bluetooth uses low power signals. For that reason technology need little energy,
and will use less battery.
Bluetooth Technology is inexpensive
Bluetooth is cheap to manufacture, and anyone can buy it.
Sharing voice and data
The Bluetooth allows to devices to share voice and data communications.
10.What are the disadvantages of Bluetooth?
Data Transfer Rate
Bluetooth devices cannot be connected with more than one device at the same
time, because it finds problem in discovering the another devices.
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 3
27. Computer Network 2 2013
Range
Bluetooth has a range of 15 to 30 feet .The small range is a disadvantage for
some who may want to use a Bluetooth device outside of that 30-foot radius.
Battery Use
Bluetooth uses the battery power of a particular device in order to operate. Many
cell phone makers send phones out with Bluetooth powered off in order to
maximize the battery life of the phone.
11.What are the goals of Bluetooth technology?
Open Specification
Voice and Data Capability
Worldwide Usability
Short-Range Wireless Solutions
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 4
28. Computer Network 2 2013
Lecture #9 Wi-Fi Technology & IEEE
1. What is Wi-Fi?
Wi-Fi (Wireless Fidelity) is a wireless technology. Wi-Fi enabled computers send
and receive data indoors and out; anywhere within the range of a base station.
Allows you to access the Internet while on the move; you can remain online while
moving from one area to another, without a disconnection or loss in coverage.
2. Illustrate the sample Wi-Fi Connection?
3. What are the Wi-Fi Standards?
Standard
Speed
Frequency bandwidth
802.11
2 Mbps
2.4 GHz
802.11a
54 Mbps
5 GHz
802.11b
11 Mbps
2.4 GHz
802.11g
54 Mbps
2.4 GHz
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 1
29. 4. What is a Hotspot?
Computer Network 2 2013
A HotSpot is a geographic area that has a readily accessible wireless
network.
HotSpots are equipped with a Broadband Internet connection, and one or
more Access Points that allow users to access the Internet wirelessly.
HotSpots can be setup in any public location that can support an Internet
connection
5. What are the places to install Wi-Fi?
Basically, any location which caters to business users and where people with
laptops are likely to make frequent visits is an ideal choice to install Wi-Fi.
Airports
Hotels & Resorts
Restaurants
Coffee Shops
Bookstores
Shopping Malls
6. Who are the users of Wi-Fi?
• Frequent Travelers
• Businessmen and Corporate Managers
• Scientists & Doctors
• Students and Academicians
• Administrators & Technocrats who participate in Seminars & Conferences
• Just about anybody with a laptop
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 2
30. Computer Network 2 2013
7. What are the components required for Wi-Fi?
A PC, laptop or PDA, running Windows 98 or above
A wireless PCMCIA / CENTRINO Card
An Access Point
A valid internet connection
Bluetooth headsets are mainly used with compatible cell phones, place the headset
on your ear and roam freely while talking to colleagues, friends and family.
8. Where we can use the Bluetooth technology?
We can use the Bluetooth in
Cars:
• Mobile Phones
• GPS navigation
Home:
• Remote Controls
• Game controllers
Medical and Health Devices:
• Stethoscopes
• Glucose Monitors
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 3
31. Computer Network 2 2013
9. What are the advantages of Bluetooth?
Wireless
Bluetooth works without cable, it works with wireless.
Low energy consumption
Bluetooth uses low power signals. For that reason technology need little energy,
and will use less battery.
Bluetooth Technology is inexpensive
Bluetooth is cheap to manufacture, and anyone can buy it.
Sharing voice and data
The Bluetooth allows to devices to share voice and data communications.
10.What are the disadvantages of Bluetooth?
Data Transfer Rate
Bluetooth devices cannot be connected with more than one device at the same
time, because it finds problem in discovering the another devices.
Range
Bluetooth has a range of 15 to 30 feet .The small range is a disadvantage for
some who may want to use a Bluetooth device outside of that 30-foot radius.
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 4
32. Battery Use
Computer Network 2 2013
Bluetooth uses the battery power of a particular device in order to operate. Many
cell phone makers send phones out with Bluetooth powered off in order to
maximize the battery life of the phone.
11.What are the goals of Bluetooth technology?
Open Specification
Voice and Data Capability
Worldwide Usability
Short-Range Wireless Solutions
12. Define IEEE and its Wireless Standards?
In 1997, the Institute of Electrical and Electronic Engineers (IEEE) drafted
the 802.11 standard for wireless local area networking.
In 1999, networking hardware companies accepted the standard and began
manufacturing products using the 802.11b protocol which operated in the 2.4
GHz range and was capable of transmitting at speeds of 11 Mbps.
The 802.11a protocol was also released in 1999, operating at 5.8 GHz with
transmissions speeds of 54 Mbps, but its cost was prohibitively high.
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 5
33. Computer Network 2 2013
IEEE Wireless Standards
Wireless Standard
802.11b
802.11g
802.11a
Frequency Range
2.4 – 2.4835 GHz
2.4 – 2.4835 GHz
5.725 - 5.850 GHz
Max Speed
11 MBPS
54 MBPS
54 MBPS
Max Encryption
128 bit WEP
128 bit WEP
152 bit WEP / 256 bit AES
Discrete Channels
Natively Compatible
Potential user
3
3
8
802.11b, 802.11g
802.11b, 802.11g
802.11a
Entry level and home
networks
Larger networks,
small business
Large business concerned
with security
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 6
34. Lecture #10 WiMax Technology
Computer Network 2 2013
1. What is WiMax Stands for?
WIMAX stands for Worldwide Interoperability for Microwave Access
2. Define WiMax
WiMax refers to broadband wireless networks that are based on the IEEE 802.16
standard, which ensures compatibility and interoperability between broadband
wireless access equipment
WiMax, which will have a range of up to 31 miles
3. Illustrate the fundamental concepts of WiMax
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 1
35. Computer Network 2 2013
4. What are the components needed for WiMax?
WiMax Tower
WiMax Receiver
WiMax Tower
WiMax Receiver
5. What are the benefits of WiMax?
1. Speed
Faster than broadband service
2. Wireless
Not having to lay cables reduces cost
Easier to extend to suburban and rural areas
3. Broad Coverage
Much wider coverage than Wi-Fi hotspots
Prepared By Mrs.Vasanthi Muniasamy M.Sc., M.Phil Rank: Asst. Prof., CCG, KKU
Page 2