0% found this document useful (0 votes)
10 views24 pages

Network Part 3

The document provides an overview of various networking devices such as modems, Ethernet cards, hubs, switches, routers, and gateways, along with their functions and types. It also discusses different generations of mobile networks from 1G to 5G, highlighting their features and advancements in data transmission. Additionally, the document covers network security measures, types of computer viruses, and prevention strategies to protect systems from malware.

Uploaded by

thulasiramss40
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views24 pages

Network Part 3

The document provides an overview of various networking devices such as modems, Ethernet cards, hubs, switches, routers, and gateways, along with their functions and types. It also discusses different generations of mobile networks from 1G to 5G, highlighting their features and advancements in data transmission. Additionally, the document covers network security measures, types of computer viruses, and prevention strategies to protect systems from malware.

Uploaded by

thulasiramss40
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

MODEM (Modulator and Demodulator)

• A device that accepts a serial stream of bits as input and produces


modulated carrier as output.
• In other words, a modem is a device that converts digital form of
data to analog form and vice-versa.
Types of modems :
Internal and External

Ethernet card
( Network Interface Card )

Uses bus or star topologies and can support data transfer upto
10mbps.
Hub
Networking devices
 A device that connects many computers.
 It is a multi-slot connector into which multi-port cards can
be plugged.
 An Ethernet hub, active hub, network hub, repeater hub, multiport repeater
or hub is a device for connecting multiple Ethernet devices together and
making them act as a single network segment.
 Active hub : Amplify the signals as it moves.
 Passive hub : Does not change the signals.

Switches
A network switch is a computer networking device that connects devices
together on a computer network
A device that breaks the network into smaller subnets.
It establishes a connection between the sender and the receiver
temporarily till the data is transmitted.
Networking devices

Repeater 
 An interface (device) that amplifies (strengthens) the signals
transmitted.
 A repeater is installed along the path of data transmission to
ensure that the data reaches the destination.

Bridges
 A device that connects the various devices in a network.

 A bridge, upon receiving the data, examines and then sends it


to the destination
Networking devices
Routers

• A device that can link different network protocols.


Ex. A router can link Ethernet to a mainframe system.
• It translates the data between the network using logical address system.

Gateway

• A device that connects different and frequently incompatible networks.


• It expands the functionalities of a router by performing data translation and
protocol conversion.
• A gateway often acts as a proxy server and firewall.
Computing Technologies
GSM (Global System for Mobile Communication)

• A digital system for data communication.

• Can be used for voice, data and fax integration.

• Supports better speech compression techniques.

• Can work with less band width.

• It uses a small removable disk called SIM card


(Subscriber Identification Module) which stores all the connection data
required to access a particular network.
Computing Technologies

CDMA (Code Division Multiple Access)


 It is the digital cellular technology for allocating a wireless channel.

 The CDMA technique divides the channel into many frequency bands for
allocating to the users.

 It allows each station to transmit over entire frequency spectrum.

 Supports multiple simultaneous transmission.


Computing Technologies

WLL (Wireless in Local Loop)


It is designed for local area n/w, similar to telephone service.

It consists of a mini station of low power, a radio transceiver and a


WLL interface.

The cables are connected to an antenna and a phone for


transmitting the signals over the n/w.
Computing Technologies

GPRS (General Packet Radio Service)

• Used for wireless communication for mobile devices.

• Helps in accessing internet, send large data files.

• Real-time and online processing can be done.

• Provides high speed data transfer which typically is in the range


of 56 kilo bits/sec to 114 kbps.
Computing Technologies
1 G Networks
(First Generation Networks)

• The primitive design for communicating voice data.


• 1G (or 1-G) refers to the first generation of wireless telephone
technology (mobile telecommunications).
• These are the analog telecommunications standards that were
introduced in the 1980s

2 G Networks
(Second Generation Networks)

• Supported GSM and CDMA technologies.


• Supported better quality sound and improved efficiency.

Three primary benefits of 2G networks over their predecessors were


• phone conversations were digitally encrypted;
• 2G systems were significantly more efficient on the spectrum
• 2G introduced data services for mobile, starting with SMS text messages.
1G AND 2G NETWORKING
 The main difference between the two mobile
telephone systems (1G and 2G), is that the radio
signals used by 1G networks are analog, while
2G networks are digital.
 Although both systems use digital signaling to
connect the radio towers (which listen to the
handsets) to the rest of the telephone system, the
voice itself during a call is encoded to digital
signals in 2G whereas 1G is only modulated to
higher frequency, typically 150 MHz and up. The
inherent advantages of digital technology over
that of analog meant that 2G networks
eventually replaced them almost everywhere.
COMPUTING TECHNOLOGIES
3 G Networks
(Third Generation Networks)

• Supports CDMA and its variation technologies.


• Data transfer rate upto 384 kilo bits/sec.
• Supports transmission of text, digitized voice, video
and multimedia files at a rate of 2 megabits/sec.

3G, short form of third generation, is the third


generation of mobile telecommunications technology.

This is based on a set of standards used for mobile


devices and mobile telecommunications use services
and networks that comply with the International
Mobile Telecommunications-2000.
Computing Technologies
4 G Networks
(Fourth Generation Networks)
• Supports multiple applications and services with high security and privacy
policies.
• Provides consistent services inspite of different service providers.
• Supports participation of multiple networks and connecting to the one
which provides the best services.

•A 4G system, in addition to the usual voice and other services of 3G.

•Provides mobile broadband Internet access.

•For example to laptops with wireless modems to smartphones


and to other mobile devices.
5 G Networks
(Fifth Generation Networks)
 5G (5th generation mobile networks or 5th generation
wireless systems) also known as Tactile Internet[1]
denotes the next major phase of mobile
telecommunications standards beyond the current
4G/IMT-Advanced standards.

• Designed with a very high bandwidth.


• Supports wearable devices with AI features.
• Provides accurate communication inspite of huge network
traffic.
• Provides connectivity speed of upto 25 Mbps.
• Creates a virtual private network.
• Gives improved services in terms of connectivity,
applications and the speed of communication.
APPLICATIONS OF NETWORKS
SMS (Short Message Service)

• Transmission of text data from a mobile phone, fax system or an IP Address.


• The text data is characterized by a limited no. of characters without any
images or graphic objects.

Chatting

• It is an on-line messaging feature between 2 systems simultaneously.


• External data can be sent as an attachment file over the network.

Video Conferencing

• It is an on-line service where the sender and the receiver can see each
other while interacting over the network.
APPLICATIONS OF NETWORKS

WiFi (Wireless Fidelity)

• It is a wireless connectivity to the Internet.


• It requires
o A broadband internet connection.
o A wireless router
o A system with Wireless Internet Card.

WiMax

• A wireless digital communication system.


• It provides access range of upto 50 kms for fixed stations and 5 to 15 kms for
mobile stations.
• It requires a WiMax Base Station Tower which provides microwave link
between the tower and the user.
Network Security
The following measures are implemented to achieve maximum security over
the network :

Authorization
It confirms the identity of the service requestors. It can be done by
accepting an user ID for logging into the network.

Authentication
is the technique by which a process verifies that its communication
partner is the one who is supposed to be. Authentication of the users can be
done with passwords, digital signatures which provides the user data in a
network.

Encryption technique
A process in which the plaintext are transformed by a function into a
special format text called as cipher text. The cipher text is then transmitted
to the system through network.
Network Security

Bio-Metric systems

It involves identification of a user with the unique


physical characteristics such as finger print, face, retina patterns,
etc.,.

Firewalls

A software that guards the systems from unwanted files


and the files from un-identified sources.

A firewall acts as a barrier for the files to enter into the


system.
Computer Virus
A virus is a software that affects the normal functioning of the
system.

Symptoms of a system affected with virus

• Unexpected messages during processing.


• The system’s processing speed may be reduced.
• The system may stop responding to the commands.
• The system may restart automatically or locks up frequently.
• The applications may not function properly.
• The system’s memory will be occupied by many duplicate files.
• The files may be deleted on its own.
• The menus and the dialog boxes may be distorted.
• The hardware devices may not be recognized by the system.
• If the virus affects the boot sector, the system may crash.
Types of Virus

File virus : are the most dangerous virus, which


attach themselves to other files. When such a file is
activated, the virus gets loaded and executes itself.
The virus file remains in memory and infects every
program loaded for execution.

Boot virus : resides in the boot sector of the disk. It


creates bad sectors and results in system crash.
These virus are loaded when the system is started.

Network virus : uses network protocols or e-mail


attachments to spread themselves.
Types of Virus

Bomb virus : A virus file that triggers itself initiated by


a specific condition, such as at a specific time, date or
when a particular action taken by a program or a user.

Worm virus : A virus that propagates itself over the


network, reproducing as it moves on.

Trojon Horse : A virus that transmits itself with an


external device. It appears as an authorized software and
when activated infects the system.
Virus Prevention
 Never use external storage devices without scanning.
 Always download the files from authorized sites.
 Write protect the devices.
 Use licensed software.
 Protect the system with a password and other
protection measures , so that only authentic users can
use.
 Install and update the antivirus s/w regularly.
 Exs. of antivirus s/w : Kaspersky, Microtrend, ESET,
Avast , Quick heal.

You might also like