It's a Presentation from THIAGARAJAR  POLYTECHNIC  COLLEGE (Autonomous Institution) Salem - 5
Recent Trends In Networking
This Paper has been submitted under the guidance of Over headed by M.Saravanan (M.E) – Lecturer (Computer Tech).   PL.Sindhu  B. E  – Lecturer (Computer Tech).   MR.D.ARUL SELVAN M.E., Head Of the Department / Computer Technology
Presented & performed by   Ranjith. B Arunachalam. PL COMPUTER ENGINEERING
Introduction LAN (Local Area Networking) Synthesis of Usage of LAN Implementation of LAN WAN (Wide Area Networking) Communication in WAN LAN vs. WAN Zigbee Bluetooth Wi-Fi Bibliography Concluding remarks Synopsis
Networks - A Small intro… Networking  allows one computer to send  information to and receive information from  another.  Certainly the  Internet  is the most conspicuous  example of computer networking. Allows many different devices in multiple  locations to access a shared repository of data
LAN Within  a  Building  or  Campus  A high-speed data network that  covers  a  relatively  small geographic area .  It typically  connects  workstations, personal computers,  printers ,  servers , and  other devices .
What Is a WAN?  Network that covers a relatively broad geographic area  WAN technologies generally function at the lower three layers of the OSI  reference model: the physical layer, the data link layer, and the network  layer.  WAN (Wide Area Networking) A Typical Point-to-Point Link Operates Through a WAN to a  Remote  Network:
WAN DELHI CHENNAI WAN  Link DELHI CHENNAI
“ Bluetooth wireless technology is an open specification for a low-cost, low-power, short-range radio technology for ad-hoc wireless communication of voice and data anywhere in the world.”
Technical features 8-128 bits (configurable) Data Security –Encryption Key 8 devices Supported Stations 128 bit key   Data Security –Authentication Key 30 ft   Range   1 Mbps Data Rate 2.4 GHz Spectrum
Ultimate Headset
Cordless Computer
Bluetooth Goals & Vision Originally conceived as a cable replacement technology Short-Range Wireless Solutions Open Specification Voice and Data Capability Worldwide Usability
How to install bluetooth software in PC Step 1 Step 2
How to install bluetooth software in PC Step 3 Step 4
PC’s Environment Here a PC and k550i is connected
Security measures  Supports Authentication Encryption & Decryption Authorization Identifiers ID’s Random numbers Private Keys Long encryption keys are used
Wireless Fidelity (Wi-Fi) Welcome to the World of Wireless Short form of Wireless Fidelity. This can be defined as a  wireless Local Area Networking System.  Can you imagine a day without  Internet ? For me it is not possible.  That means now internet has become an integral part of our life.  With the help of Wi-Fi, we can access broad band internet  connection with high data transfer rate.  The  main attractive feature  of this technology is that it can  provide  wireless broadband connection  within a specific  geographic boundary.
 
Wireless Local Area Networking
Products
Wireless Fidelity (Wi-Fi) We can access internet through our  laptop .  Because of this WiFi technology tourism contacts is being  progressed.  So Wi-Fi is rocking. Isn't it?
Wireless Fidelity (Wi-Fi) Advantages   Mobile. Widely available in public venues. Relatively inexpensive. Easy to set up a network. User-friendly software. Security features. Global set of standards.
How to use WiFi? Host Wireless Router Network adapter Network name Network password
Wi-Fi Security   WEP stands for Wired Equivalency Privacy  As its name implies, this standard was intended to  make wireless networks as secure as wired networks. The common key lengths are currently 128- and 256- bit. WPA Wi-Fi Protected Access is an early version of  the 802.11i security standard that was developed by  the Wi-Fi Alliance to replace WEP.
Created by the ZigBee Alliance Technological Standard Created for Control and Sensor Networks   Low data rate Low power consumption Small packet devices
 
Rabbit Wireless Module Network using Zigbee
ZigBee and Other Wireless Technologies Wi-Fi  TM
www.logmein.com
Conclusion
Thank You “ Things that think… don’t make sense unless they link.”
Bibliography References  CCNA INTRO - Wendell Odom Network Essentials – William Stalings Website www.wikipedia.com www.howstuffworks.com www.palowireless.com www.bluetooth.com www.zigbee.org www.technologyreview.com

Network Trends

  • 1.
    It's a Presentationfrom THIAGARAJAR POLYTECHNIC COLLEGE (Autonomous Institution) Salem - 5
  • 2.
    Recent Trends InNetworking
  • 3.
    This Paper hasbeen submitted under the guidance of Over headed by M.Saravanan (M.E) – Lecturer (Computer Tech). PL.Sindhu B. E – Lecturer (Computer Tech). MR.D.ARUL SELVAN M.E., Head Of the Department / Computer Technology
  • 4.
    Presented & performedby Ranjith. B Arunachalam. PL COMPUTER ENGINEERING
  • 5.
    Introduction LAN (LocalArea Networking) Synthesis of Usage of LAN Implementation of LAN WAN (Wide Area Networking) Communication in WAN LAN vs. WAN Zigbee Bluetooth Wi-Fi Bibliography Concluding remarks Synopsis
  • 6.
    Networks - ASmall intro… Networking allows one computer to send information to and receive information from another. Certainly the Internet is the most conspicuous example of computer networking. Allows many different devices in multiple locations to access a shared repository of data
  • 7.
    LAN Within a Building or Campus A high-speed data network that covers a relatively small geographic area . It typically connects workstations, personal computers, printers , servers , and other devices .
  • 8.
    What Is aWAN? Network that covers a relatively broad geographic area WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer. WAN (Wide Area Networking) A Typical Point-to-Point Link Operates Through a WAN to a Remote Network:
  • 9.
    WAN DELHI CHENNAIWAN Link DELHI CHENNAI
  • 10.
    “ Bluetooth wirelesstechnology is an open specification for a low-cost, low-power, short-range radio technology for ad-hoc wireless communication of voice and data anywhere in the world.”
  • 11.
    Technical features 8-128bits (configurable) Data Security –Encryption Key 8 devices Supported Stations 128 bit key Data Security –Authentication Key 30 ft Range 1 Mbps Data Rate 2.4 GHz Spectrum
  • 12.
  • 13.
  • 14.
    Bluetooth Goals &Vision Originally conceived as a cable replacement technology Short-Range Wireless Solutions Open Specification Voice and Data Capability Worldwide Usability
  • 15.
    How to installbluetooth software in PC Step 1 Step 2
  • 16.
    How to installbluetooth software in PC Step 3 Step 4
  • 17.
    PC’s Environment Herea PC and k550i is connected
  • 18.
    Security measures Supports Authentication Encryption & Decryption Authorization Identifiers ID’s Random numbers Private Keys Long encryption keys are used
  • 19.
    Wireless Fidelity (Wi-Fi)Welcome to the World of Wireless Short form of Wireless Fidelity. This can be defined as a wireless Local Area Networking System. Can you imagine a day without Internet ? For me it is not possible. That means now internet has become an integral part of our life. With the help of Wi-Fi, we can access broad band internet connection with high data transfer rate. The main attractive feature of this technology is that it can provide wireless broadband connection within a specific geographic boundary.
  • 20.
  • 21.
  • 22.
  • 23.
    Wireless Fidelity (Wi-Fi)We can access internet through our laptop . Because of this WiFi technology tourism contacts is being progressed. So Wi-Fi is rocking. Isn't it?
  • 24.
    Wireless Fidelity (Wi-Fi)Advantages Mobile. Widely available in public venues. Relatively inexpensive. Easy to set up a network. User-friendly software. Security features. Global set of standards.
  • 25.
    How to useWiFi? Host Wireless Router Network adapter Network name Network password
  • 26.
    Wi-Fi Security WEP stands for Wired Equivalency Privacy As its name implies, this standard was intended to make wireless networks as secure as wired networks. The common key lengths are currently 128- and 256- bit. WPA Wi-Fi Protected Access is an early version of the 802.11i security standard that was developed by the Wi-Fi Alliance to replace WEP.
  • 27.
    Created by theZigBee Alliance Technological Standard Created for Control and Sensor Networks Low data rate Low power consumption Small packet devices
  • 28.
  • 29.
    Rabbit Wireless ModuleNetwork using Zigbee
  • 30.
    ZigBee and OtherWireless Technologies Wi-Fi TM
  • 31.
  • 32.
  • 33.
    Thank You “Things that think… don’t make sense unless they link.”
  • 34.
    Bibliography References CCNA INTRO - Wendell Odom Network Essentials – William Stalings Website www.wikipedia.com www.howstuffworks.com www.palowireless.com www.bluetooth.com www.zigbee.org www.technologyreview.com

Editor's Notes

  • #3 18 October 2010
  • #4 18 October 2010
  • #5 18 October 2010