Network and Operating System Wan Cloud
Network and Operating System Wan Cloud
I confirm that I understand my coursework needs to be submitted online via Google Classroom under the
relevant module page before the deadline in order for my assignment to be accepted and marked. I am
fully aware that late submissions will be treated as non-submission and a mark of zero will be awarded.
AKNOWLEGMENT
I would like to thank my module leader Mr. Dipeshor and My class teacher Puranjan
Aacharya also thank to my friends for their support and guidance.
I would like to give special thanks to my parents for their care and support in my
studies and provide me as such good internet.
ABSTRACT
Demand of networking increasing day by day, both user and carrier. This coursework
provide the proper explanation about comnet simulation and it research. This module
presents several types of object an theories which may be used in application, states
of network problems which is to be analysed, provides step by step instructions to
build a model to analyse the network problem presents the results of the network
simulation.
This report, plan and execution of local area network neighborhood is written to fill in
as a source of perspective book for wireless LAN later on at whatever point it is
wanted. This report clarifies the overview thought, equipment thought, end-client
thought and standard of Wireless network. Moreover, IEEE (Institute of Electrical and
Electronics Engineers) this expert body have done a ton of work to make remote
organization had various alternative to decision a reasonable Wireless switch 802.11.
Contents
1. TASK A .............................................................................................................. 1
1.1. INTRODUCTION ............................................................................................ 1
1.2. WAN MODULE ............................................................................................... 1
1.2.1. EDINBURGH LAN ....................................................................................... 2
1.2.2. WAN CLOUD............................................................................................... 5
1.2.2.3. ITAHARI AND BUTWAL LAN ...................................................................... 9
1.3. DESCRIPTION OF REPORTS ..................................................................... 17
1.3.1. NODE REPORT: RECEIVED MESSAGE COUNT .................................... 17
1.3.2. LINK REPORT: CHANNEL UTILIZATION ................................................. 18
1.3.3. WAN CLOUD REPORTS: FRAME DELAY, FRAME COUNT, ACCESS
LINK STATS:.......................................................................................................... 19
1.4. CONCLUSION .............................................................................................. 24
2. TASK B ............................................................................................................ 24
2.1.1. WIRELESS NETWORKS .......................................................................... 26
2.1.2. IEEE 802.11 Architecture .......................................................................... 27
2.1.3. IEEE 802.11 Priorities................................................................................ 27
2.1.4. WIRELESS TECHNOLOGIES ................................................................... 27
2.3. CONCLUSION .............................................................................................. 28
3. REFRENCES AND BIBLIOGRAPHY ............................................................... 28
4. APPENDIX ....................................................................................................... 28
List of Figures
Figure 1 Screenshot of WAN Module .............................................................................. 2
Figure 2 Screenshot of Edinburgh LAN ........................................................................... 3
Figure 3 Token Passing link ............................................................................................ 3
Figure 4 Screenshot of Edinburgh Router ....................................................................... 4
Figure 5 Screenshot of ATM Processing Server ............................................................. 5
Figure 6 Screenshot of Message Response .................................................................... 5
Figure 7 WAN Cloud........................................................................................................ 6
Figure 8 Edinburgh Access link ...................................................................................... 6
Figure 9 Itahari Access link ............................................................................................. 7
Figure 10 Butwal Access link........................................................................................... 7
Figure 11 Einburgh-Itahari Virtual circuit ......................................................................... 8
Figure 12 Itahari-Edinburgh Virtual Circuit....................................................................... 8
Figure 13 Edinburgh-Butwal Virtual Circuit ...................................................................... 8
Figure 14 Butwal-Edinburgh Virtual Circuit ...................................................................... 9
Figure 15 Itahari LAN ...................................................................................................... 9
Figure 16 Butwal LAN.................................................................................................... 10
Figure 17 Itahari Router................................................................................................. 10
Figure 18 Butwal LAN.................................................................................................... 11
Figure 19 Itahari CSMA/Link ......................................................................................... 11
Figure 20 Butwal CSMA/CD link .................................................................................... 12
Figure 21 Itahari single teller mechine ........................................................................... 12
Figure 22 Butwal single teller mechine .......................................................................... 13
Figure 23 Itahari 30 ATM ............................................................................................... 13
Figure 24 Butwal 30 ATM .............................................................................................. 14
Figure 25 Itahari single teller message source : Message............................................. 14
Figure 26 Itahari single teller mechine message source: Packets ................................. 15
Figure 27 Itahari ATM message source: Message ........................................................ 15
Figure 28 Itahari ATM message source: Packets .......................................................... 15
Figure 29 Butwal single teller message source: Messages ........................................... 16
Figure 30 Butwal single teller mechine message source: Packet .................................. 16
Figure 31 Butwal ATM message source: Messages...................................................... 16
Figure 32 Butwal ATM message source: Packets ......................................................... 17
Figure 33 Received Message Count Bargraph .............................................................. 18
Figure 34 Channel Utilization Bargraph ......................................................................... 19
Figure 35 Frame Delay Average Bargraph .................................................................... 20
Figure 36 Brust Size Average Bargraph ........................................................................ 20
Figure 37 Frame Accepted Bargraph ............................................................................ 21
Figure 38 Access link stats bargraph ............................................................................ 22
Figure 39 Message+response source= Message delay ................................................ 23
Figure 40 Screenshot Simulation part1 ......................................................................... 29
Figure 41 Screenshot of simulation part 2 ..................................................................... 30
Figure 42 Screenshot of Simulation part 3 .................................................................... 31
Figure 43 Screenshot of simulation part 4 ..................................................................... 32
Figure 44 Screenshot of simulation part 5 ..................................................................... 33
List of Tables
Table 1 Node Report: Received message count ........................................................... 17
Table 2 Link Report: Channel Utilization ....................................................................... 18
Table 3 Frame delay by VC ........................................................................................... 19
Table 4 Frame count by VC........................................................................................... 21
Table 5 Access Link Stats ............................................................................................. 22
Table 6 Message Delay For All Nodes .......................................................................... 23
1. TASK A
1.1. INTRODUCTION
Computer network systems are growing day by day. Now, business are one the
telecommunication networks. To manage the network is the toughest challenges
for the network engineers because their billions of users and more than the
networks. This coursework is about how telecommunication network work, LAN
and WAN. We use COMNET III to better performance and analysis for wireless
networks. it is used to module network to control, simulate with running
parameters. The applications are very familiar with Wide Area Network(WAN) and
Local Area Network(LAN). The basic steps to build a model using the application
are to first define a network topology using the various nodes and links available
in the application
Main aim and objective of this report listed below:
To design the LAN and WAN module, given scenario by using COMNET
III.
To list out the difference between result of two model.
To study the result of LAN and WAN model.
To present report of Asian model.
1
BIBEK CHAUDHARY
Edinburgh LAN, there also same router which is used in Nepal network but
Edinburgh router has connected with token ring and token ring connected with
ATM and Message response source. In this WAN, there three virtual circuit with
three access link. Each link are connected with each other. The transmission rate
between LAN to WAN have 16kbps and also WAN to LAN have 128 kbps. The
single teller machines in every LANs (Itahari and Butwal)are produced at an
interarrival time that can be characterized with a remarkable likelihood
conveyance with mean 10 which has a size that can be clarified by a uniform
dissemination where the size is equally scattered over the scope of 40 to 100
bytes.For the destination list of message source and message response you need
to generate random list with respective destination.The routing protocol used is
TCP-IP Microsoft V1.0 with 10 ms Packetize time
2
BIBEK CHAUDHARY
Figure 2 Screenshot of Edinburgh LAN
3
BIBEK CHAUDHARY
1.2.1.2. NETWORK DEVICE: ROUTER
Router is the physical device that designed for analyze, receive and forward
data packet between the networks. Explaining the device with fulfill the values
in list and shown with screenshot:
Name: Edinburgh Router
Type: Network Device
Parameters: 7000/7010 sp
4
BIBEK CHAUDHARY
Figure 5 Screenshot of ATM Processing Server
5
BIBEK CHAUDHARY
virtual links, one for Itahari to Edinburgh, one for Edinburgh to Butwal and another
for Edinburgh to Itahari. All the links are in frame ralay but parameters are different
like 16 kps parameter for Virtual circuit and 128 kps parameter for Access link. The
given screenshot show WAN CLOUD.
6
BIBEK CHAUDHARY
Figure 9 Itahari Access link
7
BIBEK CHAUDHARY
Figure 11 Einburgh-Itahari Virtual circuit
8
BIBEK CHAUDHARY
Figure 14 Butwal-Edinburgh Virtual Circuit
9
BIBEK CHAUDHARY
Figure 16 Butwal LAN
10
BIBEK CHAUDHARY
Figure 18 Butwal LAN
11
BIBEK CHAUDHARY
Figure 20 Butwal CSMA/CD link
12
BIBEK CHAUDHARY
Figure 22 Butwal single teller mechine
13
BIBEK CHAUDHARY
Figure 24 Butwal 30 ATM
14
BIBEK CHAUDHARY
Figure 26 Itahari single teller mechine message source: Packets
15
BIBEK CHAUDHARY
Figure 29 Butwal single teller message source: Messages
16
BIBEK CHAUDHARY
Figure 32 Butwal ATM message source: Packets
17
BIBEK CHAUDHARY
RECEIVED MESSAGE COUNTS
1200
1000
800
600
400
200
0
Butwal ATM Mesg Source Itahari ATM Msg Source Itahari Sigle Teller Msg Butwal Single Teller Msg
Source Source
Counts
18
BIBEK CHAUDHARY
Channel Utilization
2.5
1.5
0.5
0
Eniburgh LAN. Token Passing Link Butwal LAN.Butwal CSMA/CD Link Itahari LAN.Butwal CSMA/CD Link
% Utilization
1.3.3. WAN CLOUD REPORTS: FRAME DELAY, FRAME COUNT, ACCESS LINK
STATS:
1.3.3.1. WAN CLOUD: FRAME DELAY BY VC
19
BIBEK CHAUDHARY
Frame delay average
1400
1200
1000
800
600
400
200
0
Edinburgh-Itahari Itahari-Edinburgh Butwal-Edinburgh Edinburgh-Butwal
160
140
120
100
80
60
40
20
0
Ediburgh-Itahari Itahari-Edinburgh Butwal-Edinburgh Edinburgh-Butwal
20
BIBEK CHAUDHARY
1.3.3.2. WAN CLOUD: FRAME COUNT BY VC
Table 4 Frame count by VC
Frames Accepted
2500
2000
1500
1000
500
Frames Accepted
21
BIBEK CHAUDHARY
1.3.3.3. WAN CLOUD: ACCESS LINK STATS
WAN ENTRY FRAMES BUFFER(BYTES) % UTIL
CLOUD: EXIT
ACCESS
LINK ACPTED DROP MAX AVG STG
Frame Accepted
7000
6000
5000
4000
3000
2000
1000
0
Edinburgh frame Edinburgh frame Itahari frame Itahari frame Butwal frame Butwal frame
accepted entry accepted exit acccpted entry acccpted exit accepted entry accepted exit
Frame Accepted
22
BIBEK CHAUDHARY
1.3.3.4. MESSAGE AND REPORT RESPONSE: MESSAGE DELAY FOR ALL
NODES
Table 6 Message Delay For All Nodes
Butwal LAN.Butwal Single Teller Machine / Src Butwal teller message source:
Butwal single.. 6 210.000MS 0.000MS 210.000MS
Itahari LAN. Itahari Single Teller Machine / Src Itahari Teller Message Source:
Edinburgh LAN.ATM Pr. 0 0.000MS 0.000MS 0.000MS
20000
15000
10000
5000
0
Edinburgh Message Butwal Teller Butwal 30 ATM Itahari Teller Itahari ATM
Source Message Source Message Source Message Source Message Source
Average
23
BIBEK CHAUDHARY
1.4. CONCLUSION
From the above mention result of both WAN and LAN mode, it is proved that WAN model
is far better than LAN in real life scenario. The reports that are generated clearly shows
the overall function of the WAN and LAN model that were created from comnet software.
we configured a network using CSMA/CD with the help of lecture and researches on
comnet and different processing nodes including the internal and external router.
2. TASK B
2.1. INTRODUCTION
When two or more computer connected to each other that data is passing from one
computer to another computer is called Networking. Now, why it is called wireless we do
not need to attach any kind of wire to a system to achieve internet communication so this
called wireless networks or communication networking. We can transfer data from one to
another devices without using any kind cables or wires. Remote framework can be worked
for almost no expense contrasted with customary wired choices. In any case, building
remote organizations is just somewhat about setting aside cash. By furnishing individuals
in your nearby network with less expensive and simpler admittance to data, they will
straightforwardly profit by what the Internet has to bring to the table. The time also, exertion
saved by approaching the worldwide organization of data interprets into abundance on a
neighborhood scale, as more work should be possible in less time and with less exertion.
Wireless Networks gave permit distance gadgets to interface without trouble, freely these
gadgets are a couple of feet or a few kilometers away and no need need get through
dividers to pass links or introduce connectors. This has made the utilization of this
innovation of the innovation exceptionally mainstream, spreading quickly. Using this
technology we can make more flexible and easy to access. To create wireless networks
we have some tools like Network interface card (NIC), Access point and signal adapter.
There are many different technologies that differ in the transmission frequency used,
speed and range of their transmissions. There are 4 types of networks are listed below:
WAN: WAN is wide area network , it is very large network which need large area
network we can also called large area network. Wireless Wide Area Networks
extend beyond 50 kilometers and regularly use authorized frequencies. These
kinds of organizations can be kept up over enormous regions, for example: urban
communities or nations, by means of various satellite frameworks or reception
apparatus locales looked after by an internet providers.
LAN: It is stand for Local Area Network, when two or more computer are connected
in one local network that is called LAN. Local Area Networks are intended to give
remote access in zones with a regular reach up to 100 meters and, are utilized
generally in home, school, PC research center, or office conditions. This gives
clients the capacity to move around inside a neighborhood inclusion territory and
still be associated with the network . WLANs depend on IEEE 802.11standards,
promoted under the Wi-Fi brand name. Because of rivalry, different principles, for
24
BIBEK CHAUDHARY
example, HiperLAN never gotten a lot of business usage. IEEE 802.11 was more
straightforward to execute what's more, made it quicker to the market.
PAN: PAN is Personal Area Network that is smallest area networks which used in
small distance like Bluetooth, IrDA,ZigBase,UWB. They grant correspondence in a
short reach, of around 10 meters. In contrast to other remote networks, an
association made through a WPAN includes next to zero framework or then again
direct network to the world external the connection. This permits little, power
efficient, cheap answers for be actualized for a wide scope of gadgets such as a
cell phone and a PDA.
MAN: MAN stand for Metropolitan Area Networks, it is third group of wireless
networks. The networks that are interconnect user with computer that are larger
than LAN and smaller than WAN. MAN are depend on IEEE 802.16 standard which
is regularly called WiMAX (Worldwide Interoperability for Microwave Access).
WiMAX is a interchanges innovation that supports highlight multipoint engineering
pointed toward giving fast remote information over metropolitan region
organizations. This empowers more modest remote LANs to be interconnected by
WiMAX making an enormous MAN. In this manner, organizing between urban
areas can be accomplished without the requirement for costly cabling.
2.2. BACKGROUND
Wireless Networks have fundamentally affected the world, since their beginning sending.
Wireless Networks have proceeded to create and their utilizations have essentially
developed. PDAs are these days part of tremendous remote organization frameworks and
individuals utilize cell phones on a day by day premise to speak with one another and
trade data. As of late, Wireless Networks have been utilized for situating too, to empower
the arrangement of area situated administrations to the end-client. Various kinds of
estimations accessible during standard organization and terminal activity, for the most part
for asset the board and synchronization purposes, can be utilized to determine the client's
area. With these various employments of remote organization, this task will zero in on
assets sharing devoted organization. A teacher at the University of Hawaii, Norman
Abramson built up the world's first remote PC correspondence organization, ALOHAnet
(operational in 1971), utilizing ease ham-like radios. The framework included seven PCs
conveyed over four islands to speak with the focal PC on the Oahu Island without utilizing
telephone lines. WLAN equipment at first expense to such an extent that it was simply
utilized as an option in contrast to cabled LAN in spots where cabling was troublesome or
unthinkable. Early advancement included industryspecific arrangements and restrictive
conventions, yet toward the finish of the 1990s these were supplanted by norms,
fundamentally the different adaptations of IEEE 802.11 (in items utilizing the Wi-Fi brand
name). An elective ATM-like 5 GHz normalized innovation, HiperLAN/2, has so far not
prevailing in the market, and with the arrival of the quicker 54 Mbit/s 802.11a (5 GHz)
what's more, 802.11g (2.4 GHz) norms, it is much more impossible that it will ever
succeed. In 2009 802.11n was added to 802.11. It works in both the 2.4 GHz and 5 GHz
groups at a most extreme information move pace of 600 Mbit/s. Most new switches can
use both remote groups, known as dualband. This permits information interchanges to
evade the swarmed 2.4 GHz band, which is likewise imparted to Bluetooth gadgets
furthermore, microwaves. The 5 GHz band is likewise more extensive than the 2.4 GHz
25
BIBEK CHAUDHARY
band, with more channels, which allows a more noteworthy number of gadgets to share
the space. Not all diverts are accessible in all locales. A remote neighborhood (WLAN)
joins at least two gadgets utilizing some remote dispersion strategy (ordinarily spread-
range or OFDM radio), and as a rule giving an association through a passageway to the
more extensive Internet. This enables clients to move around inside a nearby inclusion
territory and still be associated with the organization. Generally current WLANs depend
on IEEE 802.11 norms, showcased under the Wi-Fi brand name. Remote LANs have
gotten well known in the home due to simplicity of establishment, and in business buildings
offering remote admittance to their clients; regularly for nothing. New York City, for
example, has started a test case program to give city laborers in every one of the five
precincts of the city with remote Internet access. In like manner, Muritala International Air
terminal, Lagos has free remote web access for traveler travelling around.
2.1.1. WIRELESS NETWORKS
2.1.1.1. HISTROY
In 1970, the University of Hawaii built up the primary Wireless Networks to wirelessly
communicate information among the Hawaiian Islands. Nonetheless, it wasn't until
1991 that the Institute of Electrical and Electronics Engineers (IEEE) started to
examine normalizing WLAN advancements. In 1997, the IEEE approved the first
802.11 norm—the "802.11" innovation term basically alludes to Wi-Fi. In 1999 remote
was acquainted with the overall population as a "ideal to have" with the 802.11 an
and b sanctions. These guidelines had extremely low accelerates (to 54 Mbps and
11Mbps separately) yet it was alright, on the grounds that there were no handheld
cell phones that used Wi-Fi and not many workstations. By 2003, nonetheless, some
cell phones that used Wi-Fi were coming out and versatile workstations were getting
more norm for both business and individual use. That is when 802.11g was
sanctioned—conveying up to 54 Mbps in the 2.4 GHz space. As we drew nearer to
now, in 2007, the introduction of the cell phone truly came to fruition and alongside it
came the sanction of 802.11n. The "n" standard achieved quicker handling rates of
up to 450 Mbps for Wi-Fi and it upheld both 2.4 Ghz and 5 Ghz gadgets. Today, keen
gadgets are adequately vigorous to supplant particular, more costly PC advances so
Wireless has needed to make up for lost time.
2.1.1.2. ADVANTAGES AND DISADVANTAGES
Wireless networks have advantage and disadvantages are listed bellows:
ADVANTAGES
Freedom from wires.
Easy to expand and setup.
it is more flexible and adaptable compared to wired network.
Easy to install without wire that make cheaper.
DISADVANTAGES
Wireless networks like open bottle, which make less secure.
Unreliability.
Increased chance of jamming.
Transmission speed is comparably less.
It is more vulnerable to attack by unknown users.
26
BIBEK CHAUDHARY
2.1.2. IEEE 802.11 Architecture
The engineering of the IEEE 802.11 WLAN is intended to help an organization where
most dynamic is dispersed to versatile stations. This kind of design has a few focal
points. It is lenient toward issues in the entirety of the WLAN hardware and wipes out
potential bottlenecks a brought together engineering would present. The design is
adaptable and can without much of a stretch help both little, transient organizations
and enormous, semi permanent or perpetual organizations. Likewise, the engineering
and conventions offer critical force saving and draw out the battery life of versatile
gear without losing network availability
2.1.3. IEEE 802.11 Priorities
The IEEE 802.11 conveyed coordination work (DCF) empowers quick establishment
with negligible administration and support costs, and is an extremely vigorous
convention for the best exertion administration in remote medium. Notwithstanding,
the current DCF is unsatisfactory for ongoing applications. This paper contemplates
back off-based need plans for IEEE 802.11 and the arising IEEE 802.11e norm by
separating the base back off window size, the back off window-expanding factor, and
as far as possible. A logical model is proposed to infer immersion throughputs,
immersion deferrals, and casing dropping probabilities of various need classes for all
proposed need plans. Reproductions are directed to approve scientific outcomes. The
proposed need plans can be handily executed, and the outcomes from this paper are
valuable in planning great need boundaries.
2.1.4. WIRELESS TECHNOLOGIES
There many different types of wireless technologies. Some wireless technologies give
below:
2.1.4.1. WAP
WAP represents Wireless Application Protocol. It is a convention intended
for miniature programs and it empowers the entrance of web in the cell
phones. It utilizes the increase language WML (Wireless Markup Language
and not HTML), WML is characterized as XML 1.0 application. It empowers
making web applications for cell phones. In 1998, WAP Forum was
established by Ericson, Motorola, Nokia and Unwired Planet whose point
was to normalize the different remote advances by means of conventions.
WAP convention was come about by the joint endeavors of the different
individuals from WAP Forum. In 2002, WAP gathering was converged with
different discussions of the business bringing about the development of
Open Mobile Alliance (OMA).
2.1.4.2. WML
WML represents Wireless Markup Language (WML) which depends on
HTML and HDML. It is indicated as a XML report type. It is a markup
language used to create sites for cell phones. While planning with WML,
imperatives of remote gadgets, for example, little presentation screens,
restricted memory, low data transfer capacity of transmission and little
assets must be thought of. WAP (Wireless Application Protocol) locales are
not the same as should be expected HTML destinations in the way that they
27
BIBEK CHAUDHARY
are monochromatic (just high contrast), brief and has tiny screen space,
because of which content in the WAP locales will be just the huge issue,
much like how transmit used to function in the times past. The idea WML
follows is that of a deck and card analogy. A WML record is considered as
comprised of numerous cards. Much the same as how cards can be
gathered to shape a deck, a WAP site has numerous cards. Each card will
be shown in turn on the screen, much the same as how each page is shown
in turn in a HTML site. Numerous cards can be embedded into a WML report,
and the WML deck is recognized by a URL.
2.3. CONCLUSION
Wireless network innovations interface without wires our high innovation gadgets to either
a rapid organization or another gadget. Previously, wires would need to be put from space
to room or floor to floor, cost for arrangement was expensive, and the time to arrangement
a wired organization was unfathomably expanded from a remote organization among
different things. These days setting up a wireless network arrangement is truly simple to
do, and there are a ton of wireless items to browse notwithstanding a lot of assets
accessible to assist you with arrangement and setup of the Wireless Network if necessary.
Various advancements can be picked to best suit the application necessity and information
transmission reach can fluctuate from a couple of meters to a few kilometers. Wireless
networks unquestionably offer new open doors for modern arrangements, yet they should
be executed with extraordinary consideration regarding security.
4. APPENDIX
APPENDIX- A Screenshot of Simulation Report
28
BIBEK CHAUDHARY
Figure 40 Screenshot Simulation part1
29
BIBEK CHAUDHARY
Figure 41 Screenshot of simulation part 2
30
BIBEK CHAUDHARY
Figure 42 Screenshot of Simulation part 3
31
BIBEK CHAUDHARY
Figure 43 Screenshot of simulation part 4
32
BIBEK CHAUDHARY
Figure 44 Screenshot of simulation part 5
33
BIBEK CHAUDHARY
for highlight point interfaces between two gadgets for basic information moves and record
synchronization, ZigBee is planned for dependable remotely arranged checking and control
organizations and, UWB is arranged to high-transfer speed media joins.
Bluetooth: Bluetooth corresponds to the IEEE 802.15.1 standard. Originally Bluetooth
was designed for low power consumption, short range and omni-directional (point to
multipoint) communications, and cheap devices, to be used as a cable replacement,
linking devices through an ad hoc connection of radio waves. Nowadays developers are
designing Bluetooth-enabled components and systems for a range of additional
applications. This technology operates for three different classes of devices: Class 1,
class 2 and class 3 where the range is about 100 meters, 10 meters and 1 meter
respectively. Using the 2.4 GHz band, two devices within the coverage range of each
other can share up to 720 Kbps of capacity or transfer rate. The most commonly used is
class 2.
IrDA: The Infrared Data Association (IrDA) indicates a total arrangement of infrared
interchanges norms. IrDA alludes to that set of norms and is utilized to give remote
availability to gadgets that would ordinarily utilize links for availability. IrDA is a low-
power, minimal effort, unidirectional (highlight point), limited point (< 30º) cone,
impromptu information transmission standard intended to work over a distance of up to 1
meter and at paces of 9600 bps to 4 Mbps (as of now), 16 Mbps (being worked on). A
portion of the gadgets that utilization IrDA are scratch pad, PDAs, printers and cameras.
APPENDIX- C GLOSSARY
802.11 - The overall standard created by the IEEE for Wireless local area network. Inside the
802.11 standard are different substandards, including 802.11b (11 Mbps utilizing the 2.4 GHz
range), 802.11a (54 Mbps utilizing the 5 GHz range), and 802.11g(54 Mbps utilizing the 2.4 GHz
range).
LAN – Local Area Network
PAN – Personal Area Network
WAN – Wide Area Network
Gadget- anykind of device
Data - kind of information
Access point- it is point that create LAN
authorized- having permission
remote – Wireless
Wi-Fi- wireless fidelity
HiperLAN- High Performance Radio LAN
IrDA- infrafed data association
UWB- Ultra- wideband
PDA- Personal digital assistance
WiMAX- worldwide interoperability for micro access
Microwave- types of radiation with lenght
empowers- authority
enormous – large aize
Synchronization - the operation or activity of two or more things at the same time or rate.
34
BIBEK CHAUDHARY
swarmed – move from one to another
Unreliability – trusted
Vulnerable – being harmed or attacked
Dynamic- energetic
DCF- Discount cash flow
Modem- modulator- demodulator
Immersion – deeply involving
WAP- Wireless application protocol
WML- Wireless markup Language
Monochromatic – single wavelength
URL – Uniform Resource Locator
35
BIBEK CHAUDHARY