Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

What Is Extranet ?: Lesson 91 Network System

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 31

Panitia SMK Bukit Payong

LESSON 91
NETWORK SYSTEM

What is Extranet ?
An extranet is a private network that uses Internet technology and public
telecommunications system to securely share relevant information with
authorized parties.

Only registered or authorized users can


navigate or access the extranet.

Uses Of Extranet

Extranet can be used to:

 share product catalogues with


wholesalers
 jointly develop program with other
companies
 provide access services given by one
company to a group of other
companies
 share news of common interest
exclusively with partner companies

INTERNET AND EXTRANET

INTERNET EXTRANET
Uses Internet technology Users Internet/intranet technology
Serves everybody Serves extended enterprise including
defined sets of customers or supplies
or other partners
With or without firewall With firewall
Low security Tight security

199
Panitia SMK Bukit Payong
LESSON 92
NETWORK CARD

NETWORK INTERFACE CARD


A network card, sometimes pronounced as NICK, is an adapter card or PC
card that enables the computer to access the network.

WIRELESS NETWORK
INTERFACE CARD
Wireless Network Interface Card is a network
card that provides wireless data transmission.

MODEM
There are two types of modem, internal
modem and external modem.

An internal modem only works in stand-alone computers. It is built into the


computer.

An external modem is separated from the computer and is also mobile.

200
Panitia SMK Bukit Payong
HUB/SWITCH
Hub or switch is a common connection point for devices in a network.

Hubs are commonly used to connect segments of a LAN.

ROUTER
A router is a communications device
that connects multiple computers or
other routers together and transmits
data to the correct destination.

WIRELESS ACCESS
POINT
A wireless access point is a central
communications device that allow computers
to transfer data. This device can help
information to be transferred wirelessly to
other wireless devices or to a wired network.

Wireless access point has high quality


antennas for optimal signals.

201
Panitia SMK Bukit Payong
LESSON 93
NETWORK CARD INTERFACE

A Network Interface Card is a piece of computer hardware designed to allow


computers to communicate over a computer network.

The card implements the electronic circuitry required to communicate using a


specific physical layer and data link layer standard such as Ethernet or token
ring.

WIRELESS NETWORK INTERFACE CARD


A Wireless Network Interface Card or WNIC is a network card which connects
to a radio-based computer network.

WNIC is an essential component for


wireless desktop computer. This card
uses an antenna to communicate
through microwaves.

202
Panitia SMK Bukit Payong
WNICs are designed around the IEEE 802.11 standard which sets out low-
level specifications on how all wireless networks operate and can operate in
two modes known as infrastructure mode and ad hoc mode.

MODEM
Text String, A modem is a device that
enables a computer to transmit data over
telephone or cable lines.

Computer information is stored digitally,


whereas information transmitted over
telephone lines is transmitted in the form of
analog waves. A modem converts between
these two forms.

HUB/SWICTH
Hubs are commonly used to connect
segments of a LAN.A hub contains multiple
ports.
When a packet arrives at one port, it is
copied to the other ports so that all
segments of the LAN can see all the
packets.
A hub connects all the devices on its ports
together. A switch understands when two
devices want to talk to each other, and gives
them a switched connection.

203
Panitia SMK Bukit Payong
ROUTER
A router is a computer networking device
that forwards data packets across a
network toward their destinations,
through a process known as routing.

A router acts as a junction between two or


more networks to transfer data packets
among them. In order to route packets, a
router communicates with other routers
using routing protocols.

WIRELESS ACCESS POINT


A wireless access point is a device that connects wireless communication
devices together to form a wireless network.
Wireless access point (or Wireless AP) usually
connects to a wired network and can relay
data between wireless devices and wired
devices.

Several Wireless APs can link together to


form a larger network that allows "roaming".
Wireless access points have IP addresses for
configuration.

In an infrastructure mode network the WNIC needs an access point: all data
is transferred using the access point as the central hub. All wireless nodes in
an infrastructure mode network connect to an access point. All nodes
connecting to the access point must have
the same service set identifier as the
access point.

In an ad hoc mode network the WNIC


does not require an access point, but can
directly interface with all other wireless
nodes directly. All the peer nodes in an ad
hoc network must have the same channel
and service set identifier.

LESSON 94
204
Panitia SMK Bukit Payong
TYPES OF TRANSMISSION MEDIA

Transmission media can be divided into two broad categories.


The physical transmission media, or guided medium and the wireless
transmission media.

The twisted-pair cable, coaxial cable and fibre optic cable are examples of
physical transmission media.

Wireless transmission medium or unguided medium is through air.

PHYSICAL TRANSMISSION MEDIUM


In physical transmission medium, waves
are guided along a solid transmission
medium.

Wireless transmission medium waves are


unguided and the transmission and
reception are by means of antennas.

In our daily activities we probably use


both media consciously or unconsciously.

For example, we use physical


transmission medium when we:
• connect a PC to a printer using parallel
port or USB port
• connect a PC to the same phone line for Internet communication such as
TMNET Streamyx
• PCs are connected using twisted-pair cables to wall sockets in the office

We use wireless transmission medium when we:


• listen to the radio
• talk over the telephone
• use hotspots that have wireless Internet access with WiFi technology at
restaurants and airports

WIRELESS TRANSMISSION MEDIA


205
Panitia SMK Bukit Payong

Wireless data transmission means data communication between network


devices without using cables or cords, but by using radio
frequency or infrared waves.

Wireless data transmission is categorised into short,


medium and long range data transmission.

An example for short range is Bluetooth or Infrared.


Medium range data transmission is WiFi or wireless LAN
and for long range it is 3G.

3G is a so-called "third-generation” broadband packet-


based transmission of text, digitised voice, video, and
multimedia at data rates up to and possibly higher than
2 megabits per second (Mbps), offering a consistent set
of services to mobile computer and phone users no matter where they are
located in the world. 3G works over wireless air interfaces.

TRANSMISSION ENVIRONMENT
In our daily activities, such as talking over the phone, sending short
messages, sending email or uploading files to remote users, will likely involve
a combination of transmission mediums along the way.

The sender and the receiver will also


involve many communication devices
especially switches and routers.

These devices are interconnected by


transmission mediums that can be from
any of the physical or wireless
transmission mediums stated earlier.

In network communications, it is common


to represent the interconnection between
devices as network clouds.

LESSON 95
CABLES AS A PHYSICAL TRANSMISSION MEDIUM

Cables are used as a physical transmission


medium.
There are three types of cables used in
transmitting electrical messages. They are:

206
Panitia SMK Bukit Payong

• twisted-pair cable
• coaxial cable
• fibre optic cable

TWISTED-PAIR CABLE
The twisted-pair cable is generally a common form of transmission medium.

It consists of two wires or conductors twisted together, each with its own
plastic insulation.

The twisted wires cancel out electromagnetic


interference that can cause, the noise generated
by adjacent pairs.

Undesired coupling of a signal from one circuit,


part of a circuit, or channel, to another.

The most common connector used for twisted-pair cable is RJ-45

A wave produced by the interaction of time-varying


electric and magnetic fields.

Registered Jack-45 (RJ-45) is an eight-wire connector


used commonly to connect computers onto Local Area
Networks (LAN), especially Ethernets.

The Unshielded Twisted-Pair or UTP is the most


common twisted-pair cable used in communications.

Cables that consist of pairs of unshielded wire twisted together. It is the most
common kind of copper telephone wiring.

It has four pairs of colour-coded twisted-pair cables that are covered with a
plastic outer jacket.

The Shielded Twisted-Pair or STP is another form of


twisted-pair cable.

207
Panitia SMK Bukit Payong
Twisted-pair cable wires that consist of an outer covering or shield.

Its four pairs of colour- coded wires are each


wrapped in metallic foil, and all four are then
collectively wrapped in a layer of metallic braid
or foil. Finally, this layer is wrapped with a
plastic outer jacket.

COAXIAL CABLE
The coaxial cable, often referred to as ‘coax’, consists of
a single copper wire surrounded by at least three layers.

They are an insulating material, a woven or braided


metal and a plastic outer coating.

This cable is often used as cable television (CATV)


network wiring because it can be cabled over longer
distances in comparison to the twisted-pair cable.

PARTS OF A COAXIAL CABLE


The coaxial cable consists of a centre inner conductor of solid or stranded
wire enclosed in an insulating sheath.

The sheath is enclosed in an outer conductor of


metal foil or a woven copper braid.

This outer conductor is also enclosed in another


insulating sheath, and the whole cable is
protected by a plastic cover.

The outer conductor acts as the second wire in the cable. It also acts as a
shield for the inner conductor and helps reduce outside interference.

CONNECTORS FOR THE COAXIAL CABLE


The connector most commonly used in connecting a coaxial cable to a device
is the BNC connector.

208
Panitia SMK Bukit Payong

BNC is short for British Naval Connector or Bayonet-


Neill-Concelman.

There are three popular BNC connectors. They are:


• BNC connector : used to connect devices
such as the TV set
• BNC T connector : used in Ethernet networks
• BNC terminator : connected at the end of a
cable to prevent the reflection of signals

FIBRE OPTIC CABLE


The fibre optic cable is a networking medium that uses light for data
transmission.

The intensity of light is increased and decreased to represent binary one and
zero.

The binary system is a way of counting using just the


two numbers 0 and 1.

Its core consists of dozens or hundreds of thin


strands of glass or plastic which uses light to
transmit signals.

Each strand, called an optical fibre, is as thin as a


human hair.

Text String, A flexible optically transparent fibre, usually made of glass or


plastic, through which light can be transmitted by successive internal
reflections.

Text String, A fibre optic cable connector that uses a push-pull latching
mechanism similar to common audio and video cables.

Text String, A fibre optic cable connector that uses a bayonet plug and
socket.
Text String, A fibre optic cable connector that uses a threaded plug and
socket.
209
Panitia SMK Bukit Payong
Text String, Mechanical Transfer Registered Jack (MT-RJ), a fibre optics
connector popular for small form factor devices due to its small size.

PARTS OF A FIBRE OPTIC CABLE


Inside a fibre optic cable, each optical fibre is clad with an insulating glass
and a protective coating.

For the fibre to guide the optical signal, the refractive index of the core must
be greater than cladding so that light can be confined to the guiding layer by
total internal reflection.

Typically, a fibre optic cable has five parts.

The core is the light transmission element. It is typically made of glass or


plastic.

Cladding surrounds the core.It is also made of glass or plastic but is less
dense than the core.

Buffer surrounds cladding. It is usually made of plastic and helps shields the
core and cladding from being damaged.

210
Panitia SMK Bukit Payong

A strengthening material surrounds the buffer to prevent the fibre cable from
being stretched when installers pull it.

Outer jacket surrounds the cable to protect the fibre against abrasion,
solvents and other contaminants.

CONNECTORS OF A FIBRE OPTIC


The most commonly used fibre optic connectors are SC, ST, FC and MT-RJ
connectors.

211
Panitia SMK Bukit Payong
LESSON 96
WIRELESS COMMUNICATION

Wireless is a method of communication that uses electromagnetic waves


rather than wire conductors to transmit data between devices.

Wireless networks are telephone or computer


networks that use radio frequencies and infrared
waves as their carrier.

The mediums used in wireless communications are


air, vacuum and even water. Air is the most
commonly used medium.

Signals are normally broadcasted through air and


are available to anyone who has a device capable of
receiving them.

WIRELESS TECHNOLOGY
The use of wireless technology as a method of
data transport appears very similar to a wired
technology.

In a wireless media however, signal transmission


is unguided and the device communicates
without using wires between nodes, usually by
relying on radio frequencies instead.

WIRELESS TRANSMISSION
Wireless transmission can be categorised into three broad groups:
• radio waves
• microwaves
• infrared

What is the difference between radio waves and microwaves?

There is no clear difference between radio waves and microwaves.


Electromagnetic waves ranging in frequencies between 3 KHz and 1 GHz are
normally called radio waves. Waves ranging in frequencies between 1 and
300 GHz are normally called microwaves.

212
Panitia SMK Bukit Payong

It is actually the behaviour of the waves rather than the frequencies that
determines the classification of wireless transmission.

RADIO WAVES SIGNAL


Radio waves are normally omnidirectional.
When an antenna transmits radio waves,
they are propagated in all directions.

This means that the sending and receiving


antennas do not have to be aligned.

The omnidirectional characteristics of


radio waves make them useful for
multicasting, in which there is one sender but
many receivers. Our AM and FM radio
stations, cordless phones and televisions are examples of multicasting.

What is the disadvantage of radio waves?


Radio waves transmitted by one antenna are susceptible to interference by
another antenna that is sending signals of the same frequency or band.

MICROWAVES
Electronic waves with frequencies between 1 GHz to 300 GHz are normally
called microwaves.

Unlike radio waves, microwaves are


unidirectional, in which the sending
and receiving antennas need to be
aligned.

213
Panitia SMK Bukit Payong
Microwaves propagation is line-of-sight therefore
towers with mounted antennas need to be in
direct sight of each other.

Due to the unidirectional property of microwaves,


a pair of antennas can be placed aligned together
without interfering with another pair of antennas
using the same frequency.

Two types of antenna are used for microwave communications. They are the
parabolic dish antenna and the horn antenna.

The parabolic dish antenna receives ingoing transmissions by reflecting the


signal to a common point called the focus.

Outgoing transmissions are broadcasted through a horn antenna by


deflecting signals outward in a series of narrow parallel beams.

High-frequency microwaves cannot


penetrate walls. This is why receiving
antennas cannot be placed inside
buildings.

Infrared is used in devices such as the


mouse, wireless keyboard and printers.

Some manufacturers provide a special


port called the IrDA port that allows a
wireless keyboard to communicate with
a PC.

Infrared signals have frequencies


between 300 GHz to 400 THz. They are
used for short-range communication.

Infrared signals have high frequencies and cannot penetrate walls.

214
Panitia SMK Bukit Payong
Due to its short-range communication system, the use of an infrared
communication system in one room will not be affected by the use of another
system in the next room.

This is why using an infrared TV remote control in our home will not interfere
with the use of our neighbour’s infrared TV remote control.

What are the disadvantages of using infrared?


Infrared signals cannot be used for long distance communication.

In addition, we cannot use infrared waves outside a building because sun's


rays contain infrared waves that can interfere with communication.

LESSON 97
DEFINITION OF NETWORK OPERATING SYSTEMS

An operating system is the program that


first loads when a computer boots and
manages any other software or hardware
on the computer.

A Network Operating System or known as


NOS, has additional functionality that
allows it to connect computers and
peripherals to a network.

A Network Operating System is most


frequently used with Local Area Networks
and Wide Area Networks, but could also
have application to larger network
systems.

Text String, A NOS is not the same as


the networking tools provided by some
existing operating systems, Windows XP
for instance.

NOS is an operating system that has


been specifically written to keep
networks running at optimal
performance.

215
Panitia SMK Bukit Payong

EXAMPLES OF NETWORK OPERATING SYSTEM


Some popular Network Operating Systems include:

Windows NT, the first of the NT family


Windows NT is a family of operating systems produced by Microsoft, the first
version of which was released in July 1993.
Is was the first 32-bit version of Windows
Windows XP and Windows Server 2003 are the latest versions of Windows
NT.

Windows 2000 (also referred to as Win2K or W2K) is graphical and


business-oriented operating system.
It is part of the Microsoft Windows NT line of operating systems and was
released on February 17, 2000.
Windows 2000 comes in four versions which are Professional, Server,
Advanced Server and Datacenter Server.
Additionally, Microsoft offers Windows 2000 Advanced Server - Limited
Edition, which was released in 2001 and runs on 64-bit Intel Itanium
microprocessors.

Windows Server 2003 is the name of Microsoft's line of server operating


systems.
It was introduced in April 2003 as the successor to Windows 2000 Server.
It is considered by Microsoft to be the cornerstone of their Windows Server
System line of business server products.

Red Hat Linux was one of the most popular Linux distributions, assembled
by Red Hat.
It is one of the "middle-aged" Linux distributions; 1.0 was released in
November 3rd, 1994.
Since 2003, Red Hat has discontinued the Red Hat Linux line in favour of its
new Red Hat Enterprise Linux.
Red Hat Linux 9, the final release, ended on April 30th, 2004, although the
Fedora Legacy project continues to publish updates.

216
Panitia SMK Bukit Payong
PEER-TO-PEER NETWORK OPERATING SYSTEMS
Peer-to-peer Network Operating Systems allow users to share resources and
files located on their computers. It is also for users to access shared
resources found on other computers.

Resources are equally shared in a peer-to-peer network

However, they do not have a file server or a centralised management source.

AppleShare and Windows for Workgroups are examples of programs that can
function as peer-to-peer Network Operating Systems.

CLIENT/SERVER NETWORKING OPERATING SYSTEM


Client/server Network Operating Systems
allow the network to centralise functions
and applications in one or more dedicated
file servers.

The file servers become the heart of the


system, providing access to resources
and providing security.

Individual workstations or clients have


access to the resources available on the
file servers.

The Network Operating System provides the mechanism to integrate all the
components of the network and allow
multiple users to simultaneously share
the same resources irrespective of
physical location.

Novell Netware and Windows 2000 Server


are examples of client or server Network
Operating Systems.

LESSON 98
TYPES OF CLIENT SOFTWARE
217
Panitia SMK Bukit Payong

Types of Client Software


• Web browser
• Email Client
• File Transfer Protocol (FTP) Client

WEB BROWSER
A web browser is a software application
that enables a user to display and
interact with HTML documents hosted by
web servers or held in a file system.

Text and images on a web page can


contain hyperlinks to other web pages at
the same or to different websites.

Web browsers allow a user to quickly and


easily access information provided on
many web pages at many websites by surfing these links.

Web browsers available for personal computers include Microsoft Internet


Explorer, Safari, Netscape and Opera.

Web browsers are the most commonly used


type of Hypertext Transfer Protocol (HTTP)
user agent.

Although browsers are typically used to


access the World Wide Web, they can also
be used to access information provided by
web servers in private networks or content
in file systems.

FUNCTIONS OF EMAIL CLIENT


An email client is a computer program that is used to read and send email.

FUNCTIONS OF FILE TRANSFER


PROTOCOL (FTP)CLIENT
File Transfer Protocol (FTP) client is used to connect
two computers over the Internet so that the user of
one computer can transfer files and perform file
commands on the other computer.

LESSON 99
218
Panitia SMK Bukit Payong
CHECKING FOR A NETWORK INTERFACE CARD

CHECKING FOR A NETWORK INTERFACE


CARD

Check whether your PC already has a


Network Interface Card by inspecting the
back of the PC for a network socket.

Two or more computers that are


connected so users can share files and
devices such as printers and servers.

IDENTIFYING THE LOCATION OF THE


NETWORK INTERFACE CARD

If your PC does not have a Network


Interface Card, then you need to insert
one. First you have to disconnect the
power from your PC.

You should remember the dangers of


static electricity. Once the main power
supply has been turned off, touch any
metal part on your computer casing
before starting your work.

Second, carefully remove the casing or


side panel of your PC.

Select either the ISA (black) or PCI


(white) slot, depending on the Network
Interface Card you are using.

Third, remove the back blank plate from


behind the slot you have selected for the
Network Interface Card.

Insert the Network Interface Card into


the slot you have selected by firmly
pressing the card down.

Secure the card in place with the screw from the blanking plate.

Replace the casing or side panel of your PC.

LESSON 100
219
Panitia SMK Bukit Payong
INSTALLING THE NIC DRIVER FOR WINDOWS 98 AND
WINDOWS ME

Installing the NIC Driver for Windows 98 and Windows ME.

Step 1: After inserting the Network Interface Card into its slot, the “Add New
Hardware Wizard” should now appear. Click “Next” to continue.

Step 2: Select Search for the better driver and click “Next” to continue.

Step 3: Select “Specify a location” and browse to the location where your
CD-ROM drive is located. Select “Next” to continue.

Step 4: Windows will locate the correct driver for your device on the CD
supplied by the library. Windows will also indicate that it is now ready to
install the driver. Select “Next” to continue.

LESSON 101
ITEMS FOR MAKING STRAIGHT CABLE

CAT 5 cable has four twisted pairs of wire for a total of eight individually
insulated wires.

Each pair is colour coded with one wire having


a solid colour:
• Blue
• Orange
• Green
• Brown

Twisted around a second wire with a white background and a stripe of the
same colour.

The straight cable is terminated with CAT 5 RJ-45 (Jack) modular plug(RJ
means Registered Jack).

RJ-45 plug are similar to those you'll see on


the end of your telephone cable except they
have eight contacts on the end of the plug
and they are about twice as big.

Make sure they are rated for CAT 5 wiring.

ITEMS FOR MAKING STRAIGHT CABLE

220
Panitia SMK Bukit Payong
Crimp tool - to crimp RJ-45 connectors.
Cable stripper – to cut and strip cables.
Cutters - to cut the cable off at the reel
and to fine tune the cable ends during
assembly.

CABLE CRIMPING PROCESS

The total length of wire segments between


a PC and a hub or between two PCs cannot
exceed 100 Meters.

Strip one end of the cable with the stripper


or a cutter.

If you are using the stripper, place the


cable in the groove on the blade (left) side
of the stripper and align the end of the
cable with the right side of the stripper.

Spread and arrange the pairs roughly:


• White/Green, Blue
• White/Blue, Green
• White/Brown, Brown
• White/Orange, Orange

Trim the ends of the wires so they are even with


one another.

It is very important that the unstripped or


untwisted end be slightly less than half-inch long.

If it is longer than half-inch it will be out of its


specifications and will cause crosstalk.

If it is slightly less than half-inch long, it will not be


properly clinched when RJ-45 plug is crimped on.

There should be little or no space between the


wires.

Hold the RJ-45 plug with the clip facing down or


away from you.

Push the wire firmly into the plug.

Looking through the bottom of the plug, the wire


on the far left side will have a white background.

The wires should all end evenly at the front of the plug.

221
Panitia SMK Bukit Payong
Hold the wire near the RJ-45 plug with the clip down and firmly push it into
the front-left of the crimper.

Hold the wire in place and squeeze the crimper


handles quite firmly.

Crimp it once.

Finally test the crimping result.

Test the crimp strength.

If it is done properly, an average person will


not be able to pull the plug off the cable
with his or her bare hands.

LESSON 102
CROSSOVER CABLE

LESSON 103
NETWORK CONFIGURATION

NETWORK CONFIGURATION

The first step is to open the Control Panel


window.

222
Panitia SMK Bukit Payong

223
Panitia SMK Bukit Payong

LESSON 104
TESTING OF NETWORK

TESTING OF NETWORK

Once you have installed the network card, cables and software, you can test
the new TCP/IP protocol.
Ping is the best utility for a TCP/IP connection test.
To use ping, open the Command Prompt window.
Enter the name or IP address you want to test after the ping command.
The ping utility then sends and receives packets of information.

Reply from 192.168.10.2: bytes=32 time=50ms TTL=32


Ping statistics for 192.168.10.2: Packets: Sent = 4. Received = 4. Lost = 0
<0% loss>Approximate round trip times in milli-seconds: Minimum =
17ms, Maximum = 50ms, Average = 29ms

If you successfully sent and received packets, all is well with the TCP/IP
connection.
If ping displays error messages such as:
• request timed out
• unknown host
• could not send, receive packets over the network

If the problem still persists, you have to check your network adapter or
protocol.

224
Panitia SMK Bukit Payong
LESSON 105
FOLDER

In Windows, Macintosh and other operating systems, a folder is a named


collection of related files that can be retrieved, moved and manipulated as
one entity.

Folders can contain many different types of files, such as documents, music,
pictures, videos and programs.
These files can be copied or moved to other folders, computers and even to
the Internet.

SHARE FOLDERS

You can share the files and folders stored on your computer, and on your
network.

LESSON 106
WIRELESS AND MOBILE COMMUNICATIONS

Wireless is a term used to describe telecommunications that use


electromagnetic waves rather than some form of wire to carry signal over
part or the entire communication path.

It refers to communication without cables or cords, but which chiefly uses


radio frequency and infrared waves. This method of communication relies on
low-powered radio waves to transmit data between devices.

Wireless and mobile communications rely on IrDA and the wireless


networking of computers.

Wireless technology is rapidly evolving, and is playing an increasingly


important role in the lives of people throughout the world.

An ever-larger number of people are


relying on this technology both directly and
indirectly.

Specialised and exotic examples of wireless


communications and control include:
• Global System for Mobile Communication
• General Packet Radio Service
• Enhanced Data GSM Environment
• Universal Mobile Telecommunications
System
• Wireless Application Protocol
• i-Mode
225
Panitia SMK Bukit Payong

General Packet Radio Service (GPRS) is a packet-based wireless


communication service that provides continuous connection to the Internet
for mobile phone and computer users.

Enhanced Data GSM Environment (EDGE) is a faster version of the Global


System for Mobile (GSM) wireless service.

Enhanced Data rates for Global Evolution(EDGE) is a faster version to the


Global System for Mobile (GSM) wireless service designed to deliver data at
rates up to 384 Kbps.
Wireless Application Protocol (WAP) is a specification for a set of
communication protocols to standardise the way wireless devices, such as
cellular telephones and radio transceivers, can be used for Internet access.

i-Mode, the world's first "smart phone service" was first introduced in Japan.

Wireless can be divided into four categories.


• fixed wireless

LESSON 107
MOBILE COMPUTING

DEFINING MOBILE COMPUTING

Mobile computing is about the new strategies of computing that utilise


portable or mobile devices and wireless communication networks.

There are various types of mobile computing devices. They include the
notebook computer, tablet PC, handheld computer, PDA and smartphone.

LESSON 108
INTERNET TECHNOLOGY

Internet Technology is a broad range of technologies for web development,


web production, design, networking, telecommunication and e-commerce.

LESSON 109
BLOGGING

226
Panitia SMK Bukit Payong
A blog (web log or weblog) is one of the popular activities on the Internet.
Most of these blogs are publicly shared and the authors frequently update
the content on a regular basis.

LESSON 110
PERSONAL AREA NETWORK

Personal Area Network (PAN)


A Personal Area Network (PAN) is a computer network used for
communication among computer devices including PCs, laptops, printers,
telephones, digital cameras, mobile phones, video game consoles and
personal digital assistants, close to one person.
Personal Area Networks may be wired with USB port, Firewire port, Infrared
(IrDA) and Bluetooth technologies.

Bluetooth is the popular wireless PAN used by most people, especially the
mobile phone technologies, and it applies the IEEE 802.15.1 standards.

Virtual Private Network (VPN)


A Virtual Private Network (VPN) is a network that uses a public
telecommunication infrastructure, such as the Internet, to remote offices or
individuals with secure access to their organisation's private network.

VPN uses tunnelling mechanism to maintain privacy and security of the data.
Tunnelling means transmitting data packets across a public network.

VPN is often used by companies to provide access from their internal network
resources to their home or mobile workers.

227
Panitia SMK Bukit Payong

Wireless LAN (WLAN)

Wireless Local Area Network (WLAN) is a type of LAN that uses high-
frequency radio waves to communicate between nodes.

WLAN improves user mobility, speed and scalability to move around within a
broad coverage area and still be connected to the network.

The IEEE standard for Wireless LANs is 802.11

WiMAX
Worldwide Interoperability for Microwave Access (WiMAX) is the industry
term for broadband wireless access network that is developed based on the
IEEE 802.16 standard.

WiMAX is a Wireless Metropolitan Area Network (MAN) technology that will


connect WiFi hotspots to the Internet and provides a wireless extension to
cable and DSL for larger broadband access.

WiMAX would operate similar to WiFi but at higher speeds, over greater
distances and for a greater number of users.

A WiMAX system will have two major parts:


a WiMAX base station, similar in concept to a mobile phone tower
a WiMAX receiver installed at home

228
Panitia SMK Bukit Payong

229

You might also like