SlideShare a Scribd company logo
The Latest Development in
 Network and Communication




Name: Rizwan Razman B. Ahmad Nozrin
I.C no:940420-08-****
Class:4STA
Teacher’s Name: Pn. Aenizawati Bt. Abdul Samad
Content




1.0 INTRODUCTION

2.0 MOBILE COMPUTING
     2.1 DEFINATION
     2.2 SPECIFICATION, SERVICES & FREQUENCIES OF MOBILE
        COMPUTING

3.0 INTERNET TECHNOLOGY & SERVICES
      3.1 VoIP
      3.2 BLOG
4.0 TYPE OF NETWORK
      4.1 PAN
      4.2 VPN
      4.3 WLAN

5.0 CONCLUSION

6.0 REFERENCE
1.0 Introduction
The latest development in networks and communication means the improvement in networks and
communication services and products which really useful for IT user. It is also much better from the
previous contains.


2.0 Mobile Computing.



2.1 Definition.

Using a computing device while in transit. Mobile computing implies wireless transmission,but

wireless transmission does not necessarily imply mobile computing. Fixed wireless applications use
satellites, radio systems and lasers to transmit between permanent objects such as buildings and

towers.




2.2 Specification, services & frequencies of Mobile Computing.
Mobile Computing                  PDA, HD                             PSP

SPECIFICATION                      1.Low bandwith.
                                   2.High bandwith variability.       •Low power machines
                                   3.Hidden terminal.
                                                                      •enable anywhere
                                   4.Low power machines.
                                   5.Low resources machines
                                                                      •low resources machines.
                                   6.need proximity
                                   7.higher delay
                                   8.disconnected operation
9.enable anywhere/anytime
                                   connentivity.
                                   10.Enable new application.

SERVICES                           1.Emergency services               •games
                                   (messaging & calling)
                                   2.stock information.Collection
                                   /control.
                                   3.Credit card verification.
                                   4.Taxi/truck dispatch.
                                   5.Electronic mail/paging
FREQUENCIES                        •EGSM 900/1800/1900                •none
                                   •UMTS 2100




3.0 Internet Technology And services

3.1 Voice Over Internet Protocol ( VoIP)
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for
delivery of voice communications over IP networks such as the Internet or other packet-switched
networks. Other terms frequently encountered and synonymous with VoIP are IP telephony, Internet
telephony, voice over broadband (VoBB), broadband telephony, and broadband phone.

3.2 Blog
A blog (a contraction of the term weblog) is a type of website, usually maintained by an individual
with regular entries of commentary, descriptions of events, or other material such as graphics or
video. Entries are commonly displayed in reverse-chronological order. "Blog" can also be used as a
verb, meaning to maintain or add content to a blog.




4.0 Types Of Network

4.1 Personal Area Networking (PAN)

A personal area network (PAN) is a computer network used for communication among computer
devices (including telephones and personal digital assistants) close to one person. The devices may or
may not belong to the person in question. The reach of a PAN is typically a few meters. PANs can be
used for communication among the personal devices themselves (intrapersonal communication), or
for connecting to a higher level network and the Internet (an uplink). Personal area networks may be
wired with computer buses such as USB and FireWire. A wireless personal area network (WPAN)
can also be made possible with network technologies such as IrDA, Bluetooth, UWB, Z-Wave and
ZigBee.
4.2 Wireless LAN (WLAN)

A wireless LAN (WLAN) is a wireless local area network that links two or more computers or
devices using spread-spectrum or OFDM modulation technology based to enable communication
between devices in a limited area. This gives users the mobility to move around within a broad
coverage area and still be connected to the network



4.3 WIMAX
Worldwide Interoperability for Microwave Access (WiMAX) is a communications technology
thatuses radio spectrum to transmit tens of megabits per second in bandwidth between digital devices
such as laptop computers. Similar to WiFi, WiMAX brings with it the ability to transmit over far
greater distances and to handle much more data.




5.0 Conclusion
The latest development in networks and communication brings more useful to IT user which can
makes lifes way easier in networking and communicate.


6.0 References
http://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+computing&i=47137,00 asp
http://answers.yahoo.com/question/index?qid=20070629052817AASZjbY
http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol
http://en.wikipedia.org/wiki/Blog
http://compnetworking.about.com/od/basicnetworkingconcepts/a/network_types.htm
http://en.wikipedia.org/wiki/Personal_Area_Network
http://en.wikipedia.org/wiki/Wireless_LAN
http://www.mariosalexandrou.com/definition/wimax.asp

More Related Content

What's hot

Bluetooth Paper Presentation
Bluetooth Paper PresentationBluetooth Paper Presentation
Bluetooth Paper Presentation
guestac67362
 
Blue tooth
Blue toothBlue tooth
Blue tooth
Khurram Burjees
 
Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)
Biplob Orton
 
Bluetooth
BluetoothBluetooth
Bluetooth
Aniruddha Gupta
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
Zafar Ayub
 
Bluetooth Broadcasting
Bluetooth BroadcastingBluetooth Broadcasting
Bluetooth Broadcasting
ijtsrd
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
AJAL A J
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
baralsashank
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technologyDavid Livingston J
 
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
deepak kumar
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic VersionAyesha Saeed
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technologymathan0071
 
Bluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless CommunicationsBluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless Communications
guestac67362
 
networking tutorial
networking tutorialnetworking tutorial
networking tutorial
Raj Alam
 
Wireless lan
Wireless lanWireless lan
Wireless lan
Anitha Ramar
 

What's hot (20)

Bluetooth Paper Presentation
Bluetooth Paper PresentationBluetooth Paper Presentation
Bluetooth Paper Presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Blue tooth
Blue toothBlue tooth
Blue tooth
 
Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
 
Bluetooth Broadcasting
Bluetooth BroadcastingBluetooth Broadcasting
Bluetooth Broadcasting
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
 
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless CommunicationsBluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless Communications
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
networking tutorial
networking tutorialnetworking tutorial
networking tutorial
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 

Viewers also liked

Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on societyRizwan Razman
 
Kesan penjajahan barat terhadap pentadbiran dan ekonomi di malaysia
Kesan penjajahan barat terhadap pentadbiran dan ekonomi di malaysiaKesan penjajahan barat terhadap pentadbiran dan ekonomi di malaysia
Kesan penjajahan barat terhadap pentadbiran dan ekonomi di malaysia
Rizwan Razman
 
Rph 80min lina
Rph 80min linaRph 80min lina
Rph 80min linaAnne Hanz
 
Module - Identify Hardware
Module - Identify HardwareModule - Identify Hardware
Module - Identify HardwareAzam Jumberi
 
Rph 40min lina
Rph 40min linaRph 40min lina
Rph 40min linaAnne Hanz
 
Jadual waktu spm 2011 final
Jadual waktu spm 2011 finalJadual waktu spm 2011 final
Jadual waktu spm 2011 finalRizwan Razman
 
CURRENT AND FUTURE DEVELOPMENT OF OPEN SOURCE SOFTWARE AND LATEST DEVELOPMENT...
CURRENT AND FUTURE DEVELOPMENT OF OPEN SOURCE SOFTWARE AND LATEST DEVELOPMENT...CURRENT AND FUTURE DEVELOPMENT OF OPEN SOURCE SOFTWARE AND LATEST DEVELOPMENT...
CURRENT AND FUTURE DEVELOPMENT OF OPEN SOURCE SOFTWARE AND LATEST DEVELOPMENT...Syazzey Waniey II
 
The latest open source software available and the latest development in it
The latest open source software available and the latest development in itThe latest open source software available and the latest development in it
The latest open source software available and the latest development in itRizwan Razman
 

Viewers also liked (10)

Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Kesan penjajahan barat terhadap pentadbiran dan ekonomi di malaysia
Kesan penjajahan barat terhadap pentadbiran dan ekonomi di malaysiaKesan penjajahan barat terhadap pentadbiran dan ekonomi di malaysia
Kesan penjajahan barat terhadap pentadbiran dan ekonomi di malaysia
 
Rph 80min lina
Rph 80min linaRph 80min lina
Rph 80min lina
 
Module - Identify Hardware
Module - Identify HardwareModule - Identify Hardware
Module - Identify Hardware
 
Rph 40min lina
Rph 40min linaRph 40min lina
Rph 40min lina
 
Modul
ModulModul
Modul
 
Kenny g. songbird
Kenny g.   songbirdKenny g.   songbird
Kenny g. songbird
 
Jadual waktu spm 2011 final
Jadual waktu spm 2011 finalJadual waktu spm 2011 final
Jadual waktu spm 2011 final
 
CURRENT AND FUTURE DEVELOPMENT OF OPEN SOURCE SOFTWARE AND LATEST DEVELOPMENT...
CURRENT AND FUTURE DEVELOPMENT OF OPEN SOURCE SOFTWARE AND LATEST DEVELOPMENT...CURRENT AND FUTURE DEVELOPMENT OF OPEN SOURCE SOFTWARE AND LATEST DEVELOPMENT...
CURRENT AND FUTURE DEVELOPMENT OF OPEN SOURCE SOFTWARE AND LATEST DEVELOPMENT...
 
The latest open source software available and the latest development in it
The latest open source software available and the latest development in itThe latest open source software available and the latest development in it
The latest open source software available and the latest development in it
 

Similar to The latest development in network and communication

5 g Technology
5 g  Technology5 g  Technology
5 g Technology
Shivam Kashyap
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
ssuser6478a8
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
Sri Latha
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
Sri Latha
 
"End-to-end Interoperability and Mobile Services"
"End-to-end Interoperability and Mobile Services" "End-to-end Interoperability and Mobile Services"
"End-to-end Interoperability and Mobile Services"
John Loughney
 
5G 2
5G 25G 2
5G 2
IGDTUW
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
Rajamanickam Gomathijayam
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless TechnologyNiki Upadhyay
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internet
Nur Azlina
 
OSI LAyer.ppt
OSI LAyer.pptOSI LAyer.ppt
OSI LAyer.ppt
khan679040
 
Gunn 8th- Lily.pptx
Gunn 8th- Lily.pptxGunn 8th- Lily.pptx
Gunn 8th- Lily.pptx
HimanshiMorwal1
 
network class 4&5.pptx
network class 4&5.pptxnetwork class 4&5.pptx
network class 4&5.pptx
SelfUse
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
rcbcrtm
 
introduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).pptintroduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).ppt
gauravgoswami78
 
Concepts of Networking.ppt
Concepts of Networking.pptConcepts of Networking.ppt
Concepts of Networking.ppt
rakesh132809
 
Architecture of 5G technology
Architecture of 5G technologyArchitecture of 5G technology
Architecture of 5G technology
Thesis Scientist Private Limited
 
Network protocol
Network protocolNetwork protocol
Network protocol
QadarAhmed1
 

Similar to The latest development in network and communication (20)

5 g Technology
5 g  Technology5 g  Technology
5 g Technology
 
09bit046 wlan
09bit046 wlan09bit046 wlan
09bit046 wlan
 
VOIP
VOIPVOIP
VOIP
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Pan seminar
Pan seminarPan seminar
Pan seminar
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
"End-to-end Interoperability and Mobile Services"
"End-to-end Interoperability and Mobile Services" "End-to-end Interoperability and Mobile Services"
"End-to-end Interoperability and Mobile Services"
 
5G 2
5G 25G 2
5G 2
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internet
 
OSI LAyer.ppt
OSI LAyer.pptOSI LAyer.ppt
OSI LAyer.ppt
 
Gunn 8th- Lily.pptx
Gunn 8th- Lily.pptxGunn 8th- Lily.pptx
Gunn 8th- Lily.pptx
 
network class 4&5.pptx
network class 4&5.pptxnetwork class 4&5.pptx
network class 4&5.pptx
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
 
introduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).pptintroduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).ppt
 
Concepts of Networking.ppt
Concepts of Networking.pptConcepts of Networking.ppt
Concepts of Networking.ppt
 
Architecture of 5G technology
Architecture of 5G technologyArchitecture of 5G technology
Architecture of 5G technology
 
Network protocol
Network protocolNetwork protocol
Network protocol
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

The latest development in network and communication

  • 1. The Latest Development in Network and Communication Name: Rizwan Razman B. Ahmad Nozrin I.C no:940420-08-**** Class:4STA Teacher’s Name: Pn. Aenizawati Bt. Abdul Samad
  • 2. Content 1.0 INTRODUCTION 2.0 MOBILE COMPUTING 2.1 DEFINATION 2.2 SPECIFICATION, SERVICES & FREQUENCIES OF MOBILE COMPUTING 3.0 INTERNET TECHNOLOGY & SERVICES 3.1 VoIP 3.2 BLOG 4.0 TYPE OF NETWORK 4.1 PAN 4.2 VPN 4.3 WLAN 5.0 CONCLUSION 6.0 REFERENCE
  • 3. 1.0 Introduction The latest development in networks and communication means the improvement in networks and communication services and products which really useful for IT user. It is also much better from the previous contains. 2.0 Mobile Computing. 2.1 Definition. Using a computing device while in transit. Mobile computing implies wireless transmission,but wireless transmission does not necessarily imply mobile computing. Fixed wireless applications use
  • 4. satellites, radio systems and lasers to transmit between permanent objects such as buildings and towers. 2.2 Specification, services & frequencies of Mobile Computing. Mobile Computing PDA, HD PSP SPECIFICATION 1.Low bandwith. 2.High bandwith variability. •Low power machines 3.Hidden terminal. •enable anywhere 4.Low power machines. 5.Low resources machines •low resources machines. 6.need proximity 7.higher delay 8.disconnected operation
  • 5. 9.enable anywhere/anytime connentivity. 10.Enable new application. SERVICES 1.Emergency services •games (messaging & calling) 2.stock information.Collection /control. 3.Credit card verification. 4.Taxi/truck dispatch. 5.Electronic mail/paging FREQUENCIES •EGSM 900/1800/1900 •none •UMTS 2100 3.0 Internet Technology And services 3.1 Voice Over Internet Protocol ( VoIP) Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched networks. Other terms frequently encountered and synonymous with VoIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, and broadband phone. 3.2 Blog A blog (a contraction of the term weblog) is a type of website, usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or
  • 6. video. Entries are commonly displayed in reverse-chronological order. "Blog" can also be used as a verb, meaning to maintain or add content to a blog. 4.0 Types Of Network 4.1 Personal Area Networking (PAN) A personal area network (PAN) is a computer network used for communication among computer devices (including telephones and personal digital assistants) close to one person. The devices may or may not belong to the person in question. The reach of a PAN is typically a few meters. PANs can be used for communication among the personal devices themselves (intrapersonal communication), or for connecting to a higher level network and the Internet (an uplink). Personal area networks may be wired with computer buses such as USB and FireWire. A wireless personal area network (WPAN) can also be made possible with network technologies such as IrDA, Bluetooth, UWB, Z-Wave and ZigBee.
  • 7. 4.2 Wireless LAN (WLAN) A wireless LAN (WLAN) is a wireless local area network that links two or more computers or devices using spread-spectrum or OFDM modulation technology based to enable communication between devices in a limited area. This gives users the mobility to move around within a broad coverage area and still be connected to the network 4.3 WIMAX Worldwide Interoperability for Microwave Access (WiMAX) is a communications technology thatuses radio spectrum to transmit tens of megabits per second in bandwidth between digital devices such as laptop computers. Similar to WiFi, WiMAX brings with it the ability to transmit over far greater distances and to handle much more data. 5.0 Conclusion The latest development in networks and communication brings more useful to IT user which can makes lifes way easier in networking and communicate. 6.0 References http://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+computing&i=47137,00 asp http://answers.yahoo.com/question/index?qid=20070629052817AASZjbY http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol http://en.wikipedia.org/wiki/Blog http://compnetworking.about.com/od/basicnetworkingconcepts/a/network_types.htm http://en.wikipedia.org/wiki/Personal_Area_Network http://en.wikipedia.org/wiki/Wireless_LAN