VISUAL SUMMARY Communications and Networks

Total Page:16

File Type:pdf, Size:1020Kb

VISUAL SUMMARY Communications and Networks Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, pro- Communication channels carry data from one com- grams, and information between two or more com- puter to another. puters. Applications include e-mail, texting, Internet telephones, and electronic commerce. Physical Connections Physical connections use a solid medium to connect Connectivity sending and receiving devices. Connections include Connectivity is a concept related to using computer twisted pair (telephone lines and Ethernet cables), networks to link people and resources. You can link or coaxial cable, and fiber-optic cable. connect to large computers and the Internet, provid- Wireless Connections ing access to extensive information resources. Wireless connections do not use a solid substance to The Wireless Revolution connect devices. Most use radio waves. Mobile devices like smartphones and tablets have • Bluetooth— transmits data over short distances; brought dramatic changes in connectivity and com- widely used for wireless headsets, printers, and munications. These wireless devices are becoming handheld devices. widely used for computer communication. • Wi-Fi (wireless fidelity)— uses high-frequency radio signals; most home and business wireless Communication Systems networks use Wi-Fi. Communication systems transmit data from one loca- • Microwave— line-of-sight communication; used tion to another. Four basic elements are to send data between buildings; longer distances • Sending and receiving devices require microwave stations. • Communication channel (transmission medium) • WiMax (Worldwide Interoperability for Microwave Access)— extends the range of Wi-Fi • Connection (communication) devices networks using microwave connections. • Data transmission specifications • LTE (Long Term Evolution) —currently has similar performance to WiMax; promises to provide greater speed and quality transmissions in the near future. • Satellite —uses microwave relay stations in the sky; GPS (global positioning system) tracks geographic locations. • Infrared —uses light waves over a short distance; line-of-sight communication. 232 CHAPTER 8 oole16864_ch08_210-239.inddle16864_ch08_210-239.indd 223232 110/29/120/29/12 112:432:43 PPMM Rev.Confirming Pages To be a competent end user you need to understand the concepts of connectivity, the wireless revolution, and communication systems. Additionally, you need to know the essential parts of communication technology, including channels, connection devices, data transmission, networks, network architectures, and network types. CONNECTION DEVICES NETWORKS Computer networks connect two or more computers. Some specialized network terms include • Node —any device connected to a network. • Client —node requesting resources. • Server —node providing resources. • Directory server —specialized node that manages resources. • Host —any computer system that can be accessed over a network. • Router —a node that forwards data packets from one network to another network. • Switch —node that coordinates direct flow of data Many communication systems use standard tele- between other nodes. Hub is an older device that phone lines and analog signals. Computers use digital directed flow to all nodes. signals. • NIC (network interface card) —LAN adapter card Modems for connecting to a network. • NOS (network operating system) —controls and Modems modulate and demodulate. Transfer rate is coordinates network operations. measured in megabits per second. Four types are tele- phone, DSL, cable, and wireless (wireless wide area • Network administrator —network specialist network, WWAN). responsible for network operations. Connection Service T1, T3 (DS3), and OC (optical carrier) lines provide NETWORK TYPES support for very high speed, all-digital transmission for large corporations. More affordable technologies Networks can be citywide or even international, using include dial-up, DSL (digital subscriber line), ADSL both wired and wireless connections. (widely used), cable, satellite , and cellular services. • Local area networks (LANs) connect nearby 4G (fourth-generation mobile telecommunications) devices. Network gateways connect networks to promises 10 times faster speeds than 3G. one another. Ethernet is a LAN standard. These LANs are called Ethernet LANs. • Home networks are LANs used in homes. DATA TRANSMISSION • Hotspots provide Internet access typically using Wi-Fi technology. Bandwidth measures a communication channel’s • Wireless LANs (WLANs) use a wireless access width or capacity. Four bandwidths are voiceband point (base station) as a hub. (low bandwidth), medium band, broadband (high- capacity transmissions), and baseband. Protocols are • Personal area networks (PANs) are wireless net- rules for exchanging data. Widely used Internet pro- works for PDAs, cell phones, and other small tocols include http, https, and TCP/IP. IP addresses gadgets. (Internet protocol addresses) are unique numeric • Metropolitan area networks (MANs) link office Internet addresses. DNS (domain name server) con- buildings within a city, spanning up to 100 miles. verts text-based addresses to and from numeric IP • Wide area networks or WANs are the largest type. addresses. Packets are small parts of messages. They span states and countries or form worldwide networks. The Internet is the largest wide area net- work in the world. Communications and Networks 233 oole16864_ch08_210-239.inddle16864_ch08_210-239.indd 223333 110/29/120/29/12 112:432:43 PPMM Rev.Confirming Pages NETWORK ARCHITECTURE ORGANIZATIONAL NETWORKS Internet Technologies Network architecture describes how networks are Internet technologies support effective communica- arranged and resources are shared. tion using intranets and extranets. Topologies • Intranet —private network within an organization; uses browsers, websites, and web pages. Typical A network’s topology describes the physical arrange- applications include electronic telephone directo- ment of a network. ries, e-mail addresses, employee benefit informa- • Bus network— each device is connected to a tion, internal job openings, and much more. common cable called a bus or backbone. • Extranet —like intranet except connects more than • Ring network— each device is connected to two one organization; typically allows suppliers and other devices, forming a ring. others limited access to their networks. • Star network —each device is connected directly to a central network switch; most common type Network Security today. Three technologies commonly used to ensure net- • Tree (hierarchical) network —a central node is work security are firewalls, intrusion detection sys- connected to subordinate nodes forming a treelike tems, and virtual private networks. structure. • Firewall —controls access; all communications • Mesh network —newest; each node has two or pass through proxy server. more connecting nodes. • Intrusion detection systems (IDS) —work with firewalls; use sophisticated statistical techniques Strategies to recognize and disable network attacks. Every network has a strategy, or way of sharing infor- • Virtual private network (VPN) —creates secure mation and resources. Common network strategies private connection between remote user and orga- include client/server and peer-to-peer. nization’s internal network. • Client/server (hierarchical) network —central com- puters coordinate and supply services to other nodes; based on specialization of nodes; widely CAREERS IN IT used on the Internet; able to handle very large net- works efficiently; powerful network management Network administrators manage a company’s software available. LAN and WAN networks. Bachelor’s or specialized • Peer-to-peer network —nodes have equal authority advanced associate’s degree in computer science, and act as both clients and servers; widely used to computer technology, or information systems and share games, movies, and music over the Internet; practical networking experience required. Salary easy to set up and use; lacks security controls. range is $46,000 to $84,000. 234 CHAPTER 8 oole16864_ch08_210-239.inddle16864_ch08_210-239.indd 223434 110/29/120/29/12 112:432:43 PPMM Rev.Confirming Pages KEY TERMS 1G (first-generation downlink (215) optical carrier (OC) (217) mobile telecommuni- DS3 (217) packet (220) cations) (218) Ethernet (223) peer-to-peer (P2P) 2G (second-generation Ethernet cable (214) network (227) mobile telecommuni- extranet (227) personal area network cations) (218) fiber-optic cable (214) (PAN) (224) 3G (third-generation firewall (228) protocol (220) mobile telecommuni- global positioning system proxy server (228) cations) (218) (GPS) (215) ring network (225) 4G (fourth-generation hierarchical network (226) router (222) mobile telecommuni- home network (223) satellite (215) cations) (218) host (222) satellite connection analog signal (216) hotspot (224) service (217) asymmetric digital subscriber http (hypertext transfer server (221) line (ADSL) (217) protocol) (220) star network (225) backbone (225) https (hypertext transfer strategy (226) bandwidth (218) protocol secure) (220) switch (222) base station (223) hub (222) T1 (217) baseband (218) infrared (216) T3 (217) Bluetooth (215) intranet (227) telephone line (214) broadband (218) intrusion detection system telephone modem (216) bus (225) (IDS) (228) topology (225) bus network (225) IP address (Internet transfer rate (216) cable modem (217) protocol address) (220) transmission control cable
Recommended publications
  • Wireless Technologies and the SAFECOM Sor for Public Safety Communications
    Wireless Technologies and the SAFECOM SoR for Public Safety Communications Leonard E. Miller Wireless Communication Technologies Group Advanced Network Technologies Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, Maryland 2005 Cover photo: Santa Clara County antenna farm, from http://www.sccfd.org/frequencies.html ii Wireless Technologies and the SAFECOM SoR for Public Safety Communications Preface The Problem: Lack of Capacity, Interoperability, and Functionality National assessments of public safety communications (PSC) that were made in the 1990s found that the nation’s public safety agencies faced several important problems in their use of radio communications1: • First, the radio frequencies allocated for Public Safety use have become highly congested in many, especially urban, areas…. • Second, the ability of officials from different Public Safety agencies to communicate with each other is limited…. Interoperability is hampered by the use of multiple frequency bands, incompatible radio equipment, and a lack of standardization in repeater spacing and transmission formats. • Finally, Public Safety agencies have not been able to implement advanced features to aid in their mission. A wide variety of technologies—both existing and under development —hold substantial promise to reduce danger to Public Safety personnel and to achieve greater efficiencies in the performance of their duties. Broadband data systems, for example, offer greater access to databases and information that can save lives and contribute to keeping criminals “off the street.” Video systems promise better surveillance capabilities, increased use of robotics in toxic and hazardous environments, and better monitoring and tracking of both personnel and equipment. The national assessments of PSC have had significant impact on legislation, regulation, and funding.
    [Show full text]
  • Glossary of Terminology
    Glossary of Broadband Terminology This glossary was compiled by Ray Elseth of Broadband Development 3 (http://www.bbd3.com) and Thomas Asp of Virchow Krause (http://virchowkrause.com), and is a supplement to “Broadband Access: The Local Government Role” by Thomas Asp, Harvey L. Reiter, Jerry Schulz, and Ronald L. Vaden (IQ Report 36, no. 2 [Washington, D.C.: ICMA, 2004]). 802.11 A family of specifications covering wireless connectivity between devices normally located within 100’ to 300’ of each other. Often referred to as Wireless Local Area Network (WLAN). Most common implementation is 802.11b (see Wi- Fi), but 802.11a and 802.11g are also in active use. 802.15 A family of specifications covering wireless connectivity between devices normally located within 10’ to 30’ of each other. Often referred to as Wireless Personal Area Network (WPAN). Implemented as “Bluetooth.” 802.16 A family of specifications covering wireless connectivity between devices normally located within 1 to 30 miles of each other. Often referred to as Wireless Metropolitan Area Network (WMAN). Access Point (AP) A hardware device that acts as a connectivity hub to permit users of a wireless device to connect to a wired local area network. Provides a bridge between Ethernet wired LANs (local area networks) and the wireless network. Access points are the connectivity point between Ethernet wired networks and devices equipped with a wireless LAN adapter card. Antenna The equipment that allows the transmission or reception of radio frequency energy. Asynchronous Digital A technology that allows high-speed data to be sent over a Subscriber Line single pair of existing copper telephone lines, with data rates (ADSL) for receiving data differing from data rates for sending data.
    [Show full text]
  • QUESTION 20-1/2 Examination of Access Technologies for Broadband Communications
    International Telecommunication Union QUESTION 20-1/2 Examination of access technologies for broadband communications ITU-D STUDY GROUP 2 3rd STUDY PERIOD (2002-2006) Report on broadband access technologies eport on broadband access technologies QUESTION 20-1/2 R International Telecommunication Union ITU-D THE STUDY GROUPS OF ITU-D The ITU-D Study Groups were set up in accordance with Resolutions 2 of the World Tele- communication Development Conference (WTDC) held in Buenos Aires, Argentina, in 1994. For the period 2002-2006, Study Group 1 is entrusted with the study of seven Questions in the field of telecommunication development strategies and policies. Study Group 2 is entrusted with the study of eleven Questions in the field of development and management of telecommunication services and networks. For this period, in order to respond as quickly as possible to the concerns of developing countries, instead of being approved during the WTDC, the output of each Question is published as and when it is ready. For further information: Please contact Ms Alessandra PILERI Telecommunication Development Bureau (BDT) ITU Place des Nations CH-1211 GENEVA 20 Switzerland Telephone: +41 22 730 6698 Fax: +41 22 730 5484 E-mail: [email protected] Free download: www.itu.int/ITU-D/study_groups/index.html Electronic Bookshop of ITU: www.itu.int/publications © ITU 2006 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. International Telecommunication Union QUESTION 20-1/2 Examination of access technologies for broadband communications ITU-D STUDY GROUP 2 3rd STUDY PERIOD (2002-2006) Report on broadband access technologies DISCLAIMER This report has been prepared by many volunteers from different Administrations and companies.
    [Show full text]
  • ITU Structure and Preparation on WRC-19 Agenda Items
    ITU Structure and preparation on WRC-19 Agenda Items Pacific Radiocommunication Workshop 2018 (PRW-18) 04 – 06 Sep 2018 Honiara, Solomon Islands Aamir Riaz International Telecommunication Union – Regional Office for Asia and the Pacific [email protected] AGENDA ITU and its structure Recalling WRC-15 outcomes Preparatory work towards WRC-19 Going forward towards WRC-19 2 ITU at a Glance Specialized Agencies of the United Nations WHO ILO UPU ICAO WMO IMO IAEA WB UNWTO FAO IFAD UNIDO WIPO WFP IMF Specialized UN agency with focus on Telecommunication / ICTs ITU Presence JAKARTA ITU – Our strength Our numbers 193 >700 >100 MEMBER STATES ACADEMIA MEMBERS PRIVATE SECTOR ORGANIZATIONS ITU – Organization Each sector has separate mandate, but all work cohesively towards connecting the world ITU – Organization ITU – Organization Membership Inputs Treaty RPR WRC RPM Organiz. WTDC WTSA RA RR Action Advisory TDAG Plan TSAG Action RAG Plan Action Plan Study Groups Study Groups Technical Study Groups and CPMs Secretariat BDT TSB BR International Frequency Allocations The shaded part represents the Tropical Zones as defined in Nos. 5.16 to 5.20 and 5.21 The WRC Cycle Revisions to the Radio Regulations ITU Member States RA Final Acts Rep Rec R Members R CPM - Report WRC ITU & CPM-2 WRC Director RRB Resolution ITU-R Study Groups: Radiocommunication SG-1: Spectrum management Bureau SG-3: Radiowave propagation RoP Next WRC SG-4: Satellite services SG-5: Terrestrial services Agenda ITU Member States Member ITU SG-6: Broadcasting service SG-7: Science services CPM-1 RRB: Radio Regulations Board CPM: Conference Preparatory Meeting Adopted by SGs: Radiocommunication Study Groups Rec: ITU-R Recommendation ITU RA: Radiocommunication Assembly RoP: Rules of Procedure Council WRC: World Radiocommunication Conference RR: Radio Regulations (treaty status) Recalling WRC-15 outcomes WRC-15 (General Information) 2-27 November 2015 in Geneva 3275 participants attended WRC-15, including: .
    [Show full text]
  • Purchasing a Hotspot Public WIFI
    Virtual Tech Hub Internet Access Guide Virtual classes are starting next week and Foothill College understands that some students may be struggling with their Internet connection. In order to help those in need, the Virtual Hub Tech Ambassadors have decided to look into some of the different ways available to access the internet. Purchasing a Hotspot Those who do not have internet or reliable services have the option to purchase a hotspot. A hotspot is a device that allows people to obtain Internet access, typically using Wi-Fi, using a router connected to an Internet service provider. You can purchase hotspots at places like Best Buy, Target, Walmart or any place with a phone company stand. Public Wifi Another option is to use a public WIFI or an “Open Hotspot,” which are located in local or open spaces. Internet & Cellular Service Deals There is a possibility to look into the current deals that are happening with existing internet providers. Some of these deals ask that you enter into a contract while others offer their services no strings attached. We advise you to contact that service provider for more information. Additionally, it has come to our attention that some cellular phone companies are extending customer's GB for the month. This may allow you to access the internet longer if you're on a limited plan. You may also be able to use your phone as a hotspot. We encourage you to contact your cellular provider to find out if they are offering deals/freebies to help customers through the COVID-19 crisis.
    [Show full text]
  • Bluetooth Hotspot
    ISSN (Online) : 2278-1021 ISSN (Print) : 2319-5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 1, January 2014 Bluetooth Hotspot Pooja Abnave1, Priyanka Patil2, P.L.Himabindu3, Prashant Dukare4, S.S.Vanjire5 Student, Department Of Computer Engineering, University of Pune, Pune, India1 Student, Department Of Computer Engineering, University of Pune, Pune, India2 Student, Department Of Computer Engineering, University of Pune, Pune, India3 Student, Department Of Computer Engineering, University of Pune, Pune, India4 Assistant Professor, Department Of Computer Engineering, University of Pune, Pune, India5 Abstract: Bluetooth is a technology for short range wireless real-time data transfer between devices. It is becoming increasingly more prevalent in modern society, with technical gadgets now ranging from mobile phones and game controllers to PDAs and personal computers. Bluetooth hotspot is a technology which allows Bluetooth enabled mobiles (clients) to access the internet. With this technology mobile phones need not have a GPRS connection in it. Before accessing the internet Bluetooth mobiles (devices) need to be discoverable. The Bluetooth server discovers all devices in its range and sends a message for pairing. The connection link is established when an appropriate message is sent by the discovered device for pairing in response to the servers message. In this paper we will study how communication links are established, what are the security issues and how they are handled in Bluetooth and the data packet format. Keywords: Eavesdropping; Ad-hoc network; Bluetooth Network; Bluetooth Security; Media Access I. INTRODUCTION II. NEED Ad hoc networks today are based primarily on Bluetooth As the number of Bluetooth products increases each year, it technology.
    [Show full text]
  • Device-To-Device Communications in LTE-Advanced Network Junyi Feng
    Device-to-Device Communications in LTE-Advanced Network Junyi Feng To cite this version: Junyi Feng. Device-to-Device Communications in LTE-Advanced Network. Networking and Internet Architecture [cs.NI]. Télécom Bretagne, Université de Bretagne-Sud, 2013. English. tel-00983507 HAL Id: tel-00983507 https://tel.archives-ouvertes.fr/tel-00983507 Submitted on 25 Apr 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. N° d’ordre : 2013telb0296 Sous le sceau de l’Université européenne de Bretagne Télécom Bretagne En habilitation conjointe avec l’Université de Bretagne-Sud Ecole Doctorale – sicma Device-to-Device Communications in LTE-Advanced Network Thèse de Doctorat Mention : Sciences et Technologies de l’information et de la Communication Présentée par Junyi Feng Département : Signal et Communications Laboratoire : Labsticc Pôle: CACS Directeur de thèse : Samir Saoudi Soutenue le 19 décembre Jury : M. Charles Tatkeu, Chargé de recherche, HDR, IFSTTAR - Lille (Rapporteur) M. Jean-Pierre Cances, Professeur, ENSIL (Rapporteur) M. Jérôme LE Masson, Maître de Conférences, UBS (Examinateur) M. Ramesh Pyndiah, Professeur, Télécom Bretagne (Examinateur) M. Samir Saoudi, Professeur, Télécom Bretagne (Directeur de thèse) M. Thomas Derham, Docteur Ingénieur, Orange Labs Japan (Encadrant) Acknowledgements This PhD thesis is co-supervised by Doctor Thomas DERHAM fromOrangeLabs Tokyo and by Professor Samir SAOUDI from Telecom Bretagne.
    [Show full text]
  • Advantages and Limitations of Li- Fi Over Wi-Fi and Ibeacon Technologies By
    ISSN (Online) 2321 – 2004 IJIREEICE ISSN (Print) 2321 – 5526 International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering ISO 3297:2007 Certified Vol. 4, Issue 11, November 2016 Review Paper: Advantages and Limitations of Li- Fi over Wi-Fi and iBeacon Technologies By Deepika D Pai Asst. Professor, (Sel Grade), Department of Electronics and Communication Engineering. Vemana Institute of Technology Abstract: Li-Fi can be thought of as a light-based Wi-Fi. That is, it uses light instead of radio waves to transmit information. And instead of Wi-Fi modems, Li-Fi would use transceiver-fitted LED lamps that can light a room as well as transmit and receive information. Light is inherently safe and can be used in places where radio frequency communication is often deemed problematic, such as in aircraft cabins or hospitals. So visible light communication not only has the potential to solve the problem of lack of spectrum space, but can also enable novel application. The visible light spectrum is unused; it's not regulated, and can be used for communication at very high speeds. This paper compares the Li-Fi technology with Wi-Fi and iBeacon technologies. Keywords: Li-fi, Wi-Fi, iBeacon, visible light communication, BLE communication I. INTRODUCTION In recent trends, wireless communication Wi-Fi is gaining government licence. This new Ethernet standard was tremendous importance. CISCO reported that the compatible with devices and technology working on radio compound annual growth rate (CAGR) of mobile data waves and came to be known as ―Wi-Fi‖ only in 1999. usage per month is around 80% which has led to the saturation of the network spectrum consequently bringing iBeacon: The technology was first introduced by Apple at down its efficiency.
    [Show full text]
  • The Future of Personal Area Networks in a Ubiquitous Computing World
    Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere without the permission of the Author. The Future of Personal Area Networks in a Ubiquitous Computing World A thesis presented in partial fulfillment of the requirements for the degree of Master of Information Sciences in Information Systems at Massey University, Auckland New Zealand Fei Zhao 2008 ABSTRACT In the future world of ubiquitous computing, wireless devices will be everywhere. Personal area networks (PANs), networks that facilitate communications between devices within a short range, will be used to send and receive data and commands that fulfill an individual’s needs. This research determines the future prospects of PANs by examining success criteria, application areas and barriers/challenges. An initial set of issues in each of these three areas is identified from the literature. The Delphi Method is used to determine what experts believe what are the most important success criteria, application areas and barriers/challenges. Critical success factors that will determine the future of personal area networks include reliability of connections, interoperability, and usability. Key application areas include monitoring, healthcare, and smart things. Important barriers and challenges facing the deployment of PAN are security, interference and coexistence, and regulation and standards. i ACKNOWLEDGEMENTS Firstly, I would like to take this opportunity to express my sincere gratitude to my supervisor – Associate Professor Dennis Viehland, for all his support and guidance during this research. Without his advice and knowledge, I would not have completed this research.
    [Show full text]
  • Car-Net Via Wi-Fi Hotspot Setting up an Internet Connection Via Wi-Fi In
    Car-Net via Wi-Fi hotspot Setting up an Internet connection via Wi-Fi in order to use Car-Net Dear driver, Brief information about Volkswagen Car-Net With the optionally available Volkswagen Car-Net, you arrive at your destination more relaxed - and with greater reliability. The system is permanently updated via the Internet and therefore uses the most current data. Searching for a parking space and circumnavigating traffic jams is now becoming even easier. Here you find out how and under what requirements a Wi-Fi Internet connection to your infotainment system can be set up in order to be able to use Volkswagen Car-Net. However, this brochure does not describe all functions and therefore cannot replace the manual for the vehicle, which contains many important disclosures and warning notices. Frequently asked questions about Volkswagen Car-Net can be found on the Volkswagen Car- Net web page under the menu item „Help/FAQ“. The availability of Volkswagen Car-Net and its terms may vary depending on the vehicle and country. Further information about Volkswagen Car-Net is available at http://www.volkswagen.de/Car-Net and from your Volkswagen service partner and information about your mobile tariff conditions from your mobile phone system provider. Car-Net via Wi-Fi 2 Available connection technologies In order to use Car-Net, the infotainment system must be online. Here, you can see different connection technologies for Mobile phone interface “Business” * LTE Car Stick Discover Pro Discover Media creating an Internet connection. Go online via “Wi-Fi” In the described solution the Internet connection will not be created by the infotainment itself but by a different medium (e.g.
    [Show full text]
  • Voice Over IP in the Wifi Network Business Models: Will Voice Be a Killer Application for Wifi Public Networks?”
    “Voice over IP in the WiFi Network business models: Will voice be a killer application for WiFi Public Networks?” Jorge Infante, Boris Bellalta Research Group on Networking Technology and Strategies Universitat Pompeu Fabra Email: {jorge.infante, boris.bellalta}@upf.edu P. Circumval·lació 8, 08003 Barcelona (Spain) Phone/Fax: +34935422745 / +34935422517 Abstract The stunning growth of WiFi networks, together with the spreading of mobile telephony and the increasing use of Voice over IP (VoIP) on top of Internet, pose relevant questions on the application of WiFi networks to support VoIP services that could be used as a complement and/or competition to the 2G/3G cellular networks. Voice has been, is, and will surely be one of most important killer applications for many of the telecommunications networks. Till now, WiFi networks are centred on Internet access services, not covering a significant market for voice services. However, the succeeding VoIP services working on top of Internet as the ones provided by Skype or Vonage, and the irruption on the terminal market of intelligent dual WiFi/Cellular phones can enable different new scenarios for VoIP over WiFi. In these scenarios, private residential and corporate WiFi connections, WiFi hotspots and wide-area networks may act as complementary infrastructure support for supplying itinerant voice services combined with instant-messaging and multimedia services at advantageous prices, and enabling new competing business models in the voice market. The paper explores the state of the art on the capability of WiFi networks to support voice services in a user itinerant context, identifying actual and future strengths, weakness, opportunities and threats.
    [Show full text]
  • Personal Area Network” (PAN)?
    High Frequency Design From March 2004 High Frequency Electronics Copyright © 2004 Summit Technical Media, LLC TUTORIAL What is a “Personal Area Network” (PAN)? ew terminology an entire house or a set of offices, but not nec- Here are some notes on the appears regular- essarily the entire building. PAN is then a meaning of Personal Area Nly in the high- room-size network covering an individual’s Network (PAN), a growing tech arena, and wireless work area or a work group. segment of the wireless communications is no communications market exception. One of the Definition by Bandwidth recent additions is PAN, Although there are exceptions, it is valid to or Personal Area Network. This note attempts divide WAN, LAN (and WLAN) and PAN by to explain this term with the hope that it will the data rate, or bandwidth. In general, a see consistent and meaningful usage in busi- WAN is a maximum-rate system using ness and technical dialogue. Gigabit Ethernet or fiber optics for 1 to 40 Gbps transmission. LAN is then the common Networks Can be Defined by Distance 10/100 Mbps Ethernet, and WLAN primarily The most commonly-used terms for data the IEEE 802.11a/b/g system with 2 to 54 communication networks are WAN (Wide Mbps rates. Although PAN is less well- Area Network) and LAN (Local Area defined, it includes lower data systems like Network), with WLAN (Wireless Local Area Bluetooth. However, the first consumer uses of Network) being a specific subset of LAN. Ultra Wideband (UWB) will have PAN-type Distance is the main difference—LAN is gen- range with very high data rates (e.g.
    [Show full text]