Unit 3 MC
Unit 3 MC
1.WLAN Topologies
WLAN Topologies
802.11 networks are flexible by design. You have the option of deploying three types of WLAN topologies:
Independent basic service sets (IBSSs)
Basic service sets (BSSs)
Extended service sets (ESSs)
A service set is a logical grouping of devices. WLANs provide network access by broadcasting a signal across a wireless radio
frequency (RF) carrier. A receiving station can be within range of a number of transmitters. The transmitter prefaces its
transmissions with a service set identifier (SSID). The receiver uses the SSID to filter through the received signals and locate the
one it wants to listen to.
IBSS
An IBSS consists of a group of 802.11 stations communicating directly with
one another. An IBSS is also referred to as an ad-hoc network because it is essentially a simple peer-to-peer WLAN. Figure 2-1
illustrates how two stations equipped with 802.11 network interface cards (NICs) can form an IBSS and communicate directly
with one another.
BSS
ESS
IEEE 802.11 was the original version released in 1997. It provided 1 Mbps or 2 Mbps data rate in the 2.4 GHz band and used
either frequency-hopping spread spectrum (FHSS) or direct-sequence spread spectrum (DSSS). It is obsolete now.
2.IEEE 802.11a
802.11a was published in 1999 as a modification to 802.11, with orthogonal frequency division multiplexing (OFDM) based air
interface in physical layer instead of FHSS or DSSS of 802.11. It provides a maximum data rate of 54 Mbps operating in the 5
GHz band. Besides it provides error correcting code. As 2.4 GHz band is crowded, relatively sparsely used 5 GHz imparts
additional advantage to 802.11a.
Further amendments to 802.11a are 802.11ac, 802.11ad, 802.11af, 802.11ah, 802.11ai, 802.11aj etc.
3.IEEE 802.11b
802.11b is a direct extension of the original 802.11 standard that appeared in early 2000. It uses the same modulation technique as
802.11, i.e. DSSS and operates in the 2.4 GHz band. It has a higher data rate of 11 Mbps as compared to 2 Mbps of 802.11, due to
which it was rapidly adopted in wireless LANs. However, since 2.4 GHz band is pretty crowded, 802.11b devices faces
interference from other devices.
Further amendments to 802.11b are 802.11ba, 802.11bb, 802.11bc, 802.11bd and 802.11be.
4.IEEE 802.11g
802.11g was indorsed in 2003. It operates in the 2.4 GHz band (as in 802.11b) and provides a average throughput of 22 Mbps. It
uses OFDM technique (as in 802.11a). It is fully backward compatible with 802.11b. 802.11g devices also faces interference from
other devices operating in 2.4 GHz band.
5.IEEE 802.11n
802.11n was approved and published in 2009 that operates on both the 2.4 GHz and the 5 GHz bands. It has variable data rate
ranging from 54 Mbps to 600 Mbps. It provides a marked improvement over previous standards 802.11 by incorporating multiple-
input multiple-output antennas (MIMO antennas).
6.IEEE 802.11p
802.11 is an amendment for including wireless access in vehicular environments (WAVE) to support Intelligent Transportation
Systems (ITS). They include network communications between vehicles moving at high speed and the environment. They have a
data rate of 27 Mbps and operate in 5.9 GHz band.
IEEE 802.11: This is the original standard created in 1997 but currently defunct. The version supports a maximum
connection speed of 1Mbps. Unfortunately, devices using this version are no longer produced and don’t work on today’s
equipment.
IEEE 802.11a: This second version was developed in 1999 and works on a 5GHz Wi-Fi band. The version was released
hoping that it will encounter less interference, especially since most devices then used the 2.4GHz band. Nonetheless,
IEEE 802.11a is faster, with maximum data rates of 1.5Mbps to 54Mbps.
IEEE 802.11b: This version was also developed in 1999 but used the typical unregulated radio signaling frequency of the
2.4GHz band. It comes with a maximum speed of 11Mbps, and it is the version that increased Wi-Fi’s popularity. Most
vendors preferred using these frequencies due to low production costs. Unfortunately, its unregulated nature means that
IEEE 802.11b can face interference from cordless phones, ovens, and all other devices using the 2.4GHz range.
IEEE 802.11g: This 2003 sequel improved the maximum data rates of 54Mbps while maintaining the reliable 2.4GHz band
usage, which explains its widespread adoption. Also called Wi-Fi 3, this standard combines the good features of IEEE
802.11b and IEEE 802.11a. As such, it is compatible with backward technologies, meaning that 802.11b APs can work with
IEEE 802.11g adapters.
IEEE 802.11n: The IEEE 802.11n, otherwise called Wireless N or Wi-Fi 4, was developed to improve the bandwidth rates
provided by IEEE 802.11g. This standard uses several antennas and wireless signals, popularly known as MIMO
technology, contrary to the one used by IEEE 802.11g. 802.11n was ratified by industry standards in 2009, enabling it to
provide maximum network bandwidths of 600Mbps. It also offers a better Wi-Fi range compared to previous standards
since it has a higher signal intensity. The only drawback of this standard is that it is more expensive than IEEE 802.11g.
IEEE 802.11ac: Also called Wi-Fi 5, this Wi-Fi standard was created in 2014 and primarily supports the 5GHz frequency
band. It offers increased bandwidth, with potential speeds exceeding 1Gbps using multiple spatial streams and advanced
modulation techniques. While the standard operates on 5GHz for high speeds, it also supports 2.4GHz frequencies to
maintain compatibility with older devices. It is backward compatible with previous Wi-Fi standards such as 802.11a/b/g/n.
This was the initial Wi-Fi standard that facilitated the utilization of multiple input/multiple output (MIMO) technology,
allowing the use of multiple antennas on both transmitting and receiving devices to minimize errors and enhance speed.
IEEE 802.11ax: The IEEE 802.11ax, also known as Wi-Fi 6, is the recent and game-changing Wi-Fi standard that is up to 10
times faster than 802.11ac. It features a maximum data rate of 1.3Gbs and operates on both 2.4GHz and 5GHz
frequencies.
Here is the 802.11 standard chart to help you understand the differences more intuitively:
While both 802.11ac and 802.11ax provide robust performance for modern wireless networks, they differ significantly in their
design goals and practical applications. 802.11ac is popular for its high throughput and low latency, especially when dealing with
high-definition video streaming and online gaming. It relies heavily on the 5GHz band for compatibility with older devices. In
contrast, 802.11ax not only more than doubles the speed of 802.11ac, but also introduces advanced technologies such as
OFDMA and MU-MIMO, which significantly increase the efficiency and capacity of the network. 802.11ax not only supports the
2.4GHz and 5GHz frequency bands but also has the ability to expand into the future 6GHz frequency band, making it the ideal
solution for future IoT devices and high-density network environments. IEEE 802.11ax not only supports the 2.4GHz and 5GHz
bands but also has the ability to expand to the future 6GHz band, making it ideal for future IoT devices and high-density network
environments.
4.WPAN :
Wireless Personal Area Network in short known as WPAN. Actually WPAN is PAN (Personal Area Network) where the
interconnected devices are centered around a person’s workspace and connected through wireless medium. That’s why it is
also called as Person’s centered short range wireless connectivity. Typically the range is within about 10 meters means very
short range. Plugging in is one of the key concept in WPAN as within a close proximity WPAN-equipped devices communicate
with each other as like they are connected through cable. Unlike WLAN (Wireless Local Area Network) where there is a
requirement of infrastructure setup, in WPAN connection involves little or no infrastructure. In general, if we will see this
WPAN provides power efficient and inexpensive solutions to be implemented for a wide range of devices within a short range
distance.
As in WPAN mostly the connection between the devices happens within the building or in a room (short range) So, let’s take
an example of WiFi connection through which two friends are chatting, sharing documents with each other in room.
Some more examples of WPAN includes Wireless mouse, Wearable devices, USB flash drives, Digital cameras, Bluetooth, Wi-
Fi, Thermostats, Security systems, Lighting controls, Motion sensors, Personal server and Leak sensors etc.
As per IEEE, Wireless Personal Area Network is classified into 3 classes i.e
1. High-rate WPAN (HR-WPAN) : It is defined in the IEEE 802.15.3 standard. Data throughput is > 20 Mbps.
2. Medium-rate WPAN (MR-WPAN) : It is defined in the IEEE 802.15.1 standard. Data throughput is 1 Mbp.
3. Low-rate WPAN (LR-WPAN) : It is defined in the IEEE 802.15.4 standard. Data throughput is < 0.25 Mbps.
Applications of WPAN :
Short range connectivity for multimedia applications
Hands free devices connection
Industrial sensor applications
WPAN Topologies :
As mostly use of WPAN is within short range so it is mainly used for general purpose uses and with little industrial requirement
implementations which supports below network connectivity arrangements (network topology)
1. Star Topology
1. Mesh Topology
2. Cluster Tree Topology
Technologies used in WPAN :
1. Bluetooth
2. ZigBee
3. Infrared
4. Z-wave
5. Wireless Body Area Network (WBAN)
Features of WPAN :
Low cost, Little or No infrastructure setup
Short range communication
Small personal network , use anywhere
Wide range of devices
Low power consumption
No complex connectivity
Advantages of WPAN :
Security
Portability
Easy Connectivity
Stability
Disadvantages of WPAN :
Short range
Transfer speed
5.HIPERLAN
The main idea behind HIPERLAN is to provide an infrastructure or ad-hoc wireless system with a small radius.
HIPERLAN emerged in 1991 with the goal of achieving higher data rates than the 802.11 standard. It was approved in 1996. A
second version was introduceced in 2000. This version is designed as a fast wireless connection and can be used with various
networks, such as UMTS backbone, ATM, and IP networks. HiperLAN/2 can also be used as a home network and supports a data
rate of up to 54 Mbps.
Physical Layer: This layer provides the standard functions, including radio frequency functions.
Link Adaptation: This standard allows the access point to convey information in an uplink or downlink direction. The
HIPERLAN physical layer also specifies some link adaptation algorithms to be used.
Data Link Control (DLC) Layer: This layer includes the Media Acces Control (MAC), Radio Link Control (RLC), Dynamic
Frequency Selection (DFS) and Error Control (EC) protocols.
Convergence Layer: Its basic function is to provide the HIPERLAN DLC and physical access to other data networks.
HiperLAN (High Performance Radio LAN) is a wireless LAN standard developed as a European alternative to the IEEE 802.11
standards. Let me break it down for you:
1. HiperLAN/1:
o Planning for the first version of the standard, called HiperLAN/1, began in 1992, while planning for IEEE 802.11 was
already underway.
o The goal of HiperLAN/1 was to achieve a higher data rate than 802.11.
o Approved in 1997, HiperLAN/1 covers the physical layer and the media access control (MAC) part of the data link
layer.
o It features a new sublayer called the Channel Access and Control sublayer (CAC), which handles access requests to
channels.
o HiperLAN/1 uses FSK and GMSK modulations in the 5 GHz frequency range.
o Notably, it can forward data packets using several relays, extending communication beyond the radio range.
1
o Power-saving nodes (p-savers) set specific wake-up patterns to conserve energy .
2. HiperLAN/2:
o HiperLAN/2, completed in February 2000, is designed for fast wireless connections across various networks.
o It operates in the 5 GHz band and supports data rates of up to 54 Mbit/s.
o HiperLAN/2 serves as a backbone network for UMTS, ATM, IP networks, and even home networks like HiperLAN/1
.
6.WLL Architecture:
The Wireless Local Loop (WLL) architecture replaces traditional copper wires with wireless links, connecting subscribers to the
local central office. It consists of several components, including the PSTN (Public Switched Telephone Network), Switch
Function, WANU (Wireless Access Network Unit), and WASU (Wireless Access Subscriber Unit).
The PSTN serves as a circuit-switched network, while the Switch Function manages connections between WANUs. The WANU
takes care of authentication, operation, routing, and data transmission, whereas the WASU is installed at the subscriber’s
location. With its cost-effectiveness, enhanced security through digital encryption, scalability options, and various features like
internet access, voice services, data transfer capabilities, and fax services – WLL proves to be a dependable solution for
telecommunication requirements specifically in remote or rural areas.
WLL components:
1. PSTN: It is Public Switched Telephone Network which is a circuit switched network. It is a collection of world’s
interconnected circuit switched telephone networks.
2. Switch Function: Switch Function switches the PSTN among various WANUs.
3. WANU: It is short for Wireless Access Network Unit. It is present at the local exchange office. All local WASUs are
connected to it. Its functions includes: Authentication, Operation & maintenance, Routing, Transceiving voice and
data. It consists of following sub-components:
Transceiver: It transmits/receives data.
WLL Controller: It controls the wireless local loop component with WASU.
AM: It is short for Access Manager. It is responsible for authentication.
HLR: It is short for Home Location Register. It stores the details of all local WASUs.
4. WASU: It is short for Wireless Access Subscriber Units. It is present at the house of the subscriber. It connects the
subscriber to WANU and the power supply for it is provided locally.
5. Advantages of WLL:
It eliminates the first mile or last mile construction of the network connection.
Low cost due to no use of conventional copper wires.
Much more secure due to digital encryption techniques used in wireless communication.
Highly scalable as it doesn’t require the installation of more wires for scaling it.
6. Features of WLL:
ATMs are convenient, allowing consumers to perform quick self-service transactions such as deposits, cash withdrawals, bill
payments, and transfers between accounts.
Fees are commonly charged for cash withdrawals by the bank where the account is located, by the operator of the ATM, or by
both. Some or all of these fees can be avoided by using an ATM operated directly by the bank network that holds the account.
Using an ATM abroad can cost more than using one in the U.S. due to exchange rates or transaction fees
The first ATM appeared at a branch of Barclays Bank in London in 1967, though there are reports of a cash dispenser in use in
Japan in the mid-1960s.23 The interbank communications networks that allowed a consumer to use one bank’s card at another
bank’s ATM followed in the 1970s.
Within a few years, ATMs had spread around the globe, securing a presence in every major country. They now can be found
even in tiny island nations such as Kiribati and the Federated States of Micronesia.4
The World Bank, World Bank Open Data. “Automated Teller Machines (ATMs) (Per 100,000 Adults) .”
ATMs are also known automated bank machines (ABMs), cashpoints, or cash machines.
Types of ATMs
There are two main types of ATMs. Basic units only allow you to withdraw cash and receive updated account balances.
Types of ATMs
There are two types of ATMs. The simple basic unit helps you to check your bank account balance, withdraw money, get a mini
account statement, change your ATM PIN, or receive bank account updates. There are other complex units that provide facilities
for cheque or cash deposits as well as a line of credit.
Apart from this, there are onsite and offsite ATMs. The onsite ATMs are installed within the bank premises, whereas the offsite
ATMs are present in various parts of the country to ensure that people can avail the basic banking facilities without visiting a
bank branch.
Advantages of ATMsr
Cash withdrawal
Mini account statement
Cash transfer
Account balance details
Deposit of money
Input Devices
Keypad: Keypad is used to insert numbers, clear them or cancel a transaction. The customers use keypads to enter their
ATM PIN and the cash amount that they want to withdraw
Card Reader: An ATM consists of a space where you can insert your ATM card. The ATM card contains a magnetic card on
its back that has the account details. The card reader gathers the account information and sends it to the server.
Output Devices
Cash Dispenser: Cash is stocked in the ATM by the bank officials. The cash dispenser helps you to collect cash after
withdrawing a specific amount from the ATM.
Display Screen: The display screen guides the user about the steps related to cash withdrawal, checking account balance,
or changing ATM PIN.
Speaker: There is a speaker in every ATM which provides audio instructions to carry out transactions and access the
machine.
Receipt Printer: Once the ATM transaction is completed, the receipt printer records the transaction type, remaining
account balance, and amount withdrawn.
ATMs have increased the convenience and accessibility of the people. You can withdraw money at any time, including
on holidays and after business hours.
8.What is a VPN?
A virtual private network (VPN) is a technology that creates a safe and encrypted connection over a less secure network, such
as the Internet. A Virtual Private Network is a way to extend a private network using a public network such as the Internet.
The name only suggests that it is a “Virtual Private Network”, i.e. user can be part of a local network sitting at a remote
location. It makes use of tuneling protocols to establish a secure connection.History of VPNs
ARPANET introduced the idea of connecting distant computers in the 1960s. The foundation for current internet connectivity
was established by ensuring the development of protocols like TCP/IP in the 1980s. Particular VPN technologies first appeared
in the 1990s in response to the growing concerns about online privacy and security.
How Does a VPN Work?
Let us understand VPN with an example think of a situation where the corporate office of a bank is situated in Washington,
USA. This office has a local network consisting of say 100 computers. Suppose other branches of the bank are in Mumbai,
India, and Tokyo, Japan. The traditional method of establishing a secure connection between the head office and the branch
was to have a leased line between the branches and head office which was a very costly as well as troublesome job. VPN lets
us effectively overcome this issue.
The situation is described below
All 100 hundred computers of the corporate office in Washington are connected to the VPN server(which is a well-
configured server containing a public IP address and a switch to connect all computers present in the local network
i.e. in the US head office).
The person sitting in the Mumbai office connects to The VPN server using a dial-up window and the VPN server
returns an IP address that belongs to the series of IP addresses belonging to a local network of the corporate office.
Thus person from the Mumbai branch becomes local to the head office and information can be shared securely over
the public internet.
So this is the intuitive way of extending the local network even across the geographical borders of the country.
VPN is well Exploited all Across the Globe
We will explain to you with an example. Suppose we are using smartphones regularly. Spotify Swedish music app that is not
active in India But we are making full use of it sitting in India. So how ?? VPN can be used to camouflage our geolocation.
Suppose the IP address is 101.22.23.3 which belongs to India. That’s why our device is not able to access the Spotify
music app.
But the magic began when we used the Psiphon app which is an Android app used to change the device IP address to
the IP address of the location we want(say US where Spotify works seamlessly).
The IP address is changed using VPN technology. Basically what happens is that your device will connect to a VPN
server of the respective country that you have entered in your location textbox of the Psiphon app and now you will
inherit a new IP from this server.
Now we typed “What is my IP address”? Amazingly the IP address changed to 45.79.66.125 which belongs to the USA And
since Spotify works well in the US, we can use it now being in India (virtually in the USA). Is not that good? obviously, it is very
useful.
VPN also ensures security by providing an encrypted tunnel between the client and the VPN server.
VPN is used to bypass many blocked sites.
VPN facilitates Anonymous browsing by hiding your IP address.
Also, the most appropriate Search engine optimization (SEO) is done by analyzing the data from VPN providers which
provide country-wise statics of browsing a particular product.
VPNs encrypt your internet traffic, safeguarding your online activities from potential eavesdropping and cyber
threats, thereby enhancing your privacy and data protection.
Types of VPN
There are several types of VPN and these are vary from specific requirement in computer network. Some of the VPN are as
follows:
1. Remote Access VPN
2. Site to Site VPN
3. Cloud VPN
4. Mobile VPN
5. SSL VPN
For more details you can refer Types of VPN published article.
VPN Protocols
OpenVPN: A cryptographic protocol that prioritises security is called OpenVPN. OpenVPN is compatible protocol that
provides a variety of setup choices.
Point-To-Point Tunneling Protocol(PPTP): PPTP is not utilized because there are many other secure choices with
higher and more advanced encryption that protect data.
WireGuard: Wireguard is a good choice that indicates capability in terms of performance.
Secure Socket Tunneling Protocol(SSTP): SSTP is developed for Windows users by Microsoft. It is not widely used due
to the lack of connectivity.
Layer 2 Tunneling Protocol(L2TP) It connects a user to the VPN server but lacks encryption hence it is frequently
used with IPSec to offer connection, encryption, and security simultaneously.
Why Should Use VPN?
For Unlimited Streaming: Love streaming your favourite shows and sports games? A VPN is your ultimate companion
for unlocking streaming services.
For elevating your Gaming Experience: Unleash your gaming potential with the added layer of security and
convenience provided by a VPN. Defend yourself against vengeful competitors aiming to disrupt your gameplay while
improving your ping for smoother, lag-free sessions. Additionally, gain access to exclusive games that may be
restricted in your region, opening up a world of endless gaming possibilities.
For Anonymous Torrenting: When it comes to downloading copyrighted content through torrenting, it’s essential to
keep your IP address hidden. A VPN can mask your identity and avoid potential exposure, ensuring a safe and private
torrenting experience.
For supercharging your Internet Speed: Are you tired of your Internet speed slowing down when downloading large
files? Your Internet Service Provider (ISP) might be intentionally throttling your bandwidth. Thankfully, a VPN can
rescue you by keeping your online activities anonymous, effectively preventing ISP throttling. Say goodbye to sluggish
connections and embrace blazing-fast speeds.
Securing Public Wi-Fi: VPNs are essential for maintaining security when using public Wi-Fi networks, such as those in
coffee shops, airports, or hotels. These networks are often vulnerable to cyberattacks, and using a VPN encrypts your
internet connection, protecting your data from potential hackers and eavesdroppers when you connect to untrusted
Wi-Fi hotspots.
Are VPNs legal or illegal?
Using a VPN is legal in most countries, The legality of using a VPN service depends on the country and its geopolitical relations
with another country as well. A reliable and secure VPN is always legal if you do not intend to use it for any illegal activities
like committing fraud online, cyber theft, or in some countries downloading copyrighted content. China has decided to block
all VPNs (Virtual private network) by next year, as per the report of Bloomberg. Many Chinese Internet users use VPNs to
privately access websites that are blocked under China’s so-called “great firewall”. This is done to avoid any information
leakage to rival countries and to tighten the information security.
What to Look for When Choosing a VPN?
Be sure the VPN has appropriate speed, a lot of providers have trouble keeping up with Netflix viewing or
downloading.
Read both user and expert evaluations to gain a good idea of how well the VPN operates.
Select a VPN provider that provides shared IP addresses.
More servers translate into faster browsing because there will be less traffic on each one.
Benefits of VPN
When you use VPN it is possible to switch IP.
The internet connection is safe and encrypted with VPN
Sharing files is confidential and secure.
Your privacy is protected when using the internet.
There is no longer a bandwidth restriction.
It facilitates cost savings for internet shopping.
Limitations of VPN
VPN may decrease your internet speed.
Premium VPNs are not cheap.
VPN usage may be banned in some nations.
CDPD Infrastructur
CDPD - Layering
Application
Transport
• Provides logical data link connections on a radio channel by using the address contained in each packet
frame.
• Takes care of the packet sequence control.
• Error detection and flow control of the packet
CPDP-Layer 3-RRMP
• Manages radio channel resources of a CPDP system and enables M-ES to find the radio channel
without interfering with the AMPS communication.
• Handles BS identification and configuration messages for all M-ES stations.
Handles channel hopping commands, cell handoffs and M-ES change of power commands
AMPS and CDPD
– Every time MSC chooses a channel for the BS, 30% of channel time is unused, which is exploited by the
CPDP network.
Effects of CDPD on AMPS
• Limited bandwidth
– 19.2kbps shared per channel
– Modern applications demand more bandwidth.
• Security
– “Man in the middle” identity theft attack
– IP network attacks
– Denial of Service attacks easy.
Potential Improvements
named MOBITEX
9.Common channel signaling
Dial Up Connection
2. Broadband Connection
Broadband refers to high-speed internet access that is faster than traditional dial-up access. It is provided through either cable or
telephone composition. It does not require any telephone connection that’s why here we can use telephone and internet
connection simultaneously. In this connection, more than one person can access the internet connection simultaneously.
It is a wide bandwidth data transmission that transports several signals and traffic types. In this connection, the medium used
is coaxial cable, optical fiber cable, radio, or twisted pair cable.
Broadband-Connection
3. DSL (Digital Subscriber Line)
DSL stands for Digital Subscriber Line. It provides an internet connection through the telephone line(network). DSL is a form of
broadband communication that is always on, there is no need to dial a phone number to connect. DSL connection uses a router
to transport data and the speed of this connection range between 128k to 8Mbps depending on the service offered. A DSL
connection can translate data at 5 million bytes per second, or 5mbps.
DSL service can be delivered simultaneously with wired telephone service on the same telephone line due to high-frequency
bands for data.
DSL
4. Cable
It is a form of broadband access cable modem that can provide extremely fast access to the internet. The speed of this
connection varies which can be different for uploading data transmission or downloading.
It uses a cable modem to provide an internet connection and operates over cable TV lines. The speed of cable connection ranges
from 512k to 20Mbps.h
Cable
5. Satellite Connection
This type of connection is provided mainly in rural areas where a broadband connection is not yet offered. It accesses the
internet via a satellite that is in Earth’s orbit.
The signal travels from a long distance that is from earth to satellite and back again which provides a delayed connection.
Satellite connection speeds range from 512k to 2.0Mbps.
Satellite Connection
6. Wireless Connection
As the name suggests wireless connection does not use telephone lines or cables to connect to the internet. The wireless
connection uses a radio frequency band to connect to the internet. It is also an always-on connection and this connection can be
accessed from anywhere and speed may vary for different locations. It ranges from 5Mbps to 20Mbps.
Wireless Connection
7. Cellular
Cellular technology provides wireless Internet access through cell phones. Speed may vary depending on the service provider.
The most common are 3G and 4G which means from 3rd generation and 4th generation respectively. The speed of the 3G
cellular network is around 2.0Mbps and the 4G cellular network is around 21Mbps the goal of the 4G network is to achieve peak
mobile speeds of 100Mbps but the current speed of the 4G network is about 21Mbps.
Cellular
8. ISDN (Integrated Service Digital Network)
ISDN stands for Integrated Service Digital Network and it is a circuit-switched telephone network system, but it also provides
access to packet-switched networks that transmits both voice and data over a digital line. It provides a packet-switched
connection for data in increments of 64 kilobit/s.
ISDN connection provides better speeds and higher quality than traditional connections. It provided a maximum of 128kbit/s
bandwidth in both upstream and downstream directions.
ISDN
Components Required For Internet Connecton
Modem: A device that modulates and demodulates signals for encoding and decoding digital data transmitted over a
telephone line or cable system.
Router: A device that routes data from a local network to the internet and vice versa, often includes Wi-Fi capabilities.
ISP (Internet Service Provider): The company that provides internet access to customers.
.
.