1 Literally, not synchronized; that is, proceeding at its own pace. [Read more…] about What is Asynchronous?
What is Application Service Provider (ASP)?
Application Service Provider (ASP): A company that rents out the use of software running on its own SERVERS to remote customers, who may use a THIN CLIENT technology such as CITRIX WINFRAME or a PC and a web-based connection to log on to the service: the viability of such services depends upon the availability of a BROADBAND connection from client to server. [Read more…] about What is Application Service Provider (ASP)?
What is AppleTalk?
AppleTalk: A proprietary LAN protocol that is built into Apple’s MACINTOSH computers. AppleTalk is independent of the underlying network transport, and is currently able to run over serial cable (LocalTalk) or over an ETHERNET network (EtherTalk). An AppleTalk port is built in to all Macs.
What is anonymous FTP?
A service provided on many Internet servers that permits a casual visitor to download files using the FTP file transfer protocol without needing to possess a named account or password. The user merely logs in under the name ‘anonymous’ or ‘ftp’ and uses his/her email address as the PASSWORD, and is then granted access to a restricted set of directories that have been reserved for public access (and which are typically separated from those used by the local users).
What is address aging?
A parameter that controls how long a network switch or ROUTER will store learned IP addresses in its address table before discarding them for new ones.
What is 4G Wireless?
4G is a packet-switched technology that uses bandwidth much more efficiently, allowing each user’s packets to complete for available bandwidth, and billing users for the amount of data transmitted. It also solves the non-standardization problems associated with 3G networks for voice, video, and data transmission. [Read more…] about What is 4G Wireless?
ISDN User Interfaces
File Transfer Protocol (FTP)
File transfer protocol is the way files are transferred from the server to the client across the network. [Read more…] about File Transfer Protocol (FTP)
Network File System (NFS)
Initially developed by Sun Microsystems Incorporated, the NFS provides on-line shared file access that is transparent and integrated; many TCP/IP sites use NFS to interconnect their computer’s file systems. From the user’s perspective, NFS is almost invisible. A user can execute an arbitrary application program and use arbitrary files for input or output. The file names themselves do not show whether the files are local or remote. Network File System allows the user to access, read, and modify a file on a remote device, (on the same network, usually), as if it were on the client machine.
Simple Network Management Protocol (SNMP)
The Simple Network Management Protocol (SNMP) is a framework for managing devices in an internet using the TCP/IP protocol suite. It provides a set of fundamental operations for monitoring and maintaining an internet. [Read more…] about Simple Network Management Protocol (SNMP)
What is HTTP (Hypertext Transfer Protocol)?
What is http: HTTP full form HyperText Transfer Protocol used mainly to access data on the World Wide Web. HTTP is a Server and Client communication Protocol, which is primarily set of rules for formatting and transferring webpage data (text, images, video and Multimedia files) over the world wide web. It is the Protocol used to create communication between Web Servers and Web Users. HTTP is an application layer Protocol that works on the top of the TCP/IP suite of Protocols. [Read more…] about What is HTTP (Hypertext Transfer Protocol)?
What is Internetworks
Availability of different operating systems, hardware platforms and the geographical dispersion of the computing resources necessitated the need of networking in such a manner that computers of all sizes can communicate with each other, regardless of the vendor, the operating system, the hardware platform, or geographical proximity. Therefore, we may say that internetworking is a scheme for interconnecting multiple networks of dissimilar technologies. To interconnect multiple networks of dissimilar technologies use both additional hardware and software. This additional hardware is positioned between networks and software on each attached computer. Thus, system of interconnected networks is called an inter network or an Internet. [Read more…] about What is Internetworks
Security against Remote Access
A user remotely located must be first authenticated before accessing the network or Intranet of an organization. The authentication procedures must be built into the firewall applied to the network or Intranet for the security measures. The procedures to validate remote login or access have been described in the following lines along with their comparison and features: [Read more…] about Security against Remote Access
What are the Point-to-Point Protocol (PPP) four distinct phases?
Because the Layer 2 protocols depend heavily on the features originally specified for PPP, it is worth examining this protocol more closely. PPP was designed to send data across dial-up or dedicated point to- point connections. PPP encapsulates IP, IPX, and NetBEUI packets within PPP frames, and then transmits the PPP-encapsulated packets across a point-to-point link. PPP is used between a dial-up client and an NAS. [Read more…] about What are the Point-to-Point Protocol (PPP) four distinct phases?
What is VPN (Virtual Private Network)? Definition
VPN (Virtual Private Network) Definition: VPN meaning that it is a private point-to-point connection between two machines or networks over a shared or public network such as the internet. A Virtual Private Network is a combination of software and hardware. VPN (Virtual Private Network) technology, can be use in organization to extend its safe encrypted connection over less secure internet to connect remote users, branch offices, and partner private, internal network. VPN turn the Internet into a simulated private WAN. [Read more…] about What is VPN (Virtual Private Network)? Definition
What is Data Encryption? Process and Types of Encryption
To encrypt a file or other information stored in a computer means to convert it into a secret code so that it can’t be used or understood until it is decoded or decrypted. You might want to encrypt a file if it contained a secret formula for a new invention, or some financial plans that your competitors would love to know about in advance. When you encrypt something, the computer will ask you to set up a password. After that, no one will be able to make sense of the information unless they have the same password. [Read more…] about What is Data Encryption? Process and Types of Encryption
FIREWALL: Explain Types of Firewall Architectures
Internet provides a two-way flow of traffic that may be undesirable in many organizations where some information may concern exclusively within the organization or for Intranet. Intranet is a TCP/IP network that is modeled after the Internet that only works within the organization. In order to delineate information meant only for the benefit of the organization or its Intranet and the other open to all or meant for Internet, some sorts of security measures need to be employed to control two-way flow of traffic. The measure known, as firewall is simply used for this purpose. [Read more…] about FIREWALL: Explain Types of Firewall Architectures
What is Network Security? Explain Basic Requirements of Network Security.
Network security is a broad topic with multilayered approach. It can be addressed at the data link layer, network layer and application layer. The issues concerned are: packet intrusion and encryption, IP packets and routing tables with their update version, and host-level bugs occurred at data link layer, network layer and application, respectively. [Read more…] about What is Network Security? Explain Basic Requirements of Network Security.
Error Control in Communication Networks
The purpose of error control is to ensure that the information received by the receiver is exactly the information transmitted by the sender. As the communication channel is highly unreliable, the receiver must be able to deal with the received data, if it contains error. The term error control is defined as the process of identification or correction of error occurred in the transmitted data. There are two types of error control mechanisms. They are: [Read more…] about Error Control in Communication Networks
Asynchronous vs. Synchronous Transmission Modes
Data is transmitted between communication devices in multiples of fixed-length units, typically 8-bits. For example, if the computer is transferring a source program, the data will be made up of a block of 8-bit binary-encoded characters. On the other hand, if the data is in the form of a compiled object code of the program, the data will be made up of a block of 8-bit bytes. At the receiving end, the following parameters are determined to decode and interpret the message correctly. [Read more…] about Asynchronous vs. Synchronous Transmission Modes
Optical Connectors
This is very simple optical fiber communication system. In this particular scenario, the optical fiber requires one connection to the transmitter side and another connection at the receiver side. In another scenario when it is required to communicate over long distances where more than one length of fiber cable and other supporting equipment are placed in the system. [Read more…] about Optical Connectors
Optical Source
Like other communication system, fiber optic communication has also a transmitter at one end of the system, which injects information on to the fiber cables. The transmitter processes and translates coded electronic pulse information coming from copper wire into equivalently coded light pulses. The basic concept behind the optical transmitter is that it converts electrical input signals into modulated light for transmission over an optical fiber. The input signal determines the characteristics of the resulting modulated light, which may be turned on and off or may be linearly varied in intensity between two predetermined levels. [Read more…] about Optical Source
Optical Fiber – Optical Transmission Modes Advantages and Disadvantages of Optical Fiber
In case of coaxial cables and twisted cable the maximum signal frequency, and hence the information rate that can be transmitted using a solid conductor is limited. Optical fiber differs from both these transmission media in that it carries the transmitted information in the’ form of a fluctuating beam of light in a glass fiber rather than as an electrical signal on a wire. This type of transmission has become strong support for digital network owing to its high capacity and other factors favorable for digital communication. [Read more…] about Optical Fiber – Optical Transmission Modes Advantages and Disadvantages of Optical Fiber
Architecture of the GSM Network
The generic GSM network architecture is composed of three subsystems as the Radio Subsystem (RSS), the network and Switching Subsystem (NSS) and the Operation Subsystem (OSS). The subscriber carries the Mobile Station, which is part or RSS. [Read more…] about Architecture of the GSM Network
GSM Cellular Radio System and Features of GSM
In the beginning around 1980s, analog cellular telephone systems were developing in Europe and each country was developing its own system and thus making them confined within their country boundaries. Later on, the need for an European public land mobile system was realized. In 1982, the Conference of European Posts and Telegraphs (CEPT),formed a study group called the Groupe Special Mobile (GSM) to develop a pan-European standard With the objectives of providing good subjective speech quality, support for international roaming etc. The proposed system was expected to meet certain criteria as mentioned below: [Read more…] about GSM Cellular Radio System and Features of GSM
Basic Wireless Principles
A cellular mobile communications system consists of a large number of low power wireless transmitters to create cells. These cells cover a certain area and typically called as base station. Depending upon the power level the size of cells can be decided. In this way, the radii of a cell may vary from tens of meters to tens of kilometers in a building to a city respectively. [Read more…] about Basic Wireless Principles
Cellular Radio Definition
Cellular radio has other popular names as cellular mobile or mobile phone. Radio is basically a device, which uses receiver and transmitter. Wireless communication can also be carried out without using radio. The interference caused by high power line to radio transmission is also an example of wireless communication though it is termed as noise. Inductive and conductive circuits and devices can communicate wirelessly for limited distance with less reliability and implementation problem. Therefore, these techniques cannot be termed as radio transmission. [Read more…] about Cellular Radio Definition
ATM Structure
The purpose of ATM is to provide high speed, low-delay multiplexing and switching networks to support any type of user traffic, such as voice, data or video applications. This is specifically designed as single technology for voice, video, and data. [Read more…] about ATM Structure
Cell Relay – What is Cell Relay?
Cell relay is data transmission service that uses transmission technology referred to as Asynchronous Transfer Mode (ATM). As the name suggests, the data transmission unit is a fixed length of data known as a cell. High-speed transmission compared to other services like frame relay is possible with the cell relay method. The cell relay is considered by most to be the transport service of the future. [Read more…] about Cell Relay – What is Cell Relay?
ISDN Standards
Products for ISDN technology from different vendors even with similar features and options may create some compatibility issues. CCITT after good deliberations over the years published the first significant ISDN standards in a number of red binders in 1984 and they were simply known as the Red Book standards. The group subsequently met four years later which culminated in the publication of the 1988 Blue Book standards. These international publications were the foundation for the evolving ISDN national standards. The CCITT eventually was reformed into the group, which is now called the ITU- T. The standards used to define ISDN make use of the OSI reference model with the first three layers of this OSI reference model. [Read more…] about ISDN Standards